Oct 31 15:24:04.424260: | newref logger@0x563a8674eb70(0->1) (in main() at plutomain.c:1591) Oct 31 15:24:04.424297: | delref logger@0x563a8674eb70(1->0) (in main() at plutomain.c:1592) Oct 31 15:24:04.424302: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:04.424303: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:04.424306: NSS DB directory: sql:/var/lib/ipsec/nss Oct 31 15:24:04.424440: Initializing NSS Oct 31 15:24:04.424444: Opening NSS database "sql:/var/lib/ipsec/nss" read-only Oct 31 15:24:04.476868: FIPS Mode: NO Oct 31 15:24:04.476883: NSS crypto library initialized Oct 31 15:24:04.476923: FIPS mode disabled for pluto daemon Oct 31 15:24:04.476930: FIPS HMAC integrity support [disabled] Oct 31 15:24:04.477018: libcap-ng support [enabled] Oct 31 15:24:04.477031: Linux audit support [enabled] Oct 31 15:24:04.477056: Linux audit activated Oct 31 15:24:04.477061: Starting Pluto (Libreswan Version v4.1-88-gf1d1933837ef-main IKEv2 IKEv1 XFRM(netkey) XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-PRF) DNSSEC LABELED_IPSEC (SELINUX) SECCOMP LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:2083670 Oct 31 15:24:04.477064: core dump dir: /tmp Oct 31 15:24:04.477067: secrets file: /etc/ipsec.secrets Oct 31 15:24:04.477069: leak-detective disabled Oct 31 15:24:04.477071: NSS crypto [enabled] Oct 31 15:24:04.477073: XAUTH PAM support [enabled] Oct 31 15:24:04.477144: | libevent is using pluto's memory allocator Oct 31 15:24:04.477152: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Oct 31 15:24:04.477166: | libevent_malloc: newref ptr-libevent@0x563a867fdb10 size 40 Oct 31 15:24:04.477172: | libevent_malloc: newref ptr-libevent@0x563a867fdb40 size 40 Oct 31 15:24:04.477175: | libevent_malloc: newref ptr-libevent@0x563a867ff210 size 40 Oct 31 15:24:04.477178: | creating event base Oct 31 15:24:04.477180: | libevent_malloc: newref ptr-libevent@0x563a867ff240 size 56 Oct 31 15:24:04.477183: | libevent_malloc: newref ptr-libevent@0x563a867ff280 size 664 Oct 31 15:24:04.477196: | libevent_malloc: newref ptr-libevent@0x563a867fd8a0 size 24 Oct 31 15:24:04.477204: | libevent_malloc: newref ptr-libevent@0x563a867c5e40 size 384 Oct 31 15:24:04.477217: | libevent_malloc: newref ptr-libevent@0x563a867fd970 size 16 Oct 31 15:24:04.477220: | libevent_malloc: newref ptr-libevent@0x563a867ff520 size 40 Oct 31 15:24:04.477223: | libevent_malloc: newref ptr-libevent@0x563a867ff550 size 48 Oct 31 15:24:04.477228: | libevent_realloc: newref ptr-libevent@0x563a867ff590 size 256 Oct 31 15:24:04.477231: | libevent_malloc: newref ptr-libevent@0x563a867fda40 size 16 Oct 31 15:24:04.477236: | libevent_free: delref ptr-libevent@0x563a867ff240 Oct 31 15:24:04.477239: | libevent initialized Oct 31 15:24:04.477245: | libevent_realloc: newref ptr-libevent@0x563a867ff6a0 size 64 Oct 31 15:24:04.477249: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Oct 31 15:24:04.477255: | init_nat_traversal() initialized with keep_alive=0s Oct 31 15:24:04.477258: NAT-Traversal support [enabled] Oct 31 15:24:04.477260: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Oct 31 15:24:04.477265: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Oct 31 15:24:04.477269: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Oct 31 15:24:04.477286: | checking IKEv1 state table Oct 31 15:24:04.477295: | MAIN_R0: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477298: | -> MAIN_R1 EVENT_SO_DISCARD (main_inI1_outR1) Oct 31 15:24:04.477302: | MAIN_I1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477305: | -> MAIN_I2 EVENT_RETRANSMIT (main_inR1_outI2) Oct 31 15:24:04.477307: | MAIN_R1: category: open IKE SA; flags: 0: Oct 31 15:24:04.477310: | -> MAIN_R2 EVENT_RETRANSMIT (main_inI2_outR2) Oct 31 15:24:04.477312: | -> MAIN_R1 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.477314: | -> MAIN_R1 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.477317: | MAIN_I2: category: open IKE SA; flags: 0: Oct 31 15:24:04.477326: | -> MAIN_I3 EVENT_RETRANSMIT (main_inR2_outI3) Oct 31 15:24:04.477329: | -> MAIN_I2 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.477331: | -> MAIN_I2 EVENT_RETRANSMIT (unexpected) Oct 31 15:24:04.477334: | MAIN_R2: category: open IKE SA; flags: 0: Oct 31 15:24:04.477336: | -> MAIN_R3 EVENT_SA_REPLACE (main_inI3_outR3) Oct 31 15:24:04.477338: | -> MAIN_R3 EVENT_SA_REPLACE (main_inI3_outR3) Oct 31 15:24:04.477340: | -> MAIN_R2 EVENT_SA_REPLACE (unexpected) Oct 31 15:24:04.477343: | MAIN_I3: category: open IKE SA; flags: 0: Oct 31 15:24:04.477345: | -> MAIN_I4 EVENT_SA_REPLACE (main_inR3) Oct 31 15:24:04.477347: | -> MAIN_I4 EVENT_SA_REPLACE (main_inR3) Oct 31 15:24:04.477349: | -> MAIN_I3 EVENT_SA_REPLACE (unexpected) Oct 31 15:24:04.477352: | MAIN_R3: category: established IKE SA; flags: 0: Oct 31 15:24:04.477354: | -> MAIN_R3 EVENT_NULL (unexpected) Oct 31 15:24:04.477357: | MAIN_I4: category: established IKE SA; flags: 0: Oct 31 15:24:04.477359: | -> MAIN_I4 EVENT_NULL (unexpected) Oct 31 15:24:04.477361: | AGGR_R0: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477364: | -> AGGR_R1 EVENT_SO_DISCARD (aggr_inI1_outR1) Oct 31 15:24:04.477366: | AGGR_I1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477369: | -> AGGR_I2 EVENT_SA_REPLACE (aggr_inR1_outI2) Oct 31 15:24:04.477371: | -> AGGR_I2 EVENT_SA_REPLACE (aggr_inR1_outI2) Oct 31 15:24:04.477373: | AGGR_R1: category: open IKE SA; flags: 0: Oct 31 15:24:04.477375: | -> AGGR_R2 EVENT_SA_REPLACE (aggr_inI2) Oct 31 15:24:04.477378: | -> AGGR_R2 EVENT_SA_REPLACE (aggr_inI2) Oct 31 15:24:04.477381: | AGGR_I2: category: established IKE SA; flags: 0: Oct 31 15:24:04.477383: | -> AGGR_I2 EVENT_NULL (unexpected) Oct 31 15:24:04.477386: | AGGR_R2: category: established IKE SA; flags: 0: Oct 31 15:24:04.477388: | -> AGGR_R2 EVENT_NULL (unexpected) Oct 31 15:24:04.477390: | QUICK_R0: category: established CHILD SA; flags: 0: Oct 31 15:24:04.477393: | -> QUICK_R1 EVENT_RETRANSMIT (quick_inI1_outR1) Oct 31 15:24:04.477395: | QUICK_I1: category: established CHILD SA; flags: 0: Oct 31 15:24:04.477398: | -> QUICK_I2 EVENT_SA_REPLACE (quick_inR1_outI2) Oct 31 15:24:04.477400: | QUICK_R1: category: established CHILD SA; flags: 0: Oct 31 15:24:04.477403: | -> QUICK_R2 EVENT_SA_REPLACE (quick_inI2) Oct 31 15:24:04.477405: | QUICK_I2: category: established CHILD SA; flags: 0: Oct 31 15:24:04.477407: | -> QUICK_I2 EVENT_NULL (unexpected) Oct 31 15:24:04.477410: | QUICK_R2: category: established CHILD SA; flags: 0: Oct 31 15:24:04.477412: | -> QUICK_R2 EVENT_NULL (unexpected) Oct 31 15:24:04.477415: | INFO: category: informational; flags: 0: Oct 31 15:24:04.477417: | -> INFO EVENT_NULL (informational) Oct 31 15:24:04.477420: | INFO_PROTECTED: category: informational; flags: 0: Oct 31 15:24:04.477422: | -> INFO_PROTECTED EVENT_NULL (informational) Oct 31 15:24:04.477425: | XAUTH_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477427: | -> XAUTH_R1 EVENT_NULL (xauth_inR0) Oct 31 15:24:04.477430: | XAUTH_R1: category: established IKE SA; flags: 0: Oct 31 15:24:04.477431: | -> MAIN_R3 EVENT_SA_REPLACE (xauth_inR1) Oct 31 15:24:04.477433: | MODE_CFG_R0: category: informational; flags: 0: Oct 31 15:24:04.477435: | -> MODE_CFG_R1 EVENT_SA_REPLACE (modecfg_inR0) Oct 31 15:24:04.477438: | MODE_CFG_R1: category: established IKE SA; flags: 0: Oct 31 15:24:04.477440: | -> MODE_CFG_R2 EVENT_SA_REPLACE (modecfg_inR1) Oct 31 15:24:04.477443: | MODE_CFG_R2: category: established IKE SA; flags: 0: Oct 31 15:24:04.477446: | -> MODE_CFG_R2 EVENT_NULL (unexpected) Oct 31 15:24:04.477448: | MODE_CFG_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.477451: | -> MAIN_I4 EVENT_SA_REPLACE (modecfg_inR1) Oct 31 15:24:04.477454: | XAUTH_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477456: | -> XAUTH_I1 EVENT_RETRANSMIT (xauth_inI0) Oct 31 15:24:04.477465: | XAUTH_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.477468: | -> MAIN_I4 EVENT_RETRANSMIT (xauth_inI1) Oct 31 15:24:04.477474: | checking IKEv2 state table Oct 31 15:24:04.477478: | V2_REKEY_IKE_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477481: | -> V2_REKEY_IKE_I1 EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Oct 31 15:24:04.477485: | V2_REKEY_CHILD_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477487: | -> V2_REKEY_CHILD_I1 EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Oct 31 15:24:04.477490: | V2_NEW_CHILD_I0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477492: | -> V2_NEW_CHILD_I1 EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Oct 31 15:24:04.477496: | PARENT_I0: category: ignore; flags: 0: Oct 31 15:24:04.477498: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Oct 31 15:24:04.477501: | PARENT_I1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477503: | -> PARENT_I0 EVENT_SO_DISCARD (received anti-DDOS COOKIE notify response; resending IKE_SA_INIT request with cookie payload added) Oct 31 15:24:04.477509: | -> PARENT_I0 EVENT_SO_DISCARD (received IKE_SA_INIT INVALID_KE_PAYLOAD notify response; resending IKE_SA_INIT with new KE payload) Oct 31 15:24:04.477514: | -> IKESA_DEL EVENT_v2_REDIRECT (received REDIRECT notify response; resending IKE_SA_INIT request to new destination) Oct 31 15:24:04.477518: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH or IKE_INTERMEDIATE) Oct 31 15:24:04.477521: | PARENT_I2: category: open IKE SA; flags: 0: Oct 31 15:24:04.477523: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_INTERMEDIATE reply, initiate IKE_AUTH or IKE_INTERMEDIATE) Oct 31 15:24:04.477525: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Oct 31 15:24:04.477528: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Oct 31 15:24:04.477530: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Oct 31 15:24:04.477532: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Oct 31 15:24:04.477535: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Oct 31 15:24:04.477537: | PARENT_R0: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477540: | -> PARENT_R1 EVENT_SO_DISCARD send-response (Respond to IKE_SA_INIT) Oct 31 15:24:04.477543: | PARENT_R1: category: half-open IKE SA; flags: 0: Oct 31 15:24:04.477545: | -> PARENT_R1 EVENT_SA_REPLACE send-response (Responder: process IKE_AUTH request (no SKEYSEED)) Oct 31 15:24:04.477547: | -> PARENT_R1 EVENT_SA_REPLACE send-response (Responder: process IKE_INTERMEDIATE request (no SKEYSEED)) Oct 31 15:24:04.477550: | -> PARENT_R1 EVENT_SA_REPLACE send-response (Responder: process IKE_INTERMEDIATE request (with SKEYSEED)) Oct 31 15:24:04.477552: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE send-response (Responder: process IKE_AUTH request) Oct 31 15:24:04.477556: | V2_REKEY_IKE_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477558: | -> ESTABLISHED_IKE_SA EVENT_SA_REPLACE send-response (Respond to CREATE_CHILD_SA IKE Rekey) Oct 31 15:24:04.477561: | V2_REKEY_IKE_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.477564: | -> ESTABLISHED_IKE_SA EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Oct 31 15:24:04.477567: | V2_NEW_CHILD_I1: category: established IKE SA; flags: 0: Oct 31 15:24:04.477569: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Oct 31 15:24:04.477572: | V2_REKEY_CHILD_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477578: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE send-response (Respond to CREATE_CHILD_SA rekey CHILD SA request) Oct 31 15:24:04.477583: | V2_NEW_CHILD_R0: category: established IKE SA; flags: 0: Oct 31 15:24:04.477590: | -> ESTABLISHED_CHILD_SA EVENT_SA_REPLACE send-response (Respond to CREATE_CHILD_SA IPsec SA Request) Oct 31 15:24:04.477594: | ESTABLISHED_IKE_SA: category: established IKE SA; flags: 0: Oct 31 15:24:04.477596: | -> ESTABLISHED_IKE_SA EVENT_RETAIN send-response (Informational Request (liveness probe)) Oct 31 15:24:04.477599: | -> ESTABLISHED_IKE_SA EVENT_RETAIN (Informational Response (liveness probe)) Oct 31 15:24:04.477602: | -> ESTABLISHED_IKE_SA EVENT_RETAIN send-response (Informational Request) Oct 31 15:24:04.477604: | -> ESTABLISHED_IKE_SA EVENT_RETAIN (Informational Response) Oct 31 15:24:04.477607: | IKESA_DEL: category: established IKE SA; flags: 0: Oct 31 15:24:04.477609: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Oct 31 15:24:04.477612: | CHILDSA_DEL: category: informational; flags: 0: Oct 31 15:24:04.477615: | -> CHILDSA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Oct 31 15:24:04.477618: | global one-shot timer EVENT_REVIVE_CONNS initialized Oct 31 15:24:04.477622: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Oct 31 15:24:04.477625: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Oct 31 15:24:04.477803: Encryption algorithms: Oct 31 15:24:04.477812: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c Oct 31 15:24:04.477819: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b Oct 31 15:24:04.477824: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a Oct 31 15:24:04.477830: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des Oct 31 15:24:04.477837: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP Oct 31 15:24:04.477844: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia Oct 31 15:24:04.477850: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm, aes_gcm_c Oct 31 15:24:04.477855: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_b Oct 31 15:24:04.477860: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(GCM) aes_gcm_a Oct 31 15:24:04.477865: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr Oct 31 15:24:04.477870: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes Oct 31 15:24:04.477875: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac Oct 31 15:24:04.477878: NULL [] IKEv1: ESP IKEv2: ESP Oct 31 15:24:04.477885: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 Oct 31 15:24:04.477889: Hash algorithms: Oct 31 15:24:04.477893: MD5 IKEv1: IKE IKEv2: NSS Oct 31 15:24:04.477897: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha Oct 31 15:24:04.477901: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 Oct 31 15:24:04.477905: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 Oct 31 15:24:04.477909: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 Oct 31 15:24:04.477911: PRF algorithms: Oct 31 15:24:04.477915: HMAC_MD5 IKEv1: IKE IKEv2: IKE native(HMAC) md5 Oct 31 15:24:04.477920: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 Oct 31 15:24:04.477925: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 Oct 31 15:24:04.477933: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 Oct 31 15:24:04.477940: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 Oct 31 15:24:04.477946: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc Oct 31 15:24:04.477949: Integrity algorithms: Oct 31 15:24:04.477954: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH native(HMAC) md5, hmac_md5 Oct 31 15:24:04.477959: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 Oct 31 15:24:04.477964: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Oct 31 15:24:04.477969: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Oct 31 15:24:04.477975: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Oct 31 15:24:04.477979: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Oct 31 15:24:04.477984: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 Oct 31 15:24:04.477988: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Oct 31 15:24:04.477991: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Oct 31 15:24:04.477994: DH algorithms: Oct 31 15:24:04.477999: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 Oct 31 15:24:04.478003: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 Oct 31 15:24:04.478008: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 Oct 31 15:24:04.478011: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 Oct 31 15:24:04.478015: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 Oct 31 15:24:04.478018: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 Oct 31 15:24:04.478022: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 Oct 31 15:24:04.478027: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 Oct 31 15:24:04.478031: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 Oct 31 15:24:04.478034: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 Oct 31 15:24:04.478039: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 Oct 31 15:24:04.478042: testing CAMELLIA_CBC: Oct 31 15:24:04.478045: Camellia: 16 bytes with 128-bit key Oct 31 15:24:04.478128: Camellia: 16 bytes with 128-bit key Oct 31 15:24:04.478168: Camellia: 16 bytes with 256-bit key Oct 31 15:24:04.478218: Camellia: 16 bytes with 256-bit key Oct 31 15:24:04.478256: testing AES_GCM_16: Oct 31 15:24:04.478260: empty string Oct 31 15:24:04.478292: one block Oct 31 15:24:04.478326: two blocks Oct 31 15:24:04.478353: two blocks with associated data Oct 31 15:24:04.478382: testing AES_CTR: Oct 31 15:24:04.478385: Encrypting 16 octets using AES-CTR with 128-bit key Oct 31 15:24:04.478413: Encrypting 32 octets using AES-CTR with 128-bit key Oct 31 15:24:04.478441: Encrypting 36 octets using AES-CTR with 128-bit key Oct 31 15:24:04.478471: Encrypting 16 octets using AES-CTR with 192-bit key Oct 31 15:24:04.478506: Encrypting 32 octets using AES-CTR with 192-bit key Oct 31 15:24:04.478541: Encrypting 36 octets using AES-CTR with 192-bit key Oct 31 15:24:04.478582: Encrypting 16 octets using AES-CTR with 256-bit key Oct 31 15:24:04.478625: Encrypting 32 octets using AES-CTR with 256-bit key Oct 31 15:24:04.478668: Encrypting 36 octets using AES-CTR with 256-bit key Oct 31 15:24:04.478713: testing AES_CBC: Oct 31 15:24:04.478719: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Oct 31 15:24:04.478760: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Oct 31 15:24:04.478804: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Oct 31 15:24:04.478853: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Oct 31 15:24:04.478908: testing AES_XCBC: Oct 31 15:24:04.478914: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input Oct 31 15:24:04.479060: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input Oct 31 15:24:04.479204: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input Oct 31 15:24:04.479340: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input Oct 31 15:24:04.479483: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input Oct 31 15:24:04.479633: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input Oct 31 15:24:04.479801: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input Oct 31 15:24:04.480120: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Oct 31 15:24:04.480286: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Oct 31 15:24:04.480449: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Oct 31 15:24:04.480705: testing HMAC_MD5: Oct 31 15:24:04.480711: RFC 2104: MD5_HMAC test 1 Oct 31 15:24:04.480916: RFC 2104: MD5_HMAC test 2 Oct 31 15:24:04.481110: RFC 2104: MD5_HMAC test 3 Oct 31 15:24:04.481334: 8 CPU cores online Oct 31 15:24:04.481343: starting up 7 helper threads Oct 31 15:24:04.481379: started thread for helper 0 Oct 31 15:24:04.481408: started thread for helper 1 Oct 31 15:24:04.481430: started thread for helper 2 Oct 31 15:24:04.481449: started thread for helper 3 Oct 31 15:24:04.481472: started thread for helper 4 Oct 31 15:24:04.481493: started thread for helper 5 Oct 31 15:24:04.481515: started thread for helper 6 Oct 31 15:24:04.481546: Using Linux XFRM/NETKEY IPsec kernel support code on 5.8.15-201.fc32.x86_64 Oct 31 15:24:04.481603: | Hard-wiring algorithms Oct 31 15:24:04.481609: | adding AES_CCM_16 to kernel algorithm db Oct 31 15:24:04.481616: | adding AES_CCM_12 to kernel algorithm db Oct 31 15:24:04.481618: | adding AES_CCM_8 to kernel algorithm db Oct 31 15:24:04.481621: | adding 3DES_CBC to kernel algorithm db Oct 31 15:24:04.481623: | adding CAMELLIA_CBC to kernel algorithm db Oct 31 15:24:04.481626: | adding AES_GCM_16 to kernel algorithm db Oct 31 15:24:04.481628: | adding AES_GCM_12 to kernel algorithm db Oct 31 15:24:04.481631: | adding AES_GCM_8 to kernel algorithm db Oct 31 15:24:04.481633: | adding AES_CTR to kernel algorithm db Oct 31 15:24:04.481635: | adding AES_CBC to kernel algorithm db Oct 31 15:24:04.481638: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Oct 31 15:24:04.481640: | adding NULL to kernel algorithm db Oct 31 15:24:04.481643: | adding CHACHA20_POLY1305 to kernel algorithm db Oct 31 15:24:04.481649: | adding HMAC_MD5_96 to kernel algorithm db Oct 31 15:24:04.481652: | adding HMAC_SHA1_96 to kernel algorithm db Oct 31 15:24:04.481655: | adding HMAC_SHA2_512_256 to kernel algorithm db Oct 31 15:24:04.481657: | adding HMAC_SHA2_384_192 to kernel algorithm db Oct 31 15:24:04.481659: | adding HMAC_SHA2_256_128 to kernel algorithm db Oct 31 15:24:04.481662: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Oct 31 15:24:04.481664: | adding AES_XCBC_96 to kernel algorithm db Oct 31 15:24:04.481667: | adding AES_CMAC_96 to kernel algorithm db Oct 31 15:24:04.481669: | adding NONE to kernel algorithm db Oct 31 15:24:04.481705: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Oct 31 15:24:04.481717: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Oct 31 15:24:04.481720: | setup kernel fd callback Oct 31 15:24:04.481724: | add_fd_read_event_handler: newref KERNEL_XRM_FD-pe@0x563a868086d0 Oct 31 15:24:04.481727: | libevent_malloc: newref ptr-libevent@0x563a8680c640 size 128 Oct 31 15:24:04.481731: | libevent_malloc: newref ptr-libevent@0x563a86803520 size 16 Oct 31 15:24:04.481739: | add_fd_read_event_handler: newref KERNEL_ROUTE_FD-pe@0x563a86805200 Oct 31 15:24:04.481744: | libevent_malloc: newref ptr-libevent@0x563a8680d2f0 size 128 Oct 31 15:24:04.481747: | libevent_malloc: newref ptr-libevent@0x563a86803500 size 16 Oct 31 15:24:04.481959: | global one-shot timer EVENT_CHECK_CRLS initialized Oct 31 15:24:04.481994: SELinux support is enabled in PERMISSIVE mode. Oct 31 15:24:04.482178: | unbound context created - setting debug level to 5 Oct 31 15:24:04.482216: | /etc/hosts lookups activated Oct 31 15:24:04.482236: | /etc/resolv.conf usage activated Oct 31 15:24:04.482289: | outgoing-port-avoid set 0-65535 Oct 31 15:24:04.482316: | outgoing-port-permit set 32768-60999 Oct 31 15:24:04.482322: | loading dnssec root key from:/var/lib/unbound/root.key Oct 31 15:24:04.482325: | no additional dnssec trust anchors defined via dnssec-trusted= option Oct 31 15:24:04.482328: | Setting up events, loop start Oct 31 15:24:04.482331: | add_fd_read_event_handler: newref PLUTO_CTL_FD-pe@0x563a8680f940 Oct 31 15:24:04.482334: | libevent_malloc: newref ptr-libevent@0x563a8680d380 size 128 Oct 31 15:24:04.482337: | libevent_malloc: newref ptr-libevent@0x563a8680f980 size 16 Oct 31 15:24:04.482344: | libevent_realloc: newref ptr-libevent@0x563a8680f9a0 size 256 Oct 31 15:24:04.482347: | libevent_malloc: newref ptr-libevent@0x563a8680fab0 size 8 Oct 31 15:24:04.482350: | libevent_realloc: newref ptr-libevent@0x563a868028e0 size 144 Oct 31 15:24:04.482353: | libevent_malloc: newref ptr-libevent@0x563a8680fad0 size 152 Oct 31 15:24:04.482357: | libevent_malloc: newref ptr-libevent@0x563a8680fb70 size 16 Oct 31 15:24:04.482362: | signal event handler PLUTO_SIGCHLD installed Oct 31 15:24:04.482364: | libevent_malloc: newref ptr-libevent@0x563a8680fb90 size 8 Oct 31 15:24:04.482367: | libevent_malloc: newref ptr-libevent@0x563a8680fbb0 size 152 Oct 31 15:24:04.482370: | signal event handler PLUTO_SIGTERM installed Oct 31 15:24:04.482372: | libevent_malloc: newref ptr-libevent@0x563a8680fc50 size 8 Oct 31 15:24:04.482375: | libevent_malloc: newref ptr-libevent@0x563a8680fc70 size 152 Oct 31 15:24:04.482378: | signal event handler PLUTO_SIGHUP installed Oct 31 15:24:04.482381: | libevent_malloc: newref ptr-libevent@0x563a8680fd10 size 8 Oct 31 15:24:04.482384: | libevent_realloc: delref ptr-libevent@0x563a868028e0 Oct 31 15:24:04.482387: | libevent_realloc: newref ptr-libevent@0x563a8680fd30 size 256 Oct 31 15:24:04.482389: | libevent_malloc: newref ptr-libevent@0x563a868028e0 size 152 Oct 31 15:24:04.482392: | signal event handler PLUTO_SIGSYS installed Oct 31 15:24:04.482787: | created addconn helper (pid:2083857) using fork+execve Oct 31 15:24:04.482805: | forked child 2083857 Oct 31 15:24:04.482820: seccomp security disabled Oct 31 15:24:04.487817: | starting helper thread 3 Oct 31 15:24:04.487838: seccomp security disabled for crypto helper 3 Oct 31 15:24:04.487847: | status value returned by setting the priority of this helper thread 3: 22 Oct 31 15:24:04.487853: | helper thread 3 has nothing to do Oct 31 15:24:04.487864: | starting helper thread 5 Oct 31 15:24:04.487867: seccomp security disabled for crypto helper 5 Oct 31 15:24:04.487871: | status value returned by setting the priority of this helper thread 5: 22 Oct 31 15:24:04.487873: | helper thread 5 has nothing to do Oct 31 15:24:04.487884: | starting helper thread 7 Oct 31 15:24:04.487887: seccomp security disabled for crypto helper 7 Oct 31 15:24:04.487890: | status value returned by setting the priority of this helper thread 7: 22 Oct 31 15:24:04.488018: | helper thread 7 has nothing to do Oct 31 15:24:04.490689: | newref struct fd@0x563a8680feb0(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.490710: | fd_accept: new fd-fd@0x563a8680feb0 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.490734: | whack: listen Oct 31 15:24:04.490739: listening for IKE messages Oct 31 15:24:04.490776: | Inspecting interface lo Oct 31 15:24:04.490784: | found lo with address 127.0.0.1 Oct 31 15:24:04.490788: | Inspecting interface eth0 Oct 31 15:24:04.490793: | found eth0 with address 192.0.2.254 Oct 31 15:24:04.490797: | Inspecting interface eth1 Oct 31 15:24:04.490801: | found eth1 with address 192.1.2.23 Oct 31 15:24:04.490812: | newref struct iface_dev@0x563a86810310(0->1) (in add_iface_dev() at iface.c:67) Oct 31 15:24:04.490834: Kernel supports NIC esp-hw-offload Oct 31 15:24:04.490843: | iface: marking eth1 add Oct 31 15:24:04.490847: | newref struct iface_dev@0x563a868103e0(0->1) (in add_iface_dev() at iface.c:67) Oct 31 15:24:04.490851: | iface: marking eth0 add Oct 31 15:24:04.490855: | newref struct iface_dev@0x563a86810470(0->1) (in add_iface_dev() at iface.c:67) Oct 31 15:24:04.490859: | iface: marking lo add Oct 31 15:24:04.490926: | no interfaces to sort Oct 31 15:24:04.490945: | MSG_ERRQUEUE enabled on fd 18 Oct 31 15:24:04.490961: | addref ifd@0x563a86810310(1->2) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.490966: adding UDP interface eth1 192.1.2.23:500 Oct 31 15:24:04.490982: | MSG_ERRQUEUE enabled on fd 19 Oct 31 15:24:04.490991: | NAT-Traversal: Trying sockopt style NAT-T Oct 31 15:24:04.490995: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Oct 31 15:24:04.490998: | addref ifd@0x563a86810310(2->3) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.491003: adding UDP interface eth1 192.1.2.23:4500 Oct 31 15:24:04.491019: | MSG_ERRQUEUE enabled on fd 20 Oct 31 15:24:04.491028: | addref ifd@0x563a868103e0(1->2) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.491033: adding UDP interface eth0 192.0.2.254:500 Oct 31 15:24:04.491048: | MSG_ERRQUEUE enabled on fd 21 Oct 31 15:24:04.491056: | NAT-Traversal: Trying sockopt style NAT-T Oct 31 15:24:04.491060: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Oct 31 15:24:04.491063: | addref ifd@0x563a868103e0(2->3) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.491068: adding UDP interface eth0 192.0.2.254:4500 Oct 31 15:24:04.491083: | MSG_ERRQUEUE enabled on fd 22 Oct 31 15:24:04.491092: | addref ifd@0x563a86810470(1->2) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.491097: adding UDP interface lo 127.0.0.1:500 Oct 31 15:24:04.491111: | MSG_ERRQUEUE enabled on fd 23 Oct 31 15:24:04.491118: | NAT-Traversal: Trying sockopt style NAT-T Oct 31 15:24:04.491122: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Oct 31 15:24:04.491125: | addref ifd@0x563a86810470(2->3) (in bind_iface_port() at iface.c:237) Oct 31 15:24:04.491130: adding UDP interface lo 127.0.0.1:4500 Oct 31 15:24:04.491134: | updating interfaces - listing interfaces that are going down Oct 31 15:24:04.491137: | updating interfaces - checking orientation Oct 31 15:24:04.491139: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Oct 31 15:24:04.491165: | libevent_malloc: newref ptr-libevent@0x563a86810ca0 size 128 Oct 31 15:24:04.491169: | libevent_malloc: newref ptr-libevent@0x563a868108e0 size 16 Oct 31 15:24:04.491180: | setup callback for interface lo 127.0.0.1:4500 fd 23 on UDP Oct 31 15:24:04.491183: | libevent_malloc: newref ptr-libevent@0x563a86810d30 size 128 Oct 31 15:24:04.491186: | libevent_malloc: newref ptr-libevent@0x563a86810dc0 size 16 Oct 31 15:24:04.491192: | setup callback for interface lo 127.0.0.1:500 fd 22 on UDP Oct 31 15:24:04.491195: | libevent_malloc: newref ptr-libevent@0x563a86810de0 size 128 Oct 31 15:24:04.491203: | libevent_malloc: newref ptr-libevent@0x563a86810e70 size 16 Oct 31 15:24:04.491211: | setup callback for interface eth0 192.0.2.254:4500 fd 21 on UDP Oct 31 15:24:04.491214: | libevent_malloc: newref ptr-libevent@0x563a86810e90 size 128 Oct 31 15:24:04.491220: | libevent_malloc: newref ptr-libevent@0x563a86810f20 size 16 Oct 31 15:24:04.491225: | setup callback for interface eth0 192.0.2.254:500 fd 20 on UDP Oct 31 15:24:04.491228: | libevent_malloc: newref ptr-libevent@0x563a86810f40 size 128 Oct 31 15:24:04.491230: | libevent_malloc: newref ptr-libevent@0x563a86810fd0 size 16 Oct 31 15:24:04.491235: | setup callback for interface eth1 192.1.2.23:4500 fd 19 on UDP Oct 31 15:24:04.491238: | libevent_malloc: newref ptr-libevent@0x563a86810ff0 size 128 Oct 31 15:24:04.491240: | libevent_malloc: newref ptr-libevent@0x563a86811080 size 16 Oct 31 15:24:04.491245: | setup callback for interface eth1 192.1.2.23:500 fd 18 on UDP Oct 31 15:24:04.493108: | no stale xfrmi interface 'ipsec1' found Oct 31 15:24:04.493131: | certs and keys locked by 'free_preshared_secrets' Oct 31 15:24:04.493135: | certs and keys unlocked by 'free_preshared_secrets' Oct 31 15:24:04.493160: loading secrets from "/etc/ipsec.secrets" Oct 31 15:24:04.493229: no secrets filename matched "/etc/ipsec.d/*.secrets" Oct 31 15:24:04.493244: | old food groups: Oct 31 15:24:04.493247: | new food groups: Oct 31 15:24:04.493253: | delref fd@0x563a8680feb0(1->0) (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.493260: | freeref fd-fd@0x563a8680feb0 (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.493268: | spent 0.751 (2.59) milliseconds in whack Oct 31 15:24:04.493287: | newref struct fd@0x563a8680fed0(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.493290: | fd_accept: new fd-fd@0x563a8680fed0 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.493301: | whack: options (impair|debug) Oct 31 15:24:04.493306: | old debugging base+cpu-usage + none Oct 31 15:24:04.493309: | new debugging = base+cpu-usage Oct 31 15:24:04.493314: | delref fd@0x563a8680fed0(1->0) (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.493320: | freeref fd-fd@0x563a8680fed0 (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.493324: | spent 0.0446 (0.0446) milliseconds in whack Oct 31 15:24:04.493685: | processing signal PLUTO_SIGCHLD Oct 31 15:24:04.493698: | waitpid returned pid 2083857 (exited with status 0) Oct 31 15:24:04.493703: | reaped addconn helper child (status 0) Oct 31 15:24:04.493708: | waitpid returned ECHILD (no child processes left) Oct 31 15:24:04.493714: | spent 0.0176 (0.0175) milliseconds in signal handler PLUTO_SIGCHLD Oct 31 15:24:04.501566: | starting helper thread 1 Oct 31 15:24:04.501581: seccomp security disabled for crypto helper 1 Oct 31 15:24:04.501586: | status value returned by setting the priority of this helper thread 1: 22 Oct 31 15:24:04.501589: | helper thread 1 has nothing to do Oct 31 15:24:04.501602: | starting helper thread 2 Oct 31 15:24:04.501605: seccomp security disabled for crypto helper 2 Oct 31 15:24:04.501608: | status value returned by setting the priority of this helper thread 2: 22 Oct 31 15:24:04.501611: | helper thread 2 has nothing to do Oct 31 15:24:04.501621: | starting helper thread 4 Oct 31 15:24:04.501623: seccomp security disabled for crypto helper 4 Oct 31 15:24:04.501626: | status value returned by setting the priority of this helper thread 4: 22 Oct 31 15:24:04.501629: | helper thread 4 has nothing to do Oct 31 15:24:04.501638: | starting helper thread 6 Oct 31 15:24:04.501641: seccomp security disabled for crypto helper 6 Oct 31 15:24:04.501644: | status value returned by setting the priority of this helper thread 6: 22 Oct 31 15:24:04.501646: | helper thread 6 has nothing to do Oct 31 15:24:04.588713: | newref struct fd@0x563a8680fef0(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.588730: | fd_accept: new fd-fd@0x563a8680fef0 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:04.589641: | whack: delete 'test' Oct 31 15:24:04.589654: | FOR_EACH_CONNECTION_... in conn_by_name Oct 31 15:24:04.589658: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Oct 31 15:24:04.589660: | FOR_EACH_CONNECTION_... in conn_by_name Oct 31 15:24:04.589662: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Oct 31 15:24:04.589670: | whack: connection 'test' Oct 31 15:24:04.589676: | addref fd@0x563a8680fef0(1->2) (in string_logger() at log.c:838) Oct 31 15:24:04.589682: | newref string logger@0x563a868038f0(0->1) (in add_connection() at connections.c:1998) Oct 31 15:24:04.589686: | Connection DB: adding connection "test" $1 Oct 31 15:24:04.589692: | FOR_EACH_CONNECTION_... in conn_by_name Oct 31 15:24:04.589704: | added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO Oct 31 15:24:04.589706: | from whack: got --esp=aes256-sha1,aes-sha1 Oct 31 15:24:04.589737: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96 Oct 31 15:24:04.589746: | counting wild cards for 192.1.2.23 is 0 Oct 31 15:24:04.589752: | counting wild cards for 192.1.2.45 is 0 Oct 31 15:24:04.589755: | updating connection from left.host_addr Oct 31 15:24:04.589758: | right host_nexthop 192.1.2.23 Oct 31 15:24:04.589761: | left host_port 500 Oct 31 15:24:04.589763: | updating connection from right.host_addr Oct 31 15:24:04.589767: | left host_nexthop 192.1.2.45 Oct 31 15:24:04.589769: | right host_port 500 Oct 31 15:24:04.589774: | orienting test Oct 31 15:24:04.589779: | test doesn't match 127.0.0.1:4500 at all Oct 31 15:24:04.589783: | test doesn't match 127.0.0.1:500 at all Oct 31 15:24:04.589787: | test doesn't match 192.0.2.254:4500 at all Oct 31 15:24:04.589790: | test doesn't match 192.0.2.254:500 at all Oct 31 15:24:04.589794: | test doesn't match 192.1.2.23:4500 at all Oct 31 15:24:04.589796: | oriented test's this Oct 31 15:24:04.589802: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Oct 31 15:24:04.589807: | newref hp@0x563a86810080(0->1) (in connect_to_host_pair() at hostpair.c:290) Oct 31 15:24:04.589810: added IKEv1 connection "test" Oct 31 15:24:04.589819: | ike_life: 3600; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+IKE_FRAG_ALLOW+ESN_NO Oct 31 15:24:04.589829: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29 Oct 31 15:24:04.589832: | delref logger@0x563a868038f0(1->0) (in add_connection() at connections.c:2026) Oct 31 15:24:04.589835: | delref fd@0x563a8680fef0(2->1) (in free_logger() at log.c:853) Oct 31 15:24:04.589838: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:04.589843: | delref fd@0x563a8680fef0(1->0) (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.589849: | freeref fd-fd@0x563a8680fef0 (in whack_handle_cb() at rcv_whack.c:903) Oct 31 15:24:04.589857: | spent 0.263 (1.15) milliseconds in whack Oct 31 15:24:05.533868: | spent 0.00372 (0.00368) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.533893: | newref struct msg_digest@0x563a86811ca0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.533897: | newref alloc logger@0x563a868038f0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.533905: | *received 108 bytes from 192.1.2.45:59276 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.533908: | 13 da 08 ab be 7c 09 8f b7 6c 23 2b 6e b8 93 d6 Oct 31 15:24:05.533910: | 01 10 05 00 00 00 00 00 00 00 00 6c 0d 00 00 3c Oct 31 15:24:05.533912: | 00 00 00 01 00 00 00 01 00 00 00 30 01 01 00 01 Oct 31 15:24:05.533914: | 00 00 00 28 01 01 00 00 80 01 00 07 80 0e 01 00 Oct 31 15:24:05.533917: | 80 02 00 01 80 04 00 02 80 03 00 01 80 0b 00 01 Oct 31 15:24:05.533918: | 00 0c 00 04 00 01 51 80 00 00 00 14 43 9b 59 f8 Oct 31 15:24:05.533921: | ba 67 6c 4c 77 37 ae 22 ea b8 f5 82 Oct 31 15:24:05.533928: | **parse ISAKMP Message: Oct 31 15:24:05.533933: | initiator SPI: 13 da 08 ab be 7c 09 8f Oct 31 15:24:05.533937: | responder SPI: b7 6c 23 2b 6e b8 93 d6 Oct 31 15:24:05.533940: | next payload type: ISAKMP_NEXT_SA (0x1) Oct 31 15:24:05.533943: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.533945: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.533949: | flags: none (0x0) Oct 31 15:24:05.533956: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.533960: | length: 108 (00 00 00 6c) Oct 31 15:24:05.533962: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) Oct 31 15:24:05.533966: | State DB: IKEv1 state not found (find_v1_info_state) Oct 31 15:24:05.533969: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.533972: | #null state always idle Oct 31 15:24:05.533978: packet from 192.1.2.45:59276: message ignored because it contains a payload type (ISAKMP_NEXT_SA) unexpected by state STATE_INFO Oct 31 15:24:05.533988: | #0 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.533994: packet from 192.1.2.45:59276: sending notification INVALID_PAYLOAD_TYPE to 192.1.2.45:59276 Oct 31 15:24:05.533997: | opening output PBS notification msg Oct 31 15:24:05.533999: | **emit ISAKMP Message: Oct 31 15:24:05.534003: | initiator SPI: 13 da 08 ab be 7c 09 8f Oct 31 15:24:05.534007: | responder SPI: b7 6c 23 2b 6e b8 93 d6 Oct 31 15:24:05.534010: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.534012: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.534014: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.534016: | flags: none (0x0) Oct 31 15:24:05.534020: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.534023: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.534026: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.534028: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.534031: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.534034: | protocol ID: 1 (01) Oct 31 15:24:05.534036: | SPI size: 0 (00) Oct 31 15:24:05.534038: | Notify Message Type: INVALID_PAYLOAD_TYPE (0x1) Oct 31 15:24:05.534041: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.534043: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.534046: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.534049: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.534059: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:59276 using UDP (for #0) Oct 31 15:24:05.534061: | 13 da 08 ab be 7c 09 8f b7 6c 23 2b 6e b8 93 d6 Oct 31 15:24:05.534063: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.534065: | 00 00 00 01 01 00 00 01 Oct 31 15:24:05.534096: | processing: STOP state #0 (in process_md() at demux.c:287) Oct 31 15:24:05.534380: | delref mdp@0x563a86811ca0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.534391: | delref logger@0x563a868038f0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.534395: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.534397: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.534404: | spent 0.264 (0.55) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.534418: | **parse ISAKMP Message (raw): Oct 31 15:24:05.534423: | initiator SPI: 13 da 08 ab be 7c 09 8f Oct 31 15:24:05.534427: | responder SPI: b7 6c 23 2b 6e b8 93 d6 Oct 31 15:24:05.534430: | next payload type: 11 (0b) Oct 31 15:24:05.534432: | ISAKMP version: 16 (10) Oct 31 15:24:05.534435: | exchange type: 5 (05) Oct 31 15:24:05.534438: | flags: 0 (00) Oct 31 15:24:05.534441: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.534445: | length: 40 (00 00 00 28) Oct 31 15:24:05.534448: | State DB: IKEv1 state not found (find_likely_sender) Oct 31 15:24:05.534451: | MSG_ERRQUEUE packet has no matching IKEv1 SA Oct 31 15:24:05.534453: | rejected packet: Oct 31 15:24:05.534456: | 13 da 08 ab be 7c 09 8f b7 6c 23 2b 6e b8 93 d6 Oct 31 15:24:05.534458: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.534460: | 00 00 00 01 01 00 00 01 Oct 31 15:24:05.534466: | control: Oct 31 15:24:05.534468: | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 Oct 31 15:24:05.534470: | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 Oct 31 15:24:05.534472: | 02 00 00 00 c0 01 02 2d 00 00 00 00 00 00 00 00 Oct 31 15:24:05.534475: | name: Oct 31 15:24:05.534477: | 02 00 e7 8c c0 01 02 2d 00 00 00 00 00 00 00 00 Oct 31 15:24:05.534487: | ERROR: asynchronous network error report on eth1 (192.1.2.23:500), complainant 192.1.2.45: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Oct 31 15:24:05.534494: | spent 0.08 (0.08) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.534498: | spent 0.0858 (0.0857) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.609735: | spent 0.00228 (0.00229) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.609754: | newref struct msg_digest@0x563a86811ca0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.609758: | newref alloc logger@0x563a868038f0(0->1) (in read_message() at demux.c:103) Oct 31 15:24:05.609765: | *received 124 bytes from 192.1.2.45:42816 on eth1 192.1.2.23:500 using UDP Oct 31 15:24:05.609768: | e8 83 6b 35 6b 7c 1b ae 00 00 00 00 00 00 00 00 Oct 31 15:24:05.609771: | 09 10 02 00 00 00 00 00 00 00 00 7c 0d 00 00 38 Oct 31 15:24:05.609773: | 00 00 00 01 00 00 00 01 00 00 00 2c 01 01 00 01 Oct 31 15:24:05.609775: | 00 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 Oct 31 15:24:05.609777: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 06 Oct 31 15:24:05.609780: | 80 04 00 14 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Oct 31 15:24:05.609782: | 6b 86 96 fc 77 57 01 00 00 00 00 14 a9 b9 b1 03 Oct 31 15:24:05.609784: | 4f 7e 50 a2 51 3b 47 b1 00 bb 85 a9 Oct 31 15:24:05.609788: | **parse ISAKMP Message: Oct 31 15:24:05.609793: | initiator SPI: e8 83 6b 35 6b 7c 1b ae Oct 31 15:24:05.609797: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.609800: | next payload type: ISAKMP_NEXT_SIG (0x9) Oct 31 15:24:05.609803: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.609805: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Oct 31 15:24:05.609808: | flags: none (0x0) Oct 31 15:24:05.609812: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.609815: | length: 124 (00 00 00 7c) Oct 31 15:24:05.609818: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Oct 31 15:24:05.609822: | State DB: IKEv1 state not found (find_state_ikev1_init) Oct 31 15:24:05.609825: | #null state always idle Oct 31 15:24:05.609831: packet from 192.1.2.45:42816: message ignored because it contains a payload type (ISAKMP_NEXT_SIG) unexpected by state STATE_MAIN_R0 Oct 31 15:24:05.609836: | #0 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2631) Oct 31 15:24:05.609842: packet from 192.1.2.45:42816: sending notification INVALID_PAYLOAD_TYPE to 192.1.2.45:42816 Oct 31 15:24:05.609845: | opening output PBS notification msg Oct 31 15:24:05.609847: | **emit ISAKMP Message: Oct 31 15:24:05.609851: | initiator SPI: e8 83 6b 35 6b 7c 1b ae Oct 31 15:24:05.609856: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.609858: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.609860: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Oct 31 15:24:05.609863: | exchange type: ISAKMP_XCHG_INFO (0x5) Oct 31 15:24:05.609865: | flags: none (0x0) Oct 31 15:24:05.609869: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.609872: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Oct 31 15:24:05.609875: | ***emit ISAKMP Notification Payload: Oct 31 15:24:05.609878: | next payload type: ISAKMP_NEXT_NONE (0x0) Oct 31 15:24:05.609880: | DOI: ISAKMP_DOI_IPSEC (0x1) Oct 31 15:24:05.609883: | protocol ID: 1 (01) Oct 31 15:24:05.609886: | SPI size: 0 (00) Oct 31 15:24:05.609888: | Notify Message Type: INVALID_PAYLOAD_TYPE (0x1) Oct 31 15:24:05.609894: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Oct 31 15:24:05.609897: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Oct 31 15:24:05.609900: | emitting length of ISAKMP Notification Payload: 12 Oct 31 15:24:05.609902: | emitting length of ISAKMP Message: 40 Oct 31 15:24:05.609909: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:42816 using UDP (for #0) Oct 31 15:24:05.609912: | e8 83 6b 35 6b 7c 1b ae 00 00 00 00 00 00 00 00 Oct 31 15:24:05.609914: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.609916: | 00 00 00 01 01 00 00 01 Oct 31 15:24:05.609950: | processing: STOP state #0 (in process_md() at demux.c:287) Oct 31 15:24:05.609955: | delref mdp@0x563a86811ca0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.609958: | delref logger@0x563a868038f0(1->0) (in handle_packet_cb() at demux.c:318) Oct 31 15:24:05.609961: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.609963: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.609969: | spent 0.222 (0.241) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.609982: | **parse ISAKMP Message (raw): Oct 31 15:24:05.609986: | initiator SPI: e8 83 6b 35 6b 7c 1b ae Oct 31 15:24:05.609991: | responder SPI: 00 00 00 00 00 00 00 00 Oct 31 15:24:05.609993: | next payload type: 11 (0b) Oct 31 15:24:05.609996: | ISAKMP version: 16 (10) Oct 31 15:24:05.609999: | exchange type: 5 (05) Oct 31 15:24:05.610001: | flags: 0 (00) Oct 31 15:24:05.610005: | Message ID: 0 (00 00 00 00) Oct 31 15:24:05.610008: | length: 40 (00 00 00 28) Oct 31 15:24:05.610011: | State DB: IKEv1 state not found (find_likely_sender) Oct 31 15:24:05.610014: | MSG_ERRQUEUE packet has no matching IKEv1 SA Oct 31 15:24:05.610016: | rejected packet: Oct 31 15:24:05.610018: | e8 83 6b 35 6b 7c 1b ae 00 00 00 00 00 00 00 00 Oct 31 15:24:05.610020: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Oct 31 15:24:05.610023: | 00 00 00 01 01 00 00 01 Oct 31 15:24:05.610025: | control: Oct 31 15:24:05.610027: | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 Oct 31 15:24:05.610029: | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 Oct 31 15:24:05.610031: | 02 00 00 00 c0 01 02 2d 00 00 00 00 00 00 00 00 Oct 31 15:24:05.610033: | name: Oct 31 15:24:05.610035: | 02 00 a7 40 c0 01 02 2d 00 00 00 00 00 00 00 00 Oct 31 15:24:05.610043: | ERROR: asynchronous network error report on eth1 (192.1.2.23:500), complainant 192.1.2.45: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Oct 31 15:24:05.610048: | spent 0.0697 (0.0697) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Oct 31 15:24:05.610052: | spent 0.075 (0.0749) milliseconds in handle_packet_cb() reading and processing packet Oct 31 15:24:05.841533: | newref struct fd@0x563a86810190(0->1) (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:05.841559: | fd_accept: new fd-fd@0x563a86810190 (in whack_handle_cb() at rcv_whack.c:869) Oct 31 15:24:05.841575: shutting down Oct 31 15:24:05.841584: | leaking fd-fd@0x563a86810190's FD; will be closed when pluto exits (in whack_handle_cb() at rcv_whack.c:889) Oct 31 15:24:05.841589: | delref fd@0x563a86810190(1->0) (in whack_handle_cb() at rcv_whack.c:895) Oct 31 15:24:05.841592: | freeref fd-fd@0x563a86810190 (in whack_handle_cb() at rcv_whack.c:895) Oct 31 15:24:05.841605: | shutting down helper thread 3 Oct 31 15:24:05.841633: | helper thread 3 exited Oct 31 15:24:05.841647: | shutting down helper thread 5 Oct 31 15:24:05.841683: | helper thread 5 exited Oct 31 15:24:05.841871: | shutting down helper thread 7 Oct 31 15:24:05.841884: | helper thread 7 exited Oct 31 15:24:05.842154: | shutting down helper thread 1 Oct 31 15:24:05.842311: | helper thread 1 exited Oct 31 15:24:05.842332: | shutting down helper thread 2 Oct 31 15:24:05.842474: | helper thread 2 exited Oct 31 15:24:05.842488: | shutting down helper thread 4 Oct 31 15:24:05.842510: | helper thread 4 exited Oct 31 15:24:05.842521: | shutting down helper thread 6 Oct 31 15:24:05.842540: | helper thread 6 exited Oct 31 15:24:05.842544: 7 helper threads shutdown Oct 31 15:24:05.842548: | delref root_certs@NULL (in free_root_certs() at root_certs.c:127) Oct 31 15:24:05.842551: | certs and keys locked by 'free_preshared_secrets' Oct 31 15:24:05.842553: | certs and keys unlocked by 'free_preshared_secrets' Oct 31 15:24:05.842558: | deleting states for connection - including all other IPsec SA's of this IKE SA Oct 31 15:24:05.842560: | pass 0 Oct 31 15:24:05.842563: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Oct 31 15:24:05.842565: | pass 1 Oct 31 15:24:05.842567: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Oct 31 15:24:05.842572: | addref fd@NULL (in clone_logger() at log.c:809) Oct 31 15:24:05.842574: | addref fd@NULL (in clone_logger() at log.c:810) Oct 31 15:24:05.842578: | newref clone logger@0x563a868038f0(0->1) (in clone_logger() at log.c:817) Oct 31 15:24:05.842583: | delref hp@0x563a86810080(1->0) (in delete_oriented_hp() at hostpair.c:360) Oct 31 15:24:05.842585: | flush revival: connection 'test' wasn't on the list Oct 31 15:24:05.842589: | delref vip@NULL (in discard_connection() at connections.c:262) Oct 31 15:24:05.842591: | delref vip@NULL (in discard_connection() at connections.c:263) Oct 31 15:24:05.842600: | Connection DB: deleting connection $1 Oct 31 15:24:05.842604: | delref logger@0x563a868038f0(1->0) (in delete_connection() at connections.c:214) Oct 31 15:24:05.842607: | delref fd@NULL (in free_logger() at log.c:853) Oct 31 15:24:05.842609: | delref fd@NULL (in free_logger() at log.c:854) Oct 31 15:24:05.842612: | crl fetch request list locked by 'free_crl_fetch' Oct 31 15:24:05.842615: | crl fetch request list unlocked by 'free_crl_fetch' Oct 31 15:24:05.842623: | iface: marking eth1 dead Oct 31 15:24:05.842625: | iface: marking eth0 dead Oct 31 15:24:05.842627: | iface: marking lo dead Oct 31 15:24:05.842629: | updating interfaces - listing interfaces that are going down Oct 31 15:24:05.842635: shutting down interface lo 127.0.0.1:4500 Oct 31 15:24:05.842639: shutting down interface lo 127.0.0.1:500 Oct 31 15:24:05.842643: shutting down interface eth0 192.0.2.254:4500 Oct 31 15:24:05.842647: shutting down interface eth0 192.0.2.254:500 Oct 31 15:24:05.842650: shutting down interface eth1 192.1.2.23:4500 Oct 31 15:24:05.842654: shutting down interface eth1 192.1.2.23:500 Oct 31 15:24:05.842656: | updating interfaces - deleting the dead Oct 31 15:24:05.842662: | FOR_EACH_STATE_... in delete_states_dead_interfaces Oct 31 15:24:05.842671: | libevent_free: delref ptr-libevent@0x563a86810ca0 Oct 31 15:24:05.842674: | delref id@0x563a86810470(3->2) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842685: | libevent_free: delref ptr-libevent@0x563a86810d30 Oct 31 15:24:05.842689: | delref id@0x563a86810470(2->1) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842695: | libevent_free: delref ptr-libevent@0x563a86810de0 Oct 31 15:24:05.842698: | delref id@0x563a868103e0(3->2) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842704: | libevent_free: delref ptr-libevent@0x563a86810e90 Oct 31 15:24:05.842707: | delref id@0x563a868103e0(2->1) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842713: | libevent_free: delref ptr-libevent@0x563a86810f40 Oct 31 15:24:05.842716: | delref id@0x563a86810310(3->2) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842722: | libevent_free: delref ptr-libevent@0x563a86810ff0 Oct 31 15:24:05.842725: | delref id@0x563a86810310(2->1) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842730: | delref id@0x563a86810310(1->0) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842733: | delref id@0x563a868103e0(1->0) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842736: | delref id@0x563a86810470(1->0) (in release_iface_dev() at iface.c:125) Oct 31 15:24:05.842742: | updating interfaces - checking orientation Oct 31 15:24:05.842744: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Oct 31 15:24:05.845580: | libevent_free: delref ptr-libevent@0x563a8680d380 Oct 31 15:24:05.845642: | free_event_entry: delref EVENT_NULL-pe@0x563a8680f940 Oct 31 15:24:05.845650: | libevent_free: delref ptr-libevent@0x563a8680d2f0 Oct 31 15:24:05.845653: | free_event_entry: delref EVENT_NULL-pe@0x563a86805200 Oct 31 15:24:05.845659: | libevent_free: delref ptr-libevent@0x563a8680c640 Oct 31 15:24:05.845662: | free_event_entry: delref EVENT_NULL-pe@0x563a868086d0 Oct 31 15:24:05.845666: | global timer EVENT_REINIT_SECRET uninitialized Oct 31 15:24:05.845669: | global timer EVENT_SHUNT_SCAN uninitialized Oct 31 15:24:05.845671: | global timer EVENT_PENDING_DDNS uninitialized Oct 31 15:24:05.845674: | global timer EVENT_PENDING_PHASE2 uninitialized Oct 31 15:24:05.845676: | global timer EVENT_CHECK_CRLS uninitialized Oct 31 15:24:05.845678: | global timer EVENT_REVIVE_CONNS uninitialized Oct 31 15:24:05.845681: | global timer EVENT_FREE_ROOT_CERTS uninitialized Oct 31 15:24:05.845683: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Oct 31 15:24:05.845685: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Oct 31 15:24:05.845690: | libevent_free: delref ptr-libevent@0x563a8680fad0 Oct 31 15:24:05.845693: | signal event handler PLUTO_SIGCHLD uninstalled Oct 31 15:24:05.845696: | libevent_free: delref ptr-libevent@0x563a8680fbb0 Oct 31 15:24:05.845698: | signal event handler PLUTO_SIGTERM uninstalled Oct 31 15:24:05.845701: | libevent_free: delref ptr-libevent@0x563a8680fc70 Oct 31 15:24:05.845703: | signal event handler PLUTO_SIGHUP uninstalled Oct 31 15:24:05.845706: | libevent_free: delref ptr-libevent@0x563a868028e0 Oct 31 15:24:05.845709: | signal event handler PLUTO_SIGSYS uninstalled Oct 31 15:24:05.845711: | releasing event base Oct 31 15:24:05.845726: | libevent_free: delref ptr-libevent@0x563a8680fd30 Oct 31 15:24:05.845729: | libevent_free: delref ptr-libevent@0x563a867c5e40 Oct 31 15:24:05.845734: | libevent_free: delref ptr-libevent@0x563a867fd8a0 Oct 31 15:24:05.845737: | libevent_free: delref ptr-libevent@0x563a867ff6a0 Oct 31 15:24:05.845739: | libevent_free: delref ptr-libevent@0x563a867fd970 Oct 31 15:24:05.845742: | libevent_free: delref ptr-libevent@0x563a8680f980 Oct 31 15:24:05.845744: | libevent_free: delref ptr-libevent@0x563a8680fb70 Oct 31 15:24:05.845747: | libevent_free: delref ptr-libevent@0x563a867fda40 Oct 31 15:24:05.845749: | libevent_free: delref ptr-libevent@0x563a86803520 Oct 31 15:24:05.845751: | libevent_free: delref ptr-libevent@0x563a86803500 Oct 31 15:24:05.845753: | libevent_free: delref ptr-libevent@0x563a86811080 Oct 31 15:24:05.845756: | libevent_free: delref ptr-libevent@0x563a86810fd0 Oct 31 15:24:05.845758: | libevent_free: delref ptr-libevent@0x563a86810f20 Oct 31 15:24:05.845760: | libevent_free: delref ptr-libevent@0x563a86810e70 Oct 31 15:24:05.845762: | libevent_free: delref ptr-libevent@0x563a86810dc0 Oct 31 15:24:05.845765: | libevent_free: delref ptr-libevent@0x563a868108e0 Oct 31 15:24:05.845767: | libevent_free: delref ptr-libevent@0x563a867ff590 Oct 31 15:24:05.845770: | libevent_free: delref ptr-libevent@0x563a8680fc50 Oct 31 15:24:05.845773: | libevent_free: delref ptr-libevent@0x563a8680fb90 Oct 31 15:24:05.845775: | libevent_free: delref ptr-libevent@0x563a8680fab0 Oct 31 15:24:05.845777: | libevent_free: delref ptr-libevent@0x563a8680fd10 Oct 31 15:24:05.845780: | libevent_free: delref ptr-libevent@0x563a8680f9a0 Oct 31 15:24:05.845782: | libevent_free: delref ptr-libevent@0x563a867ff520 Oct 31 15:24:05.845785: | libevent_free: delref ptr-libevent@0x563a867ff550 Oct 31 15:24:05.845787: | libevent_free: delref ptr-libevent@0x563a867ff280 Oct 31 15:24:05.845790: | releasing global libevent data Oct 31 15:24:05.845792: | libevent_free: delref ptr-libevent@0x563a867fdb10 Oct 31 15:24:05.845795: | libevent_free: delref ptr-libevent@0x563a867fdb40 Oct 31 15:24:05.845798: | libevent_free: delref ptr-libevent@0x563a867ff210