Sep 21 07:33:39.658155: FIPS Product: YES Sep 21 07:33:39.658184: FIPS Kernel: NO Sep 21 07:33:39.658186: FIPS Mode: NO Sep 21 07:33:39.658188: NSS DB directory: sql:/etc/ipsec.d Sep 21 07:33:39.658327: Initializing NSS Sep 21 07:33:39.658329: Opening NSS database "sql:/etc/ipsec.d" read-only Sep 21 07:33:39.685121: NSS initialized Sep 21 07:33:39.685133: NSS crypto library initialized Sep 21 07:33:39.685135: FIPS HMAC integrity support [enabled] Sep 21 07:33:39.685136: FIPS mode disabled for pluto daemon Sep 21 07:33:39.724951: FIPS HMAC integrity verification self-test FAILED Sep 21 07:33:39.725037: libcap-ng support [enabled] Sep 21 07:33:39.725044: Linux audit support [enabled] Sep 21 07:33:39.725066: Linux audit activated Sep 21 07:33:39.725072: Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:24508 Sep 21 07:33:39.725073: core dump dir: /var/tmp Sep 21 07:33:39.725075: secrets file: /etc/ipsec.secrets Sep 21 07:33:39.725076: leak-detective disabled Sep 21 07:33:39.725077: NSS crypto [enabled] Sep 21 07:33:39.725078: XAUTH PAM support [enabled] Sep 21 07:33:39.725134: | libevent is using pluto's memory allocator Sep 21 07:33:39.725139: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Sep 21 07:33:39.725149: | libevent_malloc: new ptr-libevent@0x555e54f6e220 size 40 Sep 21 07:33:39.725153: | libevent_malloc: new ptr-libevent@0x555e54f6e250 size 40 Sep 21 07:33:39.725156: | libevent_malloc: new ptr-libevent@0x555e54f6fa00 size 40 Sep 21 07:33:39.725157: | creating event base Sep 21 07:33:39.725159: | libevent_malloc: new ptr-libevent@0x555e54f6f9c0 size 56 Sep 21 07:33:39.725161: | libevent_malloc: new ptr-libevent@0x555e54f6fa30 size 664 Sep 21 07:33:39.725171: | libevent_malloc: new ptr-libevent@0x555e54f6fcd0 size 24 Sep 21 07:33:39.725173: | libevent_malloc: new ptr-libevent@0x555e54f29260 size 384 Sep 21 07:33:39.725181: | libevent_malloc: new ptr-libevent@0x555e54f6fcf0 size 16 Sep 21 07:33:39.725182: | libevent_malloc: new ptr-libevent@0x555e54f6fd10 size 40 Sep 21 07:33:39.725184: | libevent_malloc: new ptr-libevent@0x555e54f6fd40 size 48 Sep 21 07:33:39.725187: | libevent_realloc: new ptr-libevent@0x555e54f6fd80 size 256 Sep 21 07:33:39.725189: | libevent_malloc: new ptr-libevent@0x555e54f6fe90 size 16 Sep 21 07:33:39.725193: | libevent_free: release ptr-libevent@0x555e54f6f9c0 Sep 21 07:33:39.725196: | libevent initialized Sep 21 07:33:39.725198: | libevent_realloc: new ptr-libevent@0x555e54f6feb0 size 64 Sep 21 07:33:39.725202: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Sep 21 07:33:39.725214: | init_nat_traversal() initialized with keep_alive=0s Sep 21 07:33:39.725215: NAT-Traversal support [enabled] Sep 21 07:33:39.725217: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Sep 21 07:33:39.725221: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Sep 21 07:33:39.725223: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Sep 21 07:33:39.725251: | global one-shot timer EVENT_REVIVE_CONNS initialized Sep 21 07:33:39.725253: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Sep 21 07:33:39.725255: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Sep 21 07:33:39.725290: Encryption algorithms: Sep 21 07:33:39.725294: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Sep 21 07:33:39.725296: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Sep 21 07:33:39.725298: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Sep 21 07:33:39.725300: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Sep 21 07:33:39.725302: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Sep 21 07:33:39.725309: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Sep 21 07:33:39.725311: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Sep 21 07:33:39.725313: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Sep 21 07:33:39.725315: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Sep 21 07:33:39.725317: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Sep 21 07:33:39.725319: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Sep 21 07:33:39.725321: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Sep 21 07:33:39.725323: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Sep 21 07:33:39.725326: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Sep 21 07:33:39.725328: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Sep 21 07:33:39.725329: NULL IKEv1: ESP IKEv2: ESP [] Sep 21 07:33:39.725331: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Sep 21 07:33:39.725336: Hash algorithms: Sep 21 07:33:39.725338: MD5 IKEv1: IKE IKEv2: Sep 21 07:33:39.725339: SHA1 IKEv1: IKE IKEv2: FIPS sha Sep 21 07:33:39.725341: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Sep 21 07:33:39.725343: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Sep 21 07:33:39.725345: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Sep 21 07:33:39.725353: PRF algorithms: Sep 21 07:33:39.725355: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Sep 21 07:33:39.725357: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Sep 21 07:33:39.725359: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Sep 21 07:33:39.725361: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Sep 21 07:33:39.725363: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Sep 21 07:33:39.725364: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Sep 21 07:33:39.725379: Integrity algorithms: Sep 21 07:33:39.725381: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Sep 21 07:33:39.725383: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Sep 21 07:33:39.725385: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Sep 21 07:33:39.725388: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Sep 21 07:33:39.725390: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Sep 21 07:33:39.725391: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Sep 21 07:33:39.725394: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Sep 21 07:33:39.725395: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Sep 21 07:33:39.725397: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Sep 21 07:33:39.725405: DH algorithms: Sep 21 07:33:39.725407: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Sep 21 07:33:39.725408: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Sep 21 07:33:39.725410: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Sep 21 07:33:39.725414: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Sep 21 07:33:39.725416: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Sep 21 07:33:39.725418: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Sep 21 07:33:39.725419: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Sep 21 07:33:39.725421: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Sep 21 07:33:39.725423: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Sep 21 07:33:39.725425: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Sep 21 07:33:39.725427: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Sep 21 07:33:39.725428: testing CAMELLIA_CBC: Sep 21 07:33:39.725430: Camellia: 16 bytes with 128-bit key Sep 21 07:33:39.725519: Camellia: 16 bytes with 128-bit key Sep 21 07:33:39.725539: Camellia: 16 bytes with 256-bit key Sep 21 07:33:39.725556: Camellia: 16 bytes with 256-bit key Sep 21 07:33:39.725572: testing AES_GCM_16: Sep 21 07:33:39.725574: empty string Sep 21 07:33:39.725591: one block Sep 21 07:33:39.725607: two blocks Sep 21 07:33:39.725622: two blocks with associated data Sep 21 07:33:39.725638: testing AES_CTR: Sep 21 07:33:39.725639: Encrypting 16 octets using AES-CTR with 128-bit key Sep 21 07:33:39.725655: Encrypting 32 octets using AES-CTR with 128-bit key Sep 21 07:33:39.725671: Encrypting 36 octets using AES-CTR with 128-bit key Sep 21 07:33:39.725688: Encrypting 16 octets using AES-CTR with 192-bit key Sep 21 07:33:39.725704: Encrypting 32 octets using AES-CTR with 192-bit key Sep 21 07:33:39.725720: Encrypting 36 octets using AES-CTR with 192-bit key Sep 21 07:33:39.725736: Encrypting 16 octets using AES-CTR with 256-bit key Sep 21 07:33:39.725751: Encrypting 32 octets using AES-CTR with 256-bit key Sep 21 07:33:39.725767: Encrypting 36 octets using AES-CTR with 256-bit key Sep 21 07:33:39.725789: testing AES_CBC: Sep 21 07:33:39.725791: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Sep 21 07:33:39.725828: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Sep 21 07:33:39.725860: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Sep 21 07:33:39.725877: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Sep 21 07:33:39.725897: testing AES_XCBC: Sep 21 07:33:39.725898: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Sep 21 07:33:39.725971: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Sep 21 07:33:39.726048: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Sep 21 07:33:39.726122: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Sep 21 07:33:39.726197: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Sep 21 07:33:39.726272: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Sep 21 07:33:39.726348: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Sep 21 07:33:39.726512: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Sep 21 07:33:39.726587: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Sep 21 07:33:39.726667: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Sep 21 07:33:39.726857: testing HMAC_MD5: Sep 21 07:33:39.726862: RFC 2104: MD5_HMAC test 1 Sep 21 07:33:39.726965: RFC 2104: MD5_HMAC test 2 Sep 21 07:33:39.727056: RFC 2104: MD5_HMAC test 3 Sep 21 07:33:39.727170: 8 CPU cores online Sep 21 07:33:39.727172: starting up 7 crypto helpers Sep 21 07:33:39.727197: started thread for crypto helper 0 Sep 21 07:33:39.727216: started thread for crypto helper 1 Sep 21 07:33:39.727231: | starting up helper thread 0 Sep 21 07:33:39.727246: | status value returned by setting the priority of this thread (crypto helper 0) 22 Sep 21 07:33:39.727248: | crypto helper 0 waiting (nothing to do) Sep 21 07:33:39.727238: | starting up helper thread 2 Sep 21 07:33:39.727231: started thread for crypto helper 2 Sep 21 07:33:39.727293: started thread for crypto helper 3 Sep 21 07:33:39.727308: started thread for crypto helper 4 Sep 21 07:33:39.727249: | starting up helper thread 1 Sep 21 07:33:39.727345: | starting up helper thread 3 Sep 21 07:33:39.727374: | status value returned by setting the priority of this thread (crypto helper 3) 22 Sep 21 07:33:39.727391: | crypto helper 3 waiting (nothing to do) Sep 21 07:33:39.727321: started thread for crypto helper 5 Sep 21 07:33:39.727441: started thread for crypto helper 6 Sep 21 07:33:39.727446: | checking IKEv1 state table Sep 21 07:33:39.727345: | starting up helper thread 4 Sep 21 07:33:39.727462: | status value returned by setting the priority of this thread (crypto helper 4) 22 Sep 21 07:33:39.727465: | crypto helper 4 waiting (nothing to do) Sep 21 07:33:39.727348: | status value returned by setting the priority of this thread (crypto helper 1) 22 Sep 21 07:33:39.727497: | crypto helper 1 waiting (nothing to do) Sep 21 07:33:39.727352: | starting up helper thread 5 Sep 21 07:33:39.727537: | status value returned by setting the priority of this thread (crypto helper 5) 22 Sep 21 07:33:39.727540: | crypto helper 5 waiting (nothing to do) Sep 21 07:33:39.727270: | status value returned by setting the priority of this thread (crypto helper 2) 22 Sep 21 07:33:39.727452: | MAIN_R0: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727575: | -> MAIN_R1 EVENT_SO_DISCARD Sep 21 07:33:39.727577: | MAIN_I1: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727579: | -> MAIN_I2 EVENT_RETRANSMIT Sep 21 07:33:39.727580: | MAIN_R1: category: open IKE SA flags: 200: Sep 21 07:33:39.727582: | -> MAIN_R2 EVENT_RETRANSMIT Sep 21 07:33:39.727583: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:33:39.727585: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:33:39.727586: | MAIN_I2: category: open IKE SA flags: 0: Sep 21 07:33:39.727588: | -> MAIN_I3 EVENT_RETRANSMIT Sep 21 07:33:39.727589: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:33:39.727590: | -> UNDEFINED EVENT_RETRANSMIT Sep 21 07:33:39.727592: | MAIN_R2: category: open IKE SA flags: 0: Sep 21 07:33:39.727593: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:33:39.727595: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:33:39.727596: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:33:39.727598: | MAIN_I3: category: open IKE SA flags: 0: Sep 21 07:33:39.727599: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:33:39.727600: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:33:39.727602: | -> UNDEFINED EVENT_SA_REPLACE Sep 21 07:33:39.727603: | MAIN_R3: category: established IKE SA flags: 200: Sep 21 07:33:39.727605: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727608: | MAIN_I4: category: established IKE SA flags: 0: Sep 21 07:33:39.727612: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727613: | AGGR_R0: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727615: | -> AGGR_R1 EVENT_SO_DISCARD Sep 21 07:33:39.727616: | AGGR_I1: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727619: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:33:39.727622: | -> AGGR_I2 EVENT_SA_REPLACE Sep 21 07:33:39.727455: | starting up helper thread 6 Sep 21 07:33:39.727570: | crypto helper 2 waiting (nothing to do) Sep 21 07:33:39.727637: | status value returned by setting the priority of this thread (crypto helper 6) 22 Sep 21 07:33:39.727642: | crypto helper 6 waiting (nothing to do) Sep 21 07:33:39.727626: | AGGR_R1: category: open IKE SA flags: 200: Sep 21 07:33:39.727648: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:33:39.727649: | -> AGGR_R2 EVENT_SA_REPLACE Sep 21 07:33:39.727651: | AGGR_I2: category: established IKE SA flags: 200: Sep 21 07:33:39.727652: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727654: | AGGR_R2: category: established IKE SA flags: 0: Sep 21 07:33:39.727655: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727657: | QUICK_R0: category: established CHILD SA flags: 0: Sep 21 07:33:39.727661: | -> QUICK_R1 EVENT_RETRANSMIT Sep 21 07:33:39.727663: | QUICK_I1: category: established CHILD SA flags: 0: Sep 21 07:33:39.727664: | -> QUICK_I2 EVENT_SA_REPLACE Sep 21 07:33:39.727666: | QUICK_R1: category: established CHILD SA flags: 0: Sep 21 07:33:39.727667: | -> QUICK_R2 EVENT_SA_REPLACE Sep 21 07:33:39.727669: | QUICK_I2: category: established CHILD SA flags: 200: Sep 21 07:33:39.727670: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727672: | QUICK_R2: category: established CHILD SA flags: 0: Sep 21 07:33:39.727673: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727675: | INFO: category: informational flags: 0: Sep 21 07:33:39.727676: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727678: | INFO_PROTECTED: category: informational flags: 0: Sep 21 07:33:39.727679: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727680: | XAUTH_R0: category: established IKE SA flags: 0: Sep 21 07:33:39.727682: | -> XAUTH_R1 EVENT_NULL Sep 21 07:33:39.727683: | XAUTH_R1: category: established IKE SA flags: 0: Sep 21 07:33:39.727685: | -> MAIN_R3 EVENT_SA_REPLACE Sep 21 07:33:39.727686: | MODE_CFG_R0: category: informational flags: 0: Sep 21 07:33:39.727688: | -> MODE_CFG_R1 EVENT_SA_REPLACE Sep 21 07:33:39.727689: | MODE_CFG_R1: category: established IKE SA flags: 0: Sep 21 07:33:39.727691: | -> MODE_CFG_R2 EVENT_SA_REPLACE Sep 21 07:33:39.727692: | MODE_CFG_R2: category: established IKE SA flags: 0: Sep 21 07:33:39.727694: | -> UNDEFINED EVENT_NULL Sep 21 07:33:39.727695: | MODE_CFG_I1: category: established IKE SA flags: 0: Sep 21 07:33:39.727697: | -> MAIN_I4 EVENT_SA_REPLACE Sep 21 07:33:39.727698: | XAUTH_I0: category: established IKE SA flags: 0: Sep 21 07:33:39.727700: | -> XAUTH_I1 EVENT_RETRANSMIT Sep 21 07:33:39.727701: | XAUTH_I1: category: established IKE SA flags: 0: Sep 21 07:33:39.727703: | -> MAIN_I4 EVENT_RETRANSMIT Sep 21 07:33:39.727708: | checking IKEv2 state table Sep 21 07:33:39.727712: | PARENT_I0: category: ignore flags: 0: Sep 21 07:33:39.727714: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Sep 21 07:33:39.727716: | PARENT_I1: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727717: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Sep 21 07:33:39.727719: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Sep 21 07:33:39.727721: | PARENT_I2: category: open IKE SA flags: 0: Sep 21 07:33:39.727723: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Sep 21 07:33:39.727724: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Sep 21 07:33:39.727726: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Sep 21 07:33:39.727727: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Sep 21 07:33:39.727729: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Sep 21 07:33:39.727731: | PARENT_I3: category: established IKE SA flags: 0: Sep 21 07:33:39.727732: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Sep 21 07:33:39.727734: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Sep 21 07:33:39.727735: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Sep 21 07:33:39.727737: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Sep 21 07:33:39.727738: | PARENT_R0: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727740: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Sep 21 07:33:39.727742: | PARENT_R1: category: half-open IKE SA flags: 0: Sep 21 07:33:39.727743: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Sep 21 07:33:39.727745: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Sep 21 07:33:39.727747: | PARENT_R2: category: established IKE SA flags: 0: Sep 21 07:33:39.727749: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Sep 21 07:33:39.727751: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Sep 21 07:33:39.727753: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Sep 21 07:33:39.727754: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Sep 21 07:33:39.727756: | V2_CREATE_I0: category: established IKE SA flags: 0: Sep 21 07:33:39.727757: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Sep 21 07:33:39.727759: | V2_CREATE_I: category: established IKE SA flags: 0: Sep 21 07:33:39.727760: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Sep 21 07:33:39.727762: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Sep 21 07:33:39.727764: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Sep 21 07:33:39.727765: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Sep 21 07:33:39.727767: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Sep 21 07:33:39.727769: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Sep 21 07:33:39.727770: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Sep 21 07:33:39.727772: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Sep 21 07:33:39.727774: | V2_CREATE_R: category: established IKE SA flags: 0: Sep 21 07:33:39.727775: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Sep 21 07:33:39.727777: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Sep 21 07:33:39.727779: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Sep 21 07:33:39.727780: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Sep 21 07:33:39.727782: | V2_IPSEC_I: category: established CHILD SA flags: 0: Sep 21 07:33:39.727790: | V2_IPSEC_R: category: established CHILD SA flags: 0: Sep 21 07:33:39.727792: | IKESA_DEL: category: established IKE SA flags: 0: Sep 21 07:33:39.727793: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Sep 21 07:33:39.727795: | CHILDSA_DEL: category: informational flags: 0: Sep 21 07:33:39.727866: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ Sep 21 07:33:39.727915: | Hard-wiring algorithms Sep 21 07:33:39.727918: | adding AES_CCM_16 to kernel algorithm db Sep 21 07:33:39.727920: | adding AES_CCM_12 to kernel algorithm db Sep 21 07:33:39.727922: | adding AES_CCM_8 to kernel algorithm db Sep 21 07:33:39.727923: | adding 3DES_CBC to kernel algorithm db Sep 21 07:33:39.727925: | adding CAMELLIA_CBC to kernel algorithm db Sep 21 07:33:39.727926: | adding AES_GCM_16 to kernel algorithm db Sep 21 07:33:39.727927: | adding AES_GCM_12 to kernel algorithm db Sep 21 07:33:39.727929: | adding AES_GCM_8 to kernel algorithm db Sep 21 07:33:39.727930: | adding AES_CTR to kernel algorithm db Sep 21 07:33:39.727931: | adding AES_CBC to kernel algorithm db Sep 21 07:33:39.727933: | adding SERPENT_CBC to kernel algorithm db Sep 21 07:33:39.727934: | adding TWOFISH_CBC to kernel algorithm db Sep 21 07:33:39.727936: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Sep 21 07:33:39.727937: | adding NULL to kernel algorithm db Sep 21 07:33:39.727939: | adding CHACHA20_POLY1305 to kernel algorithm db Sep 21 07:33:39.727940: | adding HMAC_MD5_96 to kernel algorithm db Sep 21 07:33:39.727941: | adding HMAC_SHA1_96 to kernel algorithm db Sep 21 07:33:39.727943: | adding HMAC_SHA2_512_256 to kernel algorithm db Sep 21 07:33:39.727944: | adding HMAC_SHA2_384_192 to kernel algorithm db Sep 21 07:33:39.727946: | adding HMAC_SHA2_256_128 to kernel algorithm db Sep 21 07:33:39.727947: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Sep 21 07:33:39.727949: | adding AES_XCBC_96 to kernel algorithm db Sep 21 07:33:39.727950: | adding AES_CMAC_96 to kernel algorithm db Sep 21 07:33:39.727952: | adding NONE to kernel algorithm db Sep 21 07:33:39.727968: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Sep 21 07:33:39.727972: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Sep 21 07:33:39.727973: | setup kernel fd callback Sep 21 07:33:39.727975: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x555e54f7a6a0 Sep 21 07:33:39.727977: | libevent_malloc: new ptr-libevent@0x555e54f81660 size 128 Sep 21 07:33:39.727979: | libevent_malloc: new ptr-libevent@0x555e54f758e0 size 16 Sep 21 07:33:39.727983: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x555e54f74b20 Sep 21 07:33:39.727984: | libevent_malloc: new ptr-libevent@0x555e54f816f0 size 128 Sep 21 07:33:39.727986: | libevent_malloc: new ptr-libevent@0x555e54f700c0 size 16 Sep 21 07:33:39.728120: | global one-shot timer EVENT_CHECK_CRLS initialized Sep 21 07:33:39.728126: selinux support is enabled. Sep 21 07:33:39.728185: systemd watchdog not enabled - not sending watchdog keepalives Sep 21 07:33:39.728308: | unbound context created - setting debug level to 5 Sep 21 07:33:39.728328: | /etc/hosts lookups activated Sep 21 07:33:39.728342: | /etc/resolv.conf usage activated Sep 21 07:33:39.728374: | outgoing-port-avoid set 0-65535 Sep 21 07:33:39.728390: | outgoing-port-permit set 32768-60999 Sep 21 07:33:39.728392: | Loading dnssec root key from:/var/lib/unbound/root.key Sep 21 07:33:39.728394: | No additional dnssec trust anchors defined via dnssec-trusted= option Sep 21 07:33:39.728396: | Setting up events, loop start Sep 21 07:33:39.728398: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x555e54f759a0 Sep 21 07:33:39.728399: | libevent_malloc: new ptr-libevent@0x555e54f8bc80 size 128 Sep 21 07:33:39.728401: | libevent_malloc: new ptr-libevent@0x555e54f8bd10 size 16 Sep 21 07:33:39.728405: | libevent_realloc: new ptr-libevent@0x555e54f8bd30 size 256 Sep 21 07:33:39.728407: | libevent_malloc: new ptr-libevent@0x555e54f8be40 size 8 Sep 21 07:33:39.728408: | libevent_realloc: new ptr-libevent@0x555e54f809e0 size 144 Sep 21 07:33:39.728410: | libevent_malloc: new ptr-libevent@0x555e54f8be60 size 152 Sep 21 07:33:39.728412: | libevent_malloc: new ptr-libevent@0x555e54f8bf00 size 16 Sep 21 07:33:39.728415: | signal event handler PLUTO_SIGCHLD installed Sep 21 07:33:39.728416: | libevent_malloc: new ptr-libevent@0x555e54f8bf20 size 8 Sep 21 07:33:39.728418: | libevent_malloc: new ptr-libevent@0x555e54f8bf40 size 152 Sep 21 07:33:39.728420: | signal event handler PLUTO_SIGTERM installed Sep 21 07:33:39.728421: | libevent_malloc: new ptr-libevent@0x555e54f8bfe0 size 8 Sep 21 07:33:39.728423: | libevent_malloc: new ptr-libevent@0x555e54f8c000 size 152 Sep 21 07:33:39.728425: | signal event handler PLUTO_SIGHUP installed Sep 21 07:33:39.728426: | libevent_malloc: new ptr-libevent@0x555e54f8c0a0 size 8 Sep 21 07:33:39.728428: | libevent_realloc: release ptr-libevent@0x555e54f809e0 Sep 21 07:33:39.728429: | libevent_realloc: new ptr-libevent@0x555e54f8c0c0 size 256 Sep 21 07:33:39.728431: | libevent_malloc: new ptr-libevent@0x555e54f809e0 size 152 Sep 21 07:33:39.728433: | signal event handler PLUTO_SIGSYS installed Sep 21 07:33:39.728663: | created addconn helper (pid:24533) using fork+execve Sep 21 07:33:39.728673: | forked child 24533 Sep 21 07:33:39.728702: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:33:39.728714: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:33:39.728720: listening for IKE messages Sep 21 07:33:39.728751: | Inspecting interface lo Sep 21 07:33:39.728756: | found lo with address 127.0.0.1 Sep 21 07:33:39.728758: | Inspecting interface eth0 Sep 21 07:33:39.728760: | found eth0 with address 192.0.2.254 Sep 21 07:33:39.728764: | Inspecting interface eth1 Sep 21 07:33:39.728766: | found eth1 with address 192.1.2.23 Sep 21 07:33:39.728826: Kernel supports NIC esp-hw-offload Sep 21 07:33:39.728837: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Sep 21 07:33:39.728871: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:33:39.728877: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:33:39.728880: adding interface eth1/eth1 192.1.2.23:4500 Sep 21 07:33:39.728902: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Sep 21 07:33:39.728921: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:33:39.728924: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:33:39.728926: adding interface eth0/eth0 192.0.2.254:4500 Sep 21 07:33:39.728949: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Sep 21 07:33:39.728968: | NAT-Traversal: Trying sockopt style NAT-T Sep 21 07:33:39.728971: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Sep 21 07:33:39.728973: adding interface lo/lo 127.0.0.1:4500 Sep 21 07:33:39.729015: | no interfaces to sort Sep 21 07:33:39.729018: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:33:39.729023: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c4a0 Sep 21 07:33:39.729025: | libevent_malloc: new ptr-libevent@0x555e54f8c4e0 size 128 Sep 21 07:33:39.729027: | libevent_malloc: new ptr-libevent@0x555e54f8c570 size 16 Sep 21 07:33:39.729031: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:33:39.729033: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c590 Sep 21 07:33:39.729034: | libevent_malloc: new ptr-libevent@0x555e54f8c5d0 size 128 Sep 21 07:33:39.729036: | libevent_malloc: new ptr-libevent@0x555e54f8c660 size 16 Sep 21 07:33:39.729039: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:33:39.729040: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c680 Sep 21 07:33:39.729042: | libevent_malloc: new ptr-libevent@0x555e54f8c6c0 size 128 Sep 21 07:33:39.729043: | libevent_malloc: new ptr-libevent@0x555e54f8c750 size 16 Sep 21 07:33:39.729047: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Sep 21 07:33:39.729048: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c770 Sep 21 07:33:39.729050: | libevent_malloc: new ptr-libevent@0x555e54f8c7b0 size 128 Sep 21 07:33:39.729051: | libevent_malloc: new ptr-libevent@0x555e54f8c840 size 16 Sep 21 07:33:39.729054: | setup callback for interface eth0 192.0.2.254:500 fd 19 Sep 21 07:33:39.729056: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c860 Sep 21 07:33:39.729057: | libevent_malloc: new ptr-libevent@0x555e54f8c8a0 size 128 Sep 21 07:33:39.729059: | libevent_malloc: new ptr-libevent@0x555e54f8c930 size 16 Sep 21 07:33:39.729062: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Sep 21 07:33:39.729063: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c950 Sep 21 07:33:39.729065: | libevent_malloc: new ptr-libevent@0x555e54f8c990 size 128 Sep 21 07:33:39.729066: | libevent_malloc: new ptr-libevent@0x555e54f8ca20 size 16 Sep 21 07:33:39.729069: | setup callback for interface eth1 192.1.2.23:500 fd 17 Sep 21 07:33:39.729072: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:33:39.729074: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:33:39.729088: loading secrets from "/etc/ipsec.secrets" Sep 21 07:33:39.729101: | saving Modulus Sep 21 07:33:39.729105: | saving PublicExponent Sep 21 07:33:39.729107: | ignoring PrivateExponent Sep 21 07:33:39.729109: | ignoring Prime1 Sep 21 07:33:39.729111: | ignoring Prime2 Sep 21 07:33:39.729112: | ignoring Exponent1 Sep 21 07:33:39.729114: | ignoring Exponent2 Sep 21 07:33:39.729116: | ignoring Coefficient Sep 21 07:33:39.729118: | ignoring CKAIDNSS Sep 21 07:33:39.729138: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:33:39.729140: | computed rsa CKAID 8a 82 25 f1 Sep 21 07:33:39.729142: loaded private key for keyid: PKK_RSA:AQO9bJbr3 Sep 21 07:33:39.729147: | certs and keys locked by 'process_secret' Sep 21 07:33:39.729150: | certs and keys unlocked by 'process_secret' Sep 21 07:33:39.729154: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:33:39.729161: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:33:39.729171: | spent 0.471 milliseconds in whack Sep 21 07:33:39.755667: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:33:39.755686: | pluto_sd: executing action action: reloading(4), status 0 Sep 21 07:33:39.755690: listening for IKE messages Sep 21 07:33:39.755720: | Inspecting interface lo Sep 21 07:33:39.755725: | found lo with address 127.0.0.1 Sep 21 07:33:39.755727: | Inspecting interface eth0 Sep 21 07:33:39.755729: | found eth0 with address 192.0.2.254 Sep 21 07:33:39.755731: | Inspecting interface eth1 Sep 21 07:33:39.755734: | found eth1 with address 192.1.2.23 Sep 21 07:33:39.755789: | no interfaces to sort Sep 21 07:33:39.755798: | libevent_free: release ptr-libevent@0x555e54f8c4e0 Sep 21 07:33:39.755818: | free_event_entry: release EVENT_NULL-pe@0x555e54f8c4a0 Sep 21 07:33:39.755820: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c4a0 Sep 21 07:33:39.755822: | libevent_malloc: new ptr-libevent@0x555e54f8c4e0 size 128 Sep 21 07:33:39.755826: | setup callback for interface lo 127.0.0.1:4500 fd 22 Sep 21 07:33:39.755829: | libevent_free: release ptr-libevent@0x555e54f8c5d0 Sep 21 07:33:39.755830: | free_event_entry: release EVENT_NULL-pe@0x555e54f8c590 Sep 21 07:33:39.755832: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c590 Sep 21 07:33:39.755833: | libevent_malloc: new ptr-libevent@0x555e54f8c5d0 size 128 Sep 21 07:33:39.755837: | setup callback for interface lo 127.0.0.1:500 fd 21 Sep 21 07:33:39.755852: | libevent_free: release ptr-libevent@0x555e54f8c6c0 Sep 21 07:33:39.755853: | free_event_entry: release EVENT_NULL-pe@0x555e54f8c680 Sep 21 07:33:39.755855: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c680 Sep 21 07:33:39.755856: | libevent_malloc: new ptr-libevent@0x555e54f8c6c0 size 128 Sep 21 07:33:39.755859: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Sep 21 07:33:39.755862: | libevent_free: release ptr-libevent@0x555e54f8c7b0 Sep 21 07:33:39.755863: | free_event_entry: release EVENT_NULL-pe@0x555e54f8c770 Sep 21 07:33:39.755864: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c770 Sep 21 07:33:39.755866: | libevent_malloc: new ptr-libevent@0x555e54f8c7b0 size 128 Sep 21 07:33:39.755869: | setup callback for interface eth0 192.0.2.254:500 fd 19 Sep 21 07:33:39.755871: | libevent_free: release ptr-libevent@0x555e54f8c8a0 Sep 21 07:33:39.755873: | free_event_entry: release EVENT_NULL-pe@0x555e54f8c860 Sep 21 07:33:39.755874: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c860 Sep 21 07:33:39.755876: | libevent_malloc: new ptr-libevent@0x555e54f8c8a0 size 128 Sep 21 07:33:39.755878: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Sep 21 07:33:39.755881: | libevent_free: release ptr-libevent@0x555e54f8c990 Sep 21 07:33:39.755882: | free_event_entry: release EVENT_NULL-pe@0x555e54f8c950 Sep 21 07:33:39.755884: | add_fd_read_event_handler: new ethX-pe@0x555e54f8c950 Sep 21 07:33:39.755885: | libevent_malloc: new ptr-libevent@0x555e54f8c990 size 128 Sep 21 07:33:39.755888: | setup callback for interface eth1 192.1.2.23:500 fd 17 Sep 21 07:33:39.755891: | certs and keys locked by 'free_preshared_secrets' Sep 21 07:33:39.755892: forgetting secrets Sep 21 07:33:39.755899: | certs and keys unlocked by 'free_preshared_secrets' Sep 21 07:33:39.755912: loading secrets from "/etc/ipsec.secrets" Sep 21 07:33:39.755922: | saving Modulus Sep 21 07:33:39.755924: | saving PublicExponent Sep 21 07:33:39.755926: | ignoring PrivateExponent Sep 21 07:33:39.755928: | ignoring Prime1 Sep 21 07:33:39.755930: | ignoring Prime2 Sep 21 07:33:39.755931: | ignoring Exponent1 Sep 21 07:33:39.755933: | ignoring Exponent2 Sep 21 07:33:39.755935: | ignoring Coefficient Sep 21 07:33:39.755937: | ignoring CKAIDNSS Sep 21 07:33:39.755949: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Sep 21 07:33:39.755951: | computed rsa CKAID 8a 82 25 f1 Sep 21 07:33:39.755953: loaded private key for keyid: PKK_RSA:AQO9bJbr3 Sep 21 07:33:39.755957: | certs and keys locked by 'process_secret' Sep 21 07:33:39.755961: | certs and keys unlocked by 'process_secret' Sep 21 07:33:39.755965: | pluto_sd: executing action action: ready(5), status 0 Sep 21 07:33:39.755970: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:33:39.755974: | spent 0.311 milliseconds in whack Sep 21 07:33:39.756482: | processing signal PLUTO_SIGCHLD Sep 21 07:33:39.756494: | waitpid returned pid 24533 (exited with status 0) Sep 21 07:33:39.756497: | reaped addconn helper child (status 0) Sep 21 07:33:39.756500: | waitpid returned ECHILD (no child processes left) Sep 21 07:33:39.756503: | spent 0.0137 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:33:39.814417: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) Sep 21 07:33:39.814436: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:33:39.814439: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:33:39.814440: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:33:39.814442: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Sep 21 07:33:39.814445: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:33:39.814450: | Added new connection rw-east-pool-x509-ipv4 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:33:39.814453: | No AUTH policy was set - defaulting to RSASIG Sep 21 07:33:39.814489: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Sep 21 07:33:39.814491: | from whack: got --esp= Sep 21 07:33:39.814513: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Sep 21 07:33:39.814516: | counting wild cards for %fromcert is 0 Sep 21 07:33:39.815022: | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' Sep 21 07:33:39.815034: | loading right certificate 'east' pubkey Sep 21 07:33:39.815109: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8ee60 Sep 21 07:33:39.815113: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8eda0 Sep 21 07:33:39.815115: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8ed70 Sep 21 07:33:39.815116: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8ec80 Sep 21 07:33:39.815117: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8f430 Sep 21 07:33:39.815259: | unreference key: 0x555e54f8efe0 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Sep 21 07:33:39.815377: | certs and keys locked by 'lsw_add_rsa_secret' Sep 21 07:33:39.815381: | certs and keys unlocked by 'lsw_add_rsa_secret' Sep 21 07:33:39.815386: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 Sep 21 07:33:39.815390: | add new addresspool to global pools 192.0.2.100-192.0.2.199 size 100 ptr 0x555e54f353e0 Sep 21 07:33:39.815394: | based upon policy, the connection is a template. Sep 21 07:33:39.815396: | reference addresspool of conn rw-east-pool-x509-ipv4[0] kind CK_TEMPLATE refcnt 0 Sep 21 07:33:39.815400: | connect_to_host_pair: 192.1.2.23:500 0.0.0.0:500 -> hp@(nil): none Sep 21 07:33:39.815402: | new hp@0x555e54f6e170 Sep 21 07:33:39.815405: added connection description "rw-east-pool-x509-ipv4" Sep 21 07:33:39.815413: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Sep 21 07:33:39.815426: | 0.0.0.0/0===192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org,MS+S=C]...%any[%fromcert,+MC+S=C] Sep 21 07:33:39.815432: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Sep 21 07:33:39.815436: | spent 1.02 milliseconds in whack Sep 21 07:33:41.523316: | spent 0.00898 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:41.523420: | *received 828 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:41.523437: | 1b 11 cf 71 60 4f e5 ec 00 00 00 00 00 00 00 00 Sep 21 07:33:41.523447: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Sep 21 07:33:41.523456: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Sep 21 07:33:41.523464: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Sep 21 07:33:41.523473: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Sep 21 07:33:41.523482: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Sep 21 07:33:41.523491: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Sep 21 07:33:41.523499: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Sep 21 07:33:41.523507: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Sep 21 07:33:41.523516: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Sep 21 07:33:41.523525: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Sep 21 07:33:41.523533: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Sep 21 07:33:41.523542: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Sep 21 07:33:41.523549: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Sep 21 07:33:41.523559: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Sep 21 07:33:41.523567: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Sep 21 07:33:41.523576: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Sep 21 07:33:41.523584: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Sep 21 07:33:41.523593: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Sep 21 07:33:41.523602: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Sep 21 07:33:41.523611: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Sep 21 07:33:41.523619: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Sep 21 07:33:41.523627: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Sep 21 07:33:41.523635: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Sep 21 07:33:41.523645: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Sep 21 07:33:41.523653: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Sep 21 07:33:41.523662: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Sep 21 07:33:41.523669: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Sep 21 07:33:41.523677: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Sep 21 07:33:41.523685: | 28 00 01 08 00 0e 00 00 99 60 86 6e 45 99 dd d7 Sep 21 07:33:41.523694: | ea 26 71 a2 8f da 51 65 c0 e9 e9 30 87 03 7f a8 Sep 21 07:33:41.523702: | 70 84 88 5f 39 8c 60 0f b1 d7 9b 17 cd e9 b6 75 Sep 21 07:33:41.523711: | bf c7 92 34 22 9c 75 7e dd e5 0c 09 1f b3 36 82 Sep 21 07:33:41.523720: | cf 61 6d 16 72 bf d7 33 dc 01 4a 76 3e 90 80 b5 Sep 21 07:33:41.523728: | 29 a5 a2 b6 b0 f5 ca fd 15 19 51 f4 85 e2 ff 1d Sep 21 07:33:41.523736: | 4d 4e a0 94 6b 69 fb da 09 f6 32 f0 d6 c8 22 6a Sep 21 07:33:41.523745: | ad 4c b9 41 ee ce 40 90 1f 9f e5 b2 31 fa e9 0f Sep 21 07:33:41.523753: | 75 25 b7 94 aa d7 73 ab 11 d0 85 17 5d 7c a1 d5 Sep 21 07:33:41.523762: | d4 9b dc 43 e2 99 96 ec dc 43 1a bd 87 c5 6b 49 Sep 21 07:33:41.523771: | 90 99 93 88 51 84 da 18 88 33 7b d4 2c 62 11 54 Sep 21 07:33:41.523778: | d6 84 47 d4 be 14 05 e5 9a 37 5a e4 23 99 96 21 Sep 21 07:33:41.523807: | b8 8d 1a ad 40 35 fe 71 30 35 38 98 5d 03 75 60 Sep 21 07:33:41.523823: | 24 b4 ad ab b8 e8 e0 89 b9 74 19 76 55 a9 01 9f Sep 21 07:33:41.523832: | 84 65 5e 70 6c 89 3c ca c0 27 77 79 52 55 d8 67 Sep 21 07:33:41.523841: | 41 e2 d2 ba 28 ec 90 43 9f 80 82 d3 14 14 d2 64 Sep 21 07:33:41.523863: | 2d c9 0b 74 9f 54 29 74 29 00 00 24 f5 5d 63 b2 Sep 21 07:33:41.523873: | 76 6e 49 87 13 d1 ef 97 3a f3 4b a0 3a 0d b6 81 Sep 21 07:33:41.523881: | c8 e0 77 44 15 0d 95 ac 7a 6a 60 f7 29 00 00 08 Sep 21 07:33:41.523890: | 00 00 40 2e 29 00 00 1c 00 00 40 04 42 71 63 fd Sep 21 07:33:41.523898: | 8d 5d 93 6e 27 9e f6 83 ed b1 10 9e c9 89 d0 5e Sep 21 07:33:41.523906: | 00 00 00 1c 00 00 40 05 1c cd 0e 5f 57 18 f2 d0 Sep 21 07:33:41.523913: | 3e 7c 4a 27 fc 97 59 cf 0c 44 9c 35 Sep 21 07:33:41.523937: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:41.523950: | **parse ISAKMP Message: Sep 21 07:33:41.523960: | initiator cookie: Sep 21 07:33:41.523969: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.523977: | responder cookie: Sep 21 07:33:41.523986: | 00 00 00 00 00 00 00 00 Sep 21 07:33:41.523997: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:33:41.524006: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.524016: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Sep 21 07:33:41.524026: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:33:41.524036: | Message ID: 0 (0x0) Sep 21 07:33:41.524045: | length: 828 (0x33c) Sep 21 07:33:41.524056: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Sep 21 07:33:41.524068: | I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request Sep 21 07:33:41.524081: | State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi) Sep 21 07:33:41.524090: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:33:41.524103: | ***parse IKEv2 Security Association Payload: Sep 21 07:33:41.524113: | next payload type: ISAKMP_NEXT_v2KE (0x22) Sep 21 07:33:41.524122: | flags: none (0x0) Sep 21 07:33:41.524130: | length: 436 (0x1b4) Sep 21 07:33:41.524139: | processing payload: ISAKMP_NEXT_v2SA (len=432) Sep 21 07:33:41.524149: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Sep 21 07:33:41.524159: | ***parse IKEv2 Key Exchange Payload: Sep 21 07:33:41.524168: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Sep 21 07:33:41.524176: | flags: none (0x0) Sep 21 07:33:41.524184: | length: 264 (0x108) Sep 21 07:33:41.524194: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.524204: | processing payload: ISAKMP_NEXT_v2KE (len=256) Sep 21 07:33:41.524213: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Sep 21 07:33:41.524222: | ***parse IKEv2 Nonce Payload: Sep 21 07:33:41.524232: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:33:41.524241: | flags: none (0x0) Sep 21 07:33:41.524249: | length: 36 (0x24) Sep 21 07:33:41.524258: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Sep 21 07:33:41.524266: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:33:41.524276: | ***parse IKEv2 Notify Payload: Sep 21 07:33:41.524286: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:33:41.524295: | flags: none (0x0) Sep 21 07:33:41.524303: | length: 8 (0x8) Sep 21 07:33:41.524313: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:33:41.524322: | SPI size: 0 (0x0) Sep 21 07:33:41.524332: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Sep 21 07:33:41.524341: | processing payload: ISAKMP_NEXT_v2N (len=0) Sep 21 07:33:41.524350: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:33:41.524360: | ***parse IKEv2 Notify Payload: Sep 21 07:33:41.524369: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:33:41.524377: | flags: none (0x0) Sep 21 07:33:41.524386: | length: 28 (0x1c) Sep 21 07:33:41.524395: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:33:41.524404: | SPI size: 0 (0x0) Sep 21 07:33:41.524413: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Sep 21 07:33:41.524422: | processing payload: ISAKMP_NEXT_v2N (len=20) Sep 21 07:33:41.524431: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Sep 21 07:33:41.524440: | ***parse IKEv2 Notify Payload: Sep 21 07:33:41.524458: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.524468: | flags: none (0x0) Sep 21 07:33:41.524477: | length: 28 (0x1c) Sep 21 07:33:41.524486: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:33:41.524495: | SPI size: 0 (0x0) Sep 21 07:33:41.524504: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Sep 21 07:33:41.524512: | processing payload: ISAKMP_NEXT_v2N (len=20) Sep 21 07:33:41.524521: | DDOS disabled and no cookie sent, continuing Sep 21 07:33:41.524543: | find_host_connection local=192.1.2.23:500 remote=192.1.3.209:500 policy=ECDSA+IKEV2_ALLOW but ignoring ports Sep 21 07:33:41.524555: | find_next_host_connection policy=ECDSA+IKEV2_ALLOW Sep 21 07:33:41.524564: | find_next_host_connection returns empty Sep 21 07:33:41.524580: | find_host_connection local=192.1.2.23:500 remote= policy=ECDSA+IKEV2_ALLOW but ignoring ports Sep 21 07:33:41.524600: | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports Sep 21 07:33:41.524609: | find_next_host_connection policy=ECDSA+IKEV2_ALLOW Sep 21 07:33:41.524620: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (rw-east-pool-x509-ipv4) Sep 21 07:33:41.524627: | find_next_host_connection returns empty Sep 21 07:33:41.524640: | initial parent SA message received on 192.1.2.23:500 but no connection has been authorized with policy ECDSA+IKEV2_ALLOW Sep 21 07:33:41.524656: | find_host_connection local=192.1.2.23:500 remote=192.1.3.209:500 policy=RSASIG+IKEV2_ALLOW but ignoring ports Sep 21 07:33:41.524665: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Sep 21 07:33:41.524672: | find_next_host_connection returns empty Sep 21 07:33:41.524684: | find_host_connection local=192.1.2.23:500 remote= policy=RSASIG+IKEV2_ALLOW but ignoring ports Sep 21 07:33:41.524699: | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports Sep 21 07:33:41.524707: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Sep 21 07:33:41.524717: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (rw-east-pool-x509-ipv4) Sep 21 07:33:41.524725: | find_next_host_connection returns rw-east-pool-x509-ipv4 Sep 21 07:33:41.524732: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Sep 21 07:33:41.524740: | find_next_host_connection returns empty Sep 21 07:33:41.524747: | rw_instantiate Sep 21 07:33:41.524766: | reference addresspool of conn rw-east-pool-x509-ipv4[1] kind CK_TEMPLATE refcnt 1 Sep 21 07:33:41.524798: | connect_to_host_pair: 192.1.2.23:500 192.1.3.209:500 -> hp@(nil): none Sep 21 07:33:41.524814: | new hp@0x555e54f27bc0 Sep 21 07:33:41.524830: | rw_instantiate() instantiated "rw-east-pool-x509-ipv4"[1] 192.1.3.209 for 192.1.3.209 Sep 21 07:33:41.524842: | found connection: rw-east-pool-x509-ipv4[1] 192.1.3.209 with policy RSASIG+IKEV2_ALLOW Sep 21 07:33:41.524857: | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports Sep 21 07:33:41.524923: | creating state object #1 at 0x555e54f95a80 Sep 21 07:33:41.524936: | State DB: adding IKEv2 state #1 in UNDEFINED Sep 21 07:33:41.524961: | pstats #1 ikev2.ike started Sep 21 07:33:41.524973: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Sep 21 07:33:41.524984: | parent state #1: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA) Sep 21 07:33:41.525002: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:33:41.525026: | #1 spent 1.64 milliseconds Sep 21 07:33:41.525046: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:41.525056: | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) Sep 21 07:33:41.525072: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2064) Sep 21 07:33:41.525081: | #1 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000 Sep 21 07:33:41.525102: | Message ID: #1 not a duplicate - message is new; initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 Sep 21 07:33:41.525116: | Message ID: start-responder #1 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0 Sep 21 07:33:41.525124: | #1 in state PARENT_R0: processing SA_INIT request Sep 21 07:33:41.525132: | selected state microcode Respond to IKE_SA_INIT Sep 21 07:33:41.525139: | Now let's proceed with state specific processing Sep 21 07:33:41.525145: | calling processor Respond to IKE_SA_INIT Sep 21 07:33:41.525156: | #1 spent 1.77 milliseconds Sep 21 07:33:41.525173: | #1 updating local interface from 192.1.2.23:500 to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:33:41.525182: | constructing local IKE proposals for rw-east-pool-x509-ipv4 (IKE SA responder matching remote proposals) Sep 21 07:33:41.525205: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:33:41.525228: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:33:41.525239: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:33:41.525255: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:33:41.525266: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:33:41.525283: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:33:41.525296: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Sep 21 07:33:41.525313: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:33:41.525353: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: constructed local IKE proposals for rw-east-pool-x509-ipv4 (IKE SA responder matching remote proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Sep 21 07:33:41.525367: | Comparing remote proposals against IKE responder 4 local proposals Sep 21 07:33:41.525378: | local proposal 1 type ENCR has 1 transforms Sep 21 07:33:41.525388: | local proposal 1 type PRF has 2 transforms Sep 21 07:33:41.525397: | local proposal 1 type INTEG has 1 transforms Sep 21 07:33:41.525405: | local proposal 1 type DH has 8 transforms Sep 21 07:33:41.525412: | local proposal 1 type ESN has 0 transforms Sep 21 07:33:41.525422: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Sep 21 07:33:41.525430: | local proposal 2 type ENCR has 1 transforms Sep 21 07:33:41.525437: | local proposal 2 type PRF has 2 transforms Sep 21 07:33:41.525445: | local proposal 2 type INTEG has 1 transforms Sep 21 07:33:41.525453: | local proposal 2 type DH has 8 transforms Sep 21 07:33:41.525461: | local proposal 2 type ESN has 0 transforms Sep 21 07:33:41.525480: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Sep 21 07:33:41.525489: | local proposal 3 type ENCR has 1 transforms Sep 21 07:33:41.525497: | local proposal 3 type PRF has 2 transforms Sep 21 07:33:41.525505: | local proposal 3 type INTEG has 2 transforms Sep 21 07:33:41.525512: | local proposal 3 type DH has 8 transforms Sep 21 07:33:41.525520: | local proposal 3 type ESN has 0 transforms Sep 21 07:33:41.525530: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Sep 21 07:33:41.525538: | local proposal 4 type ENCR has 1 transforms Sep 21 07:33:41.525546: | local proposal 4 type PRF has 2 transforms Sep 21 07:33:41.525553: | local proposal 4 type INTEG has 2 transforms Sep 21 07:33:41.525562: | local proposal 4 type DH has 8 transforms Sep 21 07:33:41.525570: | local proposal 4 type ESN has 0 transforms Sep 21 07:33:41.525579: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Sep 21 07:33:41.525590: | ****parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.525599: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:33:41.525607: | length: 100 (0x64) Sep 21 07:33:41.525615: | prop #: 1 (0x1) Sep 21 07:33:41.525623: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:33:41.525631: | spi size: 0 (0x0) Sep 21 07:33:41.525639: | # transforms: 11 (0xb) Sep 21 07:33:41.525651: | Comparing remote proposal 1 containing 11 transforms against local proposal [1..4] of 4 local proposals Sep 21 07:33:41.525661: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.525670: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.525678: | length: 12 (0xc) Sep 21 07:33:41.525686: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.525694: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:33:41.525703: | ******parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.525712: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.525720: | length/value: 256 (0x100) Sep 21 07:33:41.525734: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:33:41.525744: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.525752: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.525759: | length: 8 (0x8) Sep 21 07:33:41.525767: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.525774: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:33:41.525797: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Sep 21 07:33:41.525815: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Sep 21 07:33:41.525826: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 3 type 2 (PRF) transform 0 Sep 21 07:33:41.525836: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 4 type 2 (PRF) transform 0 Sep 21 07:33:41.525844: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.525852: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.525859: | length: 8 (0x8) Sep 21 07:33:41.525867: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.525874: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:33:41.525883: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.525890: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.525897: | length: 8 (0x8) Sep 21 07:33:41.525904: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.525911: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.525921: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Sep 21 07:33:41.525932: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Sep 21 07:33:41.525943: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Sep 21 07:33:41.525963: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Sep 21 07:33:41.525972: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.525980: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.525988: | length: 8 (0x8) Sep 21 07:33:41.525995: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526003: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:33:41.526012: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526019: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526026: | length: 8 (0x8) Sep 21 07:33:41.526033: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526041: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:33:41.526050: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526057: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526065: | length: 8 (0x8) Sep 21 07:33:41.526072: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526081: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:33:41.526089: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526097: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526105: | length: 8 (0x8) Sep 21 07:33:41.526113: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526121: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:33:41.526129: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526137: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526144: | length: 8 (0x8) Sep 21 07:33:41.526151: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526159: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:33:41.526167: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526174: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526181: | length: 8 (0x8) Sep 21 07:33:41.526189: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526196: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:33:41.526204: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526212: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.526220: | length: 8 (0x8) Sep 21 07:33:41.526228: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526236: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:33:41.526248: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Sep 21 07:33:41.526263: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Sep 21 07:33:41.526271: | remote proposal 1 matches local proposal 1 Sep 21 07:33:41.526280: | ****parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.526288: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:33:41.526294: | length: 100 (0x64) Sep 21 07:33:41.526301: | prop #: 2 (0x2) Sep 21 07:33:41.526308: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:33:41.526315: | spi size: 0 (0x0) Sep 21 07:33:41.526323: | # transforms: 11 (0xb) Sep 21 07:33:41.526333: | Comparing remote proposal 2 containing 11 transforms against local proposal [1..0] of 4 local proposals Sep 21 07:33:41.526342: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526350: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526358: | length: 12 (0xc) Sep 21 07:33:41.526366: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.526374: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:33:41.526383: | ******parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.526392: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.526399: | length/value: 128 (0x80) Sep 21 07:33:41.526409: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526417: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526424: | length: 8 (0x8) Sep 21 07:33:41.526443: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.526451: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:33:41.526460: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526468: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526475: | length: 8 (0x8) Sep 21 07:33:41.526483: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.526491: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:33:41.526500: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526508: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526515: | length: 8 (0x8) Sep 21 07:33:41.526523: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526531: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.526539: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526547: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526554: | length: 8 (0x8) Sep 21 07:33:41.526562: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526569: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:33:41.526577: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526585: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526593: | length: 8 (0x8) Sep 21 07:33:41.526600: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526609: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:33:41.526617: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526625: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526633: | length: 8 (0x8) Sep 21 07:33:41.526640: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526648: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:33:41.526657: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526664: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526696: | length: 8 (0x8) Sep 21 07:33:41.526706: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526714: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:33:41.526723: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526731: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526744: | length: 8 (0x8) Sep 21 07:33:41.526752: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526759: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:33:41.526768: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526776: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526793: | length: 8 (0x8) Sep 21 07:33:41.526808: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526816: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:33:41.526825: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526833: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.526841: | length: 8 (0x8) Sep 21 07:33:41.526848: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.526856: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:33:41.526868: | remote proposal 2 proposed transforms: ENCR+PRF+DH; matched: none; unmatched: ENCR+PRF+DH Sep 21 07:33:41.526878: | remote proposal 2 does not match; unmatched remote transforms: ENCR+PRF+DH Sep 21 07:33:41.526886: | ****parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.526908: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:33:41.526913: | length: 116 (0x74) Sep 21 07:33:41.526919: | prop #: 3 (0x3) Sep 21 07:33:41.526925: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:33:41.526930: | spi size: 0 (0x0) Sep 21 07:33:41.526936: | # transforms: 13 (0xd) Sep 21 07:33:41.526944: | Comparing remote proposal 3 containing 13 transforms against local proposal [1..0] of 4 local proposals Sep 21 07:33:41.526950: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.526956: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.526965: | length: 12 (0xc) Sep 21 07:33:41.526971: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.526976: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:33:41.526982: | ******parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.526989: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.526994: | length/value: 256 (0x100) Sep 21 07:33:41.527002: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527008: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527013: | length: 8 (0x8) Sep 21 07:33:41.527019: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.527025: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:33:41.527032: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527037: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527043: | length: 8 (0x8) Sep 21 07:33:41.527048: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.527054: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:33:41.527061: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527067: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527072: | length: 8 (0x8) Sep 21 07:33:41.527078: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.527084: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:33:41.527091: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527097: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527102: | length: 8 (0x8) Sep 21 07:33:41.527108: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.527114: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:33:41.527120: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527126: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527131: | length: 8 (0x8) Sep 21 07:33:41.527137: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527143: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.527150: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527156: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527161: | length: 8 (0x8) Sep 21 07:33:41.527167: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527173: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:33:41.527179: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527185: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527190: | length: 8 (0x8) Sep 21 07:33:41.527196: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527202: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:33:41.527209: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527215: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527221: | length: 8 (0x8) Sep 21 07:33:41.527227: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527233: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:33:41.527239: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527245: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527250: | length: 8 (0x8) Sep 21 07:33:41.527256: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527262: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:33:41.527268: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527274: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527280: | length: 8 (0x8) Sep 21 07:33:41.527286: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527292: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:33:41.527298: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527304: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527310: | length: 8 (0x8) Sep 21 07:33:41.527315: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527325: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:33:41.527331: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527337: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.527342: | length: 8 (0x8) Sep 21 07:33:41.527348: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527354: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:33:41.527363: | remote proposal 3 proposed transforms: ENCR+PRF+INTEG+DH; matched: none; unmatched: ENCR+PRF+INTEG+DH Sep 21 07:33:41.527371: | remote proposal 3 does not match; unmatched remote transforms: ENCR+PRF+INTEG+DH Sep 21 07:33:41.527377: | ****parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.527383: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:33:41.527389: | length: 116 (0x74) Sep 21 07:33:41.527395: | prop #: 4 (0x4) Sep 21 07:33:41.527401: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:33:41.527406: | spi size: 0 (0x0) Sep 21 07:33:41.527411: | # transforms: 13 (0xd) Sep 21 07:33:41.527419: | Comparing remote proposal 4 containing 13 transforms against local proposal [1..0] of 4 local proposals Sep 21 07:33:41.527425: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527430: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527436: | length: 12 (0xc) Sep 21 07:33:41.527442: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.527448: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:33:41.527454: | ******parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.527460: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.527466: | length/value: 128 (0x80) Sep 21 07:33:41.527473: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527479: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527484: | length: 8 (0x8) Sep 21 07:33:41.527490: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.527496: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:33:41.527502: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527508: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527513: | length: 8 (0x8) Sep 21 07:33:41.527519: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.527524: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Sep 21 07:33:41.527531: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527537: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527543: | length: 8 (0x8) Sep 21 07:33:41.527549: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.527554: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:33:41.527561: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527567: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527573: | length: 8 (0x8) Sep 21 07:33:41.527579: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.527584: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:33:41.527591: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527596: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527601: | length: 8 (0x8) Sep 21 07:33:41.527607: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527613: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.527619: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527625: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527630: | length: 8 (0x8) Sep 21 07:33:41.527636: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527642: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Sep 21 07:33:41.527649: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527655: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527660: | length: 8 (0x8) Sep 21 07:33:41.527666: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527672: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Sep 21 07:33:41.527682: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527688: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527693: | length: 8 (0x8) Sep 21 07:33:41.527699: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527705: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Sep 21 07:33:41.527711: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527716: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527722: | length: 8 (0x8) Sep 21 07:33:41.527728: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527734: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Sep 21 07:33:41.527741: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527747: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527752: | length: 8 (0x8) Sep 21 07:33:41.527758: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527764: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Sep 21 07:33:41.527771: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527777: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.527782: | length: 8 (0x8) Sep 21 07:33:41.527799: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527805: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Sep 21 07:33:41.527811: | *****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.527817: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.527822: | length: 8 (0x8) Sep 21 07:33:41.527828: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.527834: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Sep 21 07:33:41.527844: | remote proposal 4 proposed transforms: ENCR+PRF+INTEG+DH; matched: none; unmatched: ENCR+PRF+INTEG+DH Sep 21 07:33:41.527851: | remote proposal 4 does not match; unmatched remote transforms: ENCR+PRF+INTEG+DH Sep 21 07:33:41.527866: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048 chosen from remote proposals 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519[first-match] 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 Sep 21 07:33:41.527877: | accepted IKE proposal ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048 Sep 21 07:33:41.527883: | converting proposal to internal trans attrs Sep 21 07:33:41.527892: | natd_hash: rcookie is zero Sep 21 07:33:41.527919: | natd_hash: hasher=0x555e532847a0(20) Sep 21 07:33:41.527926: | natd_hash: icookie= 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.527932: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Sep 21 07:33:41.527938: | natd_hash: ip= c0 01 02 17 Sep 21 07:33:41.527943: | natd_hash: port= 01 f4 Sep 21 07:33:41.527949: | natd_hash: hash= 1c cd 0e 5f 57 18 f2 d0 3e 7c 4a 27 fc 97 59 cf Sep 21 07:33:41.527954: | natd_hash: hash= 0c 44 9c 35 Sep 21 07:33:41.527959: | natd_hash: rcookie is zero Sep 21 07:33:41.527974: | natd_hash: hasher=0x555e532847a0(20) Sep 21 07:33:41.527979: | natd_hash: icookie= 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.527985: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Sep 21 07:33:41.527990: | natd_hash: ip= c0 01 03 d1 Sep 21 07:33:41.527995: | natd_hash: port= 01 f4 Sep 21 07:33:41.528001: | natd_hash: hash= 42 71 63 fd 8d 5d 93 6e 27 9e f6 83 ed b1 10 9e Sep 21 07:33:41.528006: | natd_hash: hash= c9 89 d0 5e Sep 21 07:33:41.528012: | NAT_TRAVERSAL encaps using auto-detect Sep 21 07:33:41.528026: | NAT_TRAVERSAL this end is NOT behind NAT Sep 21 07:33:41.528032: | NAT_TRAVERSAL that end is NOT behind NAT Sep 21 07:33:41.528040: | NAT_TRAVERSAL nat-keepalive enabled 192.1.3.209 Sep 21 07:33:41.528053: | adding ikev2_inI1outR1 KE work-order 1 for state #1 Sep 21 07:33:41.528060: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555e54f8ecb0 Sep 21 07:33:41.528069: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Sep 21 07:33:41.528077: | libevent_malloc: new ptr-libevent@0x555e54f8edd0 size 128 Sep 21 07:33:41.528103: | #1 spent 2.9 milliseconds in processing: Respond to IKE_SA_INIT in ikev2_process_state_packet() Sep 21 07:33:41.528123: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:33:41.528132: | #1 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_SUSPEND Sep 21 07:33:41.528138: | suspending state #1 and saving MD Sep 21 07:33:41.528143: | #1 is busy; has a suspended MD Sep 21 07:33:41.528147: | crypto helper 0 resuming Sep 21 07:33:41.528173: | crypto helper 0 starting work-order 1 for state #1 Sep 21 07:33:41.528156: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in log_stf_suspend() at ikev2.c:3266) Sep 21 07:33:41.528184: | crypto helper 0 doing build KE and nonce (ikev2_inI1outR1 KE); request ID 1 Sep 21 07:33:41.528202: | "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1 complete v2 state STATE_PARENT_R0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3448 Sep 21 07:33:41.528218: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:41.528228: | #1 spent 4.79 milliseconds in ikev2_process_packet() Sep 21 07:33:41.528238: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:41.528245: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:41.528251: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:41.528260: | spent 4.82 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:41.529988: | crypto helper 0 finished build KE and nonce (ikev2_inI1outR1 KE); request ID 1 time elapsed 0.001804 seconds Sep 21 07:33:41.530013: | (#1) spent 1.8 milliseconds in crypto helper computing work-order 1: ikev2_inI1outR1 KE (pcr) Sep 21 07:33:41.530019: | crypto helper 0 sending results from work-order 1 for state #1 to event queue Sep 21 07:33:41.530024: | scheduling resume sending helper answer for #1 Sep 21 07:33:41.530029: | libevent_malloc: new ptr-libevent@0x7f1a94006900 size 128 Sep 21 07:33:41.530045: | crypto helper 0 waiting (nothing to do) Sep 21 07:33:41.530093: | processing resume sending helper answer for #1 Sep 21 07:33:41.530116: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) Sep 21 07:33:41.530125: | crypto helper 0 replies to request ID 1 Sep 21 07:33:41.530129: | calling continuation function 0x555e531ae630 Sep 21 07:33:41.530134: | ikev2_parent_inI1outR1_continue for #1: calculated ke+nonce, sending R1 Sep 21 07:33:41.530195: | **emit ISAKMP Message: Sep 21 07:33:41.530200: | initiator cookie: Sep 21 07:33:41.530204: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.530208: | responder cookie: Sep 21 07:33:41.530211: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.530215: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.530220: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.530224: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Sep 21 07:33:41.530228: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.530232: | Message ID: 0 (0x0) Sep 21 07:33:41.530237: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.530241: | Emitting ikev2_proposal ... Sep 21 07:33:41.530250: | ***emit IKEv2 Security Association Payload: Sep 21 07:33:41.530254: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.530258: | flags: none (0x0) Sep 21 07:33:41.530263: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:33:41.530267: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530272: | ****emit IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.530276: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:33:41.530280: | prop #: 1 (0x1) Sep 21 07:33:41.530283: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Sep 21 07:33:41.530287: | spi size: 0 (0x0) Sep 21 07:33:41.530291: | # transforms: 3 (0x3) Sep 21 07:33:41.530295: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:33:41.530299: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:33:41.530303: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.530307: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.530311: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:33:41.530315: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:33:41.530320: | ******emit IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.530324: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.530328: | length/value: 256 (0x100) Sep 21 07:33:41.530332: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:33:41.530336: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:33:41.530340: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.530344: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Sep 21 07:33:41.530347: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Sep 21 07:33:41.530352: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.530356: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:33:41.530360: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:33:41.530364: | *****emit IKEv2 Transform Substructure Payload: Sep 21 07:33:41.530368: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.530372: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Sep 21 07:33:41.530375: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.530380: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.530384: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:33:41.530388: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:33:41.530392: | emitting length of IKEv2 Proposal Substructure Payload: 36 Sep 21 07:33:41.530396: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:33:41.530399: | emitting length of IKEv2 Security Association Payload: 40 Sep 21 07:33:41.530403: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:33:41.530409: | ***emit IKEv2 Key Exchange Payload: Sep 21 07:33:41.530413: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.530416: | flags: none (0x0) Sep 21 07:33:41.530420: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Sep 21 07:33:41.530425: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Sep 21 07:33:41.530429: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530437: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Sep 21 07:33:41.530441: | ikev2 g^x 63 27 6b 80 ae 02 c0 f8 8d 45 a5 60 26 d7 36 e4 Sep 21 07:33:41.530444: | ikev2 g^x e9 7a 67 94 42 62 b9 9d 8a 1b 1b 30 9d 3e 59 86 Sep 21 07:33:41.530448: | ikev2 g^x 36 36 5c fc 92 84 f8 79 22 34 f4 a1 d9 14 db 40 Sep 21 07:33:41.530451: | ikev2 g^x 3d cd 58 6d 47 4f 78 99 40 93 25 94 11 75 51 84 Sep 21 07:33:41.530455: | ikev2 g^x 13 ad 28 7a f8 6f 04 3b b0 05 37 b8 23 3f 14 1c Sep 21 07:33:41.530458: | ikev2 g^x 39 39 e1 13 5a 89 8b 99 15 57 d0 32 b5 d0 a0 00 Sep 21 07:33:41.530462: | ikev2 g^x 71 20 37 e7 25 db 62 b2 05 d6 b8 16 a5 97 e1 15 Sep 21 07:33:41.530465: | ikev2 g^x 0c b6 97 41 6a 2f a6 36 59 4a 68 71 e2 1c 79 7f Sep 21 07:33:41.530469: | ikev2 g^x db 99 bf e0 a0 85 0a ea e5 89 39 a7 28 f5 9d b5 Sep 21 07:33:41.530472: | ikev2 g^x 97 74 98 ca 9d 26 94 9f c0 97 7c 4a 3c c0 46 f7 Sep 21 07:33:41.530475: | ikev2 g^x 52 ce 55 28 30 b7 65 c1 47 90 26 b6 df 6a 75 b1 Sep 21 07:33:41.530479: | ikev2 g^x 96 eb 09 43 a2 af 80 5b e2 28 f0 8c 17 de 0d 9a Sep 21 07:33:41.530482: | ikev2 g^x 2f a5 d2 eb 74 5d 2e 8e a6 1b ab 54 41 af b4 b3 Sep 21 07:33:41.530486: | ikev2 g^x 3b db 41 e9 9c 13 d5 96 c2 57 a2 08 5c 0c 70 3a Sep 21 07:33:41.530489: | ikev2 g^x 83 e6 f1 68 fb f5 5d 07 9a 76 b0 d4 f0 a4 84 5f Sep 21 07:33:41.530493: | ikev2 g^x 70 a5 43 93 71 7f d6 0e e7 03 9c 7b 3c e4 41 27 Sep 21 07:33:41.530496: | emitting length of IKEv2 Key Exchange Payload: 264 Sep 21 07:33:41.530500: | ***emit IKEv2 Nonce Payload: Sep 21 07:33:41.530504: | next payload type: ISAKMP_NEXT_v2N (0x29) Sep 21 07:33:41.530508: | flags: none (0x0) Sep 21 07:33:41.530512: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Sep 21 07:33:41.530517: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Sep 21 07:33:41.530521: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530525: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Sep 21 07:33:41.530529: | IKEv2 nonce d9 a2 00 b7 07 86 eb 60 ee 02 8d 7d d1 4f c7 40 Sep 21 07:33:41.530532: | IKEv2 nonce 5c 8a 9a 82 e1 3a 11 6b 90 22 83 9c 87 bd 9a 30 Sep 21 07:33:41.530536: | emitting length of IKEv2 Nonce Payload: 36 Sep 21 07:33:41.530540: | Adding a v2N Payload Sep 21 07:33:41.530544: | ***emit IKEv2 Notify Payload: Sep 21 07:33:41.530547: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.530551: | flags: none (0x0) Sep 21 07:33:41.530555: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:33:41.530558: | SPI size: 0 (0x0) Sep 21 07:33:41.530563: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Sep 21 07:33:41.530567: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:33:41.530571: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530575: | emitting length of IKEv2 Notify Payload: 8 Sep 21 07:33:41.530580: | NAT-Traversal support [enabled] add v2N payloads. Sep 21 07:33:41.530603: | natd_hash: hasher=0x555e532847a0(20) Sep 21 07:33:41.530607: | natd_hash: icookie= 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.530611: | natd_hash: rcookie= 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.530614: | natd_hash: ip= c0 01 02 17 Sep 21 07:33:41.530618: | natd_hash: port= 01 f4 Sep 21 07:33:41.530622: | natd_hash: hash= b8 f5 2b f4 9a 9e 2c 1f 7f 04 e1 9c 12 d7 d5 7e Sep 21 07:33:41.530625: | natd_hash: hash= 14 df ac fe Sep 21 07:33:41.530628: | Adding a v2N Payload Sep 21 07:33:41.530632: | ***emit IKEv2 Notify Payload: Sep 21 07:33:41.530636: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.530639: | flags: none (0x0) Sep 21 07:33:41.530649: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:33:41.530652: | SPI size: 0 (0x0) Sep 21 07:33:41.530656: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Sep 21 07:33:41.530661: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:33:41.530665: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530670: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Sep 21 07:33:41.530675: | Notify data b8 f5 2b f4 9a 9e 2c 1f 7f 04 e1 9c 12 d7 d5 7e Sep 21 07:33:41.530680: | Notify data 14 df ac fe Sep 21 07:33:41.530686: | emitting length of IKEv2 Notify Payload: 28 Sep 21 07:33:41.530703: | natd_hash: hasher=0x555e532847a0(20) Sep 21 07:33:41.530710: | natd_hash: icookie= 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.530716: | natd_hash: rcookie= 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.530721: | natd_hash: ip= c0 01 03 d1 Sep 21 07:33:41.530727: | natd_hash: port= 01 f4 Sep 21 07:33:41.530734: | natd_hash: hash= ed df f1 23 d0 ed 35 f1 18 70 89 3d 99 0f 3b a2 Sep 21 07:33:41.530740: | natd_hash: hash= b8 d4 69 29 Sep 21 07:33:41.530744: | Adding a v2N Payload Sep 21 07:33:41.530748: | ***emit IKEv2 Notify Payload: Sep 21 07:33:41.530751: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.530755: | flags: none (0x0) Sep 21 07:33:41.530759: | Protocol ID: PROTO_v2_RESERVED (0x0) Sep 21 07:33:41.530762: | SPI size: 0 (0x0) Sep 21 07:33:41.530766: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Sep 21 07:33:41.530771: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Sep 21 07:33:41.530775: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530779: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Sep 21 07:33:41.530792: | Notify data ed df f1 23 d0 ed 35 f1 18 70 89 3d 99 0f 3b a2 Sep 21 07:33:41.530803: | Notify data b8 d4 69 29 Sep 21 07:33:41.530807: | emitting length of IKEv2 Notify Payload: 28 Sep 21 07:33:41.530811: | going to send a certreq Sep 21 07:33:41.530815: | connection->kind is not CK_PERMANENT (instance), so collect CAs Sep 21 07:33:41.530823: | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports Sep 21 07:33:41.530827: | Not a roadwarrior instance, sending empty CA in CERTREQ Sep 21 07:33:41.530832: | ***emit IKEv2 Certificate Request Payload: Sep 21 07:33:41.530835: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.530839: | flags: none (0x0) Sep 21 07:33:41.530843: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Sep 21 07:33:41.530848: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Certificate Request Payload (38:ISAKMP_NEXT_v2CERTREQ) Sep 21 07:33:41.530852: | next payload chain: saving location 'IKEv2 Certificate Request Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.530857: | emitting length of IKEv2 Certificate Request Payload: 5 Sep 21 07:33:41.530860: | emitting length of ISAKMP Message: 437 Sep 21 07:33:41.530873: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:33:41.530878: | #1 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_OK Sep 21 07:33:41.530883: | IKEv2: transition from state STATE_PARENT_R0 to state STATE_PARENT_R1 Sep 21 07:33:41.530888: | parent state #1: PARENT_R0(half-open IKE SA) => PARENT_R1(half-open IKE SA) Sep 21 07:33:41.530892: | Message ID: updating counters for #1 to 0 after switching state Sep 21 07:33:41.530900: | Message ID: recv #1 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1 Sep 21 07:33:41.530907: | Message ID: sent #1 response 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1->0 responder.recv=0 wip.initiator=-1 wip.responder=-1 Sep 21 07:33:41.530919: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Sep 21 07:33:41.530926: | sending V2 new request packet to 192.1.3.209:500 (from 192.1.2.23:500) Sep 21 07:33:41.530941: | sending 437 bytes for STATE_PARENT_R0 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:33:41.530945: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.530949: | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 Sep 21 07:33:41.530952: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Sep 21 07:33:41.530955: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Sep 21 07:33:41.530959: | 04 00 00 0e 28 00 01 08 00 0e 00 00 63 27 6b 80 Sep 21 07:33:41.530962: | ae 02 c0 f8 8d 45 a5 60 26 d7 36 e4 e9 7a 67 94 Sep 21 07:33:41.530965: | 42 62 b9 9d 8a 1b 1b 30 9d 3e 59 86 36 36 5c fc Sep 21 07:33:41.530969: | 92 84 f8 79 22 34 f4 a1 d9 14 db 40 3d cd 58 6d Sep 21 07:33:41.530972: | 47 4f 78 99 40 93 25 94 11 75 51 84 13 ad 28 7a Sep 21 07:33:41.530976: | f8 6f 04 3b b0 05 37 b8 23 3f 14 1c 39 39 e1 13 Sep 21 07:33:41.530979: | 5a 89 8b 99 15 57 d0 32 b5 d0 a0 00 71 20 37 e7 Sep 21 07:33:41.530982: | 25 db 62 b2 05 d6 b8 16 a5 97 e1 15 0c b6 97 41 Sep 21 07:33:41.530986: | 6a 2f a6 36 59 4a 68 71 e2 1c 79 7f db 99 bf e0 Sep 21 07:33:41.530989: | a0 85 0a ea e5 89 39 a7 28 f5 9d b5 97 74 98 ca Sep 21 07:33:41.530992: | 9d 26 94 9f c0 97 7c 4a 3c c0 46 f7 52 ce 55 28 Sep 21 07:33:41.530996: | 30 b7 65 c1 47 90 26 b6 df 6a 75 b1 96 eb 09 43 Sep 21 07:33:41.530999: | a2 af 80 5b e2 28 f0 8c 17 de 0d 9a 2f a5 d2 eb Sep 21 07:33:41.531002: | 74 5d 2e 8e a6 1b ab 54 41 af b4 b3 3b db 41 e9 Sep 21 07:33:41.531006: | 9c 13 d5 96 c2 57 a2 08 5c 0c 70 3a 83 e6 f1 68 Sep 21 07:33:41.531009: | fb f5 5d 07 9a 76 b0 d4 f0 a4 84 5f 70 a5 43 93 Sep 21 07:33:41.531012: | 71 7f d6 0e e7 03 9c 7b 3c e4 41 27 29 00 00 24 Sep 21 07:33:41.531016: | d9 a2 00 b7 07 86 eb 60 ee 02 8d 7d d1 4f c7 40 Sep 21 07:33:41.531019: | 5c 8a 9a 82 e1 3a 11 6b 90 22 83 9c 87 bd 9a 30 Sep 21 07:33:41.531023: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Sep 21 07:33:41.531026: | b8 f5 2b f4 9a 9e 2c 1f 7f 04 e1 9c 12 d7 d5 7e Sep 21 07:33:41.531029: | 14 df ac fe 26 00 00 1c 00 00 40 05 ed df f1 23 Sep 21 07:33:41.531033: | d0 ed 35 f1 18 70 89 3d 99 0f 3b a2 b8 d4 69 29 Sep 21 07:33:41.531036: | 00 00 00 05 04 Sep 21 07:33:41.531115: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:33:41.531124: | libevent_free: release ptr-libevent@0x555e54f8edd0 Sep 21 07:33:41.531128: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555e54f8ecb0 Sep 21 07:33:41.531133: | event_schedule: new EVENT_SO_DISCARD-pe@0x555e54f8ecb0 Sep 21 07:33:41.531139: | inserting event EVENT_SO_DISCARD, timeout in 200 seconds for #1 Sep 21 07:33:41.531144: | libevent_malloc: new ptr-libevent@0x555e54f8edd0 size 128 Sep 21 07:33:41.531150: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Sep 21 07:33:41.531160: | #1 spent 0.984 milliseconds in resume sending helper answer Sep 21 07:33:41.531169: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) Sep 21 07:33:41.531174: | libevent_free: release ptr-libevent@0x7f1a94006900 Sep 21 07:33:41.544995: | spent 0.00354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:41.545020: | *received 539 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:41.545024: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545026: | 35 20 23 08 00 00 00 01 00 00 02 1b 23 00 01 ff Sep 21 07:33:41.545028: | 00 01 00 05 0e 89 75 de 82 1b 28 2d 5b 95 2e de Sep 21 07:33:41.545033: | a3 9d 0d 00 d0 6a 17 6b c2 21 f6 0b 46 8d 39 ef Sep 21 07:33:41.545035: | 02 ba e4 fd 47 e8 47 d0 99 c4 58 44 c4 4e 1d d6 Sep 21 07:33:41.545037: | f1 b2 76 68 d8 0b 8f 5b ac 94 04 7d 4a c6 d8 3b Sep 21 07:33:41.545039: | c1 e6 57 c6 d1 79 9c 71 9c f5 d6 bb 45 53 5c 9f Sep 21 07:33:41.545041: | 25 ed d6 1b d1 f6 2e 64 50 96 e6 9e 3b 5b ba fc Sep 21 07:33:41.545043: | b6 2f dc 92 d8 a0 05 80 02 28 93 66 03 52 6f f8 Sep 21 07:33:41.545044: | a6 71 4c 00 88 09 58 3f e4 50 2c e3 00 49 74 34 Sep 21 07:33:41.545046: | d1 d9 01 9f d1 6a f4 e7 c4 e9 78 f6 fb 7b 87 25 Sep 21 07:33:41.545048: | fd 55 bd c8 36 eb da 96 3b 60 ae 34 c1 9c b4 7d Sep 21 07:33:41.545050: | fa e4 99 53 00 2e d8 30 77 e2 9f 29 d6 89 44 ce Sep 21 07:33:41.545052: | 74 31 88 e8 6a ac 12 2d 99 48 f8 53 6f 86 ae 1f Sep 21 07:33:41.545054: | a7 e4 c4 ea 79 e3 73 c6 d1 e5 53 9a 9d 0e b0 d8 Sep 21 07:33:41.545056: | 38 fa 27 80 6a 56 9e 5c bc 30 b4 ef 56 be b7 75 Sep 21 07:33:41.545058: | 15 31 ae 45 3c 81 25 3e ea b2 e9 b8 08 70 a9 fb Sep 21 07:33:41.545060: | 80 ad c1 34 a7 9e f6 f3 70 ad 43 d0 30 67 5a b1 Sep 21 07:33:41.545061: | 67 4e 87 e3 c6 9a 61 d3 63 59 02 e8 6c 1a a6 b5 Sep 21 07:33:41.545063: | db c6 6b 39 22 19 18 38 91 25 08 03 aa 9b d3 49 Sep 21 07:33:41.545065: | 78 74 7e ad 5d fa 3a 51 89 0e fc 4e 10 57 59 79 Sep 21 07:33:41.545067: | e1 3c c6 5d f7 a9 a7 7c 04 38 87 8a 07 b0 c2 84 Sep 21 07:33:41.545069: | 1e bd 6b 79 a3 60 f7 0c 35 d7 8f 27 cb 8c 36 9d Sep 21 07:33:41.545071: | ef 96 ed 31 ac c0 4a cd fa 00 5c 26 c0 7b 6f 14 Sep 21 07:33:41.545073: | 72 66 02 b4 ea 22 99 be 2c 89 e5 bb a4 cf 42 60 Sep 21 07:33:41.545075: | 63 f5 88 33 b9 17 01 5c 58 3c c8 87 f2 d2 bf 6a Sep 21 07:33:41.545077: | cb d2 ba a6 a4 11 18 c6 7b c4 b2 da 6c 32 67 da Sep 21 07:33:41.545079: | 90 a6 3b e9 58 e2 e1 4e 7e 98 0a 38 e8 c8 0d 0d Sep 21 07:33:41.545080: | 61 99 ed f4 13 bb e6 e6 cf 5a 09 6d 2c 3e 0e 9e Sep 21 07:33:41.545082: | c6 48 90 d8 91 1e de aa 75 92 8d dc b7 c9 6f f8 Sep 21 07:33:41.545084: | 52 92 24 59 bf 8e ec 85 0f 12 8b 8e 58 a5 08 b1 Sep 21 07:33:41.545086: | ac f7 c3 55 98 81 f6 82 93 4b 27 b4 66 19 9e fe Sep 21 07:33:41.545088: | ba d5 3f 44 b3 37 38 f5 af cf 87 c6 67 6d 90 78 Sep 21 07:33:41.545090: | d7 77 3e a5 e4 a1 2f c2 ae 03 47 Sep 21 07:33:41.545094: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:41.545097: | **parse ISAKMP Message: Sep 21 07:33:41.545099: | initiator cookie: Sep 21 07:33:41.545101: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.545104: | responder cookie: Sep 21 07:33:41.545105: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545108: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Sep 21 07:33:41.545110: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.545113: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.545115: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:33:41.545117: | Message ID: 1 (0x1) Sep 21 07:33:41.545119: | length: 539 (0x21b) Sep 21 07:33:41.545122: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:33:41.545125: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Sep 21 07:33:41.545128: | State DB: found IKEv2 state #1 in PARENT_R1 (find_v2_ike_sa) Sep 21 07:33:41.545135: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:41.545138: | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) Sep 21 07:33:41.545142: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2064) Sep 21 07:33:41.545145: | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Sep 21 07:33:41.545149: | Message ID: #1 not a duplicate - message is new; initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 Sep 21 07:33:41.545152: | unpacking clear payload Sep 21 07:33:41.545154: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.545157: | ***parse IKEv2 Encrypted Fragment: Sep 21 07:33:41.545159: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Sep 21 07:33:41.545161: | flags: none (0x0) Sep 21 07:33:41.545164: | length: 511 (0x1ff) Sep 21 07:33:41.545166: | fragment number: 1 (0x1) Sep 21 07:33:41.545168: | total fragments: 5 (0x5) Sep 21 07:33:41.545170: | processing payload: ISAKMP_NEXT_v2SKF (len=503) Sep 21 07:33:41.545174: | Message ID: start-responder #1 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=-1->1 Sep 21 07:33:41.545176: | #1 in state PARENT_R1: received v2I1, sent v2R1 Sep 21 07:33:41.545179: | received IKE encrypted fragment number '1', total number '5', next payload '35' Sep 21 07:33:41.545182: | updated IKE fragment state to respond using fragments without waiting for re-transmits Sep 21 07:33:41.545187: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:41.545192: | #1 spent 0.181 milliseconds in ikev2_process_packet() Sep 21 07:33:41.545195: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:41.545198: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:41.545201: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:41.545204: | spent 0.194 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:41.545212: | spent 0.00154 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:41.545220: | *received 539 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:41.545223: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545225: | 35 20 23 08 00 00 00 01 00 00 02 1b 00 00 01 ff Sep 21 07:33:41.545227: | 00 02 00 05 a2 50 d4 37 1f a6 bf 09 4c 2a a8 2a Sep 21 07:33:41.545228: | 78 ec 37 d4 1a cb be 21 27 7e b7 c4 e8 e8 a3 57 Sep 21 07:33:41.545230: | a4 ee ab bf 68 e9 d8 43 bb bd f4 77 8e 0a d5 ae Sep 21 07:33:41.545232: | e8 8f 5b 6b 8a a6 f2 79 d9 d8 52 4f 4d ae 0f 30 Sep 21 07:33:41.545234: | 08 88 25 6e b1 d3 f4 ad 75 6c 5a 3c 9e 7c 77 9e Sep 21 07:33:41.545236: | 40 1e 2e 59 f1 95 7d 6b 8e 31 c4 56 ad d5 a8 af Sep 21 07:33:41.545238: | c8 0e 20 2a e4 5c 90 2d da 4a 11 8e 8f af 22 8b Sep 21 07:33:41.545240: | 34 90 32 d5 6e 5d 17 76 ab 93 3d ef fb e9 e6 a9 Sep 21 07:33:41.545242: | b2 1c 02 27 25 bd 31 4e ab 1e e3 10 92 d2 3b 47 Sep 21 07:33:41.545244: | ff a6 09 25 f2 2b 0e ed a1 f3 8b d6 d2 39 fd c7 Sep 21 07:33:41.545245: | 54 f6 d5 86 78 1c a5 69 e5 b2 67 f0 38 a4 8c 9d Sep 21 07:33:41.545247: | 8f ec e8 64 15 32 b7 7d 80 a0 6b 5d 49 cc 2a 7f Sep 21 07:33:41.545249: | 88 a4 27 7b 3d e1 8f 50 df 5b fe 8b a7 6b ab 13 Sep 21 07:33:41.545251: | 5f 60 83 cb c9 e6 90 ef d4 e7 f3 0c 26 f6 7e 13 Sep 21 07:33:41.545253: | 4b 1a ab b4 f0 49 4f f7 d1 13 ce 55 16 2c a8 99 Sep 21 07:33:41.545255: | 51 00 47 44 6f 49 96 9a f6 6f f1 88 30 03 27 f4 Sep 21 07:33:41.545257: | 87 12 ee e5 84 a9 66 d2 41 9b 14 85 c2 18 b7 85 Sep 21 07:33:41.545259: | 9e 01 27 6e ec 30 b2 3a 12 5f 47 0f d4 f9 ee 9e Sep 21 07:33:41.545261: | 30 41 4d 83 d6 e4 e0 8a 5f b6 4c a8 20 61 8b bf Sep 21 07:33:41.545263: | d0 53 ac bc 9e c3 29 9f ed 72 ca 38 59 d9 ac c9 Sep 21 07:33:41.545264: | 77 fc 04 9f 22 65 3f a6 7b ad b2 b6 48 45 8a 79 Sep 21 07:33:41.545266: | c6 48 89 8e af 0f 4b e3 43 33 c7 a0 15 9f 39 d8 Sep 21 07:33:41.545268: | 60 b1 12 19 c9 f3 ff 79 74 ad a2 16 9d 41 66 49 Sep 21 07:33:41.545270: | 66 c4 d8 f7 1e 70 32 31 33 0b 8a 89 fd e4 84 44 Sep 21 07:33:41.545272: | 76 30 af f8 5d ca a1 6e 83 f4 8a d9 cf f5 09 7b Sep 21 07:33:41.545274: | f4 39 6d 0d bf 41 ce 02 ee 26 81 f6 ce 4f 99 0e Sep 21 07:33:41.545277: | d6 f4 f0 7a ac 43 ce ab 15 94 eb d6 de 5f e9 5b Sep 21 07:33:41.545279: | ee 5e a7 6a 74 74 d8 4f dd a2 6b 57 9c b5 82 05 Sep 21 07:33:41.545281: | c0 e9 79 db 19 9f 68 8b 9e 87 58 51 69 28 ca 3f Sep 21 07:33:41.545283: | fc 95 0d cd 46 c6 73 b8 09 ec de 56 39 4f ab 92 Sep 21 07:33:41.545285: | a4 f3 ad 06 b5 4a 49 28 82 eb 60 53 a9 db d9 f1 Sep 21 07:33:41.545287: | c2 f2 f8 63 38 ab 11 92 24 05 ff Sep 21 07:33:41.545290: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:41.545293: | **parse ISAKMP Message: Sep 21 07:33:41.545295: | initiator cookie: Sep 21 07:33:41.545297: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.545299: | responder cookie: Sep 21 07:33:41.545300: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545303: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Sep 21 07:33:41.545305: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.545307: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.545309: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:33:41.545311: | Message ID: 1 (0x1) Sep 21 07:33:41.545313: | length: 539 (0x21b) Sep 21 07:33:41.545316: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:33:41.545318: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Sep 21 07:33:41.545321: | State DB: found IKEv2 state #1 in PARENT_R1 (find_v2_ike_sa) Sep 21 07:33:41.545326: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:41.545330: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:33:41.545333: | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Sep 21 07:33:41.545335: | #1 is idle Sep 21 07:33:41.545337: | #1 idle Sep 21 07:33:41.545341: | Message ID: #1 not a duplicate - responder is accumulating fragments; initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1 Sep 21 07:33:41.545343: | unpacking clear payload Sep 21 07:33:41.545345: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.545347: | ***parse IKEv2 Encrypted Fragment: Sep 21 07:33:41.545349: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.545351: | flags: none (0x0) Sep 21 07:33:41.545353: | length: 511 (0x1ff) Sep 21 07:33:41.545355: | fragment number: 2 (0x2) Sep 21 07:33:41.545357: | total fragments: 5 (0x5) Sep 21 07:33:41.545359: | processing payload: ISAKMP_NEXT_v2SKF (len=503) Sep 21 07:33:41.545362: | #1 in state PARENT_R1: received v2I1, sent v2R1 Sep 21 07:33:41.545364: | received IKE encrypted fragment number '2', total number '5', next payload '0' Sep 21 07:33:41.545368: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:41.545372: | #1 spent 0.156 milliseconds in ikev2_process_packet() Sep 21 07:33:41.545375: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:41.545378: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:41.545380: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:41.545383: | spent 0.167 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:41.545389: | spent 0.00141 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:41.545396: | *received 539 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:41.545399: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545401: | 35 20 23 08 00 00 00 01 00 00 02 1b 00 00 01 ff Sep 21 07:33:41.545403: | 00 03 00 05 5a 32 0e e1 0c f8 97 78 0d dd bf 86 Sep 21 07:33:41.545404: | 1a 40 35 85 94 23 4a de 10 14 8c 0f f1 87 3e b9 Sep 21 07:33:41.545406: | 07 cd bf e4 ae b0 3c 68 f1 20 a5 e3 5f d0 b2 e0 Sep 21 07:33:41.545410: | 5c fd 5b 49 47 54 45 3d af ba a5 b3 6c 5b 4b 13 Sep 21 07:33:41.545412: | e0 03 42 97 f3 f6 aa 08 41 b3 b3 de a7 65 a9 9b Sep 21 07:33:41.545414: | fc db ef c7 a1 29 f1 c8 e1 6b cc df 7e 55 f9 f1 Sep 21 07:33:41.545416: | 24 0d 52 69 38 27 40 e3 60 90 26 4f b5 86 d5 5a Sep 21 07:33:41.545417: | f2 73 b5 ec a0 54 01 17 d0 57 b7 73 d6 40 1e 8a Sep 21 07:33:41.545419: | 06 47 96 36 24 25 6a c3 ba 91 b7 a8 36 f6 8b b8 Sep 21 07:33:41.545421: | c3 cf bc 46 da 20 42 12 7e b9 24 49 e3 5e db fd Sep 21 07:33:41.545423: | 76 13 86 ca 28 c4 7c 0d 8e 15 e0 bb ce e5 ab cb Sep 21 07:33:41.545425: | 12 60 95 28 2b a6 a4 cc c3 8e e4 9a 8d 4f 07 fb Sep 21 07:33:41.545427: | d7 a4 33 92 9b 20 b6 4c 81 d1 9e 8b 96 25 a7 a7 Sep 21 07:33:41.545429: | cb c2 30 78 e2 96 10 94 5d 1e c7 99 2c 3c 9e ec Sep 21 07:33:41.545431: | d1 4a 88 77 b5 09 0d 01 30 7f 62 d7 c0 31 d4 54 Sep 21 07:33:41.545433: | cb a9 0a 2b 80 b6 78 99 b7 36 20 0b a5 a2 a2 93 Sep 21 07:33:41.545434: | a8 96 e9 1b 00 a5 f1 db 93 0a b2 e7 ef 4d 71 ee Sep 21 07:33:41.545436: | 03 4e e0 a3 2d 1c 2c a3 22 c4 06 09 0a e7 72 43 Sep 21 07:33:41.545438: | ed d5 ef 06 49 0c 3f bd 75 07 3b c1 7f 40 7d 44 Sep 21 07:33:41.545440: | 3a 6a 48 e4 a0 f9 af 59 3e a3 e7 ff 9e fc 6c 09 Sep 21 07:33:41.545442: | 3f ab ed a2 8e 5b 8a 5d 14 3c a2 af 65 99 0b e1 Sep 21 07:33:41.545444: | 77 2d 5a 28 70 02 be ce f0 87 6b 0a 20 da c5 b3 Sep 21 07:33:41.545446: | 35 14 72 a1 90 a2 ae fe d0 8f bf 8f a3 18 ac 6d Sep 21 07:33:41.545448: | c5 f7 6a f0 ab c6 e0 e0 df 64 d7 92 a2 f8 f0 60 Sep 21 07:33:41.545450: | f1 96 ce d7 68 28 ac 79 c6 ac c9 b5 cf d7 58 d1 Sep 21 07:33:41.545452: | f7 8a b0 e9 59 0d 68 d2 ba 90 8d a3 68 45 34 ad Sep 21 07:33:41.545453: | f6 4f 40 b8 fa ad f2 bd 9b 0d 44 ec 5b b9 63 2d Sep 21 07:33:41.545455: | 1f bf 47 06 7d 70 59 51 c5 78 5f f1 fb 0c 19 9d Sep 21 07:33:41.545457: | b9 e4 eb c2 76 4f 68 b9 ad dd 99 2f eb 9e 87 68 Sep 21 07:33:41.545459: | ca e4 fe 16 c1 e0 1f dd 87 fe 65 4a 4b 6e a1 03 Sep 21 07:33:41.545461: | 82 ab ae 5a c1 8c d0 61 e5 a8 0f 09 f7 7e 00 48 Sep 21 07:33:41.545463: | 61 ed 73 b7 b1 7e 75 7e 65 9a 19 Sep 21 07:33:41.545466: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:41.545468: | **parse ISAKMP Message: Sep 21 07:33:41.545470: | initiator cookie: Sep 21 07:33:41.545472: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.545474: | responder cookie: Sep 21 07:33:41.545476: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545478: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Sep 21 07:33:41.545480: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.545483: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.545485: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:33:41.545487: | Message ID: 1 (0x1) Sep 21 07:33:41.545489: | length: 539 (0x21b) Sep 21 07:33:41.545491: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:33:41.545493: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Sep 21 07:33:41.545496: | State DB: found IKEv2 state #1 in PARENT_R1 (find_v2_ike_sa) Sep 21 07:33:41.545501: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:41.545505: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:33:41.545507: | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Sep 21 07:33:41.545509: | #1 is idle Sep 21 07:33:41.545511: | #1 idle Sep 21 07:33:41.545514: | Message ID: #1 not a duplicate - responder is accumulating fragments; initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1 Sep 21 07:33:41.545516: | unpacking clear payload Sep 21 07:33:41.545518: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.545522: | ***parse IKEv2 Encrypted Fragment: Sep 21 07:33:41.545524: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.545526: | flags: none (0x0) Sep 21 07:33:41.545528: | length: 511 (0x1ff) Sep 21 07:33:41.545530: | fragment number: 3 (0x3) Sep 21 07:33:41.545532: | total fragments: 5 (0x5) Sep 21 07:33:41.545534: | processing payload: ISAKMP_NEXT_v2SKF (len=503) Sep 21 07:33:41.545536: | #1 in state PARENT_R1: received v2I1, sent v2R1 Sep 21 07:33:41.545538: | received IKE encrypted fragment number '3', total number '5', next payload '0' Sep 21 07:33:41.545543: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:41.545546: | #1 spent 0.153 milliseconds in ikev2_process_packet() Sep 21 07:33:41.545549: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:41.545552: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:41.545554: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:41.545557: | spent 0.164 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:41.545563: | spent 0.00137 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:41.545570: | *received 539 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:41.545572: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545574: | 35 20 23 08 00 00 00 01 00 00 02 1b 00 00 01 ff Sep 21 07:33:41.545576: | 00 04 00 05 cf b4 42 22 5e de 4c 0f 1e ba d4 11 Sep 21 07:33:41.545578: | ba fb 87 68 02 ff 83 32 44 a0 e8 40 22 88 54 9b Sep 21 07:33:41.545580: | 43 17 c3 5d 6d b5 06 08 e9 7e 4e 78 6f 03 70 39 Sep 21 07:33:41.545582: | e0 af 00 d8 77 47 f7 c8 28 90 4b c3 04 df b1 72 Sep 21 07:33:41.545584: | 04 f6 43 4a 00 3e fc 48 ce 85 65 ad 10 07 c4 0b Sep 21 07:33:41.545586: | 23 6e 53 69 e1 3f 5e fe 3e b9 5c 80 ac 21 61 61 Sep 21 07:33:41.545587: | 41 06 07 6a 51 91 af 93 a9 83 0e fe ce 73 0f 50 Sep 21 07:33:41.545589: | ed dc 1a c1 b6 07 66 5e a6 71 c4 92 62 96 f3 11 Sep 21 07:33:41.545591: | ba a5 ca 77 01 10 68 4c 7d 58 a3 07 3c 38 7b 73 Sep 21 07:33:41.545593: | ba 8e 77 7d 9e ab a9 05 35 ad 94 bc 9f 17 ef 6c Sep 21 07:33:41.545595: | 5a 27 3d cb e7 68 c5 35 b7 46 19 f5 d3 9e 37 66 Sep 21 07:33:41.545597: | c9 22 20 82 fa 9b 24 6a 23 10 ae e2 af da 71 92 Sep 21 07:33:41.545599: | d5 cd 0a 69 08 b2 0e 4b 72 26 a3 65 e1 fc 9b 43 Sep 21 07:33:41.545601: | 49 9c b7 54 cd c9 f9 4e ed aa e3 44 18 94 dc fc Sep 21 07:33:41.545603: | 73 d3 50 a9 d1 85 f1 07 ec e7 7d 21 46 96 bd de Sep 21 07:33:41.545604: | 23 90 f3 f7 88 e2 d2 58 02 ca c2 6e d0 60 bd 52 Sep 21 07:33:41.545606: | fd 09 48 81 cd 8e 15 22 5b d2 35 e6 ba 21 1b a1 Sep 21 07:33:41.545608: | 53 1e ad 43 b2 3d dd a0 63 1f 29 14 46 20 1d e3 Sep 21 07:33:41.545610: | e5 c0 76 7b c9 93 d2 5a 3d b1 40 3a 9a 2a 25 cb Sep 21 07:33:41.545612: | 1c 1c d5 43 3a 47 22 9a f8 47 2c 19 a0 bb cd a3 Sep 21 07:33:41.545614: | 28 91 85 b2 02 bb da 7c 8f 31 dc 9b 21 e9 38 b8 Sep 21 07:33:41.545616: | 75 93 36 e8 39 89 7b b7 f7 61 c7 bd e2 24 9f 9f Sep 21 07:33:41.545618: | f4 0b 42 8c 1d 79 7f 7a 79 fb 06 d5 bd 59 42 ed Sep 21 07:33:41.545620: | 91 18 ef 86 a5 eb 76 8b 67 86 dd 0a 27 b7 37 b9 Sep 21 07:33:41.545622: | b2 e0 98 bb 36 21 1c 2d 78 4e 1c 82 d2 1e 9d 9e Sep 21 07:33:41.545623: | f0 6d b9 52 75 28 8f 12 66 ce 31 9a c6 5d 62 2a Sep 21 07:33:41.545625: | f8 d8 a7 05 ad c4 b8 31 b8 62 b4 a8 1e e7 15 b0 Sep 21 07:33:41.545627: | dd 3d 25 86 5a fe 59 af 9d 8d 98 40 7b 13 cd 5c Sep 21 07:33:41.545629: | 45 4b 70 33 e1 68 d2 a7 9d cd a6 e9 05 89 23 4c Sep 21 07:33:41.545631: | 8a 25 45 7c e0 9f a5 63 a1 59 4e 1b 62 d3 b1 a8 Sep 21 07:33:41.545633: | 58 55 b5 27 a0 77 1e b5 65 cd 3c 74 8e 10 72 0f Sep 21 07:33:41.545635: | 33 fb 69 27 f3 87 60 7a cb 63 cf Sep 21 07:33:41.545641: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:41.545643: | **parse ISAKMP Message: Sep 21 07:33:41.545645: | initiator cookie: Sep 21 07:33:41.545647: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.545649: | responder cookie: Sep 21 07:33:41.545651: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545653: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Sep 21 07:33:41.545655: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.545658: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.545660: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:33:41.545662: | Message ID: 1 (0x1) Sep 21 07:33:41.545664: | length: 539 (0x21b) Sep 21 07:33:41.545666: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:33:41.545668: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Sep 21 07:33:41.545671: | State DB: found IKEv2 state #1 in PARENT_R1 (find_v2_ike_sa) Sep 21 07:33:41.545676: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:41.545680: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:33:41.545682: | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Sep 21 07:33:41.545684: | #1 is idle Sep 21 07:33:41.545686: | #1 idle Sep 21 07:33:41.545690: | Message ID: #1 not a duplicate - responder is accumulating fragments; initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1 Sep 21 07:33:41.545691: | unpacking clear payload Sep 21 07:33:41.545693: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.545696: | ***parse IKEv2 Encrypted Fragment: Sep 21 07:33:41.545698: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.545700: | flags: none (0x0) Sep 21 07:33:41.545702: | length: 511 (0x1ff) Sep 21 07:33:41.545704: | fragment number: 4 (0x4) Sep 21 07:33:41.545705: | total fragments: 5 (0x5) Sep 21 07:33:41.545708: | processing payload: ISAKMP_NEXT_v2SKF (len=503) Sep 21 07:33:41.545710: | #1 in state PARENT_R1: received v2I1, sent v2R1 Sep 21 07:33:41.545712: | received IKE encrypted fragment number '4', total number '5', next payload '0' Sep 21 07:33:41.545716: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:41.545720: | #1 spent 0.153 milliseconds in ikev2_process_packet() Sep 21 07:33:41.545723: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:41.545725: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:41.545727: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:41.545730: | spent 0.164 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:41.545736: | spent 0.00138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:41.545743: | *received 397 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:41.545746: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545748: | 35 20 23 08 00 00 00 01 00 00 01 8d 00 00 01 71 Sep 21 07:33:41.545750: | 00 05 00 05 ef ed f5 86 3c ff a9 64 87 7b ed 5d Sep 21 07:33:41.545751: | 4c 0c 93 a8 7c 8a 98 b7 aa 3e 01 2a 9a a9 fa 73 Sep 21 07:33:41.545753: | e7 ca 82 66 5c 91 6b 5e f7 36 73 ec 06 dd 27 74 Sep 21 07:33:41.545755: | 71 d4 70 00 bd 1f fa ac 9e 7d af 7c a1 22 10 d0 Sep 21 07:33:41.545757: | b6 97 91 a3 1e 49 35 1e 51 67 58 05 30 13 23 39 Sep 21 07:33:41.545759: | 67 55 56 2e ab a0 04 bf 0a eb 5b c8 6d c0 2e 50 Sep 21 07:33:41.545761: | 8f 75 e3 b4 84 b5 7b 34 ee 17 bf 99 bc 14 73 82 Sep 21 07:33:41.545763: | 08 a9 5d c4 7d a2 35 58 02 32 92 89 f0 d4 0b ee Sep 21 07:33:41.545765: | 3d 0f 85 a4 d6 2f 91 7f af 56 45 1b 20 45 88 7a Sep 21 07:33:41.545768: | a2 ae ad 6f 5f 2b 64 ad 00 bd 54 11 4e 4a 29 70 Sep 21 07:33:41.545770: | 1e 9c 9a b3 9b 93 10 b5 05 ae 1f eb d6 a3 e0 02 Sep 21 07:33:41.545772: | 91 f4 84 f1 f9 44 6c 2f d9 8e a2 1b c1 c7 7a fc Sep 21 07:33:41.545774: | 1a 2c ac 82 8f 14 8f 7f 36 95 9d d1 9e af 2d f5 Sep 21 07:33:41.545776: | 2c db 8e a5 14 5b 01 ce de 19 c6 8b 9d 1b 78 65 Sep 21 07:33:41.545778: | 71 b7 09 7b 58 ac b2 3b ec 86 ad 13 b5 b8 23 74 Sep 21 07:33:41.545780: | 57 cf c1 76 50 92 83 76 4b 2b 9d a0 6c d2 9b 94 Sep 21 07:33:41.545782: | 2a 1f 1f 8e 5f 3c d3 fa 42 f3 ee 96 4e 82 3b 18 Sep 21 07:33:41.545793: | fb b8 da 2d 73 c9 71 e4 01 9f 8c 73 1c 3e b4 c2 Sep 21 07:33:41.545796: | 2f f3 2d 1b 79 09 83 0b 21 22 b1 1a 2a cf cc bb Sep 21 07:33:41.545798: | ab 9f d8 41 76 61 7e 49 59 25 c9 e2 8e 7c 7c c4 Sep 21 07:33:41.545799: | 91 48 88 4f b7 04 8c 67 4c b0 4e ab c8 fa 02 a7 Sep 21 07:33:41.545801: | 57 08 8e 6d 1f 91 7c 29 09 1c 64 5b c3 2c 90 94 Sep 21 07:33:41.545803: | 82 49 b1 f0 0b fa 04 13 77 ba 29 20 28 Sep 21 07:33:41.545807: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:41.545809: | **parse ISAKMP Message: Sep 21 07:33:41.545811: | initiator cookie: Sep 21 07:33:41.545813: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.545815: | responder cookie: Sep 21 07:33:41.545817: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.545819: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Sep 21 07:33:41.545821: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.545823: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.545825: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Sep 21 07:33:41.545827: | Message ID: 1 (0x1) Sep 21 07:33:41.545829: | length: 397 (0x18d) Sep 21 07:33:41.545831: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Sep 21 07:33:41.545834: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Sep 21 07:33:41.545836: | State DB: found IKEv2 state #1 in PARENT_R1 (find_v2_ike_sa) Sep 21 07:33:41.545842: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:41.545846: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:33:41.545848: | #1 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Sep 21 07:33:41.545850: | #1 is idle Sep 21 07:33:41.545852: | #1 idle Sep 21 07:33:41.545855: | Message ID: #1 not a duplicate - responder is accumulating fragments; initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1 Sep 21 07:33:41.545857: | unpacking clear payload Sep 21 07:33:41.545859: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.545861: | ***parse IKEv2 Encrypted Fragment: Sep 21 07:33:41.545863: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.545865: | flags: none (0x0) Sep 21 07:33:41.545867: | length: 369 (0x171) Sep 21 07:33:41.545869: | fragment number: 5 (0x5) Sep 21 07:33:41.545871: | total fragments: 5 (0x5) Sep 21 07:33:41.545873: | processing payload: ISAKMP_NEXT_v2SKF (len=361) Sep 21 07:33:41.545875: | #1 in state PARENT_R1: received v2I1, sent v2R1 Sep 21 07:33:41.545878: | received IKE encrypted fragment number '5', total number '5', next payload '0' Sep 21 07:33:41.545884: | selected state microcode Responder: process IKE_AUTH request (no SKEYSEED) Sep 21 07:33:41.545886: | Now let's proceed with state specific processing Sep 21 07:33:41.545888: | calling processor Responder: process IKE_AUTH request (no SKEYSEED) Sep 21 07:33:41.545891: | ikev2 parent inI2outR2: calculating g^{xy} in order to decrypt I2 Sep 21 07:33:41.545897: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 Sep 21 07:33:41.545900: | adding ikev2_inI2outR2 KE work-order 2 for state #1 Sep 21 07:33:41.545904: | state #1 requesting EVENT_SO_DISCARD to be deleted Sep 21 07:33:41.545907: | libevent_free: release ptr-libevent@0x555e54f8edd0 Sep 21 07:33:41.545910: | free_event_entry: release EVENT_SO_DISCARD-pe@0x555e54f8ecb0 Sep 21 07:33:41.545913: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555e54f8ecb0 Sep 21 07:33:41.545916: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Sep 21 07:33:41.545919: | libevent_malloc: new ptr-libevent@0x555e54f8edd0 size 128 Sep 21 07:33:41.545929: | #1 spent 0.0371 milliseconds in processing: Responder: process IKE_AUTH request (no SKEYSEED) in ikev2_process_state_packet() Sep 21 07:33:41.545934: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:33:41.545938: | #1 complete_v2_state_transition() PARENT_R1->PARENT_R1 with status STF_SUSPEND Sep 21 07:33:41.545940: | suspending state #1 and saving MD Sep 21 07:33:41.545942: | #1 is busy; has a suspended MD Sep 21 07:33:41.545941: | crypto helper 3 resuming Sep 21 07:33:41.545958: | crypto helper 3 starting work-order 2 for state #1 Sep 21 07:33:41.545946: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in log_stf_suspend() at ikev2.c:3266) Sep 21 07:33:41.545968: | crypto helper 3 doing compute dh (V2) (ikev2_inI2outR2 KE); request ID 2 Sep 21 07:33:41.545977: | "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1 complete v2 state STATE_PARENT_R1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3448 Sep 21 07:33:41.545990: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:41.545995: | #1 spent 0.239 milliseconds in ikev2_process_packet() Sep 21 07:33:41.545998: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:41.546000: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:41.546003: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:41.546006: | spent 0.251 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:41.547285: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 Sep 21 07:33:41.547803: | crypto helper 3 finished compute dh (V2) (ikev2_inI2outR2 KE); request ID 2 time elapsed 0.001835 seconds Sep 21 07:33:41.547814: | (#1) spent 1.83 milliseconds in crypto helper computing work-order 2: ikev2_inI2outR2 KE (pcr) Sep 21 07:33:41.547817: | crypto helper 3 sending results from work-order 2 for state #1 to event queue Sep 21 07:33:41.547821: | scheduling resume sending helper answer for #1 Sep 21 07:33:41.547824: | libevent_malloc: new ptr-libevent@0x7f1a8c006b90 size 128 Sep 21 07:33:41.547833: | crypto helper 3 waiting (nothing to do) Sep 21 07:33:41.547872: | processing resume sending helper answer for #1 Sep 21 07:33:41.547884: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) Sep 21 07:33:41.547888: | crypto helper 3 replies to request ID 2 Sep 21 07:33:41.547890: | calling continuation function 0x555e531ae630 Sep 21 07:33:41.547892: | ikev2_parent_inI2outR2_continue for #1: calculating g^{xy}, sending R2 Sep 21 07:33:41.547894: | #1 in state PARENT_R1: received v2I1, sent v2R1 Sep 21 07:33:41.547896: | already have all fragments, skipping fragment collection Sep 21 07:33:41.547898: | already have all fragments, skipping fragment collection Sep 21 07:33:41.547915: | #1 ikev2 ISAKMP_v2_IKE_AUTH decrypt success Sep 21 07:33:41.547917: | Now let's proceed with payload (ISAKMP_NEXT_v2IDi) Sep 21 07:33:41.547920: | **parse IKEv2 Identification - Initiator - Payload: Sep 21 07:33:41.547922: | next payload type: ISAKMP_NEXT_v2CERT (0x25) Sep 21 07:33:41.547924: | flags: none (0x0) Sep 21 07:33:41.547926: | length: 191 (0xbf) Sep 21 07:33:41.547931: | ID type: ID_DER_ASN1_DN (0x9) Sep 21 07:33:41.547933: | processing payload: ISAKMP_NEXT_v2IDi (len=183) Sep 21 07:33:41.547935: | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) Sep 21 07:33:41.547937: | **parse IKEv2 Certificate Payload: Sep 21 07:33:41.547939: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) Sep 21 07:33:41.547941: | flags: none (0x0) Sep 21 07:33:41.547942: | length: 1229 (0x4cd) Sep 21 07:33:41.547944: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Sep 21 07:33:41.547946: | processing payload: ISAKMP_NEXT_v2CERT (len=1224) Sep 21 07:33:41.547948: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) Sep 21 07:33:41.547950: | **parse IKEv2 Certificate Request Payload: Sep 21 07:33:41.547952: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Sep 21 07:33:41.547954: | flags: none (0x0) Sep 21 07:33:41.547955: | length: 5 (0x5) Sep 21 07:33:41.547957: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Sep 21 07:33:41.547959: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) Sep 21 07:33:41.547961: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) Sep 21 07:33:41.547963: | **parse IKEv2 Identification - Responder - Payload: Sep 21 07:33:41.547965: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Sep 21 07:33:41.547966: | flags: none (0x0) Sep 21 07:33:41.547968: | length: 191 (0xbf) Sep 21 07:33:41.547970: | ID type: ID_DER_ASN1_DN (0x9) Sep 21 07:33:41.547972: | processing payload: ISAKMP_NEXT_v2IDr (len=183) Sep 21 07:33:41.547973: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) Sep 21 07:33:41.547976: | **parse IKEv2 Authentication Payload: Sep 21 07:33:41.547977: | next payload type: ISAKMP_NEXT_v2CP (0x2f) Sep 21 07:33:41.547979: | flags: none (0x0) Sep 21 07:33:41.547981: | length: 392 (0x188) Sep 21 07:33:41.547983: | auth method: IKEv2_AUTH_RSA (0x1) Sep 21 07:33:41.547984: | processing payload: ISAKMP_NEXT_v2AUTH (len=384) Sep 21 07:33:41.547986: | Now let's proceed with payload (ISAKMP_NEXT_v2CP) Sep 21 07:33:41.547988: | **parse IKEv2 Configuration Payload: Sep 21 07:33:41.547990: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:33:41.547992: | flags: none (0x0) Sep 21 07:33:41.547993: | length: 28 (0x1c) Sep 21 07:33:41.547995: | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) Sep 21 07:33:41.547997: | processing payload: ISAKMP_NEXT_v2CP (len=20) Sep 21 07:33:41.547999: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Sep 21 07:33:41.548001: | **parse IKEv2 Security Association Payload: Sep 21 07:33:41.548003: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Sep 21 07:33:41.548004: | flags: none (0x0) Sep 21 07:33:41.548006: | length: 164 (0xa4) Sep 21 07:33:41.548008: | processing payload: ISAKMP_NEXT_v2SA (len=160) Sep 21 07:33:41.548010: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Sep 21 07:33:41.548011: | **parse IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:33:41.548013: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Sep 21 07:33:41.548015: | flags: none (0x0) Sep 21 07:33:41.548017: | length: 24 (0x18) Sep 21 07:33:41.548019: | number of TS: 1 (0x1) Sep 21 07:33:41.548020: | processing payload: ISAKMP_NEXT_v2TSi (len=16) Sep 21 07:33:41.548022: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Sep 21 07:33:41.548024: | **parse IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:33:41.548026: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.548028: | flags: none (0x0) Sep 21 07:33:41.548029: | length: 24 (0x18) Sep 21 07:33:41.548031: | number of TS: 1 (0x1) Sep 21 07:33:41.548033: | processing payload: ISAKMP_NEXT_v2TSr (len=16) Sep 21 07:33:41.548035: | selected state microcode Responder: process IKE_AUTH request Sep 21 07:33:41.548036: | Now let's proceed with state specific processing Sep 21 07:33:41.548038: | calling processor Responder: process IKE_AUTH request Sep 21 07:33:41.548044: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: processing decrypted IKE_AUTH request: SK{IDi,CERT,CERTREQ,IDr,AUTH,CP,SA,TSi,TSr} Sep 21 07:33:41.548049: | #1 updating local interface from 192.1.2.23:500 to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) Sep 21 07:33:41.548054: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds Sep 21 07:33:41.548057: loading root certificate cache Sep 21 07:33:41.551288: | spent 3.21 milliseconds in get_root_certs() calling PK11_ListCertsInSlot() Sep 21 07:33:41.551316: | spent 0.018 milliseconds in get_root_certs() filtering CAs Sep 21 07:33:41.551321: | #1 spent 3.26 milliseconds in find_and_verify_certs() calling get_root_certs() Sep 21 07:33:41.551324: | checking for known CERT payloads Sep 21 07:33:41.551326: | saving certificate of type 'X509_SIGNATURE' Sep 21 07:33:41.551838: | decoded cert: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Sep 21 07:33:41.551849: | #1 spent 0.52 milliseconds in find_and_verify_certs() calling decode_cert_payloads() Sep 21 07:33:41.551854: | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Sep 21 07:33:41.551890: | #1 spent 0.0346 milliseconds in find_and_verify_certs() calling crl_update_check() Sep 21 07:33:41.551893: | missing or expired CRL Sep 21 07:33:41.551896: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 Sep 21 07:33:41.551898: | verify_end_cert trying profile IPsec Sep 21 07:33:41.551991: | certificate is valid (profile IPsec) Sep 21 07:33:41.551997: | #1 spent 0.1 milliseconds in find_and_verify_certs() calling verify_end_cert() Sep 21 07:33:41.552002: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: certificate verified OK: E=user-road@testing.libreswan.org,CN=road.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Sep 21 07:33:41.552071: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8eda0 Sep 21 07:33:41.552075: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8efb0 Sep 21 07:33:41.552076: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x555e54f8ed70 Sep 21 07:33:41.552174: | unreference key: 0x555e54f98010 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- Sep 21 07:33:41.552180: | #1 spent 0.175 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() Sep 21 07:33:41.552183: | #1 spent 4.12 milliseconds in decode_certs() Sep 21 07:33:41.552186: | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Sep 21 07:33:41.552187: | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Sep 21 07:33:41.552189: | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Sep 21 07:33:41.552190: | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Sep 21 07:33:41.552192: | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Sep 21 07:33:41.552193: | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Sep 21 07:33:41.552195: | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 72 6f 61 Sep 21 07:33:41.552196: | DER ASN1 DN: 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Sep 21 07:33:41.552198: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Sep 21 07:33:41.552199: | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 72 6f 61 Sep 21 07:33:41.552201: | DER ASN1 DN: 64 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Sep 21 07:33:41.552202: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 Sep 21 07:33:41.552204: | received IDr payload - extracting our alleged ID Sep 21 07:33:41.552206: | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Sep 21 07:33:41.552207: | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Sep 21 07:33:41.552209: | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Sep 21 07:33:41.552210: | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Sep 21 07:33:41.552212: | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Sep 21 07:33:41.552216: | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Sep 21 07:33:41.552217: | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 Sep 21 07:33:41.552219: | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Sep 21 07:33:41.552220: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Sep 21 07:33:41.552222: | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 Sep 21 07:33:41.552223: | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Sep 21 07:33:41.552225: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 Sep 21 07:33:41.552228: | ID_DER_ASN1_DN '%fromcert' does not need further ID verification Sep 21 07:33:41.552229: | stomping on peer_id Sep 21 07:33:41.552231: | X509: CERT and ID matches current connection Sep 21 07:33:41.552233: | CERT_X509_SIGNATURE CR: Sep 21 07:33:41.552234: | Sep 21 07:33:41.552236: | requested CA: '%any' Sep 21 07:33:41.552239: | refine_host_connection for IKEv2: starting with "rw-east-pool-x509-ipv4"[1] 192.1.3.209 Sep 21 07:33:41.552245: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Sep 21 07:33:41.552251: | match_id a=C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org Sep 21 07:33:41.552256: | b=C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org Sep 21 07:33:41.552257: | results matched Sep 21 07:33:41.552262: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Sep 21 07:33:41.552266: | refine_host_connection: checking "rw-east-pool-x509-ipv4"[1] 192.1.3.209 against "rw-east-pool-x509-ipv4"[1] 192.1.3.209, best=(none) with match=1(id=1(0)/ca=1(7)/reqca=1(0)) Sep 21 07:33:41.552268: | Warning: not switching back to template of current instance Sep 21 07:33:41.552273: | Peer expects us to be C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org (ID_DER_ASN1_DN) according to its IDr payload Sep 21 07:33:41.552278: | This connection's local id is C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org (ID_DER_ASN1_DN) Sep 21 07:33:41.552286: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: No matching subjectAltName found for '=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Sep 21 07:33:41.552289: | IDr payload 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' is NOT a valid certificate SAN for this connection Sep 21 07:33:41.552292: | refine_host_connection: checked rw-east-pool-x509-ipv4[1] 192.1.3.209 against rw-east-pool-x509-ipv4[1] 192.1.3.209, now for see if best Sep 21 07:33:41.552300: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org of kind PKK_RSA Sep 21 07:33:41.552337: | searching for certificate PKK_RSA:AwEAAbANn vs PKK_RSA:AwEAAbANn Sep 21 07:33:41.552342: | refine_host_connection: picking new best "rw-east-pool-x509-ipv4"[1] 192.1.3.209 (wild=0, peer_pathlen=7/our=0) Sep 21 07:33:41.552344: | refine going into 2nd loop allowing instantiated conns as well Sep 21 07:33:41.552347: | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports Sep 21 07:33:41.552353: | match_id a=C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org Sep 21 07:33:41.552355: | b=%fromcert Sep 21 07:33:41.552358: | results fail Sep 21 07:33:41.552363: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Sep 21 07:33:41.552366: | refine_host_connection: checking "rw-east-pool-x509-ipv4"[1] 192.1.3.209 against "rw-east-pool-x509-ipv4", best=rw-east-pool-x509-ipv4 with match=0(id=0(0)/ca=1(7)/reqca=1(0)) Sep 21 07:33:41.552368: | Warning: not switching back to template of current instance Sep 21 07:33:41.552373: | Peer expects us to be C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org (ID_DER_ASN1_DN) according to its IDr payload Sep 21 07:33:41.552378: | This connection's local id is C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org (ID_DER_ASN1_DN) Sep 21 07:33:41.552385: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: No matching subjectAltName found for '=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Sep 21 07:33:41.552387: | IDr payload 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' is NOT a valid certificate SAN for this connection Sep 21 07:33:41.552390: | refine_host_connection: checked rw-east-pool-x509-ipv4[1] 192.1.3.209 against rw-east-pool-x509-ipv4, now for see if best Sep 21 07:33:41.552395: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->%fromcert of kind PKK_RSA Sep 21 07:33:41.552429: | searching for certificate PKK_RSA:AwEAAbANn vs PKK_RSA:AwEAAbANn Sep 21 07:33:41.552432: | returning since no better match than original best_found Sep 21 07:33:41.552437: | offered CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Sep 21 07:33:41.552443: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: IKEv2 mode peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' Sep 21 07:33:41.552458: | received CERTREQ payload; going to decode it Sep 21 07:33:41.552460: | CERT_X509_SIGNATURE CR: Sep 21 07:33:41.552462: | Sep 21 07:33:41.552463: | requested CA: '%any' Sep 21 07:33:41.552465: | verifying AUTH payload Sep 21 07:33:41.552473: | required RSA CA is '%any' Sep 21 07:33:41.552482: | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' Sep 21 07:33:41.552487: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Sep 21 07:33:41.552492: | RSA key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Sep 21 07:33:41.552607: | an RSA Sig check passed with *AwEAAaqjE [remote certificates] Sep 21 07:33:41.552613: | #1 spent 0.117 milliseconds in try_all_keys() trying a pubkey Sep 21 07:33:41.552616: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: Authenticated using RSA Sep 21 07:33:41.552618: | #1 spent 0.151 milliseconds in ikev2_verify_rsa_hash() Sep 21 07:33:41.552621: | parent state #1: PARENT_R1(half-open IKE SA) => PARENT_R2(established IKE SA) Sep 21 07:33:41.552624: | #1 will start re-keying in 3330 seconds with margin of 270 seconds (attempting re-key) Sep 21 07:33:41.552626: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Sep 21 07:33:41.552629: | libevent_free: release ptr-libevent@0x555e54f8edd0 Sep 21 07:33:41.552630: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555e54f8ecb0 Sep 21 07:33:41.552635: | event_schedule: new EVENT_SA_REKEY-pe@0x555e54f9e300 Sep 21 07:33:41.552637: | inserting event EVENT_SA_REKEY, timeout in 3330 seconds for #1 Sep 21 07:33:41.552639: | libevent_malloc: new ptr-libevent@0x555e54f8edd0 size 128 Sep 21 07:33:41.552725: | pstats #1 ikev2.ike established Sep 21 07:33:41.552731: | **emit ISAKMP Message: Sep 21 07:33:41.552733: | initiator cookie: Sep 21 07:33:41.552734: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.552736: | responder cookie: Sep 21 07:33:41.552737: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.552739: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.552741: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.552743: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.552745: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.552747: | Message ID: 1 (0x1) Sep 21 07:33:41.552749: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.552751: | IKEv2 CERT: send a certificate? Sep 21 07:33:41.552752: | IKEv2 CERT: OK to send a certificate (always) Sep 21 07:33:41.552754: | ***emit IKEv2 Encryption Payload: Sep 21 07:33:41.552756: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.552758: | flags: none (0x0) Sep 21 07:33:41.552762: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:33:41.552768: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.552772: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:33:41.552780: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Sep 21 07:33:41.552799: | ****emit IKEv2 Identification - Responder - Payload: Sep 21 07:33:41.552806: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.552809: | flags: none (0x0) Sep 21 07:33:41.552812: | ID type: ID_DER_ASN1_DN (0x9) Sep 21 07:33:41.552817: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Sep 21 07:33:41.552821: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.552825: | emitting 183 raw bytes of my identity into IKEv2 Identification - Responder - Payload Sep 21 07:33:41.552828: | my identity 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Sep 21 07:33:41.552831: | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Sep 21 07:33:41.552834: | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Sep 21 07:33:41.552837: | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Sep 21 07:33:41.552839: | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Sep 21 07:33:41.552841: | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Sep 21 07:33:41.552843: | my identity 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 Sep 21 07:33:41.552845: | my identity 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Sep 21 07:33:41.552846: | my identity 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Sep 21 07:33:41.552848: | my identity 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 Sep 21 07:33:41.552849: | my identity 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Sep 21 07:33:41.552851: | my identity 77 61 6e 2e 6f 72 67 Sep 21 07:33:41.552853: | emitting length of IKEv2 Identification - Responder - Payload: 191 Sep 21 07:33:41.552859: | assembled IDr payload Sep 21 07:33:41.552862: | Sending [CERT] of certificate: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Sep 21 07:33:41.552863: | ****emit IKEv2 Certificate Payload: Sep 21 07:33:41.552865: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.552867: | flags: none (0x0) Sep 21 07:33:41.552869: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Sep 21 07:33:41.552874: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) Sep 21 07:33:41.552876: | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.552879: | emitting 1260 raw bytes of CERT into IKEv2 Certificate Payload Sep 21 07:33:41.552880: | CERT 30 82 04 e8 30 82 04 51 a0 03 02 01 02 02 01 03 Sep 21 07:33:41.552882: | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 Sep 21 07:33:41.552883: | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 Sep 21 07:33:41.552885: | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 Sep 21 07:33:41.552886: | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f Sep 21 07:33:41.552888: | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 Sep 21 07:33:41.552889: | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b Sep 21 07:33:41.552891: | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e Sep 21 07:33:41.552892: | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 Sep 21 07:33:41.552894: | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f Sep 21 07:33:41.552895: | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 Sep 21 07:33:41.552897: | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 Sep 21 07:33:41.552898: | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 Sep 21 07:33:41.552900: | CERT 18 0f 32 30 31 39 30 39 31 35 31 39 34 34 35 39 Sep 21 07:33:41.552901: | CERT 5a 18 0f 32 30 32 32 30 39 31 34 31 39 34 34 35 Sep 21 07:33:41.552903: | CERT 39 5a 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 Sep 21 07:33:41.552904: | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 Sep 21 07:33:41.552906: | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 Sep 21 07:33:41.552907: | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c Sep 21 07:33:41.552909: | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 Sep 21 07:33:41.552910: | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 Sep 21 07:33:41.552912: | CERT 6d 65 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 Sep 21 07:33:41.552913: | CERT 61 73 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 Sep 21 07:33:41.552915: | CERT 65 73 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a Sep 21 07:33:41.552916: | CERT 86 48 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 Sep 21 07:33:41.552918: | CERT 61 73 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 Sep 21 07:33:41.552919: | CERT 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 0d 06 Sep 21 07:33:41.552921: | CERT 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f Sep 21 07:33:41.552923: | CERT 00 30 82 01 8a 02 82 01 81 00 b0 0d 9e ca 2d 55 Sep 21 07:33:41.552926: | CERT 24 59 06 37 09 58 0d 06 ab 90 5e 98 7c 00 0b 66 Sep 21 07:33:41.552931: | CERT 73 f4 12 27 69 75 6e d4 8d 13 e9 c6 e9 4f c4 b1 Sep 21 07:33:41.552934: | CERT 19 1a 1a 4f e6 4e 06 da 29 ec cf 8d 4c c3 c3 57 Sep 21 07:33:41.552936: | CERT c0 24 57 83 7a 1b 7f 96 a3 21 66 67 52 68 8e 77 Sep 21 07:33:41.552938: | CERT b9 bb f6 9b d2 43 11 57 c9 d6 ca e2 39 73 93 ea Sep 21 07:33:41.552941: | CERT 99 99 f7 52 38 4d 58 69 7f a5 18 9b ff 66 72 6c Sep 21 07:33:41.552943: | CERT df 6d df 18 50 cf 10 98 a3 f5 f9 69 27 5b 3f bd Sep 21 07:33:41.552946: | CERT 0f 34 18 93 99 1a be 8a 46 84 37 69 71 7f a7 df Sep 21 07:33:41.552949: | CERT d0 9d b2 9d ad 80 0f d0 1a 40 cb ff 37 20 ac ac Sep 21 07:33:41.552951: | CERT 3d a9 8e 56 56 cf 25 c0 5e 55 52 86 5a c5 b4 ce Sep 21 07:33:41.552953: | CERT a8 dd 95 cf ab 38 91 f6 1f 9f 83 36 d5 3f 8c d3 Sep 21 07:33:41.552956: | CERT 1d f5 3f 23 3c d2 5c 87 23 bc 6a 67 f7 00 c3 96 Sep 21 07:33:41.552958: | CERT 3f 76 5c b9 8e 6f 2b 16 90 2c 00 c0 05 a0 e2 8d Sep 21 07:33:41.552960: | CERT 57 d5 76 34 7f 6f be e8 48 79 08 91 a8 17 72 1f Sep 21 07:33:41.552962: | CERT c0 1c 8a 52 a8 18 aa 32 3c 9a e4 d9 90 58 25 5e Sep 21 07:33:41.552964: | CERT 4c 49 8e cb 7a 33 19 d2 87 1a 2a 8e b5 04 f7 f9 Sep 21 07:33:41.552969: | CERT cd 80 8c 59 ae 34 61 c5 1d de 53 65 fe 4f f3 f4 Sep 21 07:33:41.552972: | CERT 09 f2 b4 21 7a 2b eb 1f 4a f2 5f 85 3a f0 f8 2b Sep 21 07:33:41.552975: | CERT 3b 42 5b da 89 c1 ef b2 81 18 2a 4b 57 a2 ca 63 Sep 21 07:33:41.552977: | CERT 8b a7 60 8e 54 95 c3 20 5c e5 53 f0 4a 57 df 41 Sep 21 07:33:41.552980: | CERT fa 06 e6 ab 4e 0b 46 49 14 0d db b0 dc 10 2e 6d Sep 21 07:33:41.552982: | CERT 5f 52 cb 75 36 1b e2 1d 9d 77 0f 73 9d 0a 64 07 Sep 21 07:33:41.552985: | CERT 84 f4 0e 0a 98 97 58 c4 40 f6 1b ac a3 be 21 aa Sep 21 07:33:41.552987: | CERT 67 3a 2b b1 0e b7 9a 36 ff 67 02 03 01 00 01 a3 Sep 21 07:33:41.552990: | CERT 82 01 06 30 82 01 02 30 09 06 03 55 1d 13 04 02 Sep 21 07:33:41.552992: | CERT 30 00 30 47 06 03 55 1d 11 04 40 30 3e 82 1a 65 Sep 21 07:33:41.552994: | CERT 61 73 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 Sep 21 07:33:41.552997: | CERT 65 73 77 61 6e 2e 6f 72 67 81 1a 65 61 73 74 40 Sep 21 07:33:41.553000: | CERT 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 Sep 21 07:33:41.553002: | CERT 6e 2e 6f 72 67 87 04 c0 01 02 17 30 0b 06 03 55 Sep 21 07:33:41.553004: | CERT 1d 0f 04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 Sep 21 07:33:41.553007: | CERT 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b Sep 21 07:33:41.553009: | CERT 06 01 05 05 07 03 02 30 41 06 08 2b 06 01 05 05 Sep 21 07:33:41.553012: | CERT 07 01 01 04 35 30 33 30 31 06 08 2b 06 01 05 05 Sep 21 07:33:41.553014: | CERT 07 30 01 86 25 68 74 74 70 3a 2f 2f 6e 69 63 2e Sep 21 07:33:41.553016: | CERT 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 Sep 21 07:33:41.553019: | CERT 6e 2e 6f 72 67 3a 32 35 36 30 30 3d 06 03 55 1d Sep 21 07:33:41.553021: | CERT 1f 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 Sep 21 07:33:41.553024: | CERT 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 69 6e 67 2e Sep 21 07:33:41.553026: | CERT 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 2f 72 65 Sep 21 07:33:41.553029: | CERT 76 6f 6b 65 64 2e 63 72 6c 30 0d 06 09 2a 86 48 Sep 21 07:33:41.553031: | CERT 86 f7 0d 01 01 0b 05 00 03 81 81 00 bf 3c 12 c5 Sep 21 07:33:41.553033: | CERT 00 3e 71 2a 2b 2b 60 83 b9 b9 f2 4d b1 ca 0e fd Sep 21 07:33:41.553036: | CERT b4 e0 0b 6a ad 54 d7 c9 98 57 e0 5c 26 4d bf 11 Sep 21 07:33:41.553038: | CERT 23 20 79 05 b6 1b 9b 09 ed 4f 2e fd 7e da 55 53 Sep 21 07:33:41.553040: | CERT b6 8c 88 fa f3 9b ce ec ef 95 37 11 70 ce 1c 98 Sep 21 07:33:41.553043: | CERT d3 d5 cf f6 30 71 44 78 fb 45 03 69 50 d5 a5 c3 Sep 21 07:33:41.553045: | CERT de 00 4c f7 0a 7d 00 cb 3a ab 11 74 6b 57 67 4d Sep 21 07:33:41.553048: | CERT e7 c0 3a 97 98 44 e2 15 9d f2 6f 1b c7 b1 15 d0 Sep 21 07:33:41.553050: | CERT 88 c4 dc 32 b7 72 1d 9c ac 1b 37 63 Sep 21 07:33:41.553053: | emitting length of IKEv2 Certificate Payload: 1265 Sep 21 07:33:41.553056: | CHILD SA proposals received Sep 21 07:33:41.553058: | going to assemble AUTH payload Sep 21 07:33:41.553061: | ****emit IKEv2 Authentication Payload: Sep 21 07:33:41.553063: | next payload type: ISAKMP_NEXT_v2CP (0x2f) Sep 21 07:33:41.553066: | flags: none (0x0) Sep 21 07:33:41.553069: | auth method: IKEv2_AUTH_RSA (0x1) Sep 21 07:33:41.553072: | next payload chain: ignoring supplied 'IKEv2 Authentication Payload'.'next payload type' value 47:ISAKMP_NEXT_v2CP Sep 21 07:33:41.553075: | next payload chain: setting previous 'IKEv2 Certificate Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Sep 21 07:33:41.553079: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.553094: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org of kind PKK_RSA Sep 21 07:33:41.553170: | searching for certificate PKK_RSA:AwEAAbANn vs PKK_RSA:AwEAAbANn Sep 21 07:33:41.559255: | #1 spent 6.05 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() Sep 21 07:33:41.559263: | emitting 384 raw bytes of rsa signature into IKEv2 Authentication Payload Sep 21 07:33:41.559265: | rsa signature 8f a5 7a 6d f9 67 78 95 78 56 e6 c6 54 3e 80 1b Sep 21 07:33:41.559267: | rsa signature f2 22 a8 9a 35 d1 e6 ad 24 ba 0f f1 ff 1b 2c 89 Sep 21 07:33:41.559268: | rsa signature 37 d7 e9 6a 5b da 76 ed 4b 45 b4 09 33 81 e2 e4 Sep 21 07:33:41.559269: | rsa signature a4 35 6d 2e c7 38 ed 21 da f0 a0 2d a4 35 37 ef Sep 21 07:33:41.559271: | rsa signature f2 d0 3c 2f 93 ee 53 da 82 ff a0 d5 a7 d2 7c 6e Sep 21 07:33:41.559272: | rsa signature 2f fc 54 39 dd d5 91 9c 12 d4 5d 2c 78 e1 e7 e6 Sep 21 07:33:41.559274: | rsa signature 84 2e a1 ec 73 14 5d 81 5e 3f 83 e6 87 38 a8 4e Sep 21 07:33:41.559275: | rsa signature 17 75 14 6e ca bd 7a 6c 94 88 78 91 35 06 18 ed Sep 21 07:33:41.559276: | rsa signature 83 5c 8b 5a 3d 6f 08 fc 5f b1 bf 77 58 d5 a2 a0 Sep 21 07:33:41.559278: | rsa signature fe c8 e3 9e 0b 81 9c 3f 04 ac 1b b3 fc 1c 09 5f Sep 21 07:33:41.559279: | rsa signature 07 b1 bd ea e8 8b c9 6f b2 5d 30 1a 72 6d 38 6a Sep 21 07:33:41.559280: | rsa signature 8a c2 60 ba 50 25 43 0f bc d7 b1 b6 bd f8 9c 88 Sep 21 07:33:41.559282: | rsa signature c7 80 f1 30 b3 f9 c9 f6 40 47 d2 39 88 f8 f6 4e Sep 21 07:33:41.559283: | rsa signature 53 b0 c0 49 05 52 3b 62 ec 0c 2f 7a 63 55 de 1d Sep 21 07:33:41.559284: | rsa signature 8a e4 03 5d ed 84 5b ea b3 92 f5 48 c4 03 19 7e Sep 21 07:33:41.559286: | rsa signature f9 04 da 08 37 4d 2e ec c5 72 1c df 87 f8 41 6b Sep 21 07:33:41.559287: | rsa signature 2d a4 1e 7b 8d 9d 90 e9 db 29 a3 3f ae 65 35 91 Sep 21 07:33:41.559289: | rsa signature 12 dc 46 55 63 85 a0 98 8b 23 cf d0 a5 61 dd e6 Sep 21 07:33:41.559290: | rsa signature 3b 8f 27 ed 20 74 0a 48 35 71 0c 76 f4 21 aa 92 Sep 21 07:33:41.559291: | rsa signature 9b b8 93 ef 1d b4 a5 e2 52 3b ac 9c 14 41 f9 ba Sep 21 07:33:41.559293: | rsa signature a6 ff 28 84 ea 1b 90 95 81 29 df e7 55 d2 55 73 Sep 21 07:33:41.559294: | rsa signature cb 1d 2c 13 08 e4 9e b8 f4 a9 71 3b 58 e4 fd 7a Sep 21 07:33:41.559295: | rsa signature e7 f2 fd b0 6c d2 fa 5f 84 a2 24 6c 48 4e 70 3b Sep 21 07:33:41.559297: | rsa signature bb a0 31 f4 a7 ac 6a cf 33 39 99 9b 72 af 4c f2 Sep 21 07:33:41.559299: | #1 spent 6.2 milliseconds in ikev2_calculate_rsa_hash() Sep 21 07:33:41.559301: | emitting length of IKEv2 Authentication Payload: 392 Sep 21 07:33:41.559306: | request lease from addresspool 192.0.2.100-192.0.2.199 reference count 2 thatid '' that.client 192.1.3.209/32:0 Sep 21 07:33:41.559307: | addresspool can share this lease Sep 21 07:33:41.559313: | in share_lease: no lingering addresspool lease for 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' Sep 21 07:33:41.559314: | addresspool can share this lease Sep 21 07:33:41.559316: | New lease from addresspool index 0 Sep 21 07:33:41.559323: | new lease 192.0.2.100 from addresspool 192.0.2.100-192.0.2.199 to that.client 192.1.3.209/32:0 thatid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' Sep 21 07:33:41.559326: | creating state object #2 at 0x555e54fa7770 Sep 21 07:33:41.559328: | State DB: adding IKEv2 state #2 in UNDEFINED Sep 21 07:33:41.559330: | pstats #2 ikev2.child started Sep 21 07:33:41.559333: | duplicating state object #1 "rw-east-pool-x509-ipv4"[1] 192.1.3.209 as #2 for IPSEC SA Sep 21 07:33:41.559336: | #2 setting local endpoint to 192.1.2.23:500 from #1.st_localport (in duplicate_state() at state.c:1481) Sep 21 07:33:41.559339: | Message ID: init_child #1.#2; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0; child: wip.initiator=0->-1 wip.responder=0->-1 Sep 21 07:33:41.559342: | Message ID: switch-from #1 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0 wip.initiator=-1 wip.responder=1->-1 Sep 21 07:33:41.559347: | Message ID: switch-to #1.#2 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0; child: wip.initiator=-1 wip.responder=-1->1 Sep 21 07:33:41.559349: | Send Configuration Payload reply Sep 21 07:33:41.559351: | ****emit IKEv2 Configuration Payload: Sep 21 07:33:41.559353: | next payload type: ISAKMP_NEXT_v2SA (0x21) Sep 21 07:33:41.559354: | flags: none (0x0) Sep 21 07:33:41.559356: | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) Sep 21 07:33:41.559358: | next payload chain: ignoring supplied 'IKEv2 Configuration Payload'.'next payload type' value 33:ISAKMP_NEXT_v2SA Sep 21 07:33:41.559360: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) Sep 21 07:33:41.559362: | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.559363: | *****emit IKEv2 Configuration Payload Attribute: Sep 21 07:33:41.559365: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) Sep 21 07:33:41.559367: | emitting 4 raw bytes of Internal IP Address into IKEv2 Configuration Payload Attribute Sep 21 07:33:41.559368: | Internal IP Address c0 00 02 64 Sep 21 07:33:41.559370: | emitting length of IKEv2 Configuration Payload Attribute: 4 Sep 21 07:33:41.559371: | emitting length of IKEv2 Configuration Payload: 16 Sep 21 07:33:41.559374: | constructing ESP/AH proposals with all DH removed for rw-east-pool-x509-ipv4 (IKE_AUTH responder matching remote ESP/AH proposals) Sep 21 07:33:41.559377: | converting proposal AES_GCM_16_256-NONE to ikev2 ... Sep 21 07:33:41.559381: | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED Sep 21 07:33:41.559383: | converting proposal AES_GCM_16_128-NONE to ikev2 ... Sep 21 07:33:41.559385: | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED Sep 21 07:33:41.559387: | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Sep 21 07:33:41.559390: | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:33:41.559391: | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Sep 21 07:33:41.559394: | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:33:41.559399: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: constructed local ESP/AH proposals for rw-east-pool-x509-ipv4 (IKE_AUTH responder matching remote ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Sep 21 07:33:41.559401: | Comparing remote proposals against IKE_AUTH responder matching remote ESP/AH proposals 4 local proposals Sep 21 07:33:41.559403: | local proposal 1 type ENCR has 1 transforms Sep 21 07:33:41.559404: | local proposal 1 type PRF has 0 transforms Sep 21 07:33:41.559406: | local proposal 1 type INTEG has 1 transforms Sep 21 07:33:41.559407: | local proposal 1 type DH has 1 transforms Sep 21 07:33:41.559409: | local proposal 1 type ESN has 1 transforms Sep 21 07:33:41.559411: | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH Sep 21 07:33:41.559412: | local proposal 2 type ENCR has 1 transforms Sep 21 07:33:41.559414: | local proposal 2 type PRF has 0 transforms Sep 21 07:33:41.559415: | local proposal 2 type INTEG has 1 transforms Sep 21 07:33:41.559417: | local proposal 2 type DH has 1 transforms Sep 21 07:33:41.559418: | local proposal 2 type ESN has 1 transforms Sep 21 07:33:41.559420: | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH Sep 21 07:33:41.559421: | local proposal 3 type ENCR has 1 transforms Sep 21 07:33:41.559424: | local proposal 3 type PRF has 0 transforms Sep 21 07:33:41.559425: | local proposal 3 type INTEG has 2 transforms Sep 21 07:33:41.559427: | local proposal 3 type DH has 1 transforms Sep 21 07:33:41.559428: | local proposal 3 type ESN has 1 transforms Sep 21 07:33:41.559430: | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH Sep 21 07:33:41.559432: | local proposal 4 type ENCR has 1 transforms Sep 21 07:33:41.559433: | local proposal 4 type PRF has 0 transforms Sep 21 07:33:41.559434: | local proposal 4 type INTEG has 2 transforms Sep 21 07:33:41.559436: | local proposal 4 type DH has 1 transforms Sep 21 07:33:41.559437: | local proposal 4 type ESN has 1 transforms Sep 21 07:33:41.559439: | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH Sep 21 07:33:41.559441: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.559443: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:33:41.559444: | length: 32 (0x20) Sep 21 07:33:41.559446: | prop #: 1 (0x1) Sep 21 07:33:41.559447: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:33:41.559448: | spi size: 4 (0x4) Sep 21 07:33:41.559450: | # transforms: 2 (0x2) Sep 21 07:33:41.559452: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:33:41.559453: | remote SPI 0d 3b 5a c2 Sep 21 07:33:41.559455: | Comparing remote proposal 1 containing 2 transforms against local proposal [1..4] of 4 local proposals Sep 21 07:33:41.559457: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559459: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559460: | length: 12 (0xc) Sep 21 07:33:41.559462: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.559463: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:33:41.559465: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.559466: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.559468: | length/value: 256 (0x100) Sep 21 07:33:41.559471: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Sep 21 07:33:41.559472: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559474: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.559475: | length: 8 (0x8) Sep 21 07:33:41.559477: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:33:41.559478: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:33:41.559480: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Sep 21 07:33:41.559482: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 0 Sep 21 07:33:41.559484: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 3 type 5 (ESN) transform 0 Sep 21 07:33:41.559486: | remote proposal 1 transform 1 (ESN=DISABLED) matches local proposal 4 type 5 (ESN) transform 0 Sep 21 07:33:41.559488: | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none Sep 21 07:33:41.559490: | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN Sep 21 07:33:41.559492: | remote proposal 1 matches local proposal 1 Sep 21 07:33:41.559493: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.559495: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:33:41.559496: | length: 32 (0x20) Sep 21 07:33:41.559498: | prop #: 2 (0x2) Sep 21 07:33:41.559499: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:33:41.559501: | spi size: 4 (0x4) Sep 21 07:33:41.559502: | # transforms: 2 (0x2) Sep 21 07:33:41.559504: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:33:41.559505: | remote SPI 0d 3b 5a c2 Sep 21 07:33:41.559507: | Comparing remote proposal 2 containing 2 transforms against local proposal [1..0] of 4 local proposals Sep 21 07:33:41.559508: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559510: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559512: | length: 12 (0xc) Sep 21 07:33:41.559514: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.559515: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:33:41.559516: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.559518: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.559519: | length/value: 128 (0x80) Sep 21 07:33:41.559521: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559523: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.559524: | length: 8 (0x8) Sep 21 07:33:41.559526: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:33:41.559527: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:33:41.559529: | remote proposal 2 proposed transforms: ENCR+ESN; matched: none; unmatched: ENCR+ESN Sep 21 07:33:41.559531: | remote proposal 2 does not match; unmatched remote transforms: ENCR+ESN Sep 21 07:33:41.559532: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.559534: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Sep 21 07:33:41.559535: | length: 48 (0x30) Sep 21 07:33:41.559536: | prop #: 3 (0x3) Sep 21 07:33:41.559538: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:33:41.559539: | spi size: 4 (0x4) Sep 21 07:33:41.559540: | # transforms: 4 (0x4) Sep 21 07:33:41.559542: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:33:41.559543: | remote SPI 0d 3b 5a c2 Sep 21 07:33:41.559545: | Comparing remote proposal 3 containing 4 transforms against local proposal [1..0] of 4 local proposals Sep 21 07:33:41.559547: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559548: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559549: | length: 12 (0xc) Sep 21 07:33:41.559551: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.559552: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:33:41.559554: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.559555: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.559557: | length/value: 256 (0x100) Sep 21 07:33:41.559558: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559560: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559561: | length: 8 (0x8) Sep 21 07:33:41.559563: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.559564: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:33:41.559566: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559567: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559569: | length: 8 (0x8) Sep 21 07:33:41.559570: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.559571: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:33:41.559573: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559575: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.559576: | length: 8 (0x8) Sep 21 07:33:41.559577: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:33:41.559579: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:33:41.559581: | remote proposal 3 proposed transforms: ENCR+INTEG+ESN; matched: none; unmatched: ENCR+INTEG+ESN Sep 21 07:33:41.559582: | remote proposal 3 does not match; unmatched remote transforms: ENCR+INTEG+ESN Sep 21 07:33:41.559584: | ***parse IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.559585: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:33:41.559587: | length: 48 (0x30) Sep 21 07:33:41.559588: | prop #: 4 (0x4) Sep 21 07:33:41.559589: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:33:41.559591: | spi size: 4 (0x4) Sep 21 07:33:41.559592: | # transforms: 4 (0x4) Sep 21 07:33:41.559594: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Sep 21 07:33:41.559595: | remote SPI 0d 3b 5a c2 Sep 21 07:33:41.559597: | Comparing remote proposal 4 containing 4 transforms against local proposal [1..0] of 4 local proposals Sep 21 07:33:41.559599: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559601: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559602: | length: 12 (0xc) Sep 21 07:33:41.559603: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.559605: | IKEv2 transform ID: AES_CBC (0xc) Sep 21 07:33:41.559606: | *****parse IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.559608: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.559609: | length/value: 128 (0x80) Sep 21 07:33:41.559611: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559612: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559614: | length: 8 (0x8) Sep 21 07:33:41.559615: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.559616: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Sep 21 07:33:41.559618: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559620: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559621: | length: 8 (0x8) Sep 21 07:33:41.559622: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Sep 21 07:33:41.559624: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Sep 21 07:33:41.559625: | ****parse IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559627: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.559628: | length: 8 (0x8) Sep 21 07:33:41.559630: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:33:41.559631: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:33:41.559633: | remote proposal 4 proposed transforms: ENCR+INTEG+ESN; matched: none; unmatched: ENCR+INTEG+ESN Sep 21 07:33:41.559635: | remote proposal 4 does not match; unmatched remote transforms: ENCR+INTEG+ESN Sep 21 07:33:41.559638: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: proposal 1:ESP:SPI=0d3b5ac2;ENCR=AES_GCM_C_256;ESN=DISABLED chosen from remote proposals 1:ESP:ENCR=AES_GCM_C_256;ESN=DISABLED[first-match] 2:ESP:ENCR=AES_GCM_C_128;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;ESN=DISABLED Sep 21 07:33:41.559641: | IKE_AUTH responder matching remote ESP/AH proposals ikev2_proposal: 1:ESP:SPI=0d3b5ac2;ENCR=AES_GCM_C_256;ESN=DISABLED Sep 21 07:33:41.559642: | converting proposal to internal trans attrs Sep 21 07:33:41.559657: | netlink_get_spi: allocated 0x65204c5c for esp.0@192.1.2.23 Sep 21 07:33:41.559659: | Emitting ikev2_proposal ... Sep 21 07:33:41.559661: | ****emit IKEv2 Security Association Payload: Sep 21 07:33:41.559662: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.559664: | flags: none (0x0) Sep 21 07:33:41.559666: | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Sep 21 07:33:41.559668: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.559669: | *****emit IKEv2 Proposal Substructure Payload: Sep 21 07:33:41.559671: | last proposal: v2_PROPOSAL_LAST (0x0) Sep 21 07:33:41.559672: | prop #: 1 (0x1) Sep 21 07:33:41.559674: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Sep 21 07:33:41.559675: | spi size: 4 (0x4) Sep 21 07:33:41.559677: | # transforms: 2 (0x2) Sep 21 07:33:41.559678: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Sep 21 07:33:41.559680: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Sep 21 07:33:41.559682: | our spi 65 20 4c 5c Sep 21 07:33:41.559683: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559685: | last transform: v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559686: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Sep 21 07:33:41.559688: | IKEv2 transform ID: AES_GCM_C (0x14) Sep 21 07:33:41.559689: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:33:41.559692: | *******emit IKEv2 Attribute Substructure Payload: Sep 21 07:33:41.559694: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Sep 21 07:33:41.559695: | length/value: 256 (0x100) Sep 21 07:33:41.559697: | emitting length of IKEv2 Transform Substructure Payload: 12 Sep 21 07:33:41.559698: | ******emit IKEv2 Transform Substructure Payload: Sep 21 07:33:41.559700: | last transform: v2_TRANSFORM_LAST (0x0) Sep 21 07:33:41.559701: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Sep 21 07:33:41.559703: | IKEv2 transform ID: ESN_DISABLED (0x0) Sep 21 07:33:41.559705: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Sep 21 07:33:41.559706: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Sep 21 07:33:41.559708: | emitting length of IKEv2 Transform Substructure Payload: 8 Sep 21 07:33:41.559710: | emitting length of IKEv2 Proposal Substructure Payload: 32 Sep 21 07:33:41.559711: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Sep 21 07:33:41.559713: | emitting length of IKEv2 Security Association Payload: 36 Sep 21 07:33:41.559714: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Sep 21 07:33:41.559716: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Sep 21 07:33:41.559718: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.559719: | flags: none (0x0) Sep 21 07:33:41.559720: | number of TS: 1 (0x1) Sep 21 07:33:41.559722: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Sep 21 07:33:41.559724: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.559726: | *****emit IKEv2 Traffic Selector: Sep 21 07:33:41.559727: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:33:41.559729: | IP Protocol ID: 0 (0x0) Sep 21 07:33:41.559730: | start port: 0 (0x0) Sep 21 07:33:41.559732: | end port: 65535 (0xffff) Sep 21 07:33:41.559733: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:33:41.559735: | IP start c0 00 02 64 Sep 21 07:33:41.559736: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:33:41.559738: | IP end c0 00 02 64 Sep 21 07:33:41.559739: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:33:41.559741: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Sep 21 07:33:41.559742: | ****emit IKEv2 Traffic Selector - Responder - Payload: Sep 21 07:33:41.559744: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.559745: | flags: none (0x0) Sep 21 07:33:41.559746: | number of TS: 1 (0x1) Sep 21 07:33:41.559748: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Sep 21 07:33:41.559750: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Sep 21 07:33:41.559752: | *****emit IKEv2 Traffic Selector: Sep 21 07:33:41.559753: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Sep 21 07:33:41.559754: | IP Protocol ID: 0 (0x0) Sep 21 07:33:41.559756: | start port: 0 (0x0) Sep 21 07:33:41.559757: | end port: 65535 (0xffff) Sep 21 07:33:41.559759: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Sep 21 07:33:41.559760: | IP start 00 00 00 00 Sep 21 07:33:41.559762: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Sep 21 07:33:41.559763: | IP end ff ff ff ff Sep 21 07:33:41.559764: | emitting length of IKEv2 Traffic Selector: 16 Sep 21 07:33:41.559766: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Sep 21 07:33:41.559769: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Sep 21 07:33:41.559771: | integ=none: .key_size=0 encrypt=aes_gcm_16: .key_size=32 .salt_size=4 keymat_len=36 Sep 21 07:33:41.559904: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established Sep 21 07:33:41.559910: | install_ipsec_sa() for #2: inbound and outbound Sep 21 07:33:41.559912: | could_route called for rw-east-pool-x509-ipv4 (kind=CK_INSTANCE) Sep 21 07:33:41.559914: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:33:41.559916: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 vs Sep 21 07:33:41.559917: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 Sep 21 07:33:41.559919: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 vs Sep 21 07:33:41.559920: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 Sep 21 07:33:41.559925: | route owner of "rw-east-pool-x509-ipv4"[1] 192.1.3.209 unrouted: NULL; eroute owner: NULL Sep 21 07:33:41.559927: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Sep 21 07:33:41.559929: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Sep 21 07:33:41.559931: | AES_GCM_16 requires 4 salt bytes Sep 21 07:33:41.559933: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Sep 21 07:33:41.559935: | setting IPsec SA replay-window to 32 Sep 21 07:33:41.559937: | NIC esp-hw-offload not for connection 'rw-east-pool-x509-ipv4' not available on interface eth1 Sep 21 07:33:41.559939: | netlink: enabling tunnel mode Sep 21 07:33:41.559940: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:33:41.559942: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:33:41.560014: | netlink response for Add SA esp.d3b5ac2@192.1.3.209 included non-error error Sep 21 07:33:41.560016: | set up outgoing SA, ref=0/0 Sep 21 07:33:41.560018: | looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Sep 21 07:33:41.560020: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Sep 21 07:33:41.560021: | AES_GCM_16 requires 4 salt bytes Sep 21 07:33:41.560023: | st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Sep 21 07:33:41.560025: | setting IPsec SA replay-window to 32 Sep 21 07:33:41.560027: | NIC esp-hw-offload not for connection 'rw-east-pool-x509-ipv4' not available on interface eth1 Sep 21 07:33:41.560028: | netlink: enabling tunnel mode Sep 21 07:33:41.560030: | netlink: setting IPsec SA replay-window to 32 using old-style req Sep 21 07:33:41.560031: | netlink: esp-hw-offload not set for IPsec SA Sep 21 07:33:41.560122: | netlink response for Add SA esp.65204c5c@192.1.2.23 included non-error error Sep 21 07:33:41.560128: | priority calculation of connection "rw-east-pool-x509-ipv4" is 0xfffdf Sep 21 07:33:41.560137: | add inbound eroute 192.0.2.100/32:0 --0-> 0.0.0.0/0:0 => tun.10000@192.1.2.23 (raw_eroute) Sep 21 07:33:41.560141: | IPsec Sa SPD priority set to 1048543 Sep 21 07:33:41.560212: | raw_eroute result=success Sep 21 07:33:41.560231: | set up incoming SA, ref=0/0 Sep 21 07:33:41.560234: | sr for #2: unrouted Sep 21 07:33:41.560237: | route_and_eroute() for proto 0, and source port 0 dest port 0 Sep 21 07:33:41.560240: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:33:41.560243: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 vs Sep 21 07:33:41.560246: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 Sep 21 07:33:41.560250: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 vs Sep 21 07:33:41.560253: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 Sep 21 07:33:41.560257: | route owner of "rw-east-pool-x509-ipv4"[1] 192.1.3.209 unrouted: NULL; eroute owner: NULL Sep 21 07:33:41.560260: | route_and_eroute with c: rw-east-pool-x509-ipv4 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 Sep 21 07:33:41.560262: | priority calculation of connection "rw-east-pool-x509-ipv4" is 0xfffdf Sep 21 07:33:41.560267: | eroute_connection add eroute 0.0.0.0/0:0 --0-> 192.0.2.100/32:0 => tun.0@192.1.3.209 (raw_eroute) Sep 21 07:33:41.560270: | IPsec Sa SPD priority set to 1048543 Sep 21 07:33:41.560311: | raw_eroute result=success Sep 21 07:33:41.560316: | running updown command "ipsec _updown" for verb up Sep 21 07:33:41.560332: | command executing up-client Sep 21 07:33:41.560397: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY= Sep 21 07:33:41.560401: | popen cmd is 1278 chars long Sep 21 07:33:41.560403: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509-i: Sep 21 07:33:41.560405: | cmd( 80):pv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23' P: Sep 21 07:33:41.560407: | cmd( 160):LUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=eas: Sep 21 07:33:41.560409: | cmd( 240):t.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0.0: Sep 21 07:33:41.560412: | cmd( 320):.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PO: Sep 21 07:33:41.560414: | cmd( 400):RT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PE: Sep 21 07:33:41.560416: | cmd( 480):ER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Tes: Sep 21 07:33:41.560418: | cmd( 560):t Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' : Sep 21 07:33:41.560420: | cmd( 640):PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_PEE: Sep 21 07:33:41.560422: | cmd( 720):R_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT: Sep 21 07:33:41.560423: | cmd( 800):O_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+EN: Sep 21 07:33:41.560425: | cmd( 880):CRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND=: Sep 21 07:33:41.560427: | cmd( 960):'CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0: Sep 21 07:33:41.560429: | cmd(1040):' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CF: Sep 21 07:33:41.560431: | cmd(1120):G_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTI: Sep 21 07:33:41.560433: | cmd(1200):NG='no' VTI_SHARED='no' SPI_IN=0xd3b5ac2 SPI_OUT=0x65204c5c ipsec _updown 2>&1: Sep 21 07:33:41.567240: | route_and_eroute: firewall_notified: true Sep 21 07:33:41.567253: | running updown command "ipsec _updown" for verb prepare Sep 21 07:33:41.567256: | command executing prepare-client Sep 21 07:33:41.567285: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_A Sep 21 07:33:41.567292: | popen cmd is 1283 chars long Sep 21 07:33:41.567294: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x: Sep 21 07:33:41.567296: | cmd( 80):509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.: Sep 21 07:33:41.567297: | cmd( 160):23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, C: Sep 21 07:33:41.567299: | cmd( 240):N=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT: Sep 21 07:33:41.567300: | cmd( 320):='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_: Sep 21 07:33:41.567302: | cmd( 400):MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLU: Sep 21 07:33:41.567303: | cmd( 480):TO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, O: Sep 21 07:33:41.567305: | cmd( 560):U=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.: Sep 21 07:33:41.567306: | cmd( 640):org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUT: Sep 21 07:33:41.567308: | cmd( 720):O_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0': Sep 21 07:33:41.567309: | cmd( 800): PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS: Sep 21 07:33:41.567311: | cmd( 880):IG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_: Sep 21 07:33:41.567312: | cmd( 960):KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS: Sep 21 07:33:41.567314: | cmd(1040):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU: Sep 21 07:33:41.567315: | cmd(1120):TO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_: Sep 21 07:33:41.567317: | cmd(1200):ROUTING='no' VTI_SHARED='no' SPI_IN=0xd3b5ac2 SPI_OUT=0x65204c5c ipsec _updown 2: Sep 21 07:33:41.567318: | cmd(1280):>&1: Sep 21 07:33:41.573963: | running updown command "ipsec _updown" for verb route Sep 21 07:33:41.573973: | command executing route-client Sep 21 07:33:41.573999: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRF Sep 21 07:33:41.574001: | popen cmd is 1281 chars long Sep 21 07:33:41.574003: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x50: Sep 21 07:33:41.574005: | cmd( 80):9-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23: Sep 21 07:33:41.574006: | cmd( 160):' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=: Sep 21 07:33:41.574008: | cmd( 240):east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT=': Sep 21 07:33:41.574012: | cmd( 320):0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY: Sep 21 07:33:41.574014: | cmd( 400):_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO: Sep 21 07:33:41.574015: | cmd( 480):_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=: Sep 21 07:33:41.574017: | cmd( 560):Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.or: Sep 21 07:33:41.574018: | cmd( 640):g' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_: Sep 21 07:33:41.574020: | cmd( 720):PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P: Sep 21 07:33:41.574021: | cmd( 800):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG: Sep 21 07:33:41.574023: | cmd( 880):+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KI: Sep 21 07:33:41.574024: | cmd( 960):ND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO: Sep 21 07:33:41.574026: | cmd(1040):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO: Sep 21 07:33:41.574027: | cmd(1120):_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO: Sep 21 07:33:41.574029: | cmd(1200):UTING='no' VTI_SHARED='no' SPI_IN=0xd3b5ac2 SPI_OUT=0x65204c5c ipsec _updown 2>&: Sep 21 07:33:41.574030: | cmd(1280):1: Sep 21 07:33:41.586413: | route_and_eroute: instance "rw-east-pool-x509-ipv4"[1] 192.1.3.209, setting eroute_owner {spd=0x555e54f925b0,sr=0x555e54f925b0} to #2 (was #0) (newest_ipsec_sa=#0) Sep 21 07:33:41.586476: | #1 spent 1 milliseconds in install_ipsec_sa() Sep 21 07:33:41.586480: | ISAKMP_v2_IKE_AUTH: instance rw-east-pool-x509-ipv4[1], setting IKEv2 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 Sep 21 07:33:41.586483: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:41.586485: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:33:41.586487: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:33:41.586489: | emitting length of IKEv2 Encryption Payload: 1977 Sep 21 07:33:41.586491: | emitting length of ISAKMP Message: 2005 Sep 21 07:33:41.586494: | **parse ISAKMP Message: Sep 21 07:33:41.586495: | initiator cookie: Sep 21 07:33:41.586497: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.586498: | responder cookie: Sep 21 07:33:41.586500: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.586501: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:33:41.586503: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.586505: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.586506: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.586508: | Message ID: 1 (0x1) Sep 21 07:33:41.586524: | length: 2005 (0x7d5) Sep 21 07:33:41.586526: | **parse IKEv2 Encryption Payload: Sep 21 07:33:41.586528: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Sep 21 07:33:41.586529: | flags: none (0x0) Sep 21 07:33:41.586531: | length: 1977 (0x7b9) Sep 21 07:33:41.586532: | **emit ISAKMP Message: Sep 21 07:33:41.586534: | initiator cookie: Sep 21 07:33:41.586535: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.586536: | responder cookie: Sep 21 07:33:41.586538: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.586539: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.586541: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.586542: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.586544: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.586545: | Message ID: 1 (0x1) Sep 21 07:33:41.586547: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.586549: | ***emit IKEv2 Encrypted Fragment: Sep 21 07:33:41.586551: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Sep 21 07:33:41.586555: | flags: none (0x0) Sep 21 07:33:41.586557: | fragment number: 1 (0x1) Sep 21 07:33:41.586558: | total fragments: 5 (0x5) Sep 21 07:33:41.586560: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 36:ISAKMP_NEXT_v2IDr Sep 21 07:33:41.586562: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.586564: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Sep 21 07:33:41.586566: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Sep 21 07:33:41.586574: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Sep 21 07:33:41.586576: | cleartext fragment 25 00 00 bf 09 00 00 00 30 81 b4 31 0b 30 09 06 Sep 21 07:33:41.586577: | cleartext fragment 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 Sep 21 07:33:41.586579: | cleartext fragment 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 Sep 21 07:33:41.586580: | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 Sep 21 07:33:41.586582: | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e Sep 21 07:33:41.586583: | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 Sep 21 07:33:41.586585: | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 Sep 21 07:33:41.586586: | cleartext fragment 55 04 03 0c 1a 65 61 73 74 2e 74 65 73 74 69 6e Sep 21 07:33:41.586587: | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 Sep 21 07:33:41.586589: | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f Sep 21 07:33:41.586590: | cleartext fragment 75 73 65 72 2d 65 61 73 74 40 74 65 73 74 69 6e Sep 21 07:33:41.586592: | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 27 Sep 21 07:33:41.586593: | cleartext fragment 00 04 f1 04 30 82 04 e8 30 82 04 51 a0 03 02 01 Sep 21 07:33:41.586595: | cleartext fragment 02 02 01 03 30 0d 06 09 2a 86 48 86 f7 0d 01 01 Sep 21 07:33:41.586596: | cleartext fragment 0b 05 00 30 81 ac 31 0b 30 09 06 03 55 04 06 13 Sep 21 07:33:41.586597: | cleartext fragment 02 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e Sep 21 07:33:41.586599: | cleartext fragment 74 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 Sep 21 07:33:41.586600: | cleartext fragment 54 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a Sep 21 07:33:41.586602: | cleartext fragment 0c 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 Sep 21 07:33:41.586603: | cleartext fragment 03 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 Sep 21 07:33:41.586605: | cleartext fragment 74 6d 65 6e 74 31 25 30 23 06 03 55 04 03 0c 1c Sep 21 07:33:41.586606: | cleartext fragment 4c 69 62 72 65 73 77 61 6e 20 74 65 73 74 20 43 Sep 21 07:33:41.586607: | cleartext fragment 41 20 66 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 Sep 21 07:33:41.586609: | cleartext fragment 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 74 65 73 Sep 21 07:33:41.586610: | cleartext fragment 74 69 6e 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f Sep 21 07:33:41.586612: | cleartext fragment 72 67 30 22 18 0f 32 30 31 39 30 39 31 35 31 39 Sep 21 07:33:41.586613: | cleartext fragment 34 34 35 39 5a 18 0f 32 30 32 32 30 39 31 34 31 Sep 21 07:33:41.586615: | cleartext fragment 39 34 34 35 39 5a 30 81 b4 31 0b 30 09 06 03 55 Sep 21 07:33:41.586616: | cleartext fragment 04 06 13 02 43 41 31 10 30 0e 06 03 55 04 08 0c Sep 21 07:33:41.586617: | cleartext fragment 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 03 Sep 21 07:33:41.586619: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:41.586621: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Sep 21 07:33:41.586623: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Sep 21 07:33:41.586624: | emitting length of IKEv2 Encrypted Fragment: 511 Sep 21 07:33:41.586626: | emitting length of ISAKMP Message: 539 Sep 21 07:33:41.586638: | **emit ISAKMP Message: Sep 21 07:33:41.586640: | initiator cookie: Sep 21 07:33:41.586642: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.586643: | responder cookie: Sep 21 07:33:41.586644: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.586646: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.586647: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.586649: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.586650: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.586652: | Message ID: 1 (0x1) Sep 21 07:33:41.586653: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.586655: | ***emit IKEv2 Encrypted Fragment: Sep 21 07:33:41.586657: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.586658: | flags: none (0x0) Sep 21 07:33:41.586659: | fragment number: 2 (0x2) Sep 21 07:33:41.586661: | total fragments: 5 (0x5) Sep 21 07:33:41.586663: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Sep 21 07:33:41.586665: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.586666: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Sep 21 07:33:41.586668: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Sep 21 07:33:41.586670: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Sep 21 07:33:41.586673: | cleartext fragment 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 10 Sep 21 07:33:41.586676: | cleartext fragment 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 6e Sep 21 07:33:41.586682: | cleartext fragment 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 20 Sep 21 07:33:41.586685: | cleartext fragment 44 65 70 61 72 74 6d 65 6e 74 31 23 30 21 06 03 Sep 21 07:33:41.586688: | cleartext fragment 55 04 03 0c 1a 65 61 73 74 2e 74 65 73 74 69 6e Sep 21 07:33:41.586690: | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 31 Sep 21 07:33:41.586693: | cleartext fragment 2e 30 2c 06 09 2a 86 48 86 f7 0d 01 09 01 16 1f Sep 21 07:33:41.586696: | cleartext fragment 75 73 65 72 2d 65 61 73 74 40 74 65 73 74 69 6e Sep 21 07:33:41.586698: | cleartext fragment 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 Sep 21 07:33:41.586700: | cleartext fragment 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 Sep 21 07:33:41.586701: | cleartext fragment 05 00 03 82 01 8f 00 30 82 01 8a 02 82 01 81 00 Sep 21 07:33:41.586703: | cleartext fragment b0 0d 9e ca 2d 55 24 59 06 37 09 58 0d 06 ab 90 Sep 21 07:33:41.586704: | cleartext fragment 5e 98 7c 00 0b 66 73 f4 12 27 69 75 6e d4 8d 13 Sep 21 07:33:41.586706: | cleartext fragment e9 c6 e9 4f c4 b1 19 1a 1a 4f e6 4e 06 da 29 ec Sep 21 07:33:41.586707: | cleartext fragment cf 8d 4c c3 c3 57 c0 24 57 83 7a 1b 7f 96 a3 21 Sep 21 07:33:41.586709: | cleartext fragment 66 67 52 68 8e 77 b9 bb f6 9b d2 43 11 57 c9 d6 Sep 21 07:33:41.586710: | cleartext fragment ca e2 39 73 93 ea 99 99 f7 52 38 4d 58 69 7f a5 Sep 21 07:33:41.586711: | cleartext fragment 18 9b ff 66 72 6c df 6d df 18 50 cf 10 98 a3 f5 Sep 21 07:33:41.586713: | cleartext fragment f9 69 27 5b 3f bd 0f 34 18 93 99 1a be 8a 46 84 Sep 21 07:33:41.586714: | cleartext fragment 37 69 71 7f a7 df d0 9d b2 9d ad 80 0f d0 1a 40 Sep 21 07:33:41.586716: | cleartext fragment cb ff 37 20 ac ac 3d a9 8e 56 56 cf 25 c0 5e 55 Sep 21 07:33:41.586717: | cleartext fragment 52 86 5a c5 b4 ce a8 dd 95 cf ab 38 91 f6 1f 9f Sep 21 07:33:41.586719: | cleartext fragment 83 36 d5 3f 8c d3 1d f5 3f 23 3c d2 5c 87 23 bc Sep 21 07:33:41.586720: | cleartext fragment 6a 67 f7 00 c3 96 3f 76 5c b9 8e 6f 2b 16 90 2c Sep 21 07:33:41.586721: | cleartext fragment 00 c0 05 a0 e2 8d 57 d5 76 34 7f 6f be e8 48 79 Sep 21 07:33:41.586723: | cleartext fragment 08 91 a8 17 72 1f c0 1c 8a 52 a8 18 aa 32 3c 9a Sep 21 07:33:41.586726: | cleartext fragment e4 d9 90 58 25 5e 4c 49 8e cb 7a 33 19 d2 87 1a Sep 21 07:33:41.586728: | cleartext fragment 2a 8e b5 04 f7 f9 cd 80 8c 59 ae 34 61 c5 1d de Sep 21 07:33:41.586729: | cleartext fragment 53 65 fe 4f f3 f4 09 f2 b4 21 7a 2b eb 1f 4a f2 Sep 21 07:33:41.586730: | cleartext fragment 5f 85 3a f0 f8 2b 3b 42 5b da 89 c1 ef b2 Sep 21 07:33:41.586732: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:41.586734: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Sep 21 07:33:41.586736: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Sep 21 07:33:41.586738: | emitting length of IKEv2 Encrypted Fragment: 511 Sep 21 07:33:41.586739: | emitting length of ISAKMP Message: 539 Sep 21 07:33:41.586745: | **emit ISAKMP Message: Sep 21 07:33:41.586747: | initiator cookie: Sep 21 07:33:41.586749: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.586750: | responder cookie: Sep 21 07:33:41.586751: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.586753: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.586755: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.586756: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.586758: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.586759: | Message ID: 1 (0x1) Sep 21 07:33:41.586761: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.586763: | ***emit IKEv2 Encrypted Fragment: Sep 21 07:33:41.586764: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.586766: | flags: none (0x0) Sep 21 07:33:41.586767: | fragment number: 3 (0x3) Sep 21 07:33:41.586768: | total fragments: 5 (0x5) Sep 21 07:33:41.586770: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Sep 21 07:33:41.586772: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.586774: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Sep 21 07:33:41.586776: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Sep 21 07:33:41.586778: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Sep 21 07:33:41.586780: | cleartext fragment 81 18 2a 4b 57 a2 ca 63 8b a7 60 8e 54 95 c3 20 Sep 21 07:33:41.586782: | cleartext fragment 5c e5 53 f0 4a 57 df 41 fa 06 e6 ab 4e 0b 46 49 Sep 21 07:33:41.586788: | cleartext fragment 14 0d db b0 dc 10 2e 6d 5f 52 cb 75 36 1b e2 1d Sep 21 07:33:41.586792: | cleartext fragment 9d 77 0f 73 9d 0a 64 07 84 f4 0e 0a 98 97 58 c4 Sep 21 07:33:41.586794: | cleartext fragment 40 f6 1b ac a3 be 21 aa 67 3a 2b b1 0e b7 9a 36 Sep 21 07:33:41.586795: | cleartext fragment ff 67 02 03 01 00 01 a3 82 01 06 30 82 01 02 30 Sep 21 07:33:41.586796: | cleartext fragment 09 06 03 55 1d 13 04 02 30 00 30 47 06 03 55 1d Sep 21 07:33:41.586798: | cleartext fragment 11 04 40 30 3e 82 1a 65 61 73 74 2e 74 65 73 74 Sep 21 07:33:41.586799: | cleartext fragment 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f 72 Sep 21 07:33:41.586801: | cleartext fragment 67 81 1a 65 61 73 74 40 74 65 73 74 69 6e 67 2e Sep 21 07:33:41.586802: | cleartext fragment 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 87 04 c0 Sep 21 07:33:41.586804: | cleartext fragment 01 02 17 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 Sep 21 07:33:41.586805: | cleartext fragment 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 Sep 21 07:33:41.586807: | cleartext fragment 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 Sep 21 07:33:41.586808: | cleartext fragment 41 06 08 2b 06 01 05 05 07 01 01 04 35 30 33 30 Sep 21 07:33:41.586822: | cleartext fragment 31 06 08 2b 06 01 05 05 07 30 01 86 25 68 74 74 Sep 21 07:33:41.586824: | cleartext fragment 70 3a 2f 2f 6e 69 63 2e 74 65 73 74 69 6e 67 2e Sep 21 07:33:41.586826: | cleartext fragment 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 3a 32 35 Sep 21 07:33:41.586828: | cleartext fragment 36 30 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0 Sep 21 07:33:41.586829: | cleartext fragment 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 6e 69 63 2e Sep 21 07:33:41.586831: | cleartext fragment 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 Sep 21 07:33:41.586832: | cleartext fragment 6e 2e 6f 72 67 2f 72 65 76 6f 6b 65 64 2e 63 72 Sep 21 07:33:41.586833: | cleartext fragment 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 Sep 21 07:33:41.586835: | cleartext fragment 03 81 81 00 bf 3c 12 c5 00 3e 71 2a 2b 2b 60 83 Sep 21 07:33:41.586836: | cleartext fragment b9 b9 f2 4d b1 ca 0e fd b4 e0 0b 6a ad 54 d7 c9 Sep 21 07:33:41.586838: | cleartext fragment 98 57 e0 5c 26 4d bf 11 23 20 79 05 b6 1b 9b 09 Sep 21 07:33:41.586839: | cleartext fragment ed 4f 2e fd 7e da 55 53 b6 8c 88 fa f3 9b ce ec Sep 21 07:33:41.586840: | cleartext fragment ef 95 37 11 70 ce 1c 98 d3 d5 cf f6 30 71 44 78 Sep 21 07:33:41.586842: | cleartext fragment fb 45 03 69 50 d5 a5 c3 de 00 4c f7 0a 7d 00 cb Sep 21 07:33:41.586843: | cleartext fragment 3a ab 11 74 6b 57 67 4d e7 c0 3a 97 98 44 Sep 21 07:33:41.586845: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:41.586847: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Sep 21 07:33:41.586848: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Sep 21 07:33:41.586850: | emitting length of IKEv2 Encrypted Fragment: 511 Sep 21 07:33:41.586851: | emitting length of ISAKMP Message: 539 Sep 21 07:33:41.586855: | **emit ISAKMP Message: Sep 21 07:33:41.586857: | initiator cookie: Sep 21 07:33:41.586858: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.586860: | responder cookie: Sep 21 07:33:41.586861: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.586862: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.586864: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.586865: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.586867: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.586868: | Message ID: 1 (0x1) Sep 21 07:33:41.586870: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.586871: | ***emit IKEv2 Encrypted Fragment: Sep 21 07:33:41.586873: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.586874: | flags: none (0x0) Sep 21 07:33:41.586876: | fragment number: 4 (0x4) Sep 21 07:33:41.586877: | total fragments: 5 (0x5) Sep 21 07:33:41.586879: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Sep 21 07:33:41.586881: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.586882: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Sep 21 07:33:41.586884: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Sep 21 07:33:41.586888: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Sep 21 07:33:41.586890: | cleartext fragment e2 15 9d f2 6f 1b c7 b1 15 d0 88 c4 dc 32 b7 72 Sep 21 07:33:41.586891: | cleartext fragment 1d 9c ac 1b 37 63 2f 00 01 88 01 00 00 00 8f a5 Sep 21 07:33:41.586892: | cleartext fragment 7a 6d f9 67 78 95 78 56 e6 c6 54 3e 80 1b f2 22 Sep 21 07:33:41.586894: | cleartext fragment a8 9a 35 d1 e6 ad 24 ba 0f f1 ff 1b 2c 89 37 d7 Sep 21 07:33:41.586895: | cleartext fragment e9 6a 5b da 76 ed 4b 45 b4 09 33 81 e2 e4 a4 35 Sep 21 07:33:41.586897: | cleartext fragment 6d 2e c7 38 ed 21 da f0 a0 2d a4 35 37 ef f2 d0 Sep 21 07:33:41.586898: | cleartext fragment 3c 2f 93 ee 53 da 82 ff a0 d5 a7 d2 7c 6e 2f fc Sep 21 07:33:41.586899: | cleartext fragment 54 39 dd d5 91 9c 12 d4 5d 2c 78 e1 e7 e6 84 2e Sep 21 07:33:41.586902: | cleartext fragment a1 ec 73 14 5d 81 5e 3f 83 e6 87 38 a8 4e 17 75 Sep 21 07:33:41.586903: | cleartext fragment 14 6e ca bd 7a 6c 94 88 78 91 35 06 18 ed 83 5c Sep 21 07:33:41.586905: | cleartext fragment 8b 5a 3d 6f 08 fc 5f b1 bf 77 58 d5 a2 a0 fe c8 Sep 21 07:33:41.586906: | cleartext fragment e3 9e 0b 81 9c 3f 04 ac 1b b3 fc 1c 09 5f 07 b1 Sep 21 07:33:41.586907: | cleartext fragment bd ea e8 8b c9 6f b2 5d 30 1a 72 6d 38 6a 8a c2 Sep 21 07:33:41.586909: | cleartext fragment 60 ba 50 25 43 0f bc d7 b1 b6 bd f8 9c 88 c7 80 Sep 21 07:33:41.586910: | cleartext fragment f1 30 b3 f9 c9 f6 40 47 d2 39 88 f8 f6 4e 53 b0 Sep 21 07:33:41.586912: | cleartext fragment c0 49 05 52 3b 62 ec 0c 2f 7a 63 55 de 1d 8a e4 Sep 21 07:33:41.586913: | cleartext fragment 03 5d ed 84 5b ea b3 92 f5 48 c4 03 19 7e f9 04 Sep 21 07:33:41.586914: | cleartext fragment da 08 37 4d 2e ec c5 72 1c df 87 f8 41 6b 2d a4 Sep 21 07:33:41.586916: | cleartext fragment 1e 7b 8d 9d 90 e9 db 29 a3 3f ae 65 35 91 12 dc Sep 21 07:33:41.586917: | cleartext fragment 46 55 63 85 a0 98 8b 23 cf d0 a5 61 dd e6 3b 8f Sep 21 07:33:41.586919: | cleartext fragment 27 ed 20 74 0a 48 35 71 0c 76 f4 21 aa 92 9b b8 Sep 21 07:33:41.586920: | cleartext fragment 93 ef 1d b4 a5 e2 52 3b ac 9c 14 41 f9 ba a6 ff Sep 21 07:33:41.586921: | cleartext fragment 28 84 ea 1b 90 95 81 29 df e7 55 d2 55 73 cb 1d Sep 21 07:33:41.586923: | cleartext fragment 2c 13 08 e4 9e b8 f4 a9 71 3b 58 e4 fd 7a e7 f2 Sep 21 07:33:41.586924: | cleartext fragment fd b0 6c d2 fa 5f 84 a2 24 6c 48 4e 70 3b bb a0 Sep 21 07:33:41.586926: | cleartext fragment 31 f4 a7 ac 6a cf 33 39 99 9b 72 af 4c f2 21 00 Sep 21 07:33:41.586927: | cleartext fragment 00 10 02 00 00 00 00 01 00 04 c0 00 02 64 2c 00 Sep 21 07:33:41.586928: | cleartext fragment 00 24 00 00 00 20 01 03 04 02 65 20 4c 5c 03 00 Sep 21 07:33:41.586930: | cleartext fragment 00 0c 01 00 00 14 80 0e 01 00 00 00 00 08 05 00 Sep 21 07:33:41.586931: | cleartext fragment 00 00 2d 00 00 18 01 00 00 00 07 00 00 10 Sep 21 07:33:41.586933: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:41.586934: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Sep 21 07:33:41.586936: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Sep 21 07:33:41.586937: | emitting length of IKEv2 Encrypted Fragment: 511 Sep 21 07:33:41.586939: | emitting length of ISAKMP Message: 539 Sep 21 07:33:41.586942: | **emit ISAKMP Message: Sep 21 07:33:41.586944: | initiator cookie: Sep 21 07:33:41.586945: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:41.586946: | responder cookie: Sep 21 07:33:41.586948: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.586949: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:41.586951: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:41.586952: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Sep 21 07:33:41.586954: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Sep 21 07:33:41.586955: | Message ID: 1 (0x1) Sep 21 07:33:41.586957: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:41.586958: | ***emit IKEv2 Encrypted Fragment: Sep 21 07:33:41.586960: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:41.586961: | flags: none (0x0) Sep 21 07:33:41.586962: | fragment number: 5 (0x5) Sep 21 07:33:41.586964: | total fragments: 5 (0x5) Sep 21 07:33:41.586965: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Sep 21 07:33:41.586967: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Sep 21 07:33:41.586969: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Sep 21 07:33:41.586971: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Sep 21 07:33:41.586973: | emitting 36 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Sep 21 07:33:41.586975: | cleartext fragment 00 00 ff ff c0 00 02 64 c0 00 02 64 00 00 00 18 Sep 21 07:33:41.586976: | cleartext fragment 01 00 00 00 07 00 00 10 00 00 ff ff 00 00 00 00 Sep 21 07:33:41.586978: | cleartext fragment ff ff ff ff Sep 21 07:33:41.586979: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:41.586981: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Sep 21 07:33:41.586982: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Sep 21 07:33:41.586984: | emitting length of IKEv2 Encrypted Fragment: 69 Sep 21 07:33:41.586985: | emitting length of ISAKMP Message: 97 Sep 21 07:33:41.586989: | ikev2_parent_inI2outR2_continue_tail returned STF_OK Sep 21 07:33:41.586994: | #1 spent 13.3 milliseconds in processing: Responder: process IKE_AUTH request in ikev2_process_state_packet() Sep 21 07:33:41.586999: | suspend processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:33:41.587002: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:33:41.587005: | #2 complete_v2_state_transition() md.from_state=PARENT_R1 md.svm.state[from]=PARENT_R1 UNDEFINED->V2_IPSEC_R with status STF_OK Sep 21 07:33:41.587007: | IKEv2: transition from state STATE_PARENT_R1 to state STATE_V2_IPSEC_R Sep 21 07:33:41.587009: | child state #2: UNDEFINED(ignore) => V2_IPSEC_R(established CHILD SA) Sep 21 07:33:41.587011: | Message ID: updating counters for #2 to 1 after switching state Sep 21 07:33:41.587015: | Message ID: recv #1.#2 request 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0 responder.recv=0->1; child: wip.initiator=-1 wip.responder=1->-1 Sep 21 07:33:41.587018: | Message ID: sent #1.#2 response 1; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=0->1 responder.recv=1; child: wip.initiator=-1 wip.responder=-1 Sep 21 07:33:41.587019: | pstats #2 ikev2.child established Sep 21 07:33:41.587025: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: negotiated connection [0.0.0.0-255.255.255.255:0-65535 0] -> [192.0.2.100-192.0.2.100:0-65535 0] Sep 21 07:33:41.587028: | NAT-T: encaps is 'auto' Sep 21 07:33:41.587031: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: STATE_V2_IPSEC_R: IPsec SA established tunnel mode {ESP=>0x0d3b5ac2 <0x65204c5c xfrm=AES_GCM_16_256-NONE NATOA=none NATD=none DPD=active} Sep 21 07:33:41.587034: | sending V2 new request packet to 192.1.3.209:500 (from 192.1.2.23:500) Sep 21 07:33:41.587036: | sending fragments ... Sep 21 07:33:41.587039: | sending 539 bytes for STATE_PARENT_R1 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:33:41.587041: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.587042: | 35 20 23 20 00 00 00 01 00 00 02 1b 24 00 01 ff Sep 21 07:33:41.587044: | 00 01 00 05 47 ac 10 4c 6f 9b 84 71 aa b3 23 17 Sep 21 07:33:41.587045: | 91 6a e8 1d 28 03 5d ec 20 35 f1 c3 15 02 c7 b1 Sep 21 07:33:41.587046: | 16 4e ee 78 e4 b8 da a1 12 c5 77 d8 29 5d 70 13 Sep 21 07:33:41.587048: | 25 20 3c 90 2d d6 0f 59 6d 7c 08 af 13 01 be 0a Sep 21 07:33:41.587049: | 80 a1 88 d0 bf 18 94 2f ce b9 ae b7 a1 17 1c b0 Sep 21 07:33:41.587051: | cf d5 bc f2 1f 10 8a ae ce f3 10 2a 99 f1 5a ac Sep 21 07:33:41.587052: | f3 e3 29 64 ee 4b 28 ff 67 0d 02 49 be 17 5b d3 Sep 21 07:33:41.587053: | 8b 54 ef 6e 7d 14 d5 6d 63 b9 c6 f8 5d a7 ef 91 Sep 21 07:33:41.587055: | 54 9e bc f9 a5 73 65 7c 53 5e 90 bf a0 03 98 89 Sep 21 07:33:41.587056: | e8 24 f8 07 42 dd f7 3d f2 34 ec 1f 49 ac 0b 12 Sep 21 07:33:41.587057: | 6b 17 ea da a5 bb 63 2a 35 93 48 c0 79 b9 69 88 Sep 21 07:33:41.587059: | 5a 7c 0d c6 58 7a 56 4b 88 e8 e5 eb 1e 1d 97 9e Sep 21 07:33:41.587060: | 22 9d 07 d8 28 5a 8e b7 a5 1f 5f 80 4d 65 68 e2 Sep 21 07:33:41.587062: | 92 2a 45 cf f9 c5 b8 62 ec 81 57 c7 ab 85 09 a4 Sep 21 07:33:41.587064: | a6 42 6c 44 09 8b 35 cf aa 8e c6 46 87 15 5e a4 Sep 21 07:33:41.587065: | a3 e8 d4 2b 92 21 51 ac cc 82 8e f4 95 ad 8f b5 Sep 21 07:33:41.587066: | bb a0 af e7 d4 a1 24 67 22 2a 4d af c5 9f fe 37 Sep 21 07:33:41.587068: | 2d 3b e4 df 64 f5 1a 8c 1b 7c 4a 4f c9 f5 a8 69 Sep 21 07:33:41.587069: | 31 9d 5d 7b 55 45 6e 1a a5 ce ee 6e 79 3f 57 2f Sep 21 07:33:41.587071: | 1a aa b2 51 28 da 1d 99 c3 80 e8 2d e2 3b 5e 28 Sep 21 07:33:41.587072: | 94 30 5b 50 48 02 c0 f2 88 58 6d 01 74 0a eb 67 Sep 21 07:33:41.587073: | 48 c2 40 ab 4b c1 35 6f 39 11 12 43 a2 ca c6 43 Sep 21 07:33:41.587075: | d9 68 ca 57 82 48 87 ba 3b 1d 0a 8e 28 79 ed 37 Sep 21 07:33:41.587076: | 8b 65 4f 74 e1 02 4f 72 c6 53 f3 c4 b6 9d e0 47 Sep 21 07:33:41.587077: | c8 6a 06 44 03 37 3a 41 c6 c5 58 4a c6 68 1b f2 Sep 21 07:33:41.587079: | 38 69 fe 19 b4 23 aa ea 5f a4 6d a1 31 e8 7e 8f Sep 21 07:33:41.587080: | d0 f4 6a 16 71 47 bd 3d 53 f9 99 a3 ac 1f 97 12 Sep 21 07:33:41.587081: | 05 0b 36 92 21 0e a9 b0 e9 5a 37 9e 0f 83 a6 9e Sep 21 07:33:41.587083: | 44 7c 23 1d d8 02 2f cb 9c b5 2c d8 2d 0e e5 1f Sep 21 07:33:41.587084: | 9f 55 0d ed a2 4e 29 05 ef ba c7 ce a3 66 a3 63 Sep 21 07:33:41.587085: | 17 52 68 c7 af 5a c9 1e 52 f7 84 27 8b c7 40 2e Sep 21 07:33:41.587087: | b5 41 50 c4 19 cf 42 5d b5 df 51 Sep 21 07:33:41.587126: | sending 539 bytes for STATE_PARENT_R1 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:33:41.587129: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.587130: | 35 20 23 20 00 00 00 01 00 00 02 1b 00 00 01 ff Sep 21 07:33:41.587132: | 00 02 00 05 35 fe 45 a5 9d 3b b3 41 05 ce b6 79 Sep 21 07:33:41.587133: | 52 67 64 82 35 3f 9e 17 75 bb 90 77 fd 51 c4 d8 Sep 21 07:33:41.587134: | 72 62 d9 b5 18 01 83 c3 25 38 29 24 d1 3b 04 a5 Sep 21 07:33:41.587136: | 65 78 51 eb 60 58 40 06 e1 53 57 c9 5e 01 ec f4 Sep 21 07:33:41.587137: | dd 32 82 d6 e1 ba 72 3b 29 49 64 34 9a cf fe f5 Sep 21 07:33:41.587138: | e2 6c c3 45 0b 33 eb 42 2a 6a 26 76 4e 5e a3 73 Sep 21 07:33:41.587140: | 24 82 37 49 53 a0 fc 98 02 1f ea 96 d7 94 83 22 Sep 21 07:33:41.587141: | 22 a5 a5 b6 5f 49 ce 0e b3 ba 44 11 9f de 08 eb Sep 21 07:33:41.587142: | 83 39 d2 a1 33 e5 5b df fb f5 a3 f0 e0 02 87 fe Sep 21 07:33:41.587144: | 3f 4b ae 9e e8 c6 0a cd 53 2c 32 9a 99 20 af fb Sep 21 07:33:41.587145: | c2 0f d7 f8 c6 c9 fe d6 fd e7 47 c0 03 fc 6f 1e Sep 21 07:33:41.587146: | 19 7c 41 75 d7 53 39 34 3a 8c e7 6e ba 15 13 e9 Sep 21 07:33:41.587148: | a6 ed fa 6a 38 eb a0 1e 6d f9 e5 b9 8a 5e 56 04 Sep 21 07:33:41.587149: | ca 93 4c e3 b4 f8 5c 0c f8 e2 fb e3 29 57 62 91 Sep 21 07:33:41.587151: | 35 78 56 ba a8 f5 30 3d 2b 1f 77 24 ea 5d d0 7d Sep 21 07:33:41.587152: | 29 d5 63 98 ba 4e 8c b8 e0 8d a2 1e f3 b6 f9 7b Sep 21 07:33:41.587153: | 3f be 44 31 a9 59 43 eb 09 50 fb d0 3c b5 6f 72 Sep 21 07:33:41.587155: | 68 f4 ec 3f d6 bc f4 97 c2 db f5 5a d9 aa 95 e7 Sep 21 07:33:41.587156: | 29 f9 97 c6 d7 22 b1 96 08 fd 49 b7 39 34 a8 f0 Sep 21 07:33:41.587157: | 0e 4c 59 2c fa 37 e7 09 9e 77 d3 74 34 d7 c6 fe Sep 21 07:33:41.587159: | a9 7d 03 67 bf db cc d5 cd 50 35 81 85 80 9f 00 Sep 21 07:33:41.587160: | 86 d7 0e be dd 8c cd d4 bf 02 d7 09 6a b5 c1 bc Sep 21 07:33:41.587161: | 85 5c 21 27 f9 f7 25 e6 d6 ec a5 9d eb 6f 7b 06 Sep 21 07:33:41.587163: | 21 88 28 08 2f e2 0f e2 6f 96 20 15 25 b6 b3 b1 Sep 21 07:33:41.587164: | 6e 6d 42 aa fa 5e f3 b0 c1 3e fd 99 8e 06 2b 86 Sep 21 07:33:41.587165: | 49 fe a8 ed 12 cf a7 5a 6b 34 99 c8 65 66 1b 10 Sep 21 07:33:41.587167: | e0 40 4e 2d 2f 16 a9 0c 8c 35 11 ac 86 cf f6 10 Sep 21 07:33:41.587168: | 9c 64 58 d8 25 bf e9 5d 8a 26 46 11 7e 11 e8 70 Sep 21 07:33:41.587169: | 9d 20 e4 c2 fd dc 67 79 c6 3d 5d 06 42 f6 7a 31 Sep 21 07:33:41.587172: | 32 e1 45 79 78 41 49 6a e1 9c d6 62 b0 cc d1 4d Sep 21 07:33:41.587173: | 84 91 0d 4f ee 0d 74 de d6 25 8a b5 a6 02 b9 a0 Sep 21 07:33:41.587175: | 1b f4 67 e4 5b 54 0d 1a dd cc 30 Sep 21 07:33:41.587185: | sending 539 bytes for STATE_PARENT_R1 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:33:41.587187: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.587189: | 35 20 23 20 00 00 00 01 00 00 02 1b 00 00 01 ff Sep 21 07:33:41.587190: | 00 03 00 05 a0 cc 71 9a 99 b1 ce de b6 08 1a 86 Sep 21 07:33:41.587191: | 82 66 ff cf 8d 6b f0 17 73 a2 a4 aa 6d 1c ad b9 Sep 21 07:33:41.587193: | 97 12 23 7e d6 06 19 65 c2 07 aa a0 e9 aa db 35 Sep 21 07:33:41.587194: | 95 cd 55 6d 7c 5d 6e 2d 62 97 98 9f 5f 27 4f 5b Sep 21 07:33:41.587195: | 29 75 f4 dd 8f 19 67 ce f4 69 e3 de 85 dd 82 2f Sep 21 07:33:41.587197: | 8a 14 32 19 d6 a1 ba d9 c3 1b c5 0f 8d 57 80 80 Sep 21 07:33:41.587198: | 7b ff 7e 9c 39 71 53 10 cd 16 49 fe c1 50 f3 23 Sep 21 07:33:41.587199: | d5 76 6e cf e3 be 7b 41 53 d2 4a d1 20 74 47 ab Sep 21 07:33:41.587201: | 78 4a 39 f8 a1 0f db 56 3c e1 a7 4e 2f f1 1d 99 Sep 21 07:33:41.587202: | 99 d0 9a 4d 86 4e ef ed c3 af f5 2b 7a 64 7c 2b Sep 21 07:33:41.587203: | 38 c4 f6 29 b5 e3 e6 48 41 86 43 02 26 92 11 ee Sep 21 07:33:41.587205: | 82 df 23 1e d4 54 9e 39 33 1c d8 5e eb 6b ab e9 Sep 21 07:33:41.587206: | 5b 22 07 d5 6d 97 2a 72 dc de e1 84 45 fc 91 cd Sep 21 07:33:41.587207: | 87 5f 0e cb a0 70 8b c9 c2 c6 bd 44 f8 2e 6f db Sep 21 07:33:41.587209: | 5c 0c ca 8e 9a d7 32 73 4c 5e 41 e1 0f 0a a3 ae Sep 21 07:33:41.587210: | 65 e4 ad 23 19 fd bc 72 ed d5 83 90 84 78 54 8c Sep 21 07:33:41.587212: | ab 8e 3d dd 0d e5 e1 59 9e 20 23 f1 74 bf 2d 34 Sep 21 07:33:41.587213: | 26 6c fd 76 6e 46 da 0a 80 31 38 e3 27 7a a6 f8 Sep 21 07:33:41.587214: | b3 42 83 50 46 16 32 08 2f d8 cc 94 1f c4 e7 82 Sep 21 07:33:41.587216: | 7f d9 45 83 13 23 5d 7e 10 80 41 48 cf 83 8a db Sep 21 07:33:41.587217: | e0 65 3f 53 8e de 3c 53 eb a0 90 79 24 e7 46 54 Sep 21 07:33:41.587218: | ad d7 d4 08 33 2a 60 95 af 6e cc 7b 6a 19 9c c7 Sep 21 07:33:41.587220: | e4 28 dd 29 8a 73 7d b4 74 3c d2 ce 55 f4 6a 39 Sep 21 07:33:41.587221: | e3 7c cc 3c 97 f8 81 1f 60 de 8d f2 82 4c 2c d9 Sep 21 07:33:41.587222: | 65 5c 1a 0f f7 58 02 4f e1 2f 83 10 b1 59 ee 90 Sep 21 07:33:41.587224: | 2a fe 58 4f 67 68 a8 75 28 db 65 78 00 59 2b f9 Sep 21 07:33:41.587225: | fa df ac bd 84 74 e5 43 ae ff 31 c7 eb 86 05 dc Sep 21 07:33:41.587226: | 91 27 60 15 55 4a ce fd 42 51 54 84 b8 15 e7 de Sep 21 07:33:41.587228: | cf 03 70 05 39 0d 3d fa bf 25 c3 71 78 b7 bd c1 Sep 21 07:33:41.587229: | e5 59 5e a9 3f ac 55 56 75 0a 56 a3 fc cc f2 0e Sep 21 07:33:41.587231: | dc 57 9a 4f 47 c0 f7 57 76 5c e3 b5 b0 d7 4e 1f Sep 21 07:33:41.587232: | 65 28 4c b6 a9 58 55 12 63 c3 09 Sep 21 07:33:41.587240: | sending 539 bytes for STATE_PARENT_R1 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:33:41.587242: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.587243: | 35 20 23 20 00 00 00 01 00 00 02 1b 00 00 01 ff Sep 21 07:33:41.587245: | 00 04 00 05 12 f4 94 6f 35 83 2f 1a fc ab 3b ee Sep 21 07:33:41.587246: | 1b e8 2b ef f4 3b f5 1f ad ff 0b 5c 47 09 0a 95 Sep 21 07:33:41.587247: | 83 a1 53 c5 6f 3b 76 e1 fc 48 61 de f1 08 89 d9 Sep 21 07:33:41.587249: | 39 72 5e f9 56 93 a8 a0 e1 31 50 d9 98 1d 8b 7a Sep 21 07:33:41.587250: | 35 9b 17 87 13 6f a3 c7 26 d9 60 bb 61 10 72 fb Sep 21 07:33:41.587251: | 2d ba 24 35 9c 7d bf 07 f4 0b 21 0d 6c 22 69 ea Sep 21 07:33:41.587253: | 52 21 bc 6e 13 70 df 20 ae 96 07 44 ac bc 22 f0 Sep 21 07:33:41.587254: | 0a df a1 3a 08 62 df b5 84 58 87 42 f9 98 b5 fd Sep 21 07:33:41.587256: | 59 ed 4a 3e 98 fd 1e 8d 7c 6a 30 7f 7d a2 c3 48 Sep 21 07:33:41.587257: | d6 b3 52 7c d7 09 78 15 51 89 d6 83 22 1d 02 71 Sep 21 07:33:41.587259: | e1 32 11 67 e8 74 8b 8d 17 35 90 9e 9d 71 ad 4d Sep 21 07:33:41.587261: | b9 e8 e6 99 74 7b ac 0a e5 cf 85 cb 0c 2f ea 78 Sep 21 07:33:41.587262: | 94 58 d7 74 64 f4 ec 8d c6 97 51 ef 2e 46 79 1d Sep 21 07:33:41.587263: | e0 09 65 a3 c5 66 f9 d2 22 25 1a c1 a1 69 b9 6e Sep 21 07:33:41.587265: | c1 af ee 6c 1f 6a f1 44 92 41 9c 99 fb 9a af be Sep 21 07:33:41.587266: | c6 2e bb 71 48 f6 f3 17 fb 94 67 6d 62 33 77 5f Sep 21 07:33:41.587267: | 4b 25 0d ad 6f e8 22 6e fa 29 c1 00 b3 f4 4b ff Sep 21 07:33:41.587269: | 7b ce 77 74 2b 60 f3 db be d0 db 57 dd b4 1d 8f Sep 21 07:33:41.587270: | 9c 57 50 b8 a4 83 62 97 52 ac 86 f8 27 be f5 c3 Sep 21 07:33:41.587271: | 13 af 7a 97 25 d1 36 c8 a8 34 07 55 c4 32 0d 79 Sep 21 07:33:41.587273: | fe bc 03 6d 56 d5 47 1f ea 99 3d 05 89 d1 07 82 Sep 21 07:33:41.587274: | f4 1b 23 53 55 92 6f 51 b6 7e 07 65 92 6b 29 9c Sep 21 07:33:41.587275: | bc 03 4c fc b4 41 71 4f 11 0e 33 d5 37 83 42 73 Sep 21 07:33:41.587277: | 64 ef 28 3f 29 58 b2 52 6d 86 64 b3 9e 6d 28 ee Sep 21 07:33:41.587278: | b5 02 fd 70 7c da 26 11 57 52 c9 a1 81 5e f7 07 Sep 21 07:33:41.587280: | fc 33 c6 26 81 f6 55 9d 02 56 ea 7f df 8e 61 a5 Sep 21 07:33:41.587281: | c6 dc b3 fe 70 30 92 cc a3 7f 94 57 67 cd a8 7a Sep 21 07:33:41.587282: | db 59 a9 8c 38 6b ee 06 e2 5e 57 74 8e 6c 20 7b Sep 21 07:33:41.587284: | 6f 0a e1 4d 91 1e ca 9a fc 0f 44 ff 8d 4a b7 94 Sep 21 07:33:41.587285: | f5 e8 79 50 8f 6e 45 dd 88 38 de 66 96 94 a4 d2 Sep 21 07:33:41.587286: | 0a 1c de a6 08 a7 2e de 4c b7 f9 59 b8 62 2d a6 Sep 21 07:33:41.587288: | 40 01 22 3d bf 6e 0f 41 12 55 53 Sep 21 07:33:41.587296: | sending 97 bytes for STATE_PARENT_R1 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:33:41.587298: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:41.587299: | 35 20 23 20 00 00 00 01 00 00 00 61 00 00 00 45 Sep 21 07:33:41.587300: | 00 05 00 05 92 0d 3e 2f 7b e6 f5 22 ab ee 0a e9 Sep 21 07:33:41.587302: | 3c 62 e3 9e ce 51 fe 8f ac 10 b4 52 f6 a9 c1 48 Sep 21 07:33:41.587303: | da 4b 3b 2f 15 8e 55 95 c6 95 88 38 ba 70 56 5d Sep 21 07:33:41.587304: | a8 bb 28 d0 57 75 f4 41 9e 01 b2 5a 7e 79 57 7a Sep 21 07:33:41.587306: | d4 Sep 21 07:33:41.587312: | sent 5 fragments Sep 21 07:33:41.587314: | releasing whack for #2 (sock=fd@-1) Sep 21 07:33:41.587316: | releasing whack and unpending for parent #1 Sep 21 07:33:41.587318: | unpending state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 Sep 21 07:33:41.587321: | #2 will start re-keying in 28530 seconds with margin of 270 seconds (attempting re-key) Sep 21 07:33:41.587323: | event_schedule: new EVENT_SA_REKEY-pe@0x555e54f9c410 Sep 21 07:33:41.587326: | inserting event EVENT_SA_REKEY, timeout in 28530 seconds for #2 Sep 21 07:33:41.587328: | libevent_malloc: new ptr-libevent@0x555e54f9c580 size 128 Sep 21 07:33:41.587331: | dpd enabled, scheduling ikev2 liveness checks Sep 21 07:33:41.587332: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:41.587335: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:41.587336: | libevent_malloc: new ptr-libevent@0x555e54fa7180 size 128 Sep 21 07:33:41.587338: | libevent_realloc: release ptr-libevent@0x555e54f6feb0 Sep 21 07:33:41.587340: | libevent_realloc: new ptr-libevent@0x555e54f9f7e0 size 128 Sep 21 07:33:41.587343: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Sep 21 07:33:41.587346: | #1 spent 13.8 milliseconds in resume sending helper answer Sep 21 07:33:41.587350: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) Sep 21 07:33:41.587353: | libevent_free: release ptr-libevent@0x7f1a8c006b90 Sep 21 07:33:41.587360: | processing signal PLUTO_SIGCHLD Sep 21 07:33:41.587364: | waitpid returned ECHILD (no child processes left) Sep 21 07:33:41.587367: | spent 0.00414 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:33:41.587370: | processing signal PLUTO_SIGCHLD Sep 21 07:33:41.587372: | waitpid returned ECHILD (no child processes left) Sep 21 07:33:41.587375: | spent 0.00227 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:33:41.587376: | processing signal PLUTO_SIGCHLD Sep 21 07:33:41.587378: | waitpid returned ECHILD (no child processes left) Sep 21 07:33:41.587380: | spent 0.00215 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:33:44.552474: | timer_event_cb: processing event@0x555e54f9e6c0 Sep 21 07:33:44.552518: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:33:44.552537: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:33:44.552551: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:33:44.552565: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:33:44.552605: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:33:44.552613: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:33:44.552621: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:44.552628: | libevent_malloc: new ptr-libevent@0x7f1a8c006b90 size 128 Sep 21 07:33:44.552637: | libevent_free: release ptr-libevent@0x555e54fa7180 Sep 21 07:33:44.552643: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:44.552656: | #2 spent 0.188 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:33:44.552668: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:33:47.554803: | timer_event_cb: processing event@0x555e54f9e0b0 Sep 21 07:33:47.554814: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:33:47.554821: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:33:47.554829: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:33:47.554840: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:33:47.554859: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:33:47.554875: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:47.554878: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:47.554880: | libevent_malloc: new ptr-libevent@0x555e54fa7180 size 128 Sep 21 07:33:47.554884: | libevent_free: release ptr-libevent@0x7f1a8c006b90 Sep 21 07:33:47.554886: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:33:47.554891: | #2 spent 0.0899 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:33:47.554895: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:33:50.558014: | timer_event_cb: processing event@0x555e54f9e6c0 Sep 21 07:33:50.558069: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:33:50.558097: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:33:50.558120: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:33:50.558142: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:33:50.558191: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:33:50.558203: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:33:50.558216: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:50.558227: | libevent_malloc: new ptr-libevent@0x7f1a8c006b90 size 128 Sep 21 07:33:50.558240: | libevent_free: release ptr-libevent@0x555e54fa7180 Sep 21 07:33:50.558250: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:50.558283: | #2 spent 0.274 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:33:50.558303: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:33:53.560855: | timer_event_cb: processing event@0x555e54f9e0b0 Sep 21 07:33:53.560869: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:33:53.560876: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:33:53.560880: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:33:53.560886: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:33:53.560898: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:33:53.560900: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:53.560903: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:53.560905: | libevent_malloc: new ptr-libevent@0x555e54fa7180 size 128 Sep 21 07:33:53.560909: | libevent_free: release ptr-libevent@0x7f1a8c006b90 Sep 21 07:33:53.560911: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:33:53.560916: | #2 spent 0.0573 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:33:53.560919: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:33:56.563887: | timer_event_cb: processing event@0x555e54f9e6c0 Sep 21 07:33:56.563932: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:33:56.563959: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:33:56.563980: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:33:56.564000: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:33:56.564050: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:33:56.564061: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:33:56.564073: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:56.564083: | libevent_malloc: new ptr-libevent@0x7f1a8c006b90 size 128 Sep 21 07:33:56.564097: | libevent_free: release ptr-libevent@0x555e54fa7180 Sep 21 07:33:56.564106: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:56.564125: | #2 spent 0.242 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:33:56.564142: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:33:59.567186: | timer_event_cb: processing event@0x555e54f9e0b0 Sep 21 07:33:59.567211: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:33:59.567228: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:33:59.567241: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:33:59.567255: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:33:59.567282: | #2 liveness initial timestamp set 49885.935544 Sep 21 07:33:59.567289: | #2 liveness_check - last_liveness: 49885.935544, now: 49885.935544 parent #1 Sep 21 07:33:59.567295: | Opening output PBS liveness probe informational request Sep 21 07:33:59.567301: | **emit ISAKMP Message: Sep 21 07:33:59.567306: | initiator cookie: Sep 21 07:33:59.567311: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:59.567315: | responder cookie: Sep 21 07:33:59.567319: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:59.567325: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:33:59.567330: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:59.567335: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:33:59.567346: | flags: none (0x0) Sep 21 07:33:59.567351: | Message ID: 0 (0x0) Sep 21 07:33:59.567356: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:33:59.567362: | ***emit IKEv2 Encryption Payload: Sep 21 07:33:59.567367: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:59.567372: | flags: none (0x0) Sep 21 07:33:59.567378: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:33:59.567383: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'liveness probe informational request' Sep 21 07:33:59.567390: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:33:59.567404: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:33:59.567411: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:33:59.567417: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:33:59.567422: | emitting length of IKEv2 Encryption Payload: 29 Sep 21 07:33:59.567426: | emitting length of ISAKMP Message: 57 Sep 21 07:33:59.567459: | sending 57 bytes for liveness probe informational request through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #2) Sep 21 07:33:59.567465: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:59.567469: | 2e 20 25 00 00 00 00 00 00 00 00 39 00 00 00 1d Sep 21 07:33:59.567474: | 17 44 9b 8c 6f 94 79 69 92 d9 66 48 08 aa af 0f Sep 21 07:33:59.567478: | 52 48 a0 a1 87 5f 9e f2 98 Sep 21 07:33:59.567563: | Message ID: #1.#2 XXX: in ikev2_send_livenss_probe() hacking around record'n'send bypassing send queue; initiator.sent=-1 initiator.recv=-1 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1 Sep 21 07:33:59.567572: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=1 responder.recv=1 wip.initiator=-1->0 wip.responder=-1 Sep 21 07:33:59.567576: | #2 liveness_check - peer 192.1.3.209 is missing - giving them some time to come back Sep 21 07:33:59.567581: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:33:59.567586: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:33:59.567591: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:33:59.567597: | libevent_malloc: new ptr-libevent@0x555e54fa7180 size 128 Sep 21 07:33:59.567604: | libevent_free: release ptr-libevent@0x7f1a8c006b90 Sep 21 07:33:59.567608: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:33:59.567617: | #2 spent 0.398 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:33:59.567627: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:33:59.567911: | spent 0.00366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Sep 21 07:33:59.567934: | *received 57 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) Sep 21 07:33:59.567939: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:33:59.567942: | 2e 20 25 28 00 00 00 00 00 00 00 39 00 00 00 1d Sep 21 07:33:59.567946: | 9b 51 08 a9 aa d6 98 2c aa cb 13 b4 19 bd 72 3e Sep 21 07:33:59.567949: | 0d 7b d6 64 f4 1d 45 35 b5 Sep 21 07:33:59.567956: | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) Sep 21 07:33:59.567961: | **parse ISAKMP Message: Sep 21 07:33:59.567965: | initiator cookie: Sep 21 07:33:59.567969: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:33:59.567973: | responder cookie: Sep 21 07:33:59.567976: | 11 57 af a7 c3 42 a7 ac Sep 21 07:33:59.567980: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Sep 21 07:33:59.567984: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:33:59.567988: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:33:59.567993: | flags: ISAKMP_FLAG_v2_IKE_INIT+ISAKMP_FLAG_v2_MSG_RESPONSE (0x28) Sep 21 07:33:59.568001: | Message ID: 0 (0x0) Sep 21 07:33:59.568005: | length: 57 (0x39) Sep 21 07:33:59.568009: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Sep 21 07:33:59.568014: | I am the IKE SA Original Responder receiving an IKEv2 INFORMATIONAL response Sep 21 07:33:59.568020: | State DB: found IKEv2 state #1 in PARENT_R2 (find_v2_ike_sa) Sep 21 07:33:59.568030: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2016) Sep 21 07:33:59.568039: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ike_process_packet() at ikev2.c:2062) Sep 21 07:33:59.568043: | #1 is idle Sep 21 07:33:59.568047: | #1 idle Sep 21 07:33:59.568050: | unpacking clear payload Sep 21 07:33:59.568054: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Sep 21 07:33:59.568059: | ***parse IKEv2 Encryption Payload: Sep 21 07:33:59.568063: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:33:59.568066: | flags: none (0x0) Sep 21 07:33:59.568070: | length: 29 (0x1d) Sep 21 07:33:59.568074: | processing payload: ISAKMP_NEXT_v2SK (len=25) Sep 21 07:33:59.568078: | #1 in state PARENT_R2: received v2I2, PARENT SA established Sep 21 07:33:59.568093: | #1 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success Sep 21 07:33:59.568098: | selected state microcode R2: process Informational Request Sep 21 07:33:59.568102: | Now let's proceed with state specific processing Sep 21 07:33:59.568106: | calling processor R2: process Informational Request Sep 21 07:33:59.568111: | an informational response Sep 21 07:33:59.568114: | MOBIKE response: not updating IPsec SA Sep 21 07:33:59.568118: | Received an INFORMATIONAL non-delete request; updating liveness, no longer pending. Sep 21 07:33:59.568127: | #1 spent 0.014 milliseconds in processing: R2: process Informational Request in ikev2_process_state_packet() Sep 21 07:33:59.568136: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v2_state_transition() at ikev2.c:3376) Sep 21 07:33:59.568142: | #1 complete_v2_state_transition() PARENT_R2->PARENT_R2 with status STF_OK Sep 21 07:33:59.568146: | Message ID: updating counters for #1 to 0 after switching state Sep 21 07:33:59.568154: | Message ID: recv #1 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=1 responder.recv=1 wip.initiator=0->-1 wip.responder=-1 Sep 21 07:33:59.568160: | Message ID: #1 skipping update_send as nothing to send; initiator.sent=0 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1 Sep 21 07:33:59.568165: | STATE_PARENT_R2: received v2I2, PARENT SA established Sep 21 07:33:59.568174: | stop processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in ikev2_process_packet() at ikev2.c:2018) Sep 21 07:33:59.568180: | #1 spent 0.256 milliseconds in ikev2_process_packet() Sep 21 07:33:59.568186: | stop processing: from 192.1.3.209:500 (in process_md() at demux.c:380) Sep 21 07:33:59.568191: | processing: STOP state #0 (in process_md() at demux.c:382) Sep 21 07:33:59.568195: | processing: STOP connection NULL (in process_md() at demux.c:383) Sep 21 07:33:59.568201: | spent 0.278 milliseconds in comm_handle_cb() reading and processing packet Sep 21 07:33:59.728412: | processing global timer EVENT_SHUNT_SCAN Sep 21 07:33:59.728430: | expiring aged bare shunts from shunt table Sep 21 07:33:59.728435: | spent 0.00374 milliseconds in global timer EVENT_SHUNT_SCAN Sep 21 07:34:02.570728: | timer_event_cb: processing event@0x555e54f9e6c0 Sep 21 07:34:02.570743: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:34:02.570750: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:34:02.570754: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:34:02.570763: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:34:02.570778: | #2 liveness_check - last_liveness: 49885.936387, now: 49888.939042 parent #1 Sep 21 07:34:02.570781: | Opening output PBS liveness probe informational request Sep 21 07:34:02.570787: | **emit ISAKMP Message: Sep 21 07:34:02.570805: | initiator cookie: Sep 21 07:34:02.570807: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:34:02.570808: | responder cookie: Sep 21 07:34:02.570810: | 11 57 af a7 c3 42 a7 ac Sep 21 07:34:02.570812: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:02.570826: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:02.570828: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:34:02.570830: | flags: none (0x0) Sep 21 07:34:02.570831: | Message ID: 1 (0x1) Sep 21 07:34:02.570833: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:02.570835: | ***emit IKEv2 Encryption Payload: Sep 21 07:34:02.570837: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:02.570839: | flags: none (0x0) Sep 21 07:34:02.570841: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:34:02.570842: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'liveness probe informational request' Sep 21 07:34:02.570845: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:34:02.570854: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:34:02.570856: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:34:02.570858: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:34:02.570860: | emitting length of IKEv2 Encryption Payload: 29 Sep 21 07:34:02.570861: | emitting length of ISAKMP Message: 57 Sep 21 07:34:02.570880: | sending 57 bytes for liveness probe informational request through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #2) Sep 21 07:34:02.570882: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:34:02.570884: | 2e 20 25 00 00 00 00 01 00 00 00 39 00 00 00 1d Sep 21 07:34:02.570885: | 8d 70 8f 71 21 28 34 cf 72 9b 40 96 2c dc 5b d8 Sep 21 07:34:02.570886: | b7 d9 0e 75 f7 3f 9c 4d e0 Sep 21 07:34:02.570926: | Message ID: #1.#2 XXX: in ikev2_send_livenss_probe() hacking around record'n'send bypassing send queue; initiator.sent=0 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1 Sep 21 07:34:02.570929: | Message ID: sent #1 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=-1->1 wip.responder=-1 Sep 21 07:34:02.570931: | #2 liveness_check - peer 192.1.3.209 is missing - giving them some time to come back Sep 21 07:34:02.570933: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:34:02.570935: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:34:02.570937: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:34:02.570940: | libevent_malloc: new ptr-libevent@0x7f1a8c006b90 size 128 Sep 21 07:34:02.570943: | libevent_free: release ptr-libevent@0x555e54fa7180 Sep 21 07:34:02.570945: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:34:02.570950: | #2 spent 0.203 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:34:02.570954: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:34:05.573841: | timer_event_cb: processing event@0x555e54f9e0b0 Sep 21 07:34:05.573857: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:34:05.573866: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:34:05.573873: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:34:05.573885: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:34:05.573903: | #2 liveness_check - last_liveness: 49885.936387, now: 49891.942166 parent #1 Sep 21 07:34:05.573906: | Opening output PBS liveness probe informational request Sep 21 07:34:05.573909: | **emit ISAKMP Message: Sep 21 07:34:05.573911: | initiator cookie: Sep 21 07:34:05.573913: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:34:05.573915: | responder cookie: Sep 21 07:34:05.573917: | 11 57 af a7 c3 42 a7 ac Sep 21 07:34:05.573920: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:05.573922: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:05.573925: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:34:05.573927: | flags: none (0x0) Sep 21 07:34:05.573929: | Message ID: 2 (0x2) Sep 21 07:34:05.573932: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:05.573934: | ***emit IKEv2 Encryption Payload: Sep 21 07:34:05.573937: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:05.573939: | flags: none (0x0) Sep 21 07:34:05.573941: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:34:05.573944: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'liveness probe informational request' Sep 21 07:34:05.573947: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:34:05.573960: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:34:05.573963: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:34:05.573965: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:34:05.573967: | emitting length of IKEv2 Encryption Payload: 29 Sep 21 07:34:05.573970: | emitting length of ISAKMP Message: 57 Sep 21 07:34:05.573988: | sending 57 bytes for liveness probe informational request through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #2) Sep 21 07:34:05.573991: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:34:05.573993: | 2e 20 25 00 00 00 00 02 00 00 00 39 00 00 00 1d Sep 21 07:34:05.573995: | c2 24 4f e2 94 15 44 a5 76 56 86 6c 0a 88 85 4d Sep 21 07:34:05.573997: | 36 92 4b 5b 54 bd 36 03 fb Sep 21 07:34:05.574040: | Message ID: #1.#2 XXX: in ikev2_send_livenss_probe() hacking around record'n'send bypassing send queue; initiator.sent=1 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1 Sep 21 07:34:05.574045: | Message ID: #1 XXX: expecting sender.wip.initiator 1 == -1 - suspect record'n'send out-of-order?); initiator.sent=2 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=2 wip.responder=-1 Sep 21 07:34:05.574049: | Message ID: sent #1 request 2; ike: initiator.sent=1->2 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=1->2 wip.responder=-1 Sep 21 07:34:05.574051: | #2 liveness_check - peer 192.1.3.209 is missing - giving them some time to come back Sep 21 07:34:05.574053: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:34:05.574056: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:34:05.574059: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:34:05.574062: | libevent_malloc: new ptr-libevent@0x555e54fa7180 size 128 Sep 21 07:34:05.574067: | libevent_free: release ptr-libevent@0x7f1a8c006b90 Sep 21 07:34:05.574069: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:34:05.574076: | #2 spent 0.215 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:34:05.574081: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:34:08.576833: | timer_event_cb: processing event@0x555e54f9e6c0 Sep 21 07:34:08.576859: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:34:08.576870: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:34:08.576877: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:34:08.576886: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:34:08.576908: | #2 liveness_check - last_liveness: 49885.936387, now: 49894.945171 parent #1 Sep 21 07:34:08.576912: | Opening output PBS liveness probe informational request Sep 21 07:34:08.576915: | **emit ISAKMP Message: Sep 21 07:34:08.576918: | initiator cookie: Sep 21 07:34:08.576920: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:34:08.576922: | responder cookie: Sep 21 07:34:08.576924: | 11 57 af a7 c3 42 a7 ac Sep 21 07:34:08.576927: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:08.576929: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:08.576932: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:34:08.576934: | flags: none (0x0) Sep 21 07:34:08.576936: | Message ID: 3 (0x3) Sep 21 07:34:08.576939: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:08.576942: | ***emit IKEv2 Encryption Payload: Sep 21 07:34:08.576945: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:08.576947: | flags: none (0x0) Sep 21 07:34:08.576950: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:34:08.576953: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'liveness probe informational request' Sep 21 07:34:08.576956: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:34:08.576966: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:34:08.576970: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:34:08.576973: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:34:08.576975: | emitting length of IKEv2 Encryption Payload: 29 Sep 21 07:34:08.576977: | emitting length of ISAKMP Message: 57 Sep 21 07:34:08.576998: | sending 57 bytes for liveness probe informational request through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #2) Sep 21 07:34:08.577001: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:34:08.577003: | 2e 20 25 00 00 00 00 03 00 00 00 39 00 00 00 1d Sep 21 07:34:08.577005: | 07 a0 d5 75 c8 74 9e 85 9d d9 d2 59 7b 12 93 2f Sep 21 07:34:08.577007: | 4b 50 f6 51 25 3a aa 74 79 Sep 21 07:34:08.577058: | Message ID: #1.#2 XXX: in ikev2_send_livenss_probe() hacking around record'n'send bypassing send queue; initiator.sent=2 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=-1 wip.responder=-1 Sep 21 07:34:08.577065: | Message ID: #1 XXX: expecting sender.wip.initiator 2 == -1 - suspect record'n'send out-of-order?); initiator.sent=3 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=3 wip.responder=-1 Sep 21 07:34:08.577069: | Message ID: sent #1 request 3; ike: initiator.sent=2->3 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=2->3 wip.responder=-1 Sep 21 07:34:08.577071: | #2 liveness_check - peer 192.1.3.209 is missing - giving them some time to come back Sep 21 07:34:08.577074: | #2 liveness_check - peer 192.1.3.209 is ok schedule new Sep 21 07:34:08.577077: | event_schedule: new EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:34:08.577080: | inserting event EVENT_v2_LIVENESS, timeout in 3 seconds for #2 Sep 21 07:34:08.577084: | libevent_malloc: new ptr-libevent@0x7f1a8c006b90 size 128 Sep 21 07:34:08.577088: | libevent_free: release ptr-libevent@0x555e54fa7180 Sep 21 07:34:08.577091: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e6c0 Sep 21 07:34:08.577098: | #2 spent 0.243 milliseconds in timer_event_cb() EVENT_v2_LIVENESS Sep 21 07:34:08.577106: | stop processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) Sep 21 07:34:11.579805: | timer_event_cb: processing event@0x555e54f9e0b0 Sep 21 07:34:11.579820: | handling event EVENT_v2_LIVENESS for child state #2 Sep 21 07:34:11.579829: | start processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) Sep 21 07:34:11.579834: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in liveness_check() at timer.c:113) Sep 21 07:34:11.579840: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:34:11.579856: | #2 liveness_check - last_liveness: 49885.936387, now: 49897.948119 parent #1 Sep 21 07:34:11.579860: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: liveness_check - peer 192.1.3.209 has not responded in 12 seconds, with a timeout of 10, taking action:restart Sep 21 07:34:11.579864: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: IKEv2 liveness action - restarting all connections that share this peer Sep 21 07:34:11.579867: | FOR_EACH_CONNECTION_... in conn_by_name Sep 21 07:34:11.579871: | start processing: connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 (BACKGROUND) (in terminate_a_connection() at terminate.c:69) Sep 21 07:34:11.579873: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: terminating SAs using this connection Sep 21 07:34:11.579875: | connection 'rw-east-pool-x509-ipv4' -POLICY_UP Sep 21 07:34:11.579877: | FOR_EACH_STATE_... in shared_phase1_connection Sep 21 07:34:11.579880: | connection not shared - terminating IKE and IPsec SA Sep 21 07:34:11.579882: | Deleting states for connection - not including other IPsec SA's Sep 21 07:34:11.579883: | pass 0 Sep 21 07:34:11.579885: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:34:11.579887: | state #2 Sep 21 07:34:11.579891: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:34:11.579894: | pstats #2 ikev2.child deleted completed Sep 21 07:34:11.579898: | #2 spent 1.91 milliseconds in total Sep 21 07:34:11.579902: | [RE]START processing: state #2 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in delete_state() at state.c:879) Sep 21 07:34:11.579906: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: deleting state (STATE_V2_IPSEC_R) aged 30.020s and sending notification Sep 21 07:34:11.579908: | child state #2: V2_IPSEC_R(established CHILD SA) => delete Sep 21 07:34:11.579911: | get_sa_info esp.d3b5ac2@192.1.3.209 Sep 21 07:34:11.579918: | get_sa_info esp.65204c5c@192.1.2.23 Sep 21 07:34:11.579924: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #2: ESP traffic information: in=336B out=336B Sep 21 07:34:11.579927: | #2 send IKEv2 delete notification for STATE_V2_IPSEC_R Sep 21 07:34:11.579929: | Opening output PBS informational exchange delete request Sep 21 07:34:11.579932: | **emit ISAKMP Message: Sep 21 07:34:11.579934: | initiator cookie: Sep 21 07:34:11.579936: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:34:11.579938: | responder cookie: Sep 21 07:34:11.579940: | 11 57 af a7 c3 42 a7 ac Sep 21 07:34:11.579942: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:11.579944: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:11.579946: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:34:11.579949: | flags: none (0x0) Sep 21 07:34:11.579951: | Message ID: 4 (0x4) Sep 21 07:34:11.579953: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:11.579955: | ***emit IKEv2 Encryption Payload: Sep 21 07:34:11.579958: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:11.579959: | flags: none (0x0) Sep 21 07:34:11.579962: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:34:11.579968: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'informational exchange delete request' Sep 21 07:34:11.579971: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:34:11.579981: | ****emit IKEv2 Delete Payload: Sep 21 07:34:11.579983: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:11.579985: | flags: none (0x0) Sep 21 07:34:11.579987: | protocol ID: PROTO_v2_ESP (0x3) Sep 21 07:34:11.579989: | SPI size: 4 (0x4) Sep 21 07:34:11.579990: | number of SPIs: 1 (0x1) Sep 21 07:34:11.579993: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) Sep 21 07:34:11.579995: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'informational exchange delete request' Sep 21 07:34:11.579998: | emitting 4 raw bytes of local spis into IKEv2 Delete Payload Sep 21 07:34:11.579999: | local spis 65 20 4c 5c Sep 21 07:34:11.580002: | emitting length of IKEv2 Delete Payload: 12 Sep 21 07:34:11.580004: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:34:11.580006: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:34:11.580009: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:34:11.580011: | emitting length of IKEv2 Encryption Payload: 41 Sep 21 07:34:11.580013: | emitting length of ISAKMP Message: 69 Sep 21 07:34:11.580032: | sending 69 bytes for delete notification through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #2) Sep 21 07:34:11.580035: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:34:11.580037: | 2e 20 25 00 00 00 00 04 00 00 00 45 2a 00 00 29 Sep 21 07:34:11.580038: | 10 14 c1 b2 dc ea 83 8f 0a 11 ad 60 1e f5 23 f5 Sep 21 07:34:11.580040: | 9e a6 39 96 f4 e0 ed 2f a9 7d 0c 58 f3 2b 79 6c Sep 21 07:34:11.580042: | f4 02 39 0b 31 Sep 21 07:34:11.580085: | Message ID: IKE #1 sender #2 in send_delete record 'n' sending delete request so forcing IKE nextuse=0->1 and sender msgid=0->0 Sep 21 07:34:11.580088: | Message ID: IKE #1 sender #2 in send_delete hacking around record ' send Sep 21 07:34:11.580092: | Message ID: #1 XXX: expecting sender.wip.initiator 3 == -1 - suspect record'n'send out-of-order?); initiator.sent=4 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=4 wip.responder=-1 Sep 21 07:34:11.580096: | Message ID: sent #1 request 4; ike: initiator.sent=3->4 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=3->4 wip.responder=-1 Sep 21 07:34:11.580098: | state #2 requesting EVENT_SA_REKEY to be deleted Sep 21 07:34:11.580101: | libevent_free: release ptr-libevent@0x555e54f9c580 Sep 21 07:34:11.580104: | free_event_entry: release EVENT_SA_REKEY-pe@0x555e54f9c410 Sep 21 07:34:11.580164: | running updown command "ipsec _updown" for verb down Sep 21 07:34:11.580168: | command executing down-client Sep 21 07:34:11.580201: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051221' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_C Sep 21 07:34:11.580203: | popen cmd is 1291 chars long Sep 21 07:34:11.580208: | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509: Sep 21 07:34:11.580210: | cmd( 80):-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23': Sep 21 07:34:11.580212: | cmd( 160): PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=e: Sep 21 07:34:11.580214: | cmd( 240):ast.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0: Sep 21 07:34:11.580216: | cmd( 320):.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_: Sep 21 07:34:11.580218: | cmd( 400):PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_: Sep 21 07:34:11.580220: | cmd( 480):PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=T: Sep 21 07:34:11.580222: | cmd( 560):est Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org: Sep 21 07:34:11.580224: | cmd( 640):' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_P: Sep 21 07:34:11.580226: | cmd( 720):EER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL: Sep 21 07:34:11.580228: | cmd( 800):UTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051221' PLUTO_CONN_POLICY: Sep 21 07:34:11.580230: | cmd( 880):='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO: Sep 21 07:34:11.580232: | cmd( 960):_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_: Sep 21 07:34:11.580234: | cmd(1040):PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNE: Sep 21 07:34:11.580235: | cmd(1120):R='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE: Sep 21 07:34:11.580237: | cmd(1200):='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xd3b5ac2 SPI_OUT=0x65204c5c ipsec _: Sep 21 07:34:11.580239: | cmd(1280):updown 2>&1: Sep 21 07:34:11.588446: | shunt_eroute() called for connection 'rw-east-pool-x509-ipv4' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0.0.0.0/0:0 --0->- 192.0.2.100/32:0 Sep 21 07:34:11.588461: | netlink_shunt_eroute for proto 0, and source 0.0.0.0/0:0 dest 192.0.2.100/32:0 Sep 21 07:34:11.588465: | priority calculation of connection "rw-east-pool-x509-ipv4" is 0xfffdf Sep 21 07:34:11.588468: | IPsec Sa SPD priority set to 1048543 Sep 21 07:34:11.588514: | delete esp.d3b5ac2@192.1.3.209 Sep 21 07:34:11.588548: | netlink response for Del SA esp.d3b5ac2@192.1.3.209 included non-error error Sep 21 07:34:11.588551: | priority calculation of connection "rw-east-pool-x509-ipv4" is 0xfffdf Sep 21 07:34:11.588556: | delete inbound eroute 192.0.2.100/32:0 --0-> 0.0.0.0/0:0 => unk255.10000@192.1.2.23 (raw_eroute) Sep 21 07:34:11.588599: | raw_eroute result=success Sep 21 07:34:11.588603: | delete esp.65204c5c@192.1.2.23 Sep 21 07:34:11.588628: | netlink response for Del SA esp.65204c5c@192.1.2.23 included non-error error Sep 21 07:34:11.588636: | stop processing: connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 (BACKGROUND) (in update_state_connection() at connections.c:4037) Sep 21 07:34:11.588638: | start processing: connection NULL (in update_state_connection() at connections.c:4038) Sep 21 07:34:11.588640: | in connection_discard for connection rw-east-pool-x509-ipv4 Sep 21 07:34:11.588643: | State DB: deleting IKEv2 state #2 in V2_IPSEC_R Sep 21 07:34:11.588647: | child state #2: V2_IPSEC_R(established CHILD SA) => UNDEFINED(ignore) Sep 21 07:34:11.588652: | stop processing: state #2 from 192.1.3.209:500 (in delete_state() at state.c:1143) Sep 21 07:34:11.588657: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:34:11.588659: | state #1 Sep 21 07:34:11.588661: | pass 1 Sep 21 07:34:11.588663: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:34:11.588665: | state #1 Sep 21 07:34:11.588669: | start processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Sep 21 07:34:11.588675: | pstats #1 ikev2.ike deleted completed Sep 21 07:34:11.588679: | #1 spent 24.4 milliseconds in total Sep 21 07:34:11.588683: | [RE]START processing: state #1 connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 from 192.1.3.209:500 (in delete_state() at state.c:879) Sep 21 07:34:11.588687: "rw-east-pool-x509-ipv4"[1] 192.1.3.209 #1: deleting state (STATE_PARENT_R2) aged 30.063s and sending notification Sep 21 07:34:11.588690: | parent state #1: PARENT_R2(established IKE SA) => delete Sep 21 07:34:11.588745: | #1 send IKEv2 delete notification for STATE_PARENT_R2 Sep 21 07:34:11.588749: | Opening output PBS informational exchange delete request Sep 21 07:34:11.588751: | **emit ISAKMP Message: Sep 21 07:34:11.588753: | initiator cookie: Sep 21 07:34:11.588755: | 1b 11 cf 71 60 4f e5 ec Sep 21 07:34:11.588757: | responder cookie: Sep 21 07:34:11.588759: | 11 57 af a7 c3 42 a7 ac Sep 21 07:34:11.588761: | next payload type: ISAKMP_NEXT_NONE (0x0) Sep 21 07:34:11.588764: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Sep 21 07:34:11.588766: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Sep 21 07:34:11.588768: | flags: none (0x0) Sep 21 07:34:11.588770: | Message ID: 5 (0x5) Sep 21 07:34:11.588772: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Sep 21 07:34:11.588775: | ***emit IKEv2 Encryption Payload: Sep 21 07:34:11.588777: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:11.588779: | flags: none (0x0) Sep 21 07:34:11.588782: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Sep 21 07:34:11.588792: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'informational exchange delete request' Sep 21 07:34:11.588796: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Sep 21 07:34:11.588804: | ****emit IKEv2 Delete Payload: Sep 21 07:34:11.588806: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Sep 21 07:34:11.588808: | flags: none (0x0) Sep 21 07:34:11.588810: | protocol ID: PROTO_v2_IKE (0x1) Sep 21 07:34:11.588812: | SPI size: 0 (0x0) Sep 21 07:34:11.588814: | number of SPIs: 0 (0x0) Sep 21 07:34:11.588816: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) Sep 21 07:34:11.588819: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'informational exchange delete request' Sep 21 07:34:11.588821: | emitting length of IKEv2 Delete Payload: 8 Sep 21 07:34:11.588823: | adding 1 bytes of padding (including 1 byte padding-length) Sep 21 07:34:11.588826: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Sep 21 07:34:11.588828: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Sep 21 07:34:11.588830: | emitting length of IKEv2 Encryption Payload: 37 Sep 21 07:34:11.588832: | emitting length of ISAKMP Message: 65 Sep 21 07:34:11.588849: | sending 65 bytes for delete notification through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) Sep 21 07:34:11.588852: | 1b 11 cf 71 60 4f e5 ec 11 57 af a7 c3 42 a7 ac Sep 21 07:34:11.588854: | 2e 20 25 00 00 00 00 05 00 00 00 41 2a 00 00 25 Sep 21 07:34:11.588855: | 89 36 e6 eb 34 39 99 40 48 e1 6d 65 67 3d f7 08 Sep 21 07:34:11.588857: | 26 5b 4f b1 cb ec d0 f8 0c fe 2a 68 4c 7e 59 ff Sep 21 07:34:11.588859: | 96 Sep 21 07:34:11.588895: | Message ID: IKE #1 sender #1 in send_delete record 'n' sending delete request so forcing IKE nextuse=1->2 and sender msgid=0->1 Sep 21 07:34:11.588898: | Message ID: IKE #1 sender #1 in send_delete hacking around record ' send Sep 21 07:34:11.588902: | Message ID: #1 XXX: expecting sender.wip.initiator 4 == -1 - suspect record'n'send out-of-order?); initiator.sent=5 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=5 wip.responder=-1 Sep 21 07:34:11.588908: | Message ID: sent #1 request 5; ike: initiator.sent=4->5 initiator.recv=0 responder.sent=1 responder.recv=1 wip.initiator=4->5 wip.responder=-1 Sep 21 07:34:11.588911: | state #1 requesting EVENT_SA_REKEY to be deleted Sep 21 07:34:11.588915: | libevent_free: release ptr-libevent@0x555e54f8edd0 Sep 21 07:34:11.588917: | free_event_entry: release EVENT_SA_REKEY-pe@0x555e54f9e300 Sep 21 07:34:11.588920: | State DB: IKEv2 state not found (flush_incomplete_children) Sep 21 07:34:11.588923: | in connection_discard for connection rw-east-pool-x509-ipv4 Sep 21 07:34:11.588925: | State DB: deleting IKEv2 state #1 in PARENT_R2 Sep 21 07:34:11.588927: | parent state #1: PARENT_R2(established IKE SA) => UNDEFINED(ignore) Sep 21 07:34:11.588936: | unreference key: 0x555e54f9def0 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 2-- Sep 21 07:34:11.588948: | stop processing: state #1 from 192.1.3.209:500 (in delete_state() at state.c:1143) Sep 21 07:34:11.588962: | unreference key: 0x555e54f9def0 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org cnt 1-- Sep 21 07:34:11.588967: | unreference key: 0x555e54fa03e0 user-road@testing.libreswan.org cnt 1-- Sep 21 07:34:11.588970: | unreference key: 0x555e54fa1500 @road.testing.libreswan.org cnt 1-- Sep 21 07:34:11.588982: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Sep 21 07:34:11.588987: | start processing: connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 (in delete_connection() at connections.c:189) Sep 21 07:34:11.588991: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: deleting connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 instance with peer 192.1.3.209 {isakmp=#0/ipsec=#0} Sep 21 07:34:11.588993: | addresspool can share this lease Sep 21 07:34:11.588999: | left (to linger) lease refcnt 0 192.0.2.100/32:0 from addresspool 192.0.2.100-192.0.2.199 index=0. pool size 100 used 1 lingering=1 address Sep 21 07:34:11.589001: | Deleting states for connection - not including other IPsec SA's Sep 21 07:34:11.589003: | pass 0 Sep 21 07:34:11.589005: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:34:11.589006: | pass 1 Sep 21 07:34:11.589008: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Sep 21 07:34:11.589013: | shunt_eroute() called for connection 'rw-east-pool-x509-ipv4' to 'delete' for rt_kind 'unrouted' using protoports 0.0.0.0/0:0 --0->- 192.0.2.100/32:0 Sep 21 07:34:11.589016: | netlink_shunt_eroute for proto 0, and source 0.0.0.0/0:0 dest 192.0.2.100/32:0 Sep 21 07:34:11.589019: | priority calculation of connection "rw-east-pool-x509-ipv4" is 0xfffdf Sep 21 07:34:11.589047: | priority calculation of connection "rw-east-pool-x509-ipv4" is 0xfffdf Sep 21 07:34:11.589055: | FOR_EACH_CONNECTION_... in route_owner Sep 21 07:34:11.589058: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 vs Sep 21 07:34:11.589060: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 Sep 21 07:34:11.589062: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 vs Sep 21 07:34:11.589064: | conn rw-east-pool-x509-ipv4 mark 0/00000000, 0/00000000 Sep 21 07:34:11.589067: | route owner of "rw-east-pool-x509-ipv4" unrouted: NULL Sep 21 07:34:11.589069: | running updown command "ipsec _updown" for verb unroute Sep 21 07:34:11.589071: | command executing unroute-client Sep 21 07:34:11.589101: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CON Sep 21 07:34:11.589106: | popen cmd is 1273 chars long Sep 21 07:34:11.589108: | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='rw-east-pool-x: Sep 21 07:34:11.589110: | cmd( 80):509-ipv4' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.209' PLUTO_ME='192.1.2.: Sep 21 07:34:11.589112: | cmd( 160):23' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, C: Sep 21 07:34:11.589114: | cmd( 240):N=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_MY_CLIENT: Sep 21 07:34:11.589116: | cmd( 320):='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_: Sep 21 07:34:11.589118: | cmd( 400):MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PL: Sep 21 07:34:11.589120: | cmd( 480):UTO_PEER='192.1.3.209' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, : Sep 21 07:34:11.589122: | cmd( 560):OU=Test Department, CN=road.testing.libreswan.org, E=user-road@testing.libreswan: Sep 21 07:34:11.589124: | cmd( 640):.org' PLUTO_PEER_CLIENT='192.0.2.100/32' PLUTO_PEER_CLIENT_NET='192.0.2.100' PLU: Sep 21 07:34:11.589126: | cmd( 720):TO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0: Sep 21 07:34:11.589128: | cmd( 800):' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSA: Sep 21 07:34:11.589130: | cmd( 880):SIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN: Sep 21 07:34:11.589132: | cmd( 960):_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_: Sep 21 07:34:11.589134: | cmd(1040):CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' : Sep 21 07:34:11.589136: | cmd(1120):PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' V: Sep 21 07:34:11.589138: | cmd(1200):TI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: Sep 21 07:34:11.597988: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598002: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598005: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598007: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598011: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598014: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598017: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598027: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598042: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598048: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598576: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598584: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.598589: "rw-east-pool-x509-ipv4"[1] 192.1.3.209: unroute-client output: Error: Peer netns reference is invalid. Sep 21 07:34:11.606252: | unreference addresspool of conn rw-east-pool-x509-ipv4[1] kind CK_GOING_AWAY refcnt 2 Sep 21 07:34:11.606264: | free hp@0x555e54f27bc0 Sep 21 07:34:11.606267: | flush revival: connection 'rw-east-pool-x509-ipv4' wasn't on the list Sep 21 07:34:11.606271: | stop processing: connection "rw-east-pool-x509-ipv4"[1] 192.1.3.209 (in discard_connection() at connections.c:249) Sep 21 07:34:11.606277: | processing: STOP connection NULL (in terminate_a_connection() at terminate.c:87) Sep 21 07:34:11.606279: | no connection to restart after termination Sep 21 07:34:11.606283: | libevent_free: release ptr-libevent@0x7f1a8c006b90 Sep 21 07:34:11.606286: | free_event_entry: release EVENT_v2_LIVENESS-pe@0x555e54f9e0b0 Sep 21 07:34:11.606288: | in statetime_stop() and could not find #2 Sep 21 07:34:11.606291: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Sep 21 07:34:11.606298: | processing signal PLUTO_SIGCHLD Sep 21 07:34:11.606303: | waitpid returned ECHILD (no child processes left) Sep 21 07:34:11.606307: | spent 0.00472 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:34:11.606309: | processing signal PLUTO_SIGCHLD Sep 21 07:34:11.606311: | waitpid returned ECHILD (no child processes left) Sep 21 07:34:11.606314: | spent 0.00254 milliseconds in signal handler PLUTO_SIGCHLD Sep 21 07:34:19.736824: | processing global timer EVENT_SHUNT_SCAN Sep 21 07:34:19.736839: | expiring aged bare shunts from shunt table Sep 21 07:34:19.736845: | spent 0.00377 milliseconds in global timer EVENT_SHUNT_SCAN Sep 21 07:34:39.745913: | processing global timer EVENT_PENDING_DDNS Sep 21 07:34:39.745926: | FOR_EACH_CONNECTION_... in connection_check_ddns Sep 21 07:34:39.745929: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Sep 21 07:34:39.745933: | elapsed time in connection_check_ddns for hostname lookup 0.000006 Sep 21 07:34:39.745938: | spent 0.0115 milliseconds in global timer EVENT_PENDING_DDNS Sep 21 07:34:39.745941: | processing global timer EVENT_SHUNT_SCAN Sep 21 07:34:39.745944: | expiring aged bare shunts from shunt table Sep 21 07:34:39.745948: | spent 0.00346 milliseconds in global timer EVENT_SHUNT_SCAN