Oct 31 15:24:04.355420: | newref logger@0x56551f01cb70(0->1) (in main() at plutomain.c:1591) Oct 31 15:24:04.355579: | delref logger@0x56551f01cb70(1->0) (in main() at plutomain.c:1592) Oct 31 15:24:04.355586: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:04.355589: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:04.355592: NSS DB directory: sql:/var/lib/ipsec/nss Oct 31 15:24:04.355770: Initializing NSS Oct 31 15:24:04.355776: Opening NSS database "sql:/var/lib/ipsec/nss" read-only Oct 31 15:24:04.392282: FIPS Mode: NO Oct 31 15:24:04.392296: NSS crypto library initialized Oct 31 15:24:04.392323: FIPS mode disabled for pluto daemon Oct 31 15:24:04.392326: FIPS HMAC integrity support [disabled] Oct 31 15:24:04.392403: libcap-ng support [enabled] Oct 31 15:24:04.392412: Linux audit support [enabled] Oct 31 15:24:04.392427: Linux audit activated Oct 31 15:24:04.392430: Starting Pluto (Libreswan Version v4.1-88-gf1d1933837ef-main IKEv2 IKEv1 XFRM(netkey) XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-PRF) DNSSEC LABELED_IPSEC (SELINUX) SECCOMP LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:2083510 Oct 31 15:24:04.392432: core dump dir: /tmp Oct 31 15:24:04.392433: secrets file: /etc/ipsec.secrets Oct 31 15:24:04.392435: leak-detective disabled Oct 31 15:24:04.392436: NSS crypto [enabled] Oct 31 15:24:04.392437: XAUTH PAM support [enabled] Oct 31 15:24:04.392506: | libevent is using pluto's memory allocator Oct 31 15:24:04.392516: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Oct 31 15:24:04.392527: | libevent_malloc: newref ptr-libevent@0x56551f0cbb30 size 40 Oct 31 15:24:04.392530: | libevent_malloc: newref ptr-libevent@0x56551f0cbb60 size 40 Oct 31 15:24:04.392534: | libevent_malloc: newref ptr-libevent@0x56551f0cd230 size 40 Oct 31 15:24:04.392538: | creating event base Oct 31 15:24:04.392541: | libevent_malloc: newref ptr-libevent@0x56551f0cd260 size 56 Oct 31 15:24:04.392544: | libevent_malloc: newref ptr-libevent@0x56551f0cd2a0 size 664 Oct 31 15:24:04.392556: | libevent_malloc: newref ptr-libevent@0x56551f0cb8c0 size 24 Oct 31 15:24:04.392559: | libevent_malloc: newref ptr-libevent@0x56551f093e60 size 384 Oct 31 15:24:04.392569: | libevent_malloc: newref ptr-libevent@0x56551f0cb990 size 16 Oct 31 15:24:04.392571: | libevent_malloc: newref ptr-libevent@0x56551f0cd540 size 40 Oct 31 15:24:04.392574: | libevent_malloc: newref ptr-libevent@0x56551f0cd570 size 48 Oct 31 15:24:04.392579: | libevent_realloc: newref ptr-libevent@0x56551f0cd5b0 size 256 Oct 31 15:24:04.392581: | libevent_malloc: newref ptr-libevent@0x56551f0cba60 size 16 Oct 31 15:24:04.392585: | libevent_free: delref ptr-libevent@0x56551f0cd260 Oct 31 15:24:04.392587: | libevent initialized Oct 31 15:24:04.392591: | libevent_realloc: newref ptr-libevent@0x56551f0cd6c0 size 64 Oct 31 15:24:04.392593: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Oct 31 15:24:04.392598: | init_nat_traversal() initialized with keep_alive=0s Oct 31 15:24:04.392599: NAT-Traversal support [enabled] Oct 31 15:24:04.392601: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Oct 31 15:24:04.392605: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Oct 31 15:24:04.392607: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Oct 31 15:24:04.392615: | checking IKEv1 state table Oct 31 15:24:04.392619: | MAIN_R0: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392621: | -> MAIN_R1 EVENT_SO_DISCARD (main_inI1_outR1) Oct 31 15:24:04.392624: | MAIN_I1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392625: | -> MAIN_I2 EVENT_RETRANSMIT (main_inR1_outI2) Oct 31 15:24:04.392627: | MAIN_R1: category: open IKE SA; flags: 0: Oct 31 15:24:04.392628: | -> MAIN_R2 EVENT_RETRANSMIT (main_inI2_outR2) Oct 31 15:24:04.392630: | -> MAIN_R1 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.392631: | -> MAIN_R1 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.392633: | MAIN_I2: category: open IKE SA; flags: 0: Oct 31 15:24:04.392638: | -> MAIN_I3 EVENT_RETRANSMIT (main_inR2_outI3) Oct 31 15:24:04.392639: | -> MAIN_I2 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.392640: | -> MAIN_I2 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.392642: | MAIN_R2: category: open IKE SA; flags: 0: Oct 31 15:24:04.392643: | -> MAIN_R3 EVENT_SA_REPLACE (main_inI3_outR3) Oct 31 15:24:04.392645: | -> MAIN_R3 EVENT_SA_REPLACE (main_inI3_outR3) Oct 31 15:24:04.392646: | -> MAIN_R2 EVENT_SA_REPLACE (unexpected) Oct 31 15:24:04.392648: | MAIN_I3: category: open IKE SA; flags: 0: Oct 31 15:24:04.392649: | -> MAIN_I4 EVENT_SA_REPLACE (main_inR3) Oct 31 15:24:04.392650: | -> MAIN_I4 EVENT_SA_REPLACE (main_inR3) Oct 31 15:24:04.392652: | -> MAIN_I3 EVENT_SA_REPLACE (unexpected) Oct 31 15:24:04.392654: | MAIN_R3: category: established IKE SA; flags: 0: Oct 31 15:24:04.392656: | -> MAIN_R3 EVENT_NULL (unexpected) Oct 31 15:24:04.392657: | MAIN_I4: category: established IKE SA; flags: 0: Oct 31 15:24:04.392659: | -> MAIN_I4 EVENT_NULL (unexpected) Oct 31 15:24:04.392660: | AGGR_R0: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392662: | -> AGGR_R1 EVENT_SO_DISCARD (aggr_inI1_outR1) Oct 31 15:24:04.392663: | AGGR_I1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392665: | -> AGGR_I2 EVENT_SA_REPLACE (aggr_inR1_outI2) Oct 31 15:24:04.392666: | -> AGGR_I2 EVENT_SA_REPLACE (aggr_inR1_outI2) Oct 31 15:24:04.392668: | AGGR_R1: category: open IKE SA; flags: 0: Oct 31 15:24:04.392669: | -> AGGR_R2 EVENT_SA_REPLACE (aggr_inI2) Oct 31 15:24:04.392670: | -> AGGR_R2 EVENT_SA_REPLACE (aggr_inI2) Oct 31 15:24:04.392672: | AGGR_I2: category: established IKE SA; flags: 0: Oct 31 15:24:04.392673: | -> AGGR_I2 EVENT_NULL (unexpected) Oct 31 15:24:04.392675: | AGGR_R2: category: established IKE SA; flags: 0: Oct 31 15:24:04.392676: | -> AGGR_R2 EVENT_NULL (unexpected) Oct 31 15:24:04.392678: | QUICK_R0: category: established CHILD SA; flags: 0: Oct 31 15:24:04.392679: | -> QUICK_R1 EVENT_RETRANSMIT (quick_inI1_outR1) Oct 31 15:24:04.392681: | QUICK_I1: category: established CHILD SA; flags: 0: Oct 31 15:24:04.392682: | -> QUICK_I2 EVENT_SA_REPLACE (quick_inR1_outI2) Oct 31 15:24:04.392683: | QUICK_R1: category: established CHILD SA; flags: 0: Oct 31 15:24:04.392685: | -> QUICK_R2 EVENT_SA_REPLACE (quick_inI2) Oct 31 15:24:04.392686: | QUICK_I2: category: established CHILD SA; flags: 0: Oct 31 15:24:04.392688: | -> QUICK_I2 EVENT_NULL (unexpected) Oct 31 15:24:04.392689: | QUICK_R2: category: established CHILD SA; flags: 0: Oct 31 15:24:04.392691: | -> QUICK_R2 EVENT_NULL (unexpected) Oct 31 15:24:04.392692: | INFO: category: informational; flags: 0: Oct 31 15:24:04.392694: | -> INFO EVENT_NULL (informational) Oct 31 15:24:04.392695: | INFO_PROTECTED: category: informational; flags: 0: Oct 31 15:24:04.392696: | -> INFO_PROTECTED EVENT_NULL (informational) Oct 31 15:24:04.392698: | XAUTH_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392699: | -> XAUTH_R1 EVENT_NULL (xauth_inR0) Oct 31 15:24:04.392701: | XAUTH_R1: category: established IKE SA; flags: 0: Oct 31 15:24:04.392702: | -> MAIN_R3 EVENT_SA_REPLACE (xauth_inR1) Oct 31 15:24:04.392704: | MODE_CFG_R0: category: informational; flags: 0: Oct 31 15:24:04.392705: | -> MODE_CFG_R1 EVENT_SA_REPLACE (modecfg_inR0) Oct 31 15:24:04.392707: | MODE_CFG_R1: category: established IKE SA; flags: 0: Oct 31 15:24:04.392708: | -> MODE_CFG_R2 EVENT_SA_REPLACE (modecfg_inR1) Oct 31 15:24:04.392710: | MODE_CFG_R2: category: established IKE SA; flags: 0: Oct 31 15:24:04.392711: | -> MODE_CFG_R2 EVENT_NULL (unexpected) Oct 31 15:24:04.392713: | MODE_CFG_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.392714: | -> MAIN_I4 EVENT_SA_REPLACE (modecfg_inR1) Oct 31 15:24:04.392715: | XAUTH_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392717: | -> XAUTH_I1 EVENT_RETRANSMIT (xauth_inI0) Oct 31 15:24:04.392720: | XAUTH_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.392721: | -> MAIN_I4 EVENT_RETRANSMIT (xauth_inI1) Oct 31 15:24:04.392725: | checking IKEv2 state table Oct 31 15:24:04.392731: | V2_REKEY_IKE_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392732: | -> V2_REKEY_IKE_I1 EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Oct 31 15:24:04.392735: | V2_REKEY_CHILD_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392737: | -> V2_REKEY_CHILD_I1 EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Oct 31 15:24:04.392739: | V2_NEW_CHILD_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392740: | -> V2_NEW_CHILD_I1 EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Oct 31 15:24:04.392742: | PARENT_I0: category: ignore; flags: 0: Oct 31 15:24:04.392743: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Oct 31 15:24:04.392745: | PARENT_I1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392746: | -> PARENT_I0 EVENT_SO_DISCARD (received anti-DDOS COOKIE notify response; resending IKE_SA_INIT request with cookie payload added) Oct 31 15:24:04.392751: | -> PARENT_I0 EVENT_SO_DISCARD (received IKE_SA_INIT INVALID_KE_PAYLOAD notify response; resending IKE_SA_INIT with new KE payload) Oct 31 15:24:04.392753: | -> IKESA_DEL EVENT_v2_REDIRECT (received REDIRECT notify response; resending IKE_SA_INIT request to new destination) Oct 31 15:24:04.392754: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH or IKE_INTERMEDIATE) Oct 31 15:24:04.392756: | PARENT_I2: category: open IKE SA; flags: 0: Oct 31 15:24:04.392757: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_INTERMEDIATE reply, initiate IKE_AUTH or IKE_INTERMEDIATE) Oct 31 15:24:04.392759: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Oct 31 15:24:04.392760: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Oct 31 15:24:04.392762: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Oct 31 15:24:04.392763: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Oct 31 15:24:04.392765: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Oct 31 15:24:04.392766: | PARENT_R0: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392768: | -> PARENT_R1 EVENT_SO_DISCARD send-response (Respond to IKE_SA_INIT) Oct 31 15:24:04.392769: | PARENT_R1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.392771: | -> PARENT_R1 EVENT_SA_REPLACE send-response (Responder: process IKE_AUTH request (no SKEYSEED)) Oct 31 15:24:04.392772: | -> PARENT_R1 EVENT_SA_REPLACE send-response (Responder: process IKE_INTERMEDIATE request (no SKEYSEED)) Oct 31 15:24:04.392774: | -> PARENT_R1 EVENT_SA_REPLACE send-response (Responder: process IKE_INTERMEDIATE request (with SKEYSEED)) Oct 31 15:24:04.392776: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE send-response (Responder: process IKE_AUTH request) Oct 31 15:24:04.392777: | V2_REKEY_IKE_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392779: | -> ESTABLISHED_IKE_SA EVENT_SA_REPLACE send-response (Respond to CREATE_CHILD_SA IKE Rekey) Oct 31 15:24:04.392780: | V2_REKEY_IKE_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.392782: | -> ESTABLISHED_IKE_SA EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Oct 31 15:24:04.392783: | V2_NEW_CHILD_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.392785: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Oct 31 15:24:04.392786: | V2_REKEY_CHILD_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392788: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE send-response (Respond to CREATE_CHILD_SA rekey CHILD SA request) Oct 31 15:24:04.392789: | V2_NEW_CHILD_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.392793: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE send-response (Respond to CREATE_CHILD_SA IPsec SA Request) Oct 31 15:24:04.392795: | ESTABLISHED_IKE_SA: category: established IKE SA; flags: 0: Oct 31 15:24:04.392796: | -> ESTABLISHED_IKE_SA EVENT_RETAIN send-response (Informational Request (liveness probe)) Oct 31 15:24:04.392797: | -> ESTABLISHED_IKE_SA EVENT_RETAIN (Informational Response (liveness probe)) Oct 31 15:24:04.392799: | -> ESTABLISHED_IKE_SA EVENT_RETAIN send-response (Informational Request) Oct 31 15:24:04.392800: | -> ESTABLISHED_IKE_SA EVENT_RETAIN (Informational Response) Oct 31 15:24:04.392802: | IKESA_DEL: category: established IKE SA; flags: 0: Oct 31 15:24:04.392803: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Oct 31 15:24:04.392805: | CHILDSA_DEL: category: informational; flags: 0: Oct 31 15:24:04.392806: | -> CHILDSA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Oct 31 15:24:04.392809: | global one-shot timer EVENT_REVIVE_CONNS initialized Oct 31 15:24:04.392811: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Oct 31 15:24:04.392812: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Oct 31 15:24:04.392991: Encryption algorithms: Oct 31 15:24:04.393001: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c Oct 31 15:24:04.393006: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b Oct 31 15:24:04.393010: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a Oct 31 15:24:04.393014: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des Oct 31 15:24:04.393018: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP Oct 31 15:24:04.393022: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia Oct 31 15:24:04.393027: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c Oct 31 15:24:04.393031: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b Oct 31 15:24:04.393035: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a Oct 31 15:24:04.393039: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr Oct 31 15:24:04.393044: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes Oct 31 15:24:04.393048: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac Oct 31 15:24:04.393052: NULL [] IKEv1: ESP IKEv2: ESP Oct 31 15:24:04.393056: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 Oct 31 15:24:04.393057: Hash algorithms: Oct 31 15:24:04.393060: MD5 IKEv1: IKE IKEv2: NSS Oct 31 15:24:04.393062: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha Oct 31 15:24:04.393064: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 Oct 31 15:24:04.393066: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 Oct 31 15:24:04.393068: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 Oct 31 15:24:04.393070: PRF algorithms: Oct 31 15:24:04.393072: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 Oct 31 15:24:04.393074: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 Oct 31 15:24:04.393077: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 Oct 31 15:24:04.393082: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 Oct 31 15:24:04.393084: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 Oct 31 15:24:04.393086: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc Oct 31 15:24:04.393088: Integrity algorithms: Oct 31 15:24:04.393090: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 Oct 31 15:24:04.393093: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 Oct 31 15:24:04.393096: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Oct 31 15:24:04.393099: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Oct 31 15:24:04.393102: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Oct 31 15:24:04.393104: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Oct 31 15:24:04.393106: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 Oct 31 15:24:04.393109: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Oct 31 15:24:04.393111: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Oct 31 15:24:04.393112: DH algorithms: Oct 31 15:24:04.393115: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 Oct 31 15:24:04.393117: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 Oct 31 15:24:04.393119: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 Oct 31 15:24:04.393121: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 Oct 31 15:24:04.393123: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 Oct 31 15:24:04.393125: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 Oct 31 15:24:04.393127: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 Oct 31 15:24:04.393129: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 Oct 31 15:24:04.393131: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 Oct 31 15:24:04.393134: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 Oct 31 15:24:04.393136: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 Oct 31 15:24:04.393137: testing CAMELLIA_CBC: Oct 31 15:24:04.393139: Camellia: 16 bytes with 128-bit key Oct 31 15:24:04.393192: Camellia: 16 bytes with 128-bit key Oct 31 15:24:04.393222: Camellia: 16 bytes with 256-bit key Oct 31 15:24:04.393245: Camellia: 16 bytes with 256-bit key Oct 31 15:24:04.393264: testing AES_GCM_16: Oct 31 15:24:04.393266: empty string Oct 31 15:24:04.393285: one block Oct 31 15:24:04.393317: two blocks Oct 31 15:24:04.393351: two blocks with associated data Oct 31 15:24:04.393381: testing AES_CTR: Oct 31 15:24:04.393386: Encrypting 16 octets using AES-CTR with 128-bit key Oct 31 15:24:04.393423: Encrypting 32 octets using AES-CTR with 128-bit key Oct 31 15:24:04.393444: Encrypting 36 octets using AES-CTR with 128-bit key Oct 31 15:24:04.393464: Encrypting 16 octets using AES-CTR with 192-bit key Oct 31 15:24:04.393505: Encrypting 32 octets using AES-CTR with 192-bit key Oct 31 15:24:04.393534: Encrypting 36 octets using AES-CTR with 192-bit key Oct 31 15:24:04.393554: Encrypting 16 octets using AES-CTR with 256-bit key Oct 31 15:24:04.393571: Encrypting 32 octets using AES-CTR with 256-bit key Oct 31 15:24:04.393590: Encrypting 36 octets using AES-CTR with 256-bit key Oct 31 15:24:04.393619: testing AES_CBC: Oct 31 15:24:04.393624: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Oct 31 15:24:04.393660: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Oct 31 15:24:04.393683: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Oct 31 15:24:04.393703: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Oct 31 15:24:04.393726: testing AES_XCBC: Oct 31 15:24:04.393728: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input Oct 31 15:24:04.393841: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input Oct 31 15:24:04.393991: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input Oct 31 15:24:04.394100: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input Oct 31 15:24:04.394177: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input Oct 31 15:24:04.394269: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input Oct 31 15:24:04.394400: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input Oct 31 15:24:04.394614: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Oct 31 15:24:04.394721: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Oct 31 15:24:04.394842: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Oct 31 15:24:04.395075: testing HMAC_MD5: Oct 31 15:24:04.395081: RFC 2104: MD5_HMAC test 1 Oct 31 15:24:04.395250: RFC 2104: MD5_HMAC test 2 Oct 31 15:24:04.395428: RFC 2104: MD5_HMAC test 3 Oct 31 15:24:04.395592: 8 CPU cores online Oct 31 15:24:04.395596: starting up 7 helper threads Oct 31 15:24:04.395627: started thread for helper 0 Oct 31 15:24:04.395636: | starting helper thread 1 Oct 31 15:24:04.395643: seccomp security disabled for crypto helper 1 Oct 31 15:24:04.395647: | status value returned by setting the priority of this helper thread 1: 22 Oct 31 15:24:04.395653: | helper thread 1 has nothing to do Oct 31 15:24:04.395657: started thread for helper 1 Oct 31 15:24:04.395667: | starting helper thread 2 Oct 31 15:24:04.395675: seccomp security disabled for crypto helper 2 Oct 31 15:24:04.395679: | status value returned by setting the priority of this helper thread 2: 22 Oct 31 15:24:04.395682: | helper thread 2 has nothing to do Oct 31 15:24:04.395685: started thread for helper 2 Oct 31 15:24:04.395709: started thread for helper 3 Oct 31 15:24:04.395714: | starting helper thread 4 Oct 31 15:24:04.395718: seccomp security disabled for crypto helper 4 Oct 31 15:24:04.395721: | status value returned by setting the priority of this helper thread 4: 22 Oct 31 15:24:04.395723: | helper thread 4 has nothing to do Oct 31 15:24:04.395734: started thread for helper 4 Oct 31 15:24:04.395738: | starting helper thread 5 Oct 31 15:24:04.395742: seccomp security disabled for crypto helper 5 Oct 31 15:24:04.395745: | status value returned by setting the priority of this helper thread 5: 22 Oct 31 15:24:04.395747: | helper thread 5 has nothing to do Oct 31 15:24:04.395761: started thread for helper 5 Oct 31 15:24:04.395765: | starting helper thread 6 Oct 31 15:24:04.395768: seccomp security disabled for crypto helper 6 Oct 31 15:24:04.395771: | status value returned by setting the priority of this helper thread 6: 22 Oct 31 15:24:04.395773: | helper thread 6 has nothing to do Oct 31 15:24:04.395782: started thread for helper 6 Oct 31 15:24:04.395789: | starting helper thread 7 Oct 31 15:24:04.395794: seccomp security disabled for crypto helper 7 Oct 31 15:24:04.395798: | status value returned by setting the priority of this helper thread 7: 22 Oct 31 15:24:04.395800: | helper thread 7 has nothing to do Oct 31 15:24:04.395815: Using Linux XFRM/NETKEY IPsec kernel support code on 5.8.15-201.fc32.x86_64 Oct 31 15:24:04.395865: | Hard-wiring algorithms Oct 31 15:24:04.395871: | adding AES_CCM_16 to kernel algorithm db Oct 31 15:24:04.395879: | adding AES_CCM_12 to kernel algorithm db Oct 31 15:24:04.395881: | adding AES_CCM_8 to kernel algorithm db Oct 31 15:24:04.395884: | adding 3DES_CBC to kernel algorithm db Oct 31 15:24:04.395886: | adding CAMELLIA_CBC to kernel algorithm db Oct 31 15:24:04.395893: | adding AES_GCM_16 to kernel algorithm db Oct 31 15:24:04.395897: | adding AES_GCM_12 to kernel algorithm db Oct 31 15:24:04.395901: | adding AES_GCM_8 to kernel algorithm db Oct 31 15:24:04.395886: | starting helper thread 3 Oct 31 15:24:04.395905: | adding AES_CTR to kernel algorithm db Oct 31 15:24:04.395913: seccomp security disabled for crypto helper 3 Oct 31 15:24:04.395917: | adding AES_CBC to kernel algorithm db Oct 31 15:24:04.395923: | status value returned by setting the priority of this helper thread 3: 22 Oct 31 15:24:04.395928: | helper thread 3 has nothing to do Oct 31 15:24:04.395925: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Oct 31 15:24:04.395935: | adding NULL to kernel algorithm db Oct 31 15:24:04.395937: | adding CHACHA20_POLY1305 to kernel algorithm db Oct 31 15:24:04.395939: | adding HMAC_MD5_96 to kernel algorithm db Oct 31 15:24:04.395940: | adding HMAC_SHA1_96 to kernel algorithm db Oct 31 15:24:04.395942: | adding HMAC_SHA2_512_256 to kernel algorithm db Oct 31 15:24:04.395943: | adding HMAC_SHA2_384_192 to kernel algorithm db Oct 31 15:24:04.395945: | adding HMAC_SHA2_256_128 to kernel algorithm db Oct 31 15:24:04.395947: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Oct 31 15:24:04.395948: | adding AES_XCBC_96 to kernel algorithm db Oct 31 15:24:04.395949: | adding AES_CMAC_96 to kernel algorithm db Oct 31 15:24:04.395952: | adding NONE to kernel algorithm db Oct 31 15:24:04.395985: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Oct 31 15:24:04.395993: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Oct 31 15:24:04.395996: | setup kernel fd callback Oct 31 15:24:04.396000: | add_fd_read_event_handler: newref KERNEL_XRM_FD-pe@0x56551f0d66f0 Oct 31 15:24:04.396003: | libevent_malloc: newref ptr-libevent@0x56551f0da660 size 128 Oct 31 15:24:04.396006: | libevent_malloc: newref ptr-libevent@0x56551f0d1540 size 16 Oct 31 15:24:04.396014: | add_fd_read_event_handler: newref KERNEL_ROUTE_FD-pe@0x56551f0d3220 Oct 31 15:24:04.396019: | libevent_malloc: newref ptr-libevent@0x56551f0db310 size 128 Oct 31 15:24:04.396022: | libevent_malloc: newref ptr-libevent@0x56551f0d1520 size 16 Oct 31 15:24:04.396321: | global one-shot timer EVENT_CHECK_CRLS initialized Oct 31 15:24:04.396355: SELinux support is enabled in PERMISSIVE mode. Oct 31 15:24:04.396547: | unbound context created - setting debug level to 5 Oct 31 15:24:04.396582: | /etc/hosts lookups activated Oct 31 15:24:04.396600: | /etc/resolv.conf usage activated Oct 31 15:24:04.396656: | outgoing-port-avoid set 0-65535 Oct 31 15:24:04.396684: | outgoing-port-permit set 32768-60999 Oct 31 15:24:04.396688: | loading dnssec root key from:/var/lib/unbound/root.key Oct 31 15:24:04.396692: | no additional dnssec trust anchors defined via dnssec-trusted= option Oct 31 15:24:04.396695: | Setting up events, loop start Oct 31 15:24:04.396698: | add_fd_read_event_handler: newref PLUTO_CTL_FD-pe@0x56551f0dd960 Oct 31 15:24:04.396701: | libevent_malloc: newref ptr-libevent@0x56551f0db3a0 size 128 Oct 31 15:24:04.396704: | libevent_malloc: newref ptr-libevent@0x56551f0dd9a0 size 16 Oct 31 15:24:04.396712: | libevent_realloc: newref ptr-libevent@0x56551f0dd9c0 size 256 Oct 31 15:24:04.396715: | libevent_malloc: newref ptr-libevent@0x56551f0ddad0 size 8 Oct 31 15:24:04.396718: | libevent_realloc: newref ptr-libevent@0x56551f0d0900 size 144 Oct 31 15:24:04.396720: | libevent_malloc: newref ptr-libevent@0x56551f0ddaf0 size 152 Oct 31 15:24:04.396725: | libevent_malloc: newref ptr-libevent@0x56551f0ddb90 size 16 Oct 31 15:24:04.396729: | signal event handler PLUTO_SIGCHLD installed Oct 31 15:24:04.396738: | libevent_malloc: newref ptr-libevent@0x56551f0ddbb0 size 8 Oct 31 15:24:04.396741: | libevent_malloc: newref ptr-libevent@0x56551f0ddbd0 size 152 Oct 31 15:24:04.396744: | signal event handler PLUTO_SIGTERM installed Oct 31 15:24:04.396747: | libevent_malloc: newref ptr-libevent@0x56551f0ddc70 size 8 Oct 31 15:24:04.396749: | libevent_malloc: newref ptr-libevent@0x56551f0ddc90 size 152 Oct 31 15:24:04.396752: | signal event handler PLUTO_SIGHUP installed Oct 31 15:24:04.396754: | libevent_malloc: newref ptr-libevent@0x56551f0ddd30 size 8 Oct 31 15:24:04.396759: | libevent_realloc: delref ptr-libevent@0x56551f0d0900 Oct 31 15:24:04.396763: | libevent_realloc: newref ptr-libevent@0x56551f0ddd50 size 256 Oct 31 15:24:04.396766: | libevent_malloc: newref ptr-libevent@0x56551f0d0900 size 152 Oct 31 15:24:04.396769: | signal event handler PLUTO_SIGSYS installed Oct 31 15:24:04.397147: | created addconn helper (pid:2083610) using fork+execve Oct 31 15:24:04.397164: | forked child 2083610 Oct 31 15:24:04.397176: seccomp security disabled Oct 31 15:24:04.401274: | newref struct fd@0x56551f0dded0(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.401287: | fd_accept: new fd-fd@0x56551f0dded0 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.401308: | whack: listen Oct 31 15:24:04.401313: listening for IKE messages Oct 31 15:24:04.401517: | Inspecting interface lo Oct 31 15:24:04.401526: | found lo with address 127.0.0.1 Oct 31 15:24:04.401532: | Inspecting interface eth0 Oct 31 15:24:04.401537: | found eth0 with address 192.0.2.254 Oct 31 15:24:04.401542: | Inspecting interface eth1 Oct 31 15:24:04.401552: | found eth1 with address 192.1.2.23 Oct 31 15:24:04.401565: | newref struct iface_dev@0x56551f0de330(0->1) (in add_iface_dev() at iface.c:67) Oct 31 15:24:04.401715: Kernel supports NIC esp-hw-offload Oct 31 15:24:04.401873: | iface: marking eth1 add Oct 31 15:24:04.401880: | newref struct iface_dev@0x56551f0de400(0->1) (in add_iface_dev() at iface.c:67) Oct 31 15:24:04.401884: | iface: marking eth0 add Oct 31 15:24:04.401886: | newref struct iface_dev@0x56551f0de490(0->1) (in add_iface_dev() at iface.c:67) Oct 31 15:24:04.401888: | iface: marking lo add Oct 31 15:24:04.401943: | no interfaces to sort Oct 31 15:24:04.401958: | MSG_ERRQUEUE enabled on fd 18 Oct 31 15:24:04.401979: | addref ifd@0x56551f0de330(1->2) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.401987: adding UDP interface eth1 192.1.2.23:500 Oct 31 15:24:04.402006: | MSG_ERRQUEUE enabled on fd 19 Oct 31 15:24:04.402013: | NAT-Traversal: Trying sockopt style NAT-T Oct 31 15:24:04.402017: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Oct 31 15:24:04.402020: | addref ifd@0x56551f0de330(2->3) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.402025: adding UDP interface eth1 192.1.2.23:4500 Oct 31 15:24:04.402042: | MSG_ERRQUEUE enabled on fd 20 Oct 31 15:24:04.402052: | addref ifd@0x56551f0de400(1->2) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.402056: adding UDP interface eth0 192.0.2.254:500 Oct 31 15:24:04.402069: | MSG_ERRQUEUE enabled on fd 21 Oct 31 15:24:04.402075: | NAT-Traversal: Trying sockopt style NAT-T Oct 31 15:24:04.402078: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Oct 31 15:24:04.402080: | addref ifd@0x56551f0de400(2->3) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.402082: adding UDP interface eth0 192.0.2.254:4500 Oct 31 15:24:04.402091: | MSG_ERRQUEUE enabled on fd 22 Oct 31 15:24:04.402098: | addref ifd@0x56551f0de490(1->2) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.402100: adding UDP interface lo 127.0.0.1:500 Oct 31 15:24:04.402109: | MSG_ERRQUEUE enabled on fd 23 Oct 31 15:24:04.402114: | NAT-Traversal: Trying sockopt style NAT-T Oct 31 15:24:04.402117: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Oct 31 15:24:04.402119: | addref ifd@0x56551f0de490(2->3) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.402121: adding UDP interface lo 127.0.0.1:4500 Oct 31 15:24:04.402128: | updating interfaces - listing interfaces that are going down Oct 31 15:24:04.402130: | updating interfaces - checking orientation Oct 31 15:24:04.402132: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Oct 31 15:24:04.402147: | libevent_malloc: newref ptr-libevent@0x56551f0decc0 size 128 Oct 31 15:24:04.402151: | libevent_malloc: newref ptr-libevent@0x56551f0de900 size 16 Oct 31 15:24:04.402157: | setup callback for interface lo 127.0.0.1:4500 fd 23 on UDP Oct 31 15:24:04.402159: | libevent_malloc: newref ptr-libevent@0x56551f0ded50 size 128 Oct 31 15:24:04.402160: | libevent_malloc: newref ptr-libevent@0x56551f0dede0 size 16 Oct 31 15:24:04.402163: | setup callback for interface lo 127.0.0.1:500 fd 22 on UDP Oct 31 15:24:04.402165: | libevent_malloc: newref ptr-libevent@0x56551f0dee00 size 128 Oct 31 15:24:04.402166: | libevent_malloc: newref ptr-libevent@0x56551f0dee90 size 16 Oct 31 15:24:04.402169: | setup callback for interface eth0 192.0.2.254:4500 fd 21 on UDP Oct 31 15:24:04.402171: | libevent_malloc: newref ptr-libevent@0x56551f0deeb0 size 128 Oct 31 15:24:04.402172: | libevent_malloc: newref ptr-libevent@0x56551f0def40 size 16 Oct 31 15:24:04.402175: | setup callback for interface eth0 192.0.2.254:500 fd 20 on UDP Oct 31 15:24:04.402177: | libevent_malloc: newref ptr-libevent@0x56551f0def60 size 128 Oct 31 15:24:04.402178: | libevent_malloc: newref ptr-libevent@0x56551f0deff0 size 16 Oct 31 15:24:04.402181: | setup callback for interface eth1 192.1.2.23:4500 fd 19 on UDP Oct 31 15:24:04.402183: | libevent_malloc: newref ptr-libevent@0x56551f0df010 size 128 Oct 31 15:24:04.402184: | libevent_malloc: newref ptr-libevent@0x56551f0df0a0 size 16 Oct 31 15:24:04.402187: | setup callback for interface eth1 192.1.2.23:500 fd 18 on UDP Oct 31 15:24:04.403710: | no stale xfrmi interface 'ipsec1' found Oct 31 15:24:04.403725: | certs and keys locked by 'free_preshared_secrets' Oct 31 15:24:04.403728: | certs and keys unlocked by 'free_preshared_secrets' Oct 31 15:24:04.403757: loading secrets from "/etc/ipsec.secrets" Oct 31 15:24:04.403774: | processing PSK at line 1: passed Oct 31 15:24:04.403777: | certs and keys locked by 'process_secret' Oct 31 15:24:04.403781: | certs and keys unlocked by 'process_secret' Oct 31 15:24:04.403787: | old food groups: Oct 31 15:24:04.403789: | new food groups: Oct 31 15:24:04.403796: | delref fd@0x56551f0dded0(1->0) (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.403804: | freeref fd-fd@0x56551f0dded0 (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.403810: | spent 1.06 (2.55) milliseconds in whack Oct 31 15:24:04.404250: | processing signal PLUTO_SIGCHLD Oct 31 15:24:04.404266: | waitpid returned pid 2083610 (exited with status 0) Oct 31 15:24:04.404270: | reaped addconn helper child (status 0) Oct 31 15:24:04.404275: | waitpid returned ECHILD (no child processes left) Oct 31 15:24:04.404280: | spent 0.0172 (0.017) milliseconds in signal handler PLUTO_SIGCHLD Oct 31 15:24:04.415644: | newref struct fd@0x56551f0ddef0(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.415657: | fd_accept: new fd-fd@0x56551f0ddef0 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.415667: | whack: options (impair|debug) Oct 31 15:24:04.415671: | old debugging base+cpu-usage + none Oct 31 15:24:04.415673: | new debugging = base+cpu-usage Oct 31 15:24:04.415677: | delref fd@0x56551f0ddef0(1->0) (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.415684: | freeref fd-fd@0x56551f0ddef0 (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.415690: | spent 0.0546 (0.0542) milliseconds in whack Oct 31 15:24:04.503979: | newref struct fd@0x56551f0ddf10(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.503992: | fd_accept: new fd-fd@0x56551f0ddf10 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.504007: | whack: delete 'test' Oct 31 15:24:04.504011: | FOR_EACH_CONNECTION_... in conn_by_name Oct 31 15:24:04.504013: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Oct 31 15:24:04.504019: | FOR_EACH_CONNECTION_... in conn_by_name Oct 31 15:24:04.504022: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Oct 31 15:24:04.504025: | whack: connection 'test' Oct 31 15:24:04.504029: | addref fd@0x56551f0ddf10(1->2) (in string_logger() at log.c:838) Oct 31 15:24:04.504035: | newref string logger@0x56551f0d1910(0->1) (in add_connection() at connections.c:1998) Oct 31 15:24:04.504039: | Connection DB: adding connection "test" $1 Oct 31 15:24:04.504045: | FOR_EACH_CONNECTION_... in conn_by_name Oct 31 15:24:04.504055: | added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO Oct 31 15:24:04.504058: | from whack: got --esp=aes256-sha1,aes-sha1 Oct 31 15:24:04.504089: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96 Oct 31 15:24:04.504097: | counting wild cards for 192.1.2.23 is 0 Oct 31 15:24:04.504102: | counting wild cards for 192.1.2.45 is 0 Oct 31 15:24:04.504106: | updating connection from left.host_addr Oct 31 15:24:04.504109: | right host_nexthop 192.1.2.23 Oct 31 15:24:04.504111: | left host_port 500 Oct 31 15:24:04.504113: | updating connection from right.host_addr Oct 31 15:24:04.504117: | left host_nexthop 192.1.2.45 Oct 31 15:24:04.504119: | right host_port 500 Oct 31 15:24:04.504123: | orienting test Oct 31 15:24:04.504129: | test doesn't match 127.0.0.1:4500 at all Oct 31 15:24:04.504133: | test doesn't match 127.0.0.1:500 at all Oct 31 15:24:04.504136: | test doesn't match 192.0.2.254:4500 at all Oct 31 15:24:04.504140: | test doesn't match 192.0.2.254:500 at all Oct 31 15:24:04.504143: | test doesn't match 192.1.2.23:4500 at all Oct 31 15:24:04.504146: | oriented test's this Oct 31 15:24:04.504152: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Oct 31 15:24:04.504158: | newref hp@0x56551f0de0a0(0->1) (in connect_to_host_pair() at hostpair.c:290) Oct 31 15:24:04.504161: added IKEv1 connection "test" Oct 31 15:24:04.504171: | ike_life: 3600; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO Oct 31 15:24:04.504182: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29 Oct 31 15:24:04.504185: | delref logger@0x56551f0d1910(1->0) (in add_connection() at connections.c:2026) Oct 31 15:24:04.504188: | delref fd@0x56551f0ddf10(2->1) (in free_logger() at log.c:853) Oct 31 15:24:04.504190: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:04.504194: | delref fd@0x56551f0ddf10(1->0) (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.504219: | freeref fd-fd@0x56551f0ddf10 (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.504231: | spent 0.256 (0.261) milliseconds in whack Oct 31 15:24:05.452180: | spent 0.00256 (0.00252) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.452219: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.452225: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.452230: | *received 92 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.452232: | 21 0c dd ba 19 9f ee 31 00 00 00 00 00 00 00 00 Oct 31 15:24:05.452234: | 01 10 02 00 00 00 00 00 00 00 00 5c 00 00 00 40 Oct 31 15:24:05.452235: | 00 00 00 01 00 00 00 01 00 00 00 34 01 01 00 02 Oct 31 15:24:05.452236: | 03 00 00 1c 01 01 00 00 80 01 00 07 80 0e 00 80 Oct 31 15:24:05.452238: | 80 02 00 01 80 03 00 01 80 04 00 04 00 00 00 10 Oct 31 15:24:05.452239: | 02 01 00 00 80 03 00 01 80 04 00 04 Oct 31 15:24:05.452245: | **parse ISAKMP Message: Oct 31 15:24:05.452248: | initiator SPI: 21 0c dd ba 19 9f ee 31 Oct 31 15:24:05.452250: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.452252: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.452254: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.452256: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.452265: | flags: none (0x0) Oct 31 15:24:05.452268: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.452270: | length: 92 (00 00 00 5c) Oct 31 15:24:05.452272: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.452279: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.452281: | #null state always idle Oct 31 15:24:05.452284: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.452286: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.452288: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452290: | length: 64 (00 40) Oct 31 15:24:05.452291: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.452293: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.452295: | in statetime_start() with no state Oct 31 15:24:05.452298: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.452308: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.452312: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.452315: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.452318: | find_next_host_connection returns "test" Oct 31 15:24:05.452320: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.452323: | find_next_host_connection returns Oct 31 15:24:05.452367: | newref alloc logger@0x56551f0d1960(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.452370: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.452372: | creating state object #1 at 0x56551f0dfcc0 Oct 31 15:24:05.452373: | State DB: adding IKEv1 state #1 in UNDEFINED Oct 31 15:24:05.452382: | pstats #1 ikev1.isakmp started Oct 31 15:24:05.452385: | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.452390: | start processing: state #1 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.452393: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.452395: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.452397: | ICOOKIE-DUMP: Oct 31 15:24:05.452398: | 21 0c dd ba 19 9f ee 31 Oct 31 15:24:05.452401: "test" #1: responding to Main Mode Oct 31 15:24:05.452423: | opening output PBS reply packet Oct 31 15:24:05.452425: | **emit ISAKMP Message: Oct 31 15:24:05.452428: | initiator SPI: 21 0c dd ba 19 9f ee 31 Oct 31 15:24:05.452430: | responder SPI: 2e 49 8d f4 da 8a b3 c0 Oct 31 15:24:05.452432: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452433: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.452435: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.452436: | flags: none (0x0) Oct 31 15:24:05.452438: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.452440: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.452442: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.452444: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452445: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.452447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.452448: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.452454: | ****parse IPsec DOI SIT: Oct 31 15:24:05.452456: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.452457: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.452459: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452461: | length: 52 (00 34) Oct 31 15:24:05.452462: | proposal number: 1 (01) Oct 31 15:24:05.452464: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.452465: | SPI size: 0 (00) Oct 31 15:24:05.452467: | number of transforms: 2 (02) Oct 31 15:24:05.452471: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.452472: | next payload type: ISAKMP_NEXT_T (0x3) Oct 31 15:24:05.452474: | length: 28 (00 1c) Oct 31 15:24:05.452476: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.452477: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.452479: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452481: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.452483: | length/value: 7 (00 07) Oct 31 15:24:05.452485: | [7 is OAKLEY_AES_CBC] Oct 31 15:24:05.452487: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452489: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Oct 31 15:24:05.452491: | length/value: 128 (00 80) Oct 31 15:24:05.452492: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452494: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.452495: | length/value: 1 (00 01) Oct 31 15:24:05.452497: | [1 is OAKLEY_MD5] Oct 31 15:24:05.452499: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452500: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Oct 31 15:24:05.452502: | length/value: 1 (00 01) Oct 31 15:24:05.452503: | [1 is OAKLEY_PRESHARED_KEY] Oct 31 15:24:05.452507: | lsw_get_secret() using IDs for 192.1.2.23->192.1.2.45 of kind PKK_PSK Oct 31 15:24:05.452510: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Oct 31 15:24:05.452513: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Oct 31 15:24:05.452515: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Oct 31 15:24:05.452517: | line 1: match=002 Oct 31 15:24:05.452518: | match 002 beats previous best_match 000 match=0x56551f0e0980 (line=1) Oct 31 15:24:05.452520: | concluding with best_match=002 best=0x56551f0e0980 (lineno=1) Oct 31 15:24:05.452522: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452523: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Oct 31 15:24:05.452525: | length/value: 4 (00 04) Oct 31 15:24:05.452526: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Oct 31 15:24:05.452529: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Oct 31 15:24:05.452531: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.452532: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452534: | length: 16 (00 10) Oct 31 15:24:05.452535: | ISAKMP transform number: 2 (02) Oct 31 15:24:05.452537: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.452538: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452540: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Oct 31 15:24:05.452541: | length/value: 1 (00 01) Oct 31 15:24:05.452543: | [1 is OAKLEY_PRESHARED_KEY] Oct 31 15:24:05.452545: | lsw_get_secret() using IDs for 192.1.2.23->192.1.2.45 of kind PKK_PSK Oct 31 15:24:05.452547: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Oct 31 15:24:05.452550: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Oct 31 15:24:05.452552: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Oct 31 15:24:05.452554: | line 1: match=002 Oct 31 15:24:05.452555: | match 002 beats previous best_match 000 match=0x56551f0e0980 (line=1) Oct 31 15:24:05.452557: | concluding with best_match=002 best=0x56551f0e0980 (lineno=1) Oct 31 15:24:05.452558: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.452559: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Oct 31 15:24:05.452561: | length/value: 4 (00 04) Oct 31 15:24:05.452563: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Oct 31 15:24:05.452564: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Oct 31 15:24:05.452566: "test" #1: no acceptable Oakley Transform Oct 31 15:24:05.452568: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.452570: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.452572: | #1 is idle Oct 31 15:24:05.452666: "test" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.452673: | opening output PBS notification msg Oct 31 15:24:05.452674: | **emit ISAKMP Message: Oct 31 15:24:05.452677: | initiator SPI: 21 0c dd ba 19 9f ee 31 Oct 31 15:24:05.452679: | responder SPI: 2e 49 8d f4 da 8a b3 c0 Oct 31 15:24:05.452681: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452682: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.452684: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.452685: | flags: none (0x0) Oct 31 15:24:05.452687: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.452689: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.452691: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.452692: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.452694: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.452696: | protocol ID: 1 (01) Oct 31 15:24:05.452697: | SPI size: 0 (00) Oct 31 15:24:05.452699: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.452701: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.452702: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.452704: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.452706: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.452712: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #1) Oct 31 15:24:05.452713: | 21 0c dd ba 19 9f ee 31 2e 49 8d f4 da 8a b3 c0 Oct 31 15:24:05.452715: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.452716: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.452740: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.452744: | stop processing: state #1 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.452747: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.452749: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.452750: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.452752: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.452762: | spent 0.573 (0.596) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.588338: | spent 0.00275 (0.00272) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.588364: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.588369: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.588377: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.588381: | 6e 45 a3 73 93 b8 13 05 00 00 00 00 00 00 00 00 Oct 31 15:24:05.588383: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:05.588385: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:05.588387: | 00 00 00 18 01 01 00 00 80 01 00 1a 80 02 00 15 Oct 31 15:24:05.588389: | 80 03 00 11 80 04 00 19 Oct 31 15:24:05.588395: | **parse ISAKMP Message: Oct 31 15:24:05.588401: | initiator SPI: 6e 45 a3 73 93 b8 13 05 Oct 31 15:24:05.588404: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.588408: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.588411: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.588413: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.588416: | flags: none (0x0) Oct 31 15:24:05.588420: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.588424: | length: 72 (00 00 00 48) Oct 31 15:24:05.588427: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.588431: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.588434: | #null state always idle Oct 31 15:24:05.588445: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.588450: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.588453: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588457: | length: 44 (00 2c) Oct 31 15:24:05.588459: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.588462: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.588466: | in statetime_start() with no state Oct 31 15:24:05.588472: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.588479: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.588482: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.588485: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.588488: | find_next_host_connection returns "test" Oct 31 15:24:05.588491: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.588493: | find_next_host_connection returns Oct 31 15:24:05.588524: | newref alloc logger@0x56551f0d18c0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.588529: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.588532: | creating state object #2 at 0x56551f0e22f0 Oct 31 15:24:05.588534: | State DB: adding IKEv1 state #2 in UNDEFINED Oct 31 15:24:05.588544: | pstats #2 ikev1.isakmp started Oct 31 15:24:05.588550: | #2 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.588557: | start processing: state #2 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.588560: | parent state #2: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.588564: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.588566: | ICOOKIE-DUMP: Oct 31 15:24:05.588568: | 6e 45 a3 73 93 b8 13 05 Oct 31 15:24:05.588572: "test" #2: responding to Main Mode Oct 31 15:24:05.588577: | opening output PBS reply packet Oct 31 15:24:05.588579: | **emit ISAKMP Message: Oct 31 15:24:05.588583: | initiator SPI: 6e 45 a3 73 93 b8 13 05 Oct 31 15:24:05.588587: | responder SPI: 89 24 71 84 45 f4 4f 6d Oct 31 15:24:05.588590: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588592: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.588595: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.588597: | flags: none (0x0) Oct 31 15:24:05.588601: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.588604: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.588607: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.588609: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588612: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.588615: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.588617: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.588621: | ****parse IPsec DOI SIT: Oct 31 15:24:05.588623: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.588625: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.588627: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588630: | length: 32 (00 20) Oct 31 15:24:05.588633: | proposal number: 1 (01) Oct 31 15:24:05.588635: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.588637: | SPI size: 0 (00) Oct 31 15:24:05.588639: | number of transforms: 1 (01) Oct 31 15:24:05.588641: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.588643: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588646: | length: 24 (00 18) Oct 31 15:24:05.588648: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.588651: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.588654: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.588660: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.588663: | length/value: 26 (00 1a) Oct 31 15:24:05.588666: | [26 is OAKLEY_CAMELLIA_CCM_B] Oct 31 15:24:05.588670: "test" #2: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.588673: "test" #2: no acceptable Oakley Transform Oct 31 15:24:05.588676: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.588680: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.588682: | #2 is idle Oct 31 15:24:05.588735: "test" #2: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.588741: | opening output PBS notification msg Oct 31 15:24:05.588744: | **emit ISAKMP Message: Oct 31 15:24:05.588750: | initiator SPI: 6e 45 a3 73 93 b8 13 05 Oct 31 15:24:05.588756: | responder SPI: 89 24 71 84 45 f4 4f 6d Oct 31 15:24:05.588759: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588761: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.588764: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.588767: | flags: none (0x0) Oct 31 15:24:05.588770: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.588773: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.588776: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.588779: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.588781: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.588784: | protocol ID: 1 (01) Oct 31 15:24:05.588787: | SPI size: 0 (00) Oct 31 15:24:05.588790: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.588792: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.588795: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.588798: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.588801: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.588808: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #2) Oct 31 15:24:05.588811: | 6e 45 a3 73 93 b8 13 05 89 24 71 84 45 f4 4f 6d Oct 31 15:24:05.588814: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.588816: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.588854: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.588861: | stop processing: state #2 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.588865: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.588868: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.588871: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.588873: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.588883: | spent 0.537 (0.554) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.619971: | spent 0 (0.00262) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.620000: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.620005: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.620013: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.620016: | 74 01 5d 35 76 d2 6a a1 00 00 00 00 00 00 00 00 Oct 31 15:24:05.620019: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.620021: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.620024: | 00 00 00 14 01 01 00 00 80 02 00 15 80 03 00 11 Oct 31 15:24:05.620026: | 80 04 00 19 Oct 31 15:24:05.620032: | **parse ISAKMP Message: Oct 31 15:24:05.620040: | initiator SPI: 74 01 5d 35 76 d2 6a a1 Oct 31 15:24:05.620051: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.620054: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.620057: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.620060: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.620062: | flags: none (0x0) Oct 31 15:24:05.620067: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.620070: | length: 68 (00 00 00 44) Oct 31 15:24:05.620073: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.620077: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.620080: | #null state always idle Oct 31 15:24:05.620084: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.620088: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.620091: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620094: | length: 40 (00 28) Oct 31 15:24:05.620099: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.620104: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.620107: | in statetime_start() with no state Oct 31 15:24:05.620113: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.620119: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.620122: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.620125: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.620128: | find_next_host_connection returns "test" Oct 31 15:24:05.620130: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.620132: | find_next_host_connection returns Oct 31 15:24:05.620166: | newref alloc logger@0x56551f0d1870(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.620170: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.620173: | creating state object #3 at 0x56551f0e2f70 Oct 31 15:24:05.620176: | State DB: adding IKEv1 state #3 in UNDEFINED Oct 31 15:24:05.620183: | pstats #3 ikev1.isakmp started Oct 31 15:24:05.620187: | #3 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.620194: | start processing: state #3 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.620210: | parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.620216: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.620219: | ICOOKIE-DUMP: Oct 31 15:24:05.620221: | 74 01 5d 35 76 d2 6a a1 Oct 31 15:24:05.620225: "test" #3: responding to Main Mode Oct 31 15:24:05.620230: | opening output PBS reply packet Oct 31 15:24:05.620232: | **emit ISAKMP Message: Oct 31 15:24:05.620237: | initiator SPI: 74 01 5d 35 76 d2 6a a1 Oct 31 15:24:05.620240: | responder SPI: 6d c5 f1 50 9f 0a ea 9e Oct 31 15:24:05.620243: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620245: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.620248: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.620250: | flags: none (0x0) Oct 31 15:24:05.620254: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.620256: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.620259: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.620262: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620264: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.620267: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.620269: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.620272: | ****parse IPsec DOI SIT: Oct 31 15:24:05.620275: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.620278: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.620285: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620289: | length: 28 (00 1c) Oct 31 15:24:05.620291: | proposal number: 1 (01) Oct 31 15:24:05.620294: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.620296: | SPI size: 0 (00) Oct 31 15:24:05.620299: | number of transforms: 1 (01) Oct 31 15:24:05.620302: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.620304: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620307: | length: 20 (00 14) Oct 31 15:24:05.620310: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.620312: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.620315: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.620317: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.620320: | length/value: 21 (00 15) Oct 31 15:24:05.620325: "test" #3: 21?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:05.620328: "test" #3: no acceptable Oakley Transform Oct 31 15:24:05.620331: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.620336: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.620339: | #3 is idle Oct 31 15:24:05.620402: "test" #3: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.620406: | opening output PBS notification msg Oct 31 15:24:05.620408: | **emit ISAKMP Message: Oct 31 15:24:05.620412: | initiator SPI: 74 01 5d 35 76 d2 6a a1 Oct 31 15:24:05.620416: | responder SPI: 6d c5 f1 50 9f 0a ea 9e Oct 31 15:24:05.620418: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620421: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.620423: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.620425: | flags: none (0x0) Oct 31 15:24:05.620429: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.620431: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.620434: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.620437: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.620439: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.620441: | protocol ID: 1 (01) Oct 31 15:24:05.620444: | SPI size: 0 (00) Oct 31 15:24:05.620446: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.620449: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.620452: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.620454: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.620457: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.620463: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #3) Oct 31 15:24:05.620466: | 74 01 5d 35 76 d2 6a a1 6d c5 f1 50 9f 0a ea 9e Oct 31 15:24:05.620468: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.620470: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.620494: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.620500: | stop processing: state #3 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.620503: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.620506: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.620508: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.620510: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.620515: | spent 0.531 (0.555) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.646927: | spent 0 (0.00252) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.646949: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.646956: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.646963: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.646965: | 50 ba 8c 45 5c 4b 20 dd 00 00 00 00 00 00 00 00 Oct 31 15:24:05.646968: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.646970: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.646972: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 03 00 11 Oct 31 15:24:05.646974: | 80 04 00 19 Oct 31 15:24:05.646979: | **parse ISAKMP Message: Oct 31 15:24:05.646983: | initiator SPI: 50 ba 8c 45 5c 4b 20 dd Oct 31 15:24:05.646988: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.646991: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.646993: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.646996: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.646998: | flags: none (0x0) Oct 31 15:24:05.647002: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.647005: | length: 68 (00 00 00 44) Oct 31 15:24:05.647008: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.647012: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.647015: | #null state always idle Oct 31 15:24:05.647019: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.647022: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.647024: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647027: | length: 40 (00 28) Oct 31 15:24:05.647030: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.647032: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.647035: | in statetime_start() with no state Oct 31 15:24:05.647040: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.647045: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.647048: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.647051: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.647053: | find_next_host_connection returns "test" Oct 31 15:24:05.647055: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.647057: | find_next_host_connection returns Oct 31 15:24:05.647084: | newref alloc logger@0x56551f0d0b40(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.647088: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.647090: | creating state object #4 at 0x56551f0e3bf0 Oct 31 15:24:05.647093: | State DB: adding IKEv1 state #4 in UNDEFINED Oct 31 15:24:05.647100: | pstats #4 ikev1.isakmp started Oct 31 15:24:05.647105: | #4 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.647111: | start processing: state #4 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.647115: | parent state #4: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.647118: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.647120: | ICOOKIE-DUMP: Oct 31 15:24:05.647122: | 50 ba 8c 45 5c 4b 20 dd Oct 31 15:24:05.647126: "test" #4: responding to Main Mode Oct 31 15:24:05.647130: | opening output PBS reply packet Oct 31 15:24:05.647133: | **emit ISAKMP Message: Oct 31 15:24:05.647137: | initiator SPI: 50 ba 8c 45 5c 4b 20 dd Oct 31 15:24:05.647141: | responder SPI: b0 e5 25 8e e1 17 1a 8d Oct 31 15:24:05.647143: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647146: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.647148: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.647150: | flags: none (0x0) Oct 31 15:24:05.647153: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.647157: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.647162: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.647164: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647166: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.647169: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.647171: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.647175: | ****parse IPsec DOI SIT: Oct 31 15:24:05.647177: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.647180: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.647182: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647185: | length: 28 (00 1c) Oct 31 15:24:05.647188: | proposal number: 1 (01) Oct 31 15:24:05.647190: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.647192: | SPI size: 0 (00) Oct 31 15:24:05.647195: | number of transforms: 1 (01) Oct 31 15:24:05.647202: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.647207: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647210: | length: 20 (00 14) Oct 31 15:24:05.647212: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.647214: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.647217: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.647220: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.647222: | length/value: 26 (00 1a) Oct 31 15:24:05.647225: | [26 is OAKLEY_CAMELLIA_CCM_B] Oct 31 15:24:05.647230: "test" #4: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.647233: "test" #4: no acceptable Oakley Transform Oct 31 15:24:05.647235: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.647240: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.647243: | #4 is idle Oct 31 15:24:05.647558: "test" #4: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.647564: | opening output PBS notification msg Oct 31 15:24:05.647567: | **emit ISAKMP Message: Oct 31 15:24:05.647571: | initiator SPI: 50 ba 8c 45 5c 4b 20 dd Oct 31 15:24:05.647575: | responder SPI: b0 e5 25 8e e1 17 1a 8d Oct 31 15:24:05.647577: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647580: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.647582: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.647584: | flags: none (0x0) Oct 31 15:24:05.647588: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.647590: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.647593: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.647595: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.647598: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.647600: | protocol ID: 1 (01) Oct 31 15:24:05.647603: | SPI size: 0 (00) Oct 31 15:24:05.647605: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.647608: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.647610: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.647613: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.647615: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.647622: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #4) Oct 31 15:24:05.647624: | 50 ba 8c 45 5c 4b 20 dd b0 e5 25 8e e1 17 1a 8d Oct 31 15:24:05.647627: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.647628: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.647658: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.647664: | stop processing: state #4 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.647670: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.647672: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.647675: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.647677: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.647683: | spent 0.484 (0.765) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.658240: | spent 0.00406 (0.00405) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.658261: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.658265: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.658273: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.658276: | fa ae 68 2d c6 6a 81 86 00 00 00 00 00 00 00 00 Oct 31 15:24:05.658278: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.658279: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.658281: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 15 Oct 31 15:24:05.658283: | 80 04 00 19 Oct 31 15:24:05.658288: | **parse ISAKMP Message: Oct 31 15:24:05.658292: | initiator SPI: fa ae 68 2d c6 6a 81 86 Oct 31 15:24:05.658295: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.658298: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.658301: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.658303: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.658305: | flags: none (0x0) Oct 31 15:24:05.658308: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.658311: | length: 68 (00 00 00 44) Oct 31 15:24:05.658313: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.658317: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.658320: | #null state always idle Oct 31 15:24:05.658323: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.658326: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.658328: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658331: | length: 40 (00 28) Oct 31 15:24:05.658333: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.658335: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.658338: | in statetime_start() with no state Oct 31 15:24:05.658343: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.658348: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.658355: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.658358: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.658361: | find_next_host_connection returns "test" Oct 31 15:24:05.658363: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.658364: | find_next_host_connection returns Oct 31 15:24:05.658397: | newref alloc logger@0x56551f0df160(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.658401: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.658403: | creating state object #5 at 0x56551f0e4870 Oct 31 15:24:05.658406: | State DB: adding IKEv1 state #5 in UNDEFINED Oct 31 15:24:05.658413: | pstats #5 ikev1.isakmp started Oct 31 15:24:05.658417: | #5 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.658424: | start processing: state #5 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.658428: | parent state #5: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.658431: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.658433: | ICOOKIE-DUMP: Oct 31 15:24:05.658435: | fa ae 68 2d c6 6a 81 86 Oct 31 15:24:05.658442: "test" #5: responding to Main Mode Oct 31 15:24:05.658447: | opening output PBS reply packet Oct 31 15:24:05.658450: | **emit ISAKMP Message: Oct 31 15:24:05.658454: | initiator SPI: fa ae 68 2d c6 6a 81 86 Oct 31 15:24:05.658458: | responder SPI: bb cd 33 42 e5 da 33 be Oct 31 15:24:05.658460: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658462: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.658464: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.658467: | flags: none (0x0) Oct 31 15:24:05.658471: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.658474: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.658477: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.658479: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658481: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.658484: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.658487: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.658490: | ****parse IPsec DOI SIT: Oct 31 15:24:05.658493: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.658496: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.658498: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658500: | length: 28 (00 1c) Oct 31 15:24:05.658503: | proposal number: 1 (01) Oct 31 15:24:05.658505: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.658507: | SPI size: 0 (00) Oct 31 15:24:05.658510: | number of transforms: 1 (01) Oct 31 15:24:05.658513: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.658515: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658517: | length: 20 (00 14) Oct 31 15:24:05.658520: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.658522: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.658524: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.658527: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.658530: | length/value: 26 (00 1a) Oct 31 15:24:05.658533: | [26 is OAKLEY_CAMELLIA_CCM_B] Oct 31 15:24:05.658538: "test" #5: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.658540: "test" #5: no acceptable Oakley Transform Oct 31 15:24:05.658543: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.658548: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.658550: | #5 is idle Oct 31 15:24:05.658601: "test" #5: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.658606: | opening output PBS notification msg Oct 31 15:24:05.658608: | **emit ISAKMP Message: Oct 31 15:24:05.658612: | initiator SPI: fa ae 68 2d c6 6a 81 86 Oct 31 15:24:05.658615: | responder SPI: bb cd 33 42 e5 da 33 be Oct 31 15:24:05.658618: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658620: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.658622: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.658624: | flags: none (0x0) Oct 31 15:24:05.658628: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.658631: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.658634: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.658636: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.658638: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.658641: | protocol ID: 1 (01) Oct 31 15:24:05.658644: | SPI size: 0 (00) Oct 31 15:24:05.658646: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.658649: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.658651: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.658656: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.658659: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.658667: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #5) Oct 31 15:24:05.658669: | fa ae 68 2d c6 6a 81 86 bb cd 33 42 e5 da 33 be Oct 31 15:24:05.658672: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.658674: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.658710: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.658716: | stop processing: state #5 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.658720: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.658722: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.658725: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.658727: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.658733: | spent 0.482 (0.504) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.670662: | spent 0.00263 (0.00258) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.670688: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.670694: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.670702: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.670705: | bb 0d 50 ef 91 a0 54 2a 00 00 00 00 00 00 00 00 Oct 31 15:24:05.670708: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.670710: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.670712: | 00 00 00 14 01 01 00 00 80 01 00 1a 80 02 00 15 Oct 31 15:24:05.670714: | 80 03 00 11 Oct 31 15:24:05.670719: | **parse ISAKMP Message: Oct 31 15:24:05.670725: | initiator SPI: bb 0d 50 ef 91 a0 54 2a Oct 31 15:24:05.670729: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.670732: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.670735: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.670738: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.670741: | flags: none (0x0) Oct 31 15:24:05.670744: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.670748: | length: 68 (00 00 00 44) Oct 31 15:24:05.670751: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.670756: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.670759: | #null state always idle Oct 31 15:24:05.670763: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.670766: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.670769: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.670772: | length: 40 (00 28) Oct 31 15:24:05.670775: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.670778: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.670781: | in statetime_start() with no state Oct 31 15:24:05.670788: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.670794: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.670797: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.670800: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.670803: | find_next_host_connection returns "test" Oct 31 15:24:05.670806: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.670808: | find_next_host_connection returns Oct 31 15:24:05.670842: | newref alloc logger@0x56551f0df1b0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.670847: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.670854: | creating state object #6 at 0x56551f0e54f0 Oct 31 15:24:05.670857: | State DB: adding IKEv1 state #6 in UNDEFINED Oct 31 15:24:05.670865: | pstats #6 ikev1.isakmp started Oct 31 15:24:05.670871: | #6 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.670879: | start processing: state #6 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.670883: | parent state #6: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.670886: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.670888: | ICOOKIE-DUMP: Oct 31 15:24:05.670891: | bb 0d 50 ef 91 a0 54 2a Oct 31 15:24:05.670894: "test" #6: responding to Main Mode Oct 31 15:24:05.670900: | opening output PBS reply packet Oct 31 15:24:05.670903: | **emit ISAKMP Message: Oct 31 15:24:05.670908: | initiator SPI: bb 0d 50 ef 91 a0 54 2a Oct 31 15:24:05.670911: | responder SPI: de 46 8e 40 a0 12 06 e8 Oct 31 15:24:05.670914: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.670916: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.670919: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.670921: | flags: none (0x0) Oct 31 15:24:05.670925: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.670928: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.670931: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.670934: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.670936: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.670939: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.670942: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.670945: | ****parse IPsec DOI SIT: Oct 31 15:24:05.670947: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.670950: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.670953: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.670955: | length: 28 (00 1c) Oct 31 15:24:05.670958: | proposal number: 1 (01) Oct 31 15:24:05.670961: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.670964: | SPI size: 0 (00) Oct 31 15:24:05.670966: | number of transforms: 1 (01) Oct 31 15:24:05.670969: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.670972: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.670975: | length: 20 (00 14) Oct 31 15:24:05.670977: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.670979: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.670982: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.670985: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.670988: | length/value: 26 (00 1a) Oct 31 15:24:05.670991: | [26 is OAKLEY_CAMELLIA_CCM_B] Oct 31 15:24:05.670995: "test" #6: OAKLEY_CAMELLIA_CCM_B is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.670998: "test" #6: no acceptable Oakley Transform Oct 31 15:24:05.671001: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.671006: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.671009: | #6 is idle Oct 31 15:24:05.671073: "test" #6: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.671078: | opening output PBS notification msg Oct 31 15:24:05.671080: | **emit ISAKMP Message: Oct 31 15:24:05.671085: | initiator SPI: bb 0d 50 ef 91 a0 54 2a Oct 31 15:24:05.671089: | responder SPI: de 46 8e 40 a0 12 06 e8 Oct 31 15:24:05.671091: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.671094: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.671096: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.671098: | flags: none (0x0) Oct 31 15:24:05.671104: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.671107: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.671110: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.671112: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.671114: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.671117: | protocol ID: 1 (01) Oct 31 15:24:05.671120: | SPI size: 0 (00) Oct 31 15:24:05.671122: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.671125: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.671127: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.671130: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.671133: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.671139: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #6) Oct 31 15:24:05.671142: | bb 0d 50 ef 91 a0 54 2a de 46 8e 40 a0 12 06 e8 Oct 31 15:24:05.671144: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.671146: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.671175: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.671182: | stop processing: state #6 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.671185: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.671188: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.671191: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.671193: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.671203: | spent 0.529 (0.547) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.682998: | spent 0.00281 (0.0028) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.683024: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.683031: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.683039: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.683042: | 0d 56 58 b1 b4 06 55 82 00 00 00 00 00 00 00 00 Oct 31 15:24:05.683044: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:05.683047: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:05.683049: | 00 00 00 18 01 01 00 00 80 01 00 17 80 02 00 0e Oct 31 15:24:05.683051: | 80 03 00 1f 80 04 00 12 Oct 31 15:24:05.683057: | **parse ISAKMP Message: Oct 31 15:24:05.683063: | initiator SPI: 0d 56 58 b1 b4 06 55 82 Oct 31 15:24:05.683067: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.683070: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.683073: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.683076: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.683079: | flags: none (0x0) Oct 31 15:24:05.683083: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.683086: | length: 72 (00 00 00 48) Oct 31 15:24:05.683089: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.683093: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.683096: | #null state always idle Oct 31 15:24:05.683099: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.683102: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.683105: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683108: | length: 44 (00 2c) Oct 31 15:24:05.683110: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.683113: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.683116: | in statetime_start() with no state Oct 31 15:24:05.683122: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.683131: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.683134: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.683138: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.683140: | find_next_host_connection returns "test" Oct 31 15:24:05.683142: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.683144: | find_next_host_connection returns Oct 31 15:24:05.683173: | newref alloc logger@0x56551f0df200(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.683178: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.683181: | creating state object #7 at 0x56551f0e6170 Oct 31 15:24:05.683183: | State DB: adding IKEv1 state #7 in UNDEFINED Oct 31 15:24:05.683191: | pstats #7 ikev1.isakmp started Oct 31 15:24:05.683197: | #7 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.683243: | start processing: state #7 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.683247: | parent state #7: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.683250: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.683253: | ICOOKIE-DUMP: Oct 31 15:24:05.683255: | 0d 56 58 b1 b4 06 55 82 Oct 31 15:24:05.683258: "test" #7: responding to Main Mode Oct 31 15:24:05.683264: | opening output PBS reply packet Oct 31 15:24:05.683267: | **emit ISAKMP Message: Oct 31 15:24:05.683270: | initiator SPI: 0d 56 58 b1 b4 06 55 82 Oct 31 15:24:05.683273: | responder SPI: 47 72 ff ef 37 1c 7c 7e Oct 31 15:24:05.683276: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683278: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.683281: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.683283: | flags: none (0x0) Oct 31 15:24:05.683287: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.683290: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.683293: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.683295: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683298: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.683301: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.683304: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.683308: | ****parse IPsec DOI SIT: Oct 31 15:24:05.683310: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.683313: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.683316: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683318: | length: 32 (00 20) Oct 31 15:24:05.683321: | proposal number: 1 (01) Oct 31 15:24:05.683323: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.683326: | SPI size: 0 (00) Oct 31 15:24:05.683329: | number of transforms: 1 (01) Oct 31 15:24:05.683332: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.683334: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683337: | length: 24 (00 18) Oct 31 15:24:05.683340: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.683342: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.683345: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.683348: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.683351: | length/value: 23 (00 17) Oct 31 15:24:05.683353: | [23 is UNUSED_23] Oct 31 15:24:05.683358: "test" #7: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.683361: "test" #7: no acceptable Oakley Transform Oct 31 15:24:05.683364: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.683369: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.683374: | #7 is idle Oct 31 15:24:05.683441: "test" #7: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.683447: | opening output PBS notification msg Oct 31 15:24:05.683450: | **emit ISAKMP Message: Oct 31 15:24:05.683454: | initiator SPI: 0d 56 58 b1 b4 06 55 82 Oct 31 15:24:05.683459: | responder SPI: 47 72 ff ef 37 1c 7c 7e Oct 31 15:24:05.683461: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683464: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.683466: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.683469: | flags: none (0x0) Oct 31 15:24:05.683473: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.683476: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.683479: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.683481: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.683484: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.683487: | protocol ID: 1 (01) Oct 31 15:24:05.683490: | SPI size: 0 (00) Oct 31 15:24:05.683492: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.683495: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.683497: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.683500: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.683503: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.683511: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #7) Oct 31 15:24:05.683514: | 0d 56 58 b1 b4 06 55 82 47 72 ff ef 37 1c 7c 7e Oct 31 15:24:05.683516: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.683519: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.683547: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.683554: | stop processing: state #7 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.683559: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.683562: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.683564: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.683566: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.683573: | spent 0.534 (0.585) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.695444: | spent 0 (0.00254) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.695469: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.695472: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.695490: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.695492: | f1 b5 87 05 12 bd 66 b1 00 00 00 00 00 00 00 00 Oct 31 15:24:05.695493: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.695495: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.695509: | 00 00 00 14 01 01 00 00 80 02 00 0e 80 03 00 1f Oct 31 15:24:05.695511: | 80 04 00 12 Oct 31 15:24:05.695514: | **parse ISAKMP Message: Oct 31 15:24:05.695518: | initiator SPI: f1 b5 87 05 12 bd 66 b1 Oct 31 15:24:05.695520: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.695522: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.695524: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.695526: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.695529: | flags: none (0x0) Oct 31 15:24:05.695532: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.695535: | length: 68 (00 00 00 44) Oct 31 15:24:05.695538: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.695546: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.695549: | #null state always idle Oct 31 15:24:05.695552: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.695556: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.695558: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695561: | length: 40 (00 28) Oct 31 15:24:05.695563: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.695565: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.695568: | in statetime_start() with no state Oct 31 15:24:05.695574: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.695579: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.695583: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.695586: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.695589: | find_next_host_connection returns "test" Oct 31 15:24:05.695591: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.695594: | find_next_host_connection returns Oct 31 15:24:05.695624: | newref alloc logger@0x56551f0df250(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.695628: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.695631: | creating state object #8 at 0x56551f0e6df0 Oct 31 15:24:05.695633: | State DB: adding IKEv1 state #8 in UNDEFINED Oct 31 15:24:05.695639: | pstats #8 ikev1.isakmp started Oct 31 15:24:05.695644: | #8 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.695650: | start processing: state #8 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.695654: | parent state #8: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.695657: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.695659: | ICOOKIE-DUMP: Oct 31 15:24:05.695662: | f1 b5 87 05 12 bd 66 b1 Oct 31 15:24:05.695665: "test" #8: responding to Main Mode Oct 31 15:24:05.695670: | opening output PBS reply packet Oct 31 15:24:05.695673: | **emit ISAKMP Message: Oct 31 15:24:05.695677: | initiator SPI: f1 b5 87 05 12 bd 66 b1 Oct 31 15:24:05.695681: | responder SPI: d2 74 df f9 96 1f 96 cb Oct 31 15:24:05.695683: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695686: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.695688: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.695690: | flags: none (0x0) Oct 31 15:24:05.695694: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.695697: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.695700: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.695702: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695705: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.695708: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.695710: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.695714: | ****parse IPsec DOI SIT: Oct 31 15:24:05.695717: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.695720: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.695722: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695725: | length: 28 (00 1c) Oct 31 15:24:05.695728: | proposal number: 1 (01) Oct 31 15:24:05.695730: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.695733: | SPI size: 0 (00) Oct 31 15:24:05.695736: | number of transforms: 1 (01) Oct 31 15:24:05.695738: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.695741: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695744: | length: 20 (00 14) Oct 31 15:24:05.695749: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.695752: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.695755: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.695758: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.695761: | length/value: 14 (00 0e) Oct 31 15:24:05.695766: "test" #8: 14?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:05.695769: "test" #8: no acceptable Oakley Transform Oct 31 15:24:05.695772: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.695777: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.695779: | #8 is idle Oct 31 15:24:05.695851: "test" #8: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.695859: | opening output PBS notification msg Oct 31 15:24:05.695862: | **emit ISAKMP Message: Oct 31 15:24:05.695867: | initiator SPI: f1 b5 87 05 12 bd 66 b1 Oct 31 15:24:05.695871: | responder SPI: d2 74 df f9 96 1f 96 cb Oct 31 15:24:05.695874: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695877: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.695880: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.695882: | flags: none (0x0) Oct 31 15:24:05.695886: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.695889: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.695892: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.695895: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.695898: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.695900: | protocol ID: 1 (01) Oct 31 15:24:05.695903: | SPI size: 0 (00) Oct 31 15:24:05.695906: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.695909: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.695911: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.695915: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.695917: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.695925: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #8) Oct 31 15:24:05.695927: | f1 b5 87 05 12 bd 66 b1 d2 74 df f9 96 1f 96 cb Oct 31 15:24:05.695929: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.695932: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.695963: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.695971: | stop processing: state #8 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.695975: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.695978: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.695981: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.695983: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.695989: | spent 0.523 (0.554) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.707979: | spent 0.00287 (0.00288) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.708004: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.708010: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.708019: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.708022: | 4b a3 32 eb 72 ff 91 8a 00 00 00 00 00 00 00 00 Oct 31 15:24:05.708025: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.708028: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.708030: | 00 00 00 14 01 01 00 00 80 01 00 17 80 03 00 1f Oct 31 15:24:05.708037: | 80 04 00 12 Oct 31 15:24:05.708043: | **parse ISAKMP Message: Oct 31 15:24:05.708049: | initiator SPI: 4b a3 32 eb 72 ff 91 8a Oct 31 15:24:05.708053: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.708057: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.708060: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.708063: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.708066: | flags: none (0x0) Oct 31 15:24:05.708071: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.708075: | length: 68 (00 00 00 44) Oct 31 15:24:05.708079: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.708084: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.708087: | #null state always idle Oct 31 15:24:05.708090: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.708094: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.708097: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708101: | length: 40 (00 28) Oct 31 15:24:05.708103: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.708106: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.708109: | in statetime_start() with no state Oct 31 15:24:05.708116: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.708122: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.708126: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.708129: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.708132: | find_next_host_connection returns "test" Oct 31 15:24:05.708134: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.708137: | find_next_host_connection returns Oct 31 15:24:05.708171: | newref alloc logger@0x56551f0df2a0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.708176: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.708178: | creating state object #9 at 0x56551f0e7a70 Oct 31 15:24:05.708181: | State DB: adding IKEv1 state #9 in UNDEFINED Oct 31 15:24:05.708187: | pstats #9 ikev1.isakmp started Oct 31 15:24:05.708192: | #9 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.708251: | start processing: state #9 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.708258: | parent state #9: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.708262: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.708264: | ICOOKIE-DUMP: Oct 31 15:24:05.708266: | 4b a3 32 eb 72 ff 91 8a Oct 31 15:24:05.708270: "test" #9: responding to Main Mode Oct 31 15:24:05.708275: | opening output PBS reply packet Oct 31 15:24:05.708278: | **emit ISAKMP Message: Oct 31 15:24:05.708282: | initiator SPI: 4b a3 32 eb 72 ff 91 8a Oct 31 15:24:05.708286: | responder SPI: b8 c0 e4 cb e6 69 7f 01 Oct 31 15:24:05.708289: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708291: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.708294: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.708296: | flags: none (0x0) Oct 31 15:24:05.708299: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.708302: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.708306: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.708308: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708310: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.708313: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.708315: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.708319: | ****parse IPsec DOI SIT: Oct 31 15:24:05.708324: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.708327: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.708329: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708332: | length: 28 (00 1c) Oct 31 15:24:05.708335: | proposal number: 1 (01) Oct 31 15:24:05.708337: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.708340: | SPI size: 0 (00) Oct 31 15:24:05.708343: | number of transforms: 1 (01) Oct 31 15:24:05.708345: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.708347: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708350: | length: 20 (00 14) Oct 31 15:24:05.708353: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.708355: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.708358: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.708361: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.708364: | length/value: 23 (00 17) Oct 31 15:24:05.708367: | [23 is UNUSED_23] Oct 31 15:24:05.708371: "test" #9: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.708374: "test" #9: no acceptable Oakley Transform Oct 31 15:24:05.708377: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.708383: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.708386: | #9 is idle Oct 31 15:24:05.708455: "test" #9: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.708461: | opening output PBS notification msg Oct 31 15:24:05.708464: | **emit ISAKMP Message: Oct 31 15:24:05.708468: | initiator SPI: 4b a3 32 eb 72 ff 91 8a Oct 31 15:24:05.708472: | responder SPI: b8 c0 e4 cb e6 69 7f 01 Oct 31 15:24:05.708475: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708478: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.708480: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.708482: | flags: none (0x0) Oct 31 15:24:05.708486: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.708489: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.708492: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.708494: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.708496: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.708499: | protocol ID: 1 (01) Oct 31 15:24:05.708502: | SPI size: 0 (00) Oct 31 15:24:05.708505: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.708508: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.708510: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.708513: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.708516: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.708523: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #9) Oct 31 15:24:05.708526: | 4b a3 32 eb 72 ff 91 8a b8 c0 e4 cb e6 69 7f 01 Oct 31 15:24:05.708529: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.708535: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.708565: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.708640: | stop processing: state #9 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.708647: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.708651: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.708653: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.708656: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.708663: | spent 0.564 (0.694) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.724394: | spent 0 (0.00289) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.724421: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.724426: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.724432: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.724435: | 8c ac 4d 14 38 59 86 e4 00 00 00 00 00 00 00 00 Oct 31 15:24:05.724437: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.724439: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.724441: | 00 00 00 14 01 01 00 00 80 01 00 17 80 02 00 0e Oct 31 15:24:05.724443: | 80 04 00 12 Oct 31 15:24:05.724449: | **parse ISAKMP Message: Oct 31 15:24:05.724453: | initiator SPI: 8c ac 4d 14 38 59 86 e4 Oct 31 15:24:05.724531: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.724536: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.724539: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.724542: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.724545: | flags: none (0x0) Oct 31 15:24:05.724550: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.724557: | length: 68 (00 00 00 44) Oct 31 15:24:05.724560: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.724566: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.724569: | #null state always idle Oct 31 15:24:05.724574: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.724579: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.724582: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724585: | length: 40 (00 28) Oct 31 15:24:05.724588: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.724590: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.724593: | in statetime_start() with no state Oct 31 15:24:05.724598: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.724604: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.724607: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.724610: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.724612: | find_next_host_connection returns "test" Oct 31 15:24:05.724614: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.724616: | find_next_host_connection returns Oct 31 15:24:05.724645: | newref alloc logger@0x56551f0df2f0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.724651: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.724654: | creating state object #10 at 0x56551f0e86f0 Oct 31 15:24:05.724656: | State DB: adding IKEv1 state #10 in UNDEFINED Oct 31 15:24:05.724665: | pstats #10 ikev1.isakmp started Oct 31 15:24:05.724671: | #10 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.724678: | start processing: state #10 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.724682: | parent state #10: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.724689: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.724693: | ICOOKIE-DUMP: Oct 31 15:24:05.724695: | 8c ac 4d 14 38 59 86 e4 Oct 31 15:24:05.724699: "test" #10: responding to Main Mode Oct 31 15:24:05.724704: | opening output PBS reply packet Oct 31 15:24:05.724708: | **emit ISAKMP Message: Oct 31 15:24:05.724712: | initiator SPI: 8c ac 4d 14 38 59 86 e4 Oct 31 15:24:05.724716: | responder SPI: 9b ae 72 7c bf e4 3b b9 Oct 31 15:24:05.724719: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724721: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.724724: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.724726: | flags: none (0x0) Oct 31 15:24:05.724734: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.724738: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.724741: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.724744: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724746: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.724749: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.724752: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.724755: | ****parse IPsec DOI SIT: Oct 31 15:24:05.724758: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.724761: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.724763: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724766: | length: 28 (00 1c) Oct 31 15:24:05.724769: | proposal number: 1 (01) Oct 31 15:24:05.724771: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.724774: | SPI size: 0 (00) Oct 31 15:24:05.724776: | number of transforms: 1 (01) Oct 31 15:24:05.724779: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.724781: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724785: | length: 20 (00 14) Oct 31 15:24:05.724787: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.724790: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.724793: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.724795: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.724798: | length/value: 23 (00 17) Oct 31 15:24:05.724800: | [23 is UNUSED_23] Oct 31 15:24:05.724805: "test" #10: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.724808: "test" #10: no acceptable Oakley Transform Oct 31 15:24:05.724810: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.724816: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.724819: | #10 is idle Oct 31 15:24:05.724867: "test" #10: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.724872: | opening output PBS notification msg Oct 31 15:24:05.724874: | **emit ISAKMP Message: Oct 31 15:24:05.724878: | initiator SPI: 8c ac 4d 14 38 59 86 e4 Oct 31 15:24:05.724882: | responder SPI: 9b ae 72 7c bf e4 3b b9 Oct 31 15:24:05.724885: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724887: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.724890: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.724892: | flags: none (0x0) Oct 31 15:24:05.724896: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.724901: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.724905: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.724908: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.724911: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.724914: | protocol ID: 1 (01) Oct 31 15:24:05.724917: | SPI size: 0 (00) Oct 31 15:24:05.724920: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.724923: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.724925: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.724929: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.724931: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.724939: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #10) Oct 31 15:24:05.724946: | 8c ac 4d 14 38 59 86 e4 9b ae 72 7c bf e4 3b b9 Oct 31 15:24:05.724948: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.724951: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.724982: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.724989: | stop processing: state #10 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.724993: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.724996: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.724999: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.725001: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.725008: | spent 0.536 (0.623) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.743174: | spent 0.00285 (0.00282) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.743229: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.743237: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.743244: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.743247: | b2 a8 05 40 86 ea 44 95 00 00 00 00 00 00 00 00 Oct 31 15:24:05.743250: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.743252: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.743254: | 00 00 00 14 01 01 00 00 80 01 00 17 80 02 00 0e Oct 31 15:24:05.743257: | 80 03 00 1f Oct 31 15:24:05.743262: | **parse ISAKMP Message: Oct 31 15:24:05.743268: | initiator SPI: b2 a8 05 40 86 ea 44 95 Oct 31 15:24:05.743272: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.743275: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.743278: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.743281: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.743283: | flags: none (0x0) Oct 31 15:24:05.743287: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.743291: | length: 68 (00 00 00 44) Oct 31 15:24:05.743294: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.743298: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.743302: | #null state always idle Oct 31 15:24:05.743305: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.743309: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.743311: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743314: | length: 40 (00 28) Oct 31 15:24:05.743317: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.743320: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.743323: | in statetime_start() with no state Oct 31 15:24:05.743329: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.743335: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.743338: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.743342: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.743344: | find_next_host_connection returns "test" Oct 31 15:24:05.743347: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.743349: | find_next_host_connection returns Oct 31 15:24:05.743379: | newref alloc logger@0x56551f0df340(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.743383: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.743386: | creating state object #11 at 0x56551f0e9370 Oct 31 15:24:05.743388: | State DB: adding IKEv1 state #11 in UNDEFINED Oct 31 15:24:05.743395: | pstats #11 ikev1.isakmp started Oct 31 15:24:05.743400: | #11 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.743407: | start processing: state #11 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.743410: | parent state #11: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.743413: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.743420: | ICOOKIE-DUMP: Oct 31 15:24:05.743422: | b2 a8 05 40 86 ea 44 95 Oct 31 15:24:05.743425: "test" #11: responding to Main Mode Oct 31 15:24:05.743430: | opening output PBS reply packet Oct 31 15:24:05.743433: | **emit ISAKMP Message: Oct 31 15:24:05.743437: | initiator SPI: b2 a8 05 40 86 ea 44 95 Oct 31 15:24:05.743441: | responder SPI: 63 64 d6 bf e1 e7 7a cc Oct 31 15:24:05.743444: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743446: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.743448: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.743451: | flags: none (0x0) Oct 31 15:24:05.743454: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.743457: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.743461: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.743463: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743465: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.743468: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.743471: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.743474: | ****parse IPsec DOI SIT: Oct 31 15:24:05.743477: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.743480: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.743482: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743485: | length: 28 (00 1c) Oct 31 15:24:05.743488: | proposal number: 1 (01) Oct 31 15:24:05.743491: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.743493: | SPI size: 0 (00) Oct 31 15:24:05.743496: | number of transforms: 1 (01) Oct 31 15:24:05.743499: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.743501: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743504: | length: 20 (00 14) Oct 31 15:24:05.743507: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.743509: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.743512: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.743515: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.743518: | length/value: 23 (00 17) Oct 31 15:24:05.743520: | [23 is UNUSED_23] Oct 31 15:24:05.743525: "test" #11: UNUSED_23 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.743528: "test" #11: no acceptable Oakley Transform Oct 31 15:24:05.743530: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.743536: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.743538: | #11 is idle Oct 31 15:24:05.743656: "test" #11: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.743661: | opening output PBS notification msg Oct 31 15:24:05.743664: | **emit ISAKMP Message: Oct 31 15:24:05.743669: | initiator SPI: b2 a8 05 40 86 ea 44 95 Oct 31 15:24:05.743673: | responder SPI: 63 64 d6 bf e1 e7 7a cc Oct 31 15:24:05.743676: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743678: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.743681: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.743683: | flags: none (0x0) Oct 31 15:24:05.743688: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.743693: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.743696: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.743699: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.743701: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.743704: | protocol ID: 1 (01) Oct 31 15:24:05.743707: | SPI size: 0 (00) Oct 31 15:24:05.743709: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.743712: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.743717: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.743721: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.743723: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.743731: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #11) Oct 31 15:24:05.743734: | b2 a8 05 40 86 ea 44 95 63 64 d6 bf e1 e7 7a cc Oct 31 15:24:05.743736: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.743738: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.743772: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.743781: | stop processing: state #11 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.743785: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.743788: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.743791: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.743794: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.743800: | spent 0.541 (0.637) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.755072: | spent 0.00149 (0.00342) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.755097: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.755104: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.755114: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.755117: | 6b c9 f1 4e ff a7 77 c4 00 00 00 00 00 00 00 00 Oct 31 15:24:05.755119: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:05.755120: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:05.755121: | 00 00 00 18 01 01 00 00 80 01 00 1f 80 02 00 19 Oct 31 15:24:05.755123: | 80 03 00 02 80 04 00 10 Oct 31 15:24:05.755127: | **parse ISAKMP Message: Oct 31 15:24:05.755130: | initiator SPI: 6b c9 f1 4e ff a7 77 c4 Oct 31 15:24:05.755132: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.755134: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.755136: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.755138: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.755140: | flags: none (0x0) Oct 31 15:24:05.755142: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.755144: | length: 72 (00 00 00 48) Oct 31 15:24:05.755146: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.755149: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.755151: | #null state always idle Oct 31 15:24:05.755154: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.755156: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.755157: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755159: | length: 44 (00 2c) Oct 31 15:24:05.755161: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.755163: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.755164: | in statetime_start() with no state Oct 31 15:24:05.755168: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.755172: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.755174: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.755176: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.755178: | find_next_host_connection returns "test" Oct 31 15:24:05.755180: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.755181: | find_next_host_connection returns Oct 31 15:24:05.755223: | newref alloc logger@0x56551f0df390(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.755233: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.755236: | creating state object #12 at 0x56551f0e9ff0 Oct 31 15:24:05.755239: | State DB: adding IKEv1 state #12 in UNDEFINED Oct 31 15:24:05.755244: | pstats #12 ikev1.isakmp started Oct 31 15:24:05.755249: | #12 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.755256: | start processing: state #12 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.755260: | parent state #12: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.755264: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.755266: | ICOOKIE-DUMP: Oct 31 15:24:05.755269: | 6b c9 f1 4e ff a7 77 c4 Oct 31 15:24:05.755272: "test" #12: responding to Main Mode Oct 31 15:24:05.755278: | opening output PBS reply packet Oct 31 15:24:05.755281: | **emit ISAKMP Message: Oct 31 15:24:05.755285: | initiator SPI: 6b c9 f1 4e ff a7 77 c4 Oct 31 15:24:05.755289: | responder SPI: f5 8f 72 f1 5e b1 4d 2a Oct 31 15:24:05.755292: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755294: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.755296: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.755299: | flags: none (0x0) Oct 31 15:24:05.755302: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.755306: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.755309: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.755311: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755314: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.755316: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.755319: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.755322: | ****parse IPsec DOI SIT: Oct 31 15:24:05.755325: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.755328: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.755330: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755333: | length: 32 (00 20) Oct 31 15:24:05.755336: | proposal number: 1 (01) Oct 31 15:24:05.755339: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.755342: | SPI size: 0 (00) Oct 31 15:24:05.755345: | number of transforms: 1 (01) Oct 31 15:24:05.755348: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.755350: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755353: | length: 24 (00 18) Oct 31 15:24:05.755356: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.755358: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.755361: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.755364: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.755366: | length/value: 31 (00 1f) Oct 31 15:24:05.755371: "test" #12: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.755374: "test" #12: no acceptable Oakley Transform Oct 31 15:24:05.755377: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.755382: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.755386: | #12 is idle Oct 31 15:24:05.755440: "test" #12: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.755445: | opening output PBS notification msg Oct 31 15:24:05.755448: | **emit ISAKMP Message: Oct 31 15:24:05.755452: | initiator SPI: 6b c9 f1 4e ff a7 77 c4 Oct 31 15:24:05.755456: | responder SPI: f5 8f 72 f1 5e b1 4d 2a Oct 31 15:24:05.755459: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755462: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.755464: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.755469: | flags: none (0x0) Oct 31 15:24:05.755473: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.755476: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.755479: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.755482: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.755484: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.755487: | protocol ID: 1 (01) Oct 31 15:24:05.755490: | SPI size: 0 (00) Oct 31 15:24:05.755492: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.755494: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.755497: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.755499: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.755502: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.755509: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #12) Oct 31 15:24:05.755511: | 6b c9 f1 4e ff a7 77 c4 f5 8f 72 f1 5e b1 4d 2a Oct 31 15:24:05.755513: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.755516: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.755539: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.755545: | stop processing: state #12 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.755549: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.755552: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.755555: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.755557: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.755563: | spent 0.474 (0.501) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.772028: | spent 0 (0.0026) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.772054: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.772060: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.772068: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.772071: | 49 63 22 4f f5 51 e1 4f 00 00 00 00 00 00 00 00 Oct 31 15:24:05.772074: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.772076: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.772078: | 00 00 00 14 01 01 00 00 80 02 00 19 80 03 00 02 Oct 31 15:24:05.772081: | 80 04 00 10 Oct 31 15:24:05.772086: | **parse ISAKMP Message: Oct 31 15:24:05.772091: | initiator SPI: 49 63 22 4f f5 51 e1 4f Oct 31 15:24:05.772096: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.772100: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.772103: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.772105: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.772108: | flags: none (0x0) Oct 31 15:24:05.772112: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.772116: | length: 68 (00 00 00 44) Oct 31 15:24:05.772119: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.772123: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.772126: | #null state always idle Oct 31 15:24:05.772131: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.772135: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.772137: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772140: | length: 40 (00 28) Oct 31 15:24:05.772143: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.772146: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.772148: | in statetime_start() with no state Oct 31 15:24:05.772158: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.772164: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.772168: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.772172: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.772174: | find_next_host_connection returns "test" Oct 31 15:24:05.772177: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.772179: | find_next_host_connection returns Oct 31 15:24:05.772217: | newref alloc logger@0x56551f0df3e0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.772224: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.772227: | creating state object #13 at 0x56551f0eac70 Oct 31 15:24:05.772230: | State DB: adding IKEv1 state #13 in UNDEFINED Oct 31 15:24:05.772236: | pstats #13 ikev1.isakmp started Oct 31 15:24:05.772241: | #13 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.772249: | start processing: state #13 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.772255: | parent state #13: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.772259: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.772261: | ICOOKIE-DUMP: Oct 31 15:24:05.772263: | 49 63 22 4f f5 51 e1 4f Oct 31 15:24:05.772267: "test" #13: responding to Main Mode Oct 31 15:24:05.772272: | opening output PBS reply packet Oct 31 15:24:05.772275: | **emit ISAKMP Message: Oct 31 15:24:05.772279: | initiator SPI: 49 63 22 4f f5 51 e1 4f Oct 31 15:24:05.772284: | responder SPI: 01 71 88 03 82 68 1b f6 Oct 31 15:24:05.772286: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772288: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.772291: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.772293: | flags: none (0x0) Oct 31 15:24:05.772297: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.772300: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.772303: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.772305: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772308: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.772311: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.772314: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.772317: | ****parse IPsec DOI SIT: Oct 31 15:24:05.772320: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.772323: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.772325: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772328: | length: 28 (00 1c) Oct 31 15:24:05.772331: | proposal number: 1 (01) Oct 31 15:24:05.772333: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.772336: | SPI size: 0 (00) Oct 31 15:24:05.772338: | number of transforms: 1 (01) Oct 31 15:24:05.772341: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.772344: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772347: | length: 20 (00 14) Oct 31 15:24:05.772350: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.772352: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.772356: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.772358: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.772361: | length/value: 25 (00 19) Oct 31 15:24:05.772366: "test" #13: 25?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:05.772369: "test" #13: no acceptable Oakley Transform Oct 31 15:24:05.772371: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.772377: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.772381: | #13 is idle Oct 31 15:24:05.772545: "test" #13: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.772550: | opening output PBS notification msg Oct 31 15:24:05.772553: | **emit ISAKMP Message: Oct 31 15:24:05.772558: | initiator SPI: 49 63 22 4f f5 51 e1 4f Oct 31 15:24:05.772562: | responder SPI: 01 71 88 03 82 68 1b f6 Oct 31 15:24:05.772564: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772567: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.772569: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.772572: | flags: none (0x0) Oct 31 15:24:05.772575: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.772578: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.772582: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.772584: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.772586: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.772589: | protocol ID: 1 (01) Oct 31 15:24:05.772591: | SPI size: 0 (00) Oct 31 15:24:05.772593: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.772596: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.772598: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.772601: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.772604: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.772610: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #13) Oct 31 15:24:05.772612: | 49 63 22 4f f5 51 e1 4f 01 71 88 03 82 68 1b f6 Oct 31 15:24:05.772615: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.772617: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.772643: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.772651: | stop processing: state #13 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.772654: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.772657: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.772660: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.772662: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.772668: | spent 0.522 (0.651) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.793226: | spent 0 (0.00258) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.793256: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.793260: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.793268: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.793271: | 58 96 ad b4 58 e3 43 78 00 00 00 00 00 00 00 00 Oct 31 15:24:05.793273: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.793276: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.793278: | 00 00 00 14 01 01 00 00 80 01 00 1f 80 03 00 02 Oct 31 15:24:05.793280: | 80 04 00 10 Oct 31 15:24:05.793286: | **parse ISAKMP Message: Oct 31 15:24:05.793290: | initiator SPI: 58 96 ad b4 58 e3 43 78 Oct 31 15:24:05.793295: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.793298: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.793301: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.793304: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.793307: | flags: none (0x0) Oct 31 15:24:05.793311: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.793314: | length: 68 (00 00 00 44) Oct 31 15:24:05.793317: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.793326: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.793329: | #null state always idle Oct 31 15:24:05.793332: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.793336: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.793338: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793341: | length: 40 (00 28) Oct 31 15:24:05.793344: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.793347: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.793349: | in statetime_start() with no state Oct 31 15:24:05.793356: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.793362: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.793365: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.793368: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.793371: | find_next_host_connection returns "test" Oct 31 15:24:05.793373: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.793375: | find_next_host_connection returns Oct 31 15:24:05.793406: | newref alloc logger@0x56551f0df430(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.793409: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.793412: | creating state object #14 at 0x56551f0eb8f0 Oct 31 15:24:05.793414: | State DB: adding IKEv1 state #14 in UNDEFINED Oct 31 15:24:05.793420: | pstats #14 ikev1.isakmp started Oct 31 15:24:05.793425: | #14 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.793432: | start processing: state #14 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.793436: | parent state #14: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.793439: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.793441: | ICOOKIE-DUMP: Oct 31 15:24:05.793444: | 58 96 ad b4 58 e3 43 78 Oct 31 15:24:05.793447: "test" #14: responding to Main Mode Oct 31 15:24:05.793452: | opening output PBS reply packet Oct 31 15:24:05.793454: | **emit ISAKMP Message: Oct 31 15:24:05.793458: | initiator SPI: 58 96 ad b4 58 e3 43 78 Oct 31 15:24:05.793462: | responder SPI: 6a 97 41 af 30 7b 63 02 Oct 31 15:24:05.793465: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793467: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.793470: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.793472: | flags: none (0x0) Oct 31 15:24:05.793476: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.793479: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.793482: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.793484: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793487: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.793490: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.793492: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.793495: | ****parse IPsec DOI SIT: Oct 31 15:24:05.793498: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.793501: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.793503: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793506: | length: 28 (00 1c) Oct 31 15:24:05.793509: | proposal number: 1 (01) Oct 31 15:24:05.793511: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.793514: | SPI size: 0 (00) Oct 31 15:24:05.793517: | number of transforms: 1 (01) Oct 31 15:24:05.793520: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.793522: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793527: | length: 20 (00 14) Oct 31 15:24:05.793530: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.793533: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.793536: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.793538: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.793542: | length/value: 31 (00 1f) Oct 31 15:24:05.793547: "test" #14: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.793550: "test" #14: no acceptable Oakley Transform Oct 31 15:24:05.793553: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.793558: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.793561: | #14 is idle Oct 31 15:24:05.793875: "test" #14: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.793883: | opening output PBS notification msg Oct 31 15:24:05.793887: | **emit ISAKMP Message: Oct 31 15:24:05.793892: | initiator SPI: 58 96 ad b4 58 e3 43 78 Oct 31 15:24:05.793897: | responder SPI: 6a 97 41 af 30 7b 63 02 Oct 31 15:24:05.793900: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793902: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.793905: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.793908: | flags: none (0x0) Oct 31 15:24:05.793912: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.793915: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.793919: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.793921: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.793924: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.793927: | protocol ID: 1 (01) Oct 31 15:24:05.793930: | SPI size: 0 (00) Oct 31 15:24:05.793932: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.793936: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.793939: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.793942: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.793944: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.793952: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #14) Oct 31 15:24:05.793955: | 58 96 ad b4 58 e3 43 78 6a 97 41 af 30 7b 63 02 Oct 31 15:24:05.793958: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.793960: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.793994: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.794002: | stop processing: state #14 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.794006: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.794009: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.794012: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.794014: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.794021: | spent 0.534 (0.806) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.807563: | spent 0.00324 (0.00325) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.807591: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.807598: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.807606: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.807610: | 08 c3 b2 31 f9 0b cd 5d 00 00 00 00 00 00 00 00 Oct 31 15:24:05.807613: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.807615: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.807617: | 00 00 00 14 01 01 00 00 80 01 00 1f 80 02 00 19 Oct 31 15:24:05.807624: | 80 04 00 10 Oct 31 15:24:05.807630: | **parse ISAKMP Message: Oct 31 15:24:05.807635: | initiator SPI: 08 c3 b2 31 f9 0b cd 5d Oct 31 15:24:05.807640: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.807644: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.807647: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.807651: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.807653: | flags: none (0x0) Oct 31 15:24:05.807658: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.807662: | length: 68 (00 00 00 44) Oct 31 15:24:05.807666: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.807671: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.807674: | #null state always idle Oct 31 15:24:05.807678: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.807682: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.807685: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.807689: | length: 40 (00 28) Oct 31 15:24:05.807691: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.807695: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.807698: | in statetime_start() with no state Oct 31 15:24:05.807705: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.807712: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.807716: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.807719: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.807722: | find_next_host_connection returns "test" Oct 31 15:24:05.807725: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.807727: | find_next_host_connection returns Oct 31 15:24:05.807827: | newref alloc logger@0x56551f0ed1f0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.807833: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.807836: | creating state object #15 at 0x56551f0ec570 Oct 31 15:24:05.807839: | State DB: adding IKEv1 state #15 in UNDEFINED Oct 31 15:24:05.807844: | pstats #15 ikev1.isakmp started Oct 31 15:24:05.807850: | #15 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.807856: | start processing: state #15 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.807860: | parent state #15: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.807863: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.807866: | ICOOKIE-DUMP: Oct 31 15:24:05.807868: | 08 c3 b2 31 f9 0b cd 5d Oct 31 15:24:05.807871: "test" #15: responding to Main Mode Oct 31 15:24:05.807877: | opening output PBS reply packet Oct 31 15:24:05.807880: | **emit ISAKMP Message: Oct 31 15:24:05.807884: | initiator SPI: 08 c3 b2 31 f9 0b cd 5d Oct 31 15:24:05.807888: | responder SPI: f2 2b 90 5a 02 dd e2 06 Oct 31 15:24:05.807890: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.807893: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.807895: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.807898: | flags: none (0x0) Oct 31 15:24:05.807901: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.807904: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.807907: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.807909: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.807911: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.807914: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.807915: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.807920: | ****parse IPsec DOI SIT: Oct 31 15:24:05.807922: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.807923: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.807925: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.807927: | length: 28 (00 1c) Oct 31 15:24:05.807929: | proposal number: 1 (01) Oct 31 15:24:05.807930: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.807932: | SPI size: 0 (00) Oct 31 15:24:05.807934: | number of transforms: 1 (01) Oct 31 15:24:05.807935: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.807937: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.807939: | length: 20 (00 14) Oct 31 15:24:05.807940: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.807942: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.807944: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.807946: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.807948: | length/value: 31 (00 1f) Oct 31 15:24:05.807951: "test" #15: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.807953: "test" #15: no acceptable Oakley Transform Oct 31 15:24:05.807955: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.807958: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.807960: | #15 is idle Oct 31 15:24:05.808015: "test" #15: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.808021: | opening output PBS notification msg Oct 31 15:24:05.808024: | **emit ISAKMP Message: Oct 31 15:24:05.808028: | initiator SPI: 08 c3 b2 31 f9 0b cd 5d Oct 31 15:24:05.808032: | responder SPI: f2 2b 90 5a 02 dd e2 06 Oct 31 15:24:05.808035: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.808037: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.808039: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.808042: | flags: none (0x0) Oct 31 15:24:05.808045: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.808048: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.808051: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.808053: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.808056: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.808058: | protocol ID: 1 (01) Oct 31 15:24:05.808061: | SPI size: 0 (00) Oct 31 15:24:05.808063: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.808065: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.808068: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.808071: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.808074: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.808080: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #15) Oct 31 15:24:05.808083: | 08 c3 b2 31 f9 0b cd 5d f2 2b 90 5a 02 dd e2 06 Oct 31 15:24:05.808085: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.808088: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.808119: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.808126: | stop processing: state #15 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.808129: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.808132: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.808135: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.808138: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.808143: | spent 0.508 (0.591) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.819946: | spent 0.0024 (0.00239) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.819970: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.819975: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.819984: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.819987: | b8 1b 62 29 1f 25 f2 e5 00 00 00 00 00 00 00 00 Oct 31 15:24:05.819990: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.819992: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.819994: | 00 00 00 14 01 01 00 00 80 01 00 1f 80 02 00 19 Oct 31 15:24:05.819996: | 80 03 00 02 Oct 31 15:24:05.820002: | **parse ISAKMP Message: Oct 31 15:24:05.820007: | initiator SPI: b8 1b 62 29 1f 25 f2 e5 Oct 31 15:24:05.820011: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.820014: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.820017: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.820019: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.820023: | flags: none (0x0) Oct 31 15:24:05.820027: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.820031: | length: 68 (00 00 00 44) Oct 31 15:24:05.820035: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.820039: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.820041: | #null state always idle Oct 31 15:24:05.820044: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.820047: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.820048: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820050: | length: 40 (00 28) Oct 31 15:24:05.820052: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.820054: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.820056: | in statetime_start() with no state Oct 31 15:24:05.820059: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.820063: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.820065: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.820068: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.820069: | find_next_host_connection returns "test" Oct 31 15:24:05.820071: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.820078: | find_next_host_connection returns Oct 31 15:24:05.820106: | newref alloc logger@0x56551f0edec0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.820111: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.820114: | creating state object #16 at 0x56551f0ed240 Oct 31 15:24:05.820117: | State DB: adding IKEv1 state #16 in UNDEFINED Oct 31 15:24:05.820122: | pstats #16 ikev1.isakmp started Oct 31 15:24:05.820127: | #16 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.820135: | start processing: state #16 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.820140: | parent state #16: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.820445: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.820456: | ICOOKIE-DUMP: Oct 31 15:24:05.820459: | b8 1b 62 29 1f 25 f2 e5 Oct 31 15:24:05.820463: "test" #16: responding to Main Mode Oct 31 15:24:05.820469: | opening output PBS reply packet Oct 31 15:24:05.820472: | **emit ISAKMP Message: Oct 31 15:24:05.820477: | initiator SPI: b8 1b 62 29 1f 25 f2 e5 Oct 31 15:24:05.820481: | responder SPI: 05 9d 21 86 39 90 70 ac Oct 31 15:24:05.820484: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820487: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.820489: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.820492: | flags: none (0x0) Oct 31 15:24:05.820498: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.820502: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.820506: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.820509: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820512: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.820515: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.820517: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.820522: | ****parse IPsec DOI SIT: Oct 31 15:24:05.820525: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.820528: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.820530: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820532: | length: 28 (00 1c) Oct 31 15:24:05.820533: | proposal number: 1 (01) Oct 31 15:24:05.820535: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.820537: | SPI size: 0 (00) Oct 31 15:24:05.820538: | number of transforms: 1 (01) Oct 31 15:24:05.820540: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.820542: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820544: | length: 20 (00 14) Oct 31 15:24:05.820545: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.820547: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.820549: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.820550: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.820552: | length/value: 31 (00 1f) Oct 31 15:24:05.820556: "test" #16: 31?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.820558: "test" #16: no acceptable Oakley Transform Oct 31 15:24:05.820560: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.820563: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.820565: | #16 is idle Oct 31 15:24:05.820617: "test" #16: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.820621: | opening output PBS notification msg Oct 31 15:24:05.820622: | **emit ISAKMP Message: Oct 31 15:24:05.820625: | initiator SPI: b8 1b 62 29 1f 25 f2 e5 Oct 31 15:24:05.820627: | responder SPI: 05 9d 21 86 39 90 70 ac Oct 31 15:24:05.820629: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820630: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.820632: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.820634: | flags: none (0x0) Oct 31 15:24:05.820636: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.820637: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.820639: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.820641: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.820642: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.820644: | protocol ID: 1 (01) Oct 31 15:24:05.820646: | SPI size: 0 (00) Oct 31 15:24:05.820647: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.820649: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.820650: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.820652: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.820654: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.820659: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #16) Oct 31 15:24:05.820661: | b8 1b 62 29 1f 25 f2 e5 05 9d 21 86 39 90 70 ac Oct 31 15:24:05.820662: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.820664: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.820691: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.820700: | stop processing: state #16 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.820704: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.820707: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.820709: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.820711: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.820717: | spent 0.47 (0.781) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.836427: | spent 0.00289 (0.00328) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.836449: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.836453: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.836460: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.836463: | 55 7b 31 de 3a f6 31 cb 00 00 00 00 00 00 00 00 Oct 31 15:24:05.836466: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:05.836468: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:05.836470: | 00 00 00 18 01 01 00 00 80 01 00 0e 80 02 00 07 Oct 31 15:24:05.836472: | 80 03 00 18 80 04 00 18 Oct 31 15:24:05.836477: | **parse ISAKMP Message: Oct 31 15:24:05.836482: | initiator SPI: 55 7b 31 de 3a f6 31 cb Oct 31 15:24:05.836486: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.836489: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.836492: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.836495: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.836497: | flags: none (0x0) Oct 31 15:24:05.836501: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.836505: | length: 72 (00 00 00 48) Oct 31 15:24:05.836507: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.836511: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.836514: | #null state always idle Oct 31 15:24:05.836518: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.836521: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.836524: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836527: | length: 44 (00 2c) Oct 31 15:24:05.836529: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.836532: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.836535: | in statetime_start() with no state Oct 31 15:24:05.836541: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.836546: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.836549: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.836553: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.836555: | find_next_host_connection returns "test" Oct 31 15:24:05.836558: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.836560: | find_next_host_connection returns Oct 31 15:24:05.836586: | newref alloc logger@0x56551f0eeb90(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.836590: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.836593: | creating state object #17 at 0x56551f0edf10 Oct 31 15:24:05.836596: | State DB: adding IKEv1 state #17 in UNDEFINED Oct 31 15:24:05.836602: | pstats #17 ikev1.isakmp started Oct 31 15:24:05.836608: | #17 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.836615: | start processing: state #17 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.836619: | parent state #17: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.836622: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.836628: | ICOOKIE-DUMP: Oct 31 15:24:05.836631: | 55 7b 31 de 3a f6 31 cb Oct 31 15:24:05.836635: "test" #17: responding to Main Mode Oct 31 15:24:05.836640: | opening output PBS reply packet Oct 31 15:24:05.836643: | **emit ISAKMP Message: Oct 31 15:24:05.836647: | initiator SPI: 55 7b 31 de 3a f6 31 cb Oct 31 15:24:05.836652: | responder SPI: 0a 2c de de 0f ea 5b 93 Oct 31 15:24:05.836654: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836657: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.836660: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.836662: | flags: none (0x0) Oct 31 15:24:05.836667: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.836670: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.836673: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.836676: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836679: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.836682: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.836684: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.836688: | ****parse IPsec DOI SIT: Oct 31 15:24:05.836691: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.836694: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.836697: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836700: | length: 32 (00 20) Oct 31 15:24:05.836703: | proposal number: 1 (01) Oct 31 15:24:05.836705: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.836709: | SPI size: 0 (00) Oct 31 15:24:05.836712: | number of transforms: 1 (01) Oct 31 15:24:05.836715: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.836717: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836721: | length: 24 (00 18) Oct 31 15:24:05.836724: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.836726: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.836730: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.836733: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.836736: | length/value: 14 (00 0e) Oct 31 15:24:05.836739: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:05.836744: "test" #17: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.836747: "test" #17: no acceptable Oakley Transform Oct 31 15:24:05.836750: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.836755: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.836758: | #17 is idle Oct 31 15:24:05.836825: "test" #17: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.836830: | opening output PBS notification msg Oct 31 15:24:05.836833: | **emit ISAKMP Message: Oct 31 15:24:05.836837: | initiator SPI: 55 7b 31 de 3a f6 31 cb Oct 31 15:24:05.836842: | responder SPI: 0a 2c de de 0f ea 5b 93 Oct 31 15:24:05.836845: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836847: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.836850: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.836852: | flags: none (0x0) Oct 31 15:24:05.836856: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.836859: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.836862: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.836865: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.836868: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.836870: | protocol ID: 1 (01) Oct 31 15:24:05.836873: | SPI size: 0 (00) Oct 31 15:24:05.836876: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.836879: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.836883: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.836887: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.836890: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.836896: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #17) Oct 31 15:24:05.836899: | 55 7b 31 de 3a f6 31 cb 0a 2c de de 0f ea 5b 93 Oct 31 15:24:05.836901: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.836904: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.836925: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.836932: | stop processing: state #17 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.836936: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.836940: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.836942: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.836945: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.836951: | spent 0.512 (0.534) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.853499: | spent 0.00241 (0.00243) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.853525: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.853530: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.853537: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.853541: | 2d 83 d5 36 8f f1 31 c1 00 00 00 00 00 00 00 00 Oct 31 15:24:05.853543: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.853545: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.853547: | 00 00 00 14 01 01 00 00 80 02 00 07 80 03 00 18 Oct 31 15:24:05.853549: | 80 04 00 18 Oct 31 15:24:05.853555: | **parse ISAKMP Message: Oct 31 15:24:05.853560: | initiator SPI: 2d 83 d5 36 8f f1 31 c1 Oct 31 15:24:05.853565: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.853568: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.853572: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.853575: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.853676: | flags: none (0x0) Oct 31 15:24:05.853680: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.853683: | length: 68 (00 00 00 44) Oct 31 15:24:05.853685: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.853688: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.853690: | #null state always idle Oct 31 15:24:05.853692: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.853695: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.853697: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853699: | length: 40 (00 28) Oct 31 15:24:05.853700: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.853702: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.853704: | in statetime_start() with no state Oct 31 15:24:05.853708: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.853712: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.853714: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.853716: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.853718: | find_next_host_connection returns "test" Oct 31 15:24:05.853720: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.853722: | find_next_host_connection returns Oct 31 15:24:05.853752: | newref alloc logger@0x56551f0ef860(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.853765: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.853768: | creating state object #18 at 0x56551f0eebe0 Oct 31 15:24:05.853771: | State DB: adding IKEv1 state #18 in UNDEFINED Oct 31 15:24:05.853777: | pstats #18 ikev1.isakmp started Oct 31 15:24:05.853782: | #18 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.853789: | start processing: state #18 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.853792: | parent state #18: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.853794: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.853796: | ICOOKIE-DUMP: Oct 31 15:24:05.853797: | 2d 83 d5 36 8f f1 31 c1 Oct 31 15:24:05.853800: "test" #18: responding to Main Mode Oct 31 15:24:05.853804: | opening output PBS reply packet Oct 31 15:24:05.853806: | **emit ISAKMP Message: Oct 31 15:24:05.853808: | initiator SPI: 2d 83 d5 36 8f f1 31 c1 Oct 31 15:24:05.853811: | responder SPI: 59 20 de 31 81 40 a8 dd Oct 31 15:24:05.853812: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853814: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.853815: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.853817: | flags: none (0x0) Oct 31 15:24:05.853819: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.853822: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.853825: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.853830: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853834: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.853837: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.853839: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.853842: | ****parse IPsec DOI SIT: Oct 31 15:24:05.853846: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.853848: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.853851: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853855: | length: 28 (00 1c) Oct 31 15:24:05.853858: | proposal number: 1 (01) Oct 31 15:24:05.853860: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.853863: | SPI size: 0 (00) Oct 31 15:24:05.853866: | number of transforms: 1 (01) Oct 31 15:24:05.853870: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.853873: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853876: | length: 20 (00 14) Oct 31 15:24:05.853879: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.853882: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.853885: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.853888: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.853891: | length/value: 7 (00 07) Oct 31 15:24:05.853894: "test" #18: 7?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:05.853896: "test" #18: no acceptable Oakley Transform Oct 31 15:24:05.853898: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.853902: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.853904: | #18 is idle Oct 31 15:24:05.853954: "test" #18: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.853959: | opening output PBS notification msg Oct 31 15:24:05.853962: | **emit ISAKMP Message: Oct 31 15:24:05.853966: | initiator SPI: 2d 83 d5 36 8f f1 31 c1 Oct 31 15:24:05.853970: | responder SPI: 59 20 de 31 81 40 a8 dd Oct 31 15:24:05.853973: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853975: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.853978: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.853983: | flags: none (0x0) Oct 31 15:24:05.853987: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.853989: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.853992: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.853995: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.853997: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.854000: | protocol ID: 1 (01) Oct 31 15:24:05.854003: | SPI size: 0 (00) Oct 31 15:24:05.854005: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.854148: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.854155: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.854158: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.854161: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.854169: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #18) Oct 31 15:24:05.854172: | 2d 83 d5 36 8f f1 31 c1 59 20 de 31 81 40 a8 dd Oct 31 15:24:05.854174: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.854176: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.854246: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.854257: | stop processing: state #18 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.854260: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.854262: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.854264: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.854266: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.854272: | spent 0.504 (0.782) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.866307: | spent 0 (0.00266) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.866331: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.866336: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.866344: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.866347: | 48 bc a3 3d 57 0f b7 f9 00 00 00 00 00 00 00 00 Oct 31 15:24:05.866350: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.866353: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.866355: | 00 00 00 14 01 01 00 00 80 01 00 0e 80 03 00 18 Oct 31 15:24:05.866357: | 80 04 00 18 Oct 31 15:24:05.866363: | **parse ISAKMP Message: Oct 31 15:24:05.866369: | initiator SPI: 48 bc a3 3d 57 0f b7 f9 Oct 31 15:24:05.866375: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.866381: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.866384: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.866386: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.866388: | flags: none (0x0) Oct 31 15:24:05.866392: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.866396: | length: 68 (00 00 00 44) Oct 31 15:24:05.866399: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.866403: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.866406: | #null state always idle Oct 31 15:24:05.866410: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.866414: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.866416: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866422: | length: 40 (00 28) Oct 31 15:24:05.866425: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.866428: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.866431: | in statetime_start() with no state Oct 31 15:24:05.866441: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.866448: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.866451: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.866457: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.866460: | find_next_host_connection returns "test" Oct 31 15:24:05.866462: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.866467: | find_next_host_connection returns Oct 31 15:24:05.866503: | newref alloc logger@0x56551f0f0530(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.866508: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.866511: | creating state object #19 at 0x56551f0ef8b0 Oct 31 15:24:05.866514: | State DB: adding IKEv1 state #19 in UNDEFINED Oct 31 15:24:05.866519: | pstats #19 ikev1.isakmp started Oct 31 15:24:05.866524: | #19 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.866532: | start processing: state #19 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.866538: | parent state #19: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.866542: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.866544: | ICOOKIE-DUMP: Oct 31 15:24:05.866546: | 48 bc a3 3d 57 0f b7 f9 Oct 31 15:24:05.866550: "test" #19: responding to Main Mode Oct 31 15:24:05.866555: | opening output PBS reply packet Oct 31 15:24:05.866558: | **emit ISAKMP Message: Oct 31 15:24:05.866562: | initiator SPI: 48 bc a3 3d 57 0f b7 f9 Oct 31 15:24:05.866566: | responder SPI: 23 66 8d e1 3d ee a8 bf Oct 31 15:24:05.866569: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866572: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.866574: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.866577: | flags: none (0x0) Oct 31 15:24:05.866581: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.866584: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.866591: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.866594: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866597: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.866599: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.866602: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.866605: | ****parse IPsec DOI SIT: Oct 31 15:24:05.866608: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.866611: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.866613: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866617: | length: 28 (00 1c) Oct 31 15:24:05.866620: | proposal number: 1 (01) Oct 31 15:24:05.866623: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.866626: | SPI size: 0 (00) Oct 31 15:24:05.866629: | number of transforms: 1 (01) Oct 31 15:24:05.866632: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.866635: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866640: | length: 20 (00 14) Oct 31 15:24:05.866644: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.866646: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.866649: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.866651: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.866654: | length/value: 14 (00 0e) Oct 31 15:24:05.866657: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:05.866662: "test" #19: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.866665: "test" #19: no acceptable Oakley Transform Oct 31 15:24:05.866668: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.866677: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.866680: | #19 is idle Oct 31 15:24:05.866820: "test" #19: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.866828: | opening output PBS notification msg Oct 31 15:24:05.866831: | **emit ISAKMP Message: Oct 31 15:24:05.866836: | initiator SPI: 48 bc a3 3d 57 0f b7 f9 Oct 31 15:24:05.866840: | responder SPI: 23 66 8d e1 3d ee a8 bf Oct 31 15:24:05.866843: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866845: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.866848: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.866850: | flags: none (0x0) Oct 31 15:24:05.866854: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.866857: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.866860: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.866863: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.866865: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.866868: | protocol ID: 1 (01) Oct 31 15:24:05.866870: | SPI size: 0 (00) Oct 31 15:24:05.866873: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.866876: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.866878: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.866881: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.866883: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.866890: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #19) Oct 31 15:24:05.866893: | 48 bc a3 3d 57 0f b7 f9 23 66 8d e1 3d ee a8 bf Oct 31 15:24:05.866895: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.866897: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.866934: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.866941: | stop processing: state #19 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.866944: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.866947: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.866950: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.866952: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.866958: | spent 0.556 (0.662) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.880058: | spent 0.00247 (0.00271) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.880080: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.880084: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.880091: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.880093: | f8 35 f8 ed f7 cc 54 a3 00 00 00 00 00 00 00 00 Oct 31 15:24:05.880096: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.880098: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.880100: | 00 00 00 14 01 01 00 00 80 01 00 0e 80 02 00 07 Oct 31 15:24:05.880102: | 80 04 00 18 Oct 31 15:24:05.880107: | **parse ISAKMP Message: Oct 31 15:24:05.880111: | initiator SPI: f8 35 f8 ed f7 cc 54 a3 Oct 31 15:24:05.880116: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.880119: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.880122: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.880124: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.880126: | flags: none (0x0) Oct 31 15:24:05.880129: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.880132: | length: 68 (00 00 00 44) Oct 31 15:24:05.880138: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.880141: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.880144: | #null state always idle Oct 31 15:24:05.880147: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.880151: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.880153: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880156: | length: 40 (00 28) Oct 31 15:24:05.880158: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.880161: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.880164: | in statetime_start() with no state Oct 31 15:24:05.880169: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.880175: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.880178: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.880181: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.880183: | find_next_host_connection returns "test" Oct 31 15:24:05.880186: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.880188: | find_next_host_connection returns Oct 31 15:24:05.880226: | newref alloc logger@0x56551f0f1200(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.880232: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.880234: | creating state object #20 at 0x56551f0f0580 Oct 31 15:24:05.880236: | State DB: adding IKEv1 state #20 in UNDEFINED Oct 31 15:24:05.880241: | pstats #20 ikev1.isakmp started Oct 31 15:24:05.880246: | #20 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.880251: | start processing: state #20 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.880254: | parent state #20: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.880257: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.880259: | ICOOKIE-DUMP: Oct 31 15:24:05.880261: | f8 35 f8 ed f7 cc 54 a3 Oct 31 15:24:05.880264: "test" #20: responding to Main Mode Oct 31 15:24:05.880268: | opening output PBS reply packet Oct 31 15:24:05.880271: | **emit ISAKMP Message: Oct 31 15:24:05.880274: | initiator SPI: f8 35 f8 ed f7 cc 54 a3 Oct 31 15:24:05.880277: | responder SPI: ee 5d ba a9 f2 62 dd 70 Oct 31 15:24:05.880279: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880280: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.880282: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.880284: | flags: none (0x0) Oct 31 15:24:05.880287: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.880290: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.880292: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.880294: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880296: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.880299: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.880301: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.880303: | ****parse IPsec DOI SIT: Oct 31 15:24:05.880305: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.880308: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.880309: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880312: | length: 28 (00 1c) Oct 31 15:24:05.880314: | proposal number: 1 (01) Oct 31 15:24:05.880316: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.880318: | SPI size: 0 (00) Oct 31 15:24:05.880320: | number of transforms: 1 (01) Oct 31 15:24:05.880322: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.880324: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880328: | length: 20 (00 14) Oct 31 15:24:05.880330: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.880332: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.880334: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.880337: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.880339: | length/value: 14 (00 0e) Oct 31 15:24:05.880341: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:05.880345: "test" #20: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.880348: "test" #20: no acceptable Oakley Transform Oct 31 15:24:05.880350: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.880354: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.880356: | #20 is idle Oct 31 15:24:05.880504: "test" #20: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.880512: | opening output PBS notification msg Oct 31 15:24:05.880515: | **emit ISAKMP Message: Oct 31 15:24:05.880520: | initiator SPI: f8 35 f8 ed f7 cc 54 a3 Oct 31 15:24:05.880524: | responder SPI: ee 5d ba a9 f2 62 dd 70 Oct 31 15:24:05.880527: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880530: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.880532: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.880535: | flags: none (0x0) Oct 31 15:24:05.880540: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.880543: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.880546: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.880549: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.880552: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.880555: | protocol ID: 1 (01) Oct 31 15:24:05.880615: | SPI size: 0 (00) Oct 31 15:24:05.880620: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.880624: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.880692: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.880701: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.880704: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.880712: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #20) Oct 31 15:24:05.880715: | f8 35 f8 ed f7 cc 54 a3 ee 5d ba a9 f2 62 dd 70 Oct 31 15:24:05.880718: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.880720: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.880758: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.880768: | stop processing: state #20 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.880772: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.880845: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.880850: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.880853: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.880862: | spent 0.531 (0.811) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.892938: | spent 0.00288 (0.00299) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.892961: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.892967: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.892976: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.892979: | b6 bb 63 2d 37 0a b2 0d 00 00 00 00 00 00 00 00 Oct 31 15:24:05.892982: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.892988: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.892990: | 00 00 00 14 01 01 00 00 80 01 00 0e 80 02 00 07 Oct 31 15:24:05.892992: | 80 03 00 18 Oct 31 15:24:05.892998: | **parse ISAKMP Message: Oct 31 15:24:05.893003: | initiator SPI: b6 bb 63 2d 37 0a b2 0d Oct 31 15:24:05.893007: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.893011: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.893014: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.893016: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.893018: | flags: none (0x0) Oct 31 15:24:05.893022: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.893026: | length: 68 (00 00 00 44) Oct 31 15:24:05.893030: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.893034: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.893036: | #null state always idle Oct 31 15:24:05.893041: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.893044: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.893046: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893048: | length: 40 (00 28) Oct 31 15:24:05.893049: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.893051: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.893053: | in statetime_start() with no state Oct 31 15:24:05.893057: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.893061: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.893063: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.893065: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.893067: | find_next_host_connection returns "test" Oct 31 15:24:05.893069: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.893070: | find_next_host_connection returns Oct 31 15:24:05.893094: | newref alloc logger@0x56551f0f1ed0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.893097: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.893100: | creating state object #21 at 0x56551f0f1250 Oct 31 15:24:05.893102: | State DB: adding IKEv1 state #21 in UNDEFINED Oct 31 15:24:05.893108: | pstats #21 ikev1.isakmp started Oct 31 15:24:05.893112: | #21 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.893118: | start processing: state #21 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.893122: | parent state #21: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.893125: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.893127: | ICOOKIE-DUMP: Oct 31 15:24:05.893130: | b6 bb 63 2d 37 0a b2 0d Oct 31 15:24:05.893133: "test" #21: responding to Main Mode Oct 31 15:24:05.893138: | opening output PBS reply packet Oct 31 15:24:05.893141: | **emit ISAKMP Message: Oct 31 15:24:05.893145: | initiator SPI: b6 bb 63 2d 37 0a b2 0d Oct 31 15:24:05.893148: | responder SPI: 7e f1 94 88 f6 e5 7d 0e Oct 31 15:24:05.893150: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893152: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.893155: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.893157: | flags: none (0x0) Oct 31 15:24:05.893159: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.893161: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.893163: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.893165: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893166: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.893168: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.893170: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.893175: | ****parse IPsec DOI SIT: Oct 31 15:24:05.893176: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.893179: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.893181: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893184: | length: 28 (00 1c) Oct 31 15:24:05.893186: | proposal number: 1 (01) Oct 31 15:24:05.893189: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.893191: | SPI size: 0 (00) Oct 31 15:24:05.893194: | number of transforms: 1 (01) Oct 31 15:24:05.893197: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.893225: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893229: | length: 20 (00 14) Oct 31 15:24:05.893231: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.893233: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.893237: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.893240: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.893243: | length/value: 14 (00 0e) Oct 31 15:24:05.893246: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:05.893250: "test" #21: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.893253: "test" #21: no acceptable Oakley Transform Oct 31 15:24:05.893256: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.893274: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.893276: | #21 is idle Oct 31 15:24:05.893360: "test" #21: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.893367: | opening output PBS notification msg Oct 31 15:24:05.893370: | **emit ISAKMP Message: Oct 31 15:24:05.893374: | initiator SPI: b6 bb 63 2d 37 0a b2 0d Oct 31 15:24:05.893378: | responder SPI: 7e f1 94 88 f6 e5 7d 0e Oct 31 15:24:05.893381: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893383: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.893385: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.893388: | flags: none (0x0) Oct 31 15:24:05.893396: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.893399: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.893402: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.893405: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.893407: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.893410: | protocol ID: 1 (01) Oct 31 15:24:05.893412: | SPI size: 0 (00) Oct 31 15:24:05.893415: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.893418: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.893420: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.893423: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.893426: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.893433: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #21) Oct 31 15:24:05.893436: | b6 bb 63 2d 37 0a b2 0d 7e f1 94 88 f6 e5 7d 0e Oct 31 15:24:05.893438: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.893440: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.893474: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.893482: | stop processing: state #21 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.893486: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.893489: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.893492: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.893494: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.893502: | spent 0.525 (0.574) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.903718: | spent 0.00238 (0.00235) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.903739: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.903742: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.903747: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.903750: | c4 ad 61 0a 8e fc 65 8c 00 00 00 00 00 00 00 00 Oct 31 15:24:05.903751: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:05.903752: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:05.903754: | 00 00 00 18 01 01 00 00 80 01 00 16 80 02 00 10 Oct 31 15:24:05.903755: | 80 03 00 19 80 04 00 13 Oct 31 15:24:05.903759: | **parse ISAKMP Message: Oct 31 15:24:05.903764: | initiator SPI: c4 ad 61 0a 8e fc 65 8c Oct 31 15:24:05.903771: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.903774: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.903777: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.903779: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.903782: | flags: none (0x0) Oct 31 15:24:05.903786: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.903790: | length: 72 (00 00 00 48) Oct 31 15:24:05.903793: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.903798: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.903802: | #null state always idle Oct 31 15:24:05.903806: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.903810: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.903812: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.903815: | length: 44 (00 2c) Oct 31 15:24:05.903817: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.903819: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.903821: | in statetime_start() with no state Oct 31 15:24:05.903825: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.903829: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.903831: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.903833: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.903835: | find_next_host_connection returns "test" Oct 31 15:24:05.903836: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.903838: | find_next_host_connection returns Oct 31 15:24:05.903869: | newref alloc logger@0x56551f0f2ba0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.903875: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.903878: | creating state object #22 at 0x56551f0f1f20 Oct 31 15:24:05.903880: | State DB: adding IKEv1 state #22 in UNDEFINED Oct 31 15:24:05.903886: | pstats #22 ikev1.isakmp started Oct 31 15:24:05.903891: | #22 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.903899: | start processing: state #22 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.903920: | parent state #22: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.903936: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.903938: | ICOOKIE-DUMP: Oct 31 15:24:05.903939: | c4 ad 61 0a 8e fc 65 8c Oct 31 15:24:05.903942: "test" #22: responding to Main Mode Oct 31 15:24:05.903946: | opening output PBS reply packet Oct 31 15:24:05.903948: | **emit ISAKMP Message: Oct 31 15:24:05.903951: | initiator SPI: c4 ad 61 0a 8e fc 65 8c Oct 31 15:24:05.903954: | responder SPI: da d4 d8 4c 00 0e af 24 Oct 31 15:24:05.903955: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.903961: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.903962: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.903964: | flags: none (0x0) Oct 31 15:24:05.903966: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.903968: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.903970: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.903972: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.903973: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.903975: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.903977: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.903984: | ****parse IPsec DOI SIT: Oct 31 15:24:05.903989: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.904004: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.904007: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.904010: | length: 32 (00 20) Oct 31 15:24:05.904013: | proposal number: 1 (01) Oct 31 15:24:05.904015: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.904018: | SPI size: 0 (00) Oct 31 15:24:05.904021: | number of transforms: 1 (01) Oct 31 15:24:05.904024: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.904026: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.904030: | length: 24 (00 18) Oct 31 15:24:05.904033: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.904035: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.904038: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.904041: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.904043: | length/value: 22 (00 16) Oct 31 15:24:05.904045: | [22 is UNUSED_22] Oct 31 15:24:05.904062: "test" #22: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.904064: "test" #22: no acceptable Oakley Transform Oct 31 15:24:05.904066: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.904070: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.904071: | #22 is idle Oct 31 15:24:05.904129: "test" #22: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.904137: | opening output PBS notification msg Oct 31 15:24:05.904139: | **emit ISAKMP Message: Oct 31 15:24:05.904142: | initiator SPI: c4 ad 61 0a 8e fc 65 8c Oct 31 15:24:05.904147: | responder SPI: da d4 d8 4c 00 0e af 24 Oct 31 15:24:05.904152: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.904155: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.904157: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.904160: | flags: none (0x0) Oct 31 15:24:05.904164: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.904167: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.904170: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.904172: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.904175: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.904178: | protocol ID: 1 (01) Oct 31 15:24:05.904182: | SPI size: 0 (00) Oct 31 15:24:05.904184: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.904188: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.904190: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.904194: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.904196: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.904220: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #22) Oct 31 15:24:05.904225: | c4 ad 61 0a 8e fc 65 8c da d4 d8 4c 00 0e af 24 Oct 31 15:24:05.904226: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.904228: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.904254: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.904259: | stop processing: state #22 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.904261: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.904263: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.904265: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.904266: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.904271: | spent 0.519 (0.562) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.913305: | spent 0.00243 (0.0024) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.913324: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.913327: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.913332: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.913334: | 55 70 4a 48 90 d6 c1 2f 00 00 00 00 00 00 00 00 Oct 31 15:24:05.913336: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.913337: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.913338: | 00 00 00 14 01 01 00 00 80 02 00 10 80 03 00 19 Oct 31 15:24:05.913340: | 80 04 00 13 Oct 31 15:24:05.913344: | **parse ISAKMP Message: Oct 31 15:24:05.913347: | initiator SPI: 55 70 4a 48 90 d6 c1 2f Oct 31 15:24:05.913349: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.913351: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.913353: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.913355: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.913357: | flags: none (0x0) Oct 31 15:24:05.913359: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.913361: | length: 68 (00 00 00 44) Oct 31 15:24:05.913363: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.913366: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.913368: | #null state always idle Oct 31 15:24:05.913371: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.913373: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.913374: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913376: | length: 40 (00 28) Oct 31 15:24:05.913378: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.913380: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.913381: | in statetime_start() with no state Oct 31 15:24:05.913385: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.913389: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.913391: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.913393: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.913394: | find_next_host_connection returns "test" Oct 31 15:24:05.913396: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.913397: | find_next_host_connection returns Oct 31 15:24:05.913421: | newref alloc logger@0x56551f0f3870(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.913424: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.913426: | creating state object #23 at 0x56551f0f2bf0 Oct 31 15:24:05.913427: | State DB: adding IKEv1 state #23 in UNDEFINED Oct 31 15:24:05.913433: | pstats #23 ikev1.isakmp started Oct 31 15:24:05.913437: | #23 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.913441: | start processing: state #23 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.913447: | parent state #23: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.913449: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.913451: | ICOOKIE-DUMP: Oct 31 15:24:05.913453: | 55 70 4a 48 90 d6 c1 2f Oct 31 15:24:05.913455: "test" #23: responding to Main Mode Oct 31 15:24:05.913459: | opening output PBS reply packet Oct 31 15:24:05.913461: | **emit ISAKMP Message: Oct 31 15:24:05.913463: | initiator SPI: 55 70 4a 48 90 d6 c1 2f Oct 31 15:24:05.913465: | responder SPI: 36 92 78 e6 8a 38 e4 34 Oct 31 15:24:05.913467: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913469: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.913470: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.913471: | flags: none (0x0) Oct 31 15:24:05.913474: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.913476: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.913478: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.913479: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913481: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.913483: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.913484: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.913487: | ****parse IPsec DOI SIT: Oct 31 15:24:05.913488: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.913490: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.913492: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913493: | length: 28 (00 1c) Oct 31 15:24:05.913495: | proposal number: 1 (01) Oct 31 15:24:05.913497: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.913498: | SPI size: 0 (00) Oct 31 15:24:05.913500: | number of transforms: 1 (01) Oct 31 15:24:05.913502: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.913503: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913505: | length: 20 (00 14) Oct 31 15:24:05.913507: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.913508: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.913510: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.913512: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.913514: | length/value: 16 (00 10) Oct 31 15:24:05.913517: "test" #23: 16?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:05.913519: "test" #23: no acceptable Oakley Transform Oct 31 15:24:05.913520: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.913523: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.913525: | #23 is idle Oct 31 15:24:05.913587: "test" #23: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.913591: | opening output PBS notification msg Oct 31 15:24:05.913593: | **emit ISAKMP Message: Oct 31 15:24:05.913595: | initiator SPI: 55 70 4a 48 90 d6 c1 2f Oct 31 15:24:05.913597: | responder SPI: 36 92 78 e6 8a 38 e4 34 Oct 31 15:24:05.913599: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913600: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.913602: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.913603: | flags: none (0x0) Oct 31 15:24:05.913605: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.913607: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.913609: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.913610: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.913612: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.913617: | protocol ID: 1 (01) Oct 31 15:24:05.913621: | SPI size: 0 (00) Oct 31 15:24:05.913625: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.913629: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.913631: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.913634: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.913636: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.913643: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #23) Oct 31 15:24:05.913646: | 55 70 4a 48 90 d6 c1 2f 36 92 78 e6 8a 38 e4 34 Oct 31 15:24:05.913648: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.913651: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.913674: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.913683: | stop processing: state #23 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.913687: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.913690: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.913692: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.913694: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.913699: | spent 0.389 (0.402) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.921885: | spent 0.00229 (0.00225) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.921904: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.921908: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.921913: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.921915: | 1c 7f ec 56 00 cd 31 67 00 00 00 00 00 00 00 00 Oct 31 15:24:05.921916: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.921918: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.921919: | 00 00 00 14 01 01 00 00 80 01 00 16 80 03 00 19 Oct 31 15:24:05.921921: | 80 04 00 13 Oct 31 15:24:05.921925: | **parse ISAKMP Message: Oct 31 15:24:05.921928: | initiator SPI: 1c 7f ec 56 00 cd 31 67 Oct 31 15:24:05.921931: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.921933: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.921935: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.921936: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.921939: | flags: none (0x0) Oct 31 15:24:05.921942: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.921946: | length: 68 (00 00 00 44) Oct 31 15:24:05.921949: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.921953: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.921956: | #null state always idle Oct 31 15:24:05.921960: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.921968: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.921971: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.921975: | length: 40 (00 28) Oct 31 15:24:05.921977: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.921980: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.921983: | in statetime_start() with no state Oct 31 15:24:05.921987: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.921990: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.921992: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.921994: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.921996: | find_next_host_connection returns "test" Oct 31 15:24:05.921997: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.922002: | find_next_host_connection returns Oct 31 15:24:05.922026: | newref alloc logger@0x56551f0f4540(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.922029: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.922030: | creating state object #24 at 0x56551f0f38c0 Oct 31 15:24:05.922032: | State DB: adding IKEv1 state #24 in UNDEFINED Oct 31 15:24:05.922036: | pstats #24 ikev1.isakmp started Oct 31 15:24:05.922039: | #24 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.922043: | start processing: state #24 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.922045: | parent state #24: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.922048: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.922049: | ICOOKIE-DUMP: Oct 31 15:24:05.922050: | 1c 7f ec 56 00 cd 31 67 Oct 31 15:24:05.922053: "test" #24: responding to Main Mode Oct 31 15:24:05.922056: | opening output PBS reply packet Oct 31 15:24:05.922058: | **emit ISAKMP Message: Oct 31 15:24:05.922061: | initiator SPI: 1c 7f ec 56 00 cd 31 67 Oct 31 15:24:05.922063: | responder SPI: 47 56 71 10 00 3c 3d 37 Oct 31 15:24:05.922064: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.922066: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.922067: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.922069: | flags: none (0x0) Oct 31 15:24:05.922071: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.922073: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.922075: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.922077: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.922078: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.922080: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.922081: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.922084: | ****parse IPsec DOI SIT: Oct 31 15:24:05.922085: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.922087: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.922088: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.922090: | length: 28 (00 1c) Oct 31 15:24:05.922092: | proposal number: 1 (01) Oct 31 15:24:05.922093: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.922095: | SPI size: 0 (00) Oct 31 15:24:05.922097: | number of transforms: 1 (01) Oct 31 15:24:05.922098: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.922100: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.922101: | length: 20 (00 14) Oct 31 15:24:05.922103: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.922104: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.922106: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.922108: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.922110: | length/value: 22 (00 16) Oct 31 15:24:05.922111: | [22 is UNUSED_22] Oct 31 15:24:05.922114: "test" #24: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.922116: "test" #24: no acceptable Oakley Transform Oct 31 15:24:05.922118: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.922121: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.922122: | #24 is idle Oct 31 15:24:05.922175: "test" #24: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.922193: | opening output PBS notification msg Oct 31 15:24:05.922195: | **emit ISAKMP Message: Oct 31 15:24:05.922197: | initiator SPI: 1c 7f ec 56 00 cd 31 67 Oct 31 15:24:05.922206: | responder SPI: 47 56 71 10 00 3c 3d 37 Oct 31 15:24:05.922210: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.922213: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.922215: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.922216: | flags: none (0x0) Oct 31 15:24:05.922218: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.922220: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.922222: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.922223: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.922225: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.922226: | protocol ID: 1 (01) Oct 31 15:24:05.922228: | SPI size: 0 (00) Oct 31 15:24:05.922230: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.922231: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.922233: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.922235: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.922236: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.922241: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #24) Oct 31 15:24:05.922242: | 1c 7f ec 56 00 cd 31 67 47 56 71 10 00 3c 3d 37 Oct 31 15:24:05.922244: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.922245: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.922266: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.922271: | stop processing: state #24 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.922273: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.922275: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.922277: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.922278: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.922282: | spent 0.384 (0.405) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.930998: | spent 0 (0.00262) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.931023: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.931028: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.931033: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.931035: | ad 8f 80 26 7c 73 1a 62 00 00 00 00 00 00 00 00 Oct 31 15:24:05.931036: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.931038: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.931039: | 00 00 00 14 01 01 00 00 80 01 00 16 80 02 00 10 Oct 31 15:24:05.931040: | 80 04 00 13 Oct 31 15:24:05.931044: | **parse ISAKMP Message: Oct 31 15:24:05.931047: | initiator SPI: ad 8f 80 26 7c 73 1a 62 Oct 31 15:24:05.931050: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.931052: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.931054: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.931055: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.931057: | flags: none (0x0) Oct 31 15:24:05.931060: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.931062: | length: 68 (00 00 00 44) Oct 31 15:24:05.931064: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.931067: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.931069: | #null state always idle Oct 31 15:24:05.931071: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.931073: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.931075: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931077: | length: 40 (00 28) Oct 31 15:24:05.931082: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.931084: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.931087: | in statetime_start() with no state Oct 31 15:24:05.931092: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.931097: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.931100: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.931103: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.931105: | find_next_host_connection returns "test" Oct 31 15:24:05.931108: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.931110: | find_next_host_connection returns Oct 31 15:24:05.931142: | newref alloc logger@0x56551f0f5210(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.931146: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.931149: | creating state object #25 at 0x56551f0f4590 Oct 31 15:24:05.931151: | State DB: adding IKEv1 state #25 in UNDEFINED Oct 31 15:24:05.931157: | pstats #25 ikev1.isakmp started Oct 31 15:24:05.931162: | #25 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.931169: | start processing: state #25 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.931172: | parent state #25: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.931175: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.931177: | ICOOKIE-DUMP: Oct 31 15:24:05.931179: | ad 8f 80 26 7c 73 1a 62 Oct 31 15:24:05.931182: "test" #25: responding to Main Mode Oct 31 15:24:05.931187: | opening output PBS reply packet Oct 31 15:24:05.931190: | **emit ISAKMP Message: Oct 31 15:24:05.931194: | initiator SPI: ad 8f 80 26 7c 73 1a 62 Oct 31 15:24:05.931197: | responder SPI: b5 a3 33 64 5a 78 36 ab Oct 31 15:24:05.931206: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931209: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.931211: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.931214: | flags: none (0x0) Oct 31 15:24:05.931217: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.931220: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.931223: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.931225: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931227: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.931230: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.931232: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.931235: | ****parse IPsec DOI SIT: Oct 31 15:24:05.931237: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.931240: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.931242: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931245: | length: 28 (00 1c) Oct 31 15:24:05.931247: | proposal number: 1 (01) Oct 31 15:24:05.931249: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.931252: | SPI size: 0 (00) Oct 31 15:24:05.931254: | number of transforms: 1 (01) Oct 31 15:24:05.931257: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.931259: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931262: | length: 20 (00 14) Oct 31 15:24:05.931265: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.931267: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.931270: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.931273: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.931275: | length/value: 22 (00 16) Oct 31 15:24:05.931277: | [22 is UNUSED_22] Oct 31 15:24:05.931283: "test" #25: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.931290: "test" #25: no acceptable Oakley Transform Oct 31 15:24:05.931294: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.931297: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.931299: | #25 is idle Oct 31 15:24:05.931527: "test" #25: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.931533: | opening output PBS notification msg Oct 31 15:24:05.931536: | **emit ISAKMP Message: Oct 31 15:24:05.931541: | initiator SPI: ad 8f 80 26 7c 73 1a 62 Oct 31 15:24:05.931544: | responder SPI: b5 a3 33 64 5a 78 36 ab Oct 31 15:24:05.931547: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931549: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.931552: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.931554: | flags: none (0x0) Oct 31 15:24:05.931558: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.931561: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.931563: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.931564: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.931566: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.931568: | protocol ID: 1 (01) Oct 31 15:24:05.931571: | SPI size: 0 (00) Oct 31 15:24:05.931576: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.931579: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.931581: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.931584: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.931587: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.931594: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #25) Oct 31 15:24:05.931597: | ad 8f 80 26 7c 73 1a 62 b5 a3 33 64 5a 78 36 ab Oct 31 15:24:05.931600: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.931602: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.931633: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.931642: | stop processing: state #25 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.931646: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.931649: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.931652: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.931654: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.931661: | spent 0.473 (0.673) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.946383: | spent 0.000164 (0.00299) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.946410: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.946414: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.946422: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.946425: | 45 69 c8 ec df db 13 67 00 00 00 00 00 00 00 00 Oct 31 15:24:05.946427: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.946429: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.946431: | 00 00 00 14 01 01 00 00 80 01 00 16 80 02 00 10 Oct 31 15:24:05.946433: | 80 03 00 19 Oct 31 15:24:05.946438: | **parse ISAKMP Message: Oct 31 15:24:05.946443: | initiator SPI: 45 69 c8 ec df db 13 67 Oct 31 15:24:05.946448: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.946450: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.946453: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.946459: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.946462: | flags: none (0x0) Oct 31 15:24:05.946465: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.946469: | length: 68 (00 00 00 44) Oct 31 15:24:05.946472: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.946476: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.946479: | #null state always idle Oct 31 15:24:05.946482: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.946485: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.946488: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.946491: | length: 40 (00 28) Oct 31 15:24:05.946493: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.946496: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.946499: | in statetime_start() with no state Oct 31 15:24:05.946504: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.946511: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.946513: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.946517: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.946519: | find_next_host_connection returns "test" Oct 31 15:24:05.946521: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.946523: | find_next_host_connection returns Oct 31 15:24:05.946552: | newref alloc logger@0x56551f0f5ee0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.946558: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.946562: | creating state object #26 at 0x56551f0f5260 Oct 31 15:24:05.946564: | State DB: adding IKEv1 state #26 in UNDEFINED Oct 31 15:24:05.946570: | pstats #26 ikev1.isakmp started Oct 31 15:24:05.946575: | #26 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.946582: | start processing: state #26 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.946586: | parent state #26: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.946589: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.946592: | ICOOKIE-DUMP: Oct 31 15:24:05.946594: | 45 69 c8 ec df db 13 67 Oct 31 15:24:05.946598: "test" #26: responding to Main Mode Oct 31 15:24:05.946603: | opening output PBS reply packet Oct 31 15:24:05.946606: | **emit ISAKMP Message: Oct 31 15:24:05.946611: | initiator SPI: 45 69 c8 ec df db 13 67 Oct 31 15:24:05.946617: | responder SPI: b3 eb 8d ab 26 9a 47 99 Oct 31 15:24:05.946621: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.946623: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.946626: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.946628: | flags: none (0x0) Oct 31 15:24:05.946632: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.946635: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.946638: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.946641: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.946643: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.946646: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.946649: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.946652: | ****parse IPsec DOI SIT: Oct 31 15:24:05.946655: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.946658: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.946661: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.946665: | length: 28 (00 1c) Oct 31 15:24:05.946668: | proposal number: 1 (01) Oct 31 15:24:05.946671: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.946678: | SPI size: 0 (00) Oct 31 15:24:05.946682: | number of transforms: 1 (01) Oct 31 15:24:05.946685: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.946688: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.946691: | length: 20 (00 14) Oct 31 15:24:05.946694: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.946696: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.946699: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.946702: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.946705: | length/value: 22 (00 16) Oct 31 15:24:05.946708: | [22 is UNUSED_22] Oct 31 15:24:05.946712: "test" #26: UNUSED_22 is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.946716: "test" #26: no acceptable Oakley Transform Oct 31 15:24:05.946719: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.946725: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.946728: | #26 is idle Oct 31 15:24:05.947366: "test" #26: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.947374: | opening output PBS notification msg Oct 31 15:24:05.947377: | **emit ISAKMP Message: Oct 31 15:24:05.947382: | initiator SPI: 45 69 c8 ec df db 13 67 Oct 31 15:24:05.947386: | responder SPI: b3 eb 8d ab 26 9a 47 99 Oct 31 15:24:05.947389: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.947391: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.947394: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.947396: | flags: none (0x0) Oct 31 15:24:05.947401: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.947404: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.947407: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.947409: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.947412: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.947414: | protocol ID: 1 (01) Oct 31 15:24:05.947417: | SPI size: 0 (00) Oct 31 15:24:05.947420: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.947422: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.947425: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.947428: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.947431: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.947438: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #26) Oct 31 15:24:05.947440: | 45 69 c8 ec df db 13 67 b3 eb 8d ab 26 9a 47 99 Oct 31 15:24:05.947443: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.947445: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.947471: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.947477: | stop processing: state #26 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.947481: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.947484: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.947487: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.947490: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.947495: | spent 0.878 (1.12) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.961383: | spent 0.0029 (0.00286) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.961411: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.961416: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.961424: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.961431: | a2 fc 0d 6e 5c 7a 4c fe 00 00 00 00 00 00 00 00 Oct 31 15:24:05.961434: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:05.961436: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:05.961438: | 00 00 00 18 01 01 00 00 80 01 00 19 80 02 00 0a Oct 31 15:24:05.961441: | 80 03 00 15 80 04 00 0a Oct 31 15:24:05.961446: | **parse ISAKMP Message: Oct 31 15:24:05.961451: | initiator SPI: a2 fc 0d 6e 5c 7a 4c fe Oct 31 15:24:05.961455: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.961458: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.961461: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.961464: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.961467: | flags: none (0x0) Oct 31 15:24:05.961471: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.961475: | length: 72 (00 00 00 48) Oct 31 15:24:05.961478: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.961483: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.961486: | #null state always idle Oct 31 15:24:05.961490: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.961493: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.961496: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.961499: | length: 44 (00 2c) Oct 31 15:24:05.961502: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.961505: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.961508: | in statetime_start() with no state Oct 31 15:24:05.961514: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.961520: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.961524: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.961527: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.961530: | find_next_host_connection returns "test" Oct 31 15:24:05.961532: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.961535: | find_next_host_connection returns Oct 31 15:24:05.961565: | newref alloc logger@0x56551f0f6bb0(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.961570: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.961572: | creating state object #27 at 0x56551f0f5f30 Oct 31 15:24:05.961575: | State DB: adding IKEv1 state #27 in UNDEFINED Oct 31 15:24:05.961581: | pstats #27 ikev1.isakmp started Oct 31 15:24:05.961586: | #27 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.961593: | start processing: state #27 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.961598: | parent state #27: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.961601: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.961603: | ICOOKIE-DUMP: Oct 31 15:24:05.961606: | a2 fc 0d 6e 5c 7a 4c fe Oct 31 15:24:05.961609: "test" #27: responding to Main Mode Oct 31 15:24:05.961615: | opening output PBS reply packet Oct 31 15:24:05.961617: | **emit ISAKMP Message: Oct 31 15:24:05.961622: | initiator SPI: a2 fc 0d 6e 5c 7a 4c fe Oct 31 15:24:05.961626: | responder SPI: 67 2e e2 75 e0 45 4c 8c Oct 31 15:24:05.961629: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.961631: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.961634: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.961636: | flags: none (0x0) Oct 31 15:24:05.961640: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.961643: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.961646: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.961648: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.961651: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.961656: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.961659: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.961663: | ****parse IPsec DOI SIT: Oct 31 15:24:05.961666: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.961669: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.961671: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.961674: | length: 32 (00 20) Oct 31 15:24:05.961677: | proposal number: 1 (01) Oct 31 15:24:05.961679: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.961682: | SPI size: 0 (00) Oct 31 15:24:05.961685: | number of transforms: 1 (01) Oct 31 15:24:05.961688: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.961690: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.961693: | length: 24 (00 18) Oct 31 15:24:05.961696: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.961703: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.961707: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.961709: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.961712: | length/value: 25 (00 19) Oct 31 15:24:05.961715: | [25 is OAKLEY_CAMELLIA_CCM_A] Oct 31 15:24:05.961719: "test" #27: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.961723: "test" #27: no acceptable Oakley Transform Oct 31 15:24:05.961726: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.961731: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.961734: | #27 is idle Oct 31 15:24:05.962315: "test" #27: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.962324: | opening output PBS notification msg Oct 31 15:24:05.962328: | **emit ISAKMP Message: Oct 31 15:24:05.962332: | initiator SPI: a2 fc 0d 6e 5c 7a 4c fe Oct 31 15:24:05.962336: | responder SPI: 67 2e e2 75 e0 45 4c 8c Oct 31 15:24:05.962339: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.962341: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.962343: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.962346: | flags: none (0x0) Oct 31 15:24:05.962350: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.962352: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.962355: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.962358: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.962360: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.962363: | protocol ID: 1 (01) Oct 31 15:24:05.962366: | SPI size: 0 (00) Oct 31 15:24:05.962368: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.962371: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.962373: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.962376: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.962379: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.962385: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #27) Oct 31 15:24:05.962388: | a2 fc 0d 6e 5c 7a 4c fe 67 2e e2 75 e0 45 4c 8c Oct 31 15:24:05.962390: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.962392: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.962424: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.962431: | stop processing: state #27 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.962435: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.962440: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.962446: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.962448: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.962454: | spent 0.537 (1.08) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.982803: | spent 0.00305 (0.00302) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.982826: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.982831: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.982839: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.982842: | cb 61 c2 60 b0 d0 8d 13 00 00 00 00 00 00 00 00 Oct 31 15:24:05.982844: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.982847: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.982849: | 00 00 00 14 01 01 00 00 80 02 00 0a 80 03 00 15 Oct 31 15:24:05.982850: | 80 04 00 0a Oct 31 15:24:05.982856: | **parse ISAKMP Message: Oct 31 15:24:05.982861: | initiator SPI: cb 61 c2 60 b0 d0 8d 13 Oct 31 15:24:05.982865: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.982868: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.982871: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.982874: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.982876: | flags: none (0x0) Oct 31 15:24:05.982880: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.982884: | length: 68 (00 00 00 44) Oct 31 15:24:05.982887: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.982891: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.982894: | #null state always idle Oct 31 15:24:05.982898: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.982901: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.982904: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.982907: | length: 40 (00 28) Oct 31 15:24:05.982909: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.982912: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.982915: | in statetime_start() with no state Oct 31 15:24:05.982921: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.982927: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.982930: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.982933: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.982936: | find_next_host_connection returns "test" Oct 31 15:24:05.982938: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.982940: | find_next_host_connection returns Oct 31 15:24:05.982965: | newref alloc logger@0x56551f0f7880(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.982969: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.982971: | creating state object #28 at 0x56551f0f6c00 Oct 31 15:24:05.982974: | State DB: adding IKEv1 state #28 in UNDEFINED Oct 31 15:24:05.982979: | pstats #28 ikev1.isakmp started Oct 31 15:24:05.982984: | #28 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.982991: | start processing: state #28 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.982995: | parent state #28: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.982998: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.983000: | ICOOKIE-DUMP: Oct 31 15:24:05.983002: | cb 61 c2 60 b0 d0 8d 13 Oct 31 15:24:05.983006: "test" #28: responding to Main Mode Oct 31 15:24:05.983010: | opening output PBS reply packet Oct 31 15:24:05.983013: | **emit ISAKMP Message: Oct 31 15:24:05.983020: | initiator SPI: cb 61 c2 60 b0 d0 8d 13 Oct 31 15:24:05.983023: | responder SPI: 6c 88 48 6c 62 84 1a 76 Oct 31 15:24:05.983026: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.983037: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.983040: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.983042: | flags: none (0x0) Oct 31 15:24:05.983046: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.983049: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.983052: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.983054: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.983056: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.983059: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.983062: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.983066: | ****parse IPsec DOI SIT: Oct 31 15:24:05.983068: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.983071: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.983074: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.983077: | length: 28 (00 1c) Oct 31 15:24:05.983080: | proposal number: 1 (01) Oct 31 15:24:05.983082: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.983084: | SPI size: 0 (00) Oct 31 15:24:05.983087: | number of transforms: 1 (01) Oct 31 15:24:05.983089: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.983092: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.983095: | length: 20 (00 14) Oct 31 15:24:05.983098: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.983100: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.983103: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.983106: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:05.983109: | length/value: 10 (00 0a) Oct 31 15:24:05.983114: "test" #28: 10?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:05.983116: "test" #28: no acceptable Oakley Transform Oct 31 15:24:05.983119: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.983124: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.983133: | #28 is idle Oct 31 15:24:05.983395: "test" #28: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.983403: | opening output PBS notification msg Oct 31 15:24:05.983406: | **emit ISAKMP Message: Oct 31 15:24:05.983410: | initiator SPI: cb 61 c2 60 b0 d0 8d 13 Oct 31 15:24:05.983414: | responder SPI: 6c 88 48 6c 62 84 1a 76 Oct 31 15:24:05.983416: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.983419: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.983421: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.983423: | flags: none (0x0) Oct 31 15:24:05.983427: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.983430: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.983433: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.983435: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.983437: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.983440: | protocol ID: 1 (01) Oct 31 15:24:05.983442: | SPI size: 0 (00) Oct 31 15:24:05.983444: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.983447: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.983449: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.983452: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.983454: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.983464: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #28) Oct 31 15:24:05.983466: | cb 61 c2 60 b0 d0 8d 13 6c 88 48 6c 62 84 1a 76 Oct 31 15:24:05.983468: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.983471: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.983501: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.983508: | stop processing: state #28 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.983512: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.983515: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.983517: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.983520: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.983526: | spent 0.502 (0.733) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.995916: | spent 0 (0.00241) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.995937: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.995943: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.995950: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.995954: | 67 9d 27 8f cc c7 3e c5 00 00 00 00 00 00 00 00 Oct 31 15:24:05.995956: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:05.995958: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:05.995961: | 00 00 00 14 01 01 00 00 80 01 00 19 80 03 00 15 Oct 31 15:24:05.995963: | 80 04 00 0a Oct 31 15:24:05.995968: | **parse ISAKMP Message: Oct 31 15:24:05.995974: | initiator SPI: 67 9d 27 8f cc c7 3e c5 Oct 31 15:24:05.995978: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.995982: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.995985: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.995988: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.995991: | flags: none (0x0) Oct 31 15:24:05.995993: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.995996: | length: 68 (00 00 00 44) Oct 31 15:24:05.995998: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.996001: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.996002: | #null state always idle Oct 31 15:24:05.996005: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:05.996008: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:05.996009: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996011: | length: 40 (00 28) Oct 31 15:24:05.996013: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.996015: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:05.996016: | in statetime_start() with no state Oct 31 15:24:05.996020: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:05.996024: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:05.996026: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.996028: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:05.996030: | find_next_host_connection returns "test" Oct 31 15:24:05.996031: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:05.996033: | find_next_host_connection returns Oct 31 15:24:05.996056: | newref alloc logger@0x56551f0f8550(0->1) (in new_state() at state.c:576) Oct 31 15:24:05.996059: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:05.996061: | creating state object #29 at 0x56551f0f78d0 Oct 31 15:24:05.996063: | State DB: adding IKEv1 state #29 in UNDEFINED Oct 31 15:24:05.996066: | pstats #29 ikev1.isakmp started Oct 31 15:24:05.996069: | #29 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.996076: | start processing: state #29 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:05.996078: | parent state #29: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:05.996081: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:05.996082: | ICOOKIE-DUMP: Oct 31 15:24:05.996084: | 67 9d 27 8f cc c7 3e c5 Oct 31 15:24:05.996086: "test" #29: responding to Main Mode Oct 31 15:24:05.996090: | opening output PBS reply packet Oct 31 15:24:05.996092: | **emit ISAKMP Message: Oct 31 15:24:05.996095: | initiator SPI: 67 9d 27 8f cc c7 3e c5 Oct 31 15:24:05.996097: | responder SPI: bf 5f ff 6d b7 25 9b fc Oct 31 15:24:05.996098: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996100: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.996101: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.996103: | flags: none (0x0) Oct 31 15:24:05.996105: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.996107: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.996109: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:05.996111: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996112: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.996114: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:05.996116: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:05.996118: | ****parse IPsec DOI SIT: Oct 31 15:24:05.996119: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:05.996121: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:05.996123: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996125: | length: 28 (00 1c) Oct 31 15:24:05.996126: | proposal number: 1 (01) Oct 31 15:24:05.996128: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:05.996130: | SPI size: 0 (00) Oct 31 15:24:05.996131: | number of transforms: 1 (01) Oct 31 15:24:05.996133: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:05.996135: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996136: | length: 20 (00 14) Oct 31 15:24:05.996138: | ISAKMP transform number: 1 (01) Oct 31 15:24:05.996139: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:05.996141: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:05.996143: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:05.996145: | length/value: 25 (00 19) Oct 31 15:24:05.996147: | [25 is OAKLEY_CAMELLIA_CCM_A] Oct 31 15:24:05.996150: "test" #29: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:05.996152: "test" #29: no acceptable Oakley Transform Oct 31 15:24:05.996154: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:05.996157: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:05.996158: | #29 is idle Oct 31 15:24:05.996443: "test" #29: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:05.996449: | opening output PBS notification msg Oct 31 15:24:05.996451: | **emit ISAKMP Message: Oct 31 15:24:05.996454: | initiator SPI: 67 9d 27 8f cc c7 3e c5 Oct 31 15:24:05.996457: | responder SPI: bf 5f ff 6d b7 25 9b fc Oct 31 15:24:05.996459: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996460: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.996462: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.996464: | flags: none (0x0) Oct 31 15:24:05.996466: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.996468: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.996470: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.996475: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.996476: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.996478: | protocol ID: 1 (01) Oct 31 15:24:05.996480: | SPI size: 0 (00) Oct 31 15:24:05.996481: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:05.996483: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.996485: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.996487: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.996489: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.996494: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #29) Oct 31 15:24:05.996495: | 67 9d 27 8f cc c7 3e c5 bf 5f ff 6d b7 25 9b fc Oct 31 15:24:05.996497: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.996499: | 00 00 00 01 01 00 00 0e Oct 31 15:24:05.996527: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:05.996536: | stop processing: state #29 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:05.996540: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.996543: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.996546: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.996548: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.996554: | spent 0.391 (0.647) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.008828: | spent 0 (0.0028) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.008854: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.008860: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.008868: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.008871: | 94 f7 6c da a4 ce a8 50 00 00 00 00 00 00 00 00 Oct 31 15:24:06.008873: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.008876: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.008879: | 00 00 00 14 01 01 00 00 80 01 00 19 80 02 00 0a Oct 31 15:24:06.008881: | 80 04 00 0a Oct 31 15:24:06.008886: | **parse ISAKMP Message: Oct 31 15:24:06.008891: | initiator SPI: 94 f7 6c da a4 ce a8 50 Oct 31 15:24:06.008896: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.008903: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.008906: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.008909: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.008911: | flags: none (0x0) Oct 31 15:24:06.008916: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.008920: | length: 68 (00 00 00 44) Oct 31 15:24:06.008923: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.008927: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.008930: | #null state always idle Oct 31 15:24:06.008934: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.008938: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.008941: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.008944: | length: 40 (00 28) Oct 31 15:24:06.008947: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.008950: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.008953: | in statetime_start() with no state Oct 31 15:24:06.008959: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.008966: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.008970: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.008977: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.008980: | find_next_host_connection returns "test" Oct 31 15:24:06.008982: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.008985: | find_next_host_connection returns Oct 31 15:24:06.009008: | newref alloc logger@0x56551f0f9220(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.009014: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.009017: | creating state object #30 at 0x56551f0f85a0 Oct 31 15:24:06.009019: | State DB: adding IKEv1 state #30 in UNDEFINED Oct 31 15:24:06.009026: | pstats #30 ikev1.isakmp started Oct 31 15:24:06.009031: | #30 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.009038: | start processing: state #30 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.009042: | parent state #30: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.009046: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.009048: | ICOOKIE-DUMP: Oct 31 15:24:06.009051: | 94 f7 6c da a4 ce a8 50 Oct 31 15:24:06.009054: "test" #30: responding to Main Mode Oct 31 15:24:06.009060: | opening output PBS reply packet Oct 31 15:24:06.009063: | **emit ISAKMP Message: Oct 31 15:24:06.009067: | initiator SPI: 94 f7 6c da a4 ce a8 50 Oct 31 15:24:06.009071: | responder SPI: b3 09 a0 e1 ed 73 c5 1f Oct 31 15:24:06.009074: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.009076: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.009079: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.009081: | flags: none (0x0) Oct 31 15:24:06.009085: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.009089: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.009092: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.009095: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.009097: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.009100: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.009103: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.009107: | ****parse IPsec DOI SIT: Oct 31 15:24:06.009109: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.009112: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.009115: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.009118: | length: 28 (00 1c) Oct 31 15:24:06.009121: | proposal number: 1 (01) Oct 31 15:24:06.009123: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.009126: | SPI size: 0 (00) Oct 31 15:24:06.009129: | number of transforms: 1 (01) Oct 31 15:24:06.009132: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.009134: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.009137: | length: 20 (00 14) Oct 31 15:24:06.009139: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.009142: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.009145: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.009148: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.009152: | length/value: 25 (00 19) Oct 31 15:24:06.009154: | [25 is OAKLEY_CAMELLIA_CCM_A] Oct 31 15:24:06.009159: "test" #30: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.009163: "test" #30: no acceptable Oakley Transform Oct 31 15:24:06.009166: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.009171: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.009174: | #30 is idle Oct 31 15:24:06.009496: "test" #30: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.009506: | opening output PBS notification msg Oct 31 15:24:06.009508: | **emit ISAKMP Message: Oct 31 15:24:06.009511: | initiator SPI: 94 f7 6c da a4 ce a8 50 Oct 31 15:24:06.009513: | responder SPI: b3 09 a0 e1 ed 73 c5 1f Oct 31 15:24:06.009515: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.009517: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.009519: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.009520: | flags: none (0x0) Oct 31 15:24:06.009522: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.009524: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.009527: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.009528: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.009530: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.009532: | protocol ID: 1 (01) Oct 31 15:24:06.009533: | SPI size: 0 (00) Oct 31 15:24:06.009535: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.009537: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.009538: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.009540: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.009542: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.009547: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #30) Oct 31 15:24:06.009549: | 94 f7 6c da a4 ce a8 50 b3 09 a0 e1 ed 73 c5 1f Oct 31 15:24:06.009550: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.009552: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.009581: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.009590: | stop processing: state #30 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.009595: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.009598: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.009600: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.009603: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.009609: | spent 0.517 (0.792) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.055932: | spent 0.00263 (0.00263) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.055955: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.055960: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.055969: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.055972: | 8a c8 68 c2 af 5e a6 33 00 00 00 00 00 00 00 00 Oct 31 15:24:06.055974: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.055976: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.055978: | 00 00 00 14 01 01 00 00 80 01 00 19 80 02 00 0a Oct 31 15:24:06.055980: | 80 03 00 15 Oct 31 15:24:06.055987: | **parse ISAKMP Message: Oct 31 15:24:06.055991: | initiator SPI: 8a c8 68 c2 af 5e a6 33 Oct 31 15:24:06.055995: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.055998: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.056001: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.056004: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.056006: | flags: none (0x0) Oct 31 15:24:06.056010: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.056013: | length: 68 (00 00 00 44) Oct 31 15:24:06.056016: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.056021: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.056024: | #null state always idle Oct 31 15:24:06.056028: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.056035: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.056037: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.056042: | length: 40 (00 28) Oct 31 15:24:06.056046: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.056049: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.056053: | in statetime_start() with no state Oct 31 15:24:06.056060: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.056066: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.056069: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.056072: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.056075: | find_next_host_connection returns "test" Oct 31 15:24:06.056077: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.056080: | find_next_host_connection returns Oct 31 15:24:06.056109: | newref alloc logger@0x56551f0f9ef0(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.056114: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.056117: | creating state object #31 at 0x56551f0f9270 Oct 31 15:24:06.056120: | State DB: adding IKEv1 state #31 in UNDEFINED Oct 31 15:24:06.056126: | pstats #31 ikev1.isakmp started Oct 31 15:24:06.056131: | #31 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.056139: | start processing: state #31 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.056143: | parent state #31: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.056147: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.056149: | ICOOKIE-DUMP: Oct 31 15:24:06.056152: | 8a c8 68 c2 af 5e a6 33 Oct 31 15:24:06.056156: "test" #31: responding to Main Mode Oct 31 15:24:06.056245: | opening output PBS reply packet Oct 31 15:24:06.056254: | **emit ISAKMP Message: Oct 31 15:24:06.056260: | initiator SPI: 8a c8 68 c2 af 5e a6 33 Oct 31 15:24:06.056264: | responder SPI: a6 42 16 eb 82 f1 e1 00 Oct 31 15:24:06.056267: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.056270: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.056273: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.056276: | flags: none (0x0) Oct 31 15:24:06.056280: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.056283: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.056286: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.056291: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.056294: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.056298: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.056300: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.056304: | ****parse IPsec DOI SIT: Oct 31 15:24:06.056306: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.056309: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.056312: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.056315: | length: 28 (00 1c) Oct 31 15:24:06.056318: | proposal number: 1 (01) Oct 31 15:24:06.056321: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.056323: | SPI size: 0 (00) Oct 31 15:24:06.056326: | number of transforms: 1 (01) Oct 31 15:24:06.056329: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.056332: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.056335: | length: 20 (00 14) Oct 31 15:24:06.056338: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.056341: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.056345: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.056350: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.056353: | length/value: 25 (00 19) Oct 31 15:24:06.056356: | [25 is OAKLEY_CAMELLIA_CCM_A] Oct 31 15:24:06.056364: "test" #31: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.056367: "test" #31: no acceptable Oakley Transform Oct 31 15:24:06.056370: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.056376: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.056379: | #31 is idle Oct 31 15:24:06.057151: "test" #31: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.057161: | opening output PBS notification msg Oct 31 15:24:06.057165: | **emit ISAKMP Message: Oct 31 15:24:06.057170: | initiator SPI: 8a c8 68 c2 af 5e a6 33 Oct 31 15:24:06.057174: | responder SPI: a6 42 16 eb 82 f1 e1 00 Oct 31 15:24:06.057177: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.057180: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.057182: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.057185: | flags: none (0x0) Oct 31 15:24:06.057188: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.057191: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.057194: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.057197: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.057302: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.057308: | protocol ID: 1 (01) Oct 31 15:24:06.057311: | SPI size: 0 (00) Oct 31 15:24:06.057314: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.057317: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.057320: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.057324: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.057326: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.057336: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #31) Oct 31 15:24:06.057341: | 8a c8 68 c2 af 5e a6 33 a6 42 16 eb 82 f1 e1 00 Oct 31 15:24:06.057344: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.057346: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.057389: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.057398: | stop processing: state #31 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.057403: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.057409: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.057413: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.057415: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.057424: | spent 0.618 (1.5) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.074455: | spent 0 (0.00237) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.074475: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.074479: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.074485: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.074487: | f3 78 50 09 07 6d 13 03 00 00 00 00 00 00 00 00 Oct 31 15:24:06.074489: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:06.074490: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:06.074491: | 00 00 00 18 01 01 00 00 80 01 00 12 80 02 00 13 Oct 31 15:24:06.074493: | 80 03 00 07 80 04 00 1c Oct 31 15:24:06.074497: | **parse ISAKMP Message: Oct 31 15:24:06.074500: | initiator SPI: f3 78 50 09 07 6d 13 03 Oct 31 15:24:06.074507: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.074509: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.074511: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.074513: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.074515: | flags: none (0x0) Oct 31 15:24:06.074517: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.074519: | length: 72 (00 00 00 48) Oct 31 15:24:06.074521: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.074526: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.074531: | #null state always idle Oct 31 15:24:06.074535: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.074539: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.074541: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.074545: | length: 44 (00 2c) Oct 31 15:24:06.074548: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.074551: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.074554: | in statetime_start() with no state Oct 31 15:24:06.074561: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.074568: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.074571: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.074573: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.074575: | find_next_host_connection returns "test" Oct 31 15:24:06.074576: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.074578: | find_next_host_connection returns Oct 31 15:24:06.074603: | newref alloc logger@0x56551f0fabc0(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.074605: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.074607: | creating state object #32 at 0x56551f0f9f40 Oct 31 15:24:06.074609: | State DB: adding IKEv1 state #32 in UNDEFINED Oct 31 15:24:06.074613: | pstats #32 ikev1.isakmp started Oct 31 15:24:06.074616: | #32 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.074621: | start processing: state #32 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.074623: | parent state #32: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.074625: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.074627: | ICOOKIE-DUMP: Oct 31 15:24:06.074628: | f3 78 50 09 07 6d 13 03 Oct 31 15:24:06.074631: "test" #32: responding to Main Mode Oct 31 15:24:06.074636: | opening output PBS reply packet Oct 31 15:24:06.074639: | **emit ISAKMP Message: Oct 31 15:24:06.074643: | initiator SPI: f3 78 50 09 07 6d 13 03 Oct 31 15:24:06.074646: | responder SPI: 4a 26 72 19 8a 7e 7e 0a Oct 31 15:24:06.074649: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.074651: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.074654: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.074656: | flags: none (0x0) Oct 31 15:24:06.074659: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.074662: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.074666: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.074668: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.074670: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.074674: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.074677: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.074681: | ****parse IPsec DOI SIT: Oct 31 15:24:06.074684: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.074687: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.074691: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.074694: | length: 32 (00 20) Oct 31 15:24:06.074697: | proposal number: 1 (01) Oct 31 15:24:06.074699: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.074702: | SPI size: 0 (00) Oct 31 15:24:06.074704: | number of transforms: 1 (01) Oct 31 15:24:06.074707: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.074709: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.074712: | length: 24 (00 18) Oct 31 15:24:06.074714: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.074716: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.074720: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.074722: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.074725: | length/value: 18 (00 12) Oct 31 15:24:06.074727: | [18 is OAKLEY_AES_GCM_A] Oct 31 15:24:06.074732: "test" #32: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.074734: "test" #32: no acceptable Oakley Transform Oct 31 15:24:06.074737: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.074742: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.074745: | #32 is idle Oct 31 15:24:06.075053: "test" #32: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.075060: | opening output PBS notification msg Oct 31 15:24:06.075063: | **emit ISAKMP Message: Oct 31 15:24:06.075067: | initiator SPI: f3 78 50 09 07 6d 13 03 Oct 31 15:24:06.075071: | responder SPI: 4a 26 72 19 8a 7e 7e 0a Oct 31 15:24:06.075074: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.075077: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.075079: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.075082: | flags: none (0x0) Oct 31 15:24:06.075085: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.075088: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.075092: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.075095: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.075097: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.075100: | protocol ID: 1 (01) Oct 31 15:24:06.075104: | SPI size: 0 (00) Oct 31 15:24:06.075106: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.075110: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.075112: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.075114: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.075115: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.075121: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #32) Oct 31 15:24:06.075123: | f3 78 50 09 07 6d 13 03 4a 26 72 19 8a 7e 7e 0a Oct 31 15:24:06.075127: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.075131: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.075163: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.075171: | stop processing: state #32 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.075176: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.075179: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.075184: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.075188: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.075196: | spent 0.476 (0.749) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.089763: | spent 0 (0.00278) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.089794: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.089799: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.089806: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.089809: | c6 f9 5b 87 0f 9d 01 e0 00 00 00 00 00 00 00 00 Oct 31 15:24:06.089812: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.089814: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.089816: | 00 00 00 14 01 01 00 00 80 02 00 13 80 03 00 07 Oct 31 15:24:06.089818: | 80 04 00 1c Oct 31 15:24:06.089823: | **parse ISAKMP Message: Oct 31 15:24:06.089828: | initiator SPI: c6 f9 5b 87 0f 9d 01 e0 Oct 31 15:24:06.089833: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.089837: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.089840: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.089842: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.089845: | flags: none (0x0) Oct 31 15:24:06.089849: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.089853: | length: 68 (00 00 00 44) Oct 31 15:24:06.089856: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.089860: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.089862: | #null state always idle Oct 31 15:24:06.089867: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.089870: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.089873: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.089876: | length: 40 (00 28) Oct 31 15:24:06.089878: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.089881: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.089884: | in statetime_start() with no state Oct 31 15:24:06.089890: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.089896: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.089899: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.089902: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.089904: | find_next_host_connection returns "test" Oct 31 15:24:06.089907: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.089909: | find_next_host_connection returns Oct 31 15:24:06.089939: | newref alloc logger@0x56551f0fb890(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.089943: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.089946: | creating state object #33 at 0x56551f0fac10 Oct 31 15:24:06.089949: | State DB: adding IKEv1 state #33 in UNDEFINED Oct 31 15:24:06.089955: | pstats #33 ikev1.isakmp started Oct 31 15:24:06.089961: | #33 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.089968: | start processing: state #33 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.089972: | parent state #33: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.089975: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.089978: | ICOOKIE-DUMP: Oct 31 15:24:06.089980: | c6 f9 5b 87 0f 9d 01 e0 Oct 31 15:24:06.089984: "test" #33: responding to Main Mode Oct 31 15:24:06.089990: | opening output PBS reply packet Oct 31 15:24:06.089993: | **emit ISAKMP Message: Oct 31 15:24:06.089998: | initiator SPI: c6 f9 5b 87 0f 9d 01 e0 Oct 31 15:24:06.090002: | responder SPI: 1f e1 40 1b 8c 56 99 48 Oct 31 15:24:06.090004: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.090007: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.090009: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.090012: | flags: none (0x0) Oct 31 15:24:06.090016: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.090019: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.090025: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.090028: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.090031: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.090034: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.090037: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.090040: | ****parse IPsec DOI SIT: Oct 31 15:24:06.090043: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.090047: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.090049: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.090052: | length: 28 (00 1c) Oct 31 15:24:06.090055: | proposal number: 1 (01) Oct 31 15:24:06.090058: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.090061: | SPI size: 0 (00) Oct 31 15:24:06.090064: | number of transforms: 1 (01) Oct 31 15:24:06.090067: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.090069: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.090073: | length: 20 (00 14) Oct 31 15:24:06.090076: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.090078: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.090081: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.090084: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:06.090087: | length/value: 19 (00 13) Oct 31 15:24:06.090093: "test" #33: 19?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:06.090096: "test" #33: no acceptable Oakley Transform Oct 31 15:24:06.090099: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.090105: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.090109: | #33 is idle Oct 31 15:24:06.090367: "test" #33: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.090376: | opening output PBS notification msg Oct 31 15:24:06.090379: | **emit ISAKMP Message: Oct 31 15:24:06.090384: | initiator SPI: c6 f9 5b 87 0f 9d 01 e0 Oct 31 15:24:06.090388: | responder SPI: 1f e1 40 1b 8c 56 99 48 Oct 31 15:24:06.090390: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.090393: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.090395: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.090398: | flags: none (0x0) Oct 31 15:24:06.090402: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.090404: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.090408: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.090410: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.090413: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.090416: | protocol ID: 1 (01) Oct 31 15:24:06.090419: | SPI size: 0 (00) Oct 31 15:24:06.090421: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.090424: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.090426: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.090429: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.090432: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.090439: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #33) Oct 31 15:24:06.090442: | c6 f9 5b 87 0f 9d 01 e0 1f e1 40 1b 8c 56 99 48 Oct 31 15:24:06.090444: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.090446: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.090470: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.090477: | stop processing: state #33 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.090483: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.090486: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.090489: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.090491: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.090497: | spent 0.529 (0.744) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.109658: | spent 0 (0.00313) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.109682: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.109687: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.109694: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.109697: | b4 f6 4c ed ef f3 d1 c3 00 00 00 00 00 00 00 00 Oct 31 15:24:06.109699: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.109701: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.109703: | 00 00 00 14 01 01 00 00 80 01 00 12 80 03 00 07 Oct 31 15:24:06.109705: | 80 04 00 1c Oct 31 15:24:06.109711: | **parse ISAKMP Message: Oct 31 15:24:06.109716: | initiator SPI: b4 f6 4c ed ef f3 d1 c3 Oct 31 15:24:06.109720: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.109724: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.109726: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.109728: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.109731: | flags: none (0x0) Oct 31 15:24:06.109734: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.109737: | length: 68 (00 00 00 44) Oct 31 15:24:06.109740: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.109743: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.109745: | #null state always idle Oct 31 15:24:06.109749: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.109752: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.109754: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.109757: | length: 40 (00 28) Oct 31 15:24:06.109759: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.109761: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.109763: | in statetime_start() with no state Oct 31 15:24:06.109768: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.109773: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.109776: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.109779: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.109782: | find_next_host_connection returns "test" Oct 31 15:24:06.109784: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.109786: | find_next_host_connection returns Oct 31 15:24:06.109818: | newref alloc logger@0x56551f0fc560(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.109822: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.109825: | creating state object #34 at 0x56551f0fb8e0 Oct 31 15:24:06.109828: | State DB: adding IKEv1 state #34 in UNDEFINED Oct 31 15:24:06.109834: | pstats #34 ikev1.isakmp started Oct 31 15:24:06.109840: | #34 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.109847: | start processing: state #34 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.109851: | parent state #34: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.109854: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.109856: | ICOOKIE-DUMP: Oct 31 15:24:06.109858: | b4 f6 4c ed ef f3 d1 c3 Oct 31 15:24:06.109865: "test" #34: responding to Main Mode Oct 31 15:24:06.109870: | opening output PBS reply packet Oct 31 15:24:06.109873: | **emit ISAKMP Message: Oct 31 15:24:06.109877: | initiator SPI: b4 f6 4c ed ef f3 d1 c3 Oct 31 15:24:06.109881: | responder SPI: 01 64 1d 05 65 01 85 6e Oct 31 15:24:06.109884: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.109886: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.109889: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.109891: | flags: none (0x0) Oct 31 15:24:06.109894: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.109898: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.109901: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.109903: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.109906: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.109909: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.109911: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.109915: | ****parse IPsec DOI SIT: Oct 31 15:24:06.109917: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.109920: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.109922: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.109925: | length: 28 (00 1c) Oct 31 15:24:06.109928: | proposal number: 1 (01) Oct 31 15:24:06.109930: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.109933: | SPI size: 0 (00) Oct 31 15:24:06.109935: | number of transforms: 1 (01) Oct 31 15:24:06.109938: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.109940: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.109943: | length: 20 (00 14) Oct 31 15:24:06.109945: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.109948: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.109951: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.109954: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.109957: | length/value: 18 (00 12) Oct 31 15:24:06.109960: | [18 is OAKLEY_AES_GCM_A] Oct 31 15:24:06.109964: "test" #34: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.109968: "test" #34: no acceptable Oakley Transform Oct 31 15:24:06.109970: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.109976: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.109978: | #34 is idle Oct 31 15:24:06.110251: "test" #34: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.110259: | opening output PBS notification msg Oct 31 15:24:06.110263: | **emit ISAKMP Message: Oct 31 15:24:06.110268: | initiator SPI: b4 f6 4c ed ef f3 d1 c3 Oct 31 15:24:06.110272: | responder SPI: 01 64 1d 05 65 01 85 6e Oct 31 15:24:06.110275: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.110277: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.110280: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.110282: | flags: none (0x0) Oct 31 15:24:06.110286: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.110289: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.110292: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.110295: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.110297: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.110300: | protocol ID: 1 (01) Oct 31 15:24:06.110303: | SPI size: 0 (00) Oct 31 15:24:06.110305: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.110308: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.110311: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.110317: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.110319: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.110326: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #34) Oct 31 15:24:06.110329: | b4 f6 4c ed ef f3 d1 c3 01 64 1d 05 65 01 85 6e Oct 31 15:24:06.110331: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.110333: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.110361: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.110368: | stop processing: state #34 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.110372: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.110375: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.110378: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.110380: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.110386: | spent 0.51 (0.738) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.130242: | spent 0.00289 (0.00286) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.130265: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.130270: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.130277: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.130280: | 2d 7b 6f cb 9f 42 74 23 00 00 00 00 00 00 00 00 Oct 31 15:24:06.130282: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.130284: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.130287: | 00 00 00 14 01 01 00 00 80 01 00 12 80 02 00 13 Oct 31 15:24:06.130289: | 80 04 00 1c Oct 31 15:24:06.130294: | **parse ISAKMP Message: Oct 31 15:24:06.130300: | initiator SPI: 2d 7b 6f cb 9f 42 74 23 Oct 31 15:24:06.130304: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.130307: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.130310: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.130313: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.130316: | flags: none (0x0) Oct 31 15:24:06.130320: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.130324: | length: 68 (00 00 00 44) Oct 31 15:24:06.130327: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.130331: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.130334: | #null state always idle Oct 31 15:24:06.130338: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.130341: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.130344: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.130347: | length: 40 (00 28) Oct 31 15:24:06.130349: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.130352: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.130355: | in statetime_start() with no state Oct 31 15:24:06.130362: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.130368: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.130372: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.130375: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.130378: | find_next_host_connection returns "test" Oct 31 15:24:06.130380: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.130382: | find_next_host_connection returns Oct 31 15:24:06.130408: | newref alloc logger@0x56551f0fd230(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.130412: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.130418: | creating state object #35 at 0x56551f0fc5b0 Oct 31 15:24:06.130421: | State DB: adding IKEv1 state #35 in UNDEFINED Oct 31 15:24:06.130426: | pstats #35 ikev1.isakmp started Oct 31 15:24:06.130431: | #35 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.130438: | start processing: state #35 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.130442: | parent state #35: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.130446: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.130449: | ICOOKIE-DUMP: Oct 31 15:24:06.130451: | 2d 7b 6f cb 9f 42 74 23 Oct 31 15:24:06.130455: "test" #35: responding to Main Mode Oct 31 15:24:06.130460: | opening output PBS reply packet Oct 31 15:24:06.130463: | **emit ISAKMP Message: Oct 31 15:24:06.130468: | initiator SPI: 2d 7b 6f cb 9f 42 74 23 Oct 31 15:24:06.130472: | responder SPI: d1 d4 c5 20 9b bf 9e 1b Oct 31 15:24:06.130475: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.130478: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.130481: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.130483: | flags: none (0x0) Oct 31 15:24:06.130487: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.130492: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.130496: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.130498: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.130501: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.130504: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.130506: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.130510: | ****parse IPsec DOI SIT: Oct 31 15:24:06.130513: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.130515: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.130518: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.130521: | length: 28 (00 1c) Oct 31 15:24:06.130524: | proposal number: 1 (01) Oct 31 15:24:06.130526: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.130529: | SPI size: 0 (00) Oct 31 15:24:06.130531: | number of transforms: 1 (01) Oct 31 15:24:06.130533: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.130535: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.130538: | length: 20 (00 14) Oct 31 15:24:06.130540: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.130542: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.130544: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.130547: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.130549: | length/value: 18 (00 12) Oct 31 15:24:06.130551: | [18 is OAKLEY_AES_GCM_A] Oct 31 15:24:06.130555: "test" #35: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.130558: "test" #35: no acceptable Oakley Transform Oct 31 15:24:06.130561: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.130565: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.130567: | #35 is idle Oct 31 15:24:06.131602: "test" #35: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.131620: | opening output PBS notification msg Oct 31 15:24:06.131624: | **emit ISAKMP Message: Oct 31 15:24:06.131628: | initiator SPI: 2d 7b 6f cb 9f 42 74 23 Oct 31 15:24:06.131645: | responder SPI: d1 d4 c5 20 9b bf 9e 1b Oct 31 15:24:06.131648: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.131651: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.131653: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.131656: | flags: none (0x0) Oct 31 15:24:06.131662: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.131665: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.131668: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.131670: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.131673: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.131675: | protocol ID: 1 (01) Oct 31 15:24:06.131678: | SPI size: 0 (00) Oct 31 15:24:06.131680: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.131683: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.131685: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.131688: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.131690: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.131697: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #35) Oct 31 15:24:06.131699: | 2d 7b 6f cb 9f 42 74 23 d1 d4 c5 20 9b bf 9e 1b Oct 31 15:24:06.131702: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.131704: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.131735: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.131742: | stop processing: state #35 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.131747: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.131749: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.131752: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.131754: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.131760: | spent 0.527 (1.53) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.143976: | spent 0.00275 (0.00274) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.144000: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.144005: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.144012: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.144016: | fe 14 c3 5a 26 8f 71 4d 00 00 00 00 00 00 00 00 Oct 31 15:24:06.144019: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.144021: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.144024: | 00 00 00 14 01 01 00 00 80 01 00 12 80 02 00 13 Oct 31 15:24:06.144026: | 80 03 00 07 Oct 31 15:24:06.144032: | **parse ISAKMP Message: Oct 31 15:24:06.144035: | initiator SPI: fe 14 c3 5a 26 8f 71 4d Oct 31 15:24:06.144038: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.144041: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.144042: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.144044: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.144046: | flags: none (0x0) Oct 31 15:24:06.144048: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.144051: | length: 68 (00 00 00 44) Oct 31 15:24:06.144052: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.144056: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.144058: | #null state always idle Oct 31 15:24:06.144060: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.144063: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.144064: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144066: | length: 40 (00 28) Oct 31 15:24:06.144068: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.144070: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.144072: | in statetime_start() with no state Oct 31 15:24:06.144076: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.144083: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.144085: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.144087: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.144089: | find_next_host_connection returns "test" Oct 31 15:24:06.144091: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.144092: | find_next_host_connection returns Oct 31 15:24:06.144115: | newref alloc logger@0x56551f0fdf00(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.144118: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.144120: | creating state object #36 at 0x56551f0fd280 Oct 31 15:24:06.144121: | State DB: adding IKEv1 state #36 in UNDEFINED Oct 31 15:24:06.144125: | pstats #36 ikev1.isakmp started Oct 31 15:24:06.144128: | #36 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.144132: | start processing: state #36 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.144135: | parent state #36: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.144137: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.144139: | ICOOKIE-DUMP: Oct 31 15:24:06.144140: | fe 14 c3 5a 26 8f 71 4d Oct 31 15:24:06.144142: "test" #36: responding to Main Mode Oct 31 15:24:06.144146: | opening output PBS reply packet Oct 31 15:24:06.144148: | **emit ISAKMP Message: Oct 31 15:24:06.144151: | initiator SPI: fe 14 c3 5a 26 8f 71 4d Oct 31 15:24:06.144153: | responder SPI: 54 2d e2 16 37 0d 9a 9d Oct 31 15:24:06.144154: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144156: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.144158: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.144159: | flags: none (0x0) Oct 31 15:24:06.144161: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.144163: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.144165: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.144167: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144168: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.144170: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.144172: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.144174: | ****parse IPsec DOI SIT: Oct 31 15:24:06.144176: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.144178: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.144179: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144181: | length: 28 (00 1c) Oct 31 15:24:06.144183: | proposal number: 1 (01) Oct 31 15:24:06.144184: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.144186: | SPI size: 0 (00) Oct 31 15:24:06.144188: | number of transforms: 1 (01) Oct 31 15:24:06.144190: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.144191: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144193: | length: 20 (00 14) Oct 31 15:24:06.144194: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.144196: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.144214: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.144223: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.144227: | length/value: 18 (00 12) Oct 31 15:24:06.144230: | [18 is OAKLEY_AES_GCM_A] Oct 31 15:24:06.144234: "test" #36: OAKLEY_AES_GCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.144238: "test" #36: no acceptable Oakley Transform Oct 31 15:24:06.144241: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.144246: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.144251: | #36 is idle Oct 31 15:24:06.144319: "test" #36: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.144327: | opening output PBS notification msg Oct 31 15:24:06.144330: | **emit ISAKMP Message: Oct 31 15:24:06.144335: | initiator SPI: fe 14 c3 5a 26 8f 71 4d Oct 31 15:24:06.144339: | responder SPI: 54 2d e2 16 37 0d 9a 9d Oct 31 15:24:06.144342: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144345: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.144347: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.144350: | flags: none (0x0) Oct 31 15:24:06.144354: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.144357: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.144360: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.144363: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.144366: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.144369: | protocol ID: 1 (01) Oct 31 15:24:06.144371: | SPI size: 0 (00) Oct 31 15:24:06.144374: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.144377: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.144379: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.144382: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.144385: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.144394: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #36) Oct 31 15:24:06.144399: | fe 14 c3 5a 26 8f 71 4d 54 2d e2 16 37 0d 9a 9d Oct 31 15:24:06.144401: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.144404: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.144501: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.144515: | stop processing: state #36 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.144520: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.144523: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.144526: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.144529: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.144535: | spent 0.474 (0.571) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.153308: | spent 0.00273 (0.0027) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.153337: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.153343: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.153351: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.153354: | 35 31 84 a1 ad 11 1f 21 00 00 00 00 00 00 00 00 Oct 31 15:24:06.153357: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:06.153359: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:06.153361: | 00 00 00 18 01 01 00 00 80 01 00 0e 80 02 00 18 Oct 31 15:24:06.153363: | 80 03 00 0a 80 04 00 1d Oct 31 15:24:06.153369: | **parse ISAKMP Message: Oct 31 15:24:06.153375: | initiator SPI: 35 31 84 a1 ad 11 1f 21 Oct 31 15:24:06.153380: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.153383: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.153386: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.153389: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.153392: | flags: none (0x0) Oct 31 15:24:06.153396: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.153399: | length: 72 (00 00 00 48) Oct 31 15:24:06.153407: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.153411: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.153414: | #null state always idle Oct 31 15:24:06.153418: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.153422: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.153425: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153428: | length: 44 (00 2c) Oct 31 15:24:06.153430: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.153433: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.153437: | in statetime_start() with no state Oct 31 15:24:06.153444: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.153450: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.153453: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.153457: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.153459: | find_next_host_connection returns "test" Oct 31 15:24:06.153462: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.153464: | find_next_host_connection returns Oct 31 15:24:06.153495: | newref alloc logger@0x56551f0febd0(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.153499: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.153502: | creating state object #37 at 0x56551f0fdf50 Oct 31 15:24:06.153506: | State DB: adding IKEv1 state #37 in UNDEFINED Oct 31 15:24:06.153513: | pstats #37 ikev1.isakmp started Oct 31 15:24:06.153519: | #37 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.153526: | start processing: state #37 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.153530: | parent state #37: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.153533: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.153536: | ICOOKIE-DUMP: Oct 31 15:24:06.153538: | 35 31 84 a1 ad 11 1f 21 Oct 31 15:24:06.153542: "test" #37: responding to Main Mode Oct 31 15:24:06.153546: | opening output PBS reply packet Oct 31 15:24:06.153549: | **emit ISAKMP Message: Oct 31 15:24:06.153553: | initiator SPI: 35 31 84 a1 ad 11 1f 21 Oct 31 15:24:06.153557: | responder SPI: 74 bd 8a 9a ba ac 7d 3f Oct 31 15:24:06.153560: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153562: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.153565: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.153567: | flags: none (0x0) Oct 31 15:24:06.153571: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.153574: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.153577: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.153580: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153582: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.153585: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.153588: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.153591: | ****parse IPsec DOI SIT: Oct 31 15:24:06.153594: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.153597: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.153599: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153602: | length: 32 (00 20) Oct 31 15:24:06.153605: | proposal number: 1 (01) Oct 31 15:24:06.153607: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.153610: | SPI size: 0 (00) Oct 31 15:24:06.153619: | number of transforms: 1 (01) Oct 31 15:24:06.153622: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.153624: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153629: | length: 24 (00 18) Oct 31 15:24:06.153632: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.153634: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.153637: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.153640: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.153643: | length/value: 14 (00 0e) Oct 31 15:24:06.153646: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:06.153650: "test" #37: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.153653: "test" #37: no acceptable Oakley Transform Oct 31 15:24:06.153656: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.153661: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.153664: | #37 is idle Oct 31 15:24:06.153733: "test" #37: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.153738: | opening output PBS notification msg Oct 31 15:24:06.153741: | **emit ISAKMP Message: Oct 31 15:24:06.153745: | initiator SPI: 35 31 84 a1 ad 11 1f 21 Oct 31 15:24:06.153749: | responder SPI: 74 bd 8a 9a ba ac 7d 3f Oct 31 15:24:06.153751: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153753: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.153756: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.153758: | flags: none (0x0) Oct 31 15:24:06.153766: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.153769: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.153772: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.153775: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.153777: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.153780: | protocol ID: 1 (01) Oct 31 15:24:06.153782: | SPI size: 0 (00) Oct 31 15:24:06.153784: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.153786: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.153788: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.153791: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.153793: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.153799: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #37) Oct 31 15:24:06.153801: | 35 31 84 a1 ad 11 1f 21 74 bd 8a 9a ba ac 7d 3f Oct 31 15:24:06.153803: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.153804: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.153830: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.153835: | stop processing: state #37 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.153839: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.153841: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.153843: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.153845: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.153850: | spent 0.523 (0.553) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.161721: | spent 0.00236 (0.00234) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.161756: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.161759: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.161764: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.161766: | 8a 65 83 55 69 08 d1 cb 00 00 00 00 00 00 00 00 Oct 31 15:24:06.161767: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.161768: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.161773: | 00 00 00 14 01 01 00 00 80 02 00 18 80 03 00 0a Oct 31 15:24:06.161774: | 80 04 00 1d Oct 31 15:24:06.161778: | **parse ISAKMP Message: Oct 31 15:24:06.161782: | initiator SPI: 8a 65 83 55 69 08 d1 cb Oct 31 15:24:06.161786: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.161790: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.161792: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.161795: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.161797: | flags: none (0x0) Oct 31 15:24:06.161800: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.161802: | length: 68 (00 00 00 44) Oct 31 15:24:06.161804: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.161807: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.161809: | #null state always idle Oct 31 15:24:06.161812: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.161816: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.161821: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.161826: | length: 40 (00 28) Oct 31 15:24:06.161828: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.161831: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.161834: | in statetime_start() with no state Oct 31 15:24:06.161841: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.161847: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.161851: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.161854: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.161857: | find_next_host_connection returns "test" Oct 31 15:24:06.161860: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.161862: | find_next_host_connection returns Oct 31 15:24:06.161884: | newref alloc logger@0x56551f0ff8a0(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.161886: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.161888: | creating state object #38 at 0x56551f0fec20 Oct 31 15:24:06.161890: | State DB: adding IKEv1 state #38 in UNDEFINED Oct 31 15:24:06.161893: | pstats #38 ikev1.isakmp started Oct 31 15:24:06.161896: | #38 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.161901: | start processing: state #38 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.161904: | parent state #38: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.161906: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.161907: | ICOOKIE-DUMP: Oct 31 15:24:06.161909: | 8a 65 83 55 69 08 d1 cb Oct 31 15:24:06.161911: "test" #38: responding to Main Mode Oct 31 15:24:06.161915: | opening output PBS reply packet Oct 31 15:24:06.161917: | **emit ISAKMP Message: Oct 31 15:24:06.161919: | initiator SPI: 8a 65 83 55 69 08 d1 cb Oct 31 15:24:06.161923: | responder SPI: da 3b 02 48 83 9a 8f 01 Oct 31 15:24:06.161925: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.161930: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.161934: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.161936: | flags: none (0x0) Oct 31 15:24:06.161940: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.161944: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.161947: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.161949: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.161952: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.161956: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.161959: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.161965: | ****parse IPsec DOI SIT: Oct 31 15:24:06.161968: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.161971: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.161972: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.161974: | length: 28 (00 1c) Oct 31 15:24:06.161976: | proposal number: 1 (01) Oct 31 15:24:06.161978: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.161979: | SPI size: 0 (00) Oct 31 15:24:06.161981: | number of transforms: 1 (01) Oct 31 15:24:06.161983: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.161984: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.161986: | length: 20 (00 14) Oct 31 15:24:06.161988: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.161989: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.161991: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.161993: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:06.161995: | length/value: 24 (00 18) Oct 31 15:24:06.161998: "test" #38: 24?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:06.162000: "test" #38: no acceptable Oakley Transform Oct 31 15:24:06.162002: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.162006: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.162008: | #38 is idle Oct 31 15:24:06.162072: "test" #38: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.162077: | opening output PBS notification msg Oct 31 15:24:06.162080: | **emit ISAKMP Message: Oct 31 15:24:06.162084: | initiator SPI: 8a 65 83 55 69 08 d1 cb Oct 31 15:24:06.162087: | responder SPI: da 3b 02 48 83 9a 8f 01 Oct 31 15:24:06.162090: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.162093: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.162095: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.162097: | flags: none (0x0) Oct 31 15:24:06.162101: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.162103: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.162106: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.162109: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.162111: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.162114: | protocol ID: 1 (01) Oct 31 15:24:06.162116: | SPI size: 0 (00) Oct 31 15:24:06.162119: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.162121: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.162124: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.162126: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.162129: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.162136: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #38) Oct 31 15:24:06.162138: | 8a 65 83 55 69 08 d1 cb da 3b 02 48 83 9a 8f 01 Oct 31 15:24:06.162141: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.162143: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.162168: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.162175: | stop processing: state #38 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.162179: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.162182: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.162184: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.162187: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.162192: | spent 0.473 (0.491) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.172380: | spent 0.0027 (0.00261) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.172411: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.172417: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.172426: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.172435: | 5f 67 6e 74 8e 5f a7 35 00 00 00 00 00 00 00 00 Oct 31 15:24:06.172438: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.172441: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.172446: | 00 00 00 14 01 01 00 00 80 01 00 0e 80 03 00 0a Oct 31 15:24:06.172449: | 80 04 00 1d Oct 31 15:24:06.172458: | **parse ISAKMP Message: Oct 31 15:24:06.172463: | initiator SPI: 5f 67 6e 74 8e 5f a7 35 Oct 31 15:24:06.172471: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.172475: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.172481: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.172484: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.172490: | flags: none (0x0) Oct 31 15:24:06.172494: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.172501: | length: 68 (00 00 00 44) Oct 31 15:24:06.172505: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.172512: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.172515: | #null state always idle Oct 31 15:24:06.172522: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.172527: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.172530: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.172533: | length: 40 (00 28) Oct 31 15:24:06.172536: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.172539: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.172543: | in statetime_start() with no state Oct 31 15:24:06.172549: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.172555: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.172559: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.172562: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.172565: | find_next_host_connection returns "test" Oct 31 15:24:06.172568: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.172570: | find_next_host_connection returns Oct 31 15:24:06.172595: | newref alloc logger@0x56551f100570(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.172600: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.172603: | creating state object #39 at 0x56551f0ff8f0 Oct 31 15:24:06.172605: | State DB: adding IKEv1 state #39 in UNDEFINED Oct 31 15:24:06.172612: | pstats #39 ikev1.isakmp started Oct 31 15:24:06.172617: | #39 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.172624: | start processing: state #39 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.172629: | parent state #39: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.172632: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.172635: | ICOOKIE-DUMP: Oct 31 15:24:06.172637: | 5f 67 6e 74 8e 5f a7 35 Oct 31 15:24:06.172640: "test" #39: responding to Main Mode Oct 31 15:24:06.172646: | opening output PBS reply packet Oct 31 15:24:06.172648: | **emit ISAKMP Message: Oct 31 15:24:06.172653: | initiator SPI: 5f 67 6e 74 8e 5f a7 35 Oct 31 15:24:06.172657: | responder SPI: 93 ce 9a 6c 56 7e 7e 1f Oct 31 15:24:06.172660: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.172663: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.172665: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.172670: | flags: none (0x0) Oct 31 15:24:06.172673: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.172676: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.172679: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.172682: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.172684: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.172687: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.172690: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.172693: | ****parse IPsec DOI SIT: Oct 31 15:24:06.172696: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.172699: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.172701: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.172704: | length: 28 (00 1c) Oct 31 15:24:06.172707: | proposal number: 1 (01) Oct 31 15:24:06.172710: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.172712: | SPI size: 0 (00) Oct 31 15:24:06.172715: | number of transforms: 1 (01) Oct 31 15:24:06.172718: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.172720: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.172723: | length: 20 (00 14) Oct 31 15:24:06.172726: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.172728: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.172731: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.172734: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.172737: | length/value: 14 (00 0e) Oct 31 15:24:06.172740: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:06.172745: "test" #39: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.172748: "test" #39: no acceptable Oakley Transform Oct 31 15:24:06.172751: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.172757: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.172760: | #39 is idle Oct 31 15:24:06.173004: "test" #39: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.173011: | opening output PBS notification msg Oct 31 15:24:06.173015: | **emit ISAKMP Message: Oct 31 15:24:06.173019: | initiator SPI: 5f 67 6e 74 8e 5f a7 35 Oct 31 15:24:06.173024: | responder SPI: 93 ce 9a 6c 56 7e 7e 1f Oct 31 15:24:06.173026: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.173029: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.173031: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.173034: | flags: none (0x0) Oct 31 15:24:06.173037: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.173040: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.173043: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.173046: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.173048: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.173051: | protocol ID: 1 (01) Oct 31 15:24:06.173054: | SPI size: 0 (00) Oct 31 15:24:06.173057: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.173059: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.173062: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.173065: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.173067: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.173074: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #39) Oct 31 15:24:06.173077: | 5f 67 6e 74 8e 5f a7 35 93 ce 9a 6c 56 7e 7e 1f Oct 31 15:24:06.173079: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.173083: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.173110: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.173117: | stop processing: state #39 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.173121: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.173124: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.173127: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.173129: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.173134: | spent 0.543 (0.77) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.185056: | spent 0.000992 (0.00319) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.185081: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.185086: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.185093: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.185096: | 71 c4 98 cf 20 5d 14 98 00 00 00 00 00 00 00 00 Oct 31 15:24:06.185098: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.185099: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.185101: | 00 00 00 14 01 01 00 00 80 01 00 0e 80 02 00 18 Oct 31 15:24:06.185103: | 80 04 00 1d Oct 31 15:24:06.185108: | **parse ISAKMP Message: Oct 31 15:24:06.185113: | initiator SPI: 71 c4 98 cf 20 5d 14 98 Oct 31 15:24:06.185117: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.185120: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.185123: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.185125: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.185127: | flags: none (0x0) Oct 31 15:24:06.185131: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.185134: | length: 68 (00 00 00 44) Oct 31 15:24:06.185137: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.185142: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.185144: | #null state always idle Oct 31 15:24:06.185147: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.185151: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.185153: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185156: | length: 40 (00 28) Oct 31 15:24:06.185158: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.185161: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.185163: | in statetime_start() with no state Oct 31 15:24:06.185168: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.185174: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.185176: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.185179: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.185182: | find_next_host_connection returns "test" Oct 31 15:24:06.185184: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.185186: | find_next_host_connection returns Oct 31 15:24:06.185242: | newref alloc logger@0x56551f101240(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.185248: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.185251: | creating state object #40 at 0x56551f1005c0 Oct 31 15:24:06.185253: | State DB: adding IKEv1 state #40 in UNDEFINED Oct 31 15:24:06.185258: | pstats #40 ikev1.isakmp started Oct 31 15:24:06.185262: | #40 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.185269: | start processing: state #40 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.185276: | parent state #40: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.185280: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.185282: | ICOOKIE-DUMP: Oct 31 15:24:06.185284: | 71 c4 98 cf 20 5d 14 98 Oct 31 15:24:06.185287: "test" #40: responding to Main Mode Oct 31 15:24:06.185292: | opening output PBS reply packet Oct 31 15:24:06.185295: | **emit ISAKMP Message: Oct 31 15:24:06.185298: | initiator SPI: 71 c4 98 cf 20 5d 14 98 Oct 31 15:24:06.185302: | responder SPI: ef 63 bd 9d 46 de e4 82 Oct 31 15:24:06.185304: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185306: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.185309: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.185311: | flags: none (0x0) Oct 31 15:24:06.185314: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.185317: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.185320: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.185322: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185324: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.185326: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.185328: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.185331: | ****parse IPsec DOI SIT: Oct 31 15:24:06.185333: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.185336: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.185338: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185341: | length: 28 (00 1c) Oct 31 15:24:06.185344: | proposal number: 1 (01) Oct 31 15:24:06.185346: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.185348: | SPI size: 0 (00) Oct 31 15:24:06.185350: | number of transforms: 1 (01) Oct 31 15:24:06.185353: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.185355: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185358: | length: 20 (00 14) Oct 31 15:24:06.185360: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.185362: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.185364: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.185367: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.185369: | length/value: 14 (00 0e) Oct 31 15:24:06.185372: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:06.185376: "test" #40: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.185379: "test" #40: no acceptable Oakley Transform Oct 31 15:24:06.185382: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.185386: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.185389: | #40 is idle Oct 31 15:24:06.185625: "test" #40: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.185630: | opening output PBS notification msg Oct 31 15:24:06.185632: | **emit ISAKMP Message: Oct 31 15:24:06.185636: | initiator SPI: 71 c4 98 cf 20 5d 14 98 Oct 31 15:24:06.185639: | responder SPI: ef 63 bd 9d 46 de e4 82 Oct 31 15:24:06.185641: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185643: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.185645: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.185647: | flags: none (0x0) Oct 31 15:24:06.185650: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.185652: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.185655: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.185657: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.185658: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.185661: | protocol ID: 1 (01) Oct 31 15:24:06.185663: | SPI size: 0 (00) Oct 31 15:24:06.185664: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.185669: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.185671: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.185673: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.185675: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.185681: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #40) Oct 31 15:24:06.185683: | 71 c4 98 cf 20 5d 14 98 ef 63 bd 9d 46 de e4 82 Oct 31 15:24:06.185685: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.185687: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.185714: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.185720: | stop processing: state #40 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.185723: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.185725: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.185728: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.185730: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.185735: | spent 0.477 (0.692) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.207727: | spent 0.00259 (0.0025) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.207854: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.207860: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.207865: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.207868: | 03 3e f1 fa 92 29 7c e4 00 00 00 00 00 00 00 00 Oct 31 15:24:06.207869: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.207871: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.207873: | 00 00 00 14 01 01 00 00 80 01 00 0e 80 02 00 18 Oct 31 15:24:06.207874: | 80 03 00 0a Oct 31 15:24:06.207879: | **parse ISAKMP Message: Oct 31 15:24:06.207882: | initiator SPI: 03 3e f1 fa 92 29 7c e4 Oct 31 15:24:06.207885: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.207887: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.207889: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.207891: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.207900: | flags: none (0x0) Oct 31 15:24:06.207910: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.207915: | length: 68 (00 00 00 44) Oct 31 15:24:06.207918: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.207924: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.207927: | #null state always idle Oct 31 15:24:06.207930: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.207933: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.207935: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.207938: | length: 40 (00 28) Oct 31 15:24:06.207941: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.207943: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.207946: | in statetime_start() with no state Oct 31 15:24:06.207952: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.207959: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.207963: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.207967: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.207971: | find_next_host_connection returns "test" Oct 31 15:24:06.207974: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.207982: | find_next_host_connection returns Oct 31 15:24:06.208006: | newref alloc logger@0x56551f101f10(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.208009: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.208011: | creating state object #41 at 0x56551f101290 Oct 31 15:24:06.208013: | State DB: adding IKEv1 state #41 in UNDEFINED Oct 31 15:24:06.208017: | pstats #41 ikev1.isakmp started Oct 31 15:24:06.208020: | #41 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.208024: | start processing: state #41 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.208027: | parent state #41: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.208029: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.208030: | ICOOKIE-DUMP: Oct 31 15:24:06.208032: | 03 3e f1 fa 92 29 7c e4 Oct 31 15:24:06.208034: "test" #41: responding to Main Mode Oct 31 15:24:06.208038: | opening output PBS reply packet Oct 31 15:24:06.208040: | **emit ISAKMP Message: Oct 31 15:24:06.208042: | initiator SPI: 03 3e f1 fa 92 29 7c e4 Oct 31 15:24:06.208045: | responder SPI: 5c 90 06 58 b0 eb 81 09 Oct 31 15:24:06.208046: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.208048: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.208050: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.208051: | flags: none (0x0) Oct 31 15:24:06.208053: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.208055: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.208057: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.208059: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.208061: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.208062: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.208064: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.208067: | ****parse IPsec DOI SIT: Oct 31 15:24:06.208068: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.208070: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.208071: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.208073: | length: 28 (00 1c) Oct 31 15:24:06.208075: | proposal number: 1 (01) Oct 31 15:24:06.208077: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.208078: | SPI size: 0 (00) Oct 31 15:24:06.208080: | number of transforms: 1 (01) Oct 31 15:24:06.208082: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.208083: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.208085: | length: 20 (00 14) Oct 31 15:24:06.208087: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.208088: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.208090: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.208092: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.208094: | length/value: 14 (00 0e) Oct 31 15:24:06.208096: | [14 is OAKLEY_AES_CCM_A] Oct 31 15:24:06.208098: "test" #41: OAKLEY_AES_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Oct 31 15:24:06.208100: "test" #41: no acceptable Oakley Transform Oct 31 15:24:06.208102: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.208113: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.208118: | #41 is idle Oct 31 15:24:06.208191: "test" #41: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.208197: | opening output PBS notification msg Oct 31 15:24:06.208207: | **emit ISAKMP Message: Oct 31 15:24:06.208241: | initiator SPI: 03 3e f1 fa 92 29 7c e4 Oct 31 15:24:06.208245: | responder SPI: 5c 90 06 58 b0 eb 81 09 Oct 31 15:24:06.208250: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.208253: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.208256: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.208258: | flags: none (0x0) Oct 31 15:24:06.208262: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.208265: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.208268: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.208270: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.208273: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.208276: | protocol ID: 1 (01) Oct 31 15:24:06.208279: | SPI size: 0 (00) Oct 31 15:24:06.208281: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.208284: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.208287: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.208354: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.208360: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.208367: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #41) Oct 31 15:24:06.208370: | 03 3e f1 fa 92 29 7c e4 5c 90 06 58 b0 eb 81 09 Oct 31 15:24:06.208373: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.208375: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.208408: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.208418: | stop processing: state #41 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.208424: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.208428: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.208431: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.208434: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.208442: | spent 0.507 (0.721) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.217363: | spent 0.00245 (0.00239) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.217398: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.217403: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.217411: | *received 72 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.217414: | bf 36 20 6f bf 00 38 d6 00 00 00 00 00 00 00 00 Oct 31 15:24:06.217416: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Oct 31 15:24:06.217418: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Oct 31 15:24:06.217421: | 00 00 00 18 01 01 00 00 80 01 00 0d 80 02 00 07 Oct 31 15:24:06.217423: | 80 03 00 11 80 04 00 0d Oct 31 15:24:06.217433: | **parse ISAKMP Message: Oct 31 15:24:06.217438: | initiator SPI: bf 36 20 6f bf 00 38 d6 Oct 31 15:24:06.217442: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.217445: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.217448: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.217451: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.217453: | flags: none (0x0) Oct 31 15:24:06.217457: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.217461: | length: 72 (00 00 00 48) Oct 31 15:24:06.217463: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.217468: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.217470: | #null state always idle Oct 31 15:24:06.217474: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.217477: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.217480: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217483: | length: 44 (00 2c) Oct 31 15:24:06.217489: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.217492: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.217495: | in statetime_start() with no state Oct 31 15:24:06.217501: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.217507: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.217510: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.217513: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.217516: | find_next_host_connection returns "test" Oct 31 15:24:06.217518: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.217520: | find_next_host_connection returns Oct 31 15:24:06.217549: | newref alloc logger@0x56551f102be0(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.217553: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.217556: | creating state object #42 at 0x56551f101f60 Oct 31 15:24:06.217558: | State DB: adding IKEv1 state #42 in UNDEFINED Oct 31 15:24:06.217564: | pstats #42 ikev1.isakmp started Oct 31 15:24:06.217569: | #42 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.217581: | start processing: state #42 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.217584: | parent state #42: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.217588: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.217590: | ICOOKIE-DUMP: Oct 31 15:24:06.217593: | bf 36 20 6f bf 00 38 d6 Oct 31 15:24:06.217596: "test" #42: responding to Main Mode Oct 31 15:24:06.217601: | opening output PBS reply packet Oct 31 15:24:06.217604: | **emit ISAKMP Message: Oct 31 15:24:06.217608: | initiator SPI: bf 36 20 6f bf 00 38 d6 Oct 31 15:24:06.217612: | responder SPI: 40 55 8a 08 2f 5a b8 c5 Oct 31 15:24:06.217615: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217617: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.217620: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.217622: | flags: none (0x0) Oct 31 15:24:06.217626: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.217629: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.217632: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.217634: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217636: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.217639: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.217642: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.217645: | ****parse IPsec DOI SIT: Oct 31 15:24:06.217648: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.217651: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.217653: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217656: | length: 32 (00 20) Oct 31 15:24:06.217659: | proposal number: 1 (01) Oct 31 15:24:06.217718: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.217723: | SPI size: 0 (00) Oct 31 15:24:06.217726: | number of transforms: 1 (01) Oct 31 15:24:06.217730: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.217733: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217736: | length: 24 (00 18) Oct 31 15:24:06.217738: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.217741: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.217744: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.217747: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.217750: | length/value: 13 (00 0d) Oct 31 15:24:06.217753: | [13 is OAKLEY_AES_CTR] Oct 31 15:24:06.217757: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.217762: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:06.217765: | length/value: 7 (00 07) Oct 31 15:24:06.217769: "test" #42: 7?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:06.217772: "test" #42: no acceptable Oakley Transform Oct 31 15:24:06.217775: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.217780: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.217783: | #42 is idle Oct 31 15:24:06.217895: "test" #42: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.217901: | opening output PBS notification msg Oct 31 15:24:06.217904: | **emit ISAKMP Message: Oct 31 15:24:06.217909: | initiator SPI: bf 36 20 6f bf 00 38 d6 Oct 31 15:24:06.217913: | responder SPI: 40 55 8a 08 2f 5a b8 c5 Oct 31 15:24:06.217916: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217918: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.217921: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.217929: | flags: none (0x0) Oct 31 15:24:06.217933: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.217936: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.217939: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.217942: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.217944: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.217947: | protocol ID: 1 (01) Oct 31 15:24:06.217950: | SPI size: 0 (00) Oct 31 15:24:06.217952: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.217955: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.217958: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.217961: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.217964: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.217971: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #42) Oct 31 15:24:06.217974: | bf 36 20 6f bf 00 38 d6 40 55 8a 08 2f 5a b8 c5 Oct 31 15:24:06.217976: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.217979: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.218008: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.218016: | stop processing: state #42 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.218019: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.218022: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.218025: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.218028: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.218033: | spent 0.551 (0.68) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.227052: | spent 0.00266 (0.00266) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.227084: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.227090: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.227098: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.227103: | 69 b6 43 5b fa 03 da 92 00 00 00 00 00 00 00 00 Oct 31 15:24:06.227105: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.227107: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.227111: | 00 00 00 14 01 01 00 00 80 02 00 07 80 03 00 11 Oct 31 15:24:06.227113: | 80 04 00 0d Oct 31 15:24:06.227117: | **parse ISAKMP Message: Oct 31 15:24:06.227121: | initiator SPI: 69 b6 43 5b fa 03 da 92 Oct 31 15:24:06.227124: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.227131: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.227134: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.227137: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.227139: | flags: none (0x0) Oct 31 15:24:06.227142: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.227145: | length: 68 (00 00 00 44) Oct 31 15:24:06.227146: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.227150: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.227152: | #null state always idle Oct 31 15:24:06.227155: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.227157: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.227159: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227161: | length: 40 (00 28) Oct 31 15:24:06.227162: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.227164: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.227166: | in statetime_start() with no state Oct 31 15:24:06.227170: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.227174: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.227176: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.227178: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.227179: | find_next_host_connection returns "test" Oct 31 15:24:06.227181: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.227182: | find_next_host_connection returns Oct 31 15:24:06.227211: | newref alloc logger@0x56551f1038b0(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.227216: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.227218: | creating state object #43 at 0x56551f102c30 Oct 31 15:24:06.227219: | State DB: adding IKEv1 state #43 in UNDEFINED Oct 31 15:24:06.227223: | pstats #43 ikev1.isakmp started Oct 31 15:24:06.227226: | #43 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.227232: | start processing: state #43 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.227235: | parent state #43: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.227237: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.227239: | ICOOKIE-DUMP: Oct 31 15:24:06.227241: | 69 b6 43 5b fa 03 da 92 Oct 31 15:24:06.227245: "test" #43: responding to Main Mode Oct 31 15:24:06.227250: | opening output PBS reply packet Oct 31 15:24:06.227253: | **emit ISAKMP Message: Oct 31 15:24:06.227257: | initiator SPI: 69 b6 43 5b fa 03 da 92 Oct 31 15:24:06.227261: | responder SPI: 8a 06 8d 58 75 74 05 41 Oct 31 15:24:06.227263: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227265: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.227267: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.227269: | flags: none (0x0) Oct 31 15:24:06.227272: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.227275: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.227277: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.227279: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227281: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.227283: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.227286: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.227289: | ****parse IPsec DOI SIT: Oct 31 15:24:06.227291: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.227293: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.227295: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227301: | length: 28 (00 1c) Oct 31 15:24:06.227303: | proposal number: 1 (01) Oct 31 15:24:06.227305: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.227307: | SPI size: 0 (00) Oct 31 15:24:06.227309: | number of transforms: 1 (01) Oct 31 15:24:06.227312: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.227314: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227316: | length: 20 (00 14) Oct 31 15:24:06.227318: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.227320: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.227323: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.227325: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:06.227328: | length/value: 7 (00 07) Oct 31 15:24:06.227332: "test" #43: 7?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:06.227334: "test" #43: no acceptable Oakley Transform Oct 31 15:24:06.227337: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.227342: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.227344: | #43 is idle Oct 31 15:24:06.227404: "test" #43: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.227411: | opening output PBS notification msg Oct 31 15:24:06.227413: | **emit ISAKMP Message: Oct 31 15:24:06.227416: | initiator SPI: 69 b6 43 5b fa 03 da 92 Oct 31 15:24:06.227419: | responder SPI: 8a 06 8d 58 75 74 05 41 Oct 31 15:24:06.227421: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227422: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.227424: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.227426: | flags: none (0x0) Oct 31 15:24:06.227428: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.227430: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.227432: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.227434: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.227435: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.227437: | protocol ID: 1 (01) Oct 31 15:24:06.227439: | SPI size: 0 (00) Oct 31 15:24:06.227444: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.227448: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.227451: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.227454: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.227457: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.227465: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #43) Oct 31 15:24:06.227468: | 69 b6 43 5b fa 03 da 92 8a 06 8d 58 75 74 05 41 Oct 31 15:24:06.227471: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.227474: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.227501: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.227511: | stop processing: state #43 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.227517: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.227521: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.227528: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.227531: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.227542: | spent 0.477 (0.5) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.239645: | spent 0.00261 (0.00259) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.239795: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.239803: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.239815: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.239818: | 6a 0b 1e 93 2a c5 bc 5d 00 00 00 00 00 00 00 00 Oct 31 15:24:06.239820: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.239823: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.239825: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 03 00 11 Oct 31 15:24:06.239827: | 80 04 00 0d Oct 31 15:24:06.239833: | **parse ISAKMP Message: Oct 31 15:24:06.239839: | initiator SPI: 6a 0b 1e 93 2a c5 bc 5d Oct 31 15:24:06.239843: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.239847: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.239850: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.239853: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.239855: | flags: none (0x0) Oct 31 15:24:06.239859: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.239863: | length: 68 (00 00 00 44) Oct 31 15:24:06.239866: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.239871: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.239874: | #null state always idle Oct 31 15:24:06.239878: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.239881: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.239884: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.239887: | length: 40 (00 28) Oct 31 15:24:06.239890: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.239893: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.239896: | in statetime_start() with no state Oct 31 15:24:06.239902: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.239908: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.239912: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.239915: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.239917: | find_next_host_connection returns "test" Oct 31 15:24:06.239920: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.239922: | find_next_host_connection returns Oct 31 15:24:06.239953: | newref alloc logger@0x56551f104580(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.239956: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.239959: | creating state object #44 at 0x56551f103900 Oct 31 15:24:06.239962: | State DB: adding IKEv1 state #44 in UNDEFINED Oct 31 15:24:06.239967: | pstats #44 ikev1.isakmp started Oct 31 15:24:06.240041: | #44 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.240050: | start processing: state #44 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.240054: | parent state #44: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.240057: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.240059: | ICOOKIE-DUMP: Oct 31 15:24:06.240062: | 6a 0b 1e 93 2a c5 bc 5d Oct 31 15:24:06.240065: "test" #44: responding to Main Mode Oct 31 15:24:06.240070: | opening output PBS reply packet Oct 31 15:24:06.240073: | **emit ISAKMP Message: Oct 31 15:24:06.240078: | initiator SPI: 6a 0b 1e 93 2a c5 bc 5d Oct 31 15:24:06.240082: | responder SPI: dd 21 54 3d 66 88 07 50 Oct 31 15:24:06.240084: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.240087: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.240089: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.240092: | flags: none (0x0) Oct 31 15:24:06.240096: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.240099: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.240102: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.240107: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.240109: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.240112: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.240115: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.240118: | ****parse IPsec DOI SIT: Oct 31 15:24:06.240121: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.240124: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.240126: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.240215: | length: 28 (00 1c) Oct 31 15:24:06.240224: | proposal number: 1 (01) Oct 31 15:24:06.240227: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.240292: | SPI size: 0 (00) Oct 31 15:24:06.240298: | number of transforms: 1 (01) Oct 31 15:24:06.240301: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.240304: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.240307: | length: 20 (00 14) Oct 31 15:24:06.240310: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.240313: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.240316: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.240318: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.240322: | length/value: 13 (00 0d) Oct 31 15:24:06.240325: | [13 is OAKLEY_AES_CTR] Oct 31 15:24:06.240329: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.240332: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Oct 31 15:24:06.240335: | length/value: 17 (00 11) Oct 31 15:24:06.240339: "test" #44: Pluto does not support 17?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Oct 31 15:24:06.240343: "test" #44: no acceptable Oakley Transform Oct 31 15:24:06.240346: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.240352: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.240354: | #44 is idle Oct 31 15:24:06.240405: "test" #44: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.240409: | opening output PBS notification msg Oct 31 15:24:06.240412: | **emit ISAKMP Message: Oct 31 15:24:06.240490: | initiator SPI: 6a 0b 1e 93 2a c5 bc 5d Oct 31 15:24:06.240496: | responder SPI: dd 21 54 3d 66 88 07 50 Oct 31 15:24:06.240499: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.240502: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.240504: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.240507: | flags: none (0x0) Oct 31 15:24:06.240511: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.240514: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.240517: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.240519: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.240522: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.240525: | protocol ID: 1 (01) Oct 31 15:24:06.240527: | SPI size: 0 (00) Oct 31 15:24:06.240530: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.240533: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.240535: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.240538: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.240541: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.240549: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #44) Oct 31 15:24:06.240551: | 6a 0b 1e 93 2a c5 bc 5d dd 21 54 3d 66 88 07 50 Oct 31 15:24:06.240554: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.240556: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.240596: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.240604: | stop processing: state #44 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.240607: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.240611: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.240613: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.240616: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.240623: | spent 0.603 (0.987) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.253078: | spent 0.00254 (0.00254) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.253107: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.253113: | newref alloc logger@0x56551f0d19b0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.253120: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.253123: | a8 9e 20 80 be bd 30 73 00 00 00 00 00 00 00 00 Oct 31 15:24:06.253125: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.253126: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.253127: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 02 00 07 Oct 31 15:24:06.253129: | 80 04 00 0d Oct 31 15:24:06.253136: | **parse ISAKMP Message: Oct 31 15:24:06.253142: | initiator SPI: a8 9e 20 80 be bd 30 73 Oct 31 15:24:06.253147: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.253151: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.253154: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.253156: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.253159: | flags: none (0x0) Oct 31 15:24:06.253163: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.253167: | length: 68 (00 00 00 44) Oct 31 15:24:06.253171: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.253176: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.253179: | #null state always idle Oct 31 15:24:06.253183: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.253189: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.253193: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253197: | length: 40 (00 28) Oct 31 15:24:06.253206: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.253209: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.253212: | in statetime_start() with no state Oct 31 15:24:06.253218: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.253225: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.253228: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.253232: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.253235: | find_next_host_connection returns "test" Oct 31 15:24:06.253238: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.253240: | find_next_host_connection returns Oct 31 15:24:06.253267: | newref alloc logger@0x56551f105250(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.253269: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.253271: | creating state object #45 at 0x56551f1045d0 Oct 31 15:24:06.253273: | State DB: adding IKEv1 state #45 in UNDEFINED Oct 31 15:24:06.253277: | pstats #45 ikev1.isakmp started Oct 31 15:24:06.253280: | #45 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.253285: | start processing: state #45 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.253288: | parent state #45: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.253290: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.253295: | ICOOKIE-DUMP: Oct 31 15:24:06.253296: | a8 9e 20 80 be bd 30 73 Oct 31 15:24:06.253299: "test" #45: responding to Main Mode Oct 31 15:24:06.253303: | opening output PBS reply packet Oct 31 15:24:06.253305: | **emit ISAKMP Message: Oct 31 15:24:06.253308: | initiator SPI: a8 9e 20 80 be bd 30 73 Oct 31 15:24:06.253310: | responder SPI: 96 1a c7 d9 b2 f2 c9 4b Oct 31 15:24:06.253312: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253313: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.253315: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.253316: | flags: none (0x0) Oct 31 15:24:06.253318: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.253321: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.253324: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.253328: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253332: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.253335: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.253337: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.253341: | ****parse IPsec DOI SIT: Oct 31 15:24:06.253344: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.253347: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.253349: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253352: | length: 28 (00 1c) Oct 31 15:24:06.253355: | proposal number: 1 (01) Oct 31 15:24:06.253357: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.253360: | SPI size: 0 (00) Oct 31 15:24:06.253363: | number of transforms: 1 (01) Oct 31 15:24:06.253367: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.253369: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253372: | length: 20 (00 14) Oct 31 15:24:06.253375: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.253378: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.253381: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.253383: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.253385: | length/value: 13 (00 0d) Oct 31 15:24:06.253387: | [13 is OAKLEY_AES_CTR] Oct 31 15:24:06.253390: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.253391: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:06.253393: | length/value: 7 (00 07) Oct 31 15:24:06.253396: "test" #45: 7?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:06.253398: "test" #45: no acceptable Oakley Transform Oct 31 15:24:06.253400: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.253404: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.253405: | #45 is idle Oct 31 15:24:06.253618: "test" #45: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.253623: | opening output PBS notification msg Oct 31 15:24:06.253625: | **emit ISAKMP Message: Oct 31 15:24:06.253628: | initiator SPI: a8 9e 20 80 be bd 30 73 Oct 31 15:24:06.253631: | responder SPI: 96 1a c7 d9 b2 f2 c9 4b Oct 31 15:24:06.253633: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253635: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.253636: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.253638: | flags: none (0x0) Oct 31 15:24:06.253642: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.253646: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.253651: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.253653: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.253656: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.253658: | protocol ID: 1 (01) Oct 31 15:24:06.253663: | SPI size: 0 (00) Oct 31 15:24:06.253666: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.253669: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.253671: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.253674: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.253676: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.253683: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #45) Oct 31 15:24:06.253686: | a8 9e 20 80 be bd 30 73 96 1a c7 d9 b2 f2 c9 4b Oct 31 15:24:06.253689: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.253691: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.253720: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.253729: | stop processing: state #45 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.253732: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.253734: | delref logger@0x56551f0d19b0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.253736: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.253737: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.253742: | spent 0.501 (0.675) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.261967: | spent 0.00409 (0.00312) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:06.261991: | newref struct msg_digest@0x56551f0e0b10(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.261994: | newref alloc logger@0x56551f0d1910(0->1) (in read_message() at demux.c:103) Oct 31 15:24:06.261999: | *received 68 bytes from 192.1.2.45:500 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:06.262001: | 5f 74 bc e5 9d ba 14 6b 00 00 00 00 00 00 00 00 Oct 31 15:24:06.262003: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Oct 31 15:24:06.262004: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Oct 31 15:24:06.262005: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 02 00 07 Oct 31 15:24:06.262007: | 80 03 00 11 Oct 31 15:24:06.262011: | **parse ISAKMP Message: Oct 31 15:24:06.262014: | initiator SPI: 5f 74 bc e5 9d ba 14 6b Oct 31 15:24:06.262017: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:06.262019: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:06.262021: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.262022: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.262024: | flags: none (0x0) Oct 31 15:24:06.262026: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.262028: | length: 68 (00 00 00 44) Oct 31 15:24:06.262030: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:06.262033: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:06.262035: | #null state always idle Oct 31 15:24:06.262038: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Oct 31 15:24:06.262041: | ***parse ISAKMP Security Association Payload: Oct 31 15:24:06.262042: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262044: | length: 40 (00 28) Oct 31 15:24:06.262046: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.262048: | message 'main_inI1_outR1' HASH payload not checked early Oct 31 15:24:06.262050: | in statetime_start() with no state Oct 31 15:24:06.262053: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Oct 31 15:24:06.262057: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Oct 31 15:24:06.262059: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.262062: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO (test) Oct 31 15:24:06.262063: | find_next_host_connection returns "test" Oct 31 15:24:06.262069: | find_next_host_connection policy=IKEV1_ALLOW Oct 31 15:24:06.262070: | find_next_host_connection returns Oct 31 15:24:06.262093: | newref alloc logger@0x56551f105f20(0->1) (in new_state() at state.c:576) Oct 31 15:24:06.262095: | addref fd@NULL (in new_state() at state.c:577) Oct 31 15:24:06.262097: | creating state object #46 at 0x56551f1052a0 Oct 31 15:24:06.262098: | State DB: adding IKEv1 state #46 in UNDEFINED Oct 31 15:24:06.262103: | pstats #46 ikev1.isakmp started Oct 31 15:24:06.262106: | #46 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:06.262110: | start processing: state #46 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:662) Oct 31 15:24:06.262113: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Oct 31 15:24:06.262115: | sender checking NAT-T: enabled; VID 0 Oct 31 15:24:06.262117: | ICOOKIE-DUMP: Oct 31 15:24:06.262118: | 5f 74 bc e5 9d ba 14 6b Oct 31 15:24:06.262120: "test" #46: responding to Main Mode Oct 31 15:24:06.262124: | opening output PBS reply packet Oct 31 15:24:06.262126: | **emit ISAKMP Message: Oct 31 15:24:06.262129: | initiator SPI: 5f 74 bc e5 9d ba 14 6b Oct 31 15:24:06.262131: | responder SPI: a2 34 95 34 ce 55 9b 6f Oct 31 15:24:06.262132: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262134: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.262135: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:06.262137: | flags: none (0x0) Oct 31 15:24:06.262142: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.262147: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.262151: | ***emit ISAKMP Security Association Payload: Oct 31 15:24:06.262153: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262156: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.262159: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Oct 31 15:24:06.262162: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Oct 31 15:24:06.262165: | ****parse IPsec DOI SIT: Oct 31 15:24:06.262168: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Oct 31 15:24:06.262172: | ****parse ISAKMP Proposal Payload: Oct 31 15:24:06.262174: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262178: | length: 28 (00 1c) Oct 31 15:24:06.262182: | proposal number: 1 (01) Oct 31 15:24:06.262184: | protocol ID: PROTO_ISAKMP (0x1) Oct 31 15:24:06.262187: | SPI size: 0 (00) Oct 31 15:24:06.262190: | number of transforms: 1 (01) Oct 31 15:24:06.262192: | *****parse ISAKMP Transform Payload (ISAKMP): Oct 31 15:24:06.262194: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262196: | length: 20 (00 14) Oct 31 15:24:06.262201: | ISAKMP transform number: 1 (01) Oct 31 15:24:06.262206: | ISAKMP transform ID: KEY_IKE (0x1) Oct 31 15:24:06.262209: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.262211: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Oct 31 15:24:06.262214: | length/value: 13 (00 0d) Oct 31 15:24:06.262216: | [13 is OAKLEY_AES_CTR] Oct 31 15:24:06.262219: | ******parse ISAKMP Oakley attribute: Oct 31 15:24:06.262220: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Oct 31 15:24:06.262222: | length/value: 7 (00 07) Oct 31 15:24:06.262225: "test" #46: 7?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Oct 31 15:24:06.262227: "test" #46: no acceptable Oakley Transform Oct 31 15:24:06.262229: | complete v1 state transition with NO_PROPOSAL_CHOSEN Oct 31 15:24:06.262232: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2510) Oct 31 15:24:06.262234: | #46 is idle Oct 31 15:24:06.262349: "test" #46: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Oct 31 15:24:06.262356: | opening output PBS notification msg Oct 31 15:24:06.262362: | **emit ISAKMP Message: Oct 31 15:24:06.262366: | initiator SPI: 5f 74 bc e5 9d ba 14 6b Oct 31 15:24:06.262370: | responder SPI: a2 34 95 34 ce 55 9b 6f Oct 31 15:24:06.262373: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262375: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:06.262378: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:06.262380: | flags: none (0x0) Oct 31 15:24:06.262384: | Message ID: 0 (00 00 00 00) Oct 31 15:24:06.262387: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:06.262390: | ***emit ISAKMP Notification Payload: Oct 31 15:24:06.262392: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:06.262395: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:06.262398: | protocol ID: 1 (01) Oct 31 15:24:06.262400: | SPI size: 0 (00) Oct 31 15:24:06.262402: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Oct 31 15:24:06.262405: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:06.262408: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:06.262410: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:06.262413: | emitting length of ISAKMP Message: 40 Oct 31 15:24:06.262420: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 using UDP (for #46) Oct 31 15:24:06.262423: | 5f 74 bc e5 9d ba 14 6b a2 34 95 34 ce 55 9b 6f Oct 31 15:24:06.262425: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:06.262427: | 00 00 00 01 01 00 00 0e Oct 31 15:24:06.262457: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Oct 31 15:24:06.262465: | stop processing: state #46 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:287) Oct 31 15:24:06.262468: | delref mdp@0x56551f0e0b10(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.262471: | delref logger@0x56551f0d1910(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:06.262474: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.262476: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.262482: | spent 0.502 (0.529) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:06.507849: | newref struct fd@0x56551f0df480(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:06.507870: | fd_accept: new fd-fd@0x56551f0df480 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:06.507886: shutting down Oct 31 15:24:06.507898: | leaking fd-fd@0x56551f0df480's FD; will be closed when pluto exits (in whack_handle_cb() at rcv_whack.c:889) Oct 31 15:24:06.507905: | delref fd@0x56551f0df480(1->0) (in whack_handle_cb() at rcv_whack.c:895) Oct 31 15:24:06.507908: | freeref fd-fd@0x56551f0df480 (in whack_handle_cb() at rcv_whack.c:895) Oct 31 15:24:06.507929: | shutting down helper thread 1 Oct 31 15:24:06.507969: | helper thread 1 exited Oct 31 15:24:06.507984: | shutting down helper thread 2 Oct 31 15:24:06.508001: | helper thread 2 exited Oct 31 15:24:06.508014: | shutting down helper thread 4 Oct 31 15:24:06.508038: | helper thread 4 exited Oct 31 15:24:06.508051: | shutting down helper thread 5 Oct 31 15:24:06.508075: | helper thread 5 exited Oct 31 15:24:06.508088: | shutting down helper thread 6 Oct 31 15:24:06.508108: | helper thread 6 exited Oct 31 15:24:06.508122: | shutting down helper thread 7 Oct 31 15:24:06.508142: | helper thread 7 exited Oct 31 15:24:06.508156: | shutting down helper thread 3 Oct 31 15:24:06.508175: | helper thread 3 exited Oct 31 15:24:06.508180: 7 helper threads shutdown Oct 31 15:24:06.508184: | delref root_certs@NULL (in free_root_certs() at root_certs.c:127) Oct 31 15:24:06.508187: | certs and keys locked by 'free_preshared_secrets' Oct 31 15:24:06.508189: forgetting secrets Oct 31 15:24:06.508193: | certs and keys unlocked by 'free_preshared_secrets' Oct 31 15:24:06.508280: | deleting states for connection - including all other IPsec SA's of this IKE SA Oct 31 15:24:06.508290: | pass 0 Oct 31 15:24:06.508292: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Oct 31 15:24:06.508295: | state #46 Oct 31 15:24:06.508303: | start processing: state #46 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.508307: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.508309: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.508312: | pstats #46 ikev1.isakmp deleted other Oct 31 15:24:06.508318: | #46 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.508324: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.508327: | should_send_delete: no, not established Oct 31 15:24:06.508333: "test" #46: deleting state (STATE_MAIN_R0) aged 0.246238s and NOT sending notification Oct 31 15:24:06.508336: | parent state #46: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.508408: | unsuspending #46 MD (nil) Oct 31 15:24:06.508413: | should_send_delete: no, not established Oct 31 15:24:06.508416: | state #46 has no .st_event to delete Oct 31 15:24:06.508419: | #46 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.508422: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.508427: | in connection_discard for connection test Oct 31 15:24:06.508430: | State DB: deleting IKEv1 state #46 in MAIN_R0 Oct 31 15:24:06.508434: | parent state #46: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.508437: | releasing #46's fd-fd@(nil) because deleting state Oct 31 15:24:06.508440: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508443: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508446: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.508456: | stop processing: state #46 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.508463: | delref logger@0x56551f105f20(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.508467: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.508470: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.508472: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.508475: | state #45 Oct 31 15:24:06.508480: | start processing: state #45 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.508483: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.508485: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.508488: | pstats #45 ikev1.isakmp deleted other Oct 31 15:24:06.508492: | #45 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.508497: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.508500: | should_send_delete: no, not established Oct 31 15:24:06.508504: "test" #45: deleting state (STATE_MAIN_R0) aged 0.255236s and NOT sending notification Oct 31 15:24:06.508507: | parent state #45: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.508554: | unsuspending #45 MD (nil) Oct 31 15:24:06.508559: | should_send_delete: no, not established Oct 31 15:24:06.508562: | state #45 has no .st_event to delete Oct 31 15:24:06.508565: | #45 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.508568: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.508571: | in connection_discard for connection test Oct 31 15:24:06.508574: | State DB: deleting IKEv1 state #45 in MAIN_R0 Oct 31 15:24:06.508578: | parent state #45: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.508586: | releasing #45's fd-fd@(nil) because deleting state Oct 31 15:24:06.508592: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508595: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508598: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.508603: | stop processing: state #45 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.508608: | delref logger@0x56551f105250(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.508610: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.508613: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.508616: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.508619: | state #44 Oct 31 15:24:06.508624: | start processing: state #44 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.508627: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.508630: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.508632: | pstats #44 ikev1.isakmp deleted other Oct 31 15:24:06.508636: | #44 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.508642: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.508645: | should_send_delete: no, not established Oct 31 15:24:06.508649: "test" #44: deleting state (STATE_MAIN_R0) aged 0.268697s and NOT sending notification Oct 31 15:24:06.508652: | parent state #44: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.508700: | unsuspending #44 MD (nil) Oct 31 15:24:06.508705: | should_send_delete: no, not established Oct 31 15:24:06.508708: | state #44 has no .st_event to delete Oct 31 15:24:06.508711: | #44 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.508713: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.508717: | in connection_discard for connection test Oct 31 15:24:06.508720: | State DB: deleting IKEv1 state #44 in MAIN_R0 Oct 31 15:24:06.508724: | parent state #44: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.508729: | releasing #44's fd-fd@(nil) because deleting state Oct 31 15:24:06.508733: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508736: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508739: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.508744: | stop processing: state #44 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.508748: | delref logger@0x56551f104580(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.508751: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.508754: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.508756: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.508759: | state #43 Oct 31 15:24:06.508765: | start processing: state #43 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.508767: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.508770: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.508772: | pstats #43 ikev1.isakmp deleted other Oct 31 15:24:06.508776: | #43 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.508781: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.508783: | should_send_delete: no, not established Oct 31 15:24:06.508787: "test" #43: deleting state (STATE_MAIN_R0) aged 0.281575s and NOT sending notification Oct 31 15:24:06.508790: | parent state #43: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.508836: | unsuspending #43 MD (nil) Oct 31 15:24:06.508912: | should_send_delete: no, not established Oct 31 15:24:06.508917: | state #43 has no .st_event to delete Oct 31 15:24:06.508920: | #43 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.508923: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.508926: | in connection_discard for connection test Oct 31 15:24:06.508929: | State DB: deleting IKEv1 state #43 in MAIN_R0 Oct 31 15:24:06.508932: | parent state #43: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.508935: | releasing #43's fd-fd@(nil) because deleting state Oct 31 15:24:06.508937: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508940: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.508943: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.508947: | stop processing: state #43 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.508950: | delref logger@0x56551f1038b0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.508953: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.508955: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.508958: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.508961: | state #42 Oct 31 15:24:06.508966: | start processing: state #42 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.508969: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.508971: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.508974: | pstats #42 ikev1.isakmp deleted other Oct 31 15:24:06.508977: | #42 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.508981: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.508984: | should_send_delete: no, not established Oct 31 15:24:06.508988: "test" #42: deleting state (STATE_MAIN_R0) aged 0.291439s and NOT sending notification Oct 31 15:24:06.508990: | parent state #42: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509036: | unsuspending #42 MD (nil) Oct 31 15:24:06.509041: | should_send_delete: no, not established Oct 31 15:24:06.509044: | state #42 has no .st_event to delete Oct 31 15:24:06.509046: | #42 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509049: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509053: | in connection_discard for connection test Oct 31 15:24:06.509055: | State DB: deleting IKEv1 state #42 in MAIN_R0 Oct 31 15:24:06.509059: | parent state #42: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509062: | releasing #42's fd-fd@(nil) because deleting state Oct 31 15:24:06.509068: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509071: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509073: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509078: | stop processing: state #42 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509082: | delref logger@0x56551f102be0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509085: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509087: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509090: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509092: | state #41 Oct 31 15:24:06.509097: | start processing: state #41 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509100: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509102: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509105: | pstats #41 ikev1.isakmp deleted other Oct 31 15:24:06.509109: | #41 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.509116: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.509119: | should_send_delete: no, not established Oct 31 15:24:06.509123: "test" #41: deleting state (STATE_MAIN_R0) aged 0.301116s and NOT sending notification Oct 31 15:24:06.509126: | parent state #41: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509170: | unsuspending #41 MD (nil) Oct 31 15:24:06.509175: | should_send_delete: no, not established Oct 31 15:24:06.509178: | state #41 has no .st_event to delete Oct 31 15:24:06.509181: | #41 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509184: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509187: | in connection_discard for connection test Oct 31 15:24:06.509190: | State DB: deleting IKEv1 state #41 in MAIN_R0 Oct 31 15:24:06.509194: | parent state #41: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509208: | releasing #41's fd-fd@(nil) because deleting state Oct 31 15:24:06.509212: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509214: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509217: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509222: | stop processing: state #41 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509225: | delref logger@0x56551f101f10(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509228: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509230: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509233: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509236: | state #40 Oct 31 15:24:06.509241: | start processing: state #40 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509244: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509247: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509249: | pstats #40 ikev1.isakmp deleted other Oct 31 15:24:06.509253: | #40 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.509258: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.509260: | should_send_delete: no, not established Oct 31 15:24:06.509264: "test" #40: deleting state (STATE_MAIN_R0) aged 0.324022s and NOT sending notification Oct 31 15:24:06.509267: | parent state #40: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509313: | unsuspending #40 MD (nil) Oct 31 15:24:06.509319: | should_send_delete: no, not established Oct 31 15:24:06.509321: | state #40 has no .st_event to delete Oct 31 15:24:06.509324: | #40 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509327: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509330: | in connection_discard for connection test Oct 31 15:24:06.509333: | State DB: deleting IKEv1 state #40 in MAIN_R0 Oct 31 15:24:06.509337: | parent state #40: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509340: | releasing #40's fd-fd@(nil) because deleting state Oct 31 15:24:06.509345: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509349: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509351: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509357: | stop processing: state #40 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509362: | delref logger@0x56551f101240(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509365: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509367: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509370: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509376: | state #39 Oct 31 15:24:06.509382: | start processing: state #39 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509385: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509388: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509390: | pstats #39 ikev1.isakmp deleted other Oct 31 15:24:06.509394: | #39 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.509400: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.509403: | should_send_delete: no, not established Oct 31 15:24:06.509407: "test" #39: deleting state (STATE_MAIN_R0) aged 0.336812s and NOT sending notification Oct 31 15:24:06.509410: | parent state #39: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509455: | unsuspending #39 MD (nil) Oct 31 15:24:06.509461: | should_send_delete: no, not established Oct 31 15:24:06.509463: | state #39 has no .st_event to delete Oct 31 15:24:06.509466: | #39 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509469: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509473: | in connection_discard for connection test Oct 31 15:24:06.509476: | State DB: deleting IKEv1 state #39 in MAIN_R0 Oct 31 15:24:06.509480: | parent state #39: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509486: | releasing #39's fd-fd@(nil) because deleting state Oct 31 15:24:06.509489: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509492: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509494: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509500: | stop processing: state #39 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509504: | delref logger@0x56551f100570(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509507: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509510: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509513: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509516: | state #38 Oct 31 15:24:06.509522: | start processing: state #38 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509526: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509529: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509532: | pstats #38 ikev1.isakmp deleted other Oct 31 15:24:06.509536: | #38 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.509541: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.509545: | should_send_delete: no, not established Oct 31 15:24:06.509550: "test" #38: deleting state (STATE_MAIN_R0) aged 0.347665s and NOT sending notification Oct 31 15:24:06.509553: | parent state #38: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509597: | unsuspending #38 MD (nil) Oct 31 15:24:06.509602: | should_send_delete: no, not established Oct 31 15:24:06.509605: | state #38 has no .st_event to delete Oct 31 15:24:06.509608: | #38 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509611: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509614: | in connection_discard for connection test Oct 31 15:24:06.509617: | State DB: deleting IKEv1 state #38 in MAIN_R0 Oct 31 15:24:06.509621: | parent state #38: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509626: | releasing #38's fd-fd@(nil) because deleting state Oct 31 15:24:06.509631: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509633: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509636: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509645: | stop processing: state #38 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509649: | delref logger@0x56551f0ff8a0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509652: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509655: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509658: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509660: | state #37 Oct 31 15:24:06.509666: | start processing: state #37 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509669: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509671: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509673: | pstats #37 ikev1.isakmp deleted other Oct 31 15:24:06.509677: | #37 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.509682: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.509684: | should_send_delete: no, not established Oct 31 15:24:06.509688: "test" #37: deleting state (STATE_MAIN_R0) aged 0.356193s and NOT sending notification Oct 31 15:24:06.509691: | parent state #37: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509735: | unsuspending #37 MD (nil) Oct 31 15:24:06.509741: | should_send_delete: no, not established Oct 31 15:24:06.509743: | state #37 has no .st_event to delete Oct 31 15:24:06.509746: | #37 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509749: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509752: | in connection_discard for connection test Oct 31 15:24:06.509755: | State DB: deleting IKEv1 state #37 in MAIN_R0 Oct 31 15:24:06.509760: | parent state #37: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509765: | releasing #37's fd-fd@(nil) because deleting state Oct 31 15:24:06.509768: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509770: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509773: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509777: | stop processing: state #37 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509781: | delref logger@0x56551f0febd0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509784: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509786: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509789: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509791: | state #36 Oct 31 15:24:06.509796: | start processing: state #36 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509799: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509801: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509803: | pstats #36 ikev1.isakmp deleted other Oct 31 15:24:06.509807: | #36 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.509812: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.509814: | should_send_delete: no, not established Oct 31 15:24:06.509818: "test" #36: deleting state (STATE_MAIN_R0) aged 0.365702s and NOT sending notification Oct 31 15:24:06.509821: | parent state #36: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.509866: | unsuspending #36 MD (nil) Oct 31 15:24:06.509871: | should_send_delete: no, not established Oct 31 15:24:06.509874: | state #36 has no .st_event to delete Oct 31 15:24:06.509877: | #36 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.509879: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.509945: | in connection_discard for connection test Oct 31 15:24:06.509951: | State DB: deleting IKEv1 state #36 in MAIN_R0 Oct 31 15:24:06.509955: | parent state #36: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.509958: | releasing #36's fd-fd@(nil) because deleting state Oct 31 15:24:06.509960: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509963: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.509965: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.509971: | stop processing: state #36 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.509974: | delref logger@0x56551f0fdf00(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.509977: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.509979: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.509982: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.509985: | state #35 Oct 31 15:24:06.509990: | start processing: state #35 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.509992: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.509995: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.509997: | pstats #35 ikev1.isakmp deleted other Oct 31 15:24:06.510001: | #35 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510006: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510009: | should_send_delete: no, not established Oct 31 15:24:06.510013: "test" #35: deleting state (STATE_MAIN_R0) aged 0.379605s and NOT sending notification Oct 31 15:24:06.510016: | parent state #35: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510060: | unsuspending #35 MD (nil) Oct 31 15:24:06.510066: | should_send_delete: no, not established Oct 31 15:24:06.510069: | state #35 has no .st_event to delete Oct 31 15:24:06.510071: | #35 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510074: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510078: | in connection_discard for connection test Oct 31 15:24:06.510080: | State DB: deleting IKEv1 state #35 in MAIN_R0 Oct 31 15:24:06.510084: | parent state #35: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510089: | releasing #35's fd-fd@(nil) because deleting state Oct 31 15:24:06.510093: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510096: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510099: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510104: | stop processing: state #35 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510108: | delref logger@0x56551f0fd230(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510110: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510113: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510115: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510118: | state #34 Oct 31 15:24:06.510123: | start processing: state #34 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510126: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510128: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510131: | pstats #34 ikev1.isakmp deleted other Oct 31 15:24:06.510134: | #34 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510139: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510142: | should_send_delete: no, not established Oct 31 15:24:06.510148: "test" #34: deleting state (STATE_MAIN_R0) aged 0.400331s and NOT sending notification Oct 31 15:24:06.510151: | parent state #34: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510194: | unsuspending #34 MD (nil) Oct 31 15:24:06.510203: | should_send_delete: no, not established Oct 31 15:24:06.510209: | state #34 has no .st_event to delete Oct 31 15:24:06.510212: | #34 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510214: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510218: | in connection_discard for connection test Oct 31 15:24:06.510220: | State DB: deleting IKEv1 state #34 in MAIN_R0 Oct 31 15:24:06.510224: | parent state #34: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510227: | releasing #34's fd-fd@(nil) because deleting state Oct 31 15:24:06.510231: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510236: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510238: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510244: | stop processing: state #34 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510248: | delref logger@0x56551f0fc560(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510250: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510253: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510255: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510258: | state #33 Oct 31 15:24:06.510263: | start processing: state #33 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510266: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510268: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510271: | pstats #33 ikev1.isakmp deleted other Oct 31 15:24:06.510274: | #33 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510279: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510282: | should_send_delete: no, not established Oct 31 15:24:06.510286: "test" #33: deleting state (STATE_MAIN_R0) aged 0.420347s and NOT sending notification Oct 31 15:24:06.510289: | parent state #33: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510332: | unsuspending #33 MD (nil) Oct 31 15:24:06.510338: | should_send_delete: no, not established Oct 31 15:24:06.510340: | state #33 has no .st_event to delete Oct 31 15:24:06.510343: | #33 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510346: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510349: | in connection_discard for connection test Oct 31 15:24:06.510352: | State DB: deleting IKEv1 state #33 in MAIN_R0 Oct 31 15:24:06.510355: | parent state #33: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510358: | releasing #33's fd-fd@(nil) because deleting state Oct 31 15:24:06.510361: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510365: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510370: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510375: | stop processing: state #33 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510379: | delref logger@0x56551f0fb890(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510381: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510384: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510386: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510389: | state #32 Oct 31 15:24:06.510394: | start processing: state #32 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510397: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510401: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510404: | pstats #32 ikev1.isakmp deleted other Oct 31 15:24:06.510408: | #32 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510413: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510415: | should_send_delete: no, not established Oct 31 15:24:06.510419: "test" #32: deleting state (STATE_MAIN_R0) aged 0.435816s and NOT sending notification Oct 31 15:24:06.510422: | parent state #32: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510466: | unsuspending #32 MD (nil) Oct 31 15:24:06.510471: | should_send_delete: no, not established Oct 31 15:24:06.510473: | state #32 has no .st_event to delete Oct 31 15:24:06.510476: | #32 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510479: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510482: | in connection_discard for connection test Oct 31 15:24:06.510485: | State DB: deleting IKEv1 state #32 in MAIN_R0 Oct 31 15:24:06.510489: | parent state #32: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510495: | releasing #32's fd-fd@(nil) because deleting state Oct 31 15:24:06.510498: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510501: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510503: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510508: | stop processing: state #32 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510512: | delref logger@0x56551f0fabc0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510515: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510517: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510520: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510522: | state #31 Oct 31 15:24:06.510527: | start processing: state #31 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510530: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510532: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510535: | pstats #31 ikev1.isakmp deleted other Oct 31 15:24:06.510539: | #31 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510543: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510546: | should_send_delete: no, not established Oct 31 15:24:06.510550: "test" #31: deleting state (STATE_MAIN_R0) aged 0.454441s and NOT sending notification Oct 31 15:24:06.510553: | parent state #31: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510595: | unsuspending #31 MD (nil) Oct 31 15:24:06.510601: | should_send_delete: no, not established Oct 31 15:24:06.510603: | state #31 has no .st_event to delete Oct 31 15:24:06.510606: | #31 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510609: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510612: | in connection_discard for connection test Oct 31 15:24:06.510615: | State DB: deleting IKEv1 state #31 in MAIN_R0 Oct 31 15:24:06.510620: | parent state #31: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510625: | releasing #31's fd-fd@(nil) because deleting state Oct 31 15:24:06.510628: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510630: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510633: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510638: | stop processing: state #31 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510642: | delref logger@0x56551f0f9ef0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510646: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510649: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510652: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510654: | state #30 Oct 31 15:24:06.510659: | start processing: state #30 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510662: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510664: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510667: | pstats #30 ikev1.isakmp deleted other Oct 31 15:24:06.510670: | #30 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510675: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510678: | should_send_delete: no, not established Oct 31 15:24:06.510682: "test" #30: deleting state (STATE_MAIN_R0) aged 0.501674s and NOT sending notification Oct 31 15:24:06.510684: | parent state #30: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510728: | unsuspending #30 MD (nil) Oct 31 15:24:06.510733: | should_send_delete: no, not established Oct 31 15:24:06.510736: | state #30 has no .st_event to delete Oct 31 15:24:06.510738: | #30 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510741: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510744: | in connection_discard for connection test Oct 31 15:24:06.510747: | State DB: deleting IKEv1 state #30 in MAIN_R0 Oct 31 15:24:06.510751: | parent state #30: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510757: | releasing #30's fd-fd@(nil) because deleting state Oct 31 15:24:06.510760: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510763: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510766: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510771: | stop processing: state #30 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510774: | delref logger@0x56551f0f9220(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510777: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510780: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510782: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510785: | state #29 Oct 31 15:24:06.510790: | start processing: state #29 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510792: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510795: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510797: | pstats #29 ikev1.isakmp deleted other Oct 31 15:24:06.510801: | #29 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510806: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.510809: | should_send_delete: no, not established Oct 31 15:24:06.510813: "test" #29: deleting state (STATE_MAIN_R0) aged 0.514756s and NOT sending notification Oct 31 15:24:06.510816: | parent state #29: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.510859: | unsuspending #29 MD (nil) Oct 31 15:24:06.510865: | should_send_delete: no, not established Oct 31 15:24:06.510867: | state #29 has no .st_event to delete Oct 31 15:24:06.510870: | #29 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.510873: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.510876: | in connection_discard for connection test Oct 31 15:24:06.510880: | State DB: deleting IKEv1 state #29 in MAIN_R0 Oct 31 15:24:06.510883: | parent state #29: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.510891: | releasing #29's fd-fd@(nil) because deleting state Oct 31 15:24:06.510894: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510897: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.510899: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.510904: | stop processing: state #29 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.510908: | delref logger@0x56551f0f8550(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.510911: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.510913: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.510972: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.510977: | state #28 Oct 31 15:24:06.510983: | start processing: state #28 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.510986: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.510988: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.510991: | pstats #28 ikev1.isakmp deleted other Oct 31 15:24:06.510994: | #28 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.510999: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.511002: | should_send_delete: no, not established Oct 31 15:24:06.511006: "test" #28: deleting state (STATE_MAIN_R0) aged 0.528042s and NOT sending notification Oct 31 15:24:06.511009: | parent state #28: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.511054: | unsuspending #28 MD (nil) Oct 31 15:24:06.511059: | should_send_delete: no, not established Oct 31 15:24:06.511061: | state #28 has no .st_event to delete Oct 31 15:24:06.511064: | #28 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.511067: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.511071: | in connection_discard for connection test Oct 31 15:24:06.511074: | State DB: deleting IKEv1 state #28 in MAIN_R0 Oct 31 15:24:06.511079: | parent state #28: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.511083: | releasing #28's fd-fd@(nil) because deleting state Oct 31 15:24:06.511086: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511089: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511091: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.511096: | stop processing: state #28 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.511100: | delref logger@0x56551f0f7880(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.511103: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.511105: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.511108: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.511111: | state #27 Oct 31 15:24:06.511116: | start processing: state #27 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.511118: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.511121: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.511123: | pstats #27 ikev1.isakmp deleted other Oct 31 15:24:06.511127: | #27 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.511132: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.511134: | should_send_delete: no, not established Oct 31 15:24:06.511138: "test" #27: deleting state (STATE_MAIN_R0) aged 0.549573s and NOT sending notification Oct 31 15:24:06.511141: | parent state #27: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.511299: | unsuspending #27 MD (nil) Oct 31 15:24:06.511309: | should_send_delete: no, not established Oct 31 15:24:06.511312: | state #27 has no .st_event to delete Oct 31 15:24:06.511315: | #27 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.511318: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.511321: | in connection_discard for connection test Oct 31 15:24:06.511323: | State DB: deleting IKEv1 state #27 in MAIN_R0 Oct 31 15:24:06.511327: | parent state #27: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.511330: | releasing #27's fd-fd@(nil) because deleting state Oct 31 15:24:06.511332: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511335: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511337: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.511343: | stop processing: state #27 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.511346: | delref logger@0x56551f0f6bb0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.511349: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.511351: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.511354: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.511357: | state #26 Oct 31 15:24:06.511362: | start processing: state #26 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.511365: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.511367: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.511370: | pstats #26 ikev1.isakmp deleted other Oct 31 15:24:06.511374: | #26 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.511378: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.511381: | should_send_delete: no, not established Oct 31 15:24:06.511385: "test" #26: deleting state (STATE_MAIN_R0) aged 0.564833s and NOT sending notification Oct 31 15:24:06.511388: | parent state #26: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.511518: | unsuspending #26 MD (nil) Oct 31 15:24:06.511524: | should_send_delete: no, not established Oct 31 15:24:06.511526: | state #26 has no .st_event to delete Oct 31 15:24:06.511529: | #26 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.511532: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.511535: | in connection_discard for connection test Oct 31 15:24:06.511538: | State DB: deleting IKEv1 state #26 in MAIN_R0 Oct 31 15:24:06.511541: | parent state #26: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.511544: | releasing #26's fd-fd@(nil) because deleting state Oct 31 15:24:06.511546: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511549: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511625: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.511634: | stop processing: state #26 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.511638: | delref logger@0x56551f0f5ee0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.511640: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.511643: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.511646: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.511649: | state #25 Oct 31 15:24:06.511654: | start processing: state #25 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.511656: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.511659: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.511661: | pstats #25 ikev1.isakmp deleted other Oct 31 15:24:06.511667: | #25 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.511672: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.511675: | should_send_delete: no, not established Oct 31 15:24:06.511679: "test" #25: deleting state (STATE_MAIN_R0) aged 0.580538s and NOT sending notification Oct 31 15:24:06.511682: | parent state #25: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.511809: | unsuspending #25 MD (nil) Oct 31 15:24:06.511815: | should_send_delete: no, not established Oct 31 15:24:06.511817: | state #25 has no .st_event to delete Oct 31 15:24:06.511820: | #25 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.511823: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.511827: | in connection_discard for connection test Oct 31 15:24:06.511829: | State DB: deleting IKEv1 state #25 in MAIN_R0 Oct 31 15:24:06.511833: | parent state #25: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.511836: | releasing #25's fd-fd@(nil) because deleting state Oct 31 15:24:06.511838: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511841: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.511843: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.511848: | stop processing: state #25 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.511852: | delref logger@0x56551f0f5210(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.511855: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.511857: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.511860: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.511863: | state #24 Oct 31 15:24:06.511868: | start processing: state #24 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.511871: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.511873: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.511876: | pstats #24 ikev1.isakmp deleted other Oct 31 15:24:06.511880: | #24 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.511885: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.511887: | should_send_delete: no, not established Oct 31 15:24:06.511891: "test" #24: deleting state (STATE_MAIN_R0) aged 0.589864s and NOT sending notification Oct 31 15:24:06.511894: | parent state #24: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.512082: | unsuspending #24 MD (nil) Oct 31 15:24:06.512087: | should_send_delete: no, not established Oct 31 15:24:06.512090: | state #24 has no .st_event to delete Oct 31 15:24:06.512093: | #24 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.512096: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.512099: | in connection_discard for connection test Oct 31 15:24:06.512101: | State DB: deleting IKEv1 state #24 in MAIN_R0 Oct 31 15:24:06.512105: | parent state #24: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.512108: | releasing #24's fd-fd@(nil) because deleting state Oct 31 15:24:06.512110: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.512113: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.512116: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.512121: | stop processing: state #24 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.512124: | delref logger@0x56551f0f4540(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.512127: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.512129: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.512132: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.512137: | state #23 Oct 31 15:24:06.512142: | start processing: state #23 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.512145: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.512148: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.512150: | pstats #23 ikev1.isakmp deleted other Oct 31 15:24:06.512154: | #23 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.512159: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.512161: | should_send_delete: no, not established Oct 31 15:24:06.512166: "test" #23: deleting state (STATE_MAIN_R0) aged 0.598744s and NOT sending notification Oct 31 15:24:06.512168: | parent state #23: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.512474: | unsuspending #23 MD (nil) Oct 31 15:24:06.512482: | should_send_delete: no, not established Oct 31 15:24:06.512485: | state #23 has no .st_event to delete Oct 31 15:24:06.512487: | #23 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.512491: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.512494: | in connection_discard for connection test Oct 31 15:24:06.512497: | State DB: deleting IKEv1 state #23 in MAIN_R0 Oct 31 15:24:06.512500: | parent state #23: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.512503: | releasing #23's fd-fd@(nil) because deleting state Oct 31 15:24:06.512506: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.512508: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.512511: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.512516: | stop processing: state #23 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.512520: | delref logger@0x56551f0f3870(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.512523: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.512525: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.512528: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.512530: | state #22 Oct 31 15:24:06.512535: | start processing: state #22 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.512538: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.512541: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.512543: | pstats #22 ikev1.isakmp deleted other Oct 31 15:24:06.512547: | #22 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.512552: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.512555: | should_send_delete: no, not established Oct 31 15:24:06.512559: "test" #22: deleting state (STATE_MAIN_R0) aged 0.60869s and NOT sending notification Oct 31 15:24:06.512562: | parent state #22: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.512697: | unsuspending #22 MD (nil) Oct 31 15:24:06.512702: | should_send_delete: no, not established Oct 31 15:24:06.512705: | state #22 has no .st_event to delete Oct 31 15:24:06.512707: | #22 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.512710: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.512714: | in connection_discard for connection test Oct 31 15:24:06.512716: | State DB: deleting IKEv1 state #22 in MAIN_R0 Oct 31 15:24:06.512720: | parent state #22: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.512723: | releasing #22's fd-fd@(nil) because deleting state Oct 31 15:24:06.512725: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.512727: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.512734: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.512739: | stop processing: state #22 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.512743: | delref logger@0x56551f0f2ba0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.512746: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.512748: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.512751: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.512753: | state #21 Oct 31 15:24:06.512758: | start processing: state #21 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.512761: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.512764: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.512766: | pstats #21 ikev1.isakmp deleted other Oct 31 15:24:06.512770: | #21 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.512775: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.512777: | should_send_delete: no, not established Oct 31 15:24:06.512781: "test" #21: deleting state (STATE_MAIN_R0) aged 0.619686s and NOT sending notification Oct 31 15:24:06.512784: | parent state #21: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.512996: | unsuspending #21 MD (nil) Oct 31 15:24:06.513001: | should_send_delete: no, not established Oct 31 15:24:06.513004: | state #21 has no .st_event to delete Oct 31 15:24:06.513006: | #21 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.513009: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.513012: | in connection_discard for connection test Oct 31 15:24:06.513014: | State DB: deleting IKEv1 state #21 in MAIN_R0 Oct 31 15:24:06.513017: | parent state #21: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.513020: | releasing #21's fd-fd@(nil) because deleting state Oct 31 15:24:06.513022: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.513024: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.513027: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.513031: | stop processing: state #21 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.513035: | delref logger@0x56551f0f1ed0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.513037: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.513039: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.513042: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.513044: | state #20 Oct 31 15:24:06.513115: | start processing: state #20 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.513119: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.513122: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.513124: | pstats #20 ikev1.isakmp deleted other Oct 31 15:24:06.513128: | #20 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.513132: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.513135: | should_send_delete: no, not established Oct 31 15:24:06.513138: "test" #20: deleting state (STATE_MAIN_R0) aged 0.632913s and NOT sending notification Oct 31 15:24:06.513141: | parent state #20: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.513454: | unsuspending #20 MD (nil) Oct 31 15:24:06.513463: | should_send_delete: no, not established Oct 31 15:24:06.513466: | state #20 has no .st_event to delete Oct 31 15:24:06.513469: | #20 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.513473: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.513479: | in connection_discard for connection test Oct 31 15:24:06.513482: | State DB: deleting IKEv1 state #20 in MAIN_R0 Oct 31 15:24:06.513486: | parent state #20: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.513489: | releasing #20's fd-fd@(nil) because deleting state Oct 31 15:24:06.513491: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.513494: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.513496: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.513502: | stop processing: state #20 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.513506: | delref logger@0x56551f0f1200(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.513509: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.513511: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.513514: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.513516: | state #19 Oct 31 15:24:06.513521: | start processing: state #19 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.513524: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.513527: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.513530: | pstats #19 ikev1.isakmp deleted other Oct 31 15:24:06.513534: | #19 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.513538: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.513541: | should_send_delete: no, not established Oct 31 15:24:06.513546: "test" #19: deleting state (STATE_MAIN_R0) aged 0.647043s and NOT sending notification Oct 31 15:24:06.513549: | parent state #19: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.513691: | unsuspending #19 MD (nil) Oct 31 15:24:06.513697: | should_send_delete: no, not established Oct 31 15:24:06.513700: | state #19 has no .st_event to delete Oct 31 15:24:06.513702: | #19 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.513705: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.513709: | in connection_discard for connection test Oct 31 15:24:06.513711: | State DB: deleting IKEv1 state #19 in MAIN_R0 Oct 31 15:24:06.513715: | parent state #19: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.513718: | releasing #19's fd-fd@(nil) because deleting state Oct 31 15:24:06.513720: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.513723: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.513726: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.513731: | stop processing: state #19 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.513734: | delref logger@0x56551f0f0530(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.513737: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.513739: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.513742: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.513744: | state #18 Oct 31 15:24:06.513749: | start processing: state #18 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.513752: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.513755: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.513757: | pstats #18 ikev1.isakmp deleted other Oct 31 15:24:06.513761: | #18 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.513765: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.513770: | should_send_delete: no, not established Oct 31 15:24:06.513775: "test" #18: deleting state (STATE_MAIN_R0) aged 0.660022s and NOT sending notification Oct 31 15:24:06.513777: | parent state #18: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.514026: | unsuspending #18 MD (nil) Oct 31 15:24:06.514032: | should_send_delete: no, not established Oct 31 15:24:06.514035: | state #18 has no .st_event to delete Oct 31 15:24:06.514038: | #18 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.514041: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.514044: | in connection_discard for connection test Oct 31 15:24:06.514047: | State DB: deleting IKEv1 state #18 in MAIN_R0 Oct 31 15:24:06.514053: | parent state #18: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.514055: | releasing #18's fd-fd@(nil) because deleting state Oct 31 15:24:06.514058: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.514060: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.514062: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.514067: | stop processing: state #18 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.514070: | delref logger@0x56551f0ef860(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.514072: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.514075: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.514077: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.514079: | state #17 Oct 31 15:24:06.514155: | start processing: state #17 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.514160: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.514163: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.514166: | pstats #17 ikev1.isakmp deleted other Oct 31 15:24:06.514170: | #17 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.514175: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.514177: | should_send_delete: no, not established Oct 31 15:24:06.514181: "test" #17: deleting state (STATE_MAIN_R0) aged 0.677595s and NOT sending notification Oct 31 15:24:06.514184: | parent state #17: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.514240: | unsuspending #17 MD (nil) Oct 31 15:24:06.514249: | should_send_delete: no, not established Oct 31 15:24:06.514252: | state #17 has no .st_event to delete Oct 31 15:24:06.514255: | #17 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.514258: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.514261: | in connection_discard for connection test Oct 31 15:24:06.514264: | State DB: deleting IKEv1 state #17 in MAIN_R0 Oct 31 15:24:06.514268: | parent state #17: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.514271: | releasing #17's fd-fd@(nil) because deleting state Oct 31 15:24:06.514273: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.514279: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.514282: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.514287: | stop processing: state #17 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.514291: | delref logger@0x56551f0eeb90(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.514294: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.514296: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.514299: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.514301: | state #16 Oct 31 15:24:06.514306: | start processing: state #16 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.514312: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.514314: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.514317: | pstats #16 ikev1.isakmp deleted other Oct 31 15:24:06.514320: | #16 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.514324: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.514327: | should_send_delete: no, not established Oct 31 15:24:06.514331: "test" #16: deleting state (STATE_MAIN_R0) aged 0.694226s and NOT sending notification Oct 31 15:24:06.514334: | parent state #16: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.519418: | unsuspending #16 MD (nil) Oct 31 15:24:06.519432: | should_send_delete: no, not established Oct 31 15:24:06.519436: | state #16 has no .st_event to delete Oct 31 15:24:06.519440: | #16 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.519444: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.519450: | in connection_discard for connection test Oct 31 15:24:06.519453: | State DB: deleting IKEv1 state #16 in MAIN_R0 Oct 31 15:24:06.519458: | parent state #16: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.519461: | releasing #16's fd-fd@(nil) because deleting state Oct 31 15:24:06.519464: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519467: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519470: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.519478: | stop processing: state #16 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.519483: | delref logger@0x56551f0edec0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.519486: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.519489: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.519492: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.519495: | state #15 Oct 31 15:24:06.519501: | start processing: state #15 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.519504: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.519506: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.519509: | pstats #15 ikev1.isakmp deleted other Oct 31 15:24:06.519514: | #15 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.519520: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.519522: | should_send_delete: no, not established Oct 31 15:24:06.519527: "test" #15: deleting state (STATE_MAIN_R0) aged 0.711701s and NOT sending notification Oct 31 15:24:06.519530: | parent state #15: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.519591: | unsuspending #15 MD (nil) Oct 31 15:24:06.519596: | should_send_delete: no, not established Oct 31 15:24:06.519598: | state #15 has no .st_event to delete Oct 31 15:24:06.519601: | #15 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.519604: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.519608: | in connection_discard for connection test Oct 31 15:24:06.519610: | State DB: deleting IKEv1 state #15 in MAIN_R0 Oct 31 15:24:06.519614: | parent state #15: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.519617: | releasing #15's fd-fd@(nil) because deleting state Oct 31 15:24:06.519619: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519621: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519624: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.519628: | stop processing: state #15 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.519633: | delref logger@0x56551f0ed1f0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.519638: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.519641: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.519644: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.519646: | state #14 Oct 31 15:24:06.519651: | start processing: state #14 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.519653: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.519656: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.519658: | pstats #14 ikev1.isakmp deleted other Oct 31 15:24:06.519662: | #14 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.519667: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.519669: | should_send_delete: no, not established Oct 31 15:24:06.519673: "test" #14: deleting state (STATE_MAIN_R0) aged 0.726268s and NOT sending notification Oct 31 15:24:06.519676: | parent state #14: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.519718: | unsuspending #14 MD (nil) Oct 31 15:24:06.519722: | should_send_delete: no, not established Oct 31 15:24:06.519725: | state #14 has no .st_event to delete Oct 31 15:24:06.519727: | #14 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.519730: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.519733: | in connection_discard for connection test Oct 31 15:24:06.519735: | State DB: deleting IKEv1 state #14 in MAIN_R0 Oct 31 15:24:06.519739: | parent state #14: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.519741: | releasing #14's fd-fd@(nil) because deleting state Oct 31 15:24:06.519744: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519746: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519748: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.519753: | stop processing: state #14 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.519757: | delref logger@0x56551f0df430(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.519759: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.519761: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.519764: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.519767: | state #13 Oct 31 15:24:06.519771: | start processing: state #13 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.519774: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.519776: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.519778: | pstats #13 ikev1.isakmp deleted other Oct 31 15:24:06.519782: | #13 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.519786: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.519789: | should_send_delete: no, not established Oct 31 15:24:06.519793: "test" #13: deleting state (STATE_MAIN_R0) aged 0.747576s and NOT sending notification Oct 31 15:24:06.519796: | parent state #13: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.519920: | unsuspending #13 MD (nil) Oct 31 15:24:06.519925: | should_send_delete: no, not established Oct 31 15:24:06.519928: | state #13 has no .st_event to delete Oct 31 15:24:06.519930: | #13 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.519933: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.519936: | in connection_discard for connection test Oct 31 15:24:06.519939: | State DB: deleting IKEv1 state #13 in MAIN_R0 Oct 31 15:24:06.519942: | parent state #13: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.519948: | releasing #13's fd-fd@(nil) because deleting state Oct 31 15:24:06.519950: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519952: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.519955: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.519959: | stop processing: state #13 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.519963: | delref logger@0x56551f0df3e0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.519965: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.519968: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.519971: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.519973: | state #12 Oct 31 15:24:06.519978: | start processing: state #12 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.519980: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.519983: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.519985: | pstats #12 ikev1.isakmp deleted other Oct 31 15:24:06.519989: | #12 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.519993: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.519996: | should_send_delete: no, not established Oct 31 15:24:06.520000: "test" #12: deleting state (STATE_MAIN_R0) aged 0.764777s and NOT sending notification Oct 31 15:24:06.520002: | parent state #12: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520044: | unsuspending #12 MD (nil) Oct 31 15:24:06.520048: | should_send_delete: no, not established Oct 31 15:24:06.520051: | state #12 has no .st_event to delete Oct 31 15:24:06.520053: | #12 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520056: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520059: | in connection_discard for connection test Oct 31 15:24:06.520061: | State DB: deleting IKEv1 state #12 in MAIN_R0 Oct 31 15:24:06.520064: | parent state #12: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520067: | releasing #12's fd-fd@(nil) because deleting state Oct 31 15:24:06.520069: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520071: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520074: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520078: | stop processing: state #12 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520082: | delref logger@0x56551f0df390(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520084: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520087: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520089: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520092: | state #11 Oct 31 15:24:06.520096: | start processing: state #11 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520099: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520101: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520104: | pstats #11 ikev1.isakmp deleted other Oct 31 15:24:06.520107: | #11 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520112: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520114: | should_send_delete: no, not established Oct 31 15:24:06.520118: "test" #11: deleting state (STATE_MAIN_R0) aged 0.776739s and NOT sending notification Oct 31 15:24:06.520121: | parent state #11: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520161: | unsuspending #11 MD (nil) Oct 31 15:24:06.520166: | should_send_delete: no, not established Oct 31 15:24:06.520168: | state #11 has no .st_event to delete Oct 31 15:24:06.520171: | #11 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520173: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520176: | in connection_discard for connection test Oct 31 15:24:06.520179: | State DB: deleting IKEv1 state #11 in MAIN_R0 Oct 31 15:24:06.520182: | parent state #11: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520185: | releasing #11's fd-fd@(nil) because deleting state Oct 31 15:24:06.520187: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520189: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520191: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520196: | stop processing: state #11 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520204: | delref logger@0x56551f0df340(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520209: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520211: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520214: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520217: | state #10 Oct 31 15:24:06.520221: | start processing: state #10 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520224: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520226: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520228: | pstats #10 ikev1.isakmp deleted other Oct 31 15:24:06.520232: | #10 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520236: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520239: | should_send_delete: no, not established Oct 31 15:24:06.520242: "test" #10: deleting state (STATE_MAIN_R0) aged 0.795598s and NOT sending notification Oct 31 15:24:06.520245: | parent state #10: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520283: | unsuspending #10 MD (nil) Oct 31 15:24:06.520288: | should_send_delete: no, not established Oct 31 15:24:06.520353: | state #10 has no .st_event to delete Oct 31 15:24:06.520358: | #10 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520361: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520365: | in connection_discard for connection test Oct 31 15:24:06.520367: | State DB: deleting IKEv1 state #10 in MAIN_R0 Oct 31 15:24:06.520371: | parent state #10: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520374: | releasing #10's fd-fd@(nil) because deleting state Oct 31 15:24:06.520377: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520379: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520382: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520387: | stop processing: state #10 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520391: | delref logger@0x56551f0df2f0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520394: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520396: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520399: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520402: | state #9 Oct 31 15:24:06.520407: | start processing: state #9 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520410: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520412: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520415: | pstats #9 ikev1.isakmp deleted other Oct 31 15:24:06.520421: | #9 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520426: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520429: | should_send_delete: no, not established Oct 31 15:24:06.520433: "test" #9: deleting state (STATE_MAIN_R0) aged 0.812262s and NOT sending notification Oct 31 15:24:06.520435: | parent state #9: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520476: | unsuspending #9 MD (nil) Oct 31 15:24:06.520481: | should_send_delete: no, not established Oct 31 15:24:06.520483: | state #9 has no .st_event to delete Oct 31 15:24:06.520486: | #9 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520489: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520492: | in connection_discard for connection test Oct 31 15:24:06.520494: | State DB: deleting IKEv1 state #9 in MAIN_R0 Oct 31 15:24:06.520498: | parent state #9: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520500: | releasing #9's fd-fd@(nil) because deleting state Oct 31 15:24:06.520503: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520505: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520507: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520512: | stop processing: state #9 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520516: | delref logger@0x56551f0df2a0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520518: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520520: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520523: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520526: | state #8 Oct 31 15:24:06.520530: | start processing: state #8 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520533: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520535: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520538: | pstats #8 ikev1.isakmp deleted other Oct 31 15:24:06.520541: | #8 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520546: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520548: | should_send_delete: no, not established Oct 31 15:24:06.520552: "test" #8: deleting state (STATE_MAIN_R0) aged 0.824928s and NOT sending notification Oct 31 15:24:06.520555: | parent state #8: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520592: | unsuspending #8 MD (nil) Oct 31 15:24:06.520597: | should_send_delete: no, not established Oct 31 15:24:06.520599: | state #8 has no .st_event to delete Oct 31 15:24:06.520601: | #8 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520604: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520607: | in connection_discard for connection test Oct 31 15:24:06.520610: | State DB: deleting IKEv1 state #8 in MAIN_R0 Oct 31 15:24:06.520613: | parent state #8: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520616: | releasing #8's fd-fd@(nil) because deleting state Oct 31 15:24:06.520618: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520621: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520623: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520628: | stop processing: state #8 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520631: | delref logger@0x56551f0df250(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520634: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520636: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520638: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520643: | state #7 Oct 31 15:24:06.520648: | start processing: state #7 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520650: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520652: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520655: | pstats #7 ikev1.isakmp deleted other Oct 31 15:24:06.520658: | #7 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520663: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520665: | should_send_delete: no, not established Oct 31 15:24:06.520669: "test" #7: deleting state (STATE_MAIN_R0) aged 0.837495s and NOT sending notification Oct 31 15:24:06.520672: | parent state #7: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520709: | unsuspending #7 MD (nil) Oct 31 15:24:06.520714: | should_send_delete: no, not established Oct 31 15:24:06.520716: | state #7 has no .st_event to delete Oct 31 15:24:06.520719: | #7 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520721: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520725: | in connection_discard for connection test Oct 31 15:24:06.520727: | State DB: deleting IKEv1 state #7 in MAIN_R0 Oct 31 15:24:06.520730: | parent state #7: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520733: | releasing #7's fd-fd@(nil) because deleting state Oct 31 15:24:06.520735: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520737: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520740: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520744: | stop processing: state #7 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520748: | delref logger@0x56551f0df200(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520751: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520753: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520756: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520758: | state #6 Oct 31 15:24:06.520762: | start processing: state #6 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520765: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520767: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520770: | pstats #6 ikev1.isakmp deleted other Oct 31 15:24:06.520773: | #6 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520778: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520780: | should_send_delete: no, not established Oct 31 15:24:06.520784: "test" #6: deleting state (STATE_MAIN_R0) aged 0.849943s and NOT sending notification Oct 31 15:24:06.520787: | parent state #6: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520824: | unsuspending #6 MD (nil) Oct 31 15:24:06.520828: | should_send_delete: no, not established Oct 31 15:24:06.520831: | state #6 has no .st_event to delete Oct 31 15:24:06.520833: | #6 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520836: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520839: | in connection_discard for connection test Oct 31 15:24:06.520841: | State DB: deleting IKEv1 state #6 in MAIN_R0 Oct 31 15:24:06.520844: | parent state #6: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520847: | releasing #6's fd-fd@(nil) because deleting state Oct 31 15:24:06.520849: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520852: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520856: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520861: | stop processing: state #6 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520864: | delref logger@0x56551f0df1b0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520867: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520869: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520872: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520874: | state #5 Oct 31 15:24:06.520879: | start processing: state #5 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520882: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520885: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.520887: | pstats #5 ikev1.isakmp deleted other Oct 31 15:24:06.520891: | #5 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.520895: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.520898: | should_send_delete: no, not established Oct 31 15:24:06.520902: "test" #5: deleting state (STATE_MAIN_R0) aged 0.862505s and NOT sending notification Oct 31 15:24:06.520904: | parent state #5: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.520941: | unsuspending #5 MD (nil) Oct 31 15:24:06.520945: | should_send_delete: no, not established Oct 31 15:24:06.520947: | state #5 has no .st_event to delete Oct 31 15:24:06.520950: | #5 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.520952: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.520955: | in connection_discard for connection test Oct 31 15:24:06.520958: | State DB: deleting IKEv1 state #5 in MAIN_R0 Oct 31 15:24:06.520961: | parent state #5: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.520964: | releasing #5's fd-fd@(nil) because deleting state Oct 31 15:24:06.520966: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520968: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.520971: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.520975: | stop processing: state #5 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.520978: | delref logger@0x56551f0df160(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.520981: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.520983: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.520986: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.520988: | state #4 Oct 31 15:24:06.520993: | start processing: state #4 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.520995: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.520998: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.521000: | pstats #4 ikev1.isakmp deleted other Oct 31 15:24:06.521003: | #4 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.521008: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.521011: | should_send_delete: no, not established Oct 31 15:24:06.521014: "test" #4: deleting state (STATE_MAIN_R0) aged 0.873931s and NOT sending notification Oct 31 15:24:06.521017: | parent state #4: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.521053: | unsuspending #4 MD (nil) Oct 31 15:24:06.521057: | should_send_delete: no, not established Oct 31 15:24:06.521060: | state #4 has no .st_event to delete Oct 31 15:24:06.521062: | #4 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.521065: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.521070: | in connection_discard for connection test Oct 31 15:24:06.521073: | State DB: deleting IKEv1 state #4 in MAIN_R0 Oct 31 15:24:06.521076: | parent state #4: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.521078: | releasing #4's fd-fd@(nil) because deleting state Oct 31 15:24:06.521081: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521083: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521085: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.521090: | stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.521093: | delref logger@0x56551f0d0b40(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.521096: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.521098: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.521100: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.521103: | state #3 Oct 31 15:24:06.521107: | start processing: state #3 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.521110: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.521112: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.521115: | pstats #3 ikev1.isakmp deleted other Oct 31 15:24:06.521118: | #3 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.521123: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.521125: | should_send_delete: no, not established Oct 31 15:24:06.521129: "test" #3: deleting state (STATE_MAIN_R0) aged 0.900963s and NOT sending notification Oct 31 15:24:06.521132: | parent state #3: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.521169: | unsuspending #3 MD (nil) Oct 31 15:24:06.521173: | should_send_delete: no, not established Oct 31 15:24:06.521176: | state #3 has no .st_event to delete Oct 31 15:24:06.521178: | #3 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.521181: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.521184: | in connection_discard for connection test Oct 31 15:24:06.521187: | State DB: deleting IKEv1 state #3 in MAIN_R0 Oct 31 15:24:06.521190: | parent state #3: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.521192: | releasing #3's fd-fd@(nil) because deleting state Oct 31 15:24:06.521195: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521197: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521205: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.521213: | stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.521218: | delref logger@0x56551f0d1870(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.521220: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.521223: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.521225: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.521228: | state #2 Oct 31 15:24:06.521233: | start processing: state #2 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.521235: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.521238: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.521240: | pstats #2 ikev1.isakmp deleted other Oct 31 15:24:06.521244: | #2 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.521249: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.521252: | should_send_delete: no, not established Oct 31 15:24:06.521258: "test" #2: deleting state (STATE_MAIN_R0) aged 0.932734s and NOT sending notification Oct 31 15:24:06.521261: | parent state #2: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.521302: | unsuspending #2 MD (nil) Oct 31 15:24:06.521307: | should_send_delete: no, not established Oct 31 15:24:06.521310: | state #2 has no .st_event to delete Oct 31 15:24:06.521313: | #2 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.521316: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.521319: | in connection_discard for connection test Oct 31 15:24:06.521377: | State DB: deleting IKEv1 state #2 in MAIN_R0 Oct 31 15:24:06.521384: | parent state #2: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.521387: | releasing #2's fd-fd@(nil) because deleting state Oct 31 15:24:06.521390: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521393: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521396: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.521401: | stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.521406: | delref logger@0x56551f0d18c0(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.521409: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.521411: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.521414: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.521417: | state #1 Oct 31 15:24:06.521423: | start processing: state #1 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1406) Oct 31 15:24:06.521426: | delref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1408) Oct 31 15:24:06.521429: | addref fd@NULL (in foreach_state_by_connection_func_delete() at state.c:1409) Oct 31 15:24:06.521431: | pstats #1 ikev1.isakmp deleted other Oct 31 15:24:06.521435: | #1 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Oct 31 15:24:06.521440: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:935) Oct 31 15:24:06.521443: | should_send_delete: no, not established Oct 31 15:24:06.521448: "test" #1: deleting state (STATE_MAIN_R0) aged 1.069081s and NOT sending notification Oct 31 15:24:06.521452: | parent state #1: MAIN_R0(half-open IKE SA) => delete Oct 31 15:24:06.521589: | unsuspending #1 MD (nil) Oct 31 15:24:06.521594: | should_send_delete: no, not established Oct 31 15:24:06.521597: | state #1 has no .st_event to delete Oct 31 15:24:06.521600: | #1 STATE_MAIN_R0: retransmits: cleared Oct 31 15:24:06.521603: | State DB: IKEv1 state not found (flush_incomplete_children) Oct 31 15:24:06.521606: | in connection_discard for connection test Oct 31 15:24:06.521609: | State DB: deleting IKEv1 state #1 in MAIN_R0 Oct 31 15:24:06.521613: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Oct 31 15:24:06.521616: | releasing #1's fd-fd@(nil) because deleting state Oct 31 15:24:06.521619: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521622: | delref fd@NULL (in delete_state() at state.c:1195) Oct 31 15:24:06.521624: | delref pkp@NULL (in delete_state() at state.c:1202) Oct 31 15:24:06.521629: | stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1239) Oct 31 15:24:06.521633: | delref logger@0x56551f0d1960(1->0) (in delete_state() at state.c:1306) Oct 31 15:24:06.521635: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.521638: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.521641: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1411) Oct 31 15:24:06.521643: | pass 1 Oct 31 15:24:06.521646: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Oct 31 15:24:06.521650: | addref fd@NULL (in clone_logger() at log.c:809) Oct 31 15:24:06.521652: | addref fd@NULL (in clone_logger() at log.c:810) Oct 31 15:24:06.521656: | newref clone logger@0x56551f104580(0->1) (in clone_logger() at log.c:817) Oct 31 15:24:06.521663: | delref hp@0x56551f0de0a0(1->0) (in delete_oriented_hp() at hostpair.c:360) Oct 31 15:24:06.521666: | flush revival: connection 'test' wasn't on the list Oct 31 15:24:06.521669: | delref vip@NULL (in discard_connection() at connections.c:262) Oct 31 15:24:06.521672: | delref vip@NULL (in discard_connection() at connections.c:263) Oct 31 15:24:06.521676: | Connection DB: deleting connection $1 Oct 31 15:24:06.521679: | delref logger@0x56551f104580(1->0) (in delete_connection() at connections.c:214) Oct 31 15:24:06.521682: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:06.521684: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:06.521688: | crl fetch request list locked by 'free_crl_fetch' Oct 31 15:24:06.521690: | crl fetch request list unlocked by 'free_crl_fetch' Oct 31 15:24:06.521698: | iface: marking eth1 dead Oct 31 15:24:06.521701: | iface: marking eth0 dead Oct 31 15:24:06.521703: | iface: marking lo dead Oct 31 15:24:06.521705: | updating interfaces - listing interfaces that are going down Oct 31 15:24:06.521710: shutting down interface lo 127.0.0.1:4500 Oct 31 15:24:06.521715: shutting down interface lo 127.0.0.1:500 Oct 31 15:24:06.521719: shutting down interface eth0 192.0.2.254:4500 Oct 31 15:24:06.521722: shutting down interface eth0 192.0.2.254:500 Oct 31 15:24:06.521726: shutting down interface eth1 192.1.2.23:4500 Oct 31 15:24:06.521730: shutting down interface eth1 192.1.2.23:500 Oct 31 15:24:06.521733: | updating interfaces - deleting the dead Oct 31 15:24:06.521739: | FOR_EACH_STATE_... in delete_states_dead_interfaces Oct 31 15:24:06.521748: | libevent_free: delref ptr-libevent@0x56551f0decc0 Oct 31 15:24:06.521752: | delref id@0x56551f0de490(3->2) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521765: | libevent_free: delref ptr-libevent@0x56551f0ded50 Oct 31 15:24:06.521770: | delref id@0x56551f0de490(2->1) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521777: | libevent_free: delref ptr-libevent@0x56551f0dee00 Oct 31 15:24:06.521780: | delref id@0x56551f0de400(3->2) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521786: | libevent_free: delref ptr-libevent@0x56551f0deeb0 Oct 31 15:24:06.521789: | delref id@0x56551f0de400(2->1) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521795: | libevent_free: delref ptr-libevent@0x56551f0def60 Oct 31 15:24:06.521798: | delref id@0x56551f0de330(3->2) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521804: | libevent_free: delref ptr-libevent@0x56551f0df010 Oct 31 15:24:06.521807: | delref id@0x56551f0de330(2->1) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521812: | delref id@0x56551f0de330(1->0) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521815: | delref id@0x56551f0de400(1->0) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521818: | delref id@0x56551f0de490(1->0) (in release_iface_dev() at iface.c:125) Oct 31 15:24:06.521820: | updating interfaces - checking orientation Oct 31 15:24:06.521822: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Oct 31 15:24:06.525304: | libevent_free: delref ptr-libevent@0x56551f0db3a0 Oct 31 15:24:06.525316: | free_event_entry: delref EVENT_NULL-pe@0x56551f0dd960 Oct 31 15:24:06.525321: | libevent_free: delref ptr-libevent@0x56551f0db310 Oct 31 15:24:06.525324: | free_event_entry: delref EVENT_NULL-pe@0x56551f0d3220 Oct 31 15:24:06.525330: | libevent_free: delref ptr-libevent@0x56551f0da660 Oct 31 15:24:06.525332: | free_event_entry: delref EVENT_NULL-pe@0x56551f0d66f0 Oct 31 15:24:06.525336: | global timer EVENT_REINIT_SECRET uninitialized Oct 31 15:24:06.525338: | global timer EVENT_SHUNT_SCAN uninitialized Oct 31 15:24:06.525340: | global timer EVENT_PENDING_DDNS uninitialized Oct 31 15:24:06.525343: | global timer EVENT_PENDING_PHASE2 uninitialized Oct 31 15:24:06.525345: | global timer EVENT_CHECK_CRLS uninitialized Oct 31 15:24:06.525347: | global timer EVENT_REVIVE_CONNS uninitialized Oct 31 15:24:06.525350: | global timer EVENT_FREE_ROOT_CERTS uninitialized Oct 31 15:24:06.525355: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Oct 31 15:24:06.525357: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Oct 31 15:24:06.525362: | libevent_free: delref ptr-libevent@0x56551f0ddaf0 Oct 31 15:24:06.525365: | signal event handler PLUTO_SIGCHLD uninstalled Oct 31 15:24:06.525368: | libevent_free: delref ptr-libevent@0x56551f0ddbd0 Oct 31 15:24:06.525370: | signal event handler PLUTO_SIGTERM uninstalled Oct 31 15:24:06.525373: | libevent_free: delref ptr-libevent@0x56551f0ddc90 Oct 31 15:24:06.525376: | signal event handler PLUTO_SIGHUP uninstalled Oct 31 15:24:06.525378: | libevent_free: delref ptr-libevent@0x56551f0d0900 Oct 31 15:24:06.525381: | signal event handler PLUTO_SIGSYS uninstalled Oct 31 15:24:06.525383: | releasing event base Oct 31 15:24:06.525398: | libevent_free: delref ptr-libevent@0x56551f0ddd50 Oct 31 15:24:06.525401: | libevent_free: delref ptr-libevent@0x56551f093e60 Oct 31 15:24:06.525405: | libevent_free: delref ptr-libevent@0x56551f0cb8c0 Oct 31 15:24:06.525408: | libevent_free: delref ptr-libevent@0x56551f0cd6c0 Oct 31 15:24:06.525410: | libevent_free: delref ptr-libevent@0x56551f0cb990 Oct 31 15:24:06.525413: | libevent_free: delref ptr-libevent@0x56551f0dd9a0 Oct 31 15:24:06.525415: | libevent_free: delref ptr-libevent@0x56551f0ddb90 Oct 31 15:24:06.525417: | libevent_free: delref ptr-libevent@0x56551f0cba60 Oct 31 15:24:06.525420: | libevent_free: delref ptr-libevent@0x56551f0d1540 Oct 31 15:24:06.525422: | libevent_free: delref ptr-libevent@0x56551f0d1520 Oct 31 15:24:06.525424: | libevent_free: delref ptr-libevent@0x56551f0df0a0 Oct 31 15:24:06.525426: | libevent_free: delref ptr-libevent@0x56551f0deff0 Oct 31 15:24:06.525428: | libevent_free: delref ptr-libevent@0x56551f0def40 Oct 31 15:24:06.525431: | libevent_free: delref ptr-libevent@0x56551f0dee90 Oct 31 15:24:06.525433: | libevent_free: delref ptr-libevent@0x56551f0dede0 Oct 31 15:24:06.525435: | libevent_free: delref ptr-libevent@0x56551f0de900 Oct 31 15:24:06.525437: | libevent_free: delref ptr-libevent@0x56551f0cd5b0 Oct 31 15:24:06.525440: | libevent_free: delref ptr-libevent@0x56551f0ddc70 Oct 31 15:24:06.525442: | libevent_free: delref ptr-libevent@0x56551f0ddbb0 Oct 31 15:24:06.525444: | libevent_free: delref ptr-libevent@0x56551f0ddad0 Oct 31 15:24:06.525446: | libevent_free: delref ptr-libevent@0x56551f0ddd30 Oct 31 15:24:06.525448: | libevent_free: delref ptr-libevent@0x56551f0dd9c0 Oct 31 15:24:06.525616: | libevent_free: delref ptr-libevent@0x56551f0cd540 Oct 31 15:24:06.525620: | libevent_free: delref ptr-libevent@0x56551f0cd570 Oct 31 15:24:06.525623: | libevent_free: delref ptr-libevent@0x56551f0cd2a0 Oct 31 15:24:06.525625: | releasing global libevent data Oct 31 15:24:06.525628: | libevent_free: delref ptr-libevent@0x56551f0cbb30 Oct 31 15:24:06.525631: | libevent_free: delref ptr-libevent@0x56551f0cbb60 Oct 31 15:24:06.525634: | libevent_free: delref ptr-libevent@0x56551f0cd230