Sep 21 07:34:39.295881: FIPS Product: YES Sep 21 07:34:39.295911: FIPS Kernel: NO Sep 21 07:34:39.295913: FIPS Mode: NO Sep 21 07:34:39.295915: NSS DB directory: sql:/etc/ipsec.d Sep 21 07:34:39.296053: Initializing NSS Sep 21 07:34:39.296056: Opening NSS database "sql:/etc/ipsec.d" read-only Sep 21 07:34:39.325266: NSS initialized Sep 21 07:34:39.325283: NSS crypto library initialized Sep 21 07:34:39.325287: FIPS HMAC integrity support [enabled] Sep 21 07:34:39.325290: FIPS mode disabled for pluto daemon Sep 21 07:34:39.381996: FIPS HMAC integrity verification self-test FAILED Sep 21 07:34:39.382081: libcap-ng support [enabled] Sep 21 07:34:39.382091: Linux audit support [enabled] Sep 21 07:34:39.382117: Linux audit activated Sep 21 07:34:39.382123: Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:16699 Sep 21 07:34:39.382125: core dump dir: /tmp Sep 21 07:34:39.382126: secrets file: /etc/ipsec.secrets Sep 21 07:34:39.382127: leak-detective disabled Sep 21 07:34:39.382129: NSS crypto [enabled] Sep 21 07:34:39.382130: XAUTH PAM support [enabled] Sep 21 07:34:39.382185: | libevent is using pluto's memory allocator Sep 21 07:34:39.382190: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Sep 21 07:34:39.382202: | libevent_malloc: new ptr-libevent@0x5631c5528f00 size 40 Sep 21 07:34:39.382205: | libevent_malloc: new ptr-libevent@0x5631c5528f30 size 40 Sep 21 07:34:39.382207: | libevent_malloc: new ptr-libevent@0x5631c552a200 size 40 Sep 21 07:34:39.382208: | creating event base Sep 21 07:34:39.382210: | libevent_malloc: new ptr-libevent@0x5631c552a1c0 size 56 Sep 21 07:34:39.382212: | libevent_malloc: new ptr-libevent@0x5631c552a230 size 664 Sep 21 07:34:39.382220: | libevent_malloc: new ptr-libevent@0x5631c552a4d0 size 24 Sep 21 07:34:39.382223: | libevent_malloc: new ptr-libevent@0x5631c551bd70 size 384 Sep 21 07:34:39.382231: | libevent_malloc: new ptr-libevent@0x5631c552a4f0 size 16 Sep 21 07:34:39.382232: | libevent_malloc: new ptr-libevent@0x5631c552a510 size 40 Sep 21 07:34:39.382234: | libevent_malloc: new ptr-libevent@0x5631c552a540 size 48 Sep 21 07:34:39.382239: | libevent_realloc: new ptr-libevent@0x5631c54ac370 size 256 Sep 21 07:34:39.382241: | libevent_malloc: new ptr-libevent@0x5631c552a580 size 16 Sep 21 07:34:39.382245: | libevent_free: release ptr-libevent@0x5631c552a1c0 Sep 21 07:34:39.382247: | libevent initialized Sep 21 07:34:39.382250: | libevent_realloc: new ptr-libevent@0x5631c552a5a0 size 64 Sep 21 07:34:39.382252: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Sep 21 07:34:39.382266: | init_nat_traversal() initialized with keep_alive=0s Sep 21 07:34:39.382268: NAT-Traversal support [enabled] Sep 21 07:34:39.382270: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Sep 21 07:34:39.382274: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Sep 21 07:34:39.382276: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Sep 21 07:34:39.382305: | global one-shot timer EVENT_REVIVE_CONNS initialized Sep 21 07:34:39.382307: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Sep 21 07:34:39.382309: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Sep 21 07:34:39.382346: Encryption algorithms: Sep 21 07:34:39.382354: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Sep 21 07:34:39.382357: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Sep 21 07:34:39.382359: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Sep 21 07:34:39.382361: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Sep 21 07:34:39.382363: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Sep 21 07:34:39.382370: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Sep 21 07:34:39.382373: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Sep 21 07:34:39.382375: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Sep 21 07:34:39.382377: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Sep 21 07:34:39.382379: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Sep 21 07:34:39.382381: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Sep 21 07:34:39.382384: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Sep 21 07:34:39.382386: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Sep 21 07:34:39.382388: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Sep 21 07:34:39.382390: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Sep 21 07:34:39.382392: NULL IKEv1: ESP IKEv2: ESP [] Sep 21 07:34:39.382394: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Sep 21 07:34:39.382399: Hash algorithms: Sep 21 07:34:39.382401: MD5 IKEv1: IKE IKEv2: Sep 21 07:34:39.382403: SHA1 IKEv1: IKE IKEv2: FIPS sha Sep 21 07:34:39.382405: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Sep 21 07:34:39.382407: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Sep 21 07:34:39.382408: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Sep 21 07:34:39.382417: PRF algorithms: Sep 21 07:34:39.382419: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Sep 21 07:34:39.382421: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Sep 21 07:34:39.382423: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Sep 21 07:34:39.382425: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Sep 21 07:34:39.382427: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Sep 21 07:34:39.382429: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Sep 21 07:34:39.382443: Integrity algorithms: Sep 21 07:34:39.382446: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Sep 21 07:34:39.382448: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Sep 21 07:34:39.382450: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Sep 21 07:34:39.382453: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Sep 21 07:34:39.382455: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Sep 21 07:34:39.382457: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Sep 21 07:34:39.382459: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Sep 21 07:34:39.382461: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Sep 21 07:34:39.382463: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Sep 21 07:34:39.382471: DH algorithms: Sep 21 07:34:39.382473: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Sep 21 07:34:39.382475: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Sep 21 07:34:39.382477: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Sep 21 07:34:39.382480: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Sep 21 07:34:39.382482: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Sep 21 07:34:39.382483: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Sep 21 07:34:39.382485: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Sep 21 07:34:39.382487: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Sep 21 07:34:39.382489: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Sep 21 07:34:39.382491: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Sep 21 07:34:39.382493: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Sep 21 07:34:39.382494: testing CAMELLIA_CBC: Sep 21 07:34:39.382496: Camellia: 16 bytes with 128-bit key Sep 21 07:34:39.382583: Camellia: 16 bytes with 128-bit key Sep 21 07:34:39.382601: Camellia: 16 bytes with 256-bit key Sep 21 07:34:39.382619: Camellia: 16 bytes with 256-bit key Sep 21 07:34:39.382635: testing AES_GCM_16: Sep 21 07:34:39.382637: empty string Sep 21 07:34:39.382657: one block Sep 21 07:34:39.382672: two blocks Sep 21 07:34:39.382687: two blocks with associated data Sep 21 07:34:39.382703: testing AES_CTR: Sep 21 07:34:39.382706: Encrypting 16 octets using AES-CTR with 128-bit key Sep 21 07:34:39.382746: Encrypting 32 octets using AES-CTR with 128-bit key Sep 21 07:34:39.382765: Encrypting 36 octets using AES-CTR with 128-bit key Sep 21 07:34:39.382781: Encrypting 16 octets using AES-CTR with 192-bit key Sep 21 07:34:39.382803: Encrypting 32 octets using AES-CTR with 192-bit key Sep 21 07:34:39.382834: Encrypting 36 octets using AES-CTR with 192-bit key Sep 21 07:34:39.382850: Encrypting 16 octets using AES-CTR with 256-bit key Sep 21 07:34:39.382866: Encrypting 32 octets using AES-CTR with 256-bit key Sep 21 07:34:39.382881: Encrypting 36 octets using AES-CTR with 256-bit key Sep 21 07:34:39.382899: testing AES_CBC: Sep 21 07:34:39.382901: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Sep 21 07:34:39.382917: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Sep 21 07:34:39.382934: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Sep 21 07:34:39.382951: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Sep 21 07:34:39.382971: testing AES_XCBC: Sep 21 07:34:39.382973: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Sep 21 07:34:39.383045: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Sep 21 07:34:39.383125: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Sep 21 07:34:39.383196: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Sep 21 07:34:39.383269: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Sep 21 07:34:39.383343: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Sep 21 07:34:39.383417: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Sep 21 07:34:39.383583: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Sep 21 07:34:39.383657: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Sep 21 07:34:39.383736: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Sep 21 07:34:39.383907: testing HMAC_MD5: Sep 21 07:34:39.383911: RFC 2104: MD5_HMAC test 1 Sep 21 07:34:39.384013: RFC 2104: MD5_HMAC test 2 Sep 21 07:34:39.384103: RFC 2104: MD5_HMAC test 3 Sep 21 07:34:39.384211: 8 CPU cores online Sep 21 07:34:39.384214: starting up 7 crypto helpers Sep 21 07:34:39.384247: started thread for crypto helper 0 Sep 21 07:34:39.384275: | starting up helper thread 0 Sep 21 07:34:39.384286: | starting up helper thread 1 Sep 21 07:34:39.384300: | status value returned by setting the priority of this thread (crypto helper 1) 22 Sep 21 07:34:39.384303: | crypto helper 1 waiting (nothing to do) Sep 21 07:34:39.384280: started thread for crypto helper 1 Sep 21 07:34:39.384293: | status value returned by setting the priority of this thread (crypto helper 0) 22 Sep 21 07:34:39.384375: | crypto helper 0 waiting (nothing to do) Sep 21 07:34:39.384383: started thread for crypto helper 2 Sep 21 07:34:39.384388: | starting up helper thread 2 Sep 21 07:34:39.384420: | status value returned by setting the priority of this thread (crypto helper 2) 22 Sep 21 07:34:39.384423: | crypto helper 2 waiting (nothing to do) Sep 21 07:34:39.384433: started thread for crypto helper 3 Sep 21 07:34:39.384440: | starting up helper thread 3 Sep 21 07:34:39.384449: started thread for crypto helper 4 Sep 21 07:34:39.384451: | status value returned by setting the priority of this thread (crypto helper 3) 22 Sep 21 07:34:39.384470: | crypto helper 3 waiting (nothing to do) Sep 21 07:34:39.384476: | starting up helper thread 4 Sep 21 07:34:39.384489: | status value returned by setting the priority of this thread (crypto helper 4) 22 Sep 21 07:34:39.384492: | crypto helper 4 waiting (nothing to do) Sep 21 07:34:39.384478: started thread for crypto helper 5 Sep 21 07:34:39.384482: | starting up helper thread 5 Sep 21 07:34:39.384563: | status value returned by setting the priority of this thread (crypto helper 5) 22 Sep 21 07:34:39.384566: | crypto helper 5 waiting (nothing to do) Sep 21 07:34:39.384607: started thread for crypto helper 6 Sep 21 07:34:39.384610: | checking IKEv1 state table Sep 21 07:34:39.384616: | MAIN_R0: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384617: | -> MAIN_R1 EVENT_SO_DISCARD Sep 21 07:34:39.384619: | MAIN_I1: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384621: | -> MAIN_I2 EVENT_RETRANSMIT Sep 21 07:34:39.384622: | MAIN_R1: category: open IKE SA flags: 200: Sep 21 07:34:39.384624: | -> MAIN_R2 EVENT_RETRANSMIT Sep 21 07:34:39.384625: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:34:39.384627: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:34:39.384628: | MAIN_I2: category: open IKE SA flags: 0: Sep 21 07:34:39.384630: | -> MAIN_I3 EVENT_RETRANSMIT Sep 21 07:34:39.384631: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:34:39.384632: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:34:39.384634: | MAIN_R2: category: open IKE SA flags: 0: Sep 21 07:34:39.384636: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:34:39.384637: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:34:39.384638: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:34:39.384640: | MAIN_I3: category: open IKE SA flags: 0: Sep 21 07:34:39.384641: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:34:39.384643: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:34:39.384644: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:34:39.384646: | MAIN_R3: category: established IKE SA flags: 200: Sep 21 07:34:39.384647: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384649: | MAIN_I4: category: established IKE SA flags: 0: Sep 21 07:34:39.384650: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384652: | AGGR_R0: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384653: | -> AGGR_R1 EVENT_SO_DISCARD Sep 21 07:34:39.384655: | AGGR_I1: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384656: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:34:39.384658: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:34:39.384659: | AGGR_R1: category: open IKE SA flags: 200: Sep 21 07:34:39.384661: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:34:39.384662: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:34:39.384664: | AGGR_I2: category: established IKE SA flags: 200: Sep 21 07:34:39.384665: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384667: | AGGR_R2: category: established IKE SA flags: 0: Sep 21 07:34:39.384668: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384670: | QUICK_R0: category: established CHILD SA flags: 0: Sep 21 07:34:39.384671: | -> QUICK_R1 EVENT_RETRANSMIT Sep 21 07:34:39.384673: | QUICK_I1: category: established CHILD SA flags: 0: Sep 21 07:34:39.384675: | -> QUICK_I2 EVENT_SA_REPLACE Sep 21 07:34:39.384676: | QUICK_R1: category: established CHILD SA flags: 0: Sep 21 07:34:39.384681: | -> QUICK_R2 EVENT_SA_REPLACE Sep 21 07:34:39.384682: | QUICK_I2: category: established CHILD SA flags: 200: Sep 21 07:34:39.384684: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384685: | QUICK_R2: category: established CHILD SA flags: 0: Sep 21 07:34:39.384687: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384689: | INFO: category: informational flags: 0: Sep 21 07:34:39.384690: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384692: | INFO_PROTECTED: category: informational flags: 0: Sep 21 07:34:39.384693: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384695: | XAUTH_R0: category: established IKE SA flags: 0: Sep 21 07:34:39.384696: | -> XAUTH_R1 EVENT_NULL Sep 21 07:34:39.384698: | XAUTH_R1: category: established IKE SA flags: 0: Sep 21 07:34:39.384699: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:34:39.384701: | MODE_CFG_R0: category: informational flags: 0: Sep 21 07:34:39.384702: | -> MODE_CFG_R1 EVENT_SA_REPLACE Sep 21 07:34:39.384704: | MODE_CFG_R1: category: established IKE SA flags: 0: Sep 21 07:34:39.384705: | -> MODE_CFG_R2 EVENT_SA_REPLACE Sep 21 07:34:39.384707: | MODE_CFG_R2: category: established IKE SA flags: 0: Sep 21 07:34:39.384708: | -> UNDEFINED EVENT_NULL Sep 21 07:34:39.384710: | MODE_CFG_I1: category: established IKE SA flags: 0: Sep 21 07:34:39.384711: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:34:39.384713: | XAUTH_I0: category: established IKE SA flags: 0: Sep 21 07:34:39.384714: | -> XAUTH_I1 EVENT_RETRANSMIT Sep 21 07:34:39.384716: | XAUTH_I1: category: established IKE SA flags: 0: Sep 21 07:34:39.384718: | -> MAIN_I4 EVENT_RETRANSMIT Sep 21 07:34:39.384722: | checking IKEv2 state table Sep 21 07:34:39.384726: | PARENT_I0: category: ignore flags: 0: Sep 21 07:34:39.384728: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Sep 21 07:34:39.384730: | PARENT_I1: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384732: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Sep 21 07:34:39.384733: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Sep 21 07:34:39.384735: | PARENT_I2: category: open IKE SA flags: 0: Sep 21 07:34:39.384737: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Sep 21 07:34:39.384739: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Sep 21 07:34:39.384740: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Sep 21 07:34:39.384742: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Sep 21 07:34:39.384743: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Sep 21 07:34:39.384745: | PARENT_I3: category: established IKE SA flags: 0: Sep 21 07:34:39.384747: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Sep 21 07:34:39.384748: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Sep 21 07:34:39.384750: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Sep 21 07:34:39.384751: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Sep 21 07:34:39.384753: | PARENT_R0: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384755: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Sep 21 07:34:39.384756: | PARENT_R1: category: half-open IKE SA flags: 0: Sep 21 07:34:39.384758: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Sep 21 07:34:39.384760: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Sep 21 07:34:39.384761: | PARENT_R2: category: established IKE SA flags: 0: Sep 21 07:34:39.384763: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Sep 21 07:34:39.384765: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Sep 21 07:34:39.384766: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Sep 21 07:34:39.384769: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Sep 21 07:34:39.384771: | V2_CREATE_I0: category: established IKE SA flags: 0: Sep 21 07:34:39.384772: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Sep 21 07:34:39.384774: | V2_CREATE_I: category: established IKE SA flags: 0: Sep 21 07:34:39.384776: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Sep 21 07:34:39.384777: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Sep 21 07:34:39.384779: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Sep 21 07:34:39.384781: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Sep 21 07:34:39.384807: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Sep 21 07:34:39.384811: | starting up helper thread 6 Sep 21 07:34:39.384813: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Sep 21 07:34:39.384821: | status value returned by setting the priority of this thread (crypto helper 6) 22 Sep 21 07:34:39.384829: | crypto helper 6 waiting (nothing to do) Sep 21 07:34:39.384825: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Sep 21 07:34:39.384850: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Sep 21 07:34:39.384852: | V2_CREATE_R: category: established IKE SA flags: 0: Sep 21 07:34:39.384853: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Sep 21 07:34:39.384855: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Sep 21 07:34:39.384857: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Sep 21 07:34:39.384859: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Sep 21 07:34:39.384860: | V2_IPSEC_I: category: established CHILD SA flags: 0: Sep 21 07:34:39.384862: | V2_IPSEC_R: category: established CHILD SA flags: 0: Sep 21 07:34:39.384864: | IKESA_DEL: category: established IKE SA flags: 0: Sep 21 07:34:39.384865: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Sep 21 07:34:39.384867: | CHILDSA_DEL: category: informational flags: 0: Sep 21 07:34:39.384913: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ Sep 21 07:34:39.384969: | Hard-wiring algorithms Sep 21 07:34:39.384972: | adding AES_CCM_16 to kernel algorithm db Sep 21 07:34:39.384975: | adding AES_CCM_12 to kernel algorithm db Sep 21 07:34:39.384976: | adding AES_CCM_8 to kernel algorithm db Sep 21 07:34:39.384978: | adding 3DES_CBC to kernel algorithm db Sep 21 07:34:39.384979: | adding CAMELLIA_CBC to kernel algorithm db Sep 21 07:34:39.384981: | adding AES_GCM_16 to kernel algorithm db Sep 21 07:34:39.384982: | adding AES_GCM_12 to kernel algorithm db Sep 21 07:34:39.384984: | adding AES_GCM_8 to kernel algorithm db Sep 21 07:34:39.384985: | adding AES_CTR to kernel algorithm db Sep 21 07:34:39.384987: | adding AES_CBC to kernel algorithm db Sep 21 07:34:39.384988: | adding SERPENT_CBC to kernel algorithm db Sep 21 07:34:39.384990: | adding TWOFISH_CBC to kernel algorithm db Sep 21 07:34:39.384992: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Sep 21 07:34:39.384993: | adding NULL to kernel algorithm db Sep 21 07:34:39.384995: | adding CHACHA20_POLY1305 to kernel algorithm db Sep 21 07:34:39.384996: | adding HMAC_MD5_96 to kernel algorithm db Sep 21 07:34:39.384998: | adding HMAC_SHA1_96 to kernel algorithm db Sep 21 07:34:39.384999: | adding HMAC_SHA2_512_256 to kernel algorithm db Sep 21 07:34:39.385001: | adding HMAC_SHA2_384_192 to kernel algorithm db Sep 21 07:34:39.385003: | adding HMAC_SHA2_256_128 to kernel algorithm db Sep 21 07:34:39.385004: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Sep 21 07:34:39.385006: | adding AES_XCBC_96 to kernel algorithm db Sep 21 07:34:39.385008: | adding AES_CMAC_96 to kernel algorithm db Sep 21 07:34:39.385009: | adding NONE to kernel algorithm db Sep 21 07:34:39.385027: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Sep 21 07:34:39.385031: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Sep 21 07:34:39.385032: | setup kernel fd callback Sep 21 07:34:39.385034: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x5631c552fc40 Sep 21 07:34:39.385037: | libevent_malloc: new ptr-libevent@0x5631c553bde0 size 128 Sep 21 07:34:39.385039: | libevent_malloc: new ptr-libevent@0x5631c552ef20 size 16 Sep 21 07:34:39.385043: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x5631c552fc00 Sep 21 07:34:39.385044: | libevent_malloc: new ptr-libevent@0x5631c553be70 size 128 Sep 21 07:34:39.385046: | libevent_malloc: new ptr-libevent@0x5631c552ef40 size 16 Sep 21 07:34:39.385180: | global one-shot timer EVENT_CHECK_CRLS initialized Sep 21 07:34:39.385187: selinux support is enabled. Sep 21 07:34:39.385249: systemd watchdog not enabled - not sending watchdog keepalives Sep 21 07:34:39.385370: | unbound context created - setting debug level to 5 Sep 21 07:34:39.385391: | /etc/hosts lookups activated Sep 21 07:34:39.385403: | /etc/resolv.conf usage activated Sep 21 07:34:39.385434: | outgoing-port-avoid set 0-65535 Sep 21 07:34:39.385451: | outgoing-port-permit set 32768-60999 Sep 21 07:34:39.385453: | Loading dnssec root key from:/var/lib/unbound/root.key Sep 21 07:34:39.385455: | No additional dnssec trust anchors defined via dnssec-trusted= option Sep 21 07:34:39.385457: | Setting up events, loop start Sep 21 07:34:39.385459: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x5631c552a1c0 Sep 21 07:34:39.385460: | libevent_malloc: new ptr-libevent@0x5631c55463e0 size 128 Sep 21 07:34:39.385463: | libevent_malloc: new ptr-libevent@0x5631c5546470 size 16 Sep 21 07:34:39.385467: | libevent_realloc: new ptr-libevent@0x5631c54aa5b0 size 256 Sep 21 07:34:39.385469: | libevent_malloc: new ptr-libevent@0x5631c5546490 size 8 Sep 21 07:34:39.385471: | libevent_realloc: new ptr-libevent@0x5631c553b160 size 144 Sep 21 07:34:39.385473: | libevent_malloc: new ptr-libevent@0x5631c55464b0 size 152 Sep 21 07:34:39.385475: | libevent_malloc: new ptr-libevent@0x5631c5546550 size 16 Sep 21 07:34:39.385478: | signal event handler PLUTO_SIGCHLD installed Sep 21 07:34:39.385480: | libevent_malloc: new ptr-libevent@0x5631c5546570 size 8 Sep 21 07:34:39.385481: | libevent_malloc: new ptr-libevent@0x5631c5546590 size 152 Sep 21 07:34:39.385483: | signal event handler PLUTO_SIGTERM installed Sep 21 07:34:39.385485: | libevent_malloc: new ptr-libevent@0x5631c5546630 size 8 Sep 21 07:34:39.385487: | libevent_malloc: new ptr-libevent@0x5631c5546650 size 152 Sep 21 07:34:39.385488: | signal event handler PLUTO_SIGHUP installed Sep 21 07:34:39.385490: | libevent_malloc: new ptr-libevent@0x5631c55466f0 size 8 Sep 21 07:34:39.385492: | libevent_realloc: release ptr-libevent@0x5631c553b160 Sep 21 07:34:39.385493: | libevent_realloc: new ptr-libevent@0x5631c5546710 size 256 Sep 21 07:34:39.385495: | libevent_malloc: new ptr-libevent@0x5631c553b160 size 152 Sep 21 07:34:39.385497: | signal event handler PLUTO_SIGSYS installed Sep 21 07:34:39.385761: | created addconn helper (pid:16737) using fork+execve Sep 21 07:34:39.385770: | forked child 16737 Sep 21 07:34:39.385823: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:34:39.385851: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:34:39.385857: listening for IKE messages Sep 21 07:34:39.385908: | Inspecting interface lo Sep 21 07:34:39.385914: | found lo with address 127.0.0.1 Sep 21 07:34:39.385915: | Inspecting interface eth0 Sep 21 07:34:39.385918: | found eth0 with address 192.0.1.254 Sep 21 07:34:39.385920: | Inspecting interface eth1 Sep 21 07:34:39.385935: | found eth1 with address 192.1.2.45 Sep 21 07:34:39.385987: Kernel supports NIC esp-hw-offload Sep 21 07:34:39.386009: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.45:500 Sep 21 07:34:39.386031: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:34:39.386037: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:34:39.386040: adding interface eth1/eth1 192.1.2.45:4500 Sep 21 07:34:39.386084: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.1.254:500 Sep 21 07:34:39.386130: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:34:39.386132: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:34:39.386135: adding interface eth0/eth0 192.0.1.254:4500 Sep 21 07:34:39.386155: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Sep 21 07:34:39.386198: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:34:39.386201: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:34:39.386203: adding interface lo/lo 127.0.0.1:4500 Sep 21 07:34:39.386275: | no interfaces to sort Sep 21 07:34:39.386279: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:34:39.386284: | add_fd_read_event_handler: new ethX-pe@0x5631c5546a80 Sep 21 07:34:39.386287: | libevent_malloc: new ptr-libevent@0x5631c5546ac0 size 128 Sep 21 07:34:39.386289: | libevent_malloc: new ptr-libevent@0x5631c5546b50 size 16 Sep 21 07:34:39.386294: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:34:39.386296: | add_fd_read_event_handler: new ethX-pe@0x5631c5546b70 Sep 21 07:34:39.386297: | libevent_malloc: new ptr-libevent@0x5631c5546bb0 size 128 Sep 21 07:34:39.386299: | libevent_malloc: new ptr-libevent@0x5631c5546c40 size 16 Sep 21 07:34:39.386303: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:34:39.386304: | add_fd_read_event_handler: new ethX-pe@0x5631c5546c60 Sep 21 07:34:39.386306: | libevent_malloc: new ptr-libevent@0x5631c5546ca0 size 128 Sep 21 07:34:39.386308: | libevent_malloc: new ptr-libevent@0x5631c5546d30 size 16 Sep 21 07:34:39.386311: | setup callback for interface eth0 192.0.1.254:4500 fd 20 Sep 21 07:34:39.386312: | add_fd_read_event_handler: new ethX-pe@0x5631c5546d50 Sep 21 07:34:39.386314: | libevent_malloc: new ptr-libevent@0x5631c5546d90 size 128 Sep 21 07:34:39.386316: | libevent_malloc: new ptr-libevent@0x5631c5546e20 size 16 Sep 21 07:34:39.386319: | setup callback for interface eth0 192.0.1.254:500 fd 19 Sep 21 07:34:39.386334: | add_fd_read_event_handler: new ethX-pe@0x5631c5546e40 Sep 21 07:34:39.386335: | libevent_malloc: new ptr-libevent@0x5631c5546e80 size 128 Sep 21 07:34:39.386337: | libevent_malloc: new ptr-libevent@0x5631c5546f10 size 16 Sep 21 07:34:39.386340: | setup callback for interface eth1 192.1.2.45:4500 fd 18 Sep 21 07:34:39.386341: | add_fd_read_event_handler: new ethX-pe@0x5631c5546f30 Sep 21 07:34:39.386343: | libevent_malloc: new ptr-libevent@0x5631c5546f70 size 128 Sep 21 07:34:39.386345: | libevent_malloc: new ptr-libevent@0x5631c5547000 size 16 Sep 21 07:34:39.386348: | setup callback for interface eth1 192.1.2.45:500 fd 17 Sep 21 07:34:39.386351: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:34:39.386353: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:34:39.386367: loading secrets from "/etc/ipsec.secrets" Sep 21 07:34:39.386378: | id type added to secret(0x5631c553bfc0) PKK_PSK: @west Sep 21 07:34:39.386382: | id type added to secret(0x5631c553bfc0) PKK_PSK: @east Sep 21 07:34:39.386385: | Processing PSK at line 1: passed Sep 21 07:34:39.386387: | certs and keys locked by 'process_secret' Sep 21 07:34:39.386389: | certs and keys unlocked by 'process_secret' Sep 21 07:34:39.386393: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:34:39.386400: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:34:39.386407: | spent 0.59 milliseconds in whack Sep 21 07:34:39.415616: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:34:39.415636: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:34:39.415655: listening for IKE messages Sep 21 07:34:39.415691: | Inspecting interface lo Sep 21 07:34:39.415703: | found lo with address 127.0.0.1 Sep 21 07:34:39.415706: | Inspecting interface eth0 Sep 21 07:34:39.415710: | found eth0 with address 192.0.1.254 Sep 21 07:34:39.415713: | Inspecting interface eth1 Sep 21 07:34:39.415717: | found eth1 with address 192.1.2.45 Sep 21 07:34:39.415778: | no interfaces to sort Sep 21 07:34:39.415793: | libevent_free: release ptr-libevent@0x5631c5546ac0 Sep 21 07:34:39.415798: | free_event_entry: release EVENT_NULL-pe@0x5631c5546a80 Sep 21 07:34:39.415802: | add_fd_read_event_handler: new ethX-pe@0x5631c5546a80 Sep 21 07:34:39.415805: | libevent_malloc: new ptr-libevent@0x5631c5546ac0 size 128 Sep 21 07:34:39.415825: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:34:39.415830: | libevent_free: release ptr-libevent@0x5631c5546bb0 Sep 21 07:34:39.415832: | free_event_entry: release EVENT_NULL-pe@0x5631c5546b70 Sep 21 07:34:39.415835: | add_fd_read_event_handler: new ethX-pe@0x5631c5546b70 Sep 21 07:34:39.415838: | libevent_malloc: new ptr-libevent@0x5631c5546bb0 size 128 Sep 21 07:34:39.415843: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:34:39.415846: | libevent_free: release ptr-libevent@0x5631c5546ca0 Sep 21 07:34:39.415849: | free_event_entry: release EVENT_NULL-pe@0x5631c5546c60 Sep 21 07:34:39.415851: | add_fd_read_event_handler: new ethX-pe@0x5631c5546c60 Sep 21 07:34:39.415854: | libevent_malloc: new ptr-libevent@0x5631c5546ca0 size 128 Sep 21 07:34:39.415858: | setup callback for interface eth0 192.0.1.254:4500 fd 20 Sep 21 07:34:39.415862: | libevent_free: release ptr-libevent@0x5631c5546d90 Sep 21 07:34:39.415864: | free_event_entry: release EVENT_NULL-pe@0x5631c5546d50 Sep 21 07:34:39.415867: | add_fd_read_event_handler: new ethX-pe@0x5631c5546d50 Sep 21 07:34:39.415869: | libevent_malloc: new ptr-libevent@0x5631c5546d90 size 128 Sep 21 07:34:39.415874: | setup callback for interface eth0 192.0.1.254:500 fd 19 Sep 21 07:34:39.415877: | libevent_free: release ptr-libevent@0x5631c5546e80 Sep 21 07:34:39.415880: | free_event_entry: release EVENT_NULL-pe@0x5631c5546e40 Sep 21 07:34:39.415882: | add_fd_read_event_handler: new ethX-pe@0x5631c5546e40 Sep 21 07:34:39.415885: | libevent_malloc: new ptr-libevent@0x5631c5546e80 size 128 Sep 21 07:34:39.415890: | setup callback for interface eth1 192.1.2.45:4500 fd 18 Sep 21 07:34:39.415894: | libevent_free: release ptr-libevent@0x5631c5546f70 Sep 21 07:34:39.415896: | free_event_entry: release EVENT_NULL-pe@0x5631c5546f30 Sep 21 07:34:39.415899: | add_fd_read_event_handler: new ethX-pe@0x5631c5546f30 Sep 21 07:34:39.415901: | libevent_malloc: new ptr-libevent@0x5631c5546f70 size 128 Sep 21 07:34:39.415906: | setup callback for interface eth1 192.1.2.45:500 fd 17 Sep 21 07:34:39.415909: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:34:39.415912: forgetting secrets Sep 21 07:34:39.415919: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:34:39.415932: loading secrets from "/etc/ipsec.secrets" Sep 21 07:34:39.415940: | id type added to secret(0x5631c553bfc0) PKK_PSK: @west Sep 21 07:34:39.415943: | id type added to secret(0x5631c553bfc0) PKK_PSK: @east Sep 21 07:34:39.415947: | Processing PSK at line 1: passed Sep 21 07:34:39.415950: | certs and keys locked by 'process_secret' Sep 21 07:34:39.415952: | certs and keys unlocked by 'process_secret' Sep 21 07:34:39.415957: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:34:39.415965: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:34:39.415973: | spent 0.371 milliseconds in whack Sep 21 07:34:39.416374: | processing signal PLUTO_SIGCHLD Sep 21 07:34:39.416389: | waitpid returned pid 16737 (exited with status 0) Sep 21 07:34:39.416393: | reaped addconn helper child (status 0) Sep 21 07:34:39.416397: | waitpid returned ECHILD (no child processes left) Sep 21 07:34:39.416401: | spent 0.0198 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:34:39.471803: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:34:39.471839: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:34:39.471842: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:34:39.471843: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:34:39.471845: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:34:39.471848: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:34:39.471853: | Added new connection west with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:34:39.471887: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Sep 21 07:34:39.471889: | from whack: got --esp= Sep 21 07:34:39.471911: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Sep 21 07:34:39.471914: | counting wild cards for @west is 0 Sep 21 07:34:39.471916: | counting wild cards for @east is 0 Sep 21 07:34:39.471924: | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@(nil): none Sep 21 07:34:39.471927: | new hp@0x5631c5513470 Sep 21 07:34:39.471930: added connection description "west" Sep 21 07:34:39.471937: | ike_life: 30s; ipsec_life: 28800s; rekey_margin: 5s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:34:39.471944: | 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 Sep 21 07:34:39.471949: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:34:39.471969: | spent 0.173 milliseconds in whack Sep 21 07:34:39.472042: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:34:39.472053: add keyid @west Sep 21 07:34:39.472056: | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 Sep 21 07:34:39.472058: | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e Sep 21 07:34:39.472060: | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 Sep 21 07:34:39.472061: | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 Sep 21 07:34:39.472063: | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 Sep 21 07:34:39.472064: | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c Sep 21 07:34:39.472066: | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a Sep 21 07:34:39.472067: | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 Sep 21 07:34:39.472069: | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 Sep 21 07:34:39.472070: | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a Sep 21 07:34:39.472071: | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 Sep 21 07:34:39.472073: | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc Sep 21 07:34:39.472074: | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e Sep 21 07:34:39.472076: | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 Sep 21 07:34:39.472077: | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d Sep 21 07:34:39.472079: | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f Sep 21 07:34:39.472080: | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 Sep 21 07:34:39.472082: | add pubkey 15 04 37 f9 Sep 21 07:34:39.472116: | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 Sep 21 07:34:39.472118: | computed rsa CKAID 7f 0f 03 50 Sep 21 07:34:39.472122: | keyid: *AQOm9dY/4 Sep 21 07:34:39.472123: | n a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 8b 49 Sep 21 07:34:39.472125: | n 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e b3 96 Sep 21 07:34:39.472129: | n 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 09 f0 Sep 21 07:34:39.472131: | n c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 8f 95 Sep 21 07:34:39.472132: | n 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 f5 99 Sep 21 07:34:39.472134: | n f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c ac 34 Sep 21 07:34:39.472135: | n ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a 94 d3 Sep 21 07:34:39.472137: | n d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 b2 2b Sep 21 07:34:39.472138: | n 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 7d 7a Sep 21 07:34:39.472140: | n 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a 8f 52 Sep 21 07:34:39.472141: | n a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 ca 80 Sep 21 07:34:39.472143: | n db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc 2a b3 Sep 21 07:34:39.472144: | n 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e d3 3a Sep 21 07:34:39.472146: | n 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 87 33 Sep 21 07:34:39.472147: | n 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d 6e e8 Sep 21 07:34:39.472149: | n 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f c9 20 Sep 21 07:34:39.472150: | n 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 15 04 Sep 21 07:34:39.472151: | n 37 f9 Sep 21 07:34:39.472153: | e 03 Sep 21 07:34:39.472154: | CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 Sep 21 07:34:39.472156: | CKAID 7f 0f 03 50 Sep 21 07:34:39.472162: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:34:39.472166: | spent 0.13 milliseconds in whack Sep 21 07:34:39.472237: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:34:39.472249: add keyid @east Sep 21 07:34:39.472252: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Sep 21 07:34:39.472254: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Sep 21 07:34:39.472256: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Sep 21 07:34:39.472257: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Sep 21 07:34:39.472259: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Sep 21 07:34:39.472260: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Sep 21 07:34:39.472262: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Sep 21 07:34:39.472263: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Sep 21 07:34:39.472264: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Sep 21 07:34:39.472266: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Sep 21 07:34:39.472267: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Sep 21 07:34:39.472269: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Sep 21 07:34:39.472270: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Sep 21 07:34:39.472272: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Sep 21 07:34:39.472273: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Sep 21 07:34:39.472275: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Sep 21 07:34:39.472276: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Sep 21 07:34:39.472278: | add pubkey 51 51 48 ef Sep 21 07:34:39.472288: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:34:39.472290: | computed rsa CKAID 8a 82 25 f1 Sep 21 07:34:39.472294: | keyid: *AQO9bJbr3 Sep 21 07:34:39.472295: | n bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b e5 16 Sep 21 07:34:39.472297: | n c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 85 7a Sep 21 07:34:39.472298: | n e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c 78 ca Sep 21 07:34:39.472300: | n 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 21 c9 Sep 21 07:34:39.472301: | n f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d d2 67 Sep 21 07:34:39.472303: | n 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 62 cd Sep 21 07:34:39.472304: | n 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce 62 b5 Sep 21 07:34:39.472306: | n af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e bb 23 Sep 21 07:34:39.472311: | n 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d ac 47 Sep 21 07:34:39.472313: | n f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce e0 98 Sep 21 07:34:39.472314: | n 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a 92 b8 Sep 21 07:34:39.472316: | n 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 4d 58 Sep 21 07:34:39.472317: | n 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 5f 56 Sep 21 07:34:39.472319: | n 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 d5 f1 Sep 21 07:34:39.472320: | n 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c 47 cc Sep 21 07:34:39.472321: | n 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 07 8f Sep 21 07:34:39.472323: | n 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 51 51 Sep 21 07:34:39.472324: | n 48 ef Sep 21 07:34:39.472326: | e 03 Sep 21 07:34:39.472327: | CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:34:39.472329: | CKAID 8a 82 25 f1 Sep 21 07:34:39.472335: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:34:39.472339: | spent 0.107 milliseconds in whack Sep 21 07:34:39.584354: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:34:39.584389: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) Sep 21 07:34:39.584393: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:34:39.584396: | start processing: connection "west" (in initiate_a_connection() at initiate.c:186) Sep 21 07:34:39.584399: | connection 'west' +POLICY_UP Sep 21 07:34:39.584401: | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342) Sep 21 07:34:39.584403: | FOR_EACH_STATE_... in find_phase1_state Sep 21 07:34:39.584435: | creating state object #1 at 0x5631c5548ab0 Sep 21 07:34:39.584438: | State DB: adding IKEv2 state #1 in UNDEFINED Sep 21 07:34:39.584445: | pstats #1 ikev2.ike started Sep 21 07:34:39.584447: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Sep 21 07:34:39.584450: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) Sep 21 07:34:39.584453: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:34:39.584459: | suspend processing: connection "west" (in ikev2_parent_outI1() at ikev2_parent.c:535) Sep 21 07:34:39.584463: | start processing: state #1 connection "west" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) Sep 21 07:34:39.584465: | dup_any(fd@24) -> fd@25 (in ikev2_parent_outI1() at ikev2_parent.c:551) Sep 21 07:34:39.584468: | Queuing pending IPsec SA negotiating with 192.1.2.23 "west" IKE SA #1 "west" Sep 21 07:34:39.584471: "west" #1: initiating v2 parent SA Sep 21 07:34:39.584479: | constructing local IKE proposals for west (IKE SA initiator selecting KE) Sep 21 07:34:39.584499: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:34:39.584505: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.584509: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:34:39.584514: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.584517: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:34:39.584521: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.584523: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:34:39.584543: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.584550: "west": constructed local IKE proposals for west (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.584557: | adding ikev2_outI1 KE work-order 1 for state #1 Sep 21 07:34:39.584573: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5631c554b160 Sep 21 07:34:39.584576: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Sep 21 07:34:39.584579: | libevent_malloc: new ptr-libevent@0x5631c554b1a0 size 128 Sep 21 07:34:39.584590: | #1 spent 0.192 milliseconds in ikev2_parent_outI1() Sep 21 07:34:39.584593: | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) Sep 21 07:34:39.584596: | RESET processing: state #1 connection "west" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) Sep 21 07:34:39.584596: | crypto helper 1 resuming Sep 21 07:34:39.584606: | crypto helper 1 starting work-order 1 for state #1 Sep 21 07:34:39.584610: | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 1 Sep 21 07:34:39.584598: | RESET processing: connection "west" (in ikev2_parent_outI1() at ikev2_parent.c:610) Sep 21 07:34:39.584662: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) Sep 21 07:34:39.584665: | close_any(fd@23) (in initiate_connection() at initiate.c:372) Sep 21 07:34:39.584667: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:34:39.584670: | spent 0.334 milliseconds in whack Sep 21 07:34:39.585259: | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.00065 seconds Sep 21 07:34:39.585269: | (#1) spent 0.634 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) Sep 21 07:34:39.585271: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Sep 21 07:34:39.585273: | scheduling resume sending helper answer for #1 Sep 21 07:34:39.585275: | libevent_malloc: new ptr-libevent@0x7f6b9c006900 size 128 Sep 21 07:34:39.585281: | crypto helper 1 waiting (nothing to do) Sep 21 07:34:39.585310: | processing resume sending helper answer for #1 Sep 21 07:34:39.585318: | start processing: state #1 connection "west" from 192.1.2.23:500 (in resume_handler() at server.c:797) Sep 21 07:34:39.585322: | crypto helper 1 replies to request ID 1 Sep 21 07:34:39.585336: | calling continuation function 0x5631c4157630 Sep 21 07:34:39.585338: | ikev2_parent_outI1_continue for #1 Sep 21 07:34:39.585363: | **emit ISAKMP Message: Sep 21 07:34:39.585365: | initiator cookie: Sep 21 07:34:39.585366: | ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.585368: | responder cookie: Sep 21 07:34:39.585369: | 00 00 00 00 00 00 00 00 Sep 21 07:34:39.585371: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:39.585373: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:39.585375: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Sep 21 07:34:39.585377: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:34:39.585379: | Message ID: 0 (0x0) Sep 21 07:34:39.585380: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:39.585391: | using existing local IKE proposals for connection west (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.585396: | Emitting ikev2_proposals ... Sep 21 07:34:39.585398: | ***emit IKEv2 Security Association Payload: Sep 21 07:34:39.585400: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.585402: | flags: none (0x0) Sep 21 07:34:39.585404: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:34:39.585406: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.585408: | discarding INTEG=NONE Sep 21 07:34:39.585409: | ****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.585411: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.585413: | prop #: 1 (0x1) Sep 21 07:34:39.585414: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:34:39.585416: | spi size: 0 (0x0) Sep 21 07:34:39.585417: | # transforms: 11 (0xb) Sep 21 07:34:39.585419: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.585421: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585422: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585424: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.585426: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:34:39.585427: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585429: | ******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.585431: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.585433: | length/value: 256 (0x100) Sep 21 07:34:39.585434: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.585436: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585438: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585439: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585441: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:34:39.585443: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585444: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585446: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585447: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585449: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585450: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585452: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:34:39.585454: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585455: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585457: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585458: | discarding INTEG=NONE Sep 21 07:34:39.585460: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585463: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585464: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585466: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.585468: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585469: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585471: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585472: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585474: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585475: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585477: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:34:39.585478: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585480: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585482: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585483: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585485: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585486: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585488: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:34:39.585489: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585491: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585493: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585494: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585496: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585497: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585498: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:34:39.585500: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585502: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585503: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585505: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585506: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585508: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585509: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:34:39.585511: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585513: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585514: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585516: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585517: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585519: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585520: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:34:39.585522: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585524: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585527: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585528: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585529: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585531: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585532: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:34:39.585534: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585536: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585537: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585539: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585540: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.585542: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585543: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:34:39.585545: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585547: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585548: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585550: | emitting length of IKEv2 Proposal Substructure Payload: 100 Sep 21 07:34:39.585552: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.585553: | discarding INTEG=NONE Sep 21 07:34:39.585555: | ****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.585556: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.585558: | prop #: 2 (0x2) Sep 21 07:34:39.585559: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:34:39.585561: | spi size: 0 (0x0) Sep 21 07:34:39.585562: | # transforms: 11 (0xb) Sep 21 07:34:39.585564: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.585566: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.585567: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585569: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585570: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.585572: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:34:39.585573: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585575: | ******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.585576: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.585578: | length/value: 128 (0x80) Sep 21 07:34:39.585580: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.585581: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585583: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585584: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585586: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:34:39.585587: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585589: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585591: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585592: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585593: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585595: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585599: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:34:39.585601: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585602: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585604: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585605: | discarding INTEG=NONE Sep 21 07:34:39.585607: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585608: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585610: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585611: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.585613: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585615: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585616: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585618: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585619: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585621: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585622: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:34:39.585624: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585625: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585627: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585628: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585630: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585631: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585633: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:34:39.585635: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585636: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585638: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585639: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585641: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585642: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585644: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:34:39.585646: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585647: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585649: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585650: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585652: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585653: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585655: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:34:39.585656: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585658: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585660: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585662: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585663: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585665: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585666: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:34:39.585668: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585670: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585671: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585673: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585674: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585676: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585677: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:34:39.585679: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585681: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585682: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585684: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585685: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.585687: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585688: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:34:39.585690: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585692: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585693: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585695: | emitting length of IKEv2 Proposal Substructure Payload: 100 Sep 21 07:34:39.585696: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.585698: | ****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.585699: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.585701: | prop #: 3 (0x3) Sep 21 07:34:39.585702: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:34:39.585704: | spi size: 0 (0x0) Sep 21 07:34:39.585705: | # transforms: 13 (0xd) Sep 21 07:34:39.585707: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.585709: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.585710: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585712: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585713: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.585715: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:34:39.585716: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585718: | ******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.585719: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.585721: | length/value: 256 (0x100) Sep 21 07:34:39.585722: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.585724: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585725: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585727: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585728: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:34:39.585731: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585733: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585734: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585736: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585737: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585739: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585740: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:34:39.585742: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585744: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585745: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585747: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585748: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585750: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.585751: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:34:39.585753: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585755: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585756: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585758: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585759: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585761: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.585762: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:34:39.585764: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585766: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585767: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585769: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585770: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585771: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585773: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.585775: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585776: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585778: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585779: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585781: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585803: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585805: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:34:39.585807: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585811: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585813: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585814: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585817: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585818: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585820: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:34:39.585822: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585824: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585825: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585827: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585828: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585830: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585831: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:34:39.585833: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585835: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585836: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585838: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585839: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585841: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585842: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:34:39.585844: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585846: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585847: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585849: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585863: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585865: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585866: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:34:39.585868: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585870: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585871: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585873: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585874: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585876: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585877: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:34:39.585879: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585881: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585882: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585884: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585885: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.585887: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585888: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:34:39.585890: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585892: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585894: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585896: | emitting length of IKEv2 Proposal Substructure Payload: 116 Sep 21 07:34:39.585898: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.585899: | ****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.585901: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:34:39.585902: | prop #: 4 (0x4) Sep 21 07:34:39.585904: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:34:39.585905: | spi size: 0 (0x0) Sep 21 07:34:39.585907: | # transforms: 13 (0xd) Sep 21 07:34:39.585909: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.585910: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.585912: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585913: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585915: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.585916: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:34:39.585918: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585919: | ******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.585921: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.585922: | length/value: 128 (0x80) Sep 21 07:34:39.585924: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.585925: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585927: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585928: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585930: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:34:39.585932: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585933: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585935: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585936: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585938: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585939: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.585941: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:34:39.585942: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585944: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585946: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585947: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585949: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585950: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.585952: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:34:39.585953: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585955: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585957: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585958: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585960: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585961: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.585963: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:34:39.585965: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585967: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585968: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585970: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585971: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585973: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585974: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.585976: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585978: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585979: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585981: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585982: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585984: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585985: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:34:39.585987: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585989: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.585990: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.585992: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.585993: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.585995: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.585996: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:34:39.585998: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586000: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.586001: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.586003: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.586004: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586005: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.586007: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:34:39.586009: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586010: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.586012: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.586013: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.586015: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586016: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.586018: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:34:39.586020: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586021: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.586023: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.586025: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.586026: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586028: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.586029: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:34:39.586031: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586033: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.586035: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.586036: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.586037: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586039: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.586040: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:34:39.586042: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586044: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.586045: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.586047: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.586048: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.586050: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.586051: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:34:39.586053: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.586055: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.586056: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.586058: | emitting length of IKEv2 Proposal Substructure Payload: 116 Sep 21 07:34:39.586059: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.586061: | emitting length of IKEv2 Security Association Payload: 436 Sep 21 07:34:39.586063: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:34:39.586064: | ***emit IKEv2 Key Exchange Payload: Sep 21 07:34:39.586066: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.586067: | flags: none (0x0) Sep 21 07:34:39.586069: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.586071: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Sep 21 07:34:39.586073: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.586075: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Sep 21 07:34:39.586077: | ikev2 g^x c5 0d 51 34 81 57 57 74 82 92 8e 21 85 b5 a2 00 Sep 21 07:34:39.586078: | ikev2 g^x 5a 8b 99 3c e0 1b ad a9 9b 1a 93 c2 6d 9b 25 05 Sep 21 07:34:39.586079: | ikev2 g^x ad 64 7e 89 63 ff 96 d3 25 44 14 a3 f8 7c f3 5b Sep 21 07:34:39.586081: | ikev2 g^x 89 33 d6 87 0f cc e8 f4 27 20 73 ef 00 5f 21 38 Sep 21 07:34:39.586082: | ikev2 g^x c4 30 03 68 6c ce 74 71 59 12 d3 df 93 51 6f 8e Sep 21 07:34:39.586084: | ikev2 g^x 58 57 aa 88 39 e8 26 ce ab 92 e3 08 e5 f0 f0 3e Sep 21 07:34:39.586085: | ikev2 g^x 98 4c 9d a1 46 a9 fc 7c 9e 5c 5e 70 a3 0e aa a2 Sep 21 07:34:39.586087: | ikev2 g^x f5 30 ad e1 6c bd 41 c1 e5 64 12 49 ec 71 5a d2 Sep 21 07:34:39.586088: | ikev2 g^x 9e 52 68 75 47 aa 88 30 02 a1 db d7 95 f1 41 73 Sep 21 07:34:39.586089: | ikev2 g^x 78 fe b7 97 1f 64 9e af 41 99 0a e4 39 dc 26 85 Sep 21 07:34:39.586092: | ikev2 g^x b2 c1 93 74 24 4c e5 c3 09 11 2a 4f 60 0f cd 0c Sep 21 07:34:39.586093: | ikev2 g^x 25 af b8 cb 14 17 85 c9 b0 1c 8b 72 34 c5 9b b1 Sep 21 07:34:39.586095: | ikev2 g^x e4 b5 2f d6 5f 8f 0d 07 dc 4e d2 00 1b 51 4c 87 Sep 21 07:34:39.586096: | ikev2 g^x ea e6 b9 51 6f e4 ae 12 9e f0 49 18 2f c8 a1 0f Sep 21 07:34:39.586097: | ikev2 g^x 55 82 f7 93 e5 85 ac 98 66 fc 08 5a 83 1f 16 4a Sep 21 07:34:39.586099: | ikev2 g^x 91 02 ab 8d 15 f2 29 75 25 ea 03 75 1c c4 3d d7 Sep 21 07:34:39.586100: | emitting length of IKEv2 Key Exchange Payload: 264 Sep 21 07:34:39.586102: | ***emit IKEv2 Nonce Payload: Sep 21 07:34:39.586103: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:34:39.586105: | flags: none (0x0) Sep 21 07:34:39.586107: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Sep 21 07:34:39.586109: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Sep 21 07:34:39.586110: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.586112: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Sep 21 07:34:39.586113: | IKEv2 nonce 35 70 4f db f1 1f cf d9 94 8a f1 53 70 1b 57 0a Sep 21 07:34:39.586115: | IKEv2 nonce 2b 2e 3b 1b 26 43 2f e8 0d c9 53 08 20 e1 05 3f Sep 21 07:34:39.586116: | emitting length of IKEv2 Nonce Payload: 36 Sep 21 07:34:39.586118: | Adding a v2N Payload Sep 21 07:34:39.586120: | ***emit IKEv2 Notify Payload: Sep 21 07:34:39.586121: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.586123: | flags: none (0x0) Sep 21 07:34:39.586124: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:34:39.586126: | SPI size: 0 (0x0) Sep 21 07:34:39.586127: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Sep 21 07:34:39.586129: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:34:39.586131: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.586133: | emitting length of IKEv2 Notify Payload: 8 Sep 21 07:34:39.586135: | NAT-Traversal support [enabled] add v2N payloads. Sep 21 07:34:39.586136: | natd_hash: rcookie is zero Sep 21 07:34:39.586146: | natd_hash: hasher=0x5631c422d7a0(20) Sep 21 07:34:39.586148: | natd_hash: icookie= ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.586150: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Sep 21 07:34:39.586151: | natd_hash: ip= c0 01 02 2d Sep 21 07:34:39.586152: | natd_hash: port= 01 f4 Sep 21 07:34:39.586154: | natd_hash: hash= 82 e2 17 b3 2e c5 29 2f 4a c5 37 a3 b0 6e bb 58 Sep 21 07:34:39.586155: | natd_hash: hash= e8 0e 2f 0f Sep 21 07:34:39.586157: | Adding a v2N Payload Sep 21 07:34:39.586158: | ***emit IKEv2 Notify Payload: Sep 21 07:34:39.586160: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.586161: | flags: none (0x0) Sep 21 07:34:39.586163: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:34:39.586164: | SPI size: 0 (0x0) Sep 21 07:34:39.586166: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Sep 21 07:34:39.586168: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:34:39.586169: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.586171: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Sep 21 07:34:39.586173: | Notify data 82 e2 17 b3 2e c5 29 2f 4a c5 37 a3 b0 6e bb 58 Sep 21 07:34:39.586174: | Notify data e8 0e 2f 0f Sep 21 07:34:39.586176: | emitting length of IKEv2 Notify Payload: 28 Sep 21 07:34:39.586177: | natd_hash: rcookie is zero Sep 21 07:34:39.586181: | natd_hash: hasher=0x5631c422d7a0(20) Sep 21 07:34:39.586182: | natd_hash: icookie= ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.586185: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Sep 21 07:34:39.586186: | natd_hash: ip= c0 01 02 17 Sep 21 07:34:39.586188: | natd_hash: port= 01 f4 Sep 21 07:34:39.586189: | natd_hash: hash= 61 73 53 9e 07 96 cd c7 19 9f 20 d2 68 91 8d 44 Sep 21 07:34:39.586191: | natd_hash: hash= 94 d5 35 ff Sep 21 07:34:39.586192: | Adding a v2N Payload Sep 21 07:34:39.586193: | ***emit IKEv2 Notify Payload: Sep 21 07:34:39.586195: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.586196: | flags: none (0x0) Sep 21 07:34:39.586198: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:34:39.586199: | SPI size: 0 (0x0) Sep 21 07:34:39.586201: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Sep 21 07:34:39.586203: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:34:39.586204: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.586206: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Sep 21 07:34:39.586207: | Notify data 61 73 53 9e 07 96 cd c7 19 9f 20 d2 68 91 8d 44 Sep 21 07:34:39.586209: | Notify data 94 d5 35 ff Sep 21 07:34:39.586210: | emitting length of IKEv2 Notify Payload: 28 Sep 21 07:34:39.586212: | emitting length of ISAKMP Message: 828 Sep 21 07:34:39.586216: | stop processing: state #1 connection "west" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) Sep 21 07:34:39.586222: | start processing: state #1 connection "west" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:34:39.586225: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK Sep 21 07:34:39.586227: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 Sep 21 07:34:39.586229: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) Sep 21 07:34:39.586231: | Message ID: updating counters for #1 to 4294967295 after switching state Sep 21 07:34:39.586233: | Message ID: IKE #1 skipping update_recv as MD is fake Sep 21 07:34:39.586236: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 Sep 21 07:34:39.586238: "west" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Sep 21 07:34:39.586246: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.2.45:500) Sep 21 07:34:39.586268: | sending 828 bytes for STATE_PARENT_I0 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) Sep 21 07:34:39.586270: | ee ed 5a 05 21 55 05 c7 00 00 00 00 00 00 00 00 Sep 21 07:34:39.586271: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Sep 21 07:34:39.586273: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Sep 21 07:34:39.586275: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Sep 21 07:34:39.586277: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Sep 21 07:34:39.586280: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Sep 21 07:34:39.586282: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Sep 21 07:34:39.586284: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Sep 21 07:34:39.586285: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Sep 21 07:34:39.586287: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Sep 21 07:34:39.586288: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Sep 21 07:34:39.586289: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Sep 21 07:34:39.586291: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Sep 21 07:34:39.586292: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Sep 21 07:34:39.586294: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Sep 21 07:34:39.586295: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Sep 21 07:34:39.586297: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Sep 21 07:34:39.586311: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Sep 21 07:34:39.586315: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Sep 21 07:34:39.586316: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Sep 21 07:34:39.586317: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Sep 21 07:34:39.586319: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Sep 21 07:34:39.586320: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Sep 21 07:34:39.586322: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Sep 21 07:34:39.586323: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Sep 21 07:34:39.586324: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Sep 21 07:34:39.586326: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Sep 21 07:34:39.586327: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Sep 21 07:34:39.586329: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Sep 21 07:34:39.586330: | 28 00 01 08 00 0e 00 00 c5 0d 51 34 81 57 57 74 Sep 21 07:34:39.586331: | 82 92 8e 21 85 b5 a2 00 5a 8b 99 3c e0 1b ad a9 Sep 21 07:34:39.586333: | 9b 1a 93 c2 6d 9b 25 05 ad 64 7e 89 63 ff 96 d3 Sep 21 07:34:39.586334: | 25 44 14 a3 f8 7c f3 5b 89 33 d6 87 0f cc e8 f4 Sep 21 07:34:39.586336: | 27 20 73 ef 00 5f 21 38 c4 30 03 68 6c ce 74 71 Sep 21 07:34:39.586337: | 59 12 d3 df 93 51 6f 8e 58 57 aa 88 39 e8 26 ce Sep 21 07:34:39.586338: | ab 92 e3 08 e5 f0 f0 3e 98 4c 9d a1 46 a9 fc 7c Sep 21 07:34:39.586340: | 9e 5c 5e 70 a3 0e aa a2 f5 30 ad e1 6c bd 41 c1 Sep 21 07:34:39.586341: | e5 64 12 49 ec 71 5a d2 9e 52 68 75 47 aa 88 30 Sep 21 07:34:39.586342: | 02 a1 db d7 95 f1 41 73 78 fe b7 97 1f 64 9e af Sep 21 07:34:39.586344: | 41 99 0a e4 39 dc 26 85 b2 c1 93 74 24 4c e5 c3 Sep 21 07:34:39.586345: | 09 11 2a 4f 60 0f cd 0c 25 af b8 cb 14 17 85 c9 Sep 21 07:34:39.586347: | b0 1c 8b 72 34 c5 9b b1 e4 b5 2f d6 5f 8f 0d 07 Sep 21 07:34:39.586348: | dc 4e d2 00 1b 51 4c 87 ea e6 b9 51 6f e4 ae 12 Sep 21 07:34:39.586349: | 9e f0 49 18 2f c8 a1 0f 55 82 f7 93 e5 85 ac 98 Sep 21 07:34:39.586351: | 66 fc 08 5a 83 1f 16 4a 91 02 ab 8d 15 f2 29 75 Sep 21 07:34:39.586352: | 25 ea 03 75 1c c4 3d d7 29 00 00 24 35 70 4f db Sep 21 07:34:39.586354: | f1 1f cf d9 94 8a f1 53 70 1b 57 0a 2b 2e 3b 1b Sep 21 07:34:39.586355: | 26 43 2f e8 0d c9 53 08 20 e1 05 3f 29 00 00 08 Sep 21 07:34:39.586356: | 00 00 40 2e 29 00 00 1c 00 00 40 04 82 e2 17 b3 Sep 21 07:34:39.586358: | 2e c5 29 2f 4a c5 37 a3 b0 6e bb 58 e8 0e 2f 0f Sep 21 07:34:39.586359: | 00 00 00 1c 00 00 40 05 61 73 53 9e 07 96 cd c7 Sep 21 07:34:39.586360: | 19 9f 20 d2 68 91 8d 44 94 d5 35 ff Sep 21 07:34:39.586419: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:34:39.586438: | libevent_free: release ptr-libevent@0x5631c554b1a0 Sep 21 07:34:39.586440: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5631c554b160 Sep 21 07:34:39.586442: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=15000ms Sep 21 07:34:39.586445: | event_schedule: new EVENT_RETRANSMIT-pe@0x5631c554b160 Sep 21 07:34:39.586447: | inserting event EVENT_RETRANSMIT, timeout in 15 seconds for #1 Sep 21 07:34:39.586449: | libevent_malloc: new ptr-libevent@0x5631c554b1a0 size 128 Sep 21 07:34:39.586452: | #1 STATE_PARENT_I1: retransmits: first event in 15 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49925.954709 Sep 21 07:34:39.586455: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD Sep 21 07:34:39.586459: | #1 spent 1.09 milliseconds in resume sending helper answer Sep 21 07:34:39.586462: | stop processing: state #1 connection "west" from 192.1.2.23:500 (in resume_handler() at server.c:833) Sep 21 07:34:39.586464: | libevent_free: release ptr-libevent@0x7f6b9c006900 Sep 21 07:34:39.588497: | spent 0.00202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:34:39.588514: | *received 432 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) Sep 21 07:34:39.588517: | ee ed 5a 05 21 55 05 c7 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.588520: | 21 20 22 20 00 00 00 00 00 00 01 b0 22 00 00 28 Sep 21 07:34:39.588522: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Sep 21 07:34:39.588523: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Sep 21 07:34:39.588524: | 04 00 00 0e 28 00 01 08 00 0e 00 00 a3 0c 97 6a Sep 21 07:34:39.588526: | be 08 e9 41 83 e3 d2 09 24 bc fd b9 83 06 e9 d6 Sep 21 07:34:39.588527: | 28 51 1f 19 7d 4d 0b 45 c8 f5 6a ed 0b e8 67 db Sep 21 07:34:39.588528: | 1c cb cd cb 46 88 08 73 5e e0 49 0b 93 50 14 58 Sep 21 07:34:39.588530: | b6 88 4d dd 23 f9 95 4a 1d 4e f7 b0 3c 85 a9 96 Sep 21 07:34:39.588531: | 0a 88 1a db c2 ed 8d 52 4a f7 4a 8a a6 7f e4 ea Sep 21 07:34:39.588533: | c3 27 96 60 9f d0 6b f0 b6 e6 62 99 9d da d7 f9 Sep 21 07:34:39.588534: | f6 5a 3d 28 50 bf d1 41 cc f6 f0 a0 18 48 e9 1f Sep 21 07:34:39.588535: | fb a6 89 b1 11 72 15 6b 06 82 7e 5f 69 07 9d 64 Sep 21 07:34:39.588537: | 98 38 69 60 c4 11 06 f5 01 5d 6e f7 cd 21 1a f2 Sep 21 07:34:39.588538: | 31 31 ba ea f0 fc e9 a6 72 46 f7 79 13 33 fb 93 Sep 21 07:34:39.588540: | 73 ae 02 b3 52 c6 03 4e c8 c9 42 17 17 18 77 74 Sep 21 07:34:39.588541: | fb 78 95 7b ac 16 e9 3d 0f c7 c7 8a 92 66 d9 df Sep 21 07:34:39.588542: | 75 3d 98 26 96 e2 42 d9 1a 0b 44 53 6f 87 18 9c Sep 21 07:34:39.588544: | 72 28 67 87 99 4c 11 95 f4 25 7f 2f 2b 99 e3 25 Sep 21 07:34:39.588545: | 8b ae ea f6 f2 3e 7f 65 44 66 6a 30 01 10 44 68 Sep 21 07:34:39.588547: | 13 1a 50 01 6c 45 4b f9 ea b7 37 39 29 00 00 24 Sep 21 07:34:39.588548: | 24 84 01 d5 d1 bd 8c f5 39 c0 ac 41 6c b0 05 20 Sep 21 07:34:39.588549: | d4 6c c7 26 95 2a d9 f2 b5 fb 63 31 7b 7a 00 46 Sep 21 07:34:39.588551: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Sep 21 07:34:39.588552: | 99 f9 35 a1 17 5b d6 04 90 fd 81 a5 92 1d 8d d1 Sep 21 07:34:39.588553: | e5 62 50 48 00 00 00 1c 00 00 40 05 78 1f d8 cd Sep 21 07:34:39.588555: | 2d 8b 7d 0f d3 5f 2e 39 95 77 f7 5f fe 2e 63 a0 Sep 21 07:34:39.588558: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:34:39.588560: | **parse ISAKMP Message: Sep 21 07:34:39.588562: | initiator cookie: Sep 21 07:34:39.588563: | ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.588565: | responder cookie: Sep 21 07:34:39.588566: | 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.588568: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:34:39.588569: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:39.588571: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Sep 21 07:34:39.588573: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:34:39.588574: | Message ID: 0 (0x0) Sep 21 07:34:39.588576: | length: 432 (0x1b0) Sep 21 07:34:39.588577: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Sep 21 07:34:39.588579: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response Sep 21 07:34:39.588582: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) Sep 21 07:34:39.588585: | start processing: state #1 connection "west" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:34:39.588588: | [RE]START processing: state #1 connection "west" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:34:39.588590: | #1 is idle Sep 21 07:34:39.588591: | #1 idle Sep 21 07:34:39.588593: | unpacking clear payload Sep 21 07:34:39.588595: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:34:39.588596: | ***parse IKEv2 Security Association Payload: Sep 21 07:34:39.588598: | next payload type: ISAKMP_NEXT_v2KE (0x22) Sep 21 07:34:39.588600: | flags: none (0x0) Sep 21 07:34:39.588601: | length: 40 (0x28) Sep 21 07:34:39.588603: | processing payload: ISAKMP_NEXT_v2SA (len=36) Sep 21 07:34:39.588604: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Sep 21 07:34:39.588606: | ***parse IKEv2 Key Exchange Payload: Sep 21 07:34:39.588607: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Sep 21 07:34:39.588610: | flags: none (0x0) Sep 21 07:34:39.588611: | length: 264 (0x108) Sep 21 07:34:39.588613: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.588615: | processing payload: ISAKMP_NEXT_v2KE (len=256) Sep 21 07:34:39.588616: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Sep 21 07:34:39.588618: | ***parse IKEv2 Nonce Payload: Sep 21 07:34:39.588619: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:34:39.588621: | flags: none (0x0) Sep 21 07:34:39.588622: | length: 36 (0x24) Sep 21 07:34:39.588623: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Sep 21 07:34:39.588625: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:34:39.588627: | ***parse IKEv2 Notify Payload: Sep 21 07:34:39.588628: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:34:39.588630: | flags: none (0x0) Sep 21 07:34:39.588631: | length: 8 (0x8) Sep 21 07:34:39.588633: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:34:39.588634: | SPI size: 0 (0x0) Sep 21 07:34:39.588636: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Sep 21 07:34:39.588637: | processing payload: ISAKMP_NEXT_v2N (len=0) Sep 21 07:34:39.588639: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:34:39.588640: | ***parse IKEv2 Notify Payload: Sep 21 07:34:39.588642: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:34:39.588643: | flags: none (0x0) Sep 21 07:34:39.588645: | length: 28 (0x1c) Sep 21 07:34:39.588646: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:34:39.588648: | SPI size: 0 (0x0) Sep 21 07:34:39.588649: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Sep 21 07:34:39.588651: | processing payload: ISAKMP_NEXT_v2N (len=20) Sep 21 07:34:39.588652: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:34:39.588654: | ***parse IKEv2 Notify Payload: Sep 21 07:34:39.588655: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.588656: | flags: none (0x0) Sep 21 07:34:39.588658: | length: 28 (0x1c) Sep 21 07:34:39.588659: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:34:39.588661: | SPI size: 0 (0x0) Sep 21 07:34:39.588662: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Sep 21 07:34:39.588664: | processing payload: ISAKMP_NEXT_v2N (len=20) Sep 21 07:34:39.588666: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] Sep 21 07:34:39.588669: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Sep 21 07:34:39.588671: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Sep 21 07:34:39.588673: | Now let's proceed with state specific processing Sep 21 07:34:39.588674: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Sep 21 07:34:39.588677: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Sep 21 07:34:39.588687: | using existing local IKE proposals for connection west (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:34:39.588690: | Comparing remote proposals against IKE initiator (accepting) 4 local proposals Sep 21 07:34:39.588692: | local proposal 1 type ENCR has 1 transforms Sep 21 07:34:39.588693: | local proposal 1 type PRF has 2 transforms Sep 21 07:34:39.588695: | local proposal 1 type INTEG has 1 transforms Sep 21 07:34:39.588696: | local proposal 1 type DH has 8 transforms Sep 21 07:34:39.588698: | local proposal 1 type ESN has 0 transforms Sep 21 07:34:39.588701: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Sep 21 07:34:39.588703: | local proposal 2 type ENCR has 1 transforms Sep 21 07:34:39.588704: | local proposal 2 type PRF has 2 transforms Sep 21 07:34:39.588706: | local proposal 2 type INTEG has 1 transforms Sep 21 07:34:39.588707: | local proposal 2 type DH has 8 transforms Sep 21 07:34:39.588709: | local proposal 2 type ESN has 0 transforms Sep 21 07:34:39.588711: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Sep 21 07:34:39.588712: | local proposal 3 type ENCR has 1 transforms Sep 21 07:34:39.588714: | local proposal 3 type PRF has 2 transforms Sep 21 07:34:39.588715: | local proposal 3 type INTEG has 2 transforms Sep 21 07:34:39.588717: | local proposal 3 type DH has 8 transforms Sep 21 07:34:39.588718: | local proposal 3 type ESN has 0 transforms Sep 21 07:34:39.588720: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Sep 21 07:34:39.588721: | local proposal 4 type ENCR has 1 transforms Sep 21 07:34:39.588723: | local proposal 4 type PRF has 2 transforms Sep 21 07:34:39.588724: | local proposal 4 type INTEG has 2 transforms Sep 21 07:34:39.588726: | local proposal 4 type DH has 8 transforms Sep 21 07:34:39.588727: | local proposal 4 type ESN has 0 transforms Sep 21 07:34:39.588729: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Sep 21 07:34:39.588731: | ****parse IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.588733: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:34:39.588734: | length: 36 (0x24) Sep 21 07:34:39.588736: | prop #: 1 (0x1) Sep 21 07:34:39.588737: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:34:39.588739: | spi size: 0 (0x0) Sep 21 07:34:39.588740: | # transforms: 3 (0x3) Sep 21 07:34:39.588742: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals Sep 21 07:34:39.588744: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:34:39.588746: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.588747: | length: 12 (0xc) Sep 21 07:34:39.588749: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.588750: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:34:39.588752: | ******parse IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.588754: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.588755: | length/value: 256 (0x100) Sep 21 07:34:39.588758: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:34:39.588759: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:34:39.588761: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.588762: | length: 8 (0x8) Sep 21 07:34:39.588764: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:34:39.588765: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:34:39.588768: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Sep 21 07:34:39.588769: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:34:39.588771: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.588772: | length: 8 (0x8) Sep 21 07:34:39.588774: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:34:39.588775: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:34:39.588777: | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Sep 21 07:34:39.588779: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Sep 21 07:34:39.588782: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Sep 21 07:34:39.588789: | remote proposal 1 matches local proposal 1 Sep 21 07:34:39.588791: | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] Sep 21 07:34:39.588792: | converting proposal to internal trans attrs Sep 21 07:34:39.588815: | natd_hash: hasher=0x5631c422d7a0(20) Sep 21 07:34:39.588820: | natd_hash: icookie= ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.588822: | natd_hash: rcookie= 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.588823: | natd_hash: ip= c0 01 02 2d Sep 21 07:34:39.588825: | natd_hash: port= 01 f4 Sep 21 07:34:39.588826: | natd_hash: hash= 78 1f d8 cd 2d 8b 7d 0f d3 5f 2e 39 95 77 f7 5f Sep 21 07:34:39.588828: | natd_hash: hash= fe 2e 63 a0 Sep 21 07:34:39.588844: | natd_hash: hasher=0x5631c422d7a0(20) Sep 21 07:34:39.588846: | natd_hash: icookie= ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.588847: | natd_hash: rcookie= 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.588849: | natd_hash: ip= c0 01 02 17 Sep 21 07:34:39.588850: | natd_hash: port= 01 f4 Sep 21 07:34:39.588852: | natd_hash: hash= 99 f9 35 a1 17 5b d6 04 90 fd 81 a5 92 1d 8d d1 Sep 21 07:34:39.588853: | natd_hash: hash= e5 62 50 48 Sep 21 07:34:39.588855: | NAT_TRAVERSAL encaps using auto-detect Sep 21 07:34:39.588856: | NAT_TRAVERSAL this end is NOT behind NAT Sep 21 07:34:39.588857: | NAT_TRAVERSAL that end is NOT behind NAT Sep 21 07:34:39.588860: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Sep 21 07:34:39.588863: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 Sep 21 07:34:39.588866: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Sep 21 07:34:39.588867: | state #1 requesting EVENT_RETRANSMIT to be deleted Sep 21 07:34:39.588869: | #1 STATE_PARENT_I1: retransmits: cleared Sep 21 07:34:39.588871: | libevent_free: release ptr-libevent@0x5631c554b1a0 Sep 21 07:34:39.588873: | free_event_entry: release EVENT_RETRANSMIT-pe@0x5631c554b160 Sep 21 07:34:39.588875: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5631c554b160 Sep 21 07:34:39.588877: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Sep 21 07:34:39.588879: | libevent_malloc: new ptr-libevent@0x5631c554b1a0 size 128 Sep 21 07:34:39.588887: | #1 spent 0.206 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() Sep 21 07:34:39.588890: | [RE]START processing: state #1 connection "west" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:34:39.588892: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND Sep 21 07:34:39.588894: | suspending state #1 and saving MD Sep 21 07:34:39.588895: | #1 is busy; has a suspended MD Sep 21 07:34:39.588898: | [RE]START processing: state #1 connection "west" from 192.1.2.23:500 (in log_stf_suspend() at ikev2.c:3266) Sep 21 07:34:39.588900: | "west" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3448 Sep 21 07:34:39.588903: | stop processing: state #1 connection "west" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:34:39.588905: | #1 spent 0.397 milliseconds in ikev2_process_packet() Sep 21 07:34:39.588908: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Sep 21 07:34:39.588910: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:34:39.588911: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:34:39.588914: | spent 0.405 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:34:39.588920: | crypto helper 0 resuming Sep 21 07:34:39.588928: | crypto helper 0 starting work-order 2 for state #1 Sep 21 07:34:39.588931: | crypto helper 0 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 Sep 21 07:34:39.589452: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 Sep 21 07:34:39.589714: | crypto helper 0 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.000783 seconds Sep 21 07:34:39.589719: | (#1) spent 0.787 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) Sep 21 07:34:39.589721: | crypto helper 0 sending results from work-order 2 for state #1 to event queue Sep 21 07:34:39.589723: | scheduling resume sending helper answer for #1 Sep 21 07:34:39.589727: | libevent_malloc: new ptr-libevent@0x7f6b94006b90 size 128 Sep 21 07:34:39.589733: | crypto helper 0 waiting (nothing to do) Sep 21 07:34:39.589768: | processing resume sending helper answer for #1 Sep 21 07:34:39.589777: | start processing: state #1 connection "west" from 192.1.2.23:500 (in resume_handler() at server.c:797) Sep 21 07:34:39.589780: | crypto helper 0 replies to request ID 2 Sep 21 07:34:39.589782: | calling continuation function 0x5631c4157630 Sep 21 07:34:39.589807: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Sep 21 07:34:39.589814: | creating state object #2 at 0x5631c554da00 Sep 21 07:34:39.589816: | State DB: adding IKEv2 state #2 in UNDEFINED Sep 21 07:34:39.589818: | pstats #2 ikev2.child started Sep 21 07:34:39.589820: | duplicating state object #1 "west" as #2 for IPSEC SA Sep 21 07:34:39.589823: | #2 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1481) Sep 21 07:34:39.589840: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:34:39.589844: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 Sep 21 07:34:39.589846: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 Sep 21 07:34:39.589848: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:34:39.589850: | libevent_free: release ptr-libevent@0x5631c554b1a0 Sep 21 07:34:39.589852: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5631c554b160 Sep 21 07:34:39.589854: | event_schedule: new EVENT_SA_REPLACE-pe@0x5631c554b160 Sep 21 07:34:39.589856: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 Sep 21 07:34:39.589858: | libevent_malloc: new ptr-libevent@0x5631c554b1a0 size 128 Sep 21 07:34:39.589860: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) Sep 21 07:34:39.589864: | **emit ISAKMP Message: Sep 21 07:34:39.589866: | initiator cookie: Sep 21 07:34:39.589868: | ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.589869: | responder cookie: Sep 21 07:34:39.589870: | 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.589872: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:39.589874: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:39.589875: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:34:39.589877: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:34:39.589879: | Message ID: 1 (0x1) Sep 21 07:34:39.589880: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:39.589882: | ***emit IKEv2 Encryption Payload: Sep 21 07:34:39.589884: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.589885: | flags: none (0x0) Sep 21 07:34:39.589887: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:34:39.589889: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.589891: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:34:39.589896: | IKEv2 CERT: send a certificate? Sep 21 07:34:39.589898: | IKEv2 CERT: policy does not have RSASIG or ECDSA: PSK Sep 21 07:34:39.589900: | IDr payload will be sent Sep 21 07:34:39.589910: | ****emit IKEv2 Identification - Initiator - Payload: Sep 21 07:34:39.589912: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.589913: | flags: none (0x0) Sep 21 07:34:39.589915: | ID type: ID_FQDN (0x2) Sep 21 07:34:39.589917: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) Sep 21 07:34:39.589919: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.589923: | emitting 4 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Sep 21 07:34:39.589924: | my identity 77 65 73 74 Sep 21 07:34:39.589926: | emitting length of IKEv2 Identification - Initiator - Payload: 12 Sep 21 07:34:39.589932: | ****emit IKEv2 Identification - Responder - Payload: Sep 21 07:34:39.589934: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Sep 21 07:34:39.589935: | flags: none (0x0) Sep 21 07:34:39.589937: | ID type: ID_FQDN (0x2) Sep 21 07:34:39.589939: | next payload chain: ignoring supplied 'IKEv2 Identification - Responder - Payload'.'next payload type' value 39:ISAKMP_NEXT_v2AUTH Sep 21 07:34:39.589941: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Sep 21 07:34:39.589942: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.589944: | emitting 4 raw bytes of IDr into IKEv2 Identification - Responder - Payload Sep 21 07:34:39.589946: | IDr 65 61 73 74 Sep 21 07:34:39.589947: | emitting length of IKEv2 Identification - Responder - Payload: 12 Sep 21 07:34:39.589949: | not sending INITIAL_CONTACT Sep 21 07:34:39.589951: | ****emit IKEv2 Authentication Payload: Sep 21 07:34:39.589952: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.589954: | flags: none (0x0) Sep 21 07:34:39.589956: | auth method: IKEv2_AUTH_SHARED (0x2) Sep 21 07:34:39.589958: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Sep 21 07:34:39.589959: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.589962: | ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to create PSK with authby=secret Sep 21 07:34:39.589965: | started looking for secret for @west->@east of kind PKK_PSK Sep 21 07:34:39.589967: | actually looking for secret for @west->@east of kind PKK_PSK Sep 21 07:34:39.589969: | line 1: key type PKK_PSK(@west) to type PKK_PSK Sep 21 07:34:39.589972: | 1: compared key @east to @west / @east -> 004 Sep 21 07:34:39.589974: | 2: compared key @west to @west / @east -> 014 Sep 21 07:34:39.589975: | line 1: match=014 Sep 21 07:34:39.589977: | match 014 beats previous best_match 000 match=0x5631c553bfc0 (line=1) Sep 21 07:34:39.589979: | concluding with best_match=014 best=0x5631c553bfc0 (lineno=1) Sep 21 07:34:39.590017: | emitting 64 raw bytes of PSK auth into IKEv2 Authentication Payload Sep 21 07:34:39.590020: | PSK auth 30 08 2d 62 af cd d2 02 5f f2 1f c4 ac 3c ab 3b Sep 21 07:34:39.590021: | PSK auth 08 28 31 9f 73 9c c2 27 4c c8 d0 9f 4e 1b 27 21 Sep 21 07:34:39.590023: | PSK auth 05 20 f4 60 a7 fc 67 ee 86 81 f5 81 3d 70 41 0e Sep 21 07:34:39.590024: | PSK auth 06 40 00 58 15 c2 ab 7e 2a 4f d3 08 c3 01 4a c0 Sep 21 07:34:39.590026: | emitting length of IKEv2 Authentication Payload: 72 Sep 21 07:34:39.590028: | getting first pending from state #1 Sep 21 07:34:39.590043: | netlink_get_spi: allocated 0x7b3b9877 for esp.0@192.1.2.45 Sep 21 07:34:39.590046: | constructing ESP/AH proposals with all DH removed for west (IKE SA initiator emitting ESP/AH proposals) Sep 21 07:34:39.590050: | converting proposal AES_GCM_16_256-NONE to ikev2 ... Sep 21 07:34:39.590054: | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED Sep 21 07:34:39.590056: | converting proposal AES_GCM_16_128-NONE to ikev2 ... Sep 21 07:34:39.590058: | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED Sep 21 07:34:39.590060: | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Sep 21 07:34:39.590062: | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:34:39.590064: | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Sep 21 07:34:39.590068: | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:34:39.590087: "west": constructed local ESP/AH proposals for west (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:34:39.590094: | Emitting ikev2_proposals ... Sep 21 07:34:39.590096: | ****emit IKEv2 Security Association Payload: Sep 21 07:34:39.590098: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.590099: | flags: none (0x0) Sep 21 07:34:39.590102: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:34:39.590116: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.590118: | discarding INTEG=NONE Sep 21 07:34:39.590120: | discarding DH=NONE Sep 21 07:34:39.590122: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.590124: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.590127: | prop #: 1 (0x1) Sep 21 07:34:39.590144: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:34:39.590145: | spi size: 4 (0x4) Sep 21 07:34:39.590147: | # transforms: 2 (0x2) Sep 21 07:34:39.590149: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.590151: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:34:39.590152: | our spi 7b 3b 98 77 Sep 21 07:34:39.590154: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590156: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590157: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.590159: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:34:39.590161: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590163: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.590164: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.590166: | length/value: 256 (0x100) Sep 21 07:34:39.590168: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.590169: | discarding INTEG=NONE Sep 21 07:34:39.590171: | discarding DH=NONE Sep 21 07:34:39.590172: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590174: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.590175: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:34:39.590177: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:34:39.590179: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590181: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590182: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590184: | emitting length of IKEv2 Proposal Substructure Payload: 32 Sep 21 07:34:39.590186: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.590187: | discarding INTEG=NONE Sep 21 07:34:39.590189: | discarding DH=NONE Sep 21 07:34:39.590190: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.590192: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.590193: | prop #: 2 (0x2) Sep 21 07:34:39.590195: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:34:39.590196: | spi size: 4 (0x4) Sep 21 07:34:39.590200: | # transforms: 2 (0x2) Sep 21 07:34:39.590202: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.590204: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.590206: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:34:39.590207: | our spi 7b 3b 98 77 Sep 21 07:34:39.590209: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590210: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590212: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.590214: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:34:39.590215: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590217: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.590219: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.590220: | length/value: 128 (0x80) Sep 21 07:34:39.590222: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.590223: | discarding INTEG=NONE Sep 21 07:34:39.590225: | discarding DH=NONE Sep 21 07:34:39.590226: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590228: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.590229: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:34:39.590231: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:34:39.590233: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590234: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590236: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590238: | emitting length of IKEv2 Proposal Substructure Payload: 32 Sep 21 07:34:39.590239: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.590241: | discarding DH=NONE Sep 21 07:34:39.590242: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.590244: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.590245: | prop #: 3 (0x3) Sep 21 07:34:39.590247: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:34:39.590248: | spi size: 4 (0x4) Sep 21 07:34:39.590250: | # transforms: 4 (0x4) Sep 21 07:34:39.590252: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.590253: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.590255: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:34:39.590257: | our spi 7b 3b 98 77 Sep 21 07:34:39.590258: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590260: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590261: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.590263: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:34:39.590264: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590266: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.590268: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.590269: | length/value: 256 (0x100) Sep 21 07:34:39.590271: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.590272: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590274: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590275: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.590278: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:34:39.590280: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590282: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590283: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590285: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590286: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590288: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.590289: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:34:39.590291: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590293: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590295: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590296: | discarding DH=NONE Sep 21 07:34:39.590297: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590299: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.590301: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:34:39.590302: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:34:39.590304: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590306: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590307: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590309: | emitting length of IKEv2 Proposal Substructure Payload: 48 Sep 21 07:34:39.590311: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.590312: | discarding DH=NONE Sep 21 07:34:39.590313: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.590315: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:34:39.590316: | prop #: 4 (0x4) Sep 21 07:34:39.590318: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:34:39.590319: | spi size: 4 (0x4) Sep 21 07:34:39.590321: | # transforms: 4 (0x4) Sep 21 07:34:39.590323: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:34:39.590325: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:34:39.590326: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:34:39.590328: | our spi 7b 3b 98 77 Sep 21 07:34:39.590329: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590331: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590332: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.590334: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:34:39.590336: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590337: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.590339: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.590340: | length/value: 128 (0x80) Sep 21 07:34:39.590342: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:34:39.590343: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590345: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590347: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.590348: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:34:39.590351: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590352: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590354: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590356: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590357: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590359: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:34:39.590360: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:34:39.590362: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590364: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590365: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590367: | discarding DH=NONE Sep 21 07:34:39.590368: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:34:39.590370: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.590371: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:34:39.590373: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:34:39.590375: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.590376: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:34:39.590378: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:34:39.590380: | emitting length of IKEv2 Proposal Substructure Payload: 48 Sep 21 07:34:39.590381: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:34:39.590383: | emitting length of IKEv2 Security Association Payload: 164 Sep 21 07:34:39.590385: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:34:39.590387: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:34:39.590389: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.590390: | flags: none (0x0) Sep 21 07:34:39.590392: | number of TS: 1 (0x1) Sep 21 07:34:39.590394: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Sep 21 07:34:39.590396: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.590397: | *****emit IKEv2 Traffic Selector: Sep 21 07:34:39.590399: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:34:39.590401: | IP Protocol ID: 0 (0x0) Sep 21 07:34:39.590402: | start port: 0 (0x0) Sep 21 07:34:39.590404: | end port: 65535 (0xffff) Sep 21 07:34:39.590406: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:34:39.590407: | IP start c0 00 01 00 Sep 21 07:34:39.590409: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:34:39.590410: | IP end c0 00 01 ff Sep 21 07:34:39.590412: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:34:39.590413: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Sep 21 07:34:39.590415: | ****emit IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:34:39.590417: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.590418: | flags: none (0x0) Sep 21 07:34:39.590420: | number of TS: 1 (0x1) Sep 21 07:34:39.590422: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Sep 21 07:34:39.590424: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:34:39.590426: | *****emit IKEv2 Traffic Selector: Sep 21 07:34:39.590428: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:34:39.590429: | IP Protocol ID: 0 (0x0) Sep 21 07:34:39.590431: | start port: 0 (0x0) Sep 21 07:34:39.590432: | end port: 65535 (0xffff) Sep 21 07:34:39.590434: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:34:39.590435: | IP start c0 00 02 00 Sep 21 07:34:39.590450: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:34:39.590451: | IP end c0 00 02 ff Sep 21 07:34:39.590453: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:34:39.590454: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Sep 21 07:34:39.590456: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Sep 21 07:34:39.590457: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Sep 21 07:34:39.590459: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:34:39.590461: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:34:39.590463: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:34:39.590465: | emitting length of IKEv2 Encryption Payload: 337 Sep 21 07:34:39.590466: | emitting length of ISAKMP Message: 365 Sep 21 07:34:39.590478: | suspend processing: state #1 connection "west" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:34:39.590481: | start processing: state #2 connection "west" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:34:39.590483: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK Sep 21 07:34:39.590485: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 Sep 21 07:34:39.590487: | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) Sep 21 07:34:39.590489: | Message ID: updating counters for #2 to 0 after switching state Sep 21 07:34:39.590492: | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 Sep 21 07:34:39.590495: | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 Sep 21 07:34:39.590498: "west" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Sep 21 07:34:39.590505: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.2.45:500) Sep 21 07:34:39.590509: | sending 365 bytes for STATE_PARENT_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) Sep 21 07:34:39.590511: | ee ed 5a 05 21 55 05 c7 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.590512: | 2e 20 23 08 00 00 00 01 00 00 01 6d 23 00 01 51 Sep 21 07:34:39.590515: | ae 13 34 93 73 7e 2e 48 74 6a 3c c8 40 94 99 27 Sep 21 07:34:39.590517: | f0 e1 aa 05 73 f8 6f fd 81 c8 f5 9c f1 53 9d be Sep 21 07:34:39.590519: | 08 16 a1 77 77 a6 34 b5 89 04 64 a2 39 79 07 6f Sep 21 07:34:39.590533: | d2 8d 1b cb 89 99 62 54 47 bc 2e 79 83 49 7e 84 Sep 21 07:34:39.590535: | 17 f2 90 9e f2 ac 94 04 e5 0d f9 2c ab ea be ee Sep 21 07:34:39.590536: | d6 cf 56 26 61 df bb 07 35 ca 34 74 1d 54 fd 13 Sep 21 07:34:39.590537: | 19 34 db 30 4c 42 d1 e1 cc 57 9b 61 6f c2 22 73 Sep 21 07:34:39.590539: | 26 40 97 49 31 18 c6 a8 c3 5d a5 9e d7 2e d0 a5 Sep 21 07:34:39.590540: | a1 f0 0a 15 f7 81 67 e8 92 68 4e fc b1 90 41 a2 Sep 21 07:34:39.590542: | f9 bf 14 4d 82 bb 48 48 d9 7b 4e 22 5f 2e ef 47 Sep 21 07:34:39.590543: | 9c 3c 73 2d ab 70 e1 fa 65 90 90 3a 90 42 b6 7b Sep 21 07:34:39.590545: | c7 4c fc 93 f4 93 d6 81 0e 82 33 a4 76 e8 10 ba Sep 21 07:34:39.590549: | 99 5c 55 c2 9f ed e2 bd 35 a4 a5 38 fe de 51 97 Sep 21 07:34:39.590550: | ee 69 28 5c 3b df 47 e3 18 1b 8e 86 b1 cb 92 9b Sep 21 07:34:39.590552: | 2e b4 36 e2 ab 71 48 2b 46 e8 2a 30 f0 5f cf 14 Sep 21 07:34:39.590553: | db 17 ed 36 cc 70 fa 5f f3 66 fa 17 5a a0 af 3c Sep 21 07:34:39.590555: | b4 a0 43 c3 bf ee 63 71 32 bf 8d 63 ae 47 41 4a Sep 21 07:34:39.590556: | e1 e3 14 60 70 25 11 80 84 de 9a 0a b4 c3 67 0b Sep 21 07:34:39.590557: | db 27 22 34 75 01 7a 60 8c 58 eb 45 4a 78 c8 3b Sep 21 07:34:39.590559: | f8 45 fb e9 18 64 ed 00 13 ba 2e 8c 3a e0 f2 58 Sep 21 07:34:39.590560: | a3 32 88 02 ab 90 5c 31 7c f4 5a 54 fd Sep 21 07:34:39.590583: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=15000ms Sep 21 07:34:39.590586: | event_schedule: new EVENT_RETRANSMIT-pe@0x5631c554ae00 Sep 21 07:34:39.590588: | inserting event EVENT_RETRANSMIT, timeout in 15 seconds for #2 Sep 21 07:34:39.590591: | libevent_malloc: new ptr-libevent@0x5631c554e4c0 size 128 Sep 21 07:34:39.590594: | #2 STATE_PARENT_I2: retransmits: first event in 15 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49925.95885 Sep 21 07:34:39.590596: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Sep 21 07:34:39.590600: | #1 spent 0.804 milliseconds in resume sending helper answer Sep 21 07:34:39.590604: | stop processing: state #2 connection "west" from 192.1.2.23:500 (in resume_handler() at server.c:833) Sep 21 07:34:39.590606: | libevent_free: release ptr-libevent@0x7f6b94006b90 Sep 21 07:34:39.620070: | spent 0.00276 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:34:39.620087: | *received 225 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) Sep 21 07:34:39.620090: | ee ed 5a 05 21 55 05 c7 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.620092: | 2e 20 23 20 00 00 00 01 00 00 00 e1 24 00 00 c5 Sep 21 07:34:39.620094: | e2 85 10 a4 07 24 66 11 65 5a 94 e4 1e 0a 6a 4d Sep 21 07:34:39.620095: | 19 24 8d 7c 9e 95 02 81 d9 5a 61 e4 b7 cc d0 1f Sep 21 07:34:39.620097: | d3 9c 2f b2 e9 c1 44 de bc 18 79 b7 48 4a 17 7b Sep 21 07:34:39.620098: | b8 c5 48 22 6e a1 f7 c2 e7 08 07 5b c8 e5 46 12 Sep 21 07:34:39.620100: | a3 70 b9 1e d9 62 3b df fc 3e e0 ed 07 44 95 04 Sep 21 07:34:39.620101: | b4 fd 2e 4f a2 ba 36 cd 98 d8 25 b1 19 97 ab da Sep 21 07:34:39.620103: | d0 70 24 04 4a ac 48 e1 95 65 78 76 67 91 8a 41 Sep 21 07:34:39.620105: | 63 dc 13 0f 3a fa f9 7e 18 10 06 1b 3e fa 86 14 Sep 21 07:34:39.620106: | c0 4e 0c d6 1a 31 b5 7b ac 3c f4 c4 2d 30 86 d4 Sep 21 07:34:39.620108: | d6 7c 82 5f c9 a9 07 56 d2 8b 26 bc 40 a8 ae 85 Sep 21 07:34:39.620109: | 97 92 d2 91 62 d1 89 2f e2 3e 8b 7b 31 27 4e 77 Sep 21 07:34:39.620111: | 12 df 96 b3 0a 22 04 e0 48 05 1d f0 bb b2 81 4e Sep 21 07:34:39.620112: | a5 Sep 21 07:34:39.620116: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Sep 21 07:34:39.620119: | **parse ISAKMP Message: Sep 21 07:34:39.620121: | initiator cookie: Sep 21 07:34:39.620122: | ee ed 5a 05 21 55 05 c7 Sep 21 07:34:39.620124: | responder cookie: Sep 21 07:34:39.620125: | 63 c4 e5 ff 2e fe fb f8 Sep 21 07:34:39.620127: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:34:39.620129: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:39.620131: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:34:39.620133: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:34:39.620135: | Message ID: 1 (0x1) Sep 21 07:34:39.620137: | length: 225 (0xe1) Sep 21 07:34:39.620139: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:34:39.620141: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response Sep 21 07:34:39.620144: | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) Sep 21 07:34:39.620149: | start processing: state #1 connection "west" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:34:39.620153: | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) Sep 21 07:34:39.620156: | suspend processing: state #1 connection "west" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:34:39.620159: | start processing: state #2 connection "west" from 192.1.2.23:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:34:39.620161: | #2 is idle Sep 21 07:34:39.620163: | #2 idle Sep 21 07:34:39.620165: | unpacking clear payload Sep 21 07:34:39.620167: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Sep 21 07:34:39.620169: | ***parse IKEv2 Encryption Payload: Sep 21 07:34:39.620171: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Sep 21 07:34:39.620172: | flags: none (0x0) Sep 21 07:34:39.620174: | length: 197 (0xc5) Sep 21 07:34:39.620176: | processing payload: ISAKMP_NEXT_v2SK (len=193) Sep 21 07:34:39.620178: | #2 in state PARENT_I2: sent v2I2, expected v2R2 Sep 21 07:34:39.620193: | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success Sep 21 07:34:39.620195: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) Sep 21 07:34:39.620197: | **parse IKEv2 Identification - Responder - Payload: Sep 21 07:34:39.620199: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Sep 21 07:34:39.620200: | flags: none (0x0) Sep 21 07:34:39.620202: | length: 12 (0xc) Sep 21 07:34:39.620204: | ID type: ID_FQDN (0x2) Sep 21 07:34:39.620205: | processing payload: ISAKMP_NEXT_v2IDr (len=4) Sep 21 07:34:39.620207: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) Sep 21 07:34:39.620209: | **parse IKEv2 Authentication Payload: Sep 21 07:34:39.620210: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:34:39.620212: | flags: none (0x0) Sep 21 07:34:39.620213: | length: 72 (0x48) Sep 21 07:34:39.620215: | auth method: IKEv2_AUTH_SHARED (0x2) Sep 21 07:34:39.620217: | processing payload: ISAKMP_NEXT_v2AUTH (len=64) Sep 21 07:34:39.620219: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:34:39.620220: | **parse IKEv2 Security Association Payload: Sep 21 07:34:39.620222: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Sep 21 07:34:39.620223: | flags: none (0x0) Sep 21 07:34:39.620225: | length: 36 (0x24) Sep 21 07:34:39.620226: | processing payload: ISAKMP_NEXT_v2SA (len=32) Sep 21 07:34:39.620228: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Sep 21 07:34:39.620230: | **parse IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:34:39.620231: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Sep 21 07:34:39.620233: | flags: none (0x0) Sep 21 07:34:39.620234: | length: 24 (0x18) Sep 21 07:34:39.620235: | number of TS: 1 (0x1) Sep 21 07:34:39.620237: | processing payload: ISAKMP_NEXT_v2TSi (len=16) Sep 21 07:34:39.620239: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Sep 21 07:34:39.620240: | **parse IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:34:39.620242: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:39.620243: | flags: none (0x0) Sep 21 07:34:39.620245: | length: 24 (0x18) Sep 21 07:34:39.620246: | number of TS: 1 (0x1) Sep 21 07:34:39.620248: | processing payload: ISAKMP_NEXT_v2TSr (len=16) Sep 21 07:34:39.620249: | selected state microcode Initiator: process IKE_AUTH response Sep 21 07:34:39.620251: | Now let's proceed with state specific processing Sep 21 07:34:39.620252: | calling processor Initiator: process IKE_AUTH response Sep 21 07:34:39.620257: | offered CA: '%none' Sep 21 07:34:39.620260: "west" #2: IKEv2 mode peer ID is ID_FQDN: '@east' Sep 21 07:34:39.620289: | verifying AUTH payload Sep 21 07:34:39.620292: | ikev2_calculate_psk_sighash() called from STATE_PARENT_I2 to verify PSK with authby=secret Sep 21 07:34:39.620295: | started looking for secret for @west->@east of kind PKK_PSK Sep 21 07:34:39.620297: | actually looking for secret for @west->@east of kind PKK_PSK Sep 21 07:34:39.620299: | line 1: key type PKK_PSK(@west) to type PKK_PSK Sep 21 07:34:39.620302: | 1: compared key @east to @west / @east -> 004 Sep 21 07:34:39.620304: | 2: compared key @west to @west / @east -> 014 Sep 21 07:34:39.620307: | line 1: match=014 Sep 21 07:34:39.620309: | match 014 beats previous best_match 000 match=0x5631c553bfc0 (line=1) Sep 21 07:34:39.620311: | concluding with best_match=014 best=0x5631c553bfc0 (lineno=1) Sep 21 07:34:39.620352: "west" #2: Authenticated using authby=secret Sep 21 07:34:39.620358: | parent state #1: PARENT_I2(open IKE SA) => PARENT_I3(established IKE SA) Sep 21 07:34:39.620362: | #1 will start re-keying in 25 seconds with margin of 5 seconds (attempting re-key) Sep 21 07:34:39.620364: | state #1 requesting EVENT_SA_REPLACE to be deleted Sep 21 07:34:39.620366: | libevent_free: release ptr-libevent@0x5631c554b1a0 Sep 21 07:34:39.620368: | free_event_entry: release EVENT_SA_REPLACE-pe@0x5631c554b160 Sep 21 07:34:39.620370: | event_schedule: new EVENT_SA_REKEY-pe@0x5631c554b160 Sep 21 07:34:39.620372: | inserting event EVENT_SA_REKEY, timeout in 25 seconds for #1 Sep 21 07:34:39.620374: | libevent_malloc: new ptr-libevent@0x5631c554b1a0 size 128 Sep 21 07:34:39.620448: | pstats #1 ikev2.ike established Sep 21 07:34:39.620452: | TSi: parsing 1 traffic selectors Sep 21 07:34:39.620455: | ***parse IKEv2 Traffic Selector: Sep 21 07:34:39.620456: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:34:39.620458: | IP Protocol ID: 0 (0x0) Sep 21 07:34:39.620460: | length: 16 (0x10) Sep 21 07:34:39.620461: | start port: 0 (0x0) Sep 21 07:34:39.620463: | end port: 65535 (0xffff) Sep 21 07:34:39.620465: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Sep 21 07:34:39.620467: | TS low c0 00 01 00 Sep 21 07:34:39.620468: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Sep 21 07:34:39.620470: | TS high c0 00 01 ff Sep 21 07:34:39.620471: | TSi: parsed 1 traffic selectors Sep 21 07:34:39.620473: | TSr: parsing 1 traffic selectors Sep 21 07:34:39.620474: | ***parse IKEv2 Traffic Selector: Sep 21 07:34:39.620476: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:34:39.620478: | IP Protocol ID: 0 (0x0) Sep 21 07:34:39.620482: | length: 16 (0x10) Sep 21 07:34:39.620486: | start port: 0 (0x0) Sep 21 07:34:39.620488: | end port: 65535 (0xffff) Sep 21 07:34:39.620491: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS low Sep 21 07:34:39.620493: | TS low c0 00 02 00 Sep 21 07:34:39.620496: | parsing 4 raw bytes of IKEv2 Traffic Selector into TS high Sep 21 07:34:39.620499: | TS high c0 00 02 ff Sep 21 07:34:39.620502: | TSr: parsed 1 traffic selectors Sep 21 07:34:39.620509: | evaluating our conn="west" I=192.0.1.0/24:0:0/0 R=192.0.2.0/24:0:0/0 to their: Sep 21 07:34:39.620514: | TSi[0] .net=192.0.1.0-192.0.1.255 .iporotoid=0 .{start,end}port=0..65535 Sep 21 07:34:39.620522: | match address end->client=192.0.1.0/24 == TSi[0]net=192.0.1.0-192.0.1.255: YES fitness 32 Sep 21 07:34:39.620525: | narrow port end=0..65535 == TSi[0]=0..65535: 0 Sep 21 07:34:39.620528: | TSi[0] port match: YES fitness 65536 Sep 21 07:34:39.620532: | narrow protocol end=*0 == TSi[0]=*0: 0 Sep 21 07:34:39.620535: | match end->protocol=*0 == TSi[0].ipprotoid=*0: YES fitness 255 Sep 21 07:34:39.620540: | TSr[0] .net=192.0.2.0-192.0.2.255 .iporotoid=0 .{start,end}port=0..65535 Sep 21 07:34:39.620545: | match address end->client=192.0.2.0/24 == TSr[0]net=192.0.2.0-192.0.2.255: YES fitness 32 Sep 21 07:34:39.620547: | narrow port end=0..65535 == TSr[0]=0..65535: 0 Sep 21 07:34:39.620548: | TSr[0] port match: YES fitness 65536 Sep 21 07:34:39.620550: | narrow protocol end=*0 == TSr[0]=*0: 0 Sep 21 07:34:39.620552: | match end->protocol=*0 == TSr[0].ipprotoid=*0: YES fitness 255 Sep 21 07:34:39.620554: | best fit so far: TSi[0] TSr[0] Sep 21 07:34:39.620555: | found an acceptable TSi/TSr Traffic Selector Sep 21 07:34:39.620557: | printing contents struct traffic_selector Sep 21 07:34:39.620558: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Sep 21 07:34:39.620560: | ipprotoid: 0 Sep 21 07:34:39.620561: | port range: 0-65535 Sep 21 07:34:39.620564: | ip range: 192.0.1.0-192.0.1.255 Sep 21 07:34:39.620567: | printing contents struct traffic_selector Sep 21 07:34:39.620568: | ts_type: IKEv2_TS_IPV6_ADDR_RANGE Sep 21 07:34:39.620570: | ipprotoid: 0 Sep 21 07:34:39.620571: | port range: 0-65535 Sep 21 07:34:39.620574: | ip range: 192.0.2.0-192.0.2.255 Sep 21 07:34:39.620583: | using existing local ESP/AH proposals for west (IKE_AUTH initiator accepting remote ESP/AH proposal): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:34:39.620585: | Comparing remote proposals against IKE_AUTH initiator accepting remote ESP/AH proposal 4 local proposals Sep 21 07:34:39.620588: | local proposal 1 type ENCR has 1 transforms Sep 21 07:34:39.620589: | local proposal 1 type PRF has 0 transforms Sep 21 07:34:39.620591: | local proposal 1 type INTEG has 1 transforms Sep 21 07:34:39.620593: | local proposal 1 type DH has 1 transforms Sep 21 07:34:39.620594: | local proposal 1 type ESN has 1 transforms Sep 21 07:34:39.620597: | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH Sep 21 07:34:39.620598: | local proposal 2 type ENCR has 1 transforms Sep 21 07:34:39.620600: | local proposal 2 type PRF has 0 transforms Sep 21 07:34:39.620601: | local proposal 2 type INTEG has 1 transforms Sep 21 07:34:39.620603: | local proposal 2 type DH has 1 transforms Sep 21 07:34:39.620604: | local proposal 2 type ESN has 1 transforms Sep 21 07:34:39.620606: | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH Sep 21 07:34:39.620608: | local proposal 3 type ENCR has 1 transforms Sep 21 07:34:39.620609: | local proposal 3 type PRF has 0 transforms Sep 21 07:34:39.620611: | local proposal 3 type INTEG has 2 transforms Sep 21 07:34:39.620613: | local proposal 3 type DH has 1 transforms Sep 21 07:34:39.620614: | local proposal 3 type ESN has 1 transforms Sep 21 07:34:39.620616: | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH Sep 21 07:34:39.620618: | local proposal 4 type ENCR has 1 transforms Sep 21 07:34:39.620619: | local proposal 4 type PRF has 0 transforms Sep 21 07:34:39.620621: | local proposal 4 type INTEG has 2 transforms Sep 21 07:34:39.620622: | local proposal 4 type DH has 1 transforms Sep 21 07:34:39.620624: | local proposal 4 type ESN has 1 transforms Sep 21 07:34:39.620626: | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH Sep 21 07:34:39.620628: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:34:39.620630: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:34:39.620631: | length: 32 (0x20) Sep 21 07:34:39.620633: | prop #: 1 (0x1) Sep 21 07:34:39.620634: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:34:39.620636: | spi size: 4 (0x4) Sep 21 07:34:39.620637: | # transforms: 2 (0x2) Sep 21 07:34:39.620639: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:34:39.620641: | remote SPI 70 7b 3d f1 Sep 21 07:34:39.620643: | Comparing remote proposal 1 containing 2 transforms against local proposal [1..1] of 4 local proposals Sep 21 07:34:39.620645: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:34:39.620647: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:34:39.620648: | length: 12 (0xc) Sep 21 07:34:39.620650: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:34:39.620651: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:34:39.620653: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:34:39.620655: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:34:39.620657: | length/value: 256 (0x100) Sep 21 07:34:39.620659: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:34:39.620661: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:34:39.620663: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:34:39.620665: | length: 8 (0x8) Sep 21 07:34:39.620667: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:34:39.620668: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:34:39.620671: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Sep 21 07:34:39.620673: | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none Sep 21 07:34:39.620676: | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN Sep 21 07:34:39.620677: | remote proposal 1 matches local proposal 1 Sep 21 07:34:39.620679: | remote accepted the proposal 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] Sep 21 07:34:39.620682: | IKE_AUTH initiator accepting remote ESP/AH proposal ikev2_proposal: 1:ESP:SPI=707b3df1;ENCR=AES_GCM_C_256;ESN=DISABLED Sep 21 07:34:39.620684: | converting proposal to internal trans attrs Sep 21 07:34:39.620688: | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 Sep 21 07:34:39.620795: | install_ipsec_sa() for #2: inbound and outbound Sep 21 07:34:39.620800: | could_route called for west (kind=CK_PERMANENT) Sep 21 07:34:39.620802: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:34:39.620804: | conn west mark 0/00000000, 0/00000000 vs Sep 21 07:34:39.620806: | conn west mark 0/00000000, 0/00000000 Sep 21 07:34:39.620810: | route owner of "west" unrouted: NULL; eroute owner: NULL Sep 21 07:34:39.620813: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Sep 21 07:34:39.620815: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Sep 21 07:34:39.620817: | AES_GCM_16 requires 4 salt bytes Sep 21 07:34:39.620818: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Sep 21 07:34:39.620821: | setting IPsec SA replay-window to 32 Sep 21 07:34:39.620823: | NIC esp-hw-offload not for connection 'west' not available on interface eth1 Sep 21 07:34:39.620826: | netlink: enabling tunnel mode Sep 21 07:34:39.620828: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:34:39.620829: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:34:39.620903: | netlink response for Add SA esp.707b3df1@192.1.2.23 included non-error error Sep 21 07:34:39.620907: | set up outgoing SA, ref=0/0 Sep 21 07:34:39.620909: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Sep 21 07:34:39.620911: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Sep 21 07:34:39.620912: | AES_GCM_16 requires 4 salt bytes Sep 21 07:34:39.620914: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Sep 21 07:34:39.620916: | setting IPsec SA replay-window to 32 Sep 21 07:34:39.620918: | NIC esp-hw-offload not for connection 'west' not available on interface eth1 Sep 21 07:34:39.620920: | netlink: enabling tunnel mode Sep 21 07:34:39.620921: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:34:39.620923: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:34:39.620962: | netlink response for Add SA esp.7b3b9877@192.1.2.45 included non-error error Sep 21 07:34:39.620966: | priority calculation of connection "west" is 0xfe7e7 Sep 21 07:34:39.620970: | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.10000@192.1.2.45 (raw_eroute) Sep 21 07:34:39.620973: | IPsec Sa SPD priority set to 1042407 Sep 21 07:34:39.621011: | raw_eroute result=success Sep 21 07:34:39.621015: | set up incoming SA, ref=0/0 Sep 21 07:34:39.621017: | sr for #2: unrouted Sep 21 07:34:39.621019: | route_and_eroute() for proto 0, and source port 0 dest port 0 Sep 21 07:34:39.621020: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:34:39.621022: | conn west mark 0/00000000, 0/00000000 vs Sep 21 07:34:39.621024: | conn west mark 0/00000000, 0/00000000 Sep 21 07:34:39.621026: | route owner of "west" unrouted: NULL; eroute owner: NULL Sep 21 07:34:39.621028: | route_and_eroute with c: west (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 Sep 21 07:34:39.621032: | priority calculation of connection "west" is 0xfe7e7 Sep 21 07:34:39.621037: | eroute_connection add eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) Sep 21 07:34:39.621039: | IPsec Sa SPD priority set to 1042407 Sep 21 07:34:39.621058: | raw_eroute result=success Sep 21 07:34:39.621061: | running updown command "ipsec _updown" for verb up Sep 21 07:34:39.621064: | command executing up-client Sep 21 07:34:39.621080: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x707b3df1 SPI_OUT=0x Sep 21 07:34:39.621083: | popen cmd is 1023 chars long Sep 21 07:34:39.621085: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFA: Sep 21 07:34:39.621086: | cmd( 80):CE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' : Sep 21 07:34:39.621088: | cmd( 160):PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_M: Sep 21 07:34:39.621090: | cmd( 240):ASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='1638: Sep 21 07:34:39.621091: | cmd( 320):8' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_: Sep 21 07:34:39.621093: | cmd( 400):CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK=': Sep 21 07:34:39.621095: | cmd( 480):255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUT: Sep 21 07:34:39.621096: | cmd( 560):O_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+: Sep 21 07:34:39.621098: | cmd( 640):IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PL: Sep 21 07:34:39.621099: | cmd( 720):UTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS: Sep 21 07:34:39.621101: | cmd( 800):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLU: Sep 21 07:34:39.621103: | cmd( 880):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHAR: Sep 21 07:34:39.621104: | cmd( 960):ED='no' SPI_IN=0x707b3df1 SPI_OUT=0x7b3b9877 ipsec _updown 2>&1: Sep 21 07:34:39.628815: | route_and_eroute: firewall_notified: true Sep 21 07:34:39.628831: | running updown command "ipsec _updown" for verb prepare Sep 21 07:34:39.628834: | command executing prepare-client Sep 21 07:34:39.628855: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x707b3df1 Sep 21 07:34:39.628861: | popen cmd is 1028 chars long Sep 21 07:34:39.628863: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_IN: Sep 21 07:34:39.628865: | cmd( 80):TERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@w: Sep 21 07:34:39.628867: | cmd( 160):est' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLI: Sep 21 07:34:39.628868: | cmd( 240):ENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID=: Sep 21 07:34:39.628870: | cmd( 320):'16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_: Sep 21 07:34:39.628872: | cmd( 400):PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_M: Sep 21 07:34:39.628873: | cmd( 480):ASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='': Sep 21 07:34:39.628875: | cmd( 560): PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PF: Sep 21 07:34:39.628877: | cmd( 640):S+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANEN: Sep 21 07:34:39.628878: | cmd( 720):T' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEE: Sep 21 07:34:39.628880: | cmd( 800):R_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0: Sep 21 07:34:39.628882: | cmd( 880):' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI: Sep 21 07:34:39.628883: | cmd( 960):_SHARED='no' SPI_IN=0x707b3df1 SPI_OUT=0x7b3b9877 ipsec _updown 2>&1: Sep 21 07:34:39.635484: | running updown command "ipsec _updown" for verb route Sep 21 07:34:39.635495: | command executing route-client Sep 21 07:34:39.635517: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x707b3df1 SPI_ Sep 21 07:34:39.635520: | popen cmd is 1026 chars long Sep 21 07:34:39.635522: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='west' PLUTO_INTE: Sep 21 07:34:39.635524: | cmd( 80):RFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@wes: Sep 21 07:34:39.635526: | cmd( 160):t' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIEN: Sep 21 07:34:39.635528: | cmd( 240):T_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='1: Sep 21 07:34:39.635529: | cmd( 320):6388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PE: Sep 21 07:34:39.635531: | cmd( 400):ER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MAS: Sep 21 07:34:39.635533: | cmd( 480):K='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' P: Sep 21 07:34:39.635534: | cmd( 560):LUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+: Sep 21 07:34:39.635536: | cmd( 640):UP+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT': Sep 21 07:34:39.635541: | cmd( 720): PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_: Sep 21 07:34:39.635543: | cmd( 800):DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' : Sep 21 07:34:39.635545: | cmd( 880):PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_S: Sep 21 07:34:39.635546: | cmd( 960):HARED='no' SPI_IN=0x707b3df1 SPI_OUT=0x7b3b9877 ipsec _updown 2>&1: Sep 21 07:34:39.643844: | route_and_eroute: instance "west", setting eroute_owner {spd=0x5631c5547950,sr=0x5631c5547950} to #2 (was #0) (newest_ipsec_sa=#0) Sep 21 07:34:39.643908: | #1 spent 0.746 milliseconds in install_ipsec_sa() Sep 21 07:34:39.643913: | inR2: instance west[0], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 Sep 21 07:34:39.643915: | state #2 requesting EVENT_RETRANSMIT to be deleted Sep 21 07:34:39.643918: | #2 STATE_PARENT_I2: retransmits: cleared Sep 21 07:34:39.643922: | libevent_free: release ptr-libevent@0x5631c554e4c0 Sep 21 07:34:39.643924: | free_event_entry: release EVENT_RETRANSMIT-pe@0x5631c554ae00 Sep 21 07:34:39.643928: | #2 spent 1.3 milliseconds in processing: Initiator: process IKE_AUTH response in ikev2_process_state_packet() Sep 21 07:34:39.643933: | [RE]START processing: state #2 connection "west" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:34:39.643937: | #2 complete_v2_state_transition() PARENT_I2->V2_IPSEC_I with status STF_OK Sep 21 07:34:39.643943: | IKEv2: transition from state STATE_PARENT_I2 to state STATE_V2_IPSEC_I Sep 21 07:34:39.643948: | child state #2: PARENT_I2(open IKE SA) => V2_IPSEC_I(established CHILD SA) Sep 21 07:34:39.643951: | Message ID: updating counters for #2 to 1 after switching state Sep 21 07:34:39.643957: | Message ID: recv #1.#2 response 1; ike: initiator.sent=1 initiator.recv=0->1 responder.sent=-1 responder.recv=-1; child: wip.initiator=1->-1 wip.responder=-1 Sep 21 07:34:39.643963: | Message ID: #1.#2 skipping update_send as nothing to send; initiator.sent=1 initiator.recv=1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1 Sep 21 07:34:39.643966: | pstats #2 ikev2.child established Sep 21 07:34:39.643975: "west" #2: negotiated connection [192.0.1.0-192.0.1.255:0-65535 0] -> [192.0.2.0-192.0.2.255:0-65535 0] Sep 21 07:34:39.643987: | NAT-T: encaps is 'auto' Sep 21 07:34:39.643992: "west" #2: STATE_V2_IPSEC_I: IPsec SA established tunnel mode {ESP=>0x707b3df1 <0x7b3b9877 xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=passive} Sep 21 07:34:39.643996: | releasing whack for #2 (sock=fd@25) Sep 21 07:34:39.644001: | close_any(fd@25) (in release_whack() at state.c:654) Sep 21 07:34:39.644004: | releasing whack and unpending for parent #1 Sep 21 07:34:39.644007: | unpending state #1 connection "west" Sep 21 07:34:39.644012: | delete from pending Child SA with 192.1.2.23 "west" Sep 21 07:34:39.644015: | removing pending policy for no connection {0x5631c551a720} Sep 21 07:34:39.644022: | close_any(fd@24) (in release_whack() at state.c:654) Sep 21 07:34:39.644028: | #2 will start re-keying in 28795 seconds with margin of 5 seconds (attempting re-key) Sep 21 07:34:39.644031: | event_schedule: new EVENT_SA_REKEY-pe@0x5631c554ae00 Sep 21 07:34:39.644035: | inserting event EVENT_SA_REKEY, timeout in 28795 seconds for #2 Sep 21 07:34:39.644039: | libevent_malloc: new ptr-libevent@0x5631c554e4c0 size 128 Sep 21 07:34:39.644047: | stop processing: state #2 connection "west" from 192.1.2.23:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:34:39.644052: | #1 spent 1.6 milliseconds in ikev2_process_packet() Sep 21 07:34:39.644057: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Sep 21 07:34:39.644061: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:34:39.644064: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:34:39.644069: | spent 1.62 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:34:39.644081: | processing signal PLUTO_SIGCHLD Sep 21 07:34:39.644086: | waitpid returned ECHILD (no child processes left) Sep 21 07:34:39.644089: | spent 0.00427 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:34:39.644090: | processing signal PLUTO_SIGCHLD Sep 21 07:34:39.644093: | waitpid returned ECHILD (no child processes left) Sep 21 07:34:39.644095: | spent 0.00242 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:34:39.644097: | processing signal PLUTO_SIGCHLD Sep 21 07:34:39.644099: | waitpid returned ECHILD (no child processes left) Sep 21 07:34:39.644101: | spent 0.00261 milliseconds in signal handler PLUTO_SIGCHLD