Foreground mode.
2010-03-18 12:25:39: INFO: @(#)ipsec-tools 0.7.1 (http://ipsec-tools.sourceforge.net)
2010-03-18 12:25:39: INFO: @(#)This product linked OpenSSL 0.9.8g 19 Oct 2007 (http://www.openssl.org/)
2010-03-18 12:25:39: INFO: Reading configuration from "/etc/racoon/racoon.conf"
2010-03-18 12:25:39: INFO: Resize address pool from 0 to 255
2010-03-18 12:25:39: DEBUG2: lifetime = 28800
2010-03-18 12:25:39: DEBUG2: lifebyte = 0
2010-03-18 12:25:39: DEBUG2: encklen=128
2010-03-18 12:25:39: DEBUG2: p:1 t:1
2010-03-18 12:25:39: DEBUG2: AES-CBC(7)
2010-03-18 12:25:39: DEBUG2: SHA(2)
2010-03-18 12:25:39: DEBUG2: 1024-bit MODP group(2)
2010-03-18 12:25:39: DEBUG2: RSA signatures(3)
2010-03-18 12:25:39: DEBUG2:
2010-03-18 12:25:39: DEBUG: hmac(modp1024)
2010-03-18 12:25:39: DEBUG: compression algorithm can not be checked because sadb message doesn't support it.
2010-03-18 12:25:39: DEBUG: getsainfo params: loc='ANONYMOUS', rmt='ANONYMOUS', peer='NULL', id=0
2010-03-18 12:25:39: DEBUG: getsainfo pass #2
2010-03-18 12:25:39: DEBUG2: parse successed.
2010-03-18 12:25:39: DEBUG: open /var/run/racoon/racoon.sock as racoon management.
2010-03-18 12:25:39: DEBUG: my interface: fe80::20c:29ff:fecd:9c8a%eth0 (eth0)
2010-03-18 12:25:39: DEBUG: my interface: 2001:1:1:1::1 (eth0)
2010-03-18 12:25:39: DEBUG: my interface: ::1 (lo)
2010-03-18 12:25:39: DEBUG: my interface: 192.168.111.129 (eth0)
2010-03-18 12:25:39: DEBUG: my interface: 127.0.0.1 (lo)
2010-03-18 12:25:39: DEBUG: configuring default isakmp port.
2010-03-18 12:25:39: DEBUG: 5 addrs are configured successfully
2010-03-18 12:25:39: INFO: 127.0.0.1[500] used as isakmp port (fd=6)
2010-03-18 12:25:39: INFO: 127.0.0.1[500] used for NAT-T
2010-03-18 12:25:39: INFO: 192.168.111.129[500] used as isakmp port (fd=7)
2010-03-18 12:25:39: INFO: 192.168.111.129[500] used for NAT-T
2010-03-18 12:25:39: INFO: ::1[500] used as isakmp port (fd=8)
2010-03-18 12:25:39: INFO: 2001:1:1:1::1[500] used as isakmp port (fd=9)
2010-03-18 12:25:39: INFO: fe80::20c:29ff:fecd:9c8a%eth0[500] used as isakmp port (fd=10)
2010-03-18 12:25:39: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:39: DEBUG: get pfkey X_SPDDUMP message
2010-03-18 12:25:39: DEBUG2:
02120000 18000100 01000000 f90d0000 03000500 ff200000 02000000 c0a86f81
00000000 00000000 03000600 ff200000 02000000 c0a86f82 00000000 00000000
04000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 b61ba24b 00000000 00000000 00000000
04001200 02000200 a1080000 00000080 10003200 01020000 00000000 00000000
2010-03-18 12:25:39: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:39: DEBUG: get pfkey X_SPDDUMP message
2010-03-18 12:25:39: DEBUG2:
02120000 18000100 02000000 f90d0000 03000500 ff200000 02000000 c0a86f82
00000000 00000000 03000600 ff200000 02000000 c0a86f81 00000000 00000000
04000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 b61ba24b 00000000 00000000 00000000
04001200 02000300 9a080000 00000080 10003200 01020000 00000000 00000000
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: db :0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:39: DEBUG: get pfkey X_SPDDUMP message
2010-03-18 12:25:39: DEBUG2:
02120000 18000100 03000000 f90d0000 03000500 ff200000 02000000 c0a86f82
00000000 00000000 03000600 ff200000 02000000 c0a86f81 00000000 00000000
04000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 b61ba24b 00000000 00000000 00000000
04001200 02000100 90080000 00000080 10003200 01020000 00000000 00000000
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb9401ea0: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:39: DEBUG: get pfkey X_SPDDUMP message
2010-03-18 12:25:39: DEBUG2:
02120000 1c000100 04000000 f90d0000 05000500 ff800000 0a000000 00000000
20010001 00010001 00000000 00000001 00000000 00000000 05000600 ff800000
0a000000 00000000 20010001 00010001 00000000 00000002 00000000 00000000
04000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 b61ba24b 00000000 00000000 00000000
04001200 02000200 89080000 00000080 10003200 01020000 00000000 00000000
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::1/128[0] 2001:1:1:1::2/128[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: db :0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::1/128[0] 2001:1:1:1::2/128[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: db :0xb9401ea0: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::1/128[0] 2001:1:1:1::2/128[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: db :0xb94020e8: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:39: DEBUG: get pfkey X_SPDDUMP message
2010-03-18 12:25:39: DEBUG2:
02120000 1c000100 05000000 f90d0000 05000500 ff800000 0a000000 00000000
20010001 00010001 00000000 00000002 00000000 00000000 05000600 ff800000
0a000000 00000000 20010001 00010001 00000000 00000001 00000000 00000000
04000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 b61ba24b 00000000 00000000 00000000
04001200 02000300 82080000 00000080 10003200 01020000 00000000 00000000
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: db :0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: db :0xb9401ea0: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: db :0xb94020e8: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: db :0xb9402330: 2001:1:1:1::1/128[0] 2001:1:1:1::2/128[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:39: DEBUG: get pfkey X_SPDDUMP message
2010-03-18 12:25:39: DEBUG2:
02120000 1c000100 00000000 f90d0000 05000500 ff800000 0a000000 00000000
20010001 00010001 00000000 00000002 00000000 00000000 05000600 ff800000
0a000000 00000000 20010001 00010001 00000000 00000001 00000000 00000000
04000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 b61ba24b 00000000 00000000 00000000
04001200 02000100 78080000 00000080 10003200 01020000 00000000 00000000
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb9401ea0: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=fwd
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb94020e8: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb9402330: 2001:1:1:1::1/128[0] 2001:1:1:1::2/128[0] proto=any dir=out
2010-03-18 12:25:39: DEBUG: sub:0xbfa67d78: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=in
2010-03-18 12:25:39: DEBUG: db :0xb9402578: 2001:1:1:1::2/128[0] 2001:1:1:1::1/128[0] proto=any dir=fwd
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: 104 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd 00000000 00000000 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030003 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2010-03-18 12:25:43: DEBUG: anonymous configuration selected for 192.168.111.130.
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: INFO: respond new phase 1 negotiation: 192.168.111.129[500]<=>192.168.111.130[500]
2010-03-18 12:25:43: INFO: begin Identity Protection mode.
2010-03-18 12:25:43: DEBUG: begin.
2010-03-18 12:25:43: DEBUG: seen nptype=1(sa)
2010-03-18 12:25:43: DEBUG: seen nptype=13(vid)
2010-03-18 12:25:43: DEBUG: succeed.
2010-03-18 12:25:43: INFO: received Vendor ID: DPD
2010-03-18 12:25:43: DEBUG: total SA len=52
2010-03-18 12:25:43: DEBUG:
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030003 80020002 80040002
2010-03-18 12:25:43: DEBUG: begin.
2010-03-18 12:25:43: DEBUG: seen nptype=2(prop)
2010-03-18 12:25:43: DEBUG: succeed.
2010-03-18 12:25:43: DEBUG: proposal #1 len=44
2010-03-18 12:25:43: DEBUG: begin.
2010-03-18 12:25:43: DEBUG: seen nptype=3(trns)
2010-03-18 12:25:43: DEBUG: succeed.
2010-03-18 12:25:43: DEBUG: transform #1 len=36
2010-03-18 12:25:43: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2010-03-18 12:25:43: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2010-03-18 12:25:43: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: type=Key Length, flag=0x8000, lorv=128
2010-03-18 12:25:43: DEBUG: type=Authentication Method, flag=0x8000, lorv=RSA signatures
2010-03-18 12:25:43: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2010-03-18 12:25:43: DEBUG: hash(sha1)
2010-03-18 12:25:43: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2010-03-18 12:25:43: DEBUG: hmac(modp1024)
2010-03-18 12:25:43: DEBUG: pair 1:
2010-03-18 12:25:43: DEBUG: 0xb9403f78: next=(nil) tnext=(nil)
2010-03-18 12:25:43: DEBUG: proposal #1: 1 transform
2010-03-18 12:25:43: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
2010-03-18 12:25:43: DEBUG: trns#=1, trns-id=IKE
2010-03-18 12:25:43: DEBUG: type=Life Type, flag=0x8000, lorv=seconds
2010-03-18 12:25:43: DEBUG: type=Life Duration, flag=0x8000, lorv=28800
2010-03-18 12:25:43: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
2010-03-18 12:25:43: DEBUG: type=Key Length, flag=0x8000, lorv=128
2010-03-18 12:25:43: DEBUG: type=Authentication Method, flag=0x8000, lorv=RSA signatures
2010-03-18 12:25:43: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA
2010-03-18 12:25:43: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
2010-03-18 12:25:43: DEBUG: Compared: DB:Peer
2010-03-18 12:25:43: DEBUG: (lifetime = 28800:28800)
2010-03-18 12:25:43: DEBUG: (lifebyte = 0:0)
2010-03-18 12:25:43: DEBUG: enctype = AES-CBC:AES-CBC
2010-03-18 12:25:43: DEBUG: (encklen = 128:128)
2010-03-18 12:25:43: DEBUG: hashtype = SHA:SHA
2010-03-18 12:25:43: DEBUG: authmethod = RSA signatures:RSA signatures
2010-03-18 12:25:43: DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group
2010-03-18 12:25:43: DEBUG: an acceptable proposal found.
2010-03-18 12:25:43: DEBUG: hmac(modp1024)
2010-03-18 12:25:43: DEBUG: agreed on RSA signatures auth.
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: new cookie:
fbb9e225b6d1154f
2010-03-18 12:25:43: DEBUG: add payload of len 52, next type 13
2010-03-18 12:25:43: DEBUG: add payload of len 16, next type 0
2010-03-18 12:25:43: DEBUG: 104 bytes from 192.168.111.129[500] to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: sockname 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet from 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: src4 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: dst4 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: 1 times of 104 bytes message will be sent to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 01100200 00000000 00000068 0d000038
00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c7080
80010007 800e0080 80030003 80020002 80040002 00000014 afcad713 68a1f1c9
6b8696fc 77570100
2010-03-18 12:25:43: DEBUG: resend phase1 packet 4b13438c9c4e8ecd:fbb9e225b6d1154f
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: 180 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 04100200 00000000 000000b4 0a000084
6a83bcfa 1ae8f8ae 84de9d16 5e4bcf6a 744adbeb 29efbbe3 c314bdc2 e9382b5d
8d521116 bf880ddc f2a53c5e 762112a3 805685b7 50e96f57 33f97c43 2e396b3d
225a2bf9 b2375459 84b2de40 b3b8cdc6 2a3eabb7 4993d470 90d5885d d69e13b3
94647821 e88f4eaf 35d94120 87da9125 c8bdd59e 9ad4405b edfef213 25509440
00000014 8b95d597 2434d946 8c054049 a3ae9b18
2010-03-18 12:25:43: DEBUG: begin.
2010-03-18 12:25:43: DEBUG: seen nptype=4(ke)
2010-03-18 12:25:43: DEBUG: seen nptype=10(nonce)
2010-03-18 12:25:43: DEBUG: succeed.
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: compute DH's private.
2010-03-18 12:25:43: DEBUG:
74e21017 e58f8f55 dac0a5b7 390ce9ab 2e3f5d87 35efb828 6debfe14 ad26df8d
fecbc889 0b86dd73 e54b96f6 9c496bdf 8adf2dd9 88a9a55c 2c72cfc6 dad3fa90
42480ed0 9f74d57a 3769c8d6 5383ba3a 3f7b86c5 50aca64c 07965a68 380cbf62
8705de2a 44ae116f 10236c06 1ecbf901 c17e5376 c6bef1ad b61f09ac faa9c504
2010-03-18 12:25:43: DEBUG: compute DH's public.
2010-03-18 12:25:43: DEBUG:
e4ffd1f6 4bb468e8 37473d38 9c15924e 97dc4bdf 10042952 eddaea20 27801c29
f098e991 9ce063c6 0cbda84f eaf0795d 22ba7925 10032030 8a2369d5 9ff8868a
abab2091 27f48ede fbf6c711 9ed2cdc3 0d7080de d24f3ba6 6a5fa2e6 f0711d17
ca4e5e0d ceb7f1e1 3b221eab 7c4fbc70 69567258 69331561 82a1abd5 f8d6034f
2010-03-18 12:25:43: DEBUG: create my CR: X.509 Certificate Signature
2010-03-18 12:25:43: DEBUG: add payload of len 128, next type 10
2010-03-18 12:25:43: DEBUG: add payload of len 16, next type 7
2010-03-18 12:25:43: DEBUG: add payload of len 1, next type 0
2010-03-18 12:25:43: DEBUG: 185 bytes from 192.168.111.129[500] to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: sockname 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet from 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: src4 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: dst4 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: 1 times of 185 bytes message will be sent to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 04100200 00000000 000000b9 0a000084
e4ffd1f6 4bb468e8 37473d38 9c15924e 97dc4bdf 10042952 eddaea20 27801c29
f098e991 9ce063c6 0cbda84f eaf0795d 22ba7925 10032030 8a2369d5 9ff8868a
abab2091 27f48ede fbf6c711 9ed2cdc3 0d7080de d24f3ba6 6a5fa2e6 f0711d17
ca4e5e0d ceb7f1e1 3b221eab 7c4fbc70 69567258 69331561 82a1abd5 f8d6034f
07000014 f0aa41c2 1769c790 da2575b6 47c37e3b 00000005 04
2010-03-18 12:25:43: DEBUG: resend phase1 packet 4b13438c9c4e8ecd:fbb9e225b6d1154f
2010-03-18 12:25:43: DEBUG: compute DH's shared.
2010-03-18 12:25:43: DEBUG:
326de165 44e6b07e c24e88b2 fd5a91d7 5b9b6b2f ef6cb163 7877362a de403d6f
ff342797 50457c27 f05e86c1 d2c061d8 deb2c2c3 cf06942a 85e1937a 3535e16d
6a3dca84 75f7591d 43bf6d46 a2861c68 94e202f7 c787dedd a68a623e 322c039a
3ad35b05 63a93e2c bcb730b7 50b35c1c d5dc1dc4 e5c5e3cc 71001af6 61f2ba23
2010-03-18 12:25:43: DEBUG: nonce1: 2010-03-18 12:25:43: DEBUG:
8b95d597 2434d946 8c054049 a3ae9b18
2010-03-18 12:25:43: DEBUG: nonce2: 2010-03-18 12:25:43: DEBUG:
f0aa41c2 1769c790 da2575b6 47c37e3b
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: SKEYID computed:
2010-03-18 12:25:43: DEBUG:
09bc4cf2 2c4e2fac 6fa4d643 5b40a0c1 1f10713e
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: SKEYID_d computed:
2010-03-18 12:25:43: DEBUG:
f64ea170 d42a14dd cfcf0662 785b6fd4 24f41a10
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: SKEYID_a computed:
2010-03-18 12:25:43: DEBUG:
ae3c8e47 f0c08c2c a30c1cac aaa0d7f8 8ecfbdac
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: SKEYID_e computed:
2010-03-18 12:25:43: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423 e6d76785
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: hash(sha1)
2010-03-18 12:25:43: DEBUG: final encryption key computed:
2010-03-18 12:25:43: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:43: DEBUG: hash(sha1)
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: IV computed:
2010-03-18 12:25:43: DEBUG:
0a5bfa12 3bf12e87 a28fec26 d2c44e18
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: 1372 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 05100201 00000000 0000055c f69e020e
766f74db 302f09f0 5a6b5fc4 baadf0ae 37adebb6 546b3002 43baab58 bb48c49b
0657138c 3f98f5f6 c4136664 12f4f8b7 24521505 05a21330 f52f76c4 23d8cf26
ecce35ff 3a11ff3c 6cc3fe7d 0e7675b5 44b8389e 3849bc75 fdbe2087 459b569a
9244710b 86072cdd 7d512ea5 b96e2eea 8d9bddd2 d8e14f0c 301dbb5d 18d27572
f37d885e 1c51b1c4 a87e1587 09f74c5e 94d6cd3a 73030160 b0236de8 a5e10eab
69cc255a 3bf3c189 d3f8dbd1 7ed9b551 f5435778 735a6491 e83d5380 9089594e
d185335c 256f7ddc 12cca514 3c911b91 8147d3e1 c317b8e9 48e9a34b 9a978c36
05395e9c e3219ba0 1a5b6914 85aa16e3 759e913b 627fcab6 d3ef3cf5 26ce44f5
c1d81ca2 ac54fb14 7e50e251 2f7904db 0274a5e7 78b31806 8fe0bcc2 1c98323f
23b54c5b 25019e17 ee3142ec 8a4ea30b a389ecc2 703b7700 70241598 c73bf533
5e645821 a4ab0410 9df92bfe 7c2962ec 2c392e04 340eb74f 8d418141 35c8fee3
d0cfc4cd 3d74f25f 1b07d616 cce29ddb 71b849bb 6f74b4ec 974a57e0 310ca2d8
c21e5bb6 97fb44d3 5400f33a e636c777 932388ee c45afa3f 2dc47549 1787cfcd
38445a40 5cd1027e 37efaad7 3d47f739 8b8d28a5 d5109c94 b699f4b2 3134aadc
d259aa4f 90a762ea 6b4b2835 6fbb597d c4f89d33 83ea9289 84963002 f9d4108c
dc474955 bed1569e 8423a450 6e8ee8bc 2a5ff50f 263db04a a2ce5557 e4bb3c1f
f46272fa 673c0df3 97a17da2 d7ddd64d b2d1c7c5 1d5bd6fc e9e2b2cd 65f6842b
17d5e3c7 84785d50 ea13e4fd 388391b1 dc0c5069 3a53abce c08ed51d cdfc7409
2cadbc42 a0d19ccd c9688151 5ceaa5ae 61beec16 1bbef0c7 6bd5636b 737eff2d
4a9bafe4 23f0a894 801ddd0d 8b3ff7bf 15439a4e c2478544 55d997f2 2160e08c
f4aa2c96 39a1c055 19631826 e869da54 a6a7d23a 56200c08 5ee24ee5 bc29dc4c
bfdb1bf6 8f14e16c ee219652 feb6d356 9af88297 21f107a7 21b4c99b 528f074a
c1925885 00c0658c f8edb49b 676a7744 4825378d 145fe5e3 8251a884 fd559073
b197c66c f45bca05 8e9cf521 7da27c32 ab8a3965 2d5e8513 ea25ea9f ba963950
e994304a ecab4e85 0401ebb1 9b2439e6 e6b88a6e e883a109 2047dae9 272cba56
5996cbad 959da79e 106f4b89 1d0982a5 402ac77d 7a36fd07 52a11fa0 9d0a5dca
a8991164 1e21d9c3 3421737e b09c6480 19518302 3fd83cb7 674ea38c 80a962a8
1db8db27 27aeaf75 2a1aca25 dba1ece7 4bb526dc 8f05543e 0ab8e338 83a9005d
9a0eaf58 7a4a4638 0352cab7 262e3c57 7d0f8a2d d7f96bce 1c36c69a 41a9b7f6
fcd2d317 973b9c83 7b62d939 b6184466 e04a4044 11030c42 9e68781c 153669f4
adde6cfd 82a08900 4791d057 a5f135c3 f62b24dc 69c30c97 f2835a53 5af0b46d
eacbf028 5ca93fb2 62301fcb 6adf9028 2e6729a4 f769fbd2 64569158 d844cb3e
cac18f17 8adc2ea2 2bd76b55 b696adb6 5ae82402 ed633adc f22da518 51ca6336
48107bfa 3d5fd885 2e1b5392 70fd8dc5 8eac042d d97772fd 9dabe2c7 83193a58
fcd013b3 38a77f5a ed2edd92 7d4867b3 e293df93 fae1449a 7a8e688c 4898d4fe
8ee36c1d 0492ba5d c62508fd 4710fcc6 7e03bcca 8667c442 4c322a72 1c45bb70
91f4c2bf 10f794cb f5d4001d 1e16542b 0a339dbf 8e95efe8 aa153e40 8bcbbfad
a1a9f018 3b9a3a6f 4813440f 719844e0 cfc0868f ad423840 f8bd36db 7a984e7b
7b8d506f ce5d0735 f981a12b 5a798f23 85e277fd ce18669a ce836caa c156fc1d
ce605181 5480fa12 7daff73a 5a3e9f9e 4b2c408a f3c1c849 7c0a5c7c c2fc5a0a
babf7edd 306dd2a6 81bc96c1 a23bc1ba b7a44442 98c40748 2f316d8f 4190f2e8
4199a548 f9ac5019 0e9d2b83 a068e645 78ec0f9f b2f84571 c1eb3ba4
2010-03-18 12:25:43: DEBUG: begin decryption.
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: IV was saved for next processing:
2010-03-18 12:25:43: DEBUG:
a068e645 78ec0f9f b2f84571 c1eb3ba4
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: with key:
2010-03-18 12:25:43: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:43: DEBUG: decrypted payload by IV:
2010-03-18 12:25:43: DEBUG:
0a5bfa12 3bf12e87 a28fec26 d2c44e18
2010-03-18 12:25:43: DEBUG: decrypted payload, but not trimed.
2010-03-18 12:25:43: DEBUG:
06000097 09000000 30818c31 0b300906 03550406 13024742 310c300a 06035504
0813034c 6f6e310f 300d0603 55040713 064c6f6e 646f6e31 13301106 0355040a
130a6772 6f777365 2e636f6d 310f300d 06035504 0b130650 656f706c 65311630
14060355 0403130d 416e6472 65772052 6f77736f 6e312030 1e06092a 864886f7
0d010901 1611616e 64726577 4067726f 7773652e 636f6d09 00039404 3082038b
308202f4 a0030201 02020201 04300d06 092a8648 86f70d01 01050500 30818731
13301106 03550403 130a6772 6f777365 2e636f6d 311f301d 06092a86 4886f70d
01090116 10636572 74734067 726f7773 652e636f 6d311630 14060355 040a130d
67726f77 73652e63 6f6d2043 41310b30 09060355 040b1302 4341310f 300d0603
55040713 064c6f6e 646f6e31 0c300a06 03550408 13034c6f 6e310b30 09060355
04061302 4742301e 170d3130 30333137 31323434 32325a17 0d313130 33313731
32343432 325a3081 8c310b30 09060355 04061302 4742310c 300a0603 55040813
034c6f6e 310f300d 06035504 0713064c 6f6e646f 6e311330 11060355 040a130a
67726f77 73652e63 6f6d310f 300d0603 55040b13 0650656f 706c6531 16301406
03550403 130d416e 64726577 20526f77 736f6e31 20301e06 092a8648 86f70d01
09011611 616e6472 65774067 726f7773 652e636f 6d308201 22300d06 092a8648
86f70d01 01010500 0382010f 00308201 0a028201 0100cc90 10722fc4 a23e5cb0
bc69624c aac1f174 bbcc629f 06e57eab 016dcefd ced860af f2324b34 9f2767e5
f6f68d9d 792b40d0 b7845d07 53f73006 1f53dca8 5d2b84e0 16093f4c 3ab0ecea
d9fc3110 76899ce7 b7cdbbde 74baecda 5b0ea1e2 627c4790 0fef2583 8684d04b
266aabbf fd349fc1 98e6634c fe79058d 16e8b6b0 c26a19a4 95533a49 fff77aec
7412a32a d9a32429 fc7ad175 6ab5dd70 873f2c39 47552aac 68d42aec 14ef7a43
ab21955e a4231d15 6598d90f 3031a28e 18124823 a623fa27 a6294047 541d4016
cbba3f8f 37f04682 134303a2 ad325c56 0f058bc0 f915b770 89b5f00c 540f072c
fbac8f32 35e67639 32a727fe 803ef7b5 db33abac e0d90203 010001a3 7b307930
09060355 1d130402 3000302c 06096086 480186f8 42010d04 1f161d4f 70656e53
534c2047 656e6572 61746564 20436572 74696669 63617465 301d0603 551d0e04
1604148e 76b3357f 2bfe00ba 4878fa40 a8cff430 c16d6d30 1f060355 1d230418
30168014 91759c8d b7aa24fa d7dae75c 9f0cc24c 8c774b9a 300d0609 2a864886
f70d0101 05050003 8181000f dd269723 43769245 2d18d786 fe500485 f6d432f1
7d99a655 e91fc68d db7bf823 8c12b74c 68725369 078956e3 53012492 87e01f65
3225f1f9 03d4ef60 bccab74c 2ed08140 ed9e0158 cae38f81 994ef65c a719de81
11062fd7 3a795b77 fc470bbf 32ca3ae5 8ff986fe 707f3a8c dee3577f f0780b5a
32ff108b 30cf46c1 8637c607 0001041b 7cd0b2a5 b93043aa b21d9ae6 a43278cc
2cf719d9 26de6609 6e21d906 e034ab4c 4b72b919 50df7c00 781a876a be8a9f27
9b8324e8 70913830 1aba2d17 1bdeecd5 92e01639 40761be6 f2ee7ff2 57bbcd1e
7d315520 ca160672 bc6d3f8e 01b8574f 5719f0ea b5739b1e 85a6735a caf1b660
4c8842ea c4a2936d 04282796 9da283ca af7b4411 aac14571 b18bf19a 5edc1fc5
a421f41c d54cfa35 03606723 6ca27056 1674e00f 61d4ffe3 7d9aa205 44cb0700
998bc5a1 2370e259 8b3ef4e5 019d983b 9ea405ae c6ba48d4 424422a0 be58f29c
19ff36b5 604a1f80 c518a8b9 9773ac74 c3cb0e22 8d4e4d6a 533150e6 4d04b679
a36e840f 27cc72fb 9e21bec6 20ff2f00 00000504 9afc9fc3 f58bb3da ddf9ef0b
2010-03-18 12:25:43: DEBUG: padding len=12
2010-03-18 12:25:43: DEBUG: skip to trim padding.
2010-03-18 12:25:43: DEBUG: decrypted.
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 05100201 00000000 0000055c 06000097
09000000 30818c31 0b300906 03550406 13024742 310c300a 06035504 0813034c
6f6e310f 300d0603 55040713 064c6f6e 646f6e31 13301106 0355040a 130a6772
6f777365 2e636f6d 310f300d 06035504 0b130650 656f706c 65311630 14060355
0403130d 416e6472 65772052 6f77736f 6e312030 1e06092a 864886f7 0d010901
1611616e 64726577 4067726f 7773652e 636f6d09 00039404 3082038b 308202f4
a0030201 02020201 04300d06 092a8648 86f70d01 01050500 30818731 13301106
03550403 130a6772 6f777365 2e636f6d 311f301d 06092a86 4886f70d 01090116
10636572 74734067 726f7773 652e636f 6d311630 14060355 040a130d 67726f77
73652e63 6f6d2043 41310b30 09060355 040b1302 4341310f 300d0603 55040713
064c6f6e 646f6e31 0c300a06 03550408 13034c6f 6e310b30 09060355 04061302
4742301e 170d3130 30333137 31323434 32325a17 0d313130 33313731 32343432
325a3081 8c310b30 09060355 04061302 4742310c 300a0603 55040813 034c6f6e
310f300d 06035504 0713064c 6f6e646f 6e311330 11060355 040a130a 67726f77
73652e63 6f6d310f 300d0603 55040b13 0650656f 706c6531 16301406 03550403
130d416e 64726577 20526f77 736f6e31 20301e06 092a8648 86f70d01 09011611
616e6472 65774067 726f7773 652e636f 6d308201 22300d06 092a8648 86f70d01
01010500 0382010f 00308201 0a028201 0100cc90 10722fc4 a23e5cb0 bc69624c
aac1f174 bbcc629f 06e57eab 016dcefd ced860af f2324b34 9f2767e5 f6f68d9d
792b40d0 b7845d07 53f73006 1f53dca8 5d2b84e0 16093f4c 3ab0ecea d9fc3110
76899ce7 b7cdbbde 74baecda 5b0ea1e2 627c4790 0fef2583 8684d04b 266aabbf
fd349fc1 98e6634c fe79058d 16e8b6b0 c26a19a4 95533a49 fff77aec 7412a32a
d9a32429 fc7ad175 6ab5dd70 873f2c39 47552aac 68d42aec 14ef7a43 ab21955e
a4231d15 6598d90f 3031a28e 18124823 a623fa27 a6294047 541d4016 cbba3f8f
37f04682 134303a2 ad325c56 0f058bc0 f915b770 89b5f00c 540f072c fbac8f32
35e67639 32a727fe 803ef7b5 db33abac e0d90203 010001a3 7b307930 09060355
1d130402 3000302c 06096086 480186f8 42010d04 1f161d4f 70656e53 534c2047
656e6572 61746564 20436572 74696669 63617465 301d0603 551d0e04 1604148e
76b3357f 2bfe00ba 4878fa40 a8cff430 c16d6d30 1f060355 1d230418 30168014
91759c8d b7aa24fa d7dae75c 9f0cc24c 8c774b9a 300d0609 2a864886 f70d0101
05050003 8181000f dd269723 43769245 2d18d786 fe500485 f6d432f1 7d99a655
e91fc68d db7bf823 8c12b74c 68725369 078956e3 53012492 87e01f65 3225f1f9
03d4ef60 bccab74c 2ed08140 ed9e0158 cae38f81 994ef65c a719de81 11062fd7
3a795b77 fc470bbf 32ca3ae5 8ff986fe 707f3a8c dee3577f f0780b5a 32ff108b
30cf46c1 8637c607 0001041b 7cd0b2a5 b93043aa b21d9ae6 a43278cc 2cf719d9
26de6609 6e21d906 e034ab4c 4b72b919 50df7c00 781a876a be8a9f27 9b8324e8
70913830 1aba2d17 1bdeecd5 92e01639 40761be6 f2ee7ff2 57bbcd1e 7d315520
ca160672 bc6d3f8e 01b8574f 5719f0ea b5739b1e 85a6735a caf1b660 4c8842ea
c4a2936d 04282796 9da283ca af7b4411 aac14571 b18bf19a 5edc1fc5 a421f41c
d54cfa35 03606723 6ca27056 1674e00f 61d4ffe3 7d9aa205 44cb0700 998bc5a1
2370e259 8b3ef4e5 019d983b 9ea405ae c6ba48d4 424422a0 be58f29c 19ff36b5
604a1f80 c518a8b9 9773ac74 c3cb0e22 8d4e4d6a 533150e6 4d04b679 a36e840f
27cc72fb 9e21bec6 20ff2f00 00000504 9afc9fc3 f58bb3da ddf9ef0b
2010-03-18 12:25:43: DEBUG: begin.
2010-03-18 12:25:43: DEBUG: seen nptype=5(id)
2010-03-18 12:25:43: DEBUG: seen nptype=6(cert)
2010-03-18 12:25:43: DEBUG: seen nptype=9(sig)
2010-03-18 12:25:43: DEBUG: seen nptype=7(cr)
2010-03-18 12:25:43: DEBUG: succeed.
2010-03-18 12:25:43: DEBUG: CERT saved:
2010-03-18 12:25:43: DEBUG:
3082038b 308202f4 a0030201 02020201 04300d06 092a8648 86f70d01 01050500
30818731 13301106 03550403 130a6772 6f777365 2e636f6d 311f301d 06092a86
4886f70d 01090116 10636572 74734067 726f7773 652e636f 6d311630 14060355
040a130d 67726f77 73652e63 6f6d2043 41310b30 09060355 040b1302 4341310f
300d0603 55040713 064c6f6e 646f6e31 0c300a06 03550408 13034c6f 6e310b30
09060355 04061302 4742301e 170d3130 30333137 31323434 32325a17 0d313130
33313731 32343432 325a3081 8c310b30 09060355 04061302 4742310c 300a0603
55040813 034c6f6e 310f300d 06035504 0713064c 6f6e646f 6e311330 11060355
040a130a 67726f77 73652e63 6f6d310f 300d0603 55040b13 0650656f 706c6531
16301406 03550403 130d416e 64726577 20526f77 736f6e31 20301e06 092a8648
86f70d01 09011611 616e6472 65774067 726f7773 652e636f 6d308201 22300d06
092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100cc90 10722fc4
a23e5cb0 bc69624c aac1f174 bbcc629f 06e57eab 016dcefd ced860af f2324b34
9f2767e5 f6f68d9d 792b40d0 b7845d07 53f73006 1f53dca8 5d2b84e0 16093f4c
3ab0ecea d9fc3110 76899ce7 b7cdbbde 74baecda 5b0ea1e2 627c4790 0fef2583
8684d04b 266aabbf fd349fc1 98e6634c fe79058d 16e8b6b0 c26a19a4 95533a49
fff77aec 7412a32a d9a32429 fc7ad175 6ab5dd70 873f2c39 47552aac 68d42aec
14ef7a43 ab21955e a4231d15 6598d90f 3031a28e 18124823 a623fa27 a6294047
541d4016 cbba3f8f 37f04682 134303a2 ad325c56 0f058bc0 f915b770 89b5f00c
540f072c fbac8f32 35e67639 32a727fe 803ef7b5 db33abac e0d90203 010001a3
7b307930 09060355 1d130402 3000302c 06096086 480186f8 42010d04 1f161d4f
70656e53 534c2047 656e6572 61746564 20436572 74696669 63617465 301d0603
551d0e04 1604148e 76b3357f 2bfe00ba 4878fa40 a8cff430 c16d6d30 1f060355
1d230418 30168014 91759c8d b7aa24fa d7dae75c 9f0cc24c 8c774b9a 300d0609
2a864886 f70d0101 05050003 8181000f dd269723 43769245 2d18d786 fe500485
f6d432f1 7d99a655 e91fc68d db7bf823 8c12b74c 68725369 078956e3 53012492
87e01f65 3225f1f9 03d4ef60 bccab74c 2ed08140 ed9e0158 cae38f81 994ef65c
a719de81 11062fd7 3a795b77 fc470bbf 32ca3ae5 8ff986fe 707f3a8c dee3577f
f0780b5a 32ff108b 30cf46c1 8637c6
2010-03-18 12:25:43: DEBUG: Certificate:
Data:
Version: 3 (0x2)
Serial Number: 260 (0x104)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=growse.com/emailAddress=certs@growse.com, O=growse.com CA, OU=CA, L=London, ST=Lon, C=GB
Validity
Not Before: Mar 17 12:44:22 2010 GMT
Not After : Mar 17 12:44:22 2011 GMT
Subject: C=GB, ST=Lon, L=London, O=growse.com, OU=People, CN=Andrew Rowson/emailAddress=andrew@growse.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:cc:90:10:72:2f:c4:a2:3e:5c:b0:bc:69:62:4c:
aa:c1:f1:74:bb:cc:62:9f:06:e5:7e:ab:01:6d:ce:
fd:ce:d8:60:af:f2:32:4b:34:9f:27:67:e5:f6:f6:
8d:9d:79:2b:40:d0:b7:84:5d:07:53:f7:30:06:1f:
53:dc:a8:5d:2b:84:e0:16:09:3f:4c:3a:b0:ec:ea:
d9:fc:31:10:76:89:9c:e7:b7:cd:bb:de:74:ba:ec:
da:5b:0e:a1:e2:62:7c:47:90:0f:ef:25:83:86:84:
d0:4b:26:6a:ab:bf:fd:34:9f:c1:98:e6:63:4c:fe:
79:05:8d:16:e8:b6:b0:c2:6a:19:a4:95:53:3a:49:
ff:f7:7a:ec:74:12:a3:2a:d9:a3:24:29:fc:7a:d1:
75:6a:b5:dd:70:87:3f:2c:39:47:55:2a:ac:68:d4:
2a:ec:14:ef:7a:43:ab:21:95:5e:a4:23:1d:15:65:
98:d9:0f:30:31:a2:8e:18:12:48:23:a6:23:fa:27:
a6:29:40:47:54:1d:40:16:cb:ba:3f:8f:37:f0:46:
82:13:43:03:a2:ad:32:5c:56:0f:05:8b:c0:f9:15:
b7:70:89:b5:f0:0c:54:0f:07:2c:fb:ac:8f:32:35:
e6:76:39:32:a7:27:fe:80:3e:f7:b5:db:33:ab:ac:
e0:d9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
8E:76:B3:35:7F:2B:FE:00:BA:48:78:FA:40:A8:CF:F4:30:C1:6D:6D
X509v3 Authority Key Identifier:
keyid:91:75:9C:8D:B7:AA:24:FA:D7:DA:E7:5C:9F:0C:C2:4C:8C:77:4B:9A
Signature Algorithm: sha1WithRSAEncryption
0f:dd:26:97:23:43:76:92:45:2d:18:d7:86:fe:50:04:85:f6:
d4:32:f1:7d:99:a6:55:e9:1f:c6:8d:db:7b:f8:23:8c:12:b7:
4c:68:72:53:69:07:89:56:e3:53:01:24:92:87:e0:1f:65:32:
25:f1:f9:03:d4:ef:60:bc:ca:b7:4c:2e:d0:81:40:ed:9e:01:
58:ca:e3:8f:81:99:4e:f6:5c:a7:19:de:81:11:06:2f:d7:3a:
79:5b:77:fc:47:0b:bf:32:ca:3a:e5:8f:f9:86:fe:70:7f:3a:
8c:de:e3:57:7f:f0:78:0b:5a:32:ff:10:8b:30:cf:46:c1:86:
37:c6
2010-03-18 12:25:43: DEBUG: CR saved:
2010-03-18 12:25:43: DEBUG:
2010-03-18 12:25:43: DEBUG: SIGN passed:
2010-03-18 12:25:43: DEBUG:
1b7cd0b2 a5b93043 aab21d9a e6a43278 cc2cf719 d926de66 096e21d9 06e034ab
4c4b72b9 1950df7c 00781a87 6abe8a9f 279b8324 e8709138 301aba2d 171bdeec
d592e016 3940761b e6f2ee7f f257bbcd 1e7d3155 20ca1606 72bc6d3f 8e01b857
4f5719f0 eab5739b 1e85a673 5acaf1b6 604c8842 eac4a293 6d042827 969da283
caaf7b44 11aac145 71b18bf1 9a5edc1f c5a421f4 1cd54cfa 35036067 236ca270
561674e0 0f61d4ff e37d9aa2 0544cb07 00998bc5 a12370e2 598b3ef4 e5019d98
3b9ea405 aec6ba48 d4424422 a0be58f2 9c19ff36 b5604a1f 80c518a8 b99773ac
74c3cb0e 228d4e4d 6a533150 e64d04b6 79a36e84 0f27cc72 fb9e21be c620ff2f
2010-03-18 12:25:43: DEBUG: filename: /etc/racoon/certs/ca.crt
2010-03-18 12:25:43: WARNING: unable to get certificate CRL(3) at depth:0 SubjectName:/C=GB/ST=Lon/L=London/O=growse.com/OU=People/CN=Andrew Rowson/emailAddress=andrew@growse.com
2010-03-18 12:25:43: WARNING: unable to get certificate CRL(3) at depth:1 SubjectName:/CN=growse.com/emailAddress=certs@growse.com/O=growse.com CA/OU=CA/L=London/ST=Lon/C=GB
2010-03-18 12:25:43: DEBUG: CERT validated
2010-03-18 12:25:43: DEBUG: HASH with:
2010-03-18 12:25:43: DEBUG:
6a83bcfa 1ae8f8ae 84de9d16 5e4bcf6a 744adbeb 29efbbe3 c314bdc2 e9382b5d
8d521116 bf880ddc f2a53c5e 762112a3 805685b7 50e96f57 33f97c43 2e396b3d
225a2bf9 b2375459 84b2de40 b3b8cdc6 2a3eabb7 4993d470 90d5885d d69e13b3
94647821 e88f4eaf 35d94120 87da9125 c8bdd59e 9ad4405b edfef213 25509440
e4ffd1f6 4bb468e8 37473d38 9c15924e 97dc4bdf 10042952 eddaea20 27801c29
f098e991 9ce063c6 0cbda84f eaf0795d 22ba7925 10032030 8a2369d5 9ff8868a
abab2091 27f48ede fbf6c711 9ed2cdc3 0d7080de d24f3ba6 6a5fa2e6 f0711d17
ca4e5e0d ceb7f1e1 3b221eab 7c4fbc70 69567258 69331561 82a1abd5 f8d6034f
4b13438c 9c4e8ecd fbb9e225 b6d1154f 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030003 80020002
80040002 09000000 30818c31 0b300906 03550406 13024742 310c300a 06035504
0813034c 6f6e310f 300d0603 55040713 064c6f6e 646f6e31 13301106 0355040a
130a6772 6f777365 2e636f6d 310f300d 06035504 0b130650 656f706c 65311630
14060355 0403130d 416e6472 65772052 6f77736f 6e312030 1e06092a 864886f7
0d010901 1611616e 64726577 4067726f 7773652e 636f6d
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: HASH (resp) computed:
2010-03-18 12:25:43: DEBUG:
6e6f84d7 4879f396 03e93a8d 8de13057 5cdfd5ad
2010-03-18 12:25:43: DEBUG: SIG authenticated
2010-03-18 12:25:43: DEBUG: peer transmitted CR: X.509 Certificate Signature
2010-03-18 12:25:43: DEBUG: peer's ID
2010-03-18 12:25:43: DEBUG:
09000000 30818c31 0b300906 03550406 13024742 310c300a 06035504 0813034c
6f6e310f 300d0603 55040713 064c6f6e 646f6e31 13301106 0355040a 130a6772
6f777365 2e636f6d 310f300d 06035504 0b130650 656f706c 65311630 14060355
0403130d 416e6472 65772052 6f77736f 6e312030 1e06092a 864886f7 0d010901
1611616e 64726577 4067726f 7773652e 636f6d
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: filename: /etc/racoon/certs/server.crt
2010-03-18 12:25:43: DEBUG: Certificate:
Data:
Version: 3 (0x2)
Serial Number: 261 (0x105)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=growse.com/emailAddress=certs@growse.com, O=growse.com CA, OU=CA, L=London, ST=Lon, C=GB
Validity
Not Before: Mar 17 13:06:49 2010 GMT
Not After : Mar 17 13:06:49 2011 GMT
Subject: C=GB, ST=Lon, L=London, O=growse.com, OU=devbot, CN=devbot.growse.com/emailAddress=devbot@growse.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (2048 bit)
Modulus (2048 bit):
00:b4:9d:e5:82:be:4c:9b:32:59:b9:e6:f5:83:43:
3c:6a:21:2f:5d:0c:bf:69:80:b7:e9:e8:93:2b:22:
80:16:0a:4b:71:d4:f9:47:90:14:09:e0:eb:d5:c4:
3d:1e:ce:8c:c6:ef:0a:82:ca:0c:3b:4e:72:48:c7:
ab:d7:b3:e3:89:18:a6:64:bd:70:b4:45:3b:4a:8c:
4a:b6:4e:b7:ec:84:7d:48:62:c8:2b:9f:6f:04:2c:
db:50:89:9a:a6:68:7a:57:8f:34:78:a8:59:05:98:
2c:ce:4e:5b:00:14:09:fa:2a:ed:96:13:ea:22:4a:
a7:67:f1:ea:30:ed:fb:d8:57:b5:75:26:b1:74:65:
15:24:14:e6:6a:b7:29:93:95:cd:a4:a9:79:8d:c7:
c0:73:ab:5d:4e:75:4b:de:c6:29:8d:f5:09:cf:39:
c6:01:e6:22:cc:79:c6:e2:52:98:20:20:d9:06:b6:
2e:fb:16:5e:20:69:3f:23:ae:9a:ae:a4:57:8c:03:
fb:a8:a2:69:f1:fc:b0:6c:0f:3c:0b:64:4d:b9:d7:
a5:90:d1:a9:c5:b6:70:f5:e7:12:22:3e:c7:e3:44:
a3:a4:4f:3a:81:11:84:31:6c:3d:ce:60:40:46:4d:
c6:60:d8:0f:ff:5e:67:8c:b4:4d:65:d6:44:d0:c7:
29:33
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
CB:1A:B4:06:5C:FC:ED:DC:27:A5:48:46:A7:A9:42:5E:62:71:B3:39
X509v3 Authority Key Identifier:
keyid:91:75:9C:8D:B7:AA:24:FA:D7:DA:E7:5C:9F:0C:C2:4C:8C:77:4B:9A
Signature Algorithm: sha1WithRSAEncryption
42:1e:88:45:a6:3a:51:76:c2:41:ca:38:91:43:65:dc:25:49:
5e:0b:2d:0f:75:12:54:94:7f:64:4d:52:80:f7:2e:b4:8d:19:
cf:23:61:d0:0a:66:be:9f:9a:2d:de:65:e5:f0:c0:1d:64:5e:
21:85:51:de:f8:fe:6e:80:e4:9b:e9:24:dd:d1:5d:79:04:15:
3c:c0:36:b4:f5:60:f5:91:43:49:94:63:17:ca:c5:91:60:71:
f2:11:53:b8:8f:ea:99:3f:eb:50:32:3f:1d:ba:ec:ff:51:f3:
a3:dd:08:67:b6:f6:d8:54:f6:12:c7:54:9a:27:ff:3c:d7:67:
ce:5e
2010-03-18 12:25:43: DEBUG: created CERT payload:
2010-03-18 12:25:43: DEBUG:
04308203 8f308202 f8a00302 01020202 0105300d 06092a86 4886f70d 01010505
00308187 31133011 06035504 03130a67 726f7773 652e636f 6d311f30 1d06092a
864886f7 0d010901 16106365 72747340 67726f77 73652e63 6f6d3116 30140603
55040a13 0d67726f 7773652e 636f6d20 4341310b 30090603 55040b13 02434131
0f300d06 03550407 13064c6f 6e646f6e 310c300a 06035504 0813034c 6f6e310b
30090603 55040613 02474230 1e170d31 30303331 37313330 3634395a 170d3131
30333137 31333036 34395a30 8190310b 30090603 55040613 02474231 0c300a06
03550408 13034c6f 6e310f30 0d060355 04071306 4c6f6e64 6f6e3113 30110603
55040a13 0a67726f 7773652e 636f6d31 0f300d06 0355040b 13066465 76626f74
311a3018 06035504 03131164 6576626f 742e6772 6f777365 2e636f6d 3120301e
06092a86 4886f70d 01090116 11646576 626f7440 67726f77 73652e63 6f6d3082
0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282 010100b4
9de582be 4c9b3259 b9e6f583 433c6a21 2f5d0cbf 6980b7e9 e8932b22 80160a4b
71d4f947 901409e0 ebd5c43d 1ece8cc6 ef0a82ca 0c3b4e72 48c7abd7 b3e38918
a664bd70 b4453b4a 8c4ab64e b7ec847d 4862c82b 9f6f042c db50899a a6687a57
8f3478a8 5905982c ce4e5b00 1409fa2a ed9613ea 224aa767 f1ea30ed fbd857b5
7526b174 65152414 e66ab729 9395cda4 a9798dc7 c073ab5d 4e754bde c6298df5
09cf39c6 01e622cc 79c6e252 982020d9 06b62efb 165e2069 3f23ae9a aea4578c
03fba8a2 69f1fcb0 6c0f3c0b 644db9d7 a590d1a9 c5b670f5 e712223e c7e344a3
a44f3a81 1184316c 3dce6040 464dc660 d80fff5e 678cb44d 65d644d0 c7293302
03010001 a37b3079 30090603 551d1304 02300030 2c060960 86480186 f842010d
041f161d 4f70656e 53534c20 47656e65 72617465 64204365 72746966 69636174
65301d06 03551d0e 04160414 cb1ab406 5cfceddc 27a54846 a7a9425e 6271b339
301f0603 551d2304 18301680 1491759c 8db7aa24 fad7dae7 5c9f0cc2 4c8c774b
9a300d06 092a8648 86f70d01 01050500 03818100 421e8845 a63a5176 c241ca38
914365dc 25495e0b 2d0f7512 54947f64 4d5280f7 2eb48d19 cf2361d0 0a66be9f
9a2dde65 e5f0c01d 645e2185 51def8fe 6e80e49b e924ddd1 5d790415 3cc036b4
f560f591 43499463 17cac591 6071f211 53b88fea 993feb50 323f1dba ecff51f3
a3dd0867 b6f6d854 f612c754 9a27ff3c d767ce5e
2010-03-18 12:25:43: DEBUG: use ID type of DER_ASN1_DN
2010-03-18 12:25:43: DEBUG: generate HASH_R
2010-03-18 12:25:43: DEBUG: HASH with:
2010-03-18 12:25:43: DEBUG:
e4ffd1f6 4bb468e8 37473d38 9c15924e 97dc4bdf 10042952 eddaea20 27801c29
f098e991 9ce063c6 0cbda84f eaf0795d 22ba7925 10032030 8a2369d5 9ff8868a
abab2091 27f48ede fbf6c711 9ed2cdc3 0d7080de d24f3ba6 6a5fa2e6 f0711d17
ca4e5e0d ceb7f1e1 3b221eab 7c4fbc70 69567258 69331561 82a1abd5 f8d6034f
6a83bcfa 1ae8f8ae 84de9d16 5e4bcf6a 744adbeb 29efbbe3 c314bdc2 e9382b5d
8d521116 bf880ddc f2a53c5e 762112a3 805685b7 50e96f57 33f97c43 2e396b3d
225a2bf9 b2375459 84b2de40 b3b8cdc6 2a3eabb7 4993d470 90d5885d d69e13b3
94647821 e88f4eaf 35d94120 87da9125 c8bdd59e 9ad4405b edfef213 25509440
fbb9e225 b6d1154f 4b13438c 9c4e8ecd 00000001 00000001 0000002c 01010001
00000024 01010000 800b0001 800c7080 80010007 800e0080 80030003 80020002
80040002 09000000 30819031 0b300906 03550406 13024742 310c300a 06035504
0813034c 6f6e310f 300d0603 55040713 064c6f6e 646f6e31 13301106 0355040a
130a6772 6f777365 2e636f6d 310f300d 06035504 0b130664 6576626f 74311a30
18060355 04031311 64657662 6f742e67 726f7773 652e636f 6d312030 1e06092a
864886f7 0d010901 16116465 76626f74 4067726f 7773652e 636f6d
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: HASH (resp) computed:
2010-03-18 12:25:43: DEBUG:
fa3e137e ebdf7c5b 57dc5a03 766cfae9 41fedb0c
2010-03-18 12:25:43: DEBUG: filename: /etc/racoon/certs/server.key
2010-03-18 12:25:43: DEBUG2: private key:
2010-03-18 12:25:43: DEBUG2:
308204a3 02010002 82010100 b49de582 be4c9b32 59b9e6f5 83433c6a 212f5d0c
bf6980b7 e9e8932b 2280160a 4b71d4f9 47901409 e0ebd5c4 3d1ece8c c6ef0a82
ca0c3b4e 7248c7ab d7b3e389 18a664bd 70b4453b 4a8c4ab6 4eb7ec84 7d4862c8
2b9f6f04 2cdb5089 9aa6687a 578f3478 a8590598 2cce4e5b 001409fa 2aed9613
ea224aa7 67f1ea30 edfbd857 b57526b1 74651524 14e66ab7 299395cd a4a9798d
c7c073ab 5d4e754b dec6298d f509cf39 c601e622 cc79c6e2 52982020 d906b62e
fb165e20 693f23ae 9aaea457 8c03fba8 a269f1fc b06c0f3c 0b644db9 d7a590d1
a9c5b670 f5e71222 3ec7e344 a3a44f3a 81118431 6c3dce60 40464dc6 60d80fff
5e678cb4 4d65d644 d0c72933 02030100 01028201 005dac0a 2cfd8ef3 6a709876
8cdc0fd1 d464f390 799d0815 86cc9c1f 3f5ebc39 320ba0b4 c8b7f1a4 42df50d0
63df230c 127cd5da 88ac4b1d b2f89880 5dc217fc a8cc8cf7 703c7471 f767194d
62317f37 fe1a8fa1 1399742d 7a67dd32 6ebb3314 ba6690d1 b0c5f6ad 6d17c7c3
6174afef e0bbc4ce 71f39ae7 46dd24dc c5959768 c26d319b 9f1b652b c35dfb9c
f201d9cd 660790db e3cb314a 03fdd9ff 56f17ea3 4c4f4dd0 d1637e1e cc79c2f3
f86f89e5 449721aa 8ae93d18 06daa01b c0436ce7 f3457ab3 ed078d35 6c80942d
5300af6a 328e30c2 369daec4 b306621f 17f6067a e7cfad95 1386759f 76feb526
ff8820d7 672f0703 1472169b 9407ad5d a26c9452 a9028181 00dc347a 70b482da
1d07ec07 631eb579 562662ec 5d729f61 fa143cba 962b9a5d 80b3dba2 5f094b4f
c14d17a2 1bd510c7 75825486 3517102c 1ced8889 f5387608 c80690aa 3dd28486
b1a8a226 c4f48118 fba4014f 3cc9f00f 127dfa98 060840d8 770a19a5 1ba61544
e8a31ca7 da5fee72 9ac13757 2b2e5d2c 83630a68 ae051851 9d028181 00d1fa02
acedea91 30160bec 351a6842 2c27070a 1f47a1a8 a6b8205e abc81cde da06a641
2a9289e0 4d2c254b be01724f b5d3d7e3 02e87203 03e85c48 835198d8 c7356319
52716659 77a629cd e6257d17 1155d952 9210d57a 48f11a40 8189be5b 4b3627ec
8163fb23 fde52b61 85b5ae13 a4de355e a7746a0c 3c7d6fa4 26be2295 0f028181
00b6b95d 3894b158 286ae072 a8cf5cab 18cfb59a 895889e5 154d21af 7ad927b8
9b09a421 32575605 1253d45e 9255d51c 8de7de17 978a51c3 2925f9fc f05d2fa4
cdc694d8 8f8056b4 264bd671 f1512aa6 fe78f315 3b4e1e43 8386c220 d0309d0e
8289010a beccac2d 881581bb cf3b7773 e5f29ae7 5c4f96c5 4f292a03 ff12ff41
09028180 0becd0fe 153cff25 e5faa35d 98b4571d bed1ad87 7d3ff71e 10d2f5cd
77bdfc02 11e29b4c d9a9aeed 73166328 d55832a2 b6f749d3 3e744b2b 8ba4c211
832ed510 eb3d4790 e113d8fc ec98ef32 a4ea67c6 fa432f67 50416f82 78feeeae
ecadbced 9693c9e0 c756da02 6f637954 68af0c3a 8ecc2526 097c8459 631e560a
453e1d8d 0281804f fe461010 bbff49e1 b60f092e 4f90b5a6 19b0786c 3419e48b
128efff9 4b7e8d7e 7951a865 27206f41 a57491b4 7480b044 721af36d 77a48d79
0f8f9352 5e1ded1e 8a22104b 8adb4ddf fdb48788 c40cf9c5 1f86fbd3 efee129c
f3d15237 df12318f 40f17dda 6122a23f 0a453777 4e31b024 42995bf6 36a80637
c252952d f1cf2d
2010-03-18 12:25:43: DEBUG: SIGN computed:
2010-03-18 12:25:43: DEBUG:
2727013d 0604e8ce 056aaa0f 9cba12d4 aa2f77ef 35043620 cdf973c3 c61d249f
35c7dd27 e12d8a38 c3e10529 98178bc8 454cab0b 7bc7788d 93b994ac 672beaba
be1ac4d5 df38ff64 d9e2d09a 7f217be6 1d2ed4a3 da42e8ab b3dddde3 20677202
efcae9bd 63269746 d97efb6d c67469d9 93409bce 3393d4c8 4e1aa7d7 36084abc
73e7b884 84235b1f f24ed47d 77bc7fa8 ee14d518 e095db8a b94b7822 3e6b6cc3
73709fc2 d6f7dd68 1374779d 79c5ab1a e70fe69c f4386632 d765a254 9c01ae04
0ef68fed f11c59cd db583b23 308c8526 1896fa61 b21c9bdf d86e83dd 9101eaa4
91df3cfe c0d3c48a bb89eaea 0c1f035c dd01ecfb 866e7c48 f08c3962 8862f63a
2010-03-18 12:25:43: DEBUG: add payload of len 151, next type 6
2010-03-18 12:25:43: DEBUG: add payload of len 916, next type 9
2010-03-18 12:25:43: DEBUG: add payload of len 256, next type 0
2010-03-18 12:25:43: DEBUG: begin encryption.
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: pad length = 9
2010-03-18 12:25:43: DEBUG:
0600009b 09000000 30819031 0b300906 03550406 13024742 310c300a 06035504
0813034c 6f6e310f 300d0603 55040713 064c6f6e 646f6e31 13301106 0355040a
130a6772 6f777365 2e636f6d 310f300d 06035504 0b130664 6576626f 74311a30
18060355 04031311 64657662 6f742e67 726f7773 652e636f 6d312030 1e06092a
864886f7 0d010901 16116465 76626f74 4067726f 7773652e 636f6d09 00039804
3082038f 308202f8 a0030201 02020201 05300d06 092a8648 86f70d01 01050500
30818731 13301106 03550403 130a6772 6f777365 2e636f6d 311f301d 06092a86
4886f70d 01090116 10636572 74734067 726f7773 652e636f 6d311630 14060355
040a130d 67726f77 73652e63 6f6d2043 41310b30 09060355 040b1302 4341310f
300d0603 55040713 064c6f6e 646f6e31 0c300a06 03550408 13034c6f 6e310b30
09060355 04061302 4742301e 170d3130 30333137 31333036 34395a17 0d313130
33313731 33303634 395a3081 90310b30 09060355 04061302 4742310c 300a0603
55040813 034c6f6e 310f300d 06035504 0713064c 6f6e646f 6e311330 11060355
040a130a 67726f77 73652e63 6f6d310f 300d0603 55040b13 06646576 626f7431
1a301806 03550403 13116465 76626f74 2e67726f 7773652e 636f6d31 20301e06
092a8648 86f70d01 09011611 64657662 6f744067 726f7773 652e636f 6d308201
22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100b49d
e582be4c 9b3259b9 e6f58343 3c6a212f 5d0cbf69 80b7e9e8 932b2280 160a4b71
d4f94790 1409e0eb d5c43d1e ce8cc6ef 0a82ca0c 3b4e7248 c7abd7b3 e38918a6
64bd70b4 453b4a8c 4ab64eb7 ec847d48 62c82b9f 6f042cdb 50899aa6 687a578f
3478a859 05982cce 4e5b0014 09fa2aed 9613ea22 4aa767f1 ea30edfb d857b575
26b17465 152414e6 6ab72993 95cda4a9 798dc7c0 73ab5d4e 754bdec6 298df509
cf39c601 e622cc79 c6e25298 2020d906 b62efb16 5e20693f 23ae9aae a4578c03
fba8a269 f1fcb06c 0f3c0b64 4db9d7a5 90d1a9c5 b670f5e7 12223ec7 e344a3a4
4f3a8111 84316c3d ce604046 4dc660d8 0fff5e67 8cb44d65 d644d0c7 29330203
010001a3 7b307930 09060355 1d130402 3000302c 06096086 480186f8 42010d04
1f161d4f 70656e53 534c2047 656e6572 61746564 20436572 74696669 63617465
301d0603 551d0e04 160414cb 1ab4065c fceddc27 a54846a7 a9425e62 71b33930
1f060355 1d230418 30168014 91759c8d b7aa24fa d7dae75c 9f0cc24c 8c774b9a
300d0609 2a864886 f70d0101 05050003 81810042 1e8845a6 3a5176c2 41ca3891
4365dc25 495e0b2d 0f751254 947f644d 5280f72e b48d19cf 2361d00a 66be9f9a
2dde65e5 f0c01d64 5e218551 def8fe6e 80e49be9 24ddd15d 7904153c c036b4f5
60f59143 49946317 cac59160 71f21153 b88fea99 3feb5032 3f1dbaec ff51f3a3
dd0867b6 f6d854f6 12c7549a 27ff3cd7 67ce5e00 00010427 27013d06 04e8ce05
6aaa0f9c ba12d4aa 2f77ef35 043620cd f973c3c6 1d249f35 c7dd27e1 2d8a38c3
e1052998 178bc845 4cab0b7b c7788d93 b994ac67 2beababe 1ac4d5df 38ff64d9
e2d09a7f 217be61d 2ed4a3da 42e8abb3 dddde320 677202ef cae9bd63 269746d9
7efb6dc6 7469d993 409bce33 93d4c84e 1aa7d736 084abc73 e7b88484 235b1ff2
4ed47d77 bc7fa8ee 14d518e0 95db8ab9 4b78223e 6b6cc373 709fc2d6 f7dd6813
74779d79 c5ab1ae7 0fe69cf4 386632d7 65a2549c 01ae040e f68fedf1 1c59cddb
583b2330 8c852618 96fa61b2 1c9bdfd8 6e83dd91 01eaa491 df3cfec0 d3c48abb
89eaea0c 1f035cdd 01ecfb86 6e7c48f0 8c396288 62f63ac2 b0cda983 ac84a708
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: with key:
2010-03-18 12:25:43: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:43: DEBUG: encrypted payload by IV:
2010-03-18 12:25:43: DEBUG:
a068e645 78ec0f9f b2f84571 c1eb3ba4
2010-03-18 12:25:43: DEBUG: save IV for next:
2010-03-18 12:25:43: DEBUG:
1da88fad bf97c2ca ebc78a22 691426d2
2010-03-18 12:25:43: DEBUG: encrypted.
2010-03-18 12:25:43: DEBUG: 1372 bytes from 192.168.111.129[500] to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: sockname 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet from 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: src4 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: dst4 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: 1 times of 1372 bytes message will be sent to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 05100201 00000000 0000055c eee75b3e
c5b5b915 10ee67bf c9c36310 112d7ff4 0157c110 e9485c74 70f86c59 49764239
9de24745 98e179a9 841102aa c069f4f6 a608f291 34ca835f cb056c91 69ef7634
ada4b52b 0e54c66d bcbfe36b 8b1218dd 2c305d04 7fec7244 54670e0b 01f54f76
7bf2723f d14bfdc5 77e04e41 83f76a3f 7db155bd 8a1d3fd1 abf12c57 f4711af9
be30e733 142e2558 106959e4 42fbe65f c1ee1f0f 7b0dda86 99f05023 1fd7363c
41e223f1 c41d9b20 71401d7e 45279e4c 37ccf382 4324fb72 7c6c4ece 67af6efc
f7c384de 01a546b9 0a8ad132 061ab179 f1112465 05a08898 98b38ea3 86ff5618
4516c605 a487d723 9337d789 a51bfec1 e8d40e2b 388029bc 3edd2866 63b59c15
bb2ff1bd 6b0e8e45 4edad12b e4c4f8a0 9abaf071 b7419bb6 0e108edd 30595f0d
0973f8cc 4539f891 4d1a56e7 55fb29e2 292e70cf 9d85b863 a09d6023 fc55a6b8
e857aed3 beb0a2b4 03e9f1be 1d2ba56b 0c1ae4e8 2b526889 55510fc9 ca5f80a0
ede7d54a 9c630b54 3fb84209 80b42d13 3aea2374 a619348b d3829fa1 d791b28b
2818457b 91c6a381 bb8b3852 b3fc9a4f 2755cd9b e343f120 9e39c08a 2ac24bae
3cf78f2a c19298e6 11bb005d 85f498ee 7cb95b75 8da50368 8c8301bf d7a04f33
f9bbde43 bec2b041 c14013b7 27e8e33d 84307c6d eb3a453a 23c6ef50 e84a30b2
e5254c4b d9f868de 177caa79 17f98da8 3c1bcedf df0dbbfb 86451835 e3ff94c4
bc5eae03 e48b048b c1db1183 47de1ba6 a130f098 52aa399d 6866d3bc 24f2445a
ce21dcc1 e68f1e2e 5c8ff307 53a86187 71099a14 a86fbd54 c35fdb26 97ed7ceb
db9a5216 0d461ef2 0ba4cb47 72879b94 ab7adbda 616f510b ff5596ab 4fa5d3dc
56f29889 3e7467e4 f5664275 41c2604c 42a0487e 04deab3e f10ee603 f7e7798c
6c5aec69 2ab305ec 39dbf754 0f902606 49f673d4 8ffdf102 8a71eb9e a7244357
3d7552a4 a1004eba 6a5f36c7 3e82b85f 75b5a1ce 57007180 a012aa95 0061ec41
1da88db7 ce40dadd 52b71a3c 26b44c2a fe3a98fa 19f34964 98d53c40 4651755f
9a71c72e 5a846ce1 db24653c 5ded0b28 b5f5c766 c1c4b323 69ce5e8d 8e5afead
a0fe84e4 c5c586cf 7ccf248d 39f35e66 3471efa2 3b69c4ae f4f127f3 aafa573d
6e79ee79 41b5029f 4d1ae97b 39669fb5 a89bc247 af697e41 9f521003 b0db5256
7e1508d1 0ccafeda 72fc0819 e30ff44d a5f0fcb9 e36a8d7f 60a18489 0f76cffb
e8a54176 ba9b1c32 b4466a51 1e1d3cfb 9c98eaf3 39265b43 06971b21 826127a6
5515f28f 5ea14984 1d1c2d94 d035b5f8 966c3755 1d0c8dc9 01883ba6 f75f6203
d01ad529 39c808bd c9805215 d70e6523 89faeff1 ec652dd3 1573206e 3b764667
38a30931 94c4d741 ab3b9474 bc3f0482 42496336 d73af110 ebfda314 624133e4
f5855742 399381e9 bf632b2f 65df61b3 7c6cb083 7e5736cd a16892f7 c3e076d2
82a46e2d ec53b2e9 f43c7f9b 1816e167 75682da3 c57e0d4f abc3fa8e aa2a5aa8
0aebd4bd defa5a00 ad8ae0d7 771c3f79 f1fdc480 5d51658e fefd4824 79d801f5
66add925 61d4bbba acf0af9c 6fdda78c 3941a79f 6a319eca affca566 e761a794
5b5d0115 755a2fbd 7c89c169 85ed87c0 c03f94b8 9c74b3a7 c0277dc5 ff7d0e60
23fdd8ac 85c0a27c ee0e2043 8877d656 45548631 2e70b352 5b603ac6 76bfaca5
b49131b6 1c087ed7 a60e4059 66d6140b 6d5a73f1 c4ea19e5 443030ce 217eb7ab
7c77e645 7a3922d8 e24bc89e 0030a715 6e454dd0 bfab230e c8ebf07c 687c7497
45752ada 87e81789 f620cc33 a4460181 9bfb2e41 048b7f5e f869ce7e 224cefa0
34968b08 2a8a177e 5eaa6038 79f28aeb a0b2b667 1e4021b7 aeb28773 c73fd793
d08cdcba 5eb0e0a6 a79564c7 1da88fad bf97c2ca ebc78a22 691426d2
2010-03-18 12:25:43: DEBUG: compute IV for phase2
2010-03-18 12:25:43: DEBUG: phase1 last IV:
2010-03-18 12:25:43: DEBUG:
1da88fad bf97c2ca ebc78a22 691426d2 fce36c7f
2010-03-18 12:25:43: DEBUG: hash(sha1)
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: phase2 IV computed:
2010-03-18 12:25:43: DEBUG:
4c85d1b4 ab73fafd 304a6057 92d51d73
2010-03-18 12:25:43: DEBUG: HASH with:
2010-03-18 12:25:43: DEBUG:
fce36c7f 0000001c 00000001 01106002 4b13438c 9c4e8ecd fbb9e225 b6d1154f
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: HASH computed:
2010-03-18 12:25:43: DEBUG:
651b0fc9 eb508196 bc4f0b42 fd73f38c 1d991eb0
2010-03-18 12:25:43: DEBUG: begin encryption.
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: pad length = 12
2010-03-18 12:25:43: DEBUG:
0b000018 651b0fc9 eb508196 bc4f0b42 fd73f38c 1d991eb0 0000001c 00000001
01106002 4b13438c 9c4e8ecd fbb9e225 b6d1154f 8dba86bf d8e0dbd4 86aafe0b
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: with key:
2010-03-18 12:25:43: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:43: DEBUG: encrypted payload by IV:
2010-03-18 12:25:43: DEBUG:
4c85d1b4 ab73fafd 304a6057 92d51d73
2010-03-18 12:25:43: DEBUG: save IV for next:
2010-03-18 12:25:43: DEBUG:
614eeed7 8ea1742b 49d23d50 1a5ab2a6
2010-03-18 12:25:43: DEBUG: encrypted.
2010-03-18 12:25:43: DEBUG: 92 bytes from 192.168.111.129[500] to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: sockname 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet from 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: send packet to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: src4 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG: dst4 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG: 1 times of 92 bytes message will be sent to 192.168.111.130[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 fce36c7f 0000005c ff9fbfe9
b9d9fc07 b6670788 e086ce69 50abda44 2ad47eaf ef2e60b9 c0fcb912 e7149d67
6d096334 fd3053a4 dca967b4 614eeed7 8ea1742b 49d23d50 1a5ab2a6
2010-03-18 12:25:43: DEBUG: sendto Information notify.
2010-03-18 12:25:43: DEBUG: IV freed
2010-03-18 12:25:43: INFO: ISAKMP-SA established 192.168.111.129[500]-192.168.111.130[500] spi:4b13438c9c4e8ecd:fbb9e225b6d1154f
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: ===
2010-03-18 12:25:43: DEBUG: 92 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 91c335bb 0000005c 6870e935
031a7fb6 7f715cbd cc81837e f98907ea 3d75ede9 84a0bb9e d462f7d3 99373080
06f3cffa 8bf78ba7 40b2ed18 140ff3d8 597f8b86 83bdf7cc 64ff1d81
2010-03-18 12:25:43: DEBUG: receive Information.
2010-03-18 12:25:43: DEBUG: compute IV for phase2
2010-03-18 12:25:43: DEBUG: phase1 last IV:
2010-03-18 12:25:43: DEBUG:
1da88fad bf97c2ca ebc78a22 691426d2 91c335bb
2010-03-18 12:25:43: DEBUG: hash(sha1)
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: phase2 IV computed:
2010-03-18 12:25:43: DEBUG:
40a7da99 2e5b194f c798112f c2120412
2010-03-18 12:25:43: DEBUG: begin decryption.
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: IV was saved for next processing:
2010-03-18 12:25:43: DEBUG:
140ff3d8 597f8b86 83bdf7cc 64ff1d81
2010-03-18 12:25:43: DEBUG: encryption(aes)
2010-03-18 12:25:43: DEBUG: with key:
2010-03-18 12:25:43: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:43: DEBUG: decrypted payload by IV:
2010-03-18 12:25:43: DEBUG:
40a7da99 2e5b194f c798112f c2120412
2010-03-18 12:25:43: DEBUG: decrypted payload, but not trimed.
2010-03-18 12:25:43: DEBUG:
0b000018 bdda939c b0c0d206 5da14d61 15da9df3 e3a4ca4f 0000001c 00000001
01106002 4b13438c 9c4e8ecd fbb9e225 b6d1154f bcddbfc1 b38cc8a4 f68f970b
2010-03-18 12:25:43: DEBUG: padding len=12
2010-03-18 12:25:43: DEBUG: skip to trim padding.
2010-03-18 12:25:43: DEBUG: decrypted.
2010-03-18 12:25:43: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 91c335bb 0000005c 0b000018
bdda939c b0c0d206 5da14d61 15da9df3 e3a4ca4f 0000001c 00000001 01106002
4b13438c 9c4e8ecd fbb9e225 b6d1154f bcddbfc1 b38cc8a4 f68f970b
2010-03-18 12:25:43: DEBUG: IV freed
2010-03-18 12:25:43: DEBUG: HASH with:
2010-03-18 12:25:43: DEBUG:
91c335bb 0000001c 00000001 01106002 4b13438c 9c4e8ecd fbb9e225 b6d1154f
2010-03-18 12:25:43: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:43: DEBUG: HASH computed:
2010-03-18 12:25:43: DEBUG:
bdda939c b0c0d206 5da14d61 15da9df3 e3a4ca4f
2010-03-18 12:25:43: DEBUG: hash validated.
2010-03-18 12:25:43: DEBUG: begin.
2010-03-18 12:25:43: DEBUG: seen nptype=8(hash)
2010-03-18 12:25:43: DEBUG: seen nptype=11(notify)
2010-03-18 12:25:43: DEBUG: succeed.
2010-03-18 12:25:43: DEBUG: call pfkey_send_dump
2010-03-18 12:25:43: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:44: DEBUG: 140 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08102001 d9d4ac95 0000008c 18df8608
249933d7 0ef31364 8584b521 6133003a 2535ffb0 c044bf1d 7c68c50d 2cd5e39b
76dd9600 40072994 88da8908 d1d95e19 4d469393 6cd3e889 ce9a6388 a13e5f49
b0f18ebc c9f96a0e 1846dd19 5ed4a38d 0a150972 e608716b 44ed0dd2 14e50fe7
abacc201 d0f8baa5 4e5da7c6
2010-03-18 12:25:44: DEBUG: compute IV for phase2
2010-03-18 12:25:44: DEBUG: phase1 last IV:
2010-03-18 12:25:44: DEBUG:
1da88fad bf97c2ca ebc78a22 691426d2 d9d4ac95
2010-03-18 12:25:44: DEBUG: hash(sha1)
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: phase2 IV computed:
2010-03-18 12:25:44: DEBUG:
b6d7ca20 8b56fe34 2b691b79 62ab5450
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:44: INFO: respond new phase 2 negotiation: 192.168.111.129[500]<=>192.168.111.130[500]
2010-03-18 12:25:44: DEBUG: begin decryption.
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: IV was saved for next processing:
2010-03-18 12:25:44: DEBUG:
14e50fe7 abacc201 d0f8baa5 4e5da7c6
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: with key:
2010-03-18 12:25:44: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:44: DEBUG: decrypted payload by IV:
2010-03-18 12:25:44: DEBUG:
b6d7ca20 8b56fe34 2b691b79 62ab5450
2010-03-18 12:25:44: DEBUG: decrypted payload, but not trimed.
2010-03-18 12:25:44: DEBUG:
01000018 a4764882 a2c4fa31 945491b5 167ea5a8 f256db3e 0a000034 00000001
00000001 00000028 01030401 0ea458cc 0000001c 010c0000 80010001 80027080
80040002 80060080 80050002 00000014 efe4b27c fa0438c0 9cb2d0b6 91cce41e
b5acb090 d5aee3fb f7d8dfa8 bab7860f
2010-03-18 12:25:44: DEBUG: padding len=16
2010-03-18 12:25:44: DEBUG: skip to trim padding.
2010-03-18 12:25:44: DEBUG: decrypted.
2010-03-18 12:25:44: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08102001 d9d4ac95 0000008c 01000018
a4764882 a2c4fa31 945491b5 167ea5a8 f256db3e 0a000034 00000001 00000001
00000028 01030401 0ea458cc 0000001c 010c0000 80010001 80027080 80040002
80060080 80050002 00000014 efe4b27c fa0438c0 9cb2d0b6 91cce41e b5acb090
d5aee3fb f7d8dfa8 bab7860f
2010-03-18 12:25:44: DEBUG: begin.
2010-03-18 12:25:44: DEBUG: seen nptype=8(hash)
2010-03-18 12:25:44: DEBUG: seen nptype=1(sa)
2010-03-18 12:25:44: DEBUG: seen nptype=10(nonce)
2010-03-18 12:25:44: DEBUG: succeed.
2010-03-18 12:25:44: DEBUG: HASH(1) validate:2010-03-18 12:25:44: DEBUG:
a4764882 a2c4fa31 945491b5 167ea5a8 f256db3e
2010-03-18 12:25:44: DEBUG: HASH with:
2010-03-18 12:25:44: DEBUG:
d9d4ac95 0a000034 00000001 00000001 00000028 01030401 0ea458cc 0000001c
010c0000 80010001 80027080 80040002 80060080 80050002 00000014 efe4b27c
fa0438c0 9cb2d0b6 91cce41e
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: HASH computed:
2010-03-18 12:25:44: DEBUG:
a4764882 a2c4fa31 945491b5 167ea5a8 f256db3e
2010-03-18 12:25:44: DEBUG: anonymous configuration selected for 192.168.111.130.
2010-03-18 12:25:44: DEBUG: getsainfo params: loc='192.168.111.129', rmt='192.168.111.130', peer='C=GB, ST=Lon, L=London, O=growse.com, OU=People, CN=Andrew Rowson/emailAddress=andrew@growse.com', id=0
2010-03-18 12:25:44: DEBUG: getsainfo pass #1
2010-03-18 12:25:44: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2010-03-18 12:25:44: DEBUG: getsainfo pass #2
2010-03-18 12:25:44: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2010-03-18 12:25:44: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0
2010-03-18 12:25:44: DEBUG: get a destination address of SP index from phase1 address due to no ID payloads found OR because ID type is not address.
2010-03-18 12:25:44: DEBUG: get a source address of SP index from phase1 address due to no ID payloads found OR because ID type is not address.
2010-03-18 12:25:44: DEBUG: get a src address from ID payload 192.168.111.130[500] prefixlen=32 ul_proto=0
2010-03-18 12:25:44: DEBUG: get dst address from ID payload 192.168.111.129[500] prefixlen=32 ul_proto=0
2010-03-18 12:25:44: DEBUG: sub:0xbfa67ae8: 192.168.111.130/32[500] 192.168.111.129/32[500] proto=any dir=in
2010-03-18 12:25:44: DEBUG: db: 0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:44: DEBUG: sub:0xbfa67ae8: 192.168.111.130/32[500] 192.168.111.129/32[500] proto=any dir=in
2010-03-18 12:25:44: DEBUG: db: 0xb9401ea0: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=fwd
2010-03-18 12:25:44: DEBUG: sub:0xbfa67ae8: 192.168.111.130/32[500] 192.168.111.129/32[500] proto=any dir=in
2010-03-18 12:25:44: DEBUG: db: 0xb94020e8: 192.168.111.130/32[0] 192.168.111.129/32[0] proto=any dir=in
2010-03-18 12:25:44: DEBUG: 0xbfa67ae8 masked with /32: 192.168.111.130[500]
2010-03-18 12:25:44: DEBUG: 0xb94020e8 masked with /32: 192.168.111.130[0]
2010-03-18 12:25:44: DEBUG: 0xbfa67ae8 masked with /32: 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG: 0xb94020e8 masked with /32: 192.168.111.129[0]
2010-03-18 12:25:44: DEBUG: sub:0xbfa67ae8: 192.168.111.129/32[500] 192.168.111.130/32[500] proto=any dir=out
2010-03-18 12:25:44: DEBUG: db: 0xb9400970: 192.168.111.129/32[0] 192.168.111.130/32[0] proto=any dir=out
2010-03-18 12:25:44: DEBUG: 0xbfa67ae8 masked with /32: 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG: 0xb9400970 masked with /32: 192.168.111.129[0]
2010-03-18 12:25:44: DEBUG: 0xbfa67ae8 masked with /32: 192.168.111.130[500]
2010-03-18 12:25:44: DEBUG: 0xb9400970 masked with /32: 192.168.111.130[0]
2010-03-18 12:25:44: DEBUG: suitable SP found:192.168.111.129/32[500] 192.168.111.130/32[500] proto=any dir=out
2010-03-18 12:25:44: DEBUG: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
2010-03-18 12:25:44: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha)
2010-03-18 12:25:44: DEBUG: total SA len=48
2010-03-18 12:25:44: DEBUG:
00000001 00000001 00000028 01030401 0ea458cc 0000001c 010c0000 80010001
80027080 80040002 80060080 80050002
2010-03-18 12:25:44: DEBUG: begin.
2010-03-18 12:25:44: DEBUG: seen nptype=2(prop)
2010-03-18 12:25:44: DEBUG: succeed.
2010-03-18 12:25:44: DEBUG: proposal #1 len=40
2010-03-18 12:25:44: DEBUG: begin.
2010-03-18 12:25:44: DEBUG: seen nptype=3(trns)
2010-03-18 12:25:44: DEBUG: succeed.
2010-03-18 12:25:44: DEBUG: transform #1 len=28
2010-03-18 12:25:44: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2010-03-18 12:25:44: DEBUG: type=SA Life Duration, flag=0x8000, lorv=28800
2010-03-18 12:25:44: DEBUG: life duration was in TLV.
2010-03-18 12:25:44: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Transport
2010-03-18 12:25:44: DEBUG: type=Key Length, flag=0x8000, lorv=128
2010-03-18 12:25:44: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2010-03-18 12:25:44: DEBUG: pair 1:
2010-03-18 12:25:44: DEBUG: 0xb94040f0: next=(nil) tnext=(nil)
2010-03-18 12:25:44: DEBUG: proposal #1: 1 transform
2010-03-18 12:25:44: DEBUG: begin compare proposals.
2010-03-18 12:25:44: DEBUG: pair[1]: 0xb94040f0
2010-03-18 12:25:44: DEBUG: 0xb94040f0: next=(nil) tnext=(nil)
2010-03-18 12:25:44: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES
2010-03-18 12:25:44: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2010-03-18 12:25:44: DEBUG: type=SA Life Duration, flag=0x8000, lorv=28800
2010-03-18 12:25:44: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Transport
2010-03-18 12:25:44: DEBUG: type=Key Length, flag=0x8000, lorv=128
2010-03-18 12:25:44: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2010-03-18 12:25:44: DEBUG: peer's single bundle:
2010-03-18 12:25:44: DEBUG: (proto_id=ESP spisize=4 spi=0ea458cc spi_p=00000000 encmode=Transport reqid=0:0)
2010-03-18 12:25:44: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha)
2010-03-18 12:25:44: DEBUG: my single bundle:
2010-03-18 12:25:44: DEBUG: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
2010-03-18 12:25:44: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha)
2010-03-18 12:25:44: DEBUG: matched
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:44: DEBUG: call pfkey_send_getspi
2010-03-18 12:25:44: DEBUG: pfkey GETSPI sent: ESP/Transport 192.168.111.130[0]->192.168.111.129[0]
2010-03-18 12:25:44: DEBUG: pfkey getspi sent.
2010-03-18 12:25:44: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:44: DEBUG: get pfkey GETSPI message
2010-03-18 12:25:44: DEBUG2:
02010003 18000000 92192674 f90d0000 02000100 0c05972f 00000000 00000000
04000300 00000000 00000000 00000000 1e000000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 c81ba24b 00000000 00000000 00000000
03000500 00200000 02000000 c0a86f82 00000000 00000000 03000600 00200000
02000000 c0a86f81 00000000 00000000 02001300 01000000 00000000 00000000
2010-03-18 12:25:44: DEBUG: pfkey GETSPI succeeded: ESP/Transport 192.168.111.130[0]->192.168.111.129[0] spi=201692975(0xc05972f)
2010-03-18 12:25:44: DEBUG: total SA len=48
2010-03-18 12:25:44: DEBUG:
00000001 00000001 00000028 01030401 00000000 0000001c 010c0000 80010001
80027080 80040002 80060080 80050002
2010-03-18 12:25:44: DEBUG: begin.
2010-03-18 12:25:44: DEBUG: seen nptype=2(prop)
2010-03-18 12:25:44: DEBUG: succeed.
2010-03-18 12:25:44: DEBUG: proposal #1 len=40
2010-03-18 12:25:44: DEBUG: begin.
2010-03-18 12:25:44: DEBUG: seen nptype=3(trns)
2010-03-18 12:25:44: DEBUG: succeed.
2010-03-18 12:25:44: DEBUG: transform #1 len=28
2010-03-18 12:25:44: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds
2010-03-18 12:25:44: DEBUG: type=SA Life Duration, flag=0x8000, lorv=28800
2010-03-18 12:25:44: DEBUG: life duration was in TLV.
2010-03-18 12:25:44: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Transport
2010-03-18 12:25:44: DEBUG: type=Key Length, flag=0x8000, lorv=128
2010-03-18 12:25:44: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
2010-03-18 12:25:44: DEBUG: pair 1:
2010-03-18 12:25:44: DEBUG: 0xb9406968: next=(nil) tnext=(nil)
2010-03-18 12:25:44: DEBUG: proposal #1: 1 transform
2010-03-18 12:25:44: DEBUG: add payload of len 48, next type 10
2010-03-18 12:25:44: DEBUG: add payload of len 16, next type 0
2010-03-18 12:25:44: DEBUG: HASH with:
2010-03-18 12:25:44: DEBUG:
d9d4ac95 efe4b27c fa0438c0 9cb2d0b6 91cce41e 0a000034 00000001 00000001
00000028 01030401 0c05972f 0000001c 010c0000 80010001 80027080 80040002
80060080 80050002 00000014 d5766373 b8dce982 749a9612 31b29180
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: HASH computed:
2010-03-18 12:25:44: DEBUG:
b1da64ce 9c4b2c4c a03dcb23 899263e3 79610559
2010-03-18 12:25:44: DEBUG: add payload of len 20, next type 1
2010-03-18 12:25:44: DEBUG: begin encryption.
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: pad length = 16
2010-03-18 12:25:44: DEBUG:
01000018 b1da64ce 9c4b2c4c a03dcb23 899263e3 79610559 0a000034 00000001
00000001 00000028 01030401 0c05972f 0000001c 010c0000 80010001 80027080
80040002 80060080 80050002 00000014 d5766373 b8dce982 749a9612 31b29180
addde8dc cdf5bbc0 df9a8f93 99bd800f
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: with key:
2010-03-18 12:25:44: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:44: DEBUG: encrypted payload by IV:
2010-03-18 12:25:44: DEBUG:
14e50fe7 abacc201 d0f8baa5 4e5da7c6
2010-03-18 12:25:44: DEBUG: save IV for next:
2010-03-18 12:25:44: DEBUG:
9cd29d06 c64ecf81 77b65086 88fd2404
2010-03-18 12:25:44: DEBUG: encrypted.
2010-03-18 12:25:44: DEBUG: 140 bytes from 192.168.111.129[500] to 192.168.111.130[500]
2010-03-18 12:25:44: DEBUG: sockname 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG: send packet from 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG: send packet to 192.168.111.130[500]
2010-03-18 12:25:44: DEBUG: src4 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG: dst4 192.168.111.130[500]
2010-03-18 12:25:44: DEBUG: 1 times of 140 bytes message will be sent to 192.168.111.130[500]
2010-03-18 12:25:44: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08102001 d9d4ac95 0000008c bfddf87a
e2b483a5 e7a4042c d99a0903 a4f04d3a 082f34be dec68e0b 0af4f3cd 00d825ad
02dbdbb9 a4fa5395 38926c92 4d0e5efe 401a62c6 958ff6e7 c5689a7a 28731fd0
3e59376d e24e23d0 0326a340 ff376dfc a37d31b1 dcf739a8 9b176e68 9cd29d06
c64ecf81 77b65086 88fd2404
2010-03-18 12:25:44: DEBUG: resend phase2 packet 4b13438c9c4e8ecd:fbb9e225b6d1154f:0000d9d4
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:44: DEBUG: 60 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:44: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08102001 d9d4ac95 0000003c c73bb9eb
91827d7b 46ad664c b9b8bb43 a7eb652a 5c559584 e599fce5 c2758b6d
2010-03-18 12:25:44: DEBUG: begin decryption.
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: IV was saved for next processing:
2010-03-18 12:25:44: DEBUG:
a7eb652a 5c559584 e599fce5 c2758b6d
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: with key:
2010-03-18 12:25:44: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:44: DEBUG: decrypted payload by IV:
2010-03-18 12:25:44: DEBUG:
9cd29d06 c64ecf81 77b65086 88fd2404
2010-03-18 12:25:44: DEBUG: decrypted payload, but not trimed.
2010-03-18 12:25:44: DEBUG:
00000018 12120ece 14ba223b c4cefe65 b9fde3f4 f7ced19c 81f3949d f2dbda07
2010-03-18 12:25:44: DEBUG: padding len=8
2010-03-18 12:25:44: DEBUG: skip to trim padding.
2010-03-18 12:25:44: DEBUG: decrypted.
2010-03-18 12:25:44: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08102001 d9d4ac95 0000003c 00000018
12120ece 14ba223b c4cefe65 b9fde3f4 f7ced19c 81f3949d f2dbda07
2010-03-18 12:25:44: DEBUG: begin.
2010-03-18 12:25:44: DEBUG: seen nptype=8(hash)
2010-03-18 12:25:44: DEBUG: succeed.
2010-03-18 12:25:44: DEBUG: HASH(3) validate:2010-03-18 12:25:44: DEBUG:
12120ece 14ba223b c4cefe65 b9fde3f4 f7ced19c
2010-03-18 12:25:44: DEBUG: HASH with:
2010-03-18 12:25:44: DEBUG:
00d9d4ac 95efe4b2 7cfa0438 c09cb2d0 b691cce4 1ed57663 73b8dce9 82749a96
1231b291 80
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: HASH computed:
2010-03-18 12:25:44: DEBUG:
12120ece 14ba223b c4cefe65 b9fde3f4 f7ced19c
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:44: DEBUG: KEYMAT compute with
2010-03-18 12:25:44: DEBUG:
030c0597 2fefe4b2 7cfa0438 c09cb2d0 b691cce4 1ed57663 73b8dce9 82749a96
1231b291 80
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: hmac(sha1)
2010-03-18 12:25:44: DEBUG: encklen=128 authklen=160
2010-03-18 12:25:44: DEBUG: generating 480 bits of key (dupkeymat=3)
2010-03-18 12:25:44: DEBUG: generating K1...K3 for KEYMAT.
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG:
1428680a 40d46ed5 465c3320 346a8df1 7b43444b 3491e556 312b1bda 766cc01c
2fb69fcd 6d962995 ab27acbf 0a763444 bae8c7e2 f9638d7d 6757caf2
2010-03-18 12:25:44: DEBUG: KEYMAT compute with
2010-03-18 12:25:44: DEBUG:
030ea458 ccefe4b2 7cfa0438 c09cb2d0 b691cce4 1ed57663 73b8dce9 82749a96
1231b291 80
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: hmac(sha1)
2010-03-18 12:25:44: DEBUG: encklen=128 authklen=160
2010-03-18 12:25:44: DEBUG: generating 480 bits of key (dupkeymat=3)
2010-03-18 12:25:44: DEBUG: generating K1...K3 for KEYMAT.
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:44: DEBUG:
28b1e77d 17f7ff26 4c4bca47 a1c58cec 1bb38f1a 12842b19 267cfa4b eb3798f1
59bef3fa 6e240cf7 81daaa1a a49a9e65 d86408cb dbc0f78a 2a64806d
2010-03-18 12:25:44: DEBUG: KEYMAT computed.
2010-03-18 12:25:44: DEBUG: call pk_sendupdate
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: hmac(sha1)
2010-03-18 12:25:44: DEBUG: call pfkey_send_update2
2010-03-18 12:25:44: DEBUG: pfkey update sent.
2010-03-18 12:25:44: DEBUG: encryption(aes)
2010-03-18 12:25:44: DEBUG: hmac(sha1)
2010-03-18 12:25:44: DEBUG: call pfkey_send_add2 (NAT flavor)
2010-03-18 12:25:44: DEBUG: call pfkey_send_add2
2010-03-18 12:25:44: DEBUG: pfkey add sent.
2010-03-18 12:25:44: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:44: DEBUG: get pfkey UPDATE message
2010-03-18 12:25:44: DEBUG2:
02020003 22000000 92192674 f90d0000 02000100 0c05972f 0401030c 00000000
04000300 00000000 00000000 00000000 80700000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 005a0000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 c81ba24b 00000000 00000000 00000000
03000500 00200000 02000000 c0a86f82 00000000 00000000 03000600 00200000
02000000 c0a86f81 00000000 00000000 03000700 ff000000 02000000 00000000
00000000 00000000 04000800 a0000000 7b43444b 3491e556 312b1bda 766cc01c
2fb69fcd 00000000 03000900 80000000 1428680a 40d46ed5 465c3320 346a8df1
02001300 01000000 00000000 00000000
2010-03-18 12:25:44: DEBUG: pfkey UPDATE succeeded: ESP/Transport 192.168.111.130[0]->192.168.111.129[0] spi=201692975(0xc05972f)
2010-03-18 12:25:44: INFO: IPsec-SA established: ESP/Transport 192.168.111.130[0]->192.168.111.129[0] spi=201692975(0xc05972f)
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:44: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:44: DEBUG: get pfkey ADD message
2010-03-18 12:25:44: DEBUG2:
02030003 22000000 92192674 f90d0000 02000100 0ea458cc 0401030c 00000000
04000300 00000000 00000000 00000000 80700000 00000000 00000000 00000000
04000400 00000000 00000000 00000000 005a0000 00000000 00000000 00000000
04000200 00000000 00000000 00000000 c81ba24b 00000000 00000000 00000000
03000500 00200000 02000000 c0a86f81 00000000 00000000 03000600 00200000
02000000 c0a86f82 00000000 00000000 03000700 ff000000 02000000 00000000
00000000 00000000 04000800 a0000000 1bb38f1a 12842b19 267cfa4b eb3798f1
59bef3fa 00000000 03000900 80000000 28b1e77d 17f7ff26 4c4bca47 a1c58cec
02001300 01000000 00000000 00000000
2010-03-18 12:25:44: INFO: IPsec-SA established: ESP/Transport 192.168.111.129[500]->192.168.111.130[500] spi=245651660(0xea458cc)
2010-03-18 12:25:44: DEBUG: ===
2010-03-18 12:25:55: DEBUG: ===
2010-03-18 12:25:55: DEBUG: 76 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:55: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 b745a0fd 0000004c a70eb9e0
367bdf20 020a13e6 81b009ab 9f306968 28100e69 28193c5d ae3a06e4 4e561fd2
76263972 e5a34f90 bb7ae342
2010-03-18 12:25:55: DEBUG: receive Information.
2010-03-18 12:25:55: DEBUG: compute IV for phase2
2010-03-18 12:25:55: DEBUG: phase1 last IV:
2010-03-18 12:25:55: DEBUG:
1da88fad bf97c2ca ebc78a22 691426d2 b745a0fd
2010-03-18 12:25:55: DEBUG: hash(sha1)
2010-03-18 12:25:55: DEBUG: encryption(aes)
2010-03-18 12:25:55: DEBUG: phase2 IV computed:
2010-03-18 12:25:55: DEBUG:
84f2893f c8beb3e0 6dd67eca 028824ff
2010-03-18 12:25:55: DEBUG: begin decryption.
2010-03-18 12:25:55: DEBUG: encryption(aes)
2010-03-18 12:25:55: DEBUG: IV was saved for next processing:
2010-03-18 12:25:55: DEBUG:
4e561fd2 76263972 e5a34f90 bb7ae342
2010-03-18 12:25:55: DEBUG: encryption(aes)
2010-03-18 12:25:55: DEBUG: with key:
2010-03-18 12:25:55: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:55: DEBUG: decrypted payload by IV:
2010-03-18 12:25:55: DEBUG:
84f2893f c8beb3e0 6dd67eca 028824ff
2010-03-18 12:25:55: DEBUG: decrypted payload, but not trimed.
2010-03-18 12:25:55: DEBUG:
0c000018 7b681fcf fe9d3808 75f24462 6fb8c6d8 f0a68663 00000010 00000001
03040001 0ea458cc 88c0d982 c889f107
2010-03-18 12:25:55: DEBUG: padding len=8
2010-03-18 12:25:55: DEBUG: skip to trim padding.
2010-03-18 12:25:55: DEBUG: decrypted.
2010-03-18 12:25:55: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 b745a0fd 0000004c 0c000018
7b681fcf fe9d3808 75f24462 6fb8c6d8 f0a68663 00000010 00000001 03040001
0ea458cc 88c0d982 c889f107
2010-03-18 12:25:55: DEBUG: IV freed
2010-03-18 12:25:55: DEBUG: HASH with:
2010-03-18 12:25:55: DEBUG:
b745a0fd 00000010 00000001 03040001 0ea458cc
2010-03-18 12:25:55: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:55: DEBUG: HASH computed:
2010-03-18 12:25:55: DEBUG:
7b681fcf fe9d3808 75f24462 6fb8c6d8 f0a68663
2010-03-18 12:25:55: DEBUG: hash validated.
2010-03-18 12:25:55: DEBUG: begin.
2010-03-18 12:25:55: DEBUG: seen nptype=8(hash)
2010-03-18 12:25:55: DEBUG: seen nptype=12(delete)
2010-03-18 12:25:55: DEBUG: succeed.
2010-03-18 12:25:55: DEBUG: delete payload for protocol ESP
2010-03-18 12:25:55: DEBUG2: purge_ipsec_spi:
2010-03-18 12:25:55: DEBUG2: dst0: 192.168.111.130[500]
2010-03-18 12:25:55: DEBUG2: SPI: 0EA458CC
2010-03-18 12:25:55: DEBUG: call pfkey_send_dump
2010-03-18 12:25:55: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:55: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:55: DEBUG2: src: 192.168.111.129[0]
2010-03-18 12:25:55: DEBUG2: dst: 192.168.111.130[0]
2010-03-18 12:25:55: DEBUG2: src: 192.168.111.130[0]
2010-03-18 12:25:55: DEBUG2: dst: 192.168.111.129[0]
2010-03-18 12:25:55: DEBUG: purged SAs.
2010-03-18 12:25:56: DEBUG: ===
2010-03-18 12:25:56: DEBUG: 92 bytes message received from 192.168.111.130[500] to 192.168.111.129[500]
2010-03-18 12:25:56: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 cb2f5a27 0000005c cb51ae3f
3dd15daf 4f6715be 1ffc0c32 209d16cf efc092c8 f7611b47 ec24e878 465c22de
051e9daa 55255031 88afc1bf 9ab60e45 4d680a62 35cfa3ca 07788759
2010-03-18 12:25:56: DEBUG: receive Information.
2010-03-18 12:25:56: DEBUG: compute IV for phase2
2010-03-18 12:25:56: DEBUG: phase1 last IV:
2010-03-18 12:25:56: DEBUG:
1da88fad bf97c2ca ebc78a22 691426d2 cb2f5a27
2010-03-18 12:25:56: DEBUG: hash(sha1)
2010-03-18 12:25:56: DEBUG: encryption(aes)
2010-03-18 12:25:56: DEBUG: phase2 IV computed:
2010-03-18 12:25:56: DEBUG:
3f39a49c 1f5d2c6f 525b28dd ea4e009c
2010-03-18 12:25:56: DEBUG: begin decryption.
2010-03-18 12:25:56: DEBUG: encryption(aes)
2010-03-18 12:25:56: DEBUG: IV was saved for next processing:
2010-03-18 12:25:56: DEBUG:
9ab60e45 4d680a62 35cfa3ca 07788759
2010-03-18 12:25:56: DEBUG: encryption(aes)
2010-03-18 12:25:56: DEBUG: with key:
2010-03-18 12:25:56: DEBUG:
dec7b78d 01d8ac80 f92d0215 afd07423
2010-03-18 12:25:56: DEBUG: decrypted payload by IV:
2010-03-18 12:25:56: DEBUG:
3f39a49c 1f5d2c6f 525b28dd ea4e009c
2010-03-18 12:25:56: DEBUG: decrypted payload, but not trimed.
2010-03-18 12:25:56: DEBUG:
0c000018 72c9bb51 06ac2329 54de2ddd 8858d165 4d700b19 0000001c 00000001
01100001 4b13438c 9c4e8ecd fbb9e225 b6d1154f a2f1ec87 a0bcbae3 c8fff10b
2010-03-18 12:25:56: DEBUG: padding len=12
2010-03-18 12:25:56: DEBUG: skip to trim padding.
2010-03-18 12:25:56: DEBUG: decrypted.
2010-03-18 12:25:56: DEBUG:
4b13438c 9c4e8ecd fbb9e225 b6d1154f 08100501 cb2f5a27 0000005c 0c000018
72c9bb51 06ac2329 54de2ddd 8858d165 4d700b19 0000001c 00000001 01100001
4b13438c 9c4e8ecd fbb9e225 b6d1154f a2f1ec87 a0bcbae3 c8fff10b
2010-03-18 12:25:56: DEBUG: IV freed
2010-03-18 12:25:56: DEBUG: HASH with:
2010-03-18 12:25:56: DEBUG:
cb2f5a27 0000001c 00000001 01100001 4b13438c 9c4e8ecd fbb9e225 b6d1154f
2010-03-18 12:25:56: DEBUG: hmac(hmac_sha1)
2010-03-18 12:25:56: DEBUG: HASH computed:
2010-03-18 12:25:56: DEBUG:
72c9bb51 06ac2329 54de2ddd 8858d165 4d700b19
2010-03-18 12:25:56: DEBUG: hash validated.
2010-03-18 12:25:56: DEBUG: begin.
2010-03-18 12:25:56: DEBUG: seen nptype=8(hash)
2010-03-18 12:25:56: DEBUG: seen nptype=12(delete)
2010-03-18 12:25:56: DEBUG: succeed.
2010-03-18 12:25:56: DEBUG: delete payload for protocol ISAKMP
2010-03-18 12:25:56: INFO: ISAKMP-SA expired 192.168.111.129[500]-192.168.111.130[500] spi:4b13438c9c4e8ecd:fbb9e225b6d1154f
2010-03-18 12:25:56: DEBUG: purged SAs.
2010-03-18 12:25:56: INFO: caught signal 2
2010-03-18 12:25:56: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:56: DEBUG: get pfkey FLUSH message
2010-03-18 12:25:56: DEBUG2:
02090000 02007220 00000000 f90d0000
2010-03-18 12:25:56: DEBUG2: flushing all ph2 handlers...
2010-03-18 12:25:56: DEBUG2: got a ph2 handler to flush...
2010-03-18 12:25:56: DEBUG2: getph1byaddr: start
2010-03-18 12:25:56: DEBUG2: local: 192.168.111.129[500]
2010-03-18 12:25:56: DEBUG2: remote: 192.168.111.130[500]
2010-03-18 12:25:56: DEBUG2: no match
2010-03-18 12:25:56: DEBUG2: No ph1 handler found, could not send DELETE_SA
2010-03-18 12:25:56: DEBUG: an undead schedule has been deleted.
2010-03-18 12:25:56: DEBUG: IV freed
2010-03-18 12:25:57: INFO: ISAKMP-SA deleted 192.168.111.129[500]-192.168.111.130[500] spi:4b13438c9c4e8ecd:fbb9e225b6d1154f
2010-03-18 12:25:57: DEBUG: IV freed
2010-03-18 12:25:57: DEBUG: call pfkey_send_dump
2010-03-18 12:25:57: DEBUG: pk_recv: retry[0] recv()
2010-03-18 12:25:57: INFO: racoon shutdown