FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:14608 core dump dir: /tmp secrets file: /etc/ipsec.secrets leak-detective disabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x555cb42e0ff0 size 40 | libevent_malloc: new ptr-libevent@0x555cb42e1020 size 40 | libevent_malloc: new ptr-libevent@0x555cb42e2310 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x555cb42e22d0 size 56 | libevent_malloc: new ptr-libevent@0x555cb42e2340 size 664 | libevent_malloc: new ptr-libevent@0x555cb42e25e0 size 24 | libevent_malloc: new ptr-libevent@0x555cb42d3fa0 size 384 | libevent_malloc: new ptr-libevent@0x555cb42e2600 size 16 | libevent_malloc: new ptr-libevent@0x555cb42e2620 size 40 | libevent_malloc: new ptr-libevent@0x555cb42e2650 size 48 | libevent_realloc: new ptr-libevent@0x555cb4264370 size 256 | libevent_malloc: new ptr-libevent@0x555cb42e2690 size 16 | libevent_free: release ptr-libevent@0x555cb42e22d0 | libevent initialized | libevent_realloc: new ptr-libevent@0x555cb42e26b0 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 started thread for crypto helper 1 started thread for crypto helper 2 started thread for crypto helper 3 started thread for crypto helper 4 started thread for crypto helper 5 started thread for crypto helper 6 | checking IKEv1 state table | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x555cb42ec9c0 | libevent_malloc: new ptr-libevent@0x555cb42f3e90 size 128 | libevent_malloc: new ptr-libevent@0x555cb42e7c30 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x555cb42e7260 | libevent_malloc: new ptr-libevent@0x555cb42f3f20 size 128 | libevent_malloc: new ptr-libevent@0x555cb42e2700 size 16 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) systemd watchdog not enabled - not sending watchdog keepalives | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x555cb42e6fb0 | libevent_malloc: new ptr-libevent@0x555cb42fe490 size 128 | libevent_malloc: new ptr-libevent@0x555cb42fe520 size 16 | libevent_realloc: new ptr-libevent@0x555cb42625b0 size 256 | libevent_malloc: new ptr-libevent@0x555cb42fe540 size 8 | libevent_realloc: new ptr-libevent@0x555cb42f3190 size 144 | libevent_malloc: new ptr-libevent@0x555cb42fe560 size 152 | libevent_malloc: new ptr-libevent@0x555cb42fe600 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x555cb42fe620 size 8 | libevent_malloc: new ptr-libevent@0x555cb42fe640 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x555cb42fe6e0 size 8 | libevent_malloc: new ptr-libevent@0x555cb42fe700 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x555cb42fe7a0 size 8 | libevent_realloc: release ptr-libevent@0x555cb42f3190 | libevent_realloc: new ptr-libevent@0x555cb42fe7c0 size 256 | libevent_malloc: new ptr-libevent@0x555cb42f3190 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:14677) using fork+execve | forked child 14677 | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) | starting up helper thread 3 | status value returned by setting the priority of this thread (crypto helper 3) 22 | crypto helper 3 waiting (nothing to do) | starting up helper thread 0 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) | starting up helper thread 1 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | pluto_sd: executing action action: reloading(4), status 0 listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.2.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.23 Kernel supports NIC esp-hw-offload adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.1.2.23:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.0.2.254:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x555cb42e7d30 | libevent_malloc: new ptr-libevent@0x555cb42feb30 size 128 | libevent_malloc: new ptr-libevent@0x555cb42febc0 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x555cb42febe0 | libevent_malloc: new ptr-libevent@0x555cb42fec20 size 128 | libevent_malloc: new ptr-libevent@0x555cb42fecb0 size 16 | setup callback for interface lo 127.0.0.1:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x555cb42fecd0 | libevent_malloc: new ptr-libevent@0x555cb42fed10 size 128 | libevent_malloc: new ptr-libevent@0x555cb42feda0 size 16 | setup callback for interface eth0 192.0.2.254:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x555cb42fedc0 | libevent_malloc: new ptr-libevent@0x555cb42fee00 size 128 | libevent_malloc: new ptr-libevent@0x555cb42fee90 size 16 | setup callback for interface eth0 192.0.2.254:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x555cb42feeb0 | libevent_malloc: new ptr-libevent@0x555cb42feef0 size 128 | libevent_malloc: new ptr-libevent@0x555cb42fef80 size 16 | setup callback for interface eth1 192.1.2.23:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x555cb42fefa0 | libevent_malloc: new ptr-libevent@0x555cb42fefe0 size 128 | libevent_malloc: new ptr-libevent@0x555cb42ff070 size 16 | setup callback for interface eth1 192.1.2.23:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | id type added to secret(0x555cb42f4070) PKK_PSK: %any | id type added to secret(0x555cb42f4070) PKK_PSK: %any | Processing PSK at line 10: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | id type added to secret(0x555cb42626c0) PKK_PSK: @west | id type added to secret(0x555cb42626c0) PKK_PSK: @east | Processing PSK at line 12: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | id type added to secret(0x555cb43008c0) PKK_PSK: @east | id type added to secret(0x555cb43008c0) PKK_PSK: @roadrandom | Processing PSK at line 13: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | pluto_sd: executing action action: ready(5), status 0 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.754 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | pluto_sd: executing action action: reloading(4), status 0 listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.2.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.23 | no interfaces to sort | libevent_free: release ptr-libevent@0x555cb42feb30 | free_event_entry: release EVENT_NULL-pe@0x555cb42e7d30 | add_fd_read_event_handler: new ethX-pe@0x555cb42e7d30 | libevent_malloc: new ptr-libevent@0x555cb42feb30 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 22 | libevent_free: release ptr-libevent@0x555cb42fec20 | free_event_entry: release EVENT_NULL-pe@0x555cb42febe0 | add_fd_read_event_handler: new ethX-pe@0x555cb42febe0 | libevent_malloc: new ptr-libevent@0x555cb42fec20 size 128 | setup callback for interface lo 127.0.0.1:500 fd 21 | libevent_free: release ptr-libevent@0x555cb42fed10 | free_event_entry: release EVENT_NULL-pe@0x555cb42fecd0 | add_fd_read_event_handler: new ethX-pe@0x555cb42fecd0 | libevent_malloc: new ptr-libevent@0x555cb42fed10 size 128 | setup callback for interface eth0 192.0.2.254:4500 fd 20 | libevent_free: release ptr-libevent@0x555cb42fee00 | free_event_entry: release EVENT_NULL-pe@0x555cb42fedc0 | add_fd_read_event_handler: new ethX-pe@0x555cb42fedc0 | libevent_malloc: new ptr-libevent@0x555cb42fee00 size 128 | setup callback for interface eth0 192.0.2.254:500 fd 19 | libevent_free: release ptr-libevent@0x555cb42feef0 | free_event_entry: release EVENT_NULL-pe@0x555cb42feeb0 | add_fd_read_event_handler: new ethX-pe@0x555cb42feeb0 | libevent_malloc: new ptr-libevent@0x555cb42feef0 size 128 | setup callback for interface eth1 192.1.2.23:4500 fd 18 | libevent_free: release ptr-libevent@0x555cb42fefe0 | free_event_entry: release EVENT_NULL-pe@0x555cb42fefa0 | add_fd_read_event_handler: new ethX-pe@0x555cb42fefa0 | libevent_malloc: new ptr-libevent@0x555cb42fefe0 size 128 | setup callback for interface eth1 192.1.2.23:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | id type added to secret(0x555cb42f4070) PKK_PSK: %any | id type added to secret(0x555cb42f4070) PKK_PSK: %any | Processing PSK at line 10: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | id type added to secret(0x555cb42626c0) PKK_PSK: @west | id type added to secret(0x555cb42626c0) PKK_PSK: @east | Processing PSK at line 12: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | id type added to secret(0x555cb43008c0) PKK_PSK: @east | id type added to secret(0x555cb43008c0) PKK_PSK: @roadrandom | Processing PSK at line 13: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | pluto_sd: executing action action: ready(5), status 0 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.386 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 14677 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0117 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection xauth-road-eastnet-psk with policy PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: 3DES_CBC-HMAC_SHA1-MODP2048, 3DES_CBC-HMAC_SHA1-MODP1536 | counting wild cards for @roadrandom is 0 | counting wild cards for @east is 0 | based upon policy, the connection is a template. | connect_to_host_pair: 192.1.2.23:500 0.0.0.0:500 -> hp@(nil): none | new hp@0x555cb42cb680 added connection description "xauth-road-eastnet-psk" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east,+XS+S=C]---192.1.2.45...%any[@roadrandom,+XC+S=C] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | spent 0.00331 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 464 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f 00 00 00 00 00 00 00 00 | 01 10 04 00 00 00 00 00 00 00 01 d0 04 00 00 34 | 00 00 00 01 00 00 00 01 00 00 00 28 00 01 00 01 | 00 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 fd e9 80 04 00 05 | 0a 00 00 c4 85 79 b4 4a 3c 6b 0a 2d 5f 18 10 5f | 5b 7e 2d 4b 19 05 33 34 3f 60 9a d5 b1 36 c1 ec | e1 17 69 b0 04 35 32 cc df d9 18 64 51 98 c9 f8 | eb 28 ba 30 d3 75 6c d1 42 d4 f2 7d fd af da 9c | 6e 92 c6 53 6e d7 77 a1 59 6b c0 ba 98 7d 5e 68 | 29 04 db 75 18 89 5e 70 b1 7e f2 fb e1 b4 27 da | 8b 3d 14 75 10 04 e3 8d 58 a6 c0 1a df 8f 22 53 | 48 9b 3b bb 8e 7a 54 a7 7e ef 20 30 b1 d3 c7 80 | ed 41 99 27 36 17 5e 38 08 82 29 e6 a8 d4 c0 f0 | 6d c6 ad 5a 7b 96 f3 10 58 5f 77 32 cb e0 e8 00 | b2 94 8f 01 05 32 82 f1 f0 1e f7 bc 61 9c d7 60 | 03 62 7c 6d 6d 6d c8 c2 79 8d 29 56 21 19 ea 70 | 4f 06 d2 23 05 00 00 24 82 7b 39 cf a9 d0 e0 b2 | 22 77 b8 cf 3b 5a 36 b9 ee a8 aa a1 d6 e5 bb 5b | 89 dc 69 53 1f ff 7e 21 0d 00 00 12 02 00 00 00 | 72 6f 61 64 72 61 6e 64 6f 6d 0d 00 00 14 40 48 | b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 0d 00 | 00 0c 09 00 26 89 df d6 b7 12 0d 00 00 14 af ca | d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 0d 00 | 00 14 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 | 45 2f 0d 00 00 14 7d 94 19 a6 53 10 ca 6f 2c 17 | 9d 92 15 52 9d 56 0d 00 00 14 90 cb 80 91 3e bb | 69 6e 08 63 81 b5 ec 42 7b 1f 00 00 00 14 cd 60 | 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 00 00 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_AGGR (0x4) | flags: none (0x0) | Message ID: 0 (0x0) | length: 464 (0x1d0) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4) | State DB: IKEv1 state not found (find_state_ikev1_init) | #null state always idle | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x432 opt: 0x102000 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 52 (0x34) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x430 opt: 0x102000 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 196 (0xc4) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x420 opt: 0x102000 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 36 (0x24) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x20 opt: 0x102000 | ***parse ISAKMP Identification Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 18 (0x12) | ID type: ID_FQDN (0x2) | DOI specific A: 0 (0x0) | DOI specific B: 0 (0x0) | obj: 72 6f 61 64 72 61 6e 64 6f 6d | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 12 (0xc) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 20 (0x14) | removing 2 bytes of padding | message 'aggr_inI1_outR1' HASH payload not checked early | received Vendor ID payload [FRAGMENTATION] | received Vendor ID payload [XAUTH] | received Vendor ID payload [Dead Peer Detection] | quirks.qnat_traversal_vid set to=117 [RFC 3947] | received Vendor ID payload [RFC 3947] | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] | in statetime_start() with no state | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 40 (0x28) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 65001 (0xfde9) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | find_host_connection local=192.1.2.23:500 remote=192.1.3.209:500 policy=PSK+XAUTH+AGGRESSIVE+IKEV1_ALLOW but ignoring ports | find_next_host_connection policy=PSK+XAUTH+AGGRESSIVE+IKEV1_ALLOW | find_next_host_connection returns empty | find_host_connection local=192.1.2.23:500 remote= policy=PSK+XAUTH+AGGRESSIVE+IKEV1_ALLOW but ignoring ports | find_host_pair: comparing 192.1.2.23:500 to 0.0.0.0:500 but ignoring ports | find_next_host_connection policy=PSK+XAUTH+AGGRESSIVE+IKEV1_ALLOW | found policy = PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (xauth-road-eastnet-psk) | find_next_host_connection returns xauth-road-eastnet-psk | find_next_host_connection policy=PSK+XAUTH+AGGRESSIVE+IKEV1_ALLOW | find_next_host_connection returns empty | connect_to_host_pair: 192.1.2.23:500 192.1.3.209:500 -> hp@(nil): none | new hp@0x555cb4289080 | rw_instantiate() instantiated "xauth-road-eastnet-psk"[1] 192.1.3.209 for 192.1.3.209 packet from 192.1.3.209:500: IKEv1 Aggressive Mode with PSK is vulnerable to dictionary attacks and is cracked on large scale by TLA's | creating state object #1 at 0x555cb4302360 | State DB: adding IKEv1 state #1 in UNDEFINED | pstats #1 ikev1.isakmp started | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2668) | start processing: state #1 from 192.1.3.209:500 (in aggr_inI1_outR1() at ikev1_aggr.c:181) | parent state #1: UNDEFINED(ignore) => AGGR_R1(open IKE SA) "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: Peer ID is ID_FQDN: '@roadrandom' | X509: no CERT payloads to process "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: responding to Aggressive Mode, state #1, connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209 | sender checking NAT-T: enabled; VID 117 | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 40 (0x28) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 65001 (0xfde9) | [65001 is XAUTHInitPreShared] | started looking for secret for @east->@roadrandom of kind PKK_PSK | actually looking for secret for @east->@roadrandom of kind PKK_PSK | line 12: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @roadrandom to @east / @roadrandom -> 004 | 2: compared key @east to @east / @roadrandom -> 014 | line 12: match=014 | match 014 beats previous best_match 000 match=0x555cb43008c0 (line=12) | line 10: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @east to @east / @roadrandom -> 010 | 2: compared key @west to @east / @roadrandom -> 010 | line 10: match=010 | line 9: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key %any to @east / @roadrandom -> 002 | 2: compared key %any to @east / @roadrandom -> 002 | line 9: match=002 | match 002 loses to best_match 014 | concluding with best_match=014 best=0x555cb43008c0 (lineno=12) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | OAKLEY proposal verified; matching alg_info found | Oakley Transform 0 accepted | adding outI2 KE work-order 1 for state #1 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555cb43006c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #1 and saving MD | #1 is busy; has a suspended MD | crypto helper 5 resuming | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | crypto helper 5 starting work-order 1 for state #1 | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | crypto helper 5 doing build KE and nonce (outI2 KE); request ID 1 | spent 0.46 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 5 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.000467 seconds | (#1) spent 0.47 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr) | crypto helper 5 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 1 | calling continuation function 0x555cb2359630 | aggr inI1_outR1: calculated ke+nonce, calculating DH | started looking for secret for @east->@roadrandom of kind PKK_PSK | actually looking for secret for @east->@roadrandom of kind PKK_PSK | line 12: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @roadrandom to @east / @roadrandom -> 004 | 2: compared key @east to @east / @roadrandom -> 014 | line 12: match=014 | match 014 beats previous best_match 000 match=0x555cb43008c0 (line=12) | line 10: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @east to @east / @roadrandom -> 010 | 2: compared key @west to @east / @roadrandom -> 010 | line 10: match=010 | line 9: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key %any to @east / @roadrandom -> 002 | 2: compared key %any to @east / @roadrandom -> 002 | line 9: match=002 | match 002 loses to best_match 014 | concluding with best_match=014 best=0x555cb43008c0 (lineno=12) | adding aggr outR1 DH work-order 2 for state #1 | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555cb43006c0 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555cb43006c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | suspending state #1 and saving MD | #1 is busy; has a suspended MD | resume sending helper answer for #1 suppresed complete_v1_state_transition() and stole MD | #1 spent 0.0597 milliseconds in resume sending helper answer | crypto helper 6 resuming | crypto helper 6 starting work-order 2 for state #1 | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | crypto helper 6 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 | libevent_free: release ptr-libevent@0x7f3040001e30 | crypto helper 6 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.000808 seconds | (#1) spent 0.812 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr) | crypto helper 6 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f303800b570 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 2 | calling continuation function 0x555cb2359630 | aggr_inI1_outR1_continue2 for #1: calculated ke+nonce+DH, sending R1 | thinking about whether to send my certificate: | I have RSA key: OAKLEY_PRESHARED_KEY cert.type: 0?? | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so do not send cert. | I did not send a certificate because digital signatures are not being used. (PSK) | I am not sending a certificate request | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_AGGR (0x4) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 40 (0x28) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 65001 (0xfde9) | [65001 is XAUTHInitPreShared] | started looking for secret for @east->@roadrandom of kind PKK_PSK | actually looking for secret for @east->@roadrandom of kind PKK_PSK | line 12: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @roadrandom to @east / @roadrandom -> 004 | 2: compared key @east to @east / @roadrandom -> 014 | line 12: match=014 | match 014 beats previous best_match 000 match=0x555cb43008c0 (line=12) | line 10: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @east to @east / @roadrandom -> 010 | 2: compared key @west to @east / @roadrandom -> 010 | line 10: match=010 | line 9: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key %any to @east / @roadrandom -> 002 | 2: compared key %any to @east / @roadrandom -> 002 | line 9: match=002 | match 002 loses to best_match 014 | concluding with best_match=014 best=0x555cb43008c0 (lineno=12) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | OAKLEY proposal verified; matching alg_info found | Oakley Transform 0 accepted | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP) | attributes 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 02 | attributes 80 03 fd e9 80 04 00 05 | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 40 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 52 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value d5 c9 31 6f b5 36 d5 02 2f 51 13 d7 4a 92 32 8c | keyex value 19 3c 91 d2 2c aa c9 d5 64 6d ca 33 91 6e 05 7e | keyex value 30 7f 77 c9 6e af ac f3 84 a7 f5 b2 d0 5f 77 3e | keyex value 26 a1 08 36 cf 51 1e c6 89 eb eb 09 33 bb fd 40 | keyex value 88 91 5e 09 ed 95 37 46 5b 3e 45 b6 2b 6b b3 be | keyex value 4c 46 67 76 02 05 13 ab 42 61 1b b4 fa 11 f5 56 | keyex value 1e 40 ba 0f f6 5a b0 0c 19 e1 83 40 c0 b0 19 30 | keyex value 3a 76 ad 32 6d fa 70 b3 f7 72 07 e8 89 f5 0c ce | keyex value 0b b1 d4 e1 23 e3 c9 30 d6 9d 36 ee 37 51 12 d7 | keyex value 79 38 30 0c 59 70 fc dd 31 ea 24 f4 cd fd c7 22 | keyex value db 04 c9 e2 51 7f 40 53 db 64 f7 dd c3 f2 51 57 | keyex value cb 91 8c 04 a9 5f 3e 18 77 e0 93 06 6e 23 84 53 | emitting length of ISAKMP Key Exchange Payload: 196 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload | Nr 80 b0 ba d4 31 84 48 d9 9d 2d 88 92 0d 4c fa a2 | Nr 79 60 bf 29 29 00 3a 99 af ae 78 e3 2b ea fe ed | emitting length of ISAKMP Nonce Payload: 36 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_HASH (0x8) | ID type: ID_FQDN (0x2) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 8:ISAKMP_NEXT_HASH | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 65 61 73 74 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Hash Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of HASH_R into ISAKMP Hash Payload | HASH_R e5 0e 0d 32 6e 54 2f 12 5a bd 23 22 aa 79 0b 17 | HASH_R fe ff 63 91 | emitting length of ISAKMP Hash Payload: 24 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [XAUTH] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 09 00 26 89 df d6 b7 12 | emitting length of ISAKMP Vendor ID Payload: 12 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | sending NAT-D payloads | natd_hash: hasher=0x555cb242f7a0(20) | natd_hash: icookie= 4c 63 24 fa ce 6b 5b 3f | natd_hash: rcookie= be 6f 00 55 1e fb 8c f1 | natd_hash: ip= c0 01 03 d1 | natd_hash: port= 01 f4 | natd_hash: hash= 67 eb c9 0e de bb 25 96 ae 40 c9 f9 0e ad 5d 7f | natd_hash: hash= 09 6b e1 b3 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 67 eb c9 0e de bb 25 96 ae 40 c9 f9 0e ad 5d 7f | NAT-D 09 6b e1 b3 | emitting length of ISAKMP NAT-D Payload: 24 | natd_hash: hasher=0x555cb242f7a0(20) | natd_hash: icookie= 4c 63 24 fa ce 6b 5b 3f | natd_hash: rcookie= be 6f 00 55 1e fb 8c f1 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 81 82 29 46 45 1d 0d 3a ad 12 c8 dd bf 2b 41 ed | natd_hash: hash= 50 8a 7b 4f | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 81 82 29 46 45 1d 0d 3a ad 12 c8 dd bf 2b 41 ed | NAT-D 50 8a 7b 4f | emitting length of ISAKMP NAT-D Payload: 24 | no IKEv1 message padding required | emitting length of ISAKMP Message: 468 | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #1 is idle | doing_xauth:yes, t_xauth_client_done:no | peer supports fragmentation | peer supports DPD | DPD is configured locally | IKEv1: transition from state STATE_AGGR_R0 to state STATE_AGGR_R1 | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555cb43006c0 | sending reply packet to 192.1.3.209:500 (from 192.1.2.23:500) | sending 468 bytes for STATE_AGGR_R0 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 01 10 04 00 00 00 00 00 00 00 01 d4 04 00 00 34 | 00 00 00 01 00 00 00 01 00 00 00 28 00 01 00 01 | 00 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 fd e9 80 04 00 05 | 0a 00 00 c4 d5 c9 31 6f b5 36 d5 02 2f 51 13 d7 | 4a 92 32 8c 19 3c 91 d2 2c aa c9 d5 64 6d ca 33 | 91 6e 05 7e 30 7f 77 c9 6e af ac f3 84 a7 f5 b2 | d0 5f 77 3e 26 a1 08 36 cf 51 1e c6 89 eb eb 09 | 33 bb fd 40 88 91 5e 09 ed 95 37 46 5b 3e 45 b6 | 2b 6b b3 be 4c 46 67 76 02 05 13 ab 42 61 1b b4 | fa 11 f5 56 1e 40 ba 0f f6 5a b0 0c 19 e1 83 40 | c0 b0 19 30 3a 76 ad 32 6d fa 70 b3 f7 72 07 e8 | 89 f5 0c ce 0b b1 d4 e1 23 e3 c9 30 d6 9d 36 ee | 37 51 12 d7 79 38 30 0c 59 70 fc dd 31 ea 24 f4 | cd fd c7 22 db 04 c9 e2 51 7f 40 53 db 64 f7 dd | c3 f2 51 57 cb 91 8c 04 a9 5f 3e 18 77 e0 93 06 | 6e 23 84 53 05 00 00 24 80 b0 ba d4 31 84 48 d9 | 9d 2d 88 92 0d 4c fa a2 79 60 bf 29 29 00 3a 99 | af ae 78 e3 2b ea fe ed 08 00 00 0c 02 00 00 00 | 65 61 73 74 0d 00 00 18 e5 0e 0d 32 6e 54 2f 12 | 5a bd 23 22 aa 79 0b 17 fe ff 63 91 0d 00 00 14 | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | 0d 00 00 0c 09 00 26 89 df d6 b7 12 0d 00 00 14 | af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | 14 00 00 14 4a 13 1c 81 07 03 58 45 5c 57 28 f2 | 0e 95 45 2f 14 00 00 18 67 eb c9 0e de bb 25 96 | ae 40 c9 f9 0e ad 5d 7f 09 6b e1 b3 00 00 00 18 | 81 82 29 46 45 1d 0d 3a ad 12 c8 dd bf 2b 41 ed | 50 8a 7b 4f | !event_already_set at reschedule | event_schedule: new EVENT_SO_DISCARD-pe@0x555cb43006c0 | inserting event EVENT_SO_DISCARD, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: STATE_AGGR_R1: sent AR1, expecting AI2 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | #1 spent 0.609 milliseconds in resume sending helper answer | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f303800b570 | spent 0.00248 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 100 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 14 10 04 01 00 00 00 00 00 00 00 64 53 0d f2 5d | 75 0c ae 57 7d 92 1a d8 52 b1 71 17 cc 18 25 bc | 0c 0f 72 85 c7 fb f1 e3 d8 71 3c 00 9b 68 aa 81 | e6 29 de e0 ed 30 e8 e7 4c c8 d7 0d cb 33 b7 c1 | 8f 44 90 24 f4 57 34 3e 00 26 57 e9 fd dd 09 6c | 8d 55 71 94 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_AGGR (0x4) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | length: 100 (0x64) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4) | State DB: found IKEv1 state #1 in AGGR_R1 (find_state_ikev1) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1435) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x100 opt: 0x102000 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 24 (0x18) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x100 opt: 0x102000 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_HASH (0x8) | length: 24 (0x18) | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x102000 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 24 (0x18) | message 'aggr_inI2' HASH payload not checked early | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) | natd_hash: hasher=0x555cb242f7a0(20) | natd_hash: icookie= 4c 63 24 fa ce 6b 5b 3f | natd_hash: rcookie= be 6f 00 55 1e fb 8c f1 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 81 82 29 46 45 1d 0d 3a ad 12 c8 dd bf 2b 41 ed | natd_hash: hash= 50 8a 7b 4f | natd_hash: hasher=0x555cb242f7a0(20) | natd_hash: icookie= 4c 63 24 fa ce 6b 5b 3f | natd_hash: rcookie= be 6f 00 55 1e fb 8c f1 | natd_hash: ip= c0 01 03 d1 | natd_hash: port= 01 f4 | natd_hash: hash= 67 eb c9 0e de bb 25 96 ae 40 c9 f9 0e ad 5d 7f | natd_hash: hash= 09 6b e1 b3 | expected NAT-D(me): 81 82 29 46 45 1d 0d 3a ad 12 c8 dd bf 2b 41 ed | expected NAT-D(me): 50 8a 7b 4f | expected NAT-D(him): | 67 eb c9 0e de bb 25 96 ae 40 c9 f9 0e ad 5d 7f | 09 6b e1 b3 | received NAT-D: 81 82 29 46 45 1d 0d 3a ad 12 c8 dd bf 2b 41 ed | received NAT-D: 50 8a 7b 4f | received NAT-D: 67 eb c9 0e de bb 25 96 ae 40 c9 f9 0e ad 5d 7f | received NAT-D: 09 6b e1 b3 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is NOT behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.3.209 | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected | NAT_T_WITH_KA detected | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | next payload chain: creating a fake payload for hashing identity | **emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_FQDN (0x2) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: no previous for current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID); assumed to be fake | emitting 10 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 72 6f 61 64 72 61 6e 64 6f 6d | emitting length of ISAKMP Identification Payload (IPsec DOI): 18 | ***parse ISAKMP Identification Payload: | next payload type: 250?? (0xfa) | length: 18 (0x12) | ID type: ID_FQDN (0x2) | DOI specific A: 0 (0x0) | DOI specific B: 0 (0x0) "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: Peer ID is ID_FQDN: '@roadrandom' | X509: no CERT payloads to process | received 'Aggr' message HASH_I data ok | phase 1 complete | We are a server using PSK and clients are using a group ID | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #1 is idle | doing_xauth:yes, t_xauth_client_done:no | IKEv1: transition from state STATE_AGGR_R1 to state STATE_AGGR_R2 | parent state #1: AGGR_R1(open IKE SA) => AGGR_R2(established IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_SO_DISCARD to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_SO_DISCARD-pe@0x555cb43006c0 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x555cb43006c0 | inserting event EVENT_SA_REPLACE, timeout in 3330 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | pstats #1 ikev1.isakmp established "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: STATE_AGGR_R2: ISAKMP SA established {auth=PRESHARED_KEY cipher=3DES_CBC_192 integ=HMAC_SHA1 group=MODP1536} | DPD: dpd_init() called on ISAKMP SA | DPD: Peer supports Dead Peer Detection | XAUTH: Sending XAUTH Login/Password Request | event_schedule: new EVENT_v1_SEND_XAUTH-pe@0x555cb4302e20 | inserting event EVENT_v1_SEND_XAUTH, timeout in 0.08 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f303800b570 size 128 | #1 spent 0.224 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.33 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4302e20 | handling event EVENT_v1_SEND_XAUTH for parent state #1 | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | XAUTH: event EVENT_v1_SEND_XAUTH #1 STATE_AGGR_R2 "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: XAUTH: Sending Username/Password request (AGGR_R2->XAUTH_R0) | parent state #1: AGGR_R2(established IKE SA) => XAUTH_R0(established IKE SA) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 850582131 (0x32b2da73) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'xauth_buf' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Mode Attribute: | next payload type: ISAKMP_NEXT_NONE (0x0) | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1) | Identifier: 0 (0x0) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Mode Attribute (14:ISAKMP_NEXT_MODECFG) | next payload chain: saving location 'ISAKMP Mode Attribute'.'next payload type' in 'xauth_buf' | ****emit ISAKMP ModeCfg attribute: | ModeCfg attr type: XAUTH-USER-NAME (0x4089) | length/value: 0 (0x0) | emitting length of ISAKMP ModeCfg attribute: 0 | ****emit ISAKMP ModeCfg attribute: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a) | length/value: 0 (0x0) | emitting length of ISAKMP ModeCfg attribute: 0 | no IKEv1 message padding required | emitting length of ISAKMP Mode Attribute: 16 | XAUTH: send request HASH(1): | 54 b6 06 51 c7 15 2d a9 74 05 d7 d8 67 90 83 f4 | 57 85 09 13 | no IKEv1 message padding required | emitting length of ISAKMP Message: 68 | no IKEv1 message padding required | emitting length of ISAKMP Message: 68 | sending 68 bytes for XAUTH: req through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 06 01 32 b2 da 73 00 00 00 44 d7 a1 4b 49 | 66 99 ae c5 34 7b 7e 13 c6 34 4b 8d 3c 9a e3 58 | 8d 8b ad 4e e5 3d 96 90 34 c6 15 e7 05 e8 30 d6 | 98 d0 76 f9 | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_SA_REPLACE-pe@0x555cb43006c0 | event_schedule: new EVENT_RETRANSMIT-pe@0x555cb43006c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | #1 STATE_XAUTH_R0: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50017.598311 | libevent_free: release ptr-libevent@0x7f303800b570 | free_event_entry: release EVENT_v1_SEND_XAUTH-pe@0x555cb4302e20 | #1 spent 0.252 milliseconds in timer_event_cb() EVENT_v1_SEND_XAUTH | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00178 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 06 01 32 b2 da 73 00 00 00 54 f1 84 0a 5b | 7d ec 80 e2 ae f4 ea 2d 85 b8 88 21 a6 19 04 02 | 9e d9 96 15 6b 5c c0 ce 18 67 34 49 52 9e 42 19 | 47 df 07 a8 30 92 b4 2e 49 92 21 15 ab 46 32 5d | 5d 24 10 df | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 850582131 (0x32b2da73) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6) | peer and cookies match on #1; msgid=32b2da73 st_msgid=00000000 st_msgid_phase15=32b2da73 | p15 state object #1 found, in STATE_XAUTH_R0 | State DB: found IKEv1 state #1 in XAUTH_R0 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1778) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100 opt: 0x2000 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_MODECFG (0xe) | length: 24 (0x18) | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000 opt: 0x2000 | ***parse ISAKMP Mode Attribute: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 28 (0x1c) | Attr Msg Type: ISAKMP_CFG_REPLY (0x2) | Identifier: 0 (0x0) | removing 4 bytes of padding | xauth_inR0 HASH(1): | 5c 12 9a b6 ee 1b ca bf 0d 1f cf 45 14 49 63 db | 5f 91 e7 fe | received 'xauth_inR0' message HASH(1) data ok | ****parse ISAKMP ModeCfg attribute: | ModeCfg attr type: XAUTH-USER-NAME (0x4089) | length/value: 4 (0x4) | ****parse ISAKMP ModeCfg attribute: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a) | length/value: 8 (0x8) | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_XAUTH_R0: retransmits: cleared | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x555cb43006c0 "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: XAUTH: password file authentication method requested to authenticate user 'use2' "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: XAUTH: password file (/etc/ipsec.d/passwd) open. | XAUTH: found user(road/use2) pass($apr1$898RP...$9gJFVFuZIvsD0dTGADcv10) connid(xauth-road-eastnet/xauth-road-eastnet-psk) addresspool() | XAUTH: found user(use1/use2) pass(xOzlFlqtwJIu2) connid(xauth-road-eastnet/xauth-road-eastnet-psk) addresspool() | XAUTH: found user(use2/use2) pass(xOzlFlqtwJIu2) connid(xauth-road-eastnet-psk/xauth-road-eastnet-psk) addresspool() "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: XAUTH: success user(use2:xauth-road-eastnet-psk) | scheduling resume xauth immediate for #1 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #1 and saving MD | #1 is busy; has a suspended MD | #1 spent 0.0891 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.224 milliseconds in comm_handle_cb() reading and processing packet | processing resume xauth immediate for #1 | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: XAUTH: User use2: Authentication Successful | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2019691651 (0x78620c83) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'xauth_buf' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Mode Attribute: | next payload type: ISAKMP_NEXT_NONE (0x0) | Attr Msg Type: ISAKMP_CFG_SET (0x3) | Identifier: 0 (0x0) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Mode Attribute (14:ISAKMP_NEXT_MODECFG) | next payload chain: saving location 'ISAKMP Mode Attribute'.'next payload type' in 'xauth_buf' | ****emit ISAKMP ModeCfg attribute: | ModeCfg attr type: AF+XAUTH-STATUS (0xc08f) | length/value: 1 (0x1) | no IKEv1 message padding required | emitting length of ISAKMP Mode Attribute: 12 | XAUTH: status HASH(1): | 7e e0 af ca 7c 4f 44 79 26 47 cb 89 43 19 48 5d | f8 69 d3 54 | no IKEv1 message padding required | emitting length of ISAKMP Message: 64 | emitting 4 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 68 | event_schedule: new EVENT_RETRANSMIT-pe@0x555cb43006c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f303800b570 size 128 | #1 STATE_XAUTH_R0: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50017.599268 | sending 68 bytes for XAUTH: status through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 06 01 78 62 0c 83 00 00 00 44 c4 52 56 bc | 09 35 75 f1 a4 ca fc 42 90 a5 92 48 4b 5f 14 36 | 16 ff 15 3d 93 cc b2 03 45 41 3a 64 8a 0e 7f 03 | 6d ed c0 e2 | parent state #1: XAUTH_R0(established IKE SA) => XAUTH_R1(established IKE SA) | resume xauth immediate for #1 suppresed complete_v1_state_transition() | #1 spent 0.103 milliseconds in resume xauth immediate | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x555cb4300700 | spent 0.00213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 68 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 06 01 78 62 0c 83 00 00 00 44 bc b0 6c bf | 6f 97 8f 7e a6 2e 27 0b d0 79 ab aa 8b 8e a5 fa | 57 66 68 0e ce 23 17 04 16 74 14 53 ee da aa 9c | 3e fb dd b9 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_MODE_CFG (0x6) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2019691651 (0x78620c83) | length: 68 (0x44) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6) | peer and cookies match on #1; msgid=78620c83 st_msgid=00000000 st_msgid_phase15=78620c83 | p15 state object #1 found, in STATE_XAUTH_R1 | State DB: found IKEv1 state #1 in XAUTH_R1 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1778) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100 opt: 0x2000 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_MODECFG (0xe) | length: 24 (0x18) | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000 opt: 0x2000 | ***parse ISAKMP Mode Attribute: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 12 (0xc) | Attr Msg Type: ISAKMP_CFG_ACK (0x4) | Identifier: 0 (0x0) | removing 4 bytes of padding | xauth_inR1 HASH(1): | 41 14 6d 20 b9 bc e2 61 29 52 7d 7f dc 24 21 0e | ba b8 36 53 | received 'xauth_inR1' message HASH(1) data ok "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: XAUTH: xauth_inR1(STF_OK) | Not server, starting new exchange | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_XAUTH_R1 to state STATE_MAIN_R3 | parent state #1: XAUTH_R1(established IKE SA) => MAIN_R3(established IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_R3: retransmits: cleared | libevent_free: release ptr-libevent@0x7f303800b570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x555cb43006c0 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x555cb43006c0 | inserting event EVENT_SA_REPLACE, timeout in 3330 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f303800b570 size 128 | pstats #1 ikev1.isakmp established "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY cipher=3DES_CBC_192 integ=HMAC_SHA1 group=MODP1536} | DPD: dpd_init() called on ISAKMP SA | DPD: Peer supports Dead Peer Detection | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | #1 spent 0.0565 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.162 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 396 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 20 01 4e 6a 11 af 00 00 01 8c 98 0c b7 6a | de 91 1f 5e 4a d1 a3 60 8e 0b c3 8f 71 ca 00 47 | 29 27 ab 1e b7 05 0b d3 05 63 57 b6 a6 5a 60 3d | 3b 4a 23 ab 56 ea 79 cd 72 20 f0 2e 70 af be d3 | 58 95 8a a4 bb 57 75 f7 a6 1c c6 4f 31 22 02 6e | fe 47 76 dd 3e 10 5d 90 3d d0 94 8d 2d 37 d9 a3 | 88 5a ad f4 95 d0 1a 74 7d 5a fa ca 7c a8 22 af | ae 65 0e 7f ec 43 18 47 c6 90 23 ff ab 91 0c 3f | f6 b6 43 32 3c 85 e2 b0 81 16 12 0a 99 d1 70 ab | 50 4f 6c 3a 8e 47 e7 4f df bb c2 7f 71 0d 33 69 | 2f a7 f9 81 8b 8d c7 7e 63 dc 68 0a bd 83 b8 44 | 13 31 24 44 d1 90 70 92 e9 fc ef c7 a1 06 ef d3 | 76 42 e5 9a bc 26 7a a0 03 b8 d0 8f 25 92 df a9 | 3a fe 0e b4 ea fb ba 21 1b cb b0 fd 71 d5 01 f6 | 20 91 bd 00 f1 14 f6 a0 fb 07 a5 1e c7 e3 71 a3 | e9 c7 fe 96 16 c2 19 9a 98 c5 62 a0 6b 2e 32 8d | 31 31 d2 38 55 73 a2 ff 75 38 cc de c0 48 d5 8c | 5e 1a 19 8a c6 85 1c d2 1c d6 60 75 b3 83 76 ae | fc 26 bd 3a d0 3a ce a0 3e db bf ac c2 c2 72 1d | 4f e2 5a aa 16 c1 37 63 8d 07 db 4e d2 1e 71 43 | 6a ef 0b ad 89 e6 59 a1 51 09 43 68 3c 51 90 20 | f9 68 b7 bf 22 ab b4 c9 13 bd f5 56 ce 32 1a 62 | 46 88 20 56 8e f5 e1 fb c5 60 50 64 9a 10 35 f0 | bf e0 7b 8f 90 c6 05 01 51 8b eb 22 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1315574191 (0x4e6a11af) | length: 396 (0x18c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: IKEv1 state not found (find_state_ikev1) | State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1583) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 24 (0x18) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 84 (0x54) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 196 (0xc4) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 12 (0xc) | ID type: ID_IPV4_ADDR (0x1) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 01 03 d1 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | quick_inI1_outR1 HASH(1): | 20 6e ad fa c2 5c 2e da 07 8f a0 7b a5 0d 1b 6c | c1 12 52 16 | received 'quick_inI1_outR1' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 01 03 d1 | peer client is 192.1.3.209/32 | peer client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.2.0/24 | our client protocol/port is 0/0 "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: the peer proposed: 192.0.2.0/24:0/0 -> 192.1.3.209/32:0/0 | find_client_connection starting with xauth-road-eastnet-psk | looking for 192.0.2.0/24:0:0/0 -> 192.1.3.209/32:0:0/0 | concrete checking against sr#0 192.0.2.0/24:0 -> 192.1.3.209/32:0 | match_id a=@roadrandom | b=@roadrandom | results matched | fc_try trying xauth-road-eastnet-psk:192.0.2.0/24:0:0/0 -> 192.1.3.209/32:0:0/0 vs xauth-road-eastnet-psk:192.0.2.0/24:0:0/0 -> 192.1.3.209/32:0:0/0 | fc_try concluding with xauth-road-eastnet-psk [129] | fc_try xauth-road-eastnet-psk gives xauth-road-eastnet-psk | concluding with d = xauth-road-eastnet-psk | client wildcard: no port wildcard: no virtual: no | creating state object #2 at 0x555cb4303620 | State DB: adding IKEv1 state #2 in UNDEFINED | pstats #2 ikev1.ipsec started | duplicating state object #1 "xauth-road-eastnet-psk"[1] 192.1.3.209 as #2 for IPSEC SA | #2 setting local endpoint to 192.1.2.23:500 from #1.st_localport (in duplicate_state() at state.c:1481) | suspend processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1294) | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1294) | child state #2: UNDEFINED(ignore) => QUICK_R0(established CHILD SA) | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 72 (0x48) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 45 ed b7 31 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | adding quick_outI1 KE work-order 3 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302e20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #2 and saving MD | #2 is busy; has a suspended MD | #1 spent 0.144 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.308 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 4 resuming | crypto helper 4 starting work-order 3 for state #2 | crypto helper 4 doing build KE and nonce (quick_outI1 KE); request ID 3 | crypto helper 4 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.000419 seconds | (#2) spent 0.426 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr) | crypto helper 4 sending results from work-order 3 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f303c001e30 size 128 | libevent_realloc: release ptr-libevent@0x555cb42e26b0 | libevent_realloc: new ptr-libevent@0x555cb4302e60 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 3 | calling continuation function 0x555cb2359630 | quick_inI1_outR1_cryptocontinue1 for #2: calculated ke+nonce, calculating DH | started looking for secret for @east->@roadrandom of kind PKK_PSK | actually looking for secret for @east->@roadrandom of kind PKK_PSK | line 12: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @roadrandom to @east / @roadrandom -> 004 | 2: compared key @east to @east / @roadrandom -> 014 | line 12: match=014 | match 014 beats previous best_match 000 match=0x555cb43008c0 (line=12) | line 10: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @east to @east / @roadrandom -> 010 | 2: compared key @west to @east / @roadrandom -> 010 | line 10: match=010 | line 9: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key %any to @east / @roadrandom -> 002 | 2: compared key %any to @east / @roadrandom -> 002 | line 9: match=002 | match 002 loses to best_match 014 | concluding with best_match=014 best=0x555cb43008c0 (lineno=12) | adding quick outR1 DH work-order 4 for state #2 | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302e20 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302e20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | suspending state #2 and saving MD | #2 is busy; has a suspended MD | resume sending helper answer for #2 suppresed complete_v1_state_transition() and stole MD | crypto helper 3 resuming | crypto helper 3 starting work-order 4 for state #2 | crypto helper 3 doing compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 4 | #2 spent 0.108 milliseconds in resume sending helper answer | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f303c001e30 | crypto helper 3 finished compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 4 time elapsed 0.000299 seconds | (#2) spent 0.303 milliseconds in crypto helper computing work-order 4: quick outR1 DH (pcr) | crypto helper 3 sending results from work-order 4 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 4 | calling continuation function 0x555cb2359630 | quick_inI1_outR1_cryptocontinue2 for #2: calculated DH, sending R1 | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1315574191 (0x4e6a11af) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 72 (0x48) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 45 ed b7 31 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0xaca51b7a for esp.0@192.1.2.23 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI ac a5 1b 7a | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP) | attributes 80 03 00 05 80 04 00 01 80 01 00 01 80 02 70 80 | attributes 80 05 00 02 80 06 00 80 | emitting length of ISAKMP Transform Payload (ESP): 32 | emitting length of ISAKMP Proposal Payload: 44 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 56 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: responding to Quick Mode proposal {msgid:4e6a11af} "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: us: 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east,+XS+S=C] "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: them: 192.1.3.209[@roadrandom,+XC+S=C] | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload | Nr 22 6b 45 ca 71 ee 88 63 ad e3 db c2 f6 60 51 1f | Nr 15 1a 24 14 06 dc f6 8b 46 98 1b 77 71 b9 a5 6e | emitting length of ISAKMP Nonce Payload: 36 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 26 68 a4 25 a6 ab 20 14 45 d7 19 a3 eb 53 6d 5d | keyex value 9e 73 cb 3a d5 58 db 4c b4 fb 9b 05 56 5d 78 28 | keyex value f5 5c 49 ca ec fa fd 0f 4f f5 f3 b1 83 94 bd 20 | keyex value d0 bc 67 eb 36 08 e8 fc 6a 47 52 59 25 54 ad 3f | keyex value 82 cb 41 d3 38 3c b5 f4 f4 83 da c0 84 e6 82 7f | keyex value 13 c0 74 40 ac dd e5 fb 7b 7c fa 98 ed ed fe 3b | keyex value f8 ab 8a cf 48 c4 1e 39 b0 6e 20 65 72 8c cf 89 | keyex value cf 3a bb da 7d 44 60 b9 f6 80 7f 52 97 5c 7f 8c | keyex value 44 5a 91 cb f9 ac 6d 99 e4 ef bf 36 72 ef e6 f3 | keyex value 7b 63 fb 07 0b b1 39 ef 0b 0b af 86 a9 29 99 4f | keyex value 5a b3 f0 0a d7 65 82 59 8b 9f c7 38 1a f9 39 27 | keyex value 47 68 be a2 73 df 87 7f bf af 4f 0a 49 67 24 31 | emitting length of ISAKMP Key Exchange Payload: 196 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR (0x1) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of ID body into ISAKMP Identification Payload (IPsec DOI) | ID body c0 01 03 d1 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 8 raw bytes of ID body into ISAKMP Identification Payload (IPsec DOI) | ID body c0 00 02 00 ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | quick inR1 outI2 HASH(2): | c0 36 f4 f6 2f a4 43 2e 75 60 56 a2 9b 80 f4 dd | e4 fd 38 8d | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | install_inbound_ipsec_sa() checking if we can route | could_route called for xauth-road-eastnet-psk (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk"[1] 192.1.3.209 unrouted: NULL; eroute owner: NULL | routing is easy, or has resolvable near-conflict | checking if this is a replacement state | st=0x555cb4303620 ost=(nil) st->serialno=#2 ost->serialno=#0 | installing outgoing SA now as refhim=0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'xauth-road-eastnet-psk' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.45edb731@192.1.3.209 included non-error error | outgoing SA has refhim=0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'xauth-road-eastnet-psk' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.aca51b7a@192.1.2.23 included non-error error | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | add inbound eroute 192.1.3.209/32:0 --0-> 192.0.2.0/24:0 => tun.10000@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042399 | raw_eroute result=success | emitting 4 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 372 | finished processing quick inI1 | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | child state #2: QUICK_R0(established CHILD SA) => QUICK_R1(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302e20 | sending reply packet to 192.1.3.209:500 (from 192.1.2.23:500) | sending 372 bytes for STATE_QUICK_R0 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #2) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 20 01 4e 6a 11 af 00 00 01 74 64 ec cf 67 | 2e 65 22 b7 5a b8 53 16 b9 62 60 06 b2 01 9c dd | 7e 96 03 d5 8c 21 c9 c2 0d 82 11 86 27 6b 56 43 | 95 3f 22 14 40 da 95 65 38 9a ef 5b e9 ac 12 36 | fd 73 d0 49 49 fc 11 91 3a 70 e1 91 c2 03 a4 18 | 50 7a e5 6c 20 62 f2 15 bb 76 6f 98 55 c5 a3 01 | 68 a8 4a 2f dd 20 d9 1c 87 0b fc b0 d1 3d 8b e7 | 64 9e 74 32 e7 12 7b 40 a2 18 a5 31 24 e2 a8 f3 | 40 7e 8c 6b 1c c4 df bb 08 a4 7a 33 d7 75 39 f6 | 6d cc 16 e8 05 3f 55 8a 34 63 f4 6a e1 56 05 1c | 00 c1 2a be 65 7a 89 22 ba d9 0c 9a 5d 1a 65 ce | ca 19 04 9c d8 e2 74 80 7b 1f 37 a5 40 ee b2 1b | df f9 0d 5e 35 9a 32 c2 19 10 0d 0e 43 8f 7e f9 | 61 fe 80 09 5e 0a 16 45 a0 3e ae 3e 8f 54 13 4e | bd c0 65 a1 a2 fa 87 ac 52 b3 a5 32 5b 66 0b c7 | 6c c0 e2 da 99 99 ea c2 12 8e 37 21 a5 ac a1 a8 | 91 e0 31 3f 4f c1 cc b4 04 58 e2 11 72 75 52 0a | 09 fd 00 0d ca 8f 82 21 2d 59 9a 24 c8 22 5a 6e | 43 ca f4 28 e9 97 1e 35 55 e0 46 8f 07 92 45 16 | 12 ff b4 27 ed e7 e8 ef fd ae 0d 9b 7e 25 03 84 | 6a f5 30 6e 21 21 e5 86 07 42 b9 c5 73 67 6c 3e | a1 bc 9a 28 93 68 cd d1 dd 31 c7 b1 61 6c 0b d5 | 07 7e f8 3f | !event_already_set at reschedule | event_schedule: new EVENT_RETRANSMIT-pe@0x555cb4302e20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | #2 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50017.602682 | pstats #2 ikev1.ipsec established | NAT-T: encaps is 'auto' "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x45edb731 <0xaca51b7a xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active username=use2} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #2 suppresed complete_v1_state_transition() | #2 spent 0.878 milliseconds in resume sending helper answer | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f3030003120 | spent 0.00303 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 52 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 20 01 4e 6a 11 af 00 00 00 34 d4 d6 ef cc | 39 e2 b5 d1 8e 78 8a 9a 7f 97 b6 18 00 5a 77 2e | 49 12 33 11 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1315574191 (0x4e6a11af) | length: 52 (0x34) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #2 in QUICK_R1 (find_state_ikev1) | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1609) | #2 is idle | #2 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 24 (0x18) | quick_inI2 HASH(3): | 3a a3 59 d0 7d 78 2d 5f 44 d2 d1 68 49 03 5e eb | c4 70 47 fe | received 'quick_inI2' message HASH(3) data ok | install_ipsec_sa() for #2: outbound only | could_route called for xauth-road-eastnet-psk (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk"[1] 192.1.3.209 unrouted: NULL; eroute owner: NULL | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk"[1] 192.1.3.209 unrouted: NULL; eroute owner: NULL | route_and_eroute with c: xauth-road-eastnet-psk (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | eroute_connection add eroute 192.0.2.0/24:0 --0-> 192.1.3.209/32:0 => tun.0@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1042399 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFAC | popen cmd is 1089 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastnet-: | cmd( 80):psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PL: | cmd( 160):UTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0': | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: | cmd( 320):UTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID=: | cmd( 400):'@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.3.: | cmd( 480):209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PRO: | cmd( 560):TOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POL: | cmd( 640):ICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_AL: | cmd( 720):LOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAI: | cmd( 800):LED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO: | cmd( 880):_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT=: | cmd( 960):'0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN: | cmd(1040):=0x45edb731 SPI_OUT=0xaca51b7a ipsec _updown 2>&1: | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0 | popen cmd is 1094 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eas: | cmd( 80):tnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.2: | cmd( 160):3' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0: | cmd( 240):.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL=': | cmd( 320):0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEE: | cmd( 400):R_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192: | cmd( 480):.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEE: | cmd( 560):R_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CON: | cmd( 640):N_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FR: | cmd( 720):AG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUT: | cmd( 800):H_FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' : | cmd( 880):PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CL: | cmd( 960):IENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S: | cmd(1040):PI_IN=0x45edb731 SPI_OUT=0xaca51b7a ipsec _updown 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VT | popen cmd is 1092 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastn: | cmd( 80):et-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23': | cmd( 160): PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2: | cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0': | cmd( 320): PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_: | cmd( 400):ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1: | cmd( 480):.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_: | cmd( 560):PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_: | cmd( 640):POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG: | cmd( 720):_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_: | cmd( 800):FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PL: | cmd( 880):UTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIE: | cmd( 960):NT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI: | cmd(1040):_IN=0x45edb731 SPI_OUT=0xaca51b7a ipsec _updown 2>&1: | route_and_eroute: instance "xauth-road-eastnet-psk"[1] 192.1.3.209, setting eroute_owner {spd=0x555cb4301f00,sr=0x555cb4301f00} to #2 (was #0) (newest_ipsec_sa=#0) | #1 spent 0.556 milliseconds in install_ipsec_sa() | inI2: instance xauth-road-eastnet-psk[1], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | DPD: dpd_init() called on IPsec SA | State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1) | event_schedule: new EVENT_DPD-pe@0x555cb4304870 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | child state #2: QUICK_R1(established CHILD SA) => QUICK_R2(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_QUICK_R2: retransmits: cleared | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x555cb4302e20 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x555cb4302e20 | inserting event EVENT_SA_REPLACE, timeout in 28530 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb4300700 size 128 | pstats #2 ikev1.ipsec established | NAT-T: encaps is 'auto' "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x45edb731 <0xaca51b7a xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active username=use2} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | #2 spent 0.649 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.786 milliseconds in comm_handle_cb() reading and processing packet | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00464 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.00272 milliseconds in signal handler PLUTO_SIGCHLD | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | spent 0.0026 milliseconds in signal handler PLUTO_SIGCHLD | spent 0.00279 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 5d ae f5 50 00 00 00 54 8d 7c e7 cc | c1 a4 95 f1 e6 8f 83 37 bd f4 db 37 3b cf ee a5 | 5e b6 9b 61 68 fe a4 d1 b3 fc 3b 78 4a b8 b2 de | 0b ee 80 50 ef 70 74 c9 2a cb 4b f4 62 86 71 34 | 42 32 84 5d | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1571747152 (0x5daef550) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | f2 7f c4 c0 0c 99 9f 32 b6 b6 63 1f 1a da 70 c5 | ba d1 c9 b7 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 4b | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19275 monotime:50018.605572 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 441909970 (0x1a5702d2) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 4b | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 81 60 f2 0f 77 52 7c 95 2a 26 c1 ed 06 c3 ff 81 | 07 20 d6 77 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 1a 57 02 d2 00 00 00 54 9a 6d 61 e7 | 9d 54 b6 3f fc e3 77 82 ec 7f e7 1e 90 dd 1c 8d | f1 f3 45 58 66 02 e7 00 0a be 7f 6d 3d e2 5c 8d | 6c a6 f0 15 9b 6d 00 de 11 02 e4 e3 09 79 9f a0 | 17 a0 33 0e | complete v1 state transition with STF_IGNORE | #1 spent 0.158 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.349 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304870 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50018.645883 < 50019.605572 | event_schedule: new EVENT_DPD-pe@0x555cb4302f50 | inserting event EVENT_DPD, timeout in 0.959689 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4304870 | #2 spent 0.0502 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x555cb4302f50 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb4304370 size 128 | DPD: sending R_U_THERE 10938 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3657300346 (0xd9fdf97a) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a ba | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 35 76 e6 6d 22 83 5c e1 4a 7c e7 35 28 46 4d aa | c2 b8 36 ba | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 d9 fd f9 7a 00 00 00 54 c2 cd 23 4c | ec e9 02 f7 b2 e7 e0 4c a3 d1 6f 02 8c 4a b2 66 | 91 66 6f 35 69 0a 66 1f a5 6e 64 e5 c7 09 34 88 | 2c 7c a5 7b 58 db 61 d8 ad 8b 45 44 b5 40 32 8f | 7b f0 cb 88 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4302f50 | #2 spent 0.241 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00171 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 35 e1 77 5f 00 00 00 54 72 a0 77 7f | c5 6d 4f 46 98 c8 17 a3 6e 40 5f 23 f7 52 14 78 | 37 f8 59 7a 43 8f 67 55 ec 92 7c fd 61 c5 d2 03 | 4b 79 22 7a 65 de 4d 27 ae db 3a 9a 7f 9c f1 0f | 56 39 38 0a | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 903968607 (0x35e1775f) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 04 d1 33 02 9e a3 c3 c6 18 b9 78 39 37 ac 7b 5e | 23 b4 bc 0b | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 4c | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19276 monotime:50019.606515 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1406991931 (0x53dcfe3b) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 4c | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 89 b7 47 84 c9 41 8f 45 78 b1 bd 57 d9 31 ee 5c | 0e a8 87 3a | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 53 dc fe 3b 00 00 00 54 58 72 d4 7d | f0 1c 52 22 63 5d 7c 40 2b 4c 25 f2 f5 56 17 1b | 1d ff 76 b8 9c 6a 6f 30 63 48 f7 10 a9 bd b4 79 | 23 51 59 7e dd 7e 86 2f ba 97 61 61 42 92 5b ec | 73 a9 17 d9 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x555cb4304370 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.146 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.294 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00131 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 fc 24 5b a2 00 00 00 54 3b c3 74 d4 | 94 63 b1 ea d5 ea 91 2c 99 f8 d1 08 87 99 64 22 | f4 b2 20 61 a5 8e 6d 51 e9 67 19 31 cc 58 d8 9e | a5 e0 74 9c 66 fc 02 e9 d3 0e f4 02 4d a0 45 a2 | c2 a8 cc dd | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4230241186 (0xfc245ba2) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 44 45 2c 67 dc 04 ad e0 05 f1 de f7 82 0b d6 24 | d7 7e 8f 35 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a ba | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10938 expected: 10938 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00983 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.148 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | DPD: sending R_U_THERE 10939 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4148868614 (0xf74ab606) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a bb | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 17 2c 24 55 2c 6e b7 da ca 7e f9 8b b7 18 c8 96 | 68 63 bf 43 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 f7 4a b6 06 00 00 00 54 c6 31 dd 34 | c1 70 54 0e da e8 d4 2b 10 e7 44 08 af 2f f4 b9 | 0a ba 93 86 39 2d 01 44 c4 bc 6d a0 0b 57 cc fc | 84 5a d9 05 b6 8f 5a c0 6a 13 a5 ef 68 fc 4f aa | ca 29 64 a1 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #2 spent 0.252 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00205 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 64 fa 51 78 00 00 00 54 14 82 87 13 | 7d a6 17 a6 19 f9 30 52 ba 1f e5 a7 37 0b 71 ac | 07 a9 16 f6 9f 58 c9 9a fb 66 ee 43 91 ef e1 f8 | 47 00 0f 4f d7 b6 d3 85 42 b3 db 2d 90 d4 9e 15 | 1f 87 18 17 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1694126456 (0x64fa5178) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 8d aa 4a 6b c7 a5 a3 02 8e 55 c4 bb 32 52 38 94 | 45 b6 27 ad | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 4d | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19277 monotime:50020.607718 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 455596106 (0x1b27d84a) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 4d | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 73 b6 b1 c0 3e 80 a2 da 9f 22 60 74 da 9b dc f6 | b6 b8 8c 70 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 1b 27 d8 4a 00 00 00 54 d0 7a da ba | 38 dc 90 95 7f 62 32 64 b5 e7 64 0f cd 03 e3 e9 | 58 f4 45 65 31 4e 7e 5e bf 12 05 ec 2d 70 a7 86 | da 25 e3 5d 63 f2 f0 66 1f 1b 41 1b 24 29 b6 33 | 24 25 f2 71 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 be deleted | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 | complete v1 state transition with STF_IGNORE | #1 spent 0.0974 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.213 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 83 7d 09 70 00 00 00 54 63 70 db 0e | 30 93 ee da 96 01 46 c3 f7 96 1f 3a 16 d5 5a 5b | 9d ad 37 8f 95 0e 0b 09 aa 30 68 fb be a0 f1 0f | 33 bd 4a f2 1a e0 31 f0 d3 0a 89 e6 b6 d2 19 8d | ac 4c b0 b2 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2206009712 (0x837d0970) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | af f6 2a 7c 9a 17 f1 d7 86 40 16 19 e1 01 4d e3 | 41 2c 06 5d | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a bb | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10939 expected: 10939 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00642 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.0954 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4302f50 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: sending R_U_THERE 10940 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4145491941 (0xf7172fe5) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a bc | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 4d 5e 3c 7a 9e a2 a0 e2 48 fc 24 ee aa 14 4e 60 | 68 87 66 cb | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 f7 17 2f e5 00 00 00 54 3f 5b cb b0 | f8 fd 26 91 d7 01 9c 80 91 c1 4d 63 6a 99 53 30 | 12 f6 7b 86 3f b3 cf 95 88 9c da 75 d1 e6 e5 b1 | ff 39 7a bd 62 78 a6 b0 2b 41 55 a4 d5 63 18 a0 | a9 04 88 fe | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #2 spent 0.382 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00201 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 e8 d4 f4 18 00 00 00 54 8a 34 d8 f9 | 07 ce 6e a9 a3 33 f5 e7 dc af e2 c3 15 de 13 5e | b6 bc 21 a5 26 d2 de a2 37 14 db da 12 25 c8 88 | 92 c3 2e 22 6b 3b 59 a3 e0 7a 5e ae 76 ee 1c fb | ba 35 de 21 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3906270232 (0xe8d4f418) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 62 85 2a c4 15 a4 dc 47 0c 9c c7 20 89 3e e7 9f | 4b 74 12 38 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 4e | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19278 monotime:50021.608703 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3810850087 (0xe324f527) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 4e | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 29 17 62 1e 73 3d a3 72 69 49 25 04 59 a0 37 8e | 7f b4 b1 ad | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 e3 24 f5 27 00 00 00 54 2f 05 db 46 | 90 d7 b3 d1 cd bb 85 45 24 ea 3a b9 95 b4 90 ab | 6e e1 56 60 d5 a6 4d a8 d2 84 f7 95 1f 0a ca bf | 35 1d 01 12 9e b5 c5 f9 10 39 ef b0 57 7a 1c 5a | 58 d7 c5 4b | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 be deleted | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | complete v1 state transition with STF_IGNORE | #1 spent 0.243 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.453 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00181 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 ac d6 ad 98 00 00 00 54 82 e1 f2 f4 | 54 82 3e 57 19 0f 68 c3 d1 71 04 fd 17 cf 9c 8f | df 10 6d c8 23 ac b8 94 65 ea 8e 31 c0 b5 e6 af | 56 a2 81 4e 22 82 84 bb 66 80 5b b2 8f 3a 88 47 | c2 05 42 fd | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2899750296 (0xacd6ad98) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 27 14 2f 42 98 0e ec c1 d9 ab f9 7d 4b d8 5e bc | 60 51 4b af | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a bc | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10940 expected: 10940 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0127 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.224 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4302f50 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: sending R_U_THERE 10941 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2676211825 (0x9f83c071) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a bd | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 54 20 fc 87 61 70 6b 3d 85 91 f7 c3 5a 6b 56 47 | 90 d9 60 24 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 9f 83 c0 71 00 00 00 54 d6 c0 63 7f | b1 7d 8d a8 f6 fa 30 cd 18 fd 97 e7 92 e4 80 62 | 15 60 9d 54 e2 7a 27 c0 cb 74 32 b1 58 40 34 70 | ac 7a bc 1e e6 0f 01 e0 01 a9 00 72 c2 a9 7f f6 | 56 e7 62 07 | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_DPD-pe@0x555cb4302f50 | #2 spent 0.16 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 47 9d 95 38 00 00 00 54 be a8 c1 71 | 51 b5 a2 cb 06 b4 32 88 94 68 c2 8a 9d e2 44 ad | 35 02 98 bc fa 4c 3a 6b 37 dc bc 54 85 df 92 d2 | c5 4d b4 9e 71 29 0d 82 cd 9a 16 df 8a 38 07 b3 | 36 06 4f 57 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1201509688 (0x479d9538) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 16 ca b2 68 9a 34 76 17 6c 5b 14 97 8d fd a0 86 | 3a 2b c0 be | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 4f | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19279 monotime:50022.610595 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 323172786 (0x134339b2) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 4f | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | d0 59 0a 4a 71 81 67 44 35 27 e3 14 ba e4 b6 73 | b6 45 1d a1 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 13 43 39 b2 00 00 00 54 2d b5 c2 e7 | 0a d3 e3 cb 8e 93 df 9c e6 a5 63 38 c6 e0 9f 4a | 15 f2 9b 6d fb f9 f3 a9 de c9 5c 39 74 6c 40 5c | ed 6b 87 66 40 b3 10 13 bf db b2 45 49 29 06 12 | da a0 08 e7 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.0912 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.19 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00216 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 9e b4 a5 de 00 00 00 54 19 2b c1 cb | 4c ef 6a c0 e0 0f 6c c0 f4 3a 2e 34 cd 8d a5 5a | 24 ab ed 61 65 7b 48 27 9c b9 87 1b 25 69 53 d9 | 8a 18 54 f6 f6 f2 2c 24 ce 1f e5 2a 82 af 8d 67 | 78 ae 5c f0 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2662639070 (0x9eb4a5de) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 13 84 4f 82 b3 3b f5 69 17 20 57 bb c1 f8 a7 87 | 73 72 d1 a4 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a bd | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10941 expected: 10941 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0067 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.109 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | DPD: sending R_U_THERE 10942 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 172761660 (0xa4c223c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a be | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 8c 10 28 58 b6 ac 5d 7e 6f 98 f3 cf 3f 7e e3 87 | cc 1e 86 78 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 0a 4c 22 3c 00 00 00 54 31 0d de 6c | d9 92 df e5 30 e7 fb de 5a c8 78 c7 a7 11 f7 74 | 00 7f 2b 8b a4 1e c5 d3 51 3e 07 3b 4f 02 2d f7 | 0b d3 37 c4 cf 5d 23 87 fb 85 4b d4 c4 0b 23 ad | 97 04 8a b1 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #2 spent 0.302 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00136 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 ab 87 da 03 00 00 00 54 ef 02 df eb | a7 1d 7d c4 a8 bd 54 55 ec 3f 21 ba 47 64 f7 ef | 41 53 00 59 c2 bd 10 85 2a 3b 9a ae 3c ed 30 ff | d1 af bb 9b d9 e8 4b 70 05 be 0d 16 87 bb db 6d | 78 34 0e 02 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2877807107 (0xab87da03) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 0b fc ae 60 3a 29 95 1e 06 31 80 6d 9e e8 00 09 | 9e b4 0c bc | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 50 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19280 monotime:50023.611552 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1963443880 (0x7507c6a8) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 50 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | d9 7b 97 6e e1 ad 34 59 0e 3e c9 af dd fc 9c 95 | 86 ab 01 15 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 75 07 c6 a8 00 00 00 54 ad 83 36 97 | fc 70 66 09 ea 1a 27 c0 08 6f 46 3f f0 3d c8 c4 | 2c 2a e3 7c bd 61 c7 6c 41 4a 66 22 ca 8a e3 a8 | f7 69 51 49 de fd 5f 2a 3f 8f a0 dd cb c4 9d 45 | c5 88 84 93 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 be deleted | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 | complete v1 state transition with STF_IGNORE | #1 spent 0.179 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.335 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 26 08 27 62 00 00 00 54 9d b5 1d a5 | 14 a6 af fa 7f ed eb 13 ad 8d 9f e8 b3 fe cb aa | 77 dd c9 80 e7 e7 13 65 ff ce fa 8c 43 88 7f da | a4 4d d2 0b 43 3e 9d fc 77 2f 15 3c 00 38 5e af | 5e b1 a0 11 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 638068578 (0x26082762) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 07 0d c5 2c 17 d5 0f 71 b5 4a 70 bb d4 55 6d 61 | 00 a9 ea 08 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a be | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10942 expected: 10942 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0103 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.16 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4302f50 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: sending R_U_THERE 10943 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1948344727 (0x74216197) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a bf | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 23 d7 38 37 f6 7c a2 56 29 cd 7a 8d 21 73 9e a0 | fd 55 64 c4 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 74 21 61 97 00 00 00 54 ed 99 a5 b4 | 0b 1a 28 51 6d 98 73 7b 8b 22 bf 5a 47 ba 87 a9 | ba 72 9e 77 53 60 1f 8f c5 18 59 11 87 45 f8 ea | 8f 7c 43 e6 59 c3 b0 9c bf 58 b1 dc 22 a8 b4 2a | 3a 21 69 1d | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #2 spent 0.252 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 b0 0c 79 db 00 00 00 54 0c c6 4b c3 | ca 89 33 3a f2 af ec 30 e0 63 f5 dd 14 7f 29 5f | 87 cb e6 1a 18 ba 18 e0 bc 87 93 92 f7 79 c3 a7 | 89 f6 57 56 7b c7 a8 ac 9c 7a 67 fe 45 31 fb b1 | 20 88 a7 e8 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2953607643 (0xb00c79db) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 60 16 f9 d4 b8 66 54 72 7b 12 fb 82 6c 2d df 31 | 7c 6b 0c 05 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 51 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19281 monotime:50024.613151 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1336256787 (0x4fa5a913) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 51 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | a0 99 42 d2 9f d6 e1 aa 84 66 4b ad ee be 98 69 | 8a d2 4b 2d | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 4f a5 a9 13 00 00 00 54 e7 82 de 41 | 43 24 e3 dd 9e a1 a7 46 5e fd 83 3d 1e f1 f5 fd | 24 29 05 7c 17 c4 b3 20 82 90 40 bf f3 c4 d5 9a | f5 e9 15 17 a1 44 e2 e2 4d 03 a3 60 2d 24 0a de | 75 ac 51 09 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 be deleted | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | complete v1 state transition with STF_IGNORE | #1 spent 0.152 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.32 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00142 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 25 be 8a 81 00 00 00 54 f4 92 3e 73 | cf e9 ae d2 ff b1 6c d9 4d c7 de ba c9 85 37 71 | e5 eb c9 be 0f 17 8c c7 f2 f8 d1 d3 ce 38 13 6e | e9 a3 48 8f 42 1b e3 bd b2 65 37 d8 cc b7 99 07 | c9 0f d4 80 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 633244289 (0x25be8a81) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 1c b7 09 9d 8c ef d1 3b ac 7d 1e 86 b0 4e 4b 0f | 5c 8a eb fc | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a bf | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10943 expected: 10943 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0117 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.152 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4302f50 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50025.61311 < 50025.613473 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 0.000363 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_DPD-pe@0x555cb4302f50 | #2 spent 0.0648 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4302f50 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: sending R_U_THERE 10944 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 196121886 (0xbb0951e) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c0 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 42 f5 d6 d4 f0 26 9e f3 0e 2b e4 89 ad 4a 43 c7 | a5 34 84 91 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 0b b0 95 1e 00 00 00 54 c0 e9 f0 85 | bb 2b bd 97 cd 48 2f 2c 39 9e c5 7b 68 8b 5b 2e | 2a 59 30 cb e1 03 9e 97 13 ab 12 0c 29 c4 dd d1 | e8 72 f9 93 c9 9a dc fd cd 98 92 08 64 4e 09 49 | c9 1e 53 b1 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #2 spent 0.259 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00158 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 20 fc fd 5a 00 00 00 54 a0 81 ba c4 | d9 31 83 0c 39 5c 2f f3 a3 fa a1 e7 00 00 f7 02 | d1 13 15 c4 51 ea 94 e3 df 0a d4 f7 7d fa 18 45 | b0 2f c3 94 c5 05 7c 07 9f 51 fe 62 33 03 54 89 | 95 92 2f 55 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 553450842 (0x20fcfd5a) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | ee 3d bc 90 b8 b0 86 c0 a7 d5 40 1e 1c ed 40 51 | c5 25 bb f5 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 52 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19282 monotime:50025.614652 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3936129002 (0xea9c8fea) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 52 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 66 d8 f3 ec b1 6a bd f0 e1 c1 fc 31 cf a1 99 69 | 9f 22 02 51 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 ea 9c 8f ea 00 00 00 54 31 ea c6 dd | e0 bd dc d5 ab c4 20 55 7e 9d ce de 8a c0 e1 a7 | 5d 31 bf 40 1c 4e d4 c4 83 7c 2e d2 a5 a6 b9 97 | 87 70 61 d2 6e 55 51 f9 d9 44 54 54 a2 ed a6 41 | a8 5b e0 93 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.141 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.295 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00153 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 b9 02 54 fa 00 00 00 54 26 8b 92 64 | 32 83 78 07 dc 00 87 bb 90 9c 7c b0 75 01 57 5b | 30 3c fd 0c 22 1a 3e 64 bc 49 15 46 01 68 e5 9b | 3f 0a 00 fb 9d db bb 55 ff 79 bf fd 5f 7a 43 3a | ad 6d f7 64 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3103937786 (0xb90254fa) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 7b 9e 3b d3 da 92 f1 f8 04 52 26 07 b7 e5 0a 67 | d6 1e 6e 8e | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c0 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10944 expected: 10944 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00985 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.156 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4302f50 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: sending R_U_THERE 10945 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1615363596 (0x60487e0c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c1 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 30 8f 74 c4 ad a5 ae 7e 37 96 fa 07 fa fe 19 b4 | f2 b4 c9 08 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 60 48 7e 0c 00 00 00 54 f7 02 9f c9 | af 1b 35 50 97 bb a5 df a2 86 5d 9c 7c 3c b2 b6 | 50 ea f7 33 16 f2 62 e8 a5 c7 4b 34 0e 29 d7 de | ca ad c8 eb 01 24 8a f5 09 45 a0 a3 71 12 ab 18 | b7 b1 99 40 | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_DPD-pe@0x555cb4302f50 | #2 spent 0.219 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00137 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 85 5d bf ac 00 00 00 54 45 38 e8 2d | 17 bc 86 bf 3d 37 27 5e e1 36 a3 ef be 23 fc 37 | 2c e1 2e ea 93 2b 77 26 cf e6 9c f2 0d d3 86 97 | 09 dd 74 a5 af c1 4e bc 2a 26 a4 e8 64 f1 c3 96 | d8 80 2c 17 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2237513644 (0x855dbfac) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | ba 29 e4 b7 39 b7 b3 cd 84 50 c2 3a 2c 4d 19 d8 | 8d ac 67 05 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 53 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19283 monotime:50026.615496 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3434281037 (0xccb2f84d) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 53 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | b7 ae 30 6d 77 69 72 76 38 33 4e 1c 9c 4e eb 5c | 9c d1 e8 2a | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 cc b2 f8 4d 00 00 00 54 14 c2 84 11 | be db 91 c7 52 f5 00 00 40 d9 31 7c 51 48 4e 74 | 65 22 aa 2a 29 10 ee e0 15 24 01 93 3d 9c 26 06 | a2 58 67 81 58 17 a5 96 8b 49 13 4f 91 2a 7f 12 | 39 d7 71 48 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 be deleted | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | complete v1 state transition with STF_IGNORE | #1 spent 0.138 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.286 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00171 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 02 67 95 73 00 00 00 54 6d 3e be 9e | 19 05 ee 86 ab 28 59 8d ba 58 fc dd 43 b9 38 a2 | 4d ba c0 59 7a 40 01 78 df 44 b1 54 2b b9 65 fb | 34 a6 8c 6d 36 cc 3e 26 1e b7 39 c6 60 7e 4d 30 | 88 ad dd da | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 40342899 (0x2679573) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | d3 54 26 e2 1c ca fc 60 6c 6e 29 6a 65 51 e6 78 | ac 56 80 5b | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c1 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10945 expected: 10945 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00659 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.11 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #2 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.aca51b7a@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | DPD: sending R_U_THERE 10946 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 634369999 (0x25cfb7cf) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c2 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 7e 5a b7 a9 2f 2a c4 18 53 a0 7b 4d 16 44 42 2e | 30 e5 93 1e | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 25 cf b7 cf 00 00 00 54 f6 39 b6 13 | 08 34 66 45 a4 fb c3 12 80 4f cb dd 0f d3 dc f0 | 71 a9 49 83 6e ca ed 94 4e c2 c8 cc 2a 3e 50 7a | 7d c3 d9 42 a1 90 13 39 b1 d3 d0 8a 90 60 25 fc | 9f 13 95 84 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #2 spent 0.256 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00252 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 77 73 1f 0a 00 00 00 54 fe 75 7a 57 | 26 ed bd 2d 2b ee 18 10 3d d5 36 16 ef 18 28 b7 | 0d 5e f8 3f 05 bf 84 9a ab b7 64 89 4a 3f dc 48 | 1d 69 fc d8 9a ed 92 9e 65 50 8d 01 ec d5 5a aa | 60 15 fd 4c | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2004033290 (0x77731f0a) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 62 e1 ae 8a bd 39 f0 74 17 da 7f 7f 21 d4 53 a1 | 2c 51 49 8f | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 54 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19284 monotime:50027.616829 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1099477497 (0x4188b1f9) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 54 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | d2 72 ad c0 b6 8f a0 57 2c 68 aa 0d 53 8d 1f 57 | d0 98 71 85 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 41 88 b1 f9 00 00 00 54 c1 de 34 27 | d6 db c0 c4 2a 82 63 a0 a0 60 80 32 25 b8 b2 62 | ba a7 93 8c b4 4f 8f 2a b2 fa b7 00 ad f1 af 8b | 29 31 e8 17 a8 07 f0 26 20 51 be c2 77 1e 8c 41 | 7e 6c 19 02 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 be deleted | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4302f50 | complete v1 state transition with STF_IGNORE | #1 spent 0.149 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.307 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00136 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 68 43 7b e1 00 00 00 54 e4 76 0c af | 69 4a 6a 45 ba b7 54 19 b4 59 5f c8 f8 96 e0 20 | c0 d1 bc d8 b4 4c df 84 dc b7 e1 a3 69 aa cb e5 | 89 b5 8c 0b 4a bc 5e 01 29 a9 de 7a f3 e4 fb 43 | 6c 9f 62 36 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1749253089 (0x68437be1) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | a6 34 c7 a7 88 6c 6d 88 6e 93 01 dc 3c 64 88 8f | 48 d6 a7 38 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c2 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10946 expected: 10946 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00937 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.161 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00247 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 396 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 20 01 fb 9d 01 a1 00 00 01 8c 71 b8 4d b9 | 59 37 1e 70 9f 93 86 65 fb 64 28 ed c3 7a 96 db | a1 c5 16 07 78 a5 a3 f3 48 01 35 96 a7 44 b6 a5 | 41 8d 46 32 6f c4 a2 74 3c f3 22 3e 8e cb c5 91 | 87 aa e3 81 c2 8c bc 31 1b 92 d1 d2 ec bb 61 88 | d1 5a 25 7b 4a 33 47 5b 52 ae 14 91 dc f6 6b fd | a2 4f c2 65 45 e2 1c 4c a0 45 a7 a6 ab e6 07 14 | 5d 8c 26 f2 ad 0b 15 33 3f 87 c3 62 ed 3b 84 25 | aa cd 1c 4e 43 b2 26 70 9c ee a5 fa 00 d4 9e 38 | 46 39 c8 6c 37 dc c2 30 dd 3f 37 2f 03 78 6c ea | fa 9d 29 00 b6 f1 81 6d ef 3b bf 78 9d d3 31 e1 | fd d2 88 e9 41 be 9d 7a a5 53 8e a0 6f 41 85 4e | c7 ee 67 70 32 bb 1b aa 7e 28 93 4a 50 de fc e3 | fb 72 2f e9 93 1d 7a 3f 68 5e 20 0c 6f 22 0a a5 | 0b f1 d6 a4 88 5a de 47 e2 51 3f 5e f0 54 d8 4a | d7 f3 59 6b 41 2e 32 6f 53 ab a1 6b 23 ec 67 59 | cf b2 4b 6e 4c 6a 44 6c 2b 6a 52 5d b6 8d 4e d0 | 0f 92 f8 51 93 e0 0f 56 40 30 68 b6 a2 cc 92 d5 | d3 b0 c8 b6 e2 f7 72 d0 13 20 d0 b7 96 a6 b2 e0 | ee 49 92 fb 23 da 2e a0 ee 6e af 43 08 cc d7 07 | b8 d1 e2 9d 05 e7 3e b4 de 28 35 c8 f5 51 a6 a3 | 44 9e b8 e1 02 f5 45 84 7e c4 51 f7 71 c0 2c 82 | aa 1d 8f 16 78 64 c3 f0 88 7e 00 06 06 f9 e8 38 | 8d e3 8b de fc 98 c8 f4 7f 5b b6 21 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4221370785 (0xfb9d01a1) | length: 396 (0x18c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: IKEv1 state not found (find_state_ikev1) | State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1583) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 24 (0x18) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 84 (0x54) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 196 (0xc4) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 12 (0xc) | ID type: ID_IPV4_ADDR (0x1) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 01 03 d1 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | quick_inI1_outR1 HASH(1): | c2 8b 22 7c 1a 87 19 84 00 19 30 2b 41 20 be 1c | ab 5e c1 cd | received 'quick_inI1_outR1' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 01 03 d1 | peer client is 192.1.3.209/32 | peer client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.2.0/24 | our client protocol/port is 0/0 "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: the peer proposed: 192.0.2.0/24:0/0 -> 192.1.3.209/32:0/0 | find_client_connection starting with xauth-road-eastnet-psk | looking for 192.0.2.0/24:0:0/0 -> 192.1.3.209/32:0:0/0 | concrete checking against sr#0 192.0.2.0/24:0 -> 192.1.3.209/32:0 | client wildcard: no port wildcard: no virtual: no | creating state object #3 at 0x555cb4304c70 | State DB: adding IKEv1 state #3 in UNDEFINED | pstats #3 ikev1.ipsec started | duplicating state object #1 "xauth-road-eastnet-psk"[1] 192.1.3.209 as #3 for IPSEC SA | #3 setting local endpoint to 192.1.2.23:500 from #1.st_localport (in duplicate_state() at state.c:1481) | suspend processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1294) | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1294) | child state #3: UNDEFINED(ignore) => QUICK_R0(established CHILD SA) | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 72 (0x48) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 9d e5 30 07 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | adding quick_outI1 KE work-order 5 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302f50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | complete v1 state transition with STF_SUSPEND | crypto helper 0 resuming | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #3 and saving MD | #3 is busy; has a suspended MD | #1 spent 0.193 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.431 milliseconds in comm_handle_cb() reading and processing packet | crypto helper 0 starting work-order 5 for state #3 | crypto helper 0 doing build KE and nonce (quick_outI1 KE); request ID 5 | crypto helper 0 finished build KE and nonce (quick_outI1 KE); request ID 5 time elapsed 0.000524 seconds | (#3) spent 0.529 milliseconds in crypto helper computing work-order 5: quick_outI1 KE (pcr) | crypto helper 0 sending results from work-order 5 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f3034001e30 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 5 | calling continuation function 0x555cb2359630 | quick_inI1_outR1_cryptocontinue1 for #3: calculated ke+nonce, calculating DH | started looking for secret for @east->@roadrandom of kind PKK_PSK | actually looking for secret for @east->@roadrandom of kind PKK_PSK | line 12: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @roadrandom to @east / @roadrandom -> 004 | 2: compared key @east to @east / @roadrandom -> 014 | line 12: match=014 | match 014 beats previous best_match 000 match=0x555cb43008c0 (line=12) | line 10: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key @east to @east / @roadrandom -> 010 | 2: compared key @west to @east / @roadrandom -> 010 | line 10: match=010 | line 9: key type PKK_PSK(@east) to type PKK_PSK | 1: compared key %any to @east / @roadrandom -> 002 | 2: compared key %any to @east / @roadrandom -> 002 | line 9: match=002 | match 002 loses to best_match 014 | concluding with best_match=014 best=0x555cb43008c0 (lineno=12) | adding quick outR1 DH work-order 6 for state #3 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302f50 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302f50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | suspending state #3 and saving MD | #3 is busy; has a suspended MD | resume sending helper answer for #3 suppresed complete_v1_state_transition() and stole MD | #3 spent 0.084 milliseconds in resume sending helper answer | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f3034001e30 | crypto helper 2 resuming | crypto helper 2 starting work-order 6 for state #3 | crypto helper 2 doing compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 6 | crypto helper 2 finished compute dh (V1 Phase 2 PFS) (quick outR1 DH); request ID 6 time elapsed 0.0005 seconds | (#3) spent 0.505 milliseconds in crypto helper computing work-order 6: quick outR1 DH (pcr) | crypto helper 2 sending results from work-order 6 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 6 | calling continuation function 0x555cb2359630 | quick_inI1_outR1_cryptocontinue2 for #3: calculated DH, sending R1 | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4221370785 (0xfb9d01a1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 72 (0x48) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 9d e5 30 07 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0xaf75b31b for esp.0@192.1.2.23 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI af 75 b3 1b | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP) | attributes 80 03 00 05 80 04 00 01 80 01 00 01 80 02 70 80 | attributes 80 05 00 02 80 06 00 80 | emitting length of ISAKMP Transform Payload (ESP): 32 | emitting length of ISAKMP Proposal Payload: 44 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 56 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: responding to Quick Mode proposal {msgid:fb9d01a1} "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: us: 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east,+XS+S=C] "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: them: 192.1.3.209[@roadrandom,+XC+S=C] | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload | Nr 90 a8 83 8d 73 3d c2 1f 59 9a 02 e9 4d 13 6e ed | Nr 0b b8 44 ea 77 fa 97 35 ed f4 ab 6b 0e cc 31 bf | emitting length of ISAKMP Nonce Payload: 36 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 85 62 6c b6 f4 dd 39 19 30 f2 3d 25 a4 97 5a 6c | keyex value e1 40 40 91 93 42 ba 01 9c 3b 40 92 fb e8 7f 91 | keyex value 50 78 1c 8d a5 c6 da eb a7 33 99 80 d9 b6 60 5a | keyex value 2b b1 1f a5 76 fc 37 09 75 fa 93 f2 eb ef bf 46 | keyex value c9 54 ac c1 f8 c4 32 8d 5c 34 de 24 13 e6 0b 94 | keyex value 74 be a0 c5 40 1e 7f c7 c1 46 1d 4a 6c b3 74 20 | keyex value 2e d0 cb ca 39 4e 1f 16 26 56 9c 24 88 6c e0 e2 | keyex value 71 a2 56 8b 55 a1 a7 00 19 8c b8 25 69 bb eb c1 | keyex value 17 8e fe 30 1b 03 5c 09 ac d5 cd 9e f8 1e 80 e8 | keyex value a4 56 aa 99 fa bc 5b 61 dd 7e 89 1a a2 69 26 cb | keyex value ff ea 2f 1f 0b 38 46 60 ef e4 52 9f 24 9b 03 01 | keyex value 61 b9 97 f0 f2 cc 68 05 84 be b8 6e e3 31 ad 97 | emitting length of ISAKMP Key Exchange Payload: 196 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR (0x1) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of ID body into ISAKMP Identification Payload (IPsec DOI) | ID body c0 01 03 d1 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 8 raw bytes of ID body into ISAKMP Identification Payload (IPsec DOI) | ID body c0 00 02 00 ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | quick inR1 outI2 HASH(2): | aa ea d5 3d fe f2 90 15 01 05 ee 84 da 0d f0 be | 3a 30 cc e0 | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | install_inbound_ipsec_sa() checking if we can route | could_route called for xauth-road-eastnet-psk (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk"[1] 192.1.3.209 erouted: self; eroute owner: self | routing is easy, or has resolvable near-conflict | checking if this is a replacement state | st=0x555cb4304c70 ost=0x555cb4303620 st->serialno=#3 ost->serialno=#2 "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: keeping refhim=0 during rekey | installing outgoing SA now as refhim=0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'xauth-road-eastnet-psk' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.9de53007@192.1.3.209 included non-error error | outgoing SA has refhim=0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'xauth-road-eastnet-psk' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.af75b31b@192.1.2.23 included non-error error | emitting 4 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 372 | finished processing quick inI1 | complete v1 state transition with STF_OK | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #3 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 | child state #3: QUICK_R0(established CHILD SA) => QUICK_R1(established CHILD SA) | event_already_set, deleting event | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555cb4302f50 | sending reply packet to 192.1.3.209:500 (from 192.1.2.23:500) | sending 372 bytes for STATE_QUICK_R0 through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #3) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 20 01 fb 9d 01 a1 00 00 01 74 e1 eb 54 5d | 3d 27 75 aa 35 f6 83 60 ec da 89 cc 64 67 4f 83 | b9 7c b9 d3 41 00 06 b1 64 2c b3 20 8e 24 df 30 | 00 c6 0f 07 d5 a4 33 b4 ae de 87 0d 31 87 49 ab | 69 69 bb c2 f0 60 e6 d9 e6 75 69 ba e2 49 61 83 | f8 4a 68 b9 e3 fa 13 7d 0a 45 98 35 9e 3c bf 0a | 92 8c 60 01 88 32 de 71 81 af 30 06 13 77 f8 7b | a1 bb d0 66 43 73 80 bc 55 13 53 14 65 58 fb 61 | 5a e6 af ca e1 72 4b 97 11 52 85 d7 ec 8b ef 37 | ac ab 03 17 dd eb 9c f5 28 ca 8d af 3b 39 8f 78 | d3 b1 6b d8 ec b8 3c c2 cf 38 75 dc bf b1 1e ec | aa df 52 3a 8c a4 02 1e 2a a0 d5 68 14 e6 2e 96 | d3 9c 8f 01 25 65 32 a0 dc 41 1b a6 4b 84 0a 16 | 5a 51 b8 8f f2 32 37 3e 77 4b f2 d9 51 cc 46 0e | 37 06 43 ba b5 c8 c3 ed 7d 81 dd 3f 22 f4 29 c5 | 2a a8 d1 b3 15 9d b0 b1 bc 20 b1 2e 2a 6a 97 0f | 33 d2 77 24 e2 e1 b0 72 01 c0 7c 58 ef 90 e6 39 | 9c a0 b7 a6 43 ad 72 59 95 d8 82 d9 90 f9 1d b0 | b3 81 67 ea 1b d2 96 ae fa 77 56 ce 55 0b 36 fc | df be 3c da 52 81 47 83 87 20 5a 9d d4 25 27 f1 | 3b 18 00 ec 5e 93 36 0b ea e4 44 4c ea 11 61 44 | 27 13 57 be df 0a 2d 7e d4 1b be 35 e9 69 5f d2 | 74 8f 6e b8 | !event_already_set at reschedule | event_schedule: new EVENT_RETRANSMIT-pe@0x555cb4302f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | #3 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50027.827409 | pstats #3 ikev1.ipsec established | NAT-T: encaps is 'auto' "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x9de53007 <0xaf75b31b xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active username=use2} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #3 suppresed complete_v1_state_transition() | #3 spent 0.908 milliseconds in resume sending helper answer | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f3028001a80 | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 52 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 20 01 fb 9d 01 a1 00 00 00 34 cf c4 76 a8 | dc 0d 33 c9 ee 3c 18 bb 8c 99 24 81 45 91 ae fe | d6 0c 70 31 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4221370785 (0xfb9d01a1) | length: 52 (0x34) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #3 in QUICK_R1 (find_state_ikev1) | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1609) | #3 is idle | #3 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 24 (0x18) | quick_inI2 HASH(3): | dc be 91 24 48 0f 81 54 cf 82 a4 93 00 d9 9c ea | ab 9e 67 38 | received 'quick_inI2' message HASH(3) data ok | install_ipsec_sa() for #3: outbound only | could_route called for xauth-road-eastnet-psk (kind=CK_INSTANCE) | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk"[1] 192.1.3.209 erouted: self; eroute owner: self | sr for #3: erouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk"[1] 192.1.3.209 erouted: self; eroute owner: self | route_and_eroute with c: xauth-road-eastnet-psk (next: none) ero:xauth-road-eastnet-psk esr:{(nil)} ro:xauth-road-eastnet-psk rosr:{(nil)} and state: #3 | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | eroute_connection replace eroute 192.0.2.0/24:0 --0-> 192.1.3.209/32:0 => tun.0@192.1.3.209>tun.0@192.1.3.209 (raw_eroute) | IPsec Sa SPD priority set to 1042399 | raw_eroute result=success | route_and_eroute: firewall_notified: true | route_and_eroute: instance "xauth-road-eastnet-psk"[1] 192.1.3.209, setting eroute_owner {spd=0x555cb4301f00,sr=0x555cb4301f00} to #3 (was #2) (newest_ipsec_sa=#2) | #1 spent 0.0747 milliseconds in install_ipsec_sa() | inI2: instance xauth-road-eastnet-psk[1], setting IKEv1 newest_ipsec_sa to #3 (was #2) (spd.eroute=#3) cloned from #1 | DPD: dpd_init() called on IPsec SA | State DB: found IKEv1 state #1 in MAIN_R3 (find_state_ikev1) | event_schedule: new EVENT_DPD-pe@0x555cb43057e0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | complete v1 state transition with STF_OK | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in complete_v1_state_transition() at ikev1.c:2649) | #3 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 | child state #3: QUICK_R1(established CHILD SA) => QUICK_R2(established CHILD SA) | event_already_set, deleting event | state #3 requesting EVENT_RETRANSMIT to be deleted | #3 STATE_QUICK_R2: retransmits: cleared | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x555cb4302f50 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x555cb4302f50 | inserting event EVENT_SA_REPLACE, timeout in 28530 seconds for #3 | libevent_malloc: new ptr-libevent@0x555cb42d2aa0 size 128 | pstats #3 ikev1.ipsec established | NAT-T: encaps is 'auto' "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x9de53007 <0xaf75b31b xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active username=use2} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | #3 spent 0.169 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.289 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: no need to send or schedule DPD for replaced IPsec SA | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #2 spent 0.0352 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00262 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 26 e9 ee 0a 00 00 00 54 86 81 8c c4 | ff ba 84 db fd 1c 20 09 2a 2c 02 36 23 3a e4 a8 | 41 44 98 aa dd 58 b4 6a dc 9a 38 73 ad 9d 33 05 | 12 41 08 f3 4b 18 72 3b 6d 61 9a 3b 37 ff 05 dc | 6f ec b8 c8 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 652865034 (0x26e9ee0a) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 0f 30 e0 a4 43 5e 08 cf 90 4c 7f 77 70 17 1e 58 | 9c a2 fb 74 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 55 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19285 monotime:50028.829872 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3420424925 (0xcbdf8add) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 55 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | bf 4a 7d 20 61 17 59 86 ed f1 1b 03 55 e0 f2 53 | 01 63 d7 45 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 cb df 8a dd 00 00 00 54 20 97 b2 70 | df 99 c2 39 43 ed f3 2c 12 00 37 f3 2d 4c 41 d1 | e1 d6 92 0c ba 6a 76 18 ed e3 dc 17 64 02 c9 78 | 0e 9f 5d f2 e4 ca e5 5e 0f d5 28 58 ca 9a 8d d1 | 9c 64 25 05 | complete v1 state transition with STF_IGNORE | #1 spent 0.171 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.333 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb43057e0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50028.831189 < 50029.829872 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 0.998683 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD-pe@0x555cb43057e0 | #3 spent 0.0574 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb43057e0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: sending R_U_THERE 10947 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2543478245 (0x979a65e5) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c3 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 3a 27 a4 97 46 b8 15 62 3c fa 88 cb 0d ca 9e a2 | df 93 42 f5 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 97 9a 65 e5 00 00 00 54 fc ab c3 32 | 12 24 57 ff 03 2b 77 b2 0e bb 66 5b bd 0f b1 11 | 0d 5f b2 23 24 81 f4 08 16 b7 b9 a6 88 bf 75 62 | 6b b6 e0 b8 f4 26 1e fb 87 2d 72 10 19 fb 7e ba | ea 35 b5 9e | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #3 spent 0.224 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 b7 d4 65 18 00 00 00 54 fd 87 f2 75 | f7 8f 69 2f a4 0c 95 ed d3 5c 50 ec 76 ef 40 ea | 8c 58 f9 e7 f2 16 7d 01 34 6d 03 e6 43 7e 04 32 | fc b0 68 de 86 ec 7d 5b ec 26 3a 2c dc 7f 7d c4 | bf f2 58 72 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3084150040 (0xb7d46518) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 8e c3 36 d2 14 d1 60 cd 3d 2b dc 77 da 13 83 89 | cd c3 e5 0a | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 56 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19286 monotime:50029.831541 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 533025281 (0x1fc55201) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 56 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 08 57 09 d6 72 10 0a 18 5e 9e da 2b 76 96 33 31 | f5 3c 4d 5e | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 1f c5 52 01 00 00 00 54 67 28 09 00 | 67 3c ab 23 d0 f2 1b 45 36 57 0d ad 3d c0 47 cf | a2 3d ae 63 c4 19 ee af 27 18 4c 0a 3e d3 ec 60 | f9 de 31 05 e6 9c d0 4a eb 6b 6f 88 da 69 d3 f4 | 02 48 b6 3c | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.14 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.294 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00137 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 8b d8 a3 e7 00 00 00 54 e1 5b c7 d8 | bc bd a6 54 bc 4b 39 06 c5 d4 fe d4 f2 fb 49 64 | 25 fa 16 96 8a 2f f4 79 05 a0 da fb e4 fd 65 ad | 06 9b a4 cf 21 ea 4c 5c b0 72 b5 1e ff e0 9a 34 | df 38 03 f3 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2346230759 (0x8bd8a3e7) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 7e f2 b9 36 8f 0a b9 a9 2b 76 92 ef 1d 71 4f 80 | cc db dc 85 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c3 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10947 expected: 10947 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00991 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.151 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb43057e0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: sending R_U_THERE 10948 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3107649745 (0xb93af8d1) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c4 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 07 2f 4b e2 c0 08 3b af 5e 2b 25 55 6b 37 f3 bf | 92 7e 69 af | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 b9 3a f8 d1 00 00 00 54 c3 7d d4 10 | b3 af f9 9b 99 0e 38 5d 4f 92 f2 8b 3d 82 7e 64 | 91 c6 e5 8f 46 af de 1d 65 a3 47 42 d7 6f 9f 1a | a5 0c 6c 98 df 01 be 09 94 a5 a1 e4 f9 cb 4b 96 | 6e f0 3f b9 | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD-pe@0x555cb43057e0 | #3 spent 0.244 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00172 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 4b 60 2b f1 00 00 00 54 42 01 df 3f | 39 2d 80 16 70 70 4c 34 57 39 84 73 b0 25 45 f8 | 1b 83 0b b5 1d ff 42 86 79 d5 db 10 66 3a ae 85 | 88 8a d3 2d 9f f5 22 6a 9a 23 04 8a 51 e7 0d 3d | 97 32 77 bd | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1264593905 (0x4b602bf1) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 14 0a 81 53 9c 57 36 c5 26 61 29 01 38 c7 a2 8e | f4 06 c6 df | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 57 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19287 monotime:50030.832634 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1506739176 (0x59cf03e8) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 57 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 74 54 4f 07 70 90 32 f2 82 98 04 58 30 60 04 b4 | 60 86 d8 7e | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 59 cf 03 e8 00 00 00 54 56 03 b1 6b | 50 8c 6c fd 5d e8 e4 98 20 9a 3a d9 be 1f 9f f2 | 7a 88 45 b0 41 b8 ae 3f 9c 7b 84 6d 23 c7 ef 45 | 99 e4 3d 88 1b 30 3c b6 c2 9b ba b1 cd 0b b2 b2 | fe 22 89 32 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 be deleted | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | complete v1 state transition with STF_IGNORE | #1 spent 0.141 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.291 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 3c 0d a8 4e 00 00 00 54 32 71 eb a6 | eb e2 c3 4c 97 80 ff ee 3a 04 d0 f0 4a 9b 68 51 | 0d 48 ad 7c e6 25 70 ff 6e 6f 06 c9 ca ea ec c9 | d5 2c 19 12 6b ee 1e f8 9c b6 22 68 16 11 af 34 | 9c 36 ac da | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1007528014 (0x3c0da84e) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 75 b5 73 b2 ff 3b 4c 39 51 87 8b 96 3a 88 20 57 | f2 4b 70 2e | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c4 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10948 expected: 10948 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00987 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.151 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: sending R_U_THERE 10949 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 579007214 (0x2282f2ee) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c5 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | ad fd 19 71 ff b5 71 bb f9 78 0f dd ed cd e6 15 | d6 bf 97 95 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 22 82 f2 ee 00 00 00 54 3e f0 72 f5 | a4 56 3a 50 55 8e 65 92 86 82 ab 3e 65 35 6b 6e | 5e 27 a0 49 ed ef cb 75 d4 e3 38 47 bb d4 c5 e2 | b7 ff c1 e6 71 70 a0 da fb 43 31 6f 36 d4 b8 de | ab ed 76 54 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #3 spent 0.221 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00138 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 59 64 4c 6f 00 00 00 54 97 1b 7c 0e | 94 cc 47 0b 7c c8 9d f1 02 5b 36 7f 6f 0a d6 c2 | bc 11 63 49 73 c1 cb 36 9d 8c 5c 62 2b 4e cd db | 86 87 0d b7 a4 dd 15 3d e8 6b 36 d0 cc f3 4b 6f | dc e5 8d a8 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1499745391 (0x59644c6f) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 18 1a 8c 2f c2 8a c1 cc c4 d9 37 d4 db fa 94 bc | 0f 04 f1 9e | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 58 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19288 monotime:50031.833496 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4107815445 (0xf4d84a15) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 58 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | cf 56 4e 83 fa 87 b7 fc ea 57 dc ca ff 88 73 d8 | c4 57 95 92 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 f4 d8 4a 15 00 00 00 54 2d a7 02 71 | d3 94 42 cc 05 04 6d 96 96 a1 91 80 4d 0f 8e a5 | cb 7b 14 39 94 34 00 e2 60 54 ce 0c 07 cb 43 03 | 36 04 95 34 06 3d 5e 30 e1 b0 fb 55 6d 06 0d 88 | 2b b9 4c 6f | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 be deleted | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 | complete v1 state transition with STF_IGNORE | #1 spent 0.13 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.282 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0013 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 27 62 61 f0 00 00 00 54 3d 8f fa fb | ad 8c 28 29 5e 2c 77 e2 65 cd fd d8 89 e9 5d 9b | 9f 92 a6 0e 68 6b 45 1c bf df 97 24 99 ce c8 00 | d8 1a ca 31 e5 5b a3 1e b8 2e 99 3e e7 7f 8e f6 | 75 eb 6d 12 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 660759024 (0x276261f0) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | e5 f8 e1 5d 69 40 68 4f 9f fe e5 91 52 df 6a cb | a9 69 fd ee | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c5 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10949 expected: 10949 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00908 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.144 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb43057e0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: sending R_U_THERE 10950 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4207292284 (0xfac62f7c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c6 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 36 b7 61 9f 38 35 4c c0 e5 30 b6 f0 10 ac ea 84 | 06 ca a4 4e | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 fa c6 2f 7c 00 00 00 54 74 2a de fc | 57 31 1e dd b2 2b f3 fd f7 c8 c6 dc ce 55 10 9d | ae 72 17 71 8e 46 56 3d c1 1b f7 8a 38 d5 1f e2 | 57 a2 77 a1 32 01 cf 3b 5e 22 0b 67 17 60 4f b6 | 2b cf a5 1a | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #3 spent 0.278 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00185 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 5f 23 32 76 00 00 00 54 c7 36 93 b2 | 5b 64 a3 6c de 01 28 f3 ce f6 39 ce 9e 74 40 ab | a4 13 7a de 8b c8 ce 00 72 14 4b 83 22 f4 97 82 | fc e2 49 09 fa 44 de 81 ac 1a 99 f0 24 23 9d 1b | b8 fb cf a5 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1596142198 (0x5f233276) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | c3 6d 64 43 11 1f 26 a9 04 0b 07 86 50 98 5c fc | 58 0b 8f 35 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 59 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19289 monotime:50032.835171 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1994738901 (0x76e54cd5) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 59 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | ba c4 e1 fa 0e dc 14 19 cc 23 8c 5f 0a 70 7d cf | eb 5a 36 80 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 76 e5 4c d5 00 00 00 54 c2 72 89 42 | 93 02 10 14 49 1d b4 19 25 63 a9 43 a0 9c 9d 0b | c0 db 3d b9 ca 30 f5 65 a1 38 2c d1 87 2d db d5 | 6e 16 58 20 81 b8 7e 8a 73 34 97 c7 60 0c b6 ba | d3 9a e6 7c | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.146 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.327 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00151 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 24 96 15 96 00 00 00 54 13 25 54 2b | 22 c8 a6 9b bc 9f 0e de 95 22 60 0a bc 61 c9 04 | 00 dc e2 d5 9d 71 e6 00 a2 d2 22 a1 bf 7a 06 72 | cc d6 1a 59 00 2b 3e bc a0 5f 0e f6 74 44 d0 51 | 9a 13 82 29 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 613815702 (0x24961596) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | c8 10 09 29 a7 83 c3 9b e4 66 bc ab 09 45 99 0b | b0 68 38 44 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c6 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10950 expected: 10950 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0103 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.162 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb43057e0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50033.835201 < 50033.835495 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 0.000294 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD-pe@0x555cb43057e0 | #3 spent 0.063 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb43057e0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: sending R_U_THERE 10951 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1066458434 (0x3f90dd42) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c7 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 24 9d 46 58 b2 37 08 6a 94 5b 93 2c 5e 5d 70 c1 | 43 8b 90 91 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 3f 90 dd 42 00 00 00 54 8e 83 fb ff | 5c b1 bb bf c6 03 5c 85 68 62 94 8b b4 6b 68 4c | f1 a6 8e 51 75 02 b1 df 30 8a 1c 37 7a c4 d5 4d | e7 bc 28 53 23 3a 59 c6 b8 ba 70 b4 4b 37 93 1c | 45 9a 6f 85 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #3 spent 0.221 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00149 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 5e e6 a4 87 00 00 00 54 a5 2a d6 33 | 96 73 84 56 fc 99 e6 94 0d ec 55 d3 6d 50 4e ac | af 54 61 52 fd f7 f3 0f 0a 6f 7a ce d7 39 84 32 | be ee 62 2d f5 84 d6 6e 6d 1d d0 53 78 33 fd c1 | 93 cb 20 be | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1592173703 (0x5ee6a487) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 3c c9 23 7e 5e ee 92 71 77 55 bd 8e 97 33 86 49 | cc 28 32 4d | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 5a | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19290 monotime:50033.837415 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 570592098 (0x22028b62) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 5a | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | aa 37 05 15 9e 78 f0 6b a5 e3 26 39 81 19 54 1a | e9 e0 e5 a5 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 22 02 8b 62 00 00 00 54 6b bf 44 25 | ef 69 b1 5a 5c ea 12 54 bd 43 8c 28 ab f2 3b 2b | cb 7b 85 60 f6 49 38 e4 11 68 01 bd a1 e1 be ec | 4a a1 3a a1 d6 7e 89 e8 70 1d fd 78 a9 13 11 f4 | 73 c4 55 c0 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 be deleted | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | complete v1 state transition with STF_IGNORE | #1 spent 0.136 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.284 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0016 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 da cd 9f 54 00 00 00 54 3e 51 97 e6 | 92 d9 41 6a 21 67 98 a2 61 7e d9 6b d3 77 4a 4b | 64 dd c4 51 ae d9 80 d5 ae 53 53 86 f7 c5 c4 b6 | 7c bc 0e f3 c9 05 6a a7 fa d8 b3 b2 3d e7 b0 76 | 4a d1 1f 60 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3670908756 (0xdacd9f54) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 5c 3d 8f 3e 8a 83 63 f8 dd 9d 1e 3b 33 b9 9f 1d | 5a 8e 05 36 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c7 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10951 expected: 10951 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00936 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.156 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb43057e0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: sending R_U_THERE 10952 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1569143913 (0x5d873c69) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c8 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 6e ce f7 67 53 ef 29 99 bd 0d 82 b2 6c 8e 34 e4 | 8e 37 58 30 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 5d 87 3c 69 00 00 00 54 62 63 c4 e2 | 0c a1 fb fc 98 f7 a6 75 84 6c c2 73 f2 e6 3e 4a | 54 e9 05 9d 91 6e 9a 34 98 fd 78 a5 84 ac 92 b3 | 58 e1 63 0c cc f1 69 03 c3 c0 5e a4 b4 24 f0 fb | 48 2d 54 a8 | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD-pe@0x555cb43057e0 | #3 spent 0.237 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00146 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 15 46 a9 29 00 00 00 54 e1 6a bf 3f | 77 84 76 9b 34 e9 aa 21 77 40 5b 5f 5a 3b 16 99 | 8e a4 5b 90 1d c5 ec 37 8c 68 41 23 45 93 00 0e | 03 91 d5 35 0b 69 69 6c 19 f7 e2 28 f7 75 23 2f | 20 a2 82 48 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 356952361 (0x1546a929) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 4a 4e be 32 bd cb 51 8c 12 04 09 23 e4 2a 6f 6d | 3b 04 58 27 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 5b | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19291 monotime:50034.838618 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1379469458 (0x52390892) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 5b | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | f0 0b 6c c4 ab a4 29 03 c6 20 e3 59 e6 d4 83 1c | 37 97 4e a6 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 52 39 08 92 00 00 00 54 86 a4 07 8a | 3b e5 76 15 e2 5a cf 17 6f 83 42 ad 76 fd 56 b4 | 20 06 6c 5f 72 a2 8f 9c 68 1b 80 ef 30 50 8c 4c | 33 9a 08 fe 5e ff 2a d4 9d 5c 91 e0 17 7c 73 85 | 32 94 4a 68 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.13 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.275 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 e0 db 12 7c 00 00 00 54 da 30 85 2a | 6f ab e9 62 ce 15 29 29 ef 67 5a 60 b9 16 84 02 | bb c8 91 1d 3a 55 f9 45 e8 ee 99 a4 0d 54 db ed | f3 66 61 1d dc 11 4c 1b 97 29 13 b1 48 68 ed 07 | 50 5f 47 14 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3772453500 (0xe0db127c) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | c9 58 29 76 08 ce af 24 45 43 38 ac 24 5e d9 47 | 08 32 ab 8f | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c8 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10952 expected: 10952 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0091 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.143 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: sending R_U_THERE 10953 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 763744255 (0x2d85cfff) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a c9 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | a5 7f db a9 30 19 a9 ef 83 a1 4f 02 8c 01 c4 d4 | 30 f3 0a 63 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 2d 85 cf ff 00 00 00 54 c3 15 59 40 | ef b3 91 4c 39 2d 6a 0f a6 ed fa 8b 86 21 7e 13 | 1d ed 6c 2a d2 19 52 d5 91 2c ca dd d0 61 c3 dc | 41 69 0f d2 27 23 ae a5 25 07 91 5c df 26 e9 d0 | 37 3b 1b 64 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #3 spent 0.237 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.0022 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 8c 3b 22 48 00 00 00 54 fe 27 f3 13 | 1d 4d 51 4f d5 43 fa 08 a9 37 5b 95 4f bd e7 d0 | b5 40 49 50 33 fe 40 23 62 1a 29 5d 43 61 7c fb | 05 8a 7e 6b 98 6d d6 39 36 bd a7 ce 80 71 62 34 | 8d 94 ce 20 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2352685640 (0x8c3b2248) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 0f 7c b2 6c 35 c4 4d 0e 08 be e9 5a ea c2 34 22 | 86 90 fc f2 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 5c | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19292 monotime:50035.839519 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2588299994 (0x9a4652da) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 5c | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 72 fa c6 62 a9 75 66 90 3b 77 ae 4b 7a 0c 98 f5 | ad 18 11 53 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 9a 46 52 da 00 00 00 54 bf fd 02 64 | 1c 7e a3 90 bd a9 6b 70 3e 20 43 46 6a c0 0a 9b | d1 15 f4 a1 dd 2a d5 f2 af 44 07 41 11 69 04 74 | b0 05 52 43 2b 7f 4d 80 01 19 12 33 50 df a3 86 | c1 19 ca 5e | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 be deleted | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 | complete v1 state transition with STF_IGNORE | #1 spent 0.133 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.29 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0011 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 49 ea 76 89 00 00 00 54 fa 03 2c 02 | 3c c5 fa 5b 53 bc 9c e4 54 e5 03 b0 a1 fc be 9a | 0c 85 8f b0 39 ea 97 1a 2e 40 1d 0d e8 56 98 c3 | 4a aa c2 d6 2d 3f 12 73 dc e7 8e d9 9f be 0c fe | 5a bd ba 8a | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1240102537 (0x49ea7689) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 06 36 64 13 72 a4 9e 35 78 56 73 99 dd cb 18 7f | e8 54 2f fa | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a c9 | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10953 expected: 10953 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00666 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.164 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00402 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb43057e0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: sending R_U_THERE 10954 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 587444997 (0x2303b305) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a ca | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | b6 66 d7 95 ba 43 7d 04 92 50 ef 37 fa 23 1b 19 | c3 63 ff 04 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 23 03 b3 05 00 00 00 54 f5 ca 23 ea | f9 cc 36 23 c2 4a 79 ad f4 49 1e 31 99 3c a7 c0 | 87 c2 22 12 28 71 c4 d0 cf 98 aa c6 82 27 e8 9a | ad 35 2e 31 06 a1 12 bb 61 04 ac 6b 0b 14 ad ab | 7e 9a 28 29 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #3 spent 0.194 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00125 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 62 67 2a e0 00 00 00 54 5a a8 26 2a | 72 08 c5 00 d8 07 71 ff e5 06 b1 0b ca 46 c7 ac | c6 bd ad 23 79 f4 cc 11 61 51 c6 03 98 95 fd dd | ad 54 fd af 57 d8 8f 1f a9 63 3f 5f bf fc 6d 9b | af f5 53 d1 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1650928352 (0x62672ae0) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | ac a1 94 a1 0d 9b 45 b4 60 ac 25 96 3a 83 06 ce | d2 6d 7e ae | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 5d | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19293 monotime:50036.841046 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1308465946 (0x4dfd9b1a) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 5d | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 90 d2 1f bb 82 06 b1 c2 b8 14 d6 15 b0 ef 9e c3 | ff 68 25 c2 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 4d fd 9b 1a 00 00 00 54 05 92 87 f2 | 40 8b 08 36 f7 a7 33 a0 b4 7b 32 a5 8a 8a 7e bf | f3 b8 f2 00 d3 59 ad 36 58 ba 29 e4 47 82 10 58 | d8 67 32 96 24 d6 93 9b a6 60 6d 63 e2 4f db b2 | 5c b2 7e 51 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 be deleted | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4309be0 | complete v1 state transition with STF_IGNORE | #1 spent 0.111 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.211 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0021 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 4e 29 15 9c 00 00 00 54 cd b7 99 93 | 74 b3 f5 d8 93 79 25 51 71 95 d3 dd a6 fc 4b 67 | 7c b0 6d 26 a6 0f 5e 59 b3 b1 3e d8 01 67 85 96 | df d5 f7 c0 ee 7d 68 67 88 c6 5f 50 47 a7 5b da | 4a 17 0c 68 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1311315356 (0x4e29159c) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | bf 4e 8b 38 ba 7a 88 10 0d e8 67 5e e4 c1 fc 9a | 56 de 25 e8 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a ca | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10954 expected: 10954 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.0068 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.112 milliseconds in comm_handle_cb() reading and processing packet | spent 0.00302 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.3.209:500 | spent 0.0128 milliseconds in comm_handle_cb() reading and processing packet | processing global timer EVENT_NAT_T_KEEPALIVE | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in for_each_state() at state.c:1572) | not behind NAT: no NAT-T KEEP-ALIVE required for conn xauth-road-eastnet-psk | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in nat_traversal_send_ka() at nat_traversal.c:773) | ka_event: send NAT-KA to 192.1.3.209:500 (state=#3) | sending NAT-T Keep Alive | sending 1 bytes for NAT-T Keep Alive through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #3) | ff | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in nat_traversal_send_ka() at nat_traversal.c:782) | processing: STOP state #0 (in for_each_state() at state.c:1574) | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in for_each_state() at state.c:1572) | not behind NAT: no NAT-T KEEP-ALIVE required for conn xauth-road-eastnet-psk | stop processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in for_each_state() at state.c:1574) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in for_each_state() at state.c:1572) | not behind NAT: no NAT-T KEEP-ALIVE required for conn xauth-road-eastnet-psk | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in for_each_state() at state.c:1574) | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | spent 0.0996 milliseconds in global timer EVENT_NAT_T_KEEPALIVE | timer_event_cb: processing event@0x555cb43057e0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: sending R_U_THERE 10955 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1807149905 (0x6bb6eb51) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a cb | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 37 ec c0 25 67 3e 26 ba af 4f d1 07 78 48 5d e3 | 44 cb 32 06 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 6b b6 eb 51 00 00 00 54 0c 5a da 31 | a6 7b 45 20 39 99 7f 66 44 29 aa ed 64 51 2a f4 | ab a2 5e 04 02 a6 dc 4e 7c 36 e8 0d 7e 94 5d 5f | e7 82 53 ea a0 f8 53 43 fc a1 5a 7f fb b0 85 88 | d5 96 57 34 | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD-pe@0x555cb43057e0 | #3 spent 0.225 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00145 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 c1 64 07 18 00 00 00 54 cf 6a ff d3 | ec 23 8d ed 80 42 9b 55 8a 8e 01 80 83 0a c8 af | 94 1b 5e cf 4d b1 bb d4 41 6b 9e e8 a8 0d b7 48 | d4 ea 68 49 35 10 6b c8 fc 32 93 ea 15 44 e4 4c | f4 37 95 19 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3244558104 (0xc1640718) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | ed 8c b0 8f ba 9f ad 33 79 00 a8 ae 83 d8 c2 ac | 78 a4 89 5e | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 5e | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19294 monotime:50037.850178 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4127380377 (0xf602d399) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 5e | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 0b 68 7d 32 3b f6 c4 fe ff a2 e4 8f eb bf c4 9d | 02 69 f1 a2 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 f6 02 d3 99 00 00 00 54 bb 0e 2b 81 | f9 f2 52 3e 0a e1 07 f8 83 4c 31 13 c2 f2 65 83 | 5f bc b5 c3 fb 91 48 7e 72 24 aa 97 3c ae bc 90 | e4 70 76 62 c2 fa 7e 62 c0 81 b4 29 d0 ce 0c dd | 02 6c 96 fc | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb4304330 | complete v1 state transition with STF_IGNORE | #1 spent 0.133 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.285 milliseconds in comm_handle_cb() reading and processing packet | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 1b 7d 24 9e 00 00 00 54 22 17 6b d3 | f3 97 3f 4e 4f d4 0e c1 4d dc 01 88 56 88 4c fa | 4e c1 ef 1d 58 f2 e8 1b 83 7f 77 62 89 7d 6c 09 | 4c b5 15 ae 93 48 bf 56 26 6f 9c 36 d6 d5 06 21 | 8a 43 f2 f0 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 461186206 (0x1b7d249e) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | 9f 5c 39 b8 3f 84 e2 12 26 f3 80 79 ed f6 d8 22 | 0d 54 71 41 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a cb | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10955 expected: 10955 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00928 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.157 milliseconds in comm_handle_cb() reading and processing packet | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.aca51b7a@192.1.2.23 | get_sa_info esp.45edb731@192.1.3.209 | get_sa_info esp.af75b31b@192.1.2.23 | get_sa_info esp.9de53007@192.1.3.209 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.398 milliseconds in whack | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50038.850813 < 50038.85222 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 0.001407 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #3 spent 0.0579 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00263 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 37 c7 3a 47 00 00 00 54 0a e3 03 cd | d4 cd 5e 6f 23 6a 90 cc 95 28 b3 d1 76 7f fd a3 | 75 91 f1 eb 05 10 7b 03 76 e0 da b6 16 43 c5 98 | f3 50 5e 22 9e 43 42 99 0d 31 71 6d 3b a3 93 39 | 47 cb 8a 65 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 935803463 (0x37c73a47) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 5e 5b c7 af 41 5d 08 ac 1a 4f 9e a0 99 cd b0 d6 | 40 4e ef 15 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 5f | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19295 monotime:50038.85248 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2478533939 (0x93bb6d33) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 5f | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | f2 b3 50 dd 8f ba d3 b0 e8 2e 0d ee c0 dc ad 36 | 35 6e eb 94 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 93 bb 6d 33 00 00 00 54 3d fe a1 ad | 61 1d 0d e0 e4 92 56 27 f4 2d 3e 6a 06 d7 da c6 | 8a 75 41 8c 2f e5 8b e8 5f 3e 89 cf b8 49 58 be | b6 63 f5 7f 0e 4d 41 86 03 6e 49 cb 18 ff 0b ae | 83 a1 bd fd | complete v1 state transition with STF_IGNORE | #1 spent 0.144 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.302 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50038.852668 < 50039.85248 | event_schedule: new EVENT_DPD-pe@0x555cb4309be0 | inserting event EVENT_DPD, timeout in 0.999812 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3030003120 size 128 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #3 spent 0.0379 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x555cb4309be0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | get_sa_info esp.af75b31b@192.1.2.23 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | DPD: scheduling timeout to 5 | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 | inserting event EVENT_DPD_TIMEOUT, timeout in 5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | DPD: sending R_U_THERE 10956 to 192.1.3.209:500 (state #1) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3399612720 (0xcaa1f930) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 2a cc | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | fe a6 72 85 7e 27 14 b3 6d 52 c9 24 bf 77 2a 00 | ee 34 22 0f | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 ca a1 f9 30 00 00 00 54 e8 c3 63 29 | 4c a8 4b 09 3c 0d 54 ff 9d 1c e3 69 89 a5 2b c2 | 81 30 60 50 23 8e 7c a7 94 cd 9a b5 00 ff 84 59 | da dd bd e3 aa db 86 b5 83 84 70 27 c2 97 e8 4e | 8f 5b b4 06 | libevent_free: release ptr-libevent@0x7f3030003120 | free_event_entry: release EVENT_DPD-pe@0x555cb4309be0 | #3 spent 0.282 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 a8 a8 0b 55 00 00 00 54 0f cc 98 3f | dd 59 5e ae 3f 0a 88 96 70 7c 9b 85 89 d3 3e c2 | 26 f2 2c ad b5 e0 0a 1a 57 3c 42 69 ad 0f 7f 4f | ce b7 be 4b 4c 65 47 35 6c e3 1a a8 5a bc 71 7c | 30 08 3c 1b | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2829585237 (0xa8a80b55) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | f3 d1 48 b0 f6 21 60 af 6b 6b 40 56 fa bd 49 3a | a4 a4 02 7d | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 60 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19296 monotime:50039.856283 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3200900057 (0xbec9dbd9) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 60 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 4e 34 a4 ad 1a be 24 cd 1e 6b a3 a4 c6 79 f9 f4 | f4 44 6d 9c | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 be c9 db d9 00 00 00 54 51 45 6f 29 | c9 aa 62 f1 2b b3 6d 30 af 9b 49 d3 de 01 06 0a | 86 8a 49 82 f4 fe 76 fe 23 ab 70 6b 3d 58 8f 92 | 09 9a ef b8 f4 6c ef 8f 36 ba 57 e8 ed 38 96 bc | 43 25 d9 c1 | state #1 requesting EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 be deleted | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x555cb43057e0 | complete v1 state transition with STF_IGNORE | #1 spent 0.154 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.328 milliseconds in comm_handle_cb() reading and processing packet | spent 0.0028 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 65 df 59 47 00 00 00 54 48 ad 1f 09 | 34 5a a5 14 57 88 67 92 2f fe 80 1b bf dd 1c 4c | cb a0 62 fc b7 43 d4 35 24 dc 98 05 5a d2 0d 1a | 1f 21 bd 36 af a5 3d 0c 1a 10 b8 69 96 3e ac 9a | a8 87 14 9e | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1709136199 (0x65df5947) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | informational HASH(1): | ae 62 86 42 ce d6 3f 64 00 bf 78 05 ff 58 4e 24 | ec 9f 01 c0 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 2a cc | processing informational R_U_THERE_ACK (36137) | pstats ikev1_recv_notifies_e 36137 | DPD: R_U_THERE_ACK, seqno received: 10956 expected: 10956 (state=#1) | complete v1 state transition with STF_IGNORE | #1 spent 0.00969 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.17 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb4304330 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50040.855166 < 50040.857409 | event_schedule: new EVENT_DPD-pe@0x555cb43057e0 | inserting event EVENT_DPD, timeout in 0.002243 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3028001a80 size 128 | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #3 spent 0.06 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | spent 0.00264 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | *received 84 bytes from 192.1.3.209:500 on eth1 (192.1.2.23:500) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 7b 01 d5 22 00 00 00 54 b8 c7 45 a1 | 53 9e 05 81 d1 14 f0 30 6b be 51 a0 67 76 bb 5d | a0 84 71 1a 88 35 ce f5 cd 68 ab 3e 4a d4 fe 0f | db 15 ed 04 fa d8 03 a0 cc bf 92 1f 87 68 5b 07 | f1 f7 33 57 | start processing: from 192.1.3.209:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2063717666 (0x7b01d522) | length: 84 (0x54) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=fb9d01a1 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=4e6a11af st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_R3 | State DB: found IKEv1 state #1 in MAIN_R3 (find_v1_info_state) | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_v1_packet() at ikev1.c:1455) | #1 is idle | #1 idle | received encrypted packet from 192.1.3.209:500 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N (0xb) | length: 24 (0x18) | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0 opt: 0x0 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE (0x8d28) | informational HASH(1): | 21 14 c7 bd 48 18 af 17 6c ec 0c b2 e8 2f 84 4c | 47 84 bb a5 | received 'informational' message HASH(1) data ok | info: 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | info: 00 00 4b 61 | processing informational R_U_THERE (36136) | pstats ikev1_recv_notifies_e 36136 | DPD: received R_U_THERE seq:19297 monotime:50040.857701 (state=#1 name="xauth-road-eastnet-psk"[1] 192.1.3.209) | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2931003452 (0xaeb3903c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | Notify Message Type: R_U_THERE_ACK (0x8d29) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload | notify icookie 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload | notify rcookie be 6f 00 55 1e fb 8c f1 | emitting 4 raw bytes of notify data into ISAKMP Notification Payload | notify data 00 00 4b 61 | emitting length of ISAKMP Notification Payload: 32 | notification HASH(1): | 9f 0c da 31 61 71 45 58 11 1a 2d ef a1 cf f5 97 | 40 ba 22 b3 | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for ISAKMP notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 ae b3 90 3c 00 00 00 54 ce 21 ac 76 | e2 83 40 bb c0 91 58 95 25 fb d6 78 98 46 3b ee | b2 32 47 b3 bc e6 5a c7 44 5c 15 24 de 29 fd c2 | 9f 84 a1 ca 12 e6 d1 1d 9d c5 6c df 5b 9b 9a e6 | cf 7e bc 10 | complete v1 state transition with STF_IGNORE | #1 spent 0.139 milliseconds in process_packet_tail() | stop processing: from 192.1.3.209:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | spent 0.307 milliseconds in comm_handle_cb() reading and processing packet | timer_event_cb: processing event@0x555cb43057e0 | handling event EVENT_DPD for child state #3 | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:250) | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in dpd_event() at ikev1_dpd.c:357) | FOR_EACH_STATE_... in find_phase1_state | DPD: processing for state #3 ("xauth-road-eastnet-psk"[1] 192.1.3.209) | DPD: not yet time for dpd event: 50040.858982 < 50041.857701 | event_schedule: new EVENT_DPD-pe@0x555cb4304330 | inserting event EVENT_DPD, timeout in 0.998719 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f3040001e30 size 128 | libevent_free: release ptr-libevent@0x7f3028001a80 | free_event_entry: release EVENT_DPD-pe@0x555cb43057e0 | #3 spent 0.0526 milliseconds in timer_event_cb() EVENT_DPD | stop processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) shutting down | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) | pluto_sd: executing action action: stopping(6), status 0 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' | start processing: connection "xauth-road-eastnet-psk"[1] 192.1.3.209 (in delete_connection() at connections.c:189) "xauth-road-eastnet-psk"[1] 192.1.3.209: deleting connection "xauth-road-eastnet-psk"[1] 192.1.3.209 instance with peer 192.1.3.209 {isakmp=#1/ipsec=#3} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #3 | suspend processing: connection "xauth-road-eastnet-psk"[1] 192.1.3.209 (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #3 ikev1.ipsec deleted completed | [RE]START processing: state #3 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in delete_state() at state.c:879) "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: deleting state (STATE_QUICK_R2) aged 13.586s and sending notification | child state #3: QUICK_R2(established CHILD SA) => delete | get_sa_info esp.9de53007@192.1.3.209 | get_sa_info esp.af75b31b@192.1.2.23 "xauth-road-eastnet-psk"[1] 192.1.3.209 #3: ESP traffic information: in=0B out=0B XAUTHuser=use2 | state #3 requesting EVENT_DPD-pe@0x555cb4304330 be deleted | libevent_free: release ptr-libevent@0x7f3040001e30 | free_event_entry: release EVENT_DPD-pe@0x555cb4304330 | #3 send IKEv1 delete notification for STATE_QUICK_R2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1874693123 (0x6fbd8c03) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload af 75 b3 1b | emitting length of ISAKMP Delete Payload: 16 | send delete HASH(1): | 66 ef 55 4b 4c 2e 1e 94 7e 88 c4 15 7e 22 fd 71 | 41 3a 4b 05 | no IKEv1 message padding required | emitting length of ISAKMP Message: 68 | sending 68 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 6f bd 8c 03 00 00 00 44 fc f1 6c df | 78 68 1d 0e 8b b0 11 59 01 a1 d7 dd 3b 0e 47 e3 | 06 e7 70 15 06 40 95 0e 37 4d 6d d6 ed d4 61 88 | d5 59 9d 55 | state #3 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x555cb42d2aa0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x555cb4302f50 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051381' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGUR | popen cmd is 1102 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastne: | cmd( 80):t-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' : | cmd( 160):PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.: | cmd( 240):0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' : | cmd( 320):PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.3.209' PLUTO_PEER_I: | cmd( 400):D='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.: | cmd( 480):3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_P: | cmd( 560):ROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051381' PLU: | cmd( 640):TO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+: | cmd( 720):IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ip: | cmd( 800):v4' XAUTH_FAILED=0 PLUTO_USERNAME='use2' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_: | cmd( 880):INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUT: | cmd( 960):O_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARE: | cmd(1040):D='no' SPI_IN=0x9de53007 SPI_OUT=0xaf75b31b ipsec _updown 2>&1: | shunt_eroute() called for connection 'xauth-road-eastnet-psk' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 192.0.2.0/24:0 --0->- 192.1.3.209/32:0 | netlink_shunt_eroute for proto 0, and source 192.0.2.0/24:0 dest 192.1.3.209/32:0 | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | IPsec Sa SPD priority set to 1042399 | delete esp.9de53007@192.1.3.209 | netlink response for Del SA esp.9de53007@192.1.3.209 included non-error error | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | delete inbound eroute 192.1.3.209/32:0 --0-> 192.0.2.0/24:0 => unk255.10000@192.1.2.23 (raw_eroute) | raw_eroute result=success | delete esp.af75b31b@192.1.2.23 | netlink response for Del SA esp.af75b31b@192.1.2.23 included non-error error | stop processing: connection "xauth-road-eastnet-psk"[1] 192.1.3.209 (BACKGROUND) (in update_state_connection() at connections.c:4037) | start processing: connection NULL (in update_state_connection() at connections.c:4038) | in connection_discard for connection xauth-road-eastnet-psk | State DB: deleting IKEv1 state #3 in QUICK_R2 | child state #3: QUICK_R2(established CHILD SA) => UNDEFINED(ignore) | stop processing: state #3 from 192.1.3.209:500 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | state #2 | start processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #2 ikev1.ipsec deleted completed | [RE]START processing: state #2 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in delete_state() at state.c:879) "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: deleting state (STATE_QUICK_R2) aged 23.874s and sending notification | child state #2: QUICK_R2(established CHILD SA) => delete | get_sa_info esp.45edb731@192.1.3.209 | get_sa_info esp.aca51b7a@192.1.2.23 "xauth-road-eastnet-psk"[1] 192.1.3.209 #2: ESP traffic information: in=0B out=0B XAUTHuser=use2 | #2 send IKEv1 delete notification for STATE_QUICK_R2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3557530730 (0xd40b9c6a) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload ac a5 1b 7a | emitting length of ISAKMP Delete Payload: 16 | send delete HASH(1): | b3 03 82 53 d8 99 b8 09 66 d7 84 a9 c1 37 cd 66 | 00 7a d5 f8 | no IKEv1 message padding required | emitting length of ISAKMP Message: 68 | sending 68 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 d4 0b 9c 6a 00 00 00 44 ae 81 40 89 | a8 91 07 18 d8 af f7 ce 3c ca bc c1 d3 f8 66 68 | 1c de 63 ec af 52 20 00 48 3c 70 97 18 f5 c1 74 | 11 da bb c2 | state #2 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x555cb4300700 | free_event_entry: release EVENT_SA_REPLACE-pe@0x555cb4302e20 | delete esp.45edb731@192.1.3.209 | netlink response for Del SA esp.45edb731@192.1.3.209 included non-error error | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | delete inbound eroute 192.1.3.209/32:0 --0-> 192.0.2.0/24:0 => unk255.10000@192.1.2.23 (raw_eroute) | raw_eroute result=success | delete esp.aca51b7a@192.1.2.23 | netlink response for Del SA esp.aca51b7a@192.1.2.23 included non-error error | in connection_discard for connection xauth-road-eastnet-psk | State DB: deleting IKEv1 state #2 in QUICK_R2 | child state #2: QUICK_R2(established CHILD SA) => UNDEFINED(ignore) | stop processing: state #2 from 192.1.3.209:500 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | state #1 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #1 | start processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #1 ikev1.isakmp deleted completed | [RE]START processing: state #1 connection "xauth-road-eastnet-psk"[1] 192.1.3.209 from 192.1.3.209:500 (in delete_state() at state.c:879) "xauth-road-eastnet-psk"[1] 192.1.3.209 #1: deleting state (STATE_MAIN_R3) aged 23.963s and sending notification | parent state #1: MAIN_R3(established IKE SA) => delete | #1 send IKEv1 delete notification for STATE_MAIN_R3 | **emit ISAKMP Message: | initiator cookie: | 4c 63 24 fa ce 6b 5b 3f | responder cookie: | be 6f 00 55 1e fb 8c f1 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1257240897 (0x4aeff941) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 20 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 24 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload | initiator SPI 4c 63 24 fa ce 6b 5b 3f | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload | responder SPI be 6f 00 55 1e fb 8c f1 | emitting length of ISAKMP Delete Payload: 28 | send delete HASH(1): | d2 76 0e 34 87 96 b0 31 c2 82 c2 23 97 0b e6 aa | e3 09 b0 ed | emitting 4 zero bytes of encryption padding into ISAKMP Message | no IKEv1 message padding required | emitting length of ISAKMP Message: 84 | sending 84 bytes for delete notify through eth1 from 192.1.2.23:500 to 192.1.3.209:500 (using #1) | 4c 63 24 fa ce 6b 5b 3f be 6f 00 55 1e fb 8c f1 | 08 10 05 01 4a ef f9 41 00 00 00 54 d1 cd aa 31 | b7 7c 3d e8 64 2b 9c 14 ab c1 6d f9 16 db f3 55 | bb 15 c9 95 ed c0 e9 ba 55 c6 45 3e 9d a2 da c4 | 37 e2 92 c8 d3 5e ec 65 6e 52 93 c0 71 46 d3 cb | 99 df eb 73 | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f303800b570 | free_event_entry: release EVENT_SA_REPLACE-pe@0x555cb43006c0 | State DB: IKEv1 state not found (flush_incomplete_children) | in connection_discard for connection xauth-road-eastnet-psk | State DB: deleting IKEv1 state #1 in MAIN_R3 | parent state #1: MAIN_R3(established IKE SA) => UNDEFINED(ignore) | stop processing: state #1 from 192.1.3.209:500 (in delete_state() at state.c:1143) | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | shunt_eroute() called for connection 'xauth-road-eastnet-psk' to 'delete' for rt_kind 'unrouted' using protoports 192.0.2.0/24:0 --0->- 192.1.3.209/32:0 | netlink_shunt_eroute for proto 0, and source 192.0.2.0/24:0 dest 192.1.3.209/32:0 | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | priority calculation of connection "xauth-road-eastnet-psk" is 0xfe7df | FOR_EACH_CONNECTION_... in route_owner | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 vs | conn xauth-road-eastnet-psk mark 0/00000000, 0/00000000 | route owner of "xauth-road-eastnet-psk" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eastnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.23' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.3.209' PLUTO_PEER_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='192.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ | popen cmd is 1061 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth-road-eas: | cmd( 80):tnet-psk' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.45' PLUTO_ME='192.1.2.2: | cmd( 160):3' PLUTO_MY_ID='@east' PLUTO_MY_CLIENT='192.0.2.0/24' PLUTO_MY_CLIENT_NET='192.0: | cmd( 240):.2.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL=': | cmd( 320):0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.3.209' PLUTO_PE: | cmd( 400):ER_ID='@roadrandom' PLUTO_PEER_CLIENT='192.1.3.209/32' PLUTO_PEER_CLIENT_NET='19: | cmd( 480):2.1.3.209' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PE: | cmd( 560):ER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CO: | cmd( 640):NN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_F: | cmd( 720):RAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' X: | cmd( 800):AUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_I: | cmd( 880):NFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_C: | cmd( 960):ONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0: | cmd(1040):x0 ipsec _updown 2>&1: unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. | free hp@0x555cb4289080 | flush revival: connection 'xauth-road-eastnet-psk' wasn't on the list | processing: STOP connection NULL (in discard_connection() at connections.c:249) | start processing: connection "xauth-road-eastnet-psk" (in delete_connection() at connections.c:189) | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | free hp@0x555cb42cb680 | flush revival: connection 'xauth-road-eastnet-psk' wasn't on the list | stop processing: connection "xauth-road-eastnet-psk" (in discard_connection() at connections.c:249) | crl fetch request list locked by 'free_crl_fetch' | crl fetch request list unlocked by 'free_crl_fetch' shutting down interface lo/lo 127.0.0.1:4500 shutting down interface lo/lo 127.0.0.1:500 shutting down interface eth0/eth0 192.0.2.254:4500 shutting down interface eth0/eth0 192.0.2.254:500 shutting down interface eth1/eth1 192.1.2.23:4500 shutting down interface eth1/eth1 192.1.2.23:500 | FOR_EACH_STATE_... in delete_states_dead_interfaces | libevent_free: release ptr-libevent@0x555cb42feb30 | free_event_entry: release EVENT_NULL-pe@0x555cb42e7d30 | libevent_free: release ptr-libevent@0x555cb42fec20 | free_event_entry: release EVENT_NULL-pe@0x555cb42febe0 | libevent_free: release ptr-libevent@0x555cb42fed10 | free_event_entry: release EVENT_NULL-pe@0x555cb42fecd0 | libevent_free: release ptr-libevent@0x555cb42fee00 | free_event_entry: release EVENT_NULL-pe@0x555cb42fedc0 | libevent_free: release ptr-libevent@0x555cb42feef0 | free_event_entry: release EVENT_NULL-pe@0x555cb42feeb0 | libevent_free: release ptr-libevent@0x555cb42fefe0 | free_event_entry: release EVENT_NULL-pe@0x555cb42fefa0 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | libevent_free: release ptr-libevent@0x555cb42fe490 | free_event_entry: release EVENT_NULL-pe@0x555cb42e6fb0 | libevent_free: release ptr-libevent@0x555cb42f3f20 | free_event_entry: release EVENT_NULL-pe@0x555cb42e7260 | libevent_free: release ptr-libevent@0x555cb42f3e90 | free_event_entry: release EVENT_NULL-pe@0x555cb42ec9c0 | global timer EVENT_REINIT_SECRET uninitialized | global timer EVENT_SHUNT_SCAN uninitialized | global timer EVENT_PENDING_DDNS uninitialized | global timer EVENT_PENDING_PHASE2 uninitialized | global timer EVENT_CHECK_CRLS uninitialized | global timer EVENT_REVIVE_CONNS uninitialized | global timer EVENT_FREE_ROOT_CERTS uninitialized | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized | global timer EVENT_NAT_T_KEEPALIVE uninitialized | libevent_free: release ptr-libevent@0x555cb42fe560 | signal event handler PLUTO_SIGCHLD uninstalled | libevent_free: release ptr-libevent@0x555cb42fe640 | signal event handler PLUTO_SIGTERM uninstalled | libevent_free: release ptr-libevent@0x555cb42fe700 | signal event handler PLUTO_SIGHUP uninstalled | libevent_free: release ptr-libevent@0x555cb42f3190 | signal event handler PLUTO_SIGSYS uninstalled | releasing event base | libevent_free: release ptr-libevent@0x555cb42fe7c0 | libevent_free: release ptr-libevent@0x555cb42d3fa0 | libevent_free: release ptr-libevent@0x555cb42e25e0 | libevent_free: release ptr-libevent@0x555cb4302e60 | libevent_free: release ptr-libevent@0x555cb42e2600 | libevent_free: release ptr-libevent@0x555cb42fe520 | libevent_free: release ptr-libevent@0x555cb42fe600 | libevent_free: release ptr-libevent@0x555cb42e2690 | libevent_free: release ptr-libevent@0x555cb42e7c30 | libevent_free: release ptr-libevent@0x555cb42e2700 | libevent_free: release ptr-libevent@0x555cb42ff070 | libevent_free: release ptr-libevent@0x555cb42fef80 | libevent_free: release ptr-libevent@0x555cb42fee90 | libevent_free: release ptr-libevent@0x555cb42feda0 | libevent_free: release ptr-libevent@0x555cb42fecb0 | libevent_free: release ptr-libevent@0x555cb42febc0 | libevent_free: release ptr-libevent@0x555cb4264370 | libevent_free: release ptr-libevent@0x555cb42fe6e0 | libevent_free: release ptr-libevent@0x555cb42fe620 | libevent_free: release ptr-libevent@0x555cb42fe540 | libevent_free: release ptr-libevent@0x555cb42fe7a0 | libevent_free: release ptr-libevent@0x555cb42625b0 | libevent_free: release ptr-libevent@0x555cb42e2620 | libevent_free: release ptr-libevent@0x555cb42e2650 | libevent_free: release ptr-libevent@0x555cb42e2340 | releasing global libevent data | libevent_free: release ptr-libevent@0x555cb42e0ff0 | libevent_free: release ptr-libevent@0x555cb42e1020 | libevent_free: release ptr-libevent@0x555cb42e2310