Advertisement
Guest User

Untitled

a guest
Jun 27th, 2018
339
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 362.63 KB | None | 0 0
  1. Jun 27 16:56:11.887911: NSS DB directory: sql:/etc/ipsec.d
  2. Jun 27 16:56:11.888081: Initializing NSS
  3. Jun 27 16:56:11.888091: Opening NSS database "sql:/etc/ipsec.d" read-only
  4. Jun 27 16:56:11.928798: NSS initialized
  5. Jun 27 16:56:11.928821: NSS crypto library initialized
  6. Jun 27 16:56:11.928824: FIPS HMAC integrity support [disabled]
  7. Jun 27 16:56:11.928912: libcap-ng support [enabled]
  8. Jun 27 16:56:11.928918: Linux audit support [disabled]
  9. Jun 27 16:56:11.928922: Starting Pluto (Libreswan Version v3.24-5-gb2b97fc-dirty-master XFRM(netkey) KLIPS FORK PTHREAD_SETSCHEDPRIO NSS DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC LIBCAP_NG XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:3245
  10. Jun 27 16:56:11.928924: core dump dir: /run/pluto
  11. Jun 27 16:56:11.928927: secrets file: /etc/ipsec.secrets
  12. Jun 27 16:56:11.928930: leak-detective enabled
  13. Jun 27 16:56:11.928932: NSS crypto [enabled]
  14. Jun 27 16:56:11.928934: XAUTH PAM support [enabled]
  15. Jun 27 16:56:11.929001: | init_nat_traversal() initialized with keep_alive=0s
  16. Jun 27 16:56:11.929006: NAT-Traversal support [enabled]
  17. Jun 27 16:56:11.929023: Initializing libevent in pthreads mode: headers: 2.0.21-stable (2001500); library: 2.0.21-stable (2001500)
  18. Jun 27 16:56:11.929106: | event_schedule: new EVENT_REINIT_SECRET-pe@0x555eacc1dcb8
  19. Jun 27 16:56:11.929111: | inserting event EVENT_REINIT_SECRET, timeout in 3600.000 seconds
  20. Jun 27 16:56:11.929115: | event_schedule: new EVENT_PENDING_DDNS-pe@0x555eacc1de08
  21. Jun 27 16:56:11.929118: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds
  22. Jun 27 16:56:11.929121: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x555eacc1df08
  23. Jun 27 16:56:11.929124: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds
  24. Jun 27 16:56:11.929148: Encryption algorithms:
  25. Jun 27 16:56:11.929154: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm aes_ccm_c)
  26. Jun 27 16:56:11.929157: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_b)
  27. Jun 27 16:56:11.929160: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_a)
  28. Jun 27 16:56:11.929163: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] (3des)
  29. Jun 27 16:56:11.929166: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128}
  30. Jun 27 16:56:11.929169: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (camellia)
  31. Jun 27 16:56:11.929172: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm aes_gcm_c)
  32. Jun 27 16:56:11.929175: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_b)
  33. Jun 27 16:56:11.929178: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_a)
  34. Jun 27 16:56:11.929181: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aesctr)
  35. Jun 27 16:56:11.929184: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes)
  36. Jun 27 16:56:11.929187: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (serpent)
  37. Jun 27 16:56:11.929190: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (twofish)
  38. Jun 27 16:56:11.929193: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} (twofish_cbc_ssh)
  39. Jun 27 16:56:11.929195: CAST_CBC IKEv1: ESP IKEv2: ESP {*128} (cast)
  40. Jun 27 16:56:11.929198: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP {256,192,*128} (aes_gmac)
  41. Jun 27 16:56:11.929201: NULL IKEv1: ESP IKEv2: ESP []
  42. Jun 27 16:56:11.929207: Hash algorithms:
  43. Jun 27 16:56:11.929210: MD5 IKEv1: IKE IKEv2:
  44. Jun 27 16:56:11.929212: SHA1 IKEv1: IKE IKEv2: FIPS (sha)
  45. Jun 27 16:56:11.929215: SHA2_256 IKEv1: IKE IKEv2: FIPS (sha2 sha256)
  46. Jun 27 16:56:11.929217: SHA2_384 IKEv1: IKE IKEv2: FIPS (sha384)
  47. Jun 27 16:56:11.929229: SHA2_512 IKEv1: IKE IKEv2: FIPS (sha512)
  48. Jun 27 16:56:11.929235: PRF algorithms:
  49. Jun 27 16:56:11.929238: HMAC_MD5 IKEv1: IKE IKEv2: IKE (md5)
  50. Jun 27 16:56:11.929241: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS (sha sha1)
  51. Jun 27 16:56:11.929243: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS (sha2 sha256 sha2_256)
  52. Jun 27 16:56:11.929246: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS (sha384 sha2_384)
  53. Jun 27 16:56:11.929249: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS (sha512 sha2_512)
  54. Jun 27 16:56:11.929251: AES_XCBC IKEv1: IKEv2: IKE FIPS (aes128_xcbc)
  55. Jun 27 16:56:11.929260: Integrity algorithms:
  56. Jun 27 16:56:11.929263: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (md5 hmac_md5)
  57. Jun 27 16:56:11.929265: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha sha1 sha1_96 hmac_sha1)
  58. Jun 27 16:56:11.929268: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha512 sha2_512 hmac_sha2_512)
  59. Jun 27 16:56:11.929271: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha384 sha2_384 hmac_sha2_384)
  60. Jun 27 16:56:11.929274: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha2 sha256 sha2_256 hmac_sha2_256)
  61. Jun 27 16:56:11.929276: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH FIPS (aes_xcbc aes128_xcbc aes128_xcbc_96)
  62. Jun 27 16:56:11.929279: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS (aes_cmac)
  63. Jun 27 16:56:11.929282: NONE IKEv1: ESP IKEv2: ESP FIPS (null)
  64. Jun 27 16:56:11.929291: DH algorithms:
  65. Jun 27 16:56:11.929294: NONE IKEv1: IKEv2: IKE ESP AH (null dh0)
  66. Jun 27 16:56:11.929296: MODP1024 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh2)
  67. Jun 27 16:56:11.929299: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh5)
  68. Jun 27 16:56:11.929302: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh14)
  69. Jun 27 16:56:11.929304: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh15)
  70. Jun 27 16:56:11.929307: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh16)
  71. Jun 27 16:56:11.929309: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh17)
  72. Jun 27 16:56:11.929312: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh18)
  73. Jun 27 16:56:11.929315: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_256)
  74. Jun 27 16:56:11.929318: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_384)
  75. Jun 27 16:56:11.929320: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_521)
  76. Jun 27 16:56:11.929323: DH23 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS
  77. Jun 27 16:56:11.929325: DH24 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS
  78. Jun 27 16:56:11.930882: starting up 2 crypto helpers
  79. Jun 27 16:56:11.930921: started thread for crypto helper 0
  80. Jun 27 16:56:11.930936: started thread for crypto helper 1
  81. Jun 27 16:56:11.930945: | ignoring microcode for XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0) -> MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_v1_RETRANSMIT
  82. Jun 27 16:56:11.930948: | MAIN_R0 (timeout: EVENT_NULL flags: 0)
  83. Jun 27 16:56:11.930951: | MAIN_I1 (timeout: EVENT_NULL flags: 0)
  84. Jun 27 16:56:11.930953: | MAIN_R1 (timeout: EVENT_SO_DISCARD flags: 200)
  85. Jun 27 16:56:11.930956: | MAIN_I2 (timeout: EVENT_v1_RETRANSMIT flags: 0)
  86. Jun 27 16:56:11.930958: | MAIN_R2 (timeout: EVENT_v1_RETRANSMIT flags: 0)
  87. Jun 27 16:56:11.930960: | MAIN_I3 (timeout: EVENT_v1_RETRANSMIT flags: 0)
  88. Jun 27 16:56:11.930963: | MAIN_R3 (timeout: EVENT_SA_REPLACE flags: 200)
  89. Jun 27 16:56:11.930965: | MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0)
  90. Jun 27 16:56:11.930968: | AGGR_R0 (timeout: EVENT_NULL flags: 0)
  91. Jun 27 16:56:11.930970: | AGGR_I1 (timeout: EVENT_NULL flags: 0)
  92. Jun 27 16:56:11.930977: | AGGR_R1 (timeout: EVENT_SO_DISCARD flags: 200)
  93. Jun 27 16:56:11.930980: | AGGR_I2 (timeout: EVENT_SA_REPLACE flags: 200)
  94. Jun 27 16:56:11.930982: | AGGR_R2 (timeout: EVENT_SA_REPLACE flags: 0)
  95. Jun 27 16:56:11.930985: | QUICK_R0 (timeout: EVENT_NULL flags: 0)
  96. Jun 27 16:56:11.930987: | QUICK_I1 (timeout: EVENT_NULL flags: 0)
  97. Jun 27 16:56:11.930989: | QUICK_R1 (timeout: EVENT_v1_RETRANSMIT flags: 0)
  98. Jun 27 16:56:11.930992: | QUICK_I2 (timeout: EVENT_SA_REPLACE flags: 200)
  99. Jun 27 16:56:11.930994: | QUICK_R2 (timeout: EVENT_SA_REPLACE flags: 0)
  100. Jun 27 16:56:11.930997: | INFO (timeout: EVENT_NULL flags: 0)
  101. Jun 27 16:56:11.930999: | INFO_PROTECTED (timeout: EVENT_NULL flags: 0)
  102. Jun 27 16:56:11.931002: | XAUTH_R0 (timeout: EVENT_NULL flags: 0)
  103. Jun 27 16:56:11.931004: | XAUTH_R1 (timeout: EVENT_NULL flags: 0)
  104. Jun 27 16:56:11.931006: | MODE_CFG_R0 (timeout: EVENT_NULL flags: 0)
  105. Jun 27 16:56:11.931009: | MODE_CFG_R1 (timeout: EVENT_SA_REPLACE flags: 0)
  106. Jun 27 16:56:11.931011: | MODE_CFG_R2 (timeout: EVENT_SA_REPLACE flags: 0)
  107. Jun 27 16:56:11.931014: | MODE_CFG_I1 (timeout: EVENT_NULL flags: 0)
  108. Jun 27 16:56:11.931016: | XAUTH_I0 (timeout: EVENT_NULL flags: 0)
  109. Jun 27 16:56:11.931018: | XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0)
  110. Jun 27 16:56:11.931027: | Processing IKEv2 state V2_REKEY_IKE_I0 (microcode Initiate CREATE_CHILD_SA IKE Rekey)
  111. Jun 27 16:56:11.931030: | Processing IKEv2 state V2_REKEY_CHILD_I0 (microcode Initiate CREATE_CHILD_SA IPsec Rekey SA)
  112. Jun 27 16:56:11.931032: | Processing IKEv2 state V2_CREATE_I0 (microcode Initiate CREATE_CHILD_SA IPsec SA)
  113. Jun 27 16:56:11.931035: | Processing IKEv2 state PARENT_I0 (microcode initiate IKE_SA_INIT)
  114. Jun 27 16:56:11.931037: | Processing IKEv2 state PARENT_I1 (microcode Initiator: process SA_INIT reply notification)
  115. Jun 27 16:56:11.931040: | Processing IKEv2 state PARENT_I2 (microcode Initiator: process INVALID_SYNTAX AUTH notification)
  116. Jun 27 16:56:11.931043: | Processing IKEv2 state PARENT_R0 (microcode Respond to IKE_SA_INIT)
  117. Jun 27 16:56:11.931045: | Processing IKEv2 state PARENT_R1 (microcode Responder: process AUTH request (no SKEYSEED))
  118. Jun 27 16:56:11.931048: | Processing IKEv2 state V2_REKEY_IKE_R (microcode Respond to CREATE_CHILD_SA IKE Rekey)
  119. Jun 27 16:56:11.931051: | Processing IKEv2 state V2_REKEY_IKE_I (microcode Process CREATE_CHILD_SA IKE Rekey Response)
  120. Jun 27 16:56:11.931054: | Processing IKEv2 state V2_CREATE_I (microcode Process CREATE_CHILD_SA IPsec SA Response)
  121. Jun 27 16:56:11.931056: | Processing IKEv2 state V2_CREATE_R (microcode Respond to CREATE_CHILD_SA IPsec SA Request)
  122. Jun 27 16:56:11.931059: | Processing IKEv2 state PARENT_I3 (microcode I3: INFORMATIONAL Request)
  123. Jun 27 16:56:11.931061: | Processing IKEv2 state PARENT_R2 (microcode R2: process INFORMATIONAL Request)
  124. Jun 27 16:56:11.931064: | Processing IKEv2 state IKESA_DEL (microcode IKE_SA_DEL: process INFORMATIONAL)
  125. Jun 27 16:56:11.931068: | ignoring microcode for PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_RETAIN
  126. Jun 27 16:56:11.931071: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
  127. Jun 27 16:56:11.931074: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
  128. Jun 27 16:56:11.931077: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
  129. Jun 27 16:56:11.931080: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
  130. Jun 27 16:56:11.931084: | ignoring microcode for PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) -> PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) with event EVENT_SA_REPLACE
  131. Jun 27 16:56:11.931087: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
  132. Jun 27 16:56:11.931092: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
  133. Jun 27 16:56:11.931095: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
  134. Jun 27 16:56:11.931099: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
  135. Jun 27 16:56:11.931101: | IKEv2_BASE (timeout: EVENT_NULL flags: 0)
  136. Jun 27 16:56:11.931104: | PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0)
  137. Jun 27 16:56:11.931106: | PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0)
  138. Jun 27 16:56:11.931109: | PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0)
  139. Jun 27 16:56:11.931111: | PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0)
  140. Jun 27 16:56:11.931114: | PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0)
  141. Jun 27 16:56:11.931116: | V2_CREATE_I0 (timeout: EVENT_NULL flags: 0)
  142. Jun 27 16:56:11.931119: | V2_CREATE_I (timeout: EVENT_v2_RETRANSMIT flags: 0)
  143. Jun 27 16:56:11.931121: | V2_REKEY_IKE_I0 (timeout: EVENT_NULL flags: 0)
  144. Jun 27 16:56:11.931124: | V2_REKEY_IKE_I (timeout: EVENT_v2_RETRANSMIT flags: 0)
  145. Jun 27 16:56:11.931126: | V2_REKEY_CHILD_I0 (timeout: EVENT_NULL flags: 0)
  146. Jun 27 16:56:11.931129: | V2_REKEY_CHILD_I (timeout: EVENT_v2_RETRANSMIT flags: 0)
  147. Jun 27 16:56:11.931131: | V2_CREATE_R (timeout: EVENT_NULL flags: 0)
  148. Jun 27 16:56:11.931134: | V2_REKEY_IKE_R (timeout: EVENT_NULL flags: 0)
  149. Jun 27 16:56:11.931136: | V2_REKEY_CHILD_R (timeout: EVENT_NULL flags: 0)
  150. Jun 27 16:56:11.931139: | V2_IPSEC_I (timeout: EVENT_SA_REPLACE flags: 0)
  151. Jun 27 16:56:11.931141: | V2_IPSEC_R (timeout: EVENT_SA_REPLACE flags: 0)
  152. Jun 27 16:56:11.931143: | IKESA_DEL (timeout: EVENT_RETAIN flags: 0)
  153. Jun 27 16:56:11.931146: | CHILDSA_DEL (timeout: EVENT_NULL flags: 0)
  154. Jun 27 16:56:11.931148: | PARENT_R0 (timeout: EVENT_NULL flags: 0)
  155. Jun 27 16:56:11.931151: | PARENT_I0 (timeout: EVENT_NULL flags: 0)
  156. Jun 27 16:56:11.931166: Using Linux XFRM/NETKEY IPsec interface code on 3.16.0-6-amd64
  157. Jun 27 16:56:11.931186: | process 3245 listening for PF_KEY_V2 on file descriptor 15
  158. Jun 27 16:56:11.931189: | kernel_alg_init()
  159. Jun 27 16:56:11.931193: | Hard-wiring new AEAD algorithms
  160. Jun 27 16:56:11.931197: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=18(ESP_AES_GCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  161. Jun 27 16:56:11.931201: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=19(ESP_AES_GCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  162. Jun 27 16:56:11.931204: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=20(ESP_AES_GCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  163. Jun 27 16:56:11.931207: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=14(ESP_AES_CCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  164. Jun 27 16:56:11.931211: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=15(ESP_AES_CCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  165. Jun 27 16:56:11.931214: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=16(ESP_AES_CCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  166. Jun 27 16:56:11.931217: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=23(ESP_NULL_AUTH_AES_GMAC), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  167. Jun 27 16:56:11.931219: | Hard-wiring new INTEG algorithms
  168. Jun 27 16:56:11.931223: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=250(AH_AES_CMAC_96), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
  169. Jun 27 16:56:11.931289: | finish_pfkey_msg: K_SADB_REGISTER message 1 for AH
  170. Jun 27 16:56:11.931295: | 02 07 00 02 02 00 00 00 01 00 00 00 ad 0c 00 00
  171. Jun 27 16:56:11.931371: | starting up helper thread 1
  172. Jun 27 16:56:11.931376: seccomp security for crypto helper not supported
  173. Jun 27 16:56:11.931382: | status value returned by setting the priority of this thread (crypto helper 1) 22
  174. Jun 27 16:56:11.931384: | crypto helper 1 waiting (nothing to do)
  175. Jun 27 16:56:11.931390: | starting up helper thread 0
  176. Jun 27 16:56:11.931393: seccomp security for crypto helper not supported
  177. Jun 27 16:56:11.931396: | status value returned by setting the priority of this thread (crypto helper 0) 22
  178. Jun 27 16:56:11.931399: | crypto helper 0 waiting (nothing to do)
  179. Jun 27 16:56:11.933721: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 1 for process 0
  180. Jun 27 16:56:11.933733: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 2 for process 0
  181. Jun 27 16:56:11.933737: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 3 for process 0
  182. Jun 27 16:56:11.933741: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 4 for process 0
  183. Jun 27 16:56:11.933745: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 5 for process 0
  184. Jun 27 16:56:11.933748: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 6 for process 0
  185. Jun 27 16:56:11.933752: | pfkey_get: K_SADB_REGISTER message 1
  186. Jun 27 16:56:11.933756: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=72
  187. Jun 27 16:56:11.933760: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
  188. Jun 27 16:56:11.933763: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
  189. Jun 27 16:56:11.933766: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
  190. Jun 27 16:56:11.933770: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256
  191. Jun 27 16:56:11.933773: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384
  192. Jun 27 16:56:11.933776: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512
  193. Jun 27 16:56:11.933779: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
  194. Jun 27 16:56:11.933782: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
  195. Jun 27 16:56:11.933785: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=88
  196. Jun 27 16:56:11.933788: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
  197. Jun 27 16:56:11.933791: | kernel_alg_add(2,15,11) fails because alg combo is invalid
  198. Jun 27 16:56:11.933794: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64
  199. Jun 27 16:56:11.933797: | kernel_alg_add(2,15,2) fails because alg combo is invalid
  200. Jun 27 16:56:11.933800: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192
  201. Jun 27 16:56:11.933803: | kernel_alg_add(2,15,3) fails because alg combo is invalid
  202. Jun 27 16:56:11.933806: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128
  203. Jun 27 16:56:11.933808: | kernel_alg_add(2,15,6) fails because alg combo is invalid
  204. Jun 27 16:56:11.933811: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448
  205. Jun 27 16:56:11.933814: | kernel_alg_add(2,15,7) fails because alg combo is invalid
  206. Jun 27 16:56:11.933821: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  207. Jun 27 16:56:11.933823: | kernel_alg_add(2,15,12) fails because alg combo is invalid
  208. Jun 27 16:56:11.933827: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  209. Jun 27 16:56:11.933829: | kernel_alg_add(2,15,252) fails because alg combo is invalid
  210. Jun 27 16:56:11.933832: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  211. Jun 27 16:56:11.933835: | kernel_alg_add(2,15,22) fails because alg combo is invalid
  212. Jun 27 16:56:11.933838: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  213. Jun 27 16:56:11.933841: | kernel_alg_add(2,15,253) fails because alg combo is invalid
  214. Jun 27 16:56:11.933844: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288
  215. Jun 27 16:56:11.933846: | kernel_alg_add(2,15,13) fails because alg combo is invalid
  216. Jun 27 16:56:11.933849: | AH registered with kernel.
  217. Jun 27 16:56:11.933853: | finish_pfkey_msg: K_SADB_REGISTER message 2 for ESP
  218. Jun 27 16:56:11.933856: | 02 07 00 03 02 00 00 00 02 00 00 00 ad 0c 00 00
  219. Jun 27 16:56:11.935420: | pfkey_get: K_SADB_REGISTER message 2
  220. Jun 27 16:56:11.935429: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=72
  221. Jun 27 16:56:11.935433: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
  222. Jun 27 16:56:11.935436: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=251
  223. Jun 27 16:56:11.935439: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
  224. Jun 27 16:56:11.935442: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=2
  225. Jun 27 16:56:11.935445: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
  226. Jun 27 16:56:11.935448: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=3
  227. Jun 27 16:56:11.935451: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256
  228. Jun 27 16:56:11.935453: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=5
  229. Jun 27 16:56:11.935457: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384
  230. Jun 27 16:56:11.935459: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=6
  231. Jun 27 16:56:11.935462: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512
  232. Jun 27 16:56:11.935465: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=7
  233. Jun 27 16:56:11.935468: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
  234. Jun 27 16:56:11.935470: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=8
  235. Jun 27 16:56:11.935474: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
  236. Jun 27 16:56:11.935476: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=9
  237. Jun 27 16:56:11.935479: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=88
  238. Jun 27 16:56:11.935482: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
  239. Jun 27 16:56:11.935489: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64
  240. Jun 27 16:56:11.935492: | kernel_alg_add(): Ignoring alg_id=2(ESP_DES(UNUSED)) - too weak
  241. Jun 27 16:56:11.935495: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192
  242. Jun 27 16:56:11.935498: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128
  243. Jun 27 16:56:11.935501: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448
  244. Jun 27 16:56:11.935504: | kernel_alg_add(): Ignoring alg_id=7(ESP_BLOWFISH(UNUSED)) - too weak
  245. Jun 27 16:56:11.935507: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  246. Jun 27 16:56:11.935510: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  247. Jun 27 16:56:11.935514: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  248. Jun 27 16:56:11.935517: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
  249. Jun 27 16:56:11.935520: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288
  250. Jun 27 16:56:11.935522: | ESP registered with kernel.
  251. Jun 27 16:56:11.935526: | finish_pfkey_msg: K_SADB_REGISTER message 3 for IPCOMP
  252. Jun 27 16:56:11.935529: | 02 07 00 09 02 00 00 00 03 00 00 00 ad 0c 00 00
  253. Jun 27 16:56:11.937198: | pfkey_get: K_SADB_REGISTER message 3
  254. Jun 27 16:56:11.937207: | IPCOMP registered with kernel.
  255. Jun 27 16:56:11.937214: | Registered AH, ESP and IPCOMP
  256. Jun 27 16:56:11.937219: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x555eacc2ac88
  257. Jun 27 16:56:11.937223: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
  258. Jun 27 16:56:11.937228: | setup kernel fd callback
  259. Jun 27 16:56:11.937410: | selinux support is NOT enabled.
  260. Jun 27 16:56:11.937418: systemd watchdog for ipsec service configured with timeout of 200000000 usecs
  261. Jun 27 16:56:11.937421: watchdog: sending probes every 100 secs
  262. Jun 27 16:56:11.937424: | pluto_sd: executing action action: start(2), status 0
  263. Jun 27 16:56:11.937443: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x555eacc2af88
  264. Jun 27 16:56:11.937448: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds
  265. Jun 27 16:56:11.937708: | unbound context created - setting debug level to 5
  266. Jun 27 16:56:11.937737: | /etc/hosts lookups activated
  267. Jun 27 16:56:11.937757: | /etc/resolv.conf usage activated
  268. Jun 27 16:56:11.937761: | Loading dnssec root key from:/var/lib/unbound/root.key
  269. Jun 27 16:56:11.937764: | No additional dnssec trust anchors defined via dnssec-trusted= option
  270. Jun 27 16:56:11.937767: | Setting up events, loop start
  271. Jun 27 16:56:11.937989: | created addconn helper (pid:3274) using fork+execve
  272. Jun 27 16:56:11.938001: | forked child 3274
  273. Jun 27 16:56:11.938013: | pid table: inserting object 0x555eacc2ded8 (addconn pid 3274) entry 0x555eacc2dee0 into list 0x555eabca2880 (older 0x555eabca2880 newer 0x555eabca2880)
  274. Jun 27 16:56:11.938018: | pid table: inserted object 0x555eacc2ded8 (addconn pid 3274) entry 0x555eacc2dee0 (older 0x555eabca2880 newer 0x555eabca2880)
  275. Jun 27 16:56:11.938021: | pid table: list entry 0x555eabca2880 is HEAD (older 0x555eacc2dee0 newer 0x555eacc2dee0)
  276. Jun 27 16:56:11.938023: seccomp security not supported
  277. Jun 27 16:56:11.943519: | Added new connection v6neighbor-hole-in with policy AUTH_NEVER+PASS+NEVER_NEGOTIATE
  278. Jun 27 16:56:11.943541: | counting wild cards for ::1 is 0
  279. Jun 27 16:56:11.943546: | counting wild cards for %any is 0
  280. Jun 27 16:56:11.943553: added connection description "v6neighbor-hole-in"
  281. Jun 27 16:56:11.943564: | ::/0===::1<::1>:58/34560...%any:58/34816===::/0
  282. Jun 27 16:56:11.943568: | ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 0; policy: AUTH_NEVER+PASS+NEVER_NEGOTIATE
  283. Jun 27 16:56:11.943609: | Added new connection v6neighbor-hole-out with policy AUTH_NEVER+PASS+NEVER_NEGOTIATE
  284. Jun 27 16:56:11.943616: | counting wild cards for ::1 is 0
  285. Jun 27 16:56:11.943619: | counting wild cards for %any is 0
  286. Jun 27 16:56:11.943622: added connection description "v6neighbor-hole-out"
  287. Jun 27 16:56:11.943630: | ::/0===::1<::1>:58/34816...%any:58/34560===::/0
  288. Jun 27 16:56:11.943633: | ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 0; policy: AUTH_NEVER+PASS+NEVER_NEGOTIATE
  289. Jun 27 16:56:11.943672: | Added new connection xauth-aggr with policy PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
  290. Jun 27 16:56:11.943679: | counting wild cards for 192.168.1.137 is 0
  291. Jun 27 16:56:11.943682: | counting wild cards for (none) is 15
  292. Jun 27 16:56:11.943686: | add new addresspool to global pools 192.168.20.2-192.168.20.10 size 9 ptr 0x555eacc2f158
  293. Jun 27 16:56:11.943689: | based upon policy, the connection is a template.
  294. Jun 27 16:56:11.943693: | reference addresspool of conn xauth-aggr[0] kind CK_TEMPLATE refcnt 0
  295. Jun 27 16:56:11.943695: added connection description "xauth-aggr"
  296. Jun 27 16:56:11.943703: | 0.0.0.0/0===192.168.1.137<192.168.1.137>[MS+XS+S=C]...%any[+MC+XC+S=C]
  297. Jun 27 16:56:11.943708: | ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
  298. Jun 27 16:56:11.943744: | Added new connection xauth with policy PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
  299. Jun 27 16:56:11.943750: | counting wild cards for 192.168.1.137 is 0
  300. Jun 27 16:56:11.943753: | counting wild cards for (none) is 15
  301. Jun 27 16:56:11.943756: | re-use addresspool 192.168.20.2-192.168.20.10 exists ref count 1 used 0 size 9 ptr 0x555eacc2f158 re-use it
  302. Jun 27 16:56:11.943759: | based upon policy, the connection is a template.
  303. Jun 27 16:56:11.943762: | reference addresspool of conn xauth[0] kind CK_TEMPLATE refcnt 1
  304. Jun 27 16:56:11.943764: added connection description "xauth"
  305. Jun 27 16:56:11.943771: | 0.0.0.0/0===192.168.1.137<192.168.1.137>[MS+XS+S=C]...%any[+MC+XC+S=C]
  306. Jun 27 16:56:11.943775: | ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
  307. Jun 27 16:56:11.943810: | pluto_sd: executing action action: reloading(4), status 0
  308. Jun 27 16:56:11.943826: listening for IKE messages
  309. Jun 27 16:56:11.943845: | Inspecting interface lo
  310. Jun 27 16:56:11.943850: | found lo with address 127.0.0.1
  311. Jun 27 16:56:11.943852: | Inspecting interface eth0
  312. Jun 27 16:56:11.943856: | found eth0 with address 192.168.1.137
  313. Jun 27 16:56:11.943878: adding interface eth0/eth0 192.168.1.137:500
  314. Jun 27 16:56:11.943890: | NAT-Traversal: Trying sockopt style NAT-T
  315. Jun 27 16:56:11.943894: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
  316. Jun 27 16:56:11.943897: adding interface eth0/eth0 192.168.1.137:4500
  317. Jun 27 16:56:11.943906: adding interface lo/lo 127.0.0.1:500
  318. Jun 27 16:56:11.943915: | NAT-Traversal: Trying sockopt style NAT-T
  319. Jun 27 16:56:11.943919: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
  320. Jun 27 16:56:11.943921: adding interface lo/lo 127.0.0.1:4500
  321. Jun 27 16:56:11.943958: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
  322. Jun 27 16:56:11.943996: adding interface lo/lo ::1:500
  323. Jun 27 16:56:11.944004: | connect_to_host_pair: 192.168.1.137:500 0.0.0.0:500 -> hp:none
  324. Jun 27 16:56:11.944008: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  325. Jun 27 16:56:11.944011: | connect_to_host_pair: 192.168.1.137:500 0.0.0.0:500 -> hp:xauth
  326. Jun 27 16:56:11.944014: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  327. Jun 27 16:56:11.944017: | connect_to_host_pair: ::1:500 :::500 -> hp:none
  328. Jun 27 16:56:11.944020: | find_host_pair: comparing ::1:500 to :::500
  329. Jun 27 16:56:11.944023: | connect_to_host_pair: ::1:500 :::500 -> hp:v6neighbor-hole-out
  330. Jun 27 16:56:11.944033: | setup callback for interface lo:500 fd 20
  331. Jun 27 16:56:11.944046: | setup callback for interface lo:4500 fd 19
  332. Jun 27 16:56:11.944049: | setup callback for interface lo:500 fd 18
  333. Jun 27 16:56:11.944053: | setup callback for interface eth0:4500 fd 17
  334. Jun 27 16:56:11.944057: | setup callback for interface eth0:500 fd 16
  335. Jun 27 16:56:11.944062: | certs and keys locked by 'free_preshared_secrets'
  336. Jun 27 16:56:11.944065: | certs and keys unlocked by 'free_preshard_secrets'
  337. Jun 27 16:56:11.944081: loading secrets from "/etc/ipsec.secrets"
  338. Jun 27 16:56:11.944111: loading secrets from "/etc/ipsec.d/xauth.secrets"
  339. Jun 27 16:56:11.944118: | id type added to secret(0x555eacc30998) PKK_PSK: 192.168.1.137
  340. Jun 27 16:56:11.944122: WARNING: using a weak secret (PSK)
  341. Jun 27 16:56:11.944126: | Processing PSK at line 1: passed
  342. Jun 27 16:56:11.944129: | certs and keys locked by 'process_secret'
  343. Jun 27 16:56:11.944132: | certs and keys unlocked by 'process_secret'
  344. Jun 27 16:56:11.944143: | pluto_sd: executing action action: ready(5), status 0
  345. Jun 27 16:56:11.944259: | processing: start connection "v6neighbor-hole-in" (in whack_route_connection() at rcv_whack.c:106)
  346. Jun 27 16:56:11.944267: | could_route called for v6neighbor-hole-in (kind=CK_PERMANENT)
  347. Jun 27 16:56:11.944271: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  348. Jun 27 16:56:11.944273: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  349. Jun 27 16:56:11.944276: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  350. Jun 27 16:56:11.944278: | conn xauth mark 0/00000000, 0/00000000
  351. Jun 27 16:56:11.944281: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  352. Jun 27 16:56:11.944283: | conn xauth-aggr mark 0/00000000, 0/00000000
  353. Jun 27 16:56:11.944286: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  354. Jun 27 16:56:11.944288: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  355. Jun 27 16:56:11.944292: | route owner of "v6neighbor-hole-in" unrouted: NULL; eroute owner: NULL
  356. Jun 27 16:56:11.944295: | route_and_eroute() for proto 58, and source port 34560 dest port 34816
  357. Jun 27 16:56:11.944298: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  358. Jun 27 16:56:11.944300: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  359. Jun 27 16:56:11.944303: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  360. Jun 27 16:56:11.944305: | conn xauth mark 0/00000000, 0/00000000
  361. Jun 27 16:56:11.944308: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  362. Jun 27 16:56:11.944310: | conn xauth-aggr mark 0/00000000, 0/00000000
  363. Jun 27 16:56:11.944312: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  364. Jun 27 16:56:11.944315: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  365. Jun 27 16:56:11.944318: | route owner of "v6neighbor-hole-in" unrouted: NULL; eroute owner: NULL
  366. Jun 27 16:56:11.944321: | route_and_eroute with c: v6neighbor-hole-in (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
  367. Jun 27 16:56:11.944325: | shunt_eroute() called for connection 'v6neighbor-hole-in' to 'add' for rt_kind 'prospective erouted' using protoports 58--34560->-34816
  368. Jun 27 16:56:11.944328: | netlink_shunt_eroute for proto 58, and source port 34560 dest port 34816
  369. Jun 27 16:56:11.944333: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
  370. Jun 27 16:56:11.944335: | netlink_raw_eroute: SPI_PASS
  371. Jun 27 16:56:11.944342: | IPsec Sa SPD priority set to 1
  372. Jun 27 16:56:11.944364: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
  373. Jun 27 16:56:11.944367: | netlink_raw_eroute: SPI_PASS
  374. Jun 27 16:56:11.944370: | IPsec Sa SPD priority set to 1
  375. Jun 27 16:56:11.944379: | route_and_eroute: firewall_notified: true
  376. Jun 27 16:56:11.944382: | running updown command "ipsec _updown" for verb prepare
  377. Jun 27 16:56:11.944385: | command executing prepare-client-v6
  378. Jun 27 16:56:11.944400: | executing prepare-client-v6: PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
  379. Jun 27 16:56:11.944404: | popen cmd is 902 chars long
  380. Jun 27 16:56:11.944407: | cmd( 0):PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
  381. Jun 27 16:56:11.944410: | cmd( 80):hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=':
  382. Jun 27 16:56:11.944412: | cmd( 160):::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' P:
  383. Jun 27 16:56:11.944415: | cmd( 240):LUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER=':::
  384. Jun 27 16:56:11.944417: | cmd( 320):' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO:
  385. Jun 27 16:56:11.944420: | cmd( 400):_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PE:
  386. Jun 27 16:56:11.944422: | cmd( 480):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PA:
  387. Jun 27 16:56:11.944425: | cmd( 560):SS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' :
  388. Jun 27 16:56:11.944427: | cmd( 640):XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_:
  389. Jun 27 16:56:11.944430: | cmd( 720):INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_:
  390. Jun 27 16:56:11.944432: | cmd( 800):CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=:
  391. Jun 27 16:56:11.944435: | cmd( 880):0x0 ipsec _updown 2>&1:
  392. Jun 27 16:56:11.946860: | running updown command "ipsec _updown" for verb route
  393. Jun 27 16:56:11.946875: | command executing route-client-v6
  394. Jun 27 16:56:11.946895: | executing route-client-v6: PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
  395. Jun 27 16:56:11.946899: | popen cmd is 900 chars long
  396. Jun 27 16:56:11.946902: | cmd( 0):PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-ho:
  397. Jun 27 16:56:11.946910: | cmd( 80):le-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=':::
  398. Jun 27 16:56:11.946913: | cmd( 160):/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLU:
  399. Jun 27 16:56:11.946916: | cmd( 240):TO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' :
  400. Jun 27 16:56:11.946918: | cmd( 320):PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_P:
  401. Jun 27 16:56:11.946921: | cmd( 400):EER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER:
  402. Jun 27 16:56:11.946923: | cmd( 480):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS:
  403. Jun 27 16:56:11.946926: | cmd( 560):+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XA:
  404. Jun 27 16:56:11.946929: | cmd( 640):UTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_IN:
  405. Jun 27 16:56:11.946931: | cmd( 720):FO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CO:
  406. Jun 27 16:56:11.946934: | cmd( 800):NFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x:
  407. Jun 27 16:56:11.946936: | cmd( 880):0 ipsec _updown 2>&1:
  408. Jun 27 16:56:11.949544: | processing: stop connection "v6neighbor-hole-in" (in whack_route_connection() at rcv_whack.c:116)
  409. Jun 27 16:56:11.949748: | waitpid returned nothing left to do (all child processes are busy)
  410. Jun 27 16:56:11.949756: | waitpid returned nothing left to do (all child processes are busy)
  411. Jun 27 16:56:11.949902: | processing: start connection "v6neighbor-hole-out" (in whack_route_connection() at rcv_whack.c:106)
  412. Jun 27 16:56:11.949918: | could_route called for v6neighbor-hole-out (kind=CK_PERMANENT)
  413. Jun 27 16:56:11.949929: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  414. Jun 27 16:56:11.949932: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  415. Jun 27 16:56:11.949935: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  416. Jun 27 16:56:11.949937: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  417. Jun 27 16:56:11.949943: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  418. Jun 27 16:56:11.949945: | conn xauth mark 0/00000000, 0/00000000
  419. Jun 27 16:56:11.949948: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  420. Jun 27 16:56:11.949952: | conn xauth-aggr mark 0/00000000, 0/00000000
  421. Jun 27 16:56:11.949963: | route owner of "v6neighbor-hole-out" unrouted: NULL; eroute owner: NULL
  422. Jun 27 16:56:11.949967: | route_and_eroute() for proto 58, and source port 34816 dest port 34560
  423. Jun 27 16:56:11.949971: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  424. Jun 27 16:56:11.949974: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  425. Jun 27 16:56:11.949977: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  426. Jun 27 16:56:11.949981: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  427. Jun 27 16:56:11.949983: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  428. Jun 27 16:56:11.949986: | conn xauth mark 0/00000000, 0/00000000
  429. Jun 27 16:56:11.949989: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  430. Jun 27 16:56:11.949992: | conn xauth-aggr mark 0/00000000, 0/00000000
  431. Jun 27 16:56:11.949996: | route owner of "v6neighbor-hole-out" unrouted: NULL; eroute owner: NULL
  432. Jun 27 16:56:11.950001: | route_and_eroute with c: v6neighbor-hole-out (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
  433. Jun 27 16:56:11.950006: | shunt_eroute() called for connection 'v6neighbor-hole-out' to 'add' for rt_kind 'prospective erouted' using protoports 58--34816->-34560
  434. Jun 27 16:56:11.950011: | netlink_shunt_eroute for proto 58, and source port 34816 dest port 34560
  435. Jun 27 16:56:11.950016: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
  436. Jun 27 16:56:11.950023: | netlink_raw_eroute: SPI_PASS
  437. Jun 27 16:56:11.950031: | IPsec Sa SPD priority set to 1
  438. Jun 27 16:56:11.950096: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
  439. Jun 27 16:56:11.950116: | netlink_raw_eroute: SPI_PASS
  440. Jun 27 16:56:11.950119: | IPsec Sa SPD priority set to 1
  441. Jun 27 16:56:11.950135: | route_and_eroute: firewall_notified: true
  442. Jun 27 16:56:11.950140: | running updown command "ipsec _updown" for verb prepare
  443. Jun 27 16:56:11.950142: | command executing prepare-client-v6
  444. Jun 27 16:56:11.950173: | executing prepare-client-v6: PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
  445. Jun 27 16:56:11.950178: | popen cmd is 903 chars long
  446. Jun 27 16:56:11.950183: | cmd( 0):PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
  447. Jun 27 16:56:11.950186: | cmd( 80):hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=:
  448. Jun 27 16:56:11.950189: | cmd( 160):'::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' :
  449. Jun 27 16:56:11.950192: | cmd( 240):PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::
  450. Jun 27 16:56:11.950195: | cmd( 320)::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUT:
  451. Jun 27 16:56:11.950198: | cmd( 400):O_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_P:
  452. Jun 27 16:56:11.950201: | cmd( 480):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+P:
  453. Jun 27 16:56:11.950204: | cmd( 560):ASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6':
  454. Jun 27 16:56:11.950206: | cmd( 640): XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN:
  455. Jun 27 16:56:11.950209: | cmd( 720):_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM:
  456. Jun 27 16:56:11.950213: | cmd( 800):_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT:
  457. Jun 27 16:56:11.950215: | cmd( 880):=0x0 ipsec _updown 2>&1:
  458. Jun 27 16:56:11.955443: | running updown command "ipsec _updown" for verb route
  459. Jun 27 16:56:11.955485: | command executing route-client-v6
  460. Jun 27 16:56:11.955524: | executing route-client-v6: PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
  461. Jun 27 16:56:11.955529: | popen cmd is 901 chars long
  462. Jun 27 16:56:11.955532: | cmd( 0):PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-ho:
  463. Jun 27 16:56:11.955535: | cmd( 80):le-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::
  464. Jun 27 16:56:11.955553: | cmd( 160)::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PL:
  465. Jun 27 16:56:11.955556: | cmd( 240):UTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::':
  466. Jun 27 16:56:11.955558: | cmd( 320): PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_:
  467. Jun 27 16:56:11.955561: | cmd( 400):PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEE:
  468. Jun 27 16:56:11.955563: | cmd( 480):R_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PAS:
  469. Jun 27 16:56:11.955566: | cmd( 560):S+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' X:
  470. Jun 27 16:56:11.955568: | cmd( 640):AUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_I:
  471. Jun 27 16:56:11.955571: | cmd( 720):NFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_C:
  472. Jun 27 16:56:11.955573: | cmd( 800):ONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0:
  473. Jun 27 16:56:11.955576: | cmd( 880):x0 ipsec _updown 2>&1:
  474. Jun 27 16:56:11.958100: | processing: stop connection "v6neighbor-hole-out" (in whack_route_connection() at rcv_whack.c:116)
  475. Jun 27 16:56:11.958149: | waitpid returned nothing left to do (all child processes are busy)
  476. Jun 27 16:56:11.958154: | waitpid returned nothing left to do (all child processes are busy)
  477. Jun 27 16:56:11.958497: | waitpid returned pid 3274 (exited with status 0)
  478. Jun 27 16:56:11.958506: | serialno table: hash serialno #0 to head 0x555eabc9e340
  479. Jun 27 16:56:11.958511: | serialno table: hash serialno #0 to head 0x555eabc9e340
  480. Jun 27 16:56:11.958514: | reaped addconn helper child (status 0)
  481. Jun 27 16:56:11.958519: | pid table: removing object 0x555eacc2ded8 (addconn pid 3274) entry 0x555eacc2dee0 (older 0x555eabca2880 newer 0x555eabca2880)
  482. Jun 27 16:56:11.958522: | pid table: empty
  483. Jun 27 16:56:11.958528: | waitpid returned ECHILD (no child processes left)
  484. Jun 27 16:56:31.959414: | timer_event_cb: processing event@0x555eacc2ac88
  485. Jun 27 16:56:31.959458: | handling event EVENT_SHUNT_SCAN
  486. Jun 27 16:56:31.959467: | expiring aged bare shunts from shunt table
  487. Jun 27 16:56:31.959473: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x555eacc30518
  488. Jun 27 16:56:31.959478: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
  489. Jun 27 16:56:31.959486: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x555eacc2ac88
  490. Jun 27 16:56:38.193806: | *received 3092 bytes from 192.168.1.138:500 on eth0 (port=500)
  491. Jun 27 16:56:38.193853: | 0e 20 a4 7f 26 01 0e 7b 00 00 00 00 00 00 00 00
  492. Jun 27 16:56:38.193861: | 01 10 02 00 00 00 00 00 00 00 0c 14 0d 00 0a f4
  493. Jun 27 16:56:38.193866: | 00 00 00 01 00 00 00 01 00 00 0a e8 01 01 00 48
  494. Jun 27 16:56:38.193871: | 03 00 00 28 01 01 00 00 80 01 00 07 80 0e 01 00
  495. Jun 27 16:56:38.193876: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  496. Jun 27 16:56:38.193882: | 00 0c 00 04 00 01 51 80 03 00 00 28 02 01 00 00
  497. Jun 27 16:56:38.193887: | 80 01 00 07 80 0e 01 00 80 02 00 01 80 04 00 05
  498. Jun 27 16:56:38.193893: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  499. Jun 27 16:56:38.193898: | 03 00 00 28 03 01 00 00 80 01 00 07 80 0e 01 00
  500. Jun 27 16:56:38.193904: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
  501. Jun 27 16:56:38.193909: | 00 0c 00 04 00 01 51 80 03 00 00 28 04 01 00 00
  502. Jun 27 16:56:38.193913: | 80 01 00 07 80 0e 01 00 80 02 00 01 80 04 00 01
  503. Jun 27 16:56:38.193918: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  504. Jun 27 16:56:38.193923: | 03 00 00 28 05 01 00 00 80 01 00 07 80 0e 01 00
  505. Jun 27 16:56:38.193928: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
  506. Jun 27 16:56:38.193933: | 00 0c 00 04 00 01 51 80 03 00 00 28 06 01 00 00
  507. Jun 27 16:56:38.193939: | 80 01 00 07 80 0e 01 00 80 02 00 02 80 04 00 05
  508. Jun 27 16:56:38.193944: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  509. Jun 27 16:56:38.193949: | 03 00 00 28 07 01 00 00 80 01 00 07 80 0e 01 00
  510. Jun 27 16:56:38.193967: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
  511. Jun 27 16:56:38.193973: | 00 0c 00 04 00 01 51 80 03 00 00 28 08 01 00 00
  512. Jun 27 16:56:38.193979: | 80 01 00 07 80 0e 01 00 80 02 00 02 80 04 00 01
  513. Jun 27 16:56:38.193984: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  514. Jun 27 16:56:38.193990: | 03 00 00 28 09 01 00 00 80 01 00 07 80 0e 00 c0
  515. Jun 27 16:56:38.193995: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  516. Jun 27 16:56:38.194001: | 00 0c 00 04 00 01 51 80 03 00 00 28 0a 01 00 00
  517. Jun 27 16:56:38.194006: | 80 01 00 07 80 0e 00 c0 80 02 00 01 80 04 00 05
  518. Jun 27 16:56:38.194011: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  519. Jun 27 16:56:38.194016: | 03 00 00 28 0b 01 00 00 80 01 00 07 80 0e 00 c0
  520. Jun 27 16:56:38.194021: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
  521. Jun 27 16:56:38.194026: | 00 0c 00 04 00 01 51 80 03 00 00 28 0c 01 00 00
  522. Jun 27 16:56:38.194031: | 80 01 00 07 80 0e 00 c0 80 02 00 01 80 04 00 01
  523. Jun 27 16:56:38.194036: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  524. Jun 27 16:56:38.194042: | 03 00 00 28 0d 01 00 00 80 01 00 07 80 0e 00 c0
  525. Jun 27 16:56:38.194047: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
  526. Jun 27 16:56:38.194052: | 00 0c 00 04 00 01 51 80 03 00 00 28 0e 01 00 00
  527. Jun 27 16:56:38.194057: | 80 01 00 07 80 0e 00 c0 80 02 00 02 80 04 00 05
  528. Jun 27 16:56:38.194062: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  529. Jun 27 16:56:38.194068: | 03 00 00 28 0f 01 00 00 80 01 00 07 80 0e 00 c0
  530. Jun 27 16:56:38.194073: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
  531. Jun 27 16:56:38.194078: | 00 0c 00 04 00 01 51 80 03 00 00 28 10 01 00 00
  532. Jun 27 16:56:38.194084: | 80 01 00 07 80 0e 00 c0 80 02 00 02 80 04 00 01
  533. Jun 27 16:56:38.194089: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  534. Jun 27 16:56:38.194094: | 03 00 00 28 11 01 00 00 80 01 00 07 80 0e 00 80
  535. Jun 27 16:56:38.194099: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  536. Jun 27 16:56:38.194105: | 00 0c 00 04 00 01 51 80 03 00 00 28 12 01 00 00
  537. Jun 27 16:56:38.194110: | 80 01 00 07 80 0e 00 80 80 02 00 01 80 04 00 05
  538. Jun 27 16:56:38.194116: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  539. Jun 27 16:56:38.194121: | 03 00 00 28 13 01 00 00 80 01 00 07 80 0e 00 80
  540. Jun 27 16:56:38.194126: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
  541. Jun 27 16:56:38.194131: | 00 0c 00 04 00 01 51 80 03 00 00 28 14 01 00 00
  542. Jun 27 16:56:38.194136: | 80 01 00 07 80 0e 00 80 80 02 00 01 80 04 00 01
  543. Jun 27 16:56:38.194141: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  544. Jun 27 16:56:38.194147: | 03 00 00 28 15 01 00 00 80 01 00 07 80 0e 00 80
  545. Jun 27 16:56:38.194152: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
  546. Jun 27 16:56:38.194158: | 00 0c 00 04 00 01 51 80 03 00 00 28 16 01 00 00
  547. Jun 27 16:56:38.194163: | 80 01 00 07 80 0e 00 80 80 02 00 02 80 04 00 05
  548. Jun 27 16:56:38.194168: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  549. Jun 27 16:56:38.194174: | 03 00 00 28 17 01 00 00 80 01 00 07 80 0e 00 80
  550. Jun 27 16:56:38.194179: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
  551. Jun 27 16:56:38.194184: | 00 0c 00 04 00 01 51 80 03 00 00 28 18 01 00 00
  552. Jun 27 16:56:38.194190: | 80 01 00 07 80 0e 00 80 80 02 00 02 80 04 00 01
  553. Jun 27 16:56:38.194195: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  554. Jun 27 16:56:38.194201: | 03 00 00 28 19 01 00 00 80 01 00 03 80 0e 01 00
  555. Jun 27 16:56:38.194206: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  556. Jun 27 16:56:38.194211: | 00 0c 00 04 00 01 51 80 03 00 00 28 1a 01 00 00
  557. Jun 27 16:56:38.194216: | 80 01 00 03 80 0e 01 00 80 02 00 01 80 04 00 05
  558. Jun 27 16:56:38.194221: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  559. Jun 27 16:56:38.194226: | 03 00 00 28 1b 01 00 00 80 01 00 03 80 0e 01 00
  560. Jun 27 16:56:38.194231: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
  561. Jun 27 16:56:38.194237: | 00 0c 00 04 00 01 51 80 03 00 00 28 1c 01 00 00
  562. Jun 27 16:56:38.194249: | 80 01 00 03 80 0e 01 00 80 02 00 01 80 04 00 01
  563. Jun 27 16:56:38.194255: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  564. Jun 27 16:56:38.194261: | 03 00 00 28 1d 01 00 00 80 01 00 03 80 0e 01 00
  565. Jun 27 16:56:38.194266: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
  566. Jun 27 16:56:38.194272: | 00 0c 00 04 00 01 51 80 03 00 00 28 1e 01 00 00
  567. Jun 27 16:56:38.194277: | 80 01 00 03 80 0e 01 00 80 02 00 02 80 04 00 05
  568. Jun 27 16:56:38.194282: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  569. Jun 27 16:56:38.194288: | 03 00 00 28 1f 01 00 00 80 01 00 03 80 0e 01 00
  570. Jun 27 16:56:38.194293: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
  571. Jun 27 16:56:38.194299: | 00 0c 00 04 00 01 51 80 03 00 00 28 20 01 00 00
  572. Jun 27 16:56:38.194304: | 80 01 00 03 80 0e 01 00 80 02 00 02 80 04 00 01
  573. Jun 27 16:56:38.194309: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  574. Jun 27 16:56:38.194315: | 03 00 00 28 21 01 00 00 80 01 00 03 80 0e 00 c0
  575. Jun 27 16:56:38.194320: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  576. Jun 27 16:56:38.194325: | 00 0c 00 04 00 01 51 80 03 00 00 28 22 01 00 00
  577. Jun 27 16:56:38.194331: | 80 01 00 03 80 0e 00 c0 80 02 00 01 80 04 00 05
  578. Jun 27 16:56:38.194336: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  579. Jun 27 16:56:38.194341: | 03 00 00 28 23 01 00 00 80 01 00 03 80 0e 00 c0
  580. Jun 27 16:56:38.194347: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
  581. Jun 27 16:56:38.194352: | 00 0c 00 04 00 01 51 80 03 00 00 28 24 01 00 00
  582. Jun 27 16:56:38.194357: | 80 01 00 03 80 0e 00 c0 80 02 00 01 80 04 00 01
  583. Jun 27 16:56:38.194362: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  584. Jun 27 16:56:38.194367: | 03 00 00 28 25 01 00 00 80 01 00 03 80 0e 00 c0
  585. Jun 27 16:56:38.194372: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
  586. Jun 27 16:56:38.194377: | 00 0c 00 04 00 01 51 80 03 00 00 28 26 01 00 00
  587. Jun 27 16:56:38.194382: | 80 01 00 03 80 0e 00 c0 80 02 00 02 80 04 00 05
  588. Jun 27 16:56:38.194388: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  589. Jun 27 16:56:38.194393: | 03 00 00 28 27 01 00 00 80 01 00 03 80 0e 00 c0
  590. Jun 27 16:56:38.194398: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
  591. Jun 27 16:56:38.194403: | 00 0c 00 04 00 01 51 80 03 00 00 28 28 01 00 00
  592. Jun 27 16:56:38.194407: | 80 01 00 03 80 0e 00 c0 80 02 00 02 80 04 00 01
  593. Jun 27 16:56:38.194412: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  594. Jun 27 16:56:38.194418: | 03 00 00 28 29 01 00 00 80 01 00 03 80 0e 00 80
  595. Jun 27 16:56:38.194423: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  596. Jun 27 16:56:38.194429: | 00 0c 00 04 00 01 51 80 03 00 00 28 2a 01 00 00
  597. Jun 27 16:56:38.194435: | 80 01 00 03 80 0e 00 80 80 02 00 01 80 04 00 05
  598. Jun 27 16:56:38.194440: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  599. Jun 27 16:56:38.194446: | 03 00 00 28 2b 01 00 00 80 01 00 03 80 0e 00 80
  600. Jun 27 16:56:38.194451: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
  601. Jun 27 16:56:38.194456: | 00 0c 00 04 00 01 51 80 03 00 00 28 2c 01 00 00
  602. Jun 27 16:56:38.194461: | 80 01 00 03 80 0e 00 80 80 02 00 01 80 04 00 01
  603. Jun 27 16:56:38.194467: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  604. Jun 27 16:56:38.194472: | 03 00 00 28 2d 01 00 00 80 01 00 03 80 0e 00 80
  605. Jun 27 16:56:38.194478: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
  606. Jun 27 16:56:38.194483: | 00 0c 00 04 00 01 51 80 03 00 00 28 2e 01 00 00
  607. Jun 27 16:56:38.194488: | 80 01 00 03 80 0e 00 80 80 02 00 02 80 04 00 05
  608. Jun 27 16:56:38.194493: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  609. Jun 27 16:56:38.194499: | 03 00 00 28 2f 01 00 00 80 01 00 03 80 0e 00 80
  610. Jun 27 16:56:38.194505: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
  611. Jun 27 16:56:38.194510: | 00 0c 00 04 00 01 51 80 03 00 00 28 30 01 00 00
  612. Jun 27 16:56:38.194515: | 80 01 00 03 80 0e 00 80 80 02 00 02 80 04 00 01
  613. Jun 27 16:56:38.194521: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  614. Jun 27 16:56:38.194533: | 03 00 00 24 31 01 00 00 80 01 00 05 80 02 00 01
  615. Jun 27 16:56:38.194539: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
  616. Jun 27 16:56:38.194544: | 00 01 51 80 03 00 00 24 32 01 00 00 80 01 00 05
  617. Jun 27 16:56:38.194550: | 80 02 00 01 80 04 00 05 80 03 fd e9 80 0b 00 01
  618. Jun 27 16:56:38.194555: | 00 0c 00 04 00 01 51 80 03 00 00 24 33 01 00 00
  619. Jun 27 16:56:38.194560: | 80 01 00 05 80 02 00 01 80 04 00 02 80 03 fd e9
  620. Jun 27 16:56:38.194566: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
  621. Jun 27 16:56:38.194571: | 34 01 00 00 80 01 00 05 80 02 00 01 80 04 00 01
  622. Jun 27 16:56:38.194577: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  623. Jun 27 16:56:38.194582: | 03 00 00 24 35 01 00 00 80 01 00 05 80 02 00 02
  624. Jun 27 16:56:38.194588: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
  625. Jun 27 16:56:38.194593: | 00 01 51 80 03 00 00 24 36 01 00 00 80 01 00 05
  626. Jun 27 16:56:38.194599: | 80 02 00 02 80 04 00 05 80 03 fd e9 80 0b 00 01
  627. Jun 27 16:56:38.194604: | 00 0c 00 04 00 01 51 80 03 00 00 24 37 01 00 00
  628. Jun 27 16:56:38.194610: | 80 01 00 05 80 02 00 02 80 04 00 02 80 03 fd e9
  629. Jun 27 16:56:38.194615: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
  630. Jun 27 16:56:38.194620: | 38 01 00 00 80 01 00 05 80 02 00 02 80 04 00 01
  631. Jun 27 16:56:38.194625: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  632. Jun 27 16:56:38.194631: | 03 00 00 24 39 01 00 00 80 01 00 06 80 02 00 01
  633. Jun 27 16:56:38.194636: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
  634. Jun 27 16:56:38.194641: | 00 01 51 80 03 00 00 24 3a 01 00 00 80 01 00 06
  635. Jun 27 16:56:38.194647: | 80 02 00 01 80 04 00 05 80 03 fd e9 80 0b 00 01
  636. Jun 27 16:56:38.194652: | 00 0c 00 04 00 01 51 80 03 00 00 24 3b 01 00 00
  637. Jun 27 16:56:38.194658: | 80 01 00 06 80 02 00 01 80 04 00 02 80 03 fd e9
  638. Jun 27 16:56:38.194663: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
  639. Jun 27 16:56:38.194668: | 3c 01 00 00 80 01 00 06 80 02 00 01 80 04 00 01
  640. Jun 27 16:56:38.194673: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  641. Jun 27 16:56:38.194678: | 03 00 00 24 3d 01 00 00 80 01 00 06 80 02 00 02
  642. Jun 27 16:56:38.194683: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
  643. Jun 27 16:56:38.194689: | 00 01 51 80 03 00 00 24 3e 01 00 00 80 01 00 06
  644. Jun 27 16:56:38.194694: | 80 02 00 02 80 04 00 05 80 03 fd e9 80 0b 00 01
  645. Jun 27 16:56:38.194699: | 00 0c 00 04 00 01 51 80 03 00 00 24 3f 01 00 00
  646. Jun 27 16:56:38.194705: | 80 01 00 06 80 02 00 02 80 04 00 02 80 03 fd e9
  647. Jun 27 16:56:38.194710: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
  648. Jun 27 16:56:38.194715: | 40 01 00 00 80 01 00 06 80 02 00 02 80 04 00 01
  649. Jun 27 16:56:38.194721: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  650. Jun 27 16:56:38.194726: | 03 00 00 24 41 01 00 00 80 01 00 01 80 02 00 01
  651. Jun 27 16:56:38.194731: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
  652. Jun 27 16:56:38.194736: | 00 01 51 80 03 00 00 24 42 01 00 00 80 01 00 01
  653. Jun 27 16:56:38.194741: | 80 02 00 01 80 04 00 05 80 03 fd e9 80 0b 00 01
  654. Jun 27 16:56:38.194746: | 00 0c 00 04 00 01 51 80 03 00 00 24 43 01 00 00
  655. Jun 27 16:56:38.194751: | 80 01 00 01 80 02 00 01 80 04 00 02 80 03 fd e9
  656. Jun 27 16:56:38.194757: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
  657. Jun 27 16:56:38.194762: | 44 01 00 00 80 01 00 01 80 02 00 01 80 04 00 01
  658. Jun 27 16:56:38.194768: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  659. Jun 27 16:56:38.194773: | 03 00 00 24 45 01 00 00 80 01 00 01 80 02 00 02
  660. Jun 27 16:56:38.194779: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
  661. Jun 27 16:56:38.194784: | 00 01 51 80 03 00 00 24 46 01 00 00 80 01 00 01
  662. Jun 27 16:56:38.194789: | 80 02 00 02 80 04 00 05 80 03 fd e9 80 0b 00 01
  663. Jun 27 16:56:38.194794: | 00 0c 00 04 00 01 51 80 03 00 00 24 47 01 00 00
  664. Jun 27 16:56:38.194800: | 80 01 00 01 80 02 00 02 80 04 00 02 80 03 fd e9
  665. Jun 27 16:56:38.194805: | 80 0b 00 01 00 0c 00 04 00 01 51 80 00 00 00 24
  666. Jun 27 16:56:38.194817: | 48 01 00 00 80 01 00 01 80 02 00 02 80 04 00 01
  667. Jun 27 16:56:38.194823: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  668. Jun 27 16:56:38.194828: | 0d 00 00 0c 09 00 26 89 df d6 b7 12 0d 00 00 14
  669. Jun 27 16:56:38.194833: | 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
  670. Jun 27 16:56:38.194839: | 0d 00 00 14 16 f6 ca 16 e4 a4 06 6d 83 82 1a 0f
  671. Jun 27 16:56:38.194844: | 0a ea a8 62 0d 00 00 14 90 cb 80 91 3e bb 69 6e
  672. Jun 27 16:56:38.194850: | 08 63 81 b5 ec 42 7b 1f 0d 00 00 14 7d 94 19 a6
  673. Jun 27 16:56:38.194855: | 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14
  674. Jun 27 16:56:38.194860: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
  675. Jun 27 16:56:38.194865: | 0d 00 00 18 40 48 b7 d5 6e bc e8 85 25 e7 de 7f
  676. Jun 27 16:56:38.194871: | 00 d6 c2 d3 80 00 00 00 0d 00 00 14 af ca d7 13
  677. Jun 27 16:56:38.194876: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 0d 00 00 14
  678. Jun 27 16:56:38.194881: | 3b 90 31 dc e4 fc f8 8b 48 9a 92 39 63 dd 0c 49
  679. Jun 27 16:56:38.194886: | 0d 00 00 14 f1 4b 94 b7 bf f1 fe f0 27 73 b8 c4
  680. Jun 27 16:56:38.194891: | 9f ed ed 26 0d 00 00 18 16 6f 93 2d 55 eb 64 d8
  681. Jun 27 16:56:38.194896: | e4 df 4f d3 7e 23 13 f0 d0 fd 84 51 0d 00 00 14
  682. Jun 27 16:56:38.194901: | 84 04 ad f9 cd a0 57 60 b2 ca 29 2e 4b ff 53 7b
  683. Jun 27 16:56:38.194907: | 00 00 00 14 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2
  684. Jun 27 16:56:38.194912: | 74 cc 01 00
  685. Jun 27 16:56:38.194926: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  686. Jun 27 16:56:38.194936: | **parse ISAKMP Message:
  687. Jun 27 16:56:38.194951: | initiator cookie:
  688. Jun 27 16:56:38.194956: | 0e 20 a4 7f 26 01 0e 7b
  689. Jun 27 16:56:38.194960: | responder cookie:
  690. Jun 27 16:56:38.194964: | 00 00 00 00 00 00 00 00
  691. Jun 27 16:56:38.194968: | next payload type: ISAKMP_NEXT_SA (0x1)
  692. Jun 27 16:56:38.194973: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  693. Jun 27 16:56:38.194978: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
  694. Jun 27 16:56:38.194983: | flags: none (0x0)
  695. Jun 27 16:56:38.194988: | message ID: 00 00 00 00
  696. Jun 27 16:56:38.194992: | length: 3092 (0xc14)
  697. Jun 27 16:56:38.194997: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
  698. Jun 27 16:56:38.195016: | icookie table: hash icookie 0e 20 a4 7f 26 01 0e 7b to 886872774674875013 slot 0x555eabc9ac60
  699. Jun 27 16:56:38.195020: | v1 state object not found
  700. Jun 27 16:56:38.195025: | #null state always idle
  701. Jun 27 16:56:38.195030: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2opt: 0x2080
  702. Jun 27 16:56:38.195035: | ***parse ISAKMP Security Association Payload:
  703. Jun 27 16:56:38.195039: | next payload type: ISAKMP_NEXT_VID (0xd)
  704. Jun 27 16:56:38.195043: | length: 2804 (0xaf4)
  705. Jun 27 16:56:38.195047: | DOI: ISAKMP_DOI_IPSEC (0x1)
  706. Jun 27 16:56:38.195051: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  707. Jun 27 16:56:38.195056: | ***parse ISAKMP Vendor ID Payload:
  708. Jun 27 16:56:38.195060: | next payload type: ISAKMP_NEXT_VID (0xd)
  709. Jun 27 16:56:38.195063: | length: 12 (0xc)
  710. Jun 27 16:56:38.195067: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  711. Jun 27 16:56:38.195071: | ***parse ISAKMP Vendor ID Payload:
  712. Jun 27 16:56:38.195075: | next payload type: ISAKMP_NEXT_VID (0xd)
  713. Jun 27 16:56:38.195079: | length: 20 (0x14)
  714. Jun 27 16:56:38.195083: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  715. Jun 27 16:56:38.195087: | ***parse ISAKMP Vendor ID Payload:
  716. Jun 27 16:56:38.195090: | next payload type: ISAKMP_NEXT_VID (0xd)
  717. Jun 27 16:56:38.195094: | length: 20 (0x14)
  718. Jun 27 16:56:38.195098: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  719. Jun 27 16:56:38.195102: | ***parse ISAKMP Vendor ID Payload:
  720. Jun 27 16:56:38.195107: | next payload type: ISAKMP_NEXT_VID (0xd)
  721. Jun 27 16:56:38.195111: | length: 20 (0x14)
  722. Jun 27 16:56:38.195115: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  723. Jun 27 16:56:38.195119: | ***parse ISAKMP Vendor ID Payload:
  724. Jun 27 16:56:38.195122: | next payload type: ISAKMP_NEXT_VID (0xd)
  725. Jun 27 16:56:38.195131: | length: 20 (0x14)
  726. Jun 27 16:56:38.195135: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  727. Jun 27 16:56:38.195139: | ***parse ISAKMP Vendor ID Payload:
  728. Jun 27 16:56:38.195143: | next payload type: ISAKMP_NEXT_VID (0xd)
  729. Jun 27 16:56:38.195146: | length: 20 (0x14)
  730. Jun 27 16:56:38.195151: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  731. Jun 27 16:56:38.195155: | ***parse ISAKMP Vendor ID Payload:
  732. Jun 27 16:56:38.195159: | next payload type: ISAKMP_NEXT_VID (0xd)
  733. Jun 27 16:56:38.195162: | length: 24 (0x18)
  734. Jun 27 16:56:38.195166: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  735. Jun 27 16:56:38.195169: | ***parse ISAKMP Vendor ID Payload:
  736. Jun 27 16:56:38.195173: | next payload type: ISAKMP_NEXT_VID (0xd)
  737. Jun 27 16:56:38.195176: | length: 20 (0x14)
  738. Jun 27 16:56:38.195180: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  739. Jun 27 16:56:38.195184: | ***parse ISAKMP Vendor ID Payload:
  740. Jun 27 16:56:38.195188: | next payload type: ISAKMP_NEXT_VID (0xd)
  741. Jun 27 16:56:38.195192: | length: 20 (0x14)
  742. Jun 27 16:56:38.195196: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  743. Jun 27 16:56:38.195200: | ***parse ISAKMP Vendor ID Payload:
  744. Jun 27 16:56:38.195203: | next payload type: ISAKMP_NEXT_VID (0xd)
  745. Jun 27 16:56:38.195206: | length: 20 (0x14)
  746. Jun 27 16:56:38.195210: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  747. Jun 27 16:56:38.195214: | ***parse ISAKMP Vendor ID Payload:
  748. Jun 27 16:56:38.195219: | next payload type: ISAKMP_NEXT_VID (0xd)
  749. Jun 27 16:56:38.195222: | length: 24 (0x18)
  750. Jun 27 16:56:38.195227: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  751. Jun 27 16:56:38.195230: | ***parse ISAKMP Vendor ID Payload:
  752. Jun 27 16:56:38.195234: | next payload type: ISAKMP_NEXT_VID (0xd)
  753. Jun 27 16:56:38.195238: | length: 20 (0x14)
  754. Jun 27 16:56:38.195242: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
  755. Jun 27 16:56:38.195247: | ***parse ISAKMP Vendor ID Payload:
  756. Jun 27 16:56:38.195251: | next payload type: ISAKMP_NEXT_NONE (0x0)
  757. Jun 27 16:56:38.195254: | length: 20 (0x14)
  758. Jun 27 16:56:38.195271: | received Vendor ID payload [XAUTH]
  759. Jun 27 16:56:38.195278: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
  760. Jun 27 16:56:38.195283: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-01]
  761. Jun 27 16:56:38.195297: | quirks.qnat_traversal_vid set to=81
  762. Jun 27 16:56:38.195301: | received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
  763. Jun 27 16:56:38.195305: | quirks.qnat_traversal_vid set to=83
  764. Jun 27 16:56:38.195310: | received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
  765. Jun 27 16:56:38.195314: | quirks.qnat_traversal_vid set to=90
  766. Jun 27 16:56:38.195318: | received Vendor ID payload [RFC 3947]
  767. Jun 27 16:56:38.195324: | received Vendor ID payload [FRAGMENTATION 80000000]
  768. Jun 27 16:56:38.195330: | received Vendor ID payload [Dead Peer Detection]
  769. Jun 27 16:56:38.195335: | received Vendor ID payload [DPDv1_NG]
  770. Jun 27 16:56:38.195341: | ignoring Vendor ID payload [Shrew Soft client]
  771. Jun 27 16:56:38.195346: | ignoring Vendor ID payload [Netscreen-15]
  772. Jun 27 16:56:38.195351: | ignoring Vendor ID payload [Sidewinder]
  773. Jun 27 16:56:38.195356: | received Vendor ID payload [Cisco-Unity]
  774. Jun 27 16:56:38.195363: | find_host_connection me=192.168.1.137:500 him=192.168.1.138:500 policy=IKEV1_ALLOW
  775. Jun 27 16:56:38.195369: | find_host_pair: comparing ::1:500 to :::500
  776. Jun 27 16:56:38.195374: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  777. Jun 27 16:56:38.195379: | find_next_host_connection policy=IKEV1_ALLOW
  778. Jun 27 16:56:38.195384: | find_next_host_connection returns empty
  779. Jun 27 16:56:38.195389: | ****parse IPsec DOI SIT:
  780. Jun 27 16:56:38.195395: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
  781. Jun 27 16:56:38.195400: | ****parse ISAKMP Proposal Payload:
  782. Jun 27 16:56:38.195403: | next payload type: ISAKMP_NEXT_NONE (0x0)
  783. Jun 27 16:56:38.195407: | length: 2792 (0xae8)
  784. Jun 27 16:56:38.195411: | proposal number: 1 (0x1)
  785. Jun 27 16:56:38.195420: | protocol ID: PROTO_ISAKMP (0x1)
  786. Jun 27 16:56:38.195424: | SPI size: 0 (0x0)
  787. Jun 27 16:56:38.195428: | number of transforms: 72 (0x48)
  788. Jun 27 16:56:38.195433: | *****parse ISAKMP Transform Payload (ISAKMP):
  789. Jun 27 16:56:38.195437: | next payload type: ISAKMP_NEXT_T (0x3)
  790. Jun 27 16:56:38.195441: | length: 40 (0x28)
  791. Jun 27 16:56:38.195445: | ISAKMP transform number: 1 (0x1)
  792. Jun 27 16:56:38.195449: | ISAKMP transform ID: KEY_IKE (0x1)
  793. Jun 27 16:56:38.195454: | ******parse ISAKMP Oakley attribute:
  794. Jun 27 16:56:38.195458: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  795. Jun 27 16:56:38.195462: | length/value: 7 (0x7)
  796. Jun 27 16:56:38.195467: | ******parse ISAKMP Oakley attribute:
  797. Jun 27 16:56:38.195471: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  798. Jun 27 16:56:38.195475: | length/value: 256 (0x100)
  799. Jun 27 16:56:38.195480: | ******parse ISAKMP Oakley attribute:
  800. Jun 27 16:56:38.195484: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  801. Jun 27 16:56:38.195488: | length/value: 1 (0x1)
  802. Jun 27 16:56:38.195492: | ******parse ISAKMP Oakley attribute:
  803. Jun 27 16:56:38.195496: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  804. Jun 27 16:56:38.195500: | length/value: 14 (0xe)
  805. Jun 27 16:56:38.195505: | ******parse ISAKMP Oakley attribute:
  806. Jun 27 16:56:38.195509: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  807. Jun 27 16:56:38.195513: | length/value: 65001 (0xfde9)
  808. Jun 27 16:56:38.195517: | ******parse ISAKMP Oakley attribute:
  809. Jun 27 16:56:38.195521: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  810. Jun 27 16:56:38.195525: | length/value: 1 (0x1)
  811. Jun 27 16:56:38.195529: | ******parse ISAKMP Oakley attribute:
  812. Jun 27 16:56:38.195534: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  813. Jun 27 16:56:38.195538: | length/value: 4 (0x4)
  814. Jun 27 16:56:38.195542: | *****parse ISAKMP Transform Payload (ISAKMP):
  815. Jun 27 16:56:38.195546: | next payload type: ISAKMP_NEXT_T (0x3)
  816. Jun 27 16:56:38.195550: | length: 40 (0x28)
  817. Jun 27 16:56:38.195554: | ISAKMP transform number: 2 (0x2)
  818. Jun 27 16:56:38.195558: | ISAKMP transform ID: KEY_IKE (0x1)
  819. Jun 27 16:56:38.195562: | ******parse ISAKMP Oakley attribute:
  820. Jun 27 16:56:38.195567: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  821. Jun 27 16:56:38.195571: | length/value: 7 (0x7)
  822. Jun 27 16:56:38.195575: | ******parse ISAKMP Oakley attribute:
  823. Jun 27 16:56:38.195579: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  824. Jun 27 16:56:38.195583: | length/value: 256 (0x100)
  825. Jun 27 16:56:38.195587: | ******parse ISAKMP Oakley attribute:
  826. Jun 27 16:56:38.195591: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  827. Jun 27 16:56:38.195594: | length/value: 1 (0x1)
  828. Jun 27 16:56:38.195598: | ******parse ISAKMP Oakley attribute:
  829. Jun 27 16:56:38.195602: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  830. Jun 27 16:56:38.195606: | length/value: 5 (0x5)
  831. Jun 27 16:56:38.195610: | ******parse ISAKMP Oakley attribute:
  832. Jun 27 16:56:38.195614: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  833. Jun 27 16:56:38.195618: | length/value: 65001 (0xfde9)
  834. Jun 27 16:56:38.195623: | ******parse ISAKMP Oakley attribute:
  835. Jun 27 16:56:38.195626: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  836. Jun 27 16:56:38.195630: | length/value: 1 (0x1)
  837. Jun 27 16:56:38.195634: | ******parse ISAKMP Oakley attribute:
  838. Jun 27 16:56:38.195638: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  839. Jun 27 16:56:38.195643: | length/value: 4 (0x4)
  840. Jun 27 16:56:38.195647: | *****parse ISAKMP Transform Payload (ISAKMP):
  841. Jun 27 16:56:38.195652: | next payload type: ISAKMP_NEXT_T (0x3)
  842. Jun 27 16:56:38.195656: | length: 40 (0x28)
  843. Jun 27 16:56:38.195659: | ISAKMP transform number: 3 (0x3)
  844. Jun 27 16:56:38.195664: | ISAKMP transform ID: KEY_IKE (0x1)
  845. Jun 27 16:56:38.195668: | ******parse ISAKMP Oakley attribute:
  846. Jun 27 16:56:38.195672: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  847. Jun 27 16:56:38.195676: | length/value: 7 (0x7)
  848. Jun 27 16:56:38.195680: | ******parse ISAKMP Oakley attribute:
  849. Jun 27 16:56:38.195684: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  850. Jun 27 16:56:38.195694: | length/value: 256 (0x100)
  851. Jun 27 16:56:38.195698: | ******parse ISAKMP Oakley attribute:
  852. Jun 27 16:56:38.195702: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  853. Jun 27 16:56:38.195706: | length/value: 1 (0x1)
  854. Jun 27 16:56:38.195710: | ******parse ISAKMP Oakley attribute:
  855. Jun 27 16:56:38.195714: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  856. Jun 27 16:56:38.195718: | length/value: 2 (0x2)
  857. Jun 27 16:56:38.195722: | ******parse ISAKMP Oakley attribute:
  858. Jun 27 16:56:38.195726: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  859. Jun 27 16:56:38.195730: | length/value: 65001 (0xfde9)
  860. Jun 27 16:56:38.195734: | ******parse ISAKMP Oakley attribute:
  861. Jun 27 16:56:38.195738: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  862. Jun 27 16:56:38.195742: | length/value: 1 (0x1)
  863. Jun 27 16:56:38.195746: | ******parse ISAKMP Oakley attribute:
  864. Jun 27 16:56:38.195750: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  865. Jun 27 16:56:38.195754: | length/value: 4 (0x4)
  866. Jun 27 16:56:38.195758: | *****parse ISAKMP Transform Payload (ISAKMP):
  867. Jun 27 16:56:38.195762: | next payload type: ISAKMP_NEXT_T (0x3)
  868. Jun 27 16:56:38.195766: | length: 40 (0x28)
  869. Jun 27 16:56:38.195770: | ISAKMP transform number: 4 (0x4)
  870. Jun 27 16:56:38.195784: | ISAKMP transform ID: KEY_IKE (0x1)
  871. Jun 27 16:56:38.195788: | ******parse ISAKMP Oakley attribute:
  872. Jun 27 16:56:38.195792: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  873. Jun 27 16:56:38.195796: | length/value: 7 (0x7)
  874. Jun 27 16:56:38.195800: | ******parse ISAKMP Oakley attribute:
  875. Jun 27 16:56:38.195815: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  876. Jun 27 16:56:38.195819: | length/value: 256 (0x100)
  877. Jun 27 16:56:38.195832: | ******parse ISAKMP Oakley attribute:
  878. Jun 27 16:56:38.195837: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  879. Jun 27 16:56:38.195841: | length/value: 1 (0x1)
  880. Jun 27 16:56:38.195845: | ******parse ISAKMP Oakley attribute:
  881. Jun 27 16:56:38.195849: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  882. Jun 27 16:56:38.195853: | length/value: 1 (0x1)
  883. Jun 27 16:56:38.195857: | ******parse ISAKMP Oakley attribute:
  884. Jun 27 16:56:38.195861: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  885. Jun 27 16:56:38.195865: | length/value: 65001 (0xfde9)
  886. Jun 27 16:56:38.195869: | ******parse ISAKMP Oakley attribute:
  887. Jun 27 16:56:38.195883: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  888. Jun 27 16:56:38.195887: | length/value: 1 (0x1)
  889. Jun 27 16:56:38.195891: | ******parse ISAKMP Oakley attribute:
  890. Jun 27 16:56:38.195895: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  891. Jun 27 16:56:38.195909: | length/value: 4 (0x4)
  892. Jun 27 16:56:38.195913: | *****parse ISAKMP Transform Payload (ISAKMP):
  893. Jun 27 16:56:38.195918: | next payload type: ISAKMP_NEXT_T (0x3)
  894. Jun 27 16:56:38.195931: | length: 40 (0x28)
  895. Jun 27 16:56:38.195934: | ISAKMP transform number: 5 (0x5)
  896. Jun 27 16:56:38.195938: | ISAKMP transform ID: KEY_IKE (0x1)
  897. Jun 27 16:56:38.195942: | ******parse ISAKMP Oakley attribute:
  898. Jun 27 16:56:38.195946: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  899. Jun 27 16:56:38.195949: | length/value: 7 (0x7)
  900. Jun 27 16:56:38.195953: | ******parse ISAKMP Oakley attribute:
  901. Jun 27 16:56:38.195957: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  902. Jun 27 16:56:38.195961: | length/value: 256 (0x100)
  903. Jun 27 16:56:38.195965: | ******parse ISAKMP Oakley attribute:
  904. Jun 27 16:56:38.195969: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  905. Jun 27 16:56:38.195973: | length/value: 2 (0x2)
  906. Jun 27 16:56:38.195977: | ******parse ISAKMP Oakley attribute:
  907. Jun 27 16:56:38.195981: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  908. Jun 27 16:56:38.195985: | length/value: 14 (0xe)
  909. Jun 27 16:56:38.195989: | ******parse ISAKMP Oakley attribute:
  910. Jun 27 16:56:38.195994: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  911. Jun 27 16:56:38.195998: | length/value: 65001 (0xfde9)
  912. Jun 27 16:56:38.196002: | ******parse ISAKMP Oakley attribute:
  913. Jun 27 16:56:38.196006: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  914. Jun 27 16:56:38.196010: | length/value: 1 (0x1)
  915. Jun 27 16:56:38.196014: | ******parse ISAKMP Oakley attribute:
  916. Jun 27 16:56:38.196024: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  917. Jun 27 16:56:38.196028: | length/value: 4 (0x4)
  918. Jun 27 16:56:38.196032: | *****parse ISAKMP Transform Payload (ISAKMP):
  919. Jun 27 16:56:38.196037: | next payload type: ISAKMP_NEXT_T (0x3)
  920. Jun 27 16:56:38.196041: | length: 40 (0x28)
  921. Jun 27 16:56:38.196045: | ISAKMP transform number: 6 (0x6)
  922. Jun 27 16:56:38.196049: | ISAKMP transform ID: KEY_IKE (0x1)
  923. Jun 27 16:56:38.196053: | ******parse ISAKMP Oakley attribute:
  924. Jun 27 16:56:38.196057: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  925. Jun 27 16:56:38.196061: | length/value: 7 (0x7)
  926. Jun 27 16:56:38.196065: | ******parse ISAKMP Oakley attribute:
  927. Jun 27 16:56:38.196069: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  928. Jun 27 16:56:38.196073: | length/value: 256 (0x100)
  929. Jun 27 16:56:38.196077: | ******parse ISAKMP Oakley attribute:
  930. Jun 27 16:56:38.196081: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  931. Jun 27 16:56:38.196085: | length/value: 2 (0x2)
  932. Jun 27 16:56:38.196088: | ******parse ISAKMP Oakley attribute:
  933. Jun 27 16:56:38.196092: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  934. Jun 27 16:56:38.196095: | length/value: 5 (0x5)
  935. Jun 27 16:56:38.196099: | ******parse ISAKMP Oakley attribute:
  936. Jun 27 16:56:38.196103: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  937. Jun 27 16:56:38.196107: | length/value: 65001 (0xfde9)
  938. Jun 27 16:56:38.196111: | ******parse ISAKMP Oakley attribute:
  939. Jun 27 16:56:38.196115: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  940. Jun 27 16:56:38.196118: | length/value: 1 (0x1)
  941. Jun 27 16:56:38.196121: | ******parse ISAKMP Oakley attribute:
  942. Jun 27 16:56:38.196125: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  943. Jun 27 16:56:38.196128: | length/value: 4 (0x4)
  944. Jun 27 16:56:38.196132: | *****parse ISAKMP Transform Payload (ISAKMP):
  945. Jun 27 16:56:38.196136: | next payload type: ISAKMP_NEXT_T (0x3)
  946. Jun 27 16:56:38.196140: | length: 40 (0x28)
  947. Jun 27 16:56:38.196144: | ISAKMP transform number: 7 (0x7)
  948. Jun 27 16:56:38.196148: | ISAKMP transform ID: KEY_IKE (0x1)
  949. Jun 27 16:56:38.196152: | ******parse ISAKMP Oakley attribute:
  950. Jun 27 16:56:38.196156: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  951. Jun 27 16:56:38.196160: | length/value: 7 (0x7)
  952. Jun 27 16:56:38.196163: | ******parse ISAKMP Oakley attribute:
  953. Jun 27 16:56:38.196167: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  954. Jun 27 16:56:38.196171: | length/value: 256 (0x100)
  955. Jun 27 16:56:38.196175: | ******parse ISAKMP Oakley attribute:
  956. Jun 27 16:56:38.196179: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  957. Jun 27 16:56:38.196183: | length/value: 2 (0x2)
  958. Jun 27 16:56:38.196186: | ******parse ISAKMP Oakley attribute:
  959. Jun 27 16:56:38.196190: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  960. Jun 27 16:56:38.196194: | length/value: 2 (0x2)
  961. Jun 27 16:56:38.196198: | ******parse ISAKMP Oakley attribute:
  962. Jun 27 16:56:38.196203: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  963. Jun 27 16:56:38.196207: | length/value: 65001 (0xfde9)
  964. Jun 27 16:56:38.196211: | ******parse ISAKMP Oakley attribute:
  965. Jun 27 16:56:38.196215: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  966. Jun 27 16:56:38.196219: | length/value: 1 (0x1)
  967. Jun 27 16:56:38.196223: | ******parse ISAKMP Oakley attribute:
  968. Jun 27 16:56:38.196227: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  969. Jun 27 16:56:38.196231: | length/value: 4 (0x4)
  970. Jun 27 16:56:38.196236: | *****parse ISAKMP Transform Payload (ISAKMP):
  971. Jun 27 16:56:38.196240: | next payload type: ISAKMP_NEXT_T (0x3)
  972. Jun 27 16:56:38.196244: | length: 40 (0x28)
  973. Jun 27 16:56:38.196248: | ISAKMP transform number: 8 (0x8)
  974. Jun 27 16:56:38.196252: | ISAKMP transform ID: KEY_IKE (0x1)
  975. Jun 27 16:56:38.196256: | ******parse ISAKMP Oakley attribute:
  976. Jun 27 16:56:38.196260: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  977. Jun 27 16:56:38.196264: | length/value: 7 (0x7)
  978. Jun 27 16:56:38.196268: | ******parse ISAKMP Oakley attribute:
  979. Jun 27 16:56:38.196272: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  980. Jun 27 16:56:38.196276: | length/value: 256 (0x100)
  981. Jun 27 16:56:38.196280: | ******parse ISAKMP Oakley attribute:
  982. Jun 27 16:56:38.196290: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  983. Jun 27 16:56:38.196294: | length/value: 2 (0x2)
  984. Jun 27 16:56:38.196298: | ******parse ISAKMP Oakley attribute:
  985. Jun 27 16:56:38.196302: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  986. Jun 27 16:56:38.196306: | length/value: 1 (0x1)
  987. Jun 27 16:56:38.196310: | ******parse ISAKMP Oakley attribute:
  988. Jun 27 16:56:38.196314: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  989. Jun 27 16:56:38.196318: | length/value: 65001 (0xfde9)
  990. Jun 27 16:56:38.196322: | ******parse ISAKMP Oakley attribute:
  991. Jun 27 16:56:38.196325: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  992. Jun 27 16:56:38.196329: | length/value: 1 (0x1)
  993. Jun 27 16:56:38.196332: | ******parse ISAKMP Oakley attribute:
  994. Jun 27 16:56:38.196336: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  995. Jun 27 16:56:38.196340: | length/value: 4 (0x4)
  996. Jun 27 16:56:38.196345: | *****parse ISAKMP Transform Payload (ISAKMP):
  997. Jun 27 16:56:38.196349: | next payload type: ISAKMP_NEXT_T (0x3)
  998. Jun 27 16:56:38.196353: | length: 40 (0x28)
  999. Jun 27 16:56:38.196357: | ISAKMP transform number: 9 (0x9)
  1000. Jun 27 16:56:38.196361: | ISAKMP transform ID: KEY_IKE (0x1)
  1001. Jun 27 16:56:38.196365: | ******parse ISAKMP Oakley attribute:
  1002. Jun 27 16:56:38.196369: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1003. Jun 27 16:56:38.196373: | length/value: 7 (0x7)
  1004. Jun 27 16:56:38.196377: | ******parse ISAKMP Oakley attribute:
  1005. Jun 27 16:56:38.196381: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1006. Jun 27 16:56:38.196385: | length/value: 192 (0xc0)
  1007. Jun 27 16:56:38.196390: | ******parse ISAKMP Oakley attribute:
  1008. Jun 27 16:56:38.196394: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1009. Jun 27 16:56:38.196398: | length/value: 1 (0x1)
  1010. Jun 27 16:56:38.196402: | ******parse ISAKMP Oakley attribute:
  1011. Jun 27 16:56:38.196406: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1012. Jun 27 16:56:38.196410: | length/value: 14 (0xe)
  1013. Jun 27 16:56:38.196414: | ******parse ISAKMP Oakley attribute:
  1014. Jun 27 16:56:38.196419: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1015. Jun 27 16:56:38.196423: | length/value: 65001 (0xfde9)
  1016. Jun 27 16:56:38.196427: | ******parse ISAKMP Oakley attribute:
  1017. Jun 27 16:56:38.196431: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1018. Jun 27 16:56:38.196435: | length/value: 1 (0x1)
  1019. Jun 27 16:56:38.196439: | ******parse ISAKMP Oakley attribute:
  1020. Jun 27 16:56:38.196444: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1021. Jun 27 16:56:38.196448: | length/value: 4 (0x4)
  1022. Jun 27 16:56:38.196452: | *****parse ISAKMP Transform Payload (ISAKMP):
  1023. Jun 27 16:56:38.196456: | next payload type: ISAKMP_NEXT_T (0x3)
  1024. Jun 27 16:56:38.196460: | length: 40 (0x28)
  1025. Jun 27 16:56:38.196464: | ISAKMP transform number: 10 (0xa)
  1026. Jun 27 16:56:38.196468: | ISAKMP transform ID: KEY_IKE (0x1)
  1027. Jun 27 16:56:38.196472: | ******parse ISAKMP Oakley attribute:
  1028. Jun 27 16:56:38.196476: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1029. Jun 27 16:56:38.196480: | length/value: 7 (0x7)
  1030. Jun 27 16:56:38.196484: | ******parse ISAKMP Oakley attribute:
  1031. Jun 27 16:56:38.196488: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1032. Jun 27 16:56:38.196491: | length/value: 192 (0xc0)
  1033. Jun 27 16:56:38.196495: | ******parse ISAKMP Oakley attribute:
  1034. Jun 27 16:56:38.196499: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1035. Jun 27 16:56:38.196503: | length/value: 1 (0x1)
  1036. Jun 27 16:56:38.196506: | ******parse ISAKMP Oakley attribute:
  1037. Jun 27 16:56:38.196510: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1038. Jun 27 16:56:38.196514: | length/value: 5 (0x5)
  1039. Jun 27 16:56:38.196518: | ******parse ISAKMP Oakley attribute:
  1040. Jun 27 16:56:38.196531: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1041. Jun 27 16:56:38.196546: | length/value: 65001 (0xfde9)
  1042. Jun 27 16:56:38.196550: | ******parse ISAKMP Oakley attribute:
  1043. Jun 27 16:56:38.196554: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1044. Jun 27 16:56:38.196559: | length/value: 1 (0x1)
  1045. Jun 27 16:56:38.196563: | ******parse ISAKMP Oakley attribute:
  1046. Jun 27 16:56:38.196567: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1047. Jun 27 16:56:38.196577: | length/value: 4 (0x4)
  1048. Jun 27 16:56:38.196582: | *****parse ISAKMP Transform Payload (ISAKMP):
  1049. Jun 27 16:56:38.196586: | next payload type: ISAKMP_NEXT_T (0x3)
  1050. Jun 27 16:56:38.196590: | length: 40 (0x28)
  1051. Jun 27 16:56:38.196594: | ISAKMP transform number: 11 (0xb)
  1052. Jun 27 16:56:38.196599: | ISAKMP transform ID: KEY_IKE (0x1)
  1053. Jun 27 16:56:38.196603: | ******parse ISAKMP Oakley attribute:
  1054. Jun 27 16:56:38.196617: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1055. Jun 27 16:56:38.196621: | length/value: 7 (0x7)
  1056. Jun 27 16:56:38.196624: | ******parse ISAKMP Oakley attribute:
  1057. Jun 27 16:56:38.196628: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1058. Jun 27 16:56:38.196632: | length/value: 192 (0xc0)
  1059. Jun 27 16:56:38.196636: | ******parse ISAKMP Oakley attribute:
  1060. Jun 27 16:56:38.196640: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1061. Jun 27 16:56:38.196644: | length/value: 1 (0x1)
  1062. Jun 27 16:56:38.196647: | ******parse ISAKMP Oakley attribute:
  1063. Jun 27 16:56:38.196651: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1064. Jun 27 16:56:38.196655: | length/value: 2 (0x2)
  1065. Jun 27 16:56:38.196658: | ******parse ISAKMP Oakley attribute:
  1066. Jun 27 16:56:38.196663: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1067. Jun 27 16:56:38.196666: | length/value: 65001 (0xfde9)
  1068. Jun 27 16:56:38.196671: | ******parse ISAKMP Oakley attribute:
  1069. Jun 27 16:56:38.196674: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1070. Jun 27 16:56:38.196678: | length/value: 1 (0x1)
  1071. Jun 27 16:56:38.196682: | ******parse ISAKMP Oakley attribute:
  1072. Jun 27 16:56:38.196686: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1073. Jun 27 16:56:38.196690: | length/value: 4 (0x4)
  1074. Jun 27 16:56:38.196695: | *****parse ISAKMP Transform Payload (ISAKMP):
  1075. Jun 27 16:56:38.196699: | next payload type: ISAKMP_NEXT_T (0x3)
  1076. Jun 27 16:56:38.196703: | length: 40 (0x28)
  1077. Jun 27 16:56:38.196707: | ISAKMP transform number: 12 (0xc)
  1078. Jun 27 16:56:38.196711: | ISAKMP transform ID: KEY_IKE (0x1)
  1079. Jun 27 16:56:38.196715: | ******parse ISAKMP Oakley attribute:
  1080. Jun 27 16:56:38.196719: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1081. Jun 27 16:56:38.196722: | length/value: 7 (0x7)
  1082. Jun 27 16:56:38.196726: | ******parse ISAKMP Oakley attribute:
  1083. Jun 27 16:56:38.196730: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1084. Jun 27 16:56:38.196734: | length/value: 192 (0xc0)
  1085. Jun 27 16:56:38.196738: | ******parse ISAKMP Oakley attribute:
  1086. Jun 27 16:56:38.196742: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1087. Jun 27 16:56:38.196746: | length/value: 1 (0x1)
  1088. Jun 27 16:56:38.196750: | ******parse ISAKMP Oakley attribute:
  1089. Jun 27 16:56:38.196754: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1090. Jun 27 16:56:38.196758: | length/value: 1 (0x1)
  1091. Jun 27 16:56:38.196762: | ******parse ISAKMP Oakley attribute:
  1092. Jun 27 16:56:38.196766: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1093. Jun 27 16:56:38.196770: | length/value: 65001 (0xfde9)
  1094. Jun 27 16:56:38.196774: | ******parse ISAKMP Oakley attribute:
  1095. Jun 27 16:56:38.196778: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1096. Jun 27 16:56:38.196782: | length/value: 1 (0x1)
  1097. Jun 27 16:56:38.196786: | ******parse ISAKMP Oakley attribute:
  1098. Jun 27 16:56:38.196790: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1099. Jun 27 16:56:38.196794: | length/value: 4 (0x4)
  1100. Jun 27 16:56:38.196798: | *****parse ISAKMP Transform Payload (ISAKMP):
  1101. Jun 27 16:56:38.196802: | next payload type: ISAKMP_NEXT_T (0x3)
  1102. Jun 27 16:56:38.196806: | length: 40 (0x28)
  1103. Jun 27 16:56:38.196810: | ISAKMP transform number: 13 (0xd)
  1104. Jun 27 16:56:38.196813: | ISAKMP transform ID: KEY_IKE (0x1)
  1105. Jun 27 16:56:38.196817: | ******parse ISAKMP Oakley attribute:
  1106. Jun 27 16:56:38.196822: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1107. Jun 27 16:56:38.196825: | length/value: 7 (0x7)
  1108. Jun 27 16:56:38.196829: | ******parse ISAKMP Oakley attribute:
  1109. Jun 27 16:56:38.196833: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1110. Jun 27 16:56:38.196837: | length/value: 192 (0xc0)
  1111. Jun 27 16:56:38.196841: | ******parse ISAKMP Oakley attribute:
  1112. Jun 27 16:56:38.196845: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1113. Jun 27 16:56:38.196854: | length/value: 2 (0x2)
  1114. Jun 27 16:56:38.196859: | ******parse ISAKMP Oakley attribute:
  1115. Jun 27 16:56:38.196863: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1116. Jun 27 16:56:38.196867: | length/value: 14 (0xe)
  1117. Jun 27 16:56:38.196871: | ******parse ISAKMP Oakley attribute:
  1118. Jun 27 16:56:38.196875: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1119. Jun 27 16:56:38.196879: | length/value: 65001 (0xfde9)
  1120. Jun 27 16:56:38.196883: | ******parse ISAKMP Oakley attribute:
  1121. Jun 27 16:56:38.196887: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1122. Jun 27 16:56:38.196891: | length/value: 1 (0x1)
  1123. Jun 27 16:56:38.196895: | ******parse ISAKMP Oakley attribute:
  1124. Jun 27 16:56:38.196899: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1125. Jun 27 16:56:38.196902: | length/value: 4 (0x4)
  1126. Jun 27 16:56:38.196907: | *****parse ISAKMP Transform Payload (ISAKMP):
  1127. Jun 27 16:56:38.196911: | next payload type: ISAKMP_NEXT_T (0x3)
  1128. Jun 27 16:56:38.196914: | length: 40 (0x28)
  1129. Jun 27 16:56:38.196918: | ISAKMP transform number: 14 (0xe)
  1130. Jun 27 16:56:38.196922: | ISAKMP transform ID: KEY_IKE (0x1)
  1131. Jun 27 16:56:38.196926: | ******parse ISAKMP Oakley attribute:
  1132. Jun 27 16:56:38.196930: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1133. Jun 27 16:56:38.196934: | length/value: 7 (0x7)
  1134. Jun 27 16:56:38.196938: | ******parse ISAKMP Oakley attribute:
  1135. Jun 27 16:56:38.196942: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1136. Jun 27 16:56:38.196946: | length/value: 192 (0xc0)
  1137. Jun 27 16:56:38.196950: | ******parse ISAKMP Oakley attribute:
  1138. Jun 27 16:56:38.196955: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1139. Jun 27 16:56:38.196959: | length/value: 2 (0x2)
  1140. Jun 27 16:56:38.196962: | ******parse ISAKMP Oakley attribute:
  1141. Jun 27 16:56:38.196966: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1142. Jun 27 16:56:38.196970: | length/value: 5 (0x5)
  1143. Jun 27 16:56:38.196974: | ******parse ISAKMP Oakley attribute:
  1144. Jun 27 16:56:38.196978: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1145. Jun 27 16:56:38.196982: | length/value: 65001 (0xfde9)
  1146. Jun 27 16:56:38.196986: | ******parse ISAKMP Oakley attribute:
  1147. Jun 27 16:56:38.196990: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1148. Jun 27 16:56:38.196994: | length/value: 1 (0x1)
  1149. Jun 27 16:56:38.196998: | ******parse ISAKMP Oakley attribute:
  1150. Jun 27 16:56:38.197002: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1151. Jun 27 16:56:38.197006: | length/value: 4 (0x4)
  1152. Jun 27 16:56:38.197010: | *****parse ISAKMP Transform Payload (ISAKMP):
  1153. Jun 27 16:56:38.197014: | next payload type: ISAKMP_NEXT_T (0x3)
  1154. Jun 27 16:56:38.197018: | length: 40 (0x28)
  1155. Jun 27 16:56:38.197022: | ISAKMP transform number: 15 (0xf)
  1156. Jun 27 16:56:38.197026: | ISAKMP transform ID: KEY_IKE (0x1)
  1157. Jun 27 16:56:38.197030: | ******parse ISAKMP Oakley attribute:
  1158. Jun 27 16:56:38.197034: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1159. Jun 27 16:56:38.197038: | length/value: 7 (0x7)
  1160. Jun 27 16:56:38.197042: | ******parse ISAKMP Oakley attribute:
  1161. Jun 27 16:56:38.197046: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1162. Jun 27 16:56:38.197050: | length/value: 192 (0xc0)
  1163. Jun 27 16:56:38.197055: | ******parse ISAKMP Oakley attribute:
  1164. Jun 27 16:56:38.197059: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1165. Jun 27 16:56:38.197063: | length/value: 2 (0x2)
  1166. Jun 27 16:56:38.197067: | ******parse ISAKMP Oakley attribute:
  1167. Jun 27 16:56:38.197071: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1168. Jun 27 16:56:38.197075: | length/value: 2 (0x2)
  1169. Jun 27 16:56:38.197079: | ******parse ISAKMP Oakley attribute:
  1170. Jun 27 16:56:38.197083: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1171. Jun 27 16:56:38.197087: | length/value: 65001 (0xfde9)
  1172. Jun 27 16:56:38.197091: | ******parse ISAKMP Oakley attribute:
  1173. Jun 27 16:56:38.197096: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1174. Jun 27 16:56:38.197099: | length/value: 1 (0x1)
  1175. Jun 27 16:56:38.197103: | ******parse ISAKMP Oakley attribute:
  1176. Jun 27 16:56:38.197107: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1177. Jun 27 16:56:38.197111: | length/value: 4 (0x4)
  1178. Jun 27 16:56:38.197120: | *****parse ISAKMP Transform Payload (ISAKMP):
  1179. Jun 27 16:56:38.197125: | next payload type: ISAKMP_NEXT_T (0x3)
  1180. Jun 27 16:56:38.197129: | length: 40 (0x28)
  1181. Jun 27 16:56:38.197133: | ISAKMP transform number: 16 (0x10)
  1182. Jun 27 16:56:38.197137: | ISAKMP transform ID: KEY_IKE (0x1)
  1183. Jun 27 16:56:38.197141: | ******parse ISAKMP Oakley attribute:
  1184. Jun 27 16:56:38.197145: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1185. Jun 27 16:56:38.197149: | length/value: 7 (0x7)
  1186. Jun 27 16:56:38.197153: | ******parse ISAKMP Oakley attribute:
  1187. Jun 27 16:56:38.197157: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1188. Jun 27 16:56:38.197161: | length/value: 192 (0xc0)
  1189. Jun 27 16:56:38.197165: | ******parse ISAKMP Oakley attribute:
  1190. Jun 27 16:56:38.197169: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1191. Jun 27 16:56:38.197173: | length/value: 2 (0x2)
  1192. Jun 27 16:56:38.197177: | ******parse ISAKMP Oakley attribute:
  1193. Jun 27 16:56:38.197191: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1194. Jun 27 16:56:38.197194: | length/value: 1 (0x1)
  1195. Jun 27 16:56:38.197198: | ******parse ISAKMP Oakley attribute:
  1196. Jun 27 16:56:38.197213: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1197. Jun 27 16:56:38.197229: | length/value: 65001 (0xfde9)
  1198. Jun 27 16:56:38.197233: | ******parse ISAKMP Oakley attribute:
  1199. Jun 27 16:56:38.197247: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1200. Jun 27 16:56:38.197251: | length/value: 1 (0x1)
  1201. Jun 27 16:56:38.197255: | ******parse ISAKMP Oakley attribute:
  1202. Jun 27 16:56:38.197268: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1203. Jun 27 16:56:38.197272: | length/value: 4 (0x4)
  1204. Jun 27 16:56:38.197276: | *****parse ISAKMP Transform Payload (ISAKMP):
  1205. Jun 27 16:56:38.197280: | next payload type: ISAKMP_NEXT_T (0x3)
  1206. Jun 27 16:56:38.197284: | length: 40 (0x28)
  1207. Jun 27 16:56:38.197288: | ISAKMP transform number: 17 (0x11)
  1208. Jun 27 16:56:38.197292: | ISAKMP transform ID: KEY_IKE (0x1)
  1209. Jun 27 16:56:38.197296: | ******parse ISAKMP Oakley attribute:
  1210. Jun 27 16:56:38.197300: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1211. Jun 27 16:56:38.197304: | length/value: 7 (0x7)
  1212. Jun 27 16:56:38.197308: | ******parse ISAKMP Oakley attribute:
  1213. Jun 27 16:56:38.197312: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1214. Jun 27 16:56:38.197316: | length/value: 128 (0x80)
  1215. Jun 27 16:56:38.197320: | ******parse ISAKMP Oakley attribute:
  1216. Jun 27 16:56:38.197324: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1217. Jun 27 16:56:38.197328: | length/value: 1 (0x1)
  1218. Jun 27 16:56:38.197331: | ******parse ISAKMP Oakley attribute:
  1219. Jun 27 16:56:38.197335: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1220. Jun 27 16:56:38.197339: | length/value: 14 (0xe)
  1221. Jun 27 16:56:38.197343: | ******parse ISAKMP Oakley attribute:
  1222. Jun 27 16:56:38.197347: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1223. Jun 27 16:56:38.197351: | length/value: 65001 (0xfde9)
  1224. Jun 27 16:56:38.197356: | ******parse ISAKMP Oakley attribute:
  1225. Jun 27 16:56:38.197360: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1226. Jun 27 16:56:38.197363: | length/value: 1 (0x1)
  1227. Jun 27 16:56:38.197367: | ******parse ISAKMP Oakley attribute:
  1228. Jun 27 16:56:38.197371: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1229. Jun 27 16:56:38.197375: | length/value: 4 (0x4)
  1230. Jun 27 16:56:38.197379: | *****parse ISAKMP Transform Payload (ISAKMP):
  1231. Jun 27 16:56:38.197383: | next payload type: ISAKMP_NEXT_T (0x3)
  1232. Jun 27 16:56:38.197387: | length: 40 (0x28)
  1233. Jun 27 16:56:38.197391: | ISAKMP transform number: 18 (0x12)
  1234. Jun 27 16:56:38.197394: | ISAKMP transform ID: KEY_IKE (0x1)
  1235. Jun 27 16:56:38.197399: | ******parse ISAKMP Oakley attribute:
  1236. Jun 27 16:56:38.197403: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1237. Jun 27 16:56:38.197406: | length/value: 7 (0x7)
  1238. Jun 27 16:56:38.197410: | ******parse ISAKMP Oakley attribute:
  1239. Jun 27 16:56:38.197414: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1240. Jun 27 16:56:38.197418: | length/value: 128 (0x80)
  1241. Jun 27 16:56:38.197422: | ******parse ISAKMP Oakley attribute:
  1242. Jun 27 16:56:38.197426: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1243. Jun 27 16:56:38.197437: | length/value: 1 (0x1)
  1244. Jun 27 16:56:38.197441: | ******parse ISAKMP Oakley attribute:
  1245. Jun 27 16:56:38.197446: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1246. Jun 27 16:56:38.197450: | length/value: 5 (0x5)
  1247. Jun 27 16:56:38.197453: | ******parse ISAKMP Oakley attribute:
  1248. Jun 27 16:56:38.197458: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1249. Jun 27 16:56:38.197462: | length/value: 65001 (0xfde9)
  1250. Jun 27 16:56:38.197466: | ******parse ISAKMP Oakley attribute:
  1251. Jun 27 16:56:38.197470: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1252. Jun 27 16:56:38.197474: | length/value: 1 (0x1)
  1253. Jun 27 16:56:38.197478: | ******parse ISAKMP Oakley attribute:
  1254. Jun 27 16:56:38.197482: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1255. Jun 27 16:56:38.197486: | length/value: 4 (0x4)
  1256. Jun 27 16:56:38.197490: | *****parse ISAKMP Transform Payload (ISAKMP):
  1257. Jun 27 16:56:38.197494: | next payload type: ISAKMP_NEXT_T (0x3)
  1258. Jun 27 16:56:38.197498: | length: 40 (0x28)
  1259. Jun 27 16:56:38.197502: | ISAKMP transform number: 19 (0x13)
  1260. Jun 27 16:56:38.197506: | ISAKMP transform ID: KEY_IKE (0x1)
  1261. Jun 27 16:56:38.197511: | ******parse ISAKMP Oakley attribute:
  1262. Jun 27 16:56:38.197515: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1263. Jun 27 16:56:38.197519: | length/value: 7 (0x7)
  1264. Jun 27 16:56:38.197523: | ******parse ISAKMP Oakley attribute:
  1265. Jun 27 16:56:38.197527: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1266. Jun 27 16:56:38.197531: | length/value: 128 (0x80)
  1267. Jun 27 16:56:38.197534: | ******parse ISAKMP Oakley attribute:
  1268. Jun 27 16:56:38.197538: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1269. Jun 27 16:56:38.197542: | length/value: 1 (0x1)
  1270. Jun 27 16:56:38.197547: | ******parse ISAKMP Oakley attribute:
  1271. Jun 27 16:56:38.197551: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1272. Jun 27 16:56:38.197554: | length/value: 2 (0x2)
  1273. Jun 27 16:56:38.197558: | ******parse ISAKMP Oakley attribute:
  1274. Jun 27 16:56:38.197562: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1275. Jun 27 16:56:38.197566: | length/value: 65001 (0xfde9)
  1276. Jun 27 16:56:38.197570: | ******parse ISAKMP Oakley attribute:
  1277. Jun 27 16:56:38.197574: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1278. Jun 27 16:56:38.197578: | length/value: 1 (0x1)
  1279. Jun 27 16:56:38.197582: | ******parse ISAKMP Oakley attribute:
  1280. Jun 27 16:56:38.197585: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1281. Jun 27 16:56:38.197589: | length/value: 4 (0x4)
  1282. Jun 27 16:56:38.197593: | *****parse ISAKMP Transform Payload (ISAKMP):
  1283. Jun 27 16:56:38.197597: | next payload type: ISAKMP_NEXT_T (0x3)
  1284. Jun 27 16:56:38.197601: | length: 40 (0x28)
  1285. Jun 27 16:56:38.197604: | ISAKMP transform number: 20 (0x14)
  1286. Jun 27 16:56:38.197608: | ISAKMP transform ID: KEY_IKE (0x1)
  1287. Jun 27 16:56:38.197612: | ******parse ISAKMP Oakley attribute:
  1288. Jun 27 16:56:38.197616: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1289. Jun 27 16:56:38.197620: | length/value: 7 (0x7)
  1290. Jun 27 16:56:38.197623: | ******parse ISAKMP Oakley attribute:
  1291. Jun 27 16:56:38.197626: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1292. Jun 27 16:56:38.197628: | length/value: 128 (0x80)
  1293. Jun 27 16:56:38.197631: | ******parse ISAKMP Oakley attribute:
  1294. Jun 27 16:56:38.197634: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1295. Jun 27 16:56:38.197636: | length/value: 1 (0x1)
  1296. Jun 27 16:56:38.197639: | ******parse ISAKMP Oakley attribute:
  1297. Jun 27 16:56:38.197641: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1298. Jun 27 16:56:38.197644: | length/value: 1 (0x1)
  1299. Jun 27 16:56:38.197646: | ******parse ISAKMP Oakley attribute:
  1300. Jun 27 16:56:38.197649: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1301. Jun 27 16:56:38.197651: | length/value: 65001 (0xfde9)
  1302. Jun 27 16:56:38.197654: | ******parse ISAKMP Oakley attribute:
  1303. Jun 27 16:56:38.197656: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1304. Jun 27 16:56:38.197659: | length/value: 1 (0x1)
  1305. Jun 27 16:56:38.197661: | ******parse ISAKMP Oakley attribute:
  1306. Jun 27 16:56:38.197664: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1307. Jun 27 16:56:38.197667: | length/value: 4 (0x4)
  1308. Jun 27 16:56:38.197669: | *****parse ISAKMP Transform Payload (ISAKMP):
  1309. Jun 27 16:56:38.197676: | next payload type: ISAKMP_NEXT_T (0x3)
  1310. Jun 27 16:56:38.197678: | length: 40 (0x28)
  1311. Jun 27 16:56:38.197681: | ISAKMP transform number: 21 (0x15)
  1312. Jun 27 16:56:38.197683: | ISAKMP transform ID: KEY_IKE (0x1)
  1313. Jun 27 16:56:38.197686: | ******parse ISAKMP Oakley attribute:
  1314. Jun 27 16:56:38.197689: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1315. Jun 27 16:56:38.197691: | length/value: 7 (0x7)
  1316. Jun 27 16:56:38.197694: | ******parse ISAKMP Oakley attribute:
  1317. Jun 27 16:56:38.197696: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1318. Jun 27 16:56:38.197699: | length/value: 128 (0x80)
  1319. Jun 27 16:56:38.197701: | ******parse ISAKMP Oakley attribute:
  1320. Jun 27 16:56:38.197704: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1321. Jun 27 16:56:38.197706: | length/value: 2 (0x2)
  1322. Jun 27 16:56:38.197709: | ******parse ISAKMP Oakley attribute:
  1323. Jun 27 16:56:38.197711: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1324. Jun 27 16:56:38.197714: | length/value: 14 (0xe)
  1325. Jun 27 16:56:38.197716: | ******parse ISAKMP Oakley attribute:
  1326. Jun 27 16:56:38.197719: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1327. Jun 27 16:56:38.197721: | length/value: 65001 (0xfde9)
  1328. Jun 27 16:56:38.197724: | ******parse ISAKMP Oakley attribute:
  1329. Jun 27 16:56:38.197727: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1330. Jun 27 16:56:38.197729: | length/value: 1 (0x1)
  1331. Jun 27 16:56:38.197732: | ******parse ISAKMP Oakley attribute:
  1332. Jun 27 16:56:38.197734: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1333. Jun 27 16:56:38.197737: | length/value: 4 (0x4)
  1334. Jun 27 16:56:38.197739: | *****parse ISAKMP Transform Payload (ISAKMP):
  1335. Jun 27 16:56:38.197742: | next payload type: ISAKMP_NEXT_T (0x3)
  1336. Jun 27 16:56:38.197744: | length: 40 (0x28)
  1337. Jun 27 16:56:38.197747: | ISAKMP transform number: 22 (0x16)
  1338. Jun 27 16:56:38.197749: | ISAKMP transform ID: KEY_IKE (0x1)
  1339. Jun 27 16:56:38.197752: | ******parse ISAKMP Oakley attribute:
  1340. Jun 27 16:56:38.197755: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1341. Jun 27 16:56:38.197757: | length/value: 7 (0x7)
  1342. Jun 27 16:56:38.197760: | ******parse ISAKMP Oakley attribute:
  1343. Jun 27 16:56:38.197762: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1344. Jun 27 16:56:38.197765: | length/value: 128 (0x80)
  1345. Jun 27 16:56:38.197767: | ******parse ISAKMP Oakley attribute:
  1346. Jun 27 16:56:38.197770: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1347. Jun 27 16:56:38.197772: | length/value: 2 (0x2)
  1348. Jun 27 16:56:38.197775: | ******parse ISAKMP Oakley attribute:
  1349. Jun 27 16:56:38.197777: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1350. Jun 27 16:56:38.197780: | length/value: 5 (0x5)
  1351. Jun 27 16:56:38.197782: | ******parse ISAKMP Oakley attribute:
  1352. Jun 27 16:56:38.197785: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1353. Jun 27 16:56:38.197788: | length/value: 65001 (0xfde9)
  1354. Jun 27 16:56:38.197790: | ******parse ISAKMP Oakley attribute:
  1355. Jun 27 16:56:38.197793: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1356. Jun 27 16:56:38.197795: | length/value: 1 (0x1)
  1357. Jun 27 16:56:38.197798: | ******parse ISAKMP Oakley attribute:
  1358. Jun 27 16:56:38.197800: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1359. Jun 27 16:56:38.197803: | length/value: 4 (0x4)
  1360. Jun 27 16:56:38.197805: | *****parse ISAKMP Transform Payload (ISAKMP):
  1361. Jun 27 16:56:38.197808: | next payload type: ISAKMP_NEXT_T (0x3)
  1362. Jun 27 16:56:38.197810: | length: 40 (0x28)
  1363. Jun 27 16:56:38.197813: | ISAKMP transform number: 23 (0x17)
  1364. Jun 27 16:56:38.197815: | ISAKMP transform ID: KEY_IKE (0x1)
  1365. Jun 27 16:56:38.197818: | ******parse ISAKMP Oakley attribute:
  1366. Jun 27 16:56:38.197821: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1367. Jun 27 16:56:38.197823: | length/value: 7 (0x7)
  1368. Jun 27 16:56:38.197826: | ******parse ISAKMP Oakley attribute:
  1369. Jun 27 16:56:38.197828: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1370. Jun 27 16:56:38.197831: | length/value: 128 (0x80)
  1371. Jun 27 16:56:38.197833: | ******parse ISAKMP Oakley attribute:
  1372. Jun 27 16:56:38.197836: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1373. Jun 27 16:56:38.197838: | length/value: 2 (0x2)
  1374. Jun 27 16:56:38.197844: | ******parse ISAKMP Oakley attribute:
  1375. Jun 27 16:56:38.197847: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1376. Jun 27 16:56:38.197849: | length/value: 2 (0x2)
  1377. Jun 27 16:56:38.197852: | ******parse ISAKMP Oakley attribute:
  1378. Jun 27 16:56:38.197854: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1379. Jun 27 16:56:38.197857: | length/value: 65001 (0xfde9)
  1380. Jun 27 16:56:38.197860: | ******parse ISAKMP Oakley attribute:
  1381. Jun 27 16:56:38.197862: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1382. Jun 27 16:56:38.197864: | length/value: 1 (0x1)
  1383. Jun 27 16:56:38.197867: | ******parse ISAKMP Oakley attribute:
  1384. Jun 27 16:56:38.197870: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1385. Jun 27 16:56:38.197872: | length/value: 4 (0x4)
  1386. Jun 27 16:56:38.197875: | *****parse ISAKMP Transform Payload (ISAKMP):
  1387. Jun 27 16:56:38.197877: | next payload type: ISAKMP_NEXT_T (0x3)
  1388. Jun 27 16:56:38.197880: | length: 40 (0x28)
  1389. Jun 27 16:56:38.197882: | ISAKMP transform number: 24 (0x18)
  1390. Jun 27 16:56:38.197885: | ISAKMP transform ID: KEY_IKE (0x1)
  1391. Jun 27 16:56:38.197887: | ******parse ISAKMP Oakley attribute:
  1392. Jun 27 16:56:38.197890: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1393. Jun 27 16:56:38.197892: | length/value: 7 (0x7)
  1394. Jun 27 16:56:38.197895: | ******parse ISAKMP Oakley attribute:
  1395. Jun 27 16:56:38.197898: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1396. Jun 27 16:56:38.197900: | length/value: 128 (0x80)
  1397. Jun 27 16:56:38.197903: | ******parse ISAKMP Oakley attribute:
  1398. Jun 27 16:56:38.197905: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1399. Jun 27 16:56:38.197908: | length/value: 2 (0x2)
  1400. Jun 27 16:56:38.197910: | ******parse ISAKMP Oakley attribute:
  1401. Jun 27 16:56:38.197913: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1402. Jun 27 16:56:38.197915: | length/value: 1 (0x1)
  1403. Jun 27 16:56:38.197918: | ******parse ISAKMP Oakley attribute:
  1404. Jun 27 16:56:38.197920: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1405. Jun 27 16:56:38.197923: | length/value: 65001 (0xfde9)
  1406. Jun 27 16:56:38.197925: | ******parse ISAKMP Oakley attribute:
  1407. Jun 27 16:56:38.197928: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1408. Jun 27 16:56:38.197930: | length/value: 1 (0x1)
  1409. Jun 27 16:56:38.197933: | ******parse ISAKMP Oakley attribute:
  1410. Jun 27 16:56:38.197935: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1411. Jun 27 16:56:38.197938: | length/value: 4 (0x4)
  1412. Jun 27 16:56:38.197941: | *****parse ISAKMP Transform Payload (ISAKMP):
  1413. Jun 27 16:56:38.197943: | next payload type: ISAKMP_NEXT_T (0x3)
  1414. Jun 27 16:56:38.197946: | length: 40 (0x28)
  1415. Jun 27 16:56:38.197948: | ISAKMP transform number: 25 (0x19)
  1416. Jun 27 16:56:38.197951: | ISAKMP transform ID: KEY_IKE (0x1)
  1417. Jun 27 16:56:38.197953: | ******parse ISAKMP Oakley attribute:
  1418. Jun 27 16:56:38.197956: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1419. Jun 27 16:56:38.197958: | length/value: 3 (0x3)
  1420. Jun 27 16:56:38.197961: | ******parse ISAKMP Oakley attribute:
  1421. Jun 27 16:56:38.197963: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1422. Jun 27 16:56:38.197966: | length/value: 256 (0x100)
  1423. Jun 27 16:56:38.197968: | ******parse ISAKMP Oakley attribute:
  1424. Jun 27 16:56:38.197971: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1425. Jun 27 16:56:38.197973: | length/value: 1 (0x1)
  1426. Jun 27 16:56:38.197976: | ******parse ISAKMP Oakley attribute:
  1427. Jun 27 16:56:38.197979: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1428. Jun 27 16:56:38.197981: | length/value: 14 (0xe)
  1429. Jun 27 16:56:38.197984: | ******parse ISAKMP Oakley attribute:
  1430. Jun 27 16:56:38.197986: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1431. Jun 27 16:56:38.197989: | length/value: 65001 (0xfde9)
  1432. Jun 27 16:56:38.197991: | ******parse ISAKMP Oakley attribute:
  1433. Jun 27 16:56:38.197994: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1434. Jun 27 16:56:38.197996: | length/value: 1 (0x1)
  1435. Jun 27 16:56:38.197999: | ******parse ISAKMP Oakley attribute:
  1436. Jun 27 16:56:38.198002: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1437. Jun 27 16:56:38.198004: | length/value: 4 (0x4)
  1438. Jun 27 16:56:38.198007: | *****parse ISAKMP Transform Payload (ISAKMP):
  1439. Jun 27 16:56:38.198009: | next payload type: ISAKMP_NEXT_T (0x3)
  1440. Jun 27 16:56:38.198014: | length: 40 (0x28)
  1441. Jun 27 16:56:38.198016: | ISAKMP transform number: 26 (0x1a)
  1442. Jun 27 16:56:38.198019: | ISAKMP transform ID: KEY_IKE (0x1)
  1443. Jun 27 16:56:38.198021: | ******parse ISAKMP Oakley attribute:
  1444. Jun 27 16:56:38.198024: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1445. Jun 27 16:56:38.198026: | length/value: 3 (0x3)
  1446. Jun 27 16:56:38.198029: | ******parse ISAKMP Oakley attribute:
  1447. Jun 27 16:56:38.198031: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1448. Jun 27 16:56:38.198034: | length/value: 256 (0x100)
  1449. Jun 27 16:56:38.198036: | ******parse ISAKMP Oakley attribute:
  1450. Jun 27 16:56:38.198039: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1451. Jun 27 16:56:38.198041: | length/value: 1 (0x1)
  1452. Jun 27 16:56:38.198044: | ******parse ISAKMP Oakley attribute:
  1453. Jun 27 16:56:38.198047: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1454. Jun 27 16:56:38.198049: | length/value: 5 (0x5)
  1455. Jun 27 16:56:38.198052: | ******parse ISAKMP Oakley attribute:
  1456. Jun 27 16:56:38.198054: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1457. Jun 27 16:56:38.198057: | length/value: 65001 (0xfde9)
  1458. Jun 27 16:56:38.198059: | ******parse ISAKMP Oakley attribute:
  1459. Jun 27 16:56:38.198062: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1460. Jun 27 16:56:38.198064: | length/value: 1 (0x1)
  1461. Jun 27 16:56:38.198067: | ******parse ISAKMP Oakley attribute:
  1462. Jun 27 16:56:38.198069: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1463. Jun 27 16:56:38.198072: | length/value: 4 (0x4)
  1464. Jun 27 16:56:38.198074: | *****parse ISAKMP Transform Payload (ISAKMP):
  1465. Jun 27 16:56:38.198077: | next payload type: ISAKMP_NEXT_T (0x3)
  1466. Jun 27 16:56:38.198079: | length: 40 (0x28)
  1467. Jun 27 16:56:38.198082: | ISAKMP transform number: 27 (0x1b)
  1468. Jun 27 16:56:38.198084: | ISAKMP transform ID: KEY_IKE (0x1)
  1469. Jun 27 16:56:38.198087: | ******parse ISAKMP Oakley attribute:
  1470. Jun 27 16:56:38.198090: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1471. Jun 27 16:56:38.198092: | length/value: 3 (0x3)
  1472. Jun 27 16:56:38.198095: | ******parse ISAKMP Oakley attribute:
  1473. Jun 27 16:56:38.198097: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1474. Jun 27 16:56:38.198100: | length/value: 256 (0x100)
  1475. Jun 27 16:56:38.198102: | ******parse ISAKMP Oakley attribute:
  1476. Jun 27 16:56:38.198105: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1477. Jun 27 16:56:38.198107: | length/value: 1 (0x1)
  1478. Jun 27 16:56:38.198110: | ******parse ISAKMP Oakley attribute:
  1479. Jun 27 16:56:38.198112: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1480. Jun 27 16:56:38.198115: | length/value: 2 (0x2)
  1481. Jun 27 16:56:38.198117: | ******parse ISAKMP Oakley attribute:
  1482. Jun 27 16:56:38.198120: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1483. Jun 27 16:56:38.198122: | length/value: 65001 (0xfde9)
  1484. Jun 27 16:56:38.198125: | ******parse ISAKMP Oakley attribute:
  1485. Jun 27 16:56:38.198127: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1486. Jun 27 16:56:38.198130: | length/value: 1 (0x1)
  1487. Jun 27 16:56:38.198132: | ******parse ISAKMP Oakley attribute:
  1488. Jun 27 16:56:38.198135: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1489. Jun 27 16:56:38.198138: | length/value: 4 (0x4)
  1490. Jun 27 16:56:38.198140: | *****parse ISAKMP Transform Payload (ISAKMP):
  1491. Jun 27 16:56:38.198143: | next payload type: ISAKMP_NEXT_T (0x3)
  1492. Jun 27 16:56:38.198145: | length: 40 (0x28)
  1493. Jun 27 16:56:38.198148: | ISAKMP transform number: 28 (0x1c)
  1494. Jun 27 16:56:38.198150: | ISAKMP transform ID: KEY_IKE (0x1)
  1495. Jun 27 16:56:38.198153: | ******parse ISAKMP Oakley attribute:
  1496. Jun 27 16:56:38.198155: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1497. Jun 27 16:56:38.198158: | length/value: 3 (0x3)
  1498. Jun 27 16:56:38.198160: | ******parse ISAKMP Oakley attribute:
  1499. Jun 27 16:56:38.198163: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1500. Jun 27 16:56:38.198165: | length/value: 256 (0x100)
  1501. Jun 27 16:56:38.198168: | ******parse ISAKMP Oakley attribute:
  1502. Jun 27 16:56:38.198171: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1503. Jun 27 16:56:38.198173: | length/value: 1 (0x1)
  1504. Jun 27 16:56:38.198176: | ******parse ISAKMP Oakley attribute:
  1505. Jun 27 16:56:38.198180: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1506. Jun 27 16:56:38.198182: | length/value: 1 (0x1)
  1507. Jun 27 16:56:38.198185: | ******parse ISAKMP Oakley attribute:
  1508. Jun 27 16:56:38.198188: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1509. Jun 27 16:56:38.198190: | length/value: 65001 (0xfde9)
  1510. Jun 27 16:56:38.198193: | ******parse ISAKMP Oakley attribute:
  1511. Jun 27 16:56:38.198195: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1512. Jun 27 16:56:38.198198: | length/value: 1 (0x1)
  1513. Jun 27 16:56:38.198200: | ******parse ISAKMP Oakley attribute:
  1514. Jun 27 16:56:38.198203: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1515. Jun 27 16:56:38.198205: | length/value: 4 (0x4)
  1516. Jun 27 16:56:38.198208: | *****parse ISAKMP Transform Payload (ISAKMP):
  1517. Jun 27 16:56:38.198210: | next payload type: ISAKMP_NEXT_T (0x3)
  1518. Jun 27 16:56:38.198213: | length: 40 (0x28)
  1519. Jun 27 16:56:38.198215: | ISAKMP transform number: 29 (0x1d)
  1520. Jun 27 16:56:38.198218: | ISAKMP transform ID: KEY_IKE (0x1)
  1521. Jun 27 16:56:38.198220: | ******parse ISAKMP Oakley attribute:
  1522. Jun 27 16:56:38.198223: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1523. Jun 27 16:56:38.198225: | length/value: 3 (0x3)
  1524. Jun 27 16:56:38.198228: | ******parse ISAKMP Oakley attribute:
  1525. Jun 27 16:56:38.198230: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1526. Jun 27 16:56:38.198233: | length/value: 256 (0x100)
  1527. Jun 27 16:56:38.198235: | ******parse ISAKMP Oakley attribute:
  1528. Jun 27 16:56:38.198238: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1529. Jun 27 16:56:38.198240: | length/value: 2 (0x2)
  1530. Jun 27 16:56:38.198243: | ******parse ISAKMP Oakley attribute:
  1531. Jun 27 16:56:38.198246: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1532. Jun 27 16:56:38.198248: | length/value: 14 (0xe)
  1533. Jun 27 16:56:38.198251: | ******parse ISAKMP Oakley attribute:
  1534. Jun 27 16:56:38.198253: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1535. Jun 27 16:56:38.198256: | length/value: 65001 (0xfde9)
  1536. Jun 27 16:56:38.198258: | ******parse ISAKMP Oakley attribute:
  1537. Jun 27 16:56:38.198261: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1538. Jun 27 16:56:38.198263: | length/value: 1 (0x1)
  1539. Jun 27 16:56:38.198266: | ******parse ISAKMP Oakley attribute:
  1540. Jun 27 16:56:38.198268: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1541. Jun 27 16:56:38.198271: | length/value: 4 (0x4)
  1542. Jun 27 16:56:38.198273: | *****parse ISAKMP Transform Payload (ISAKMP):
  1543. Jun 27 16:56:38.198276: | next payload type: ISAKMP_NEXT_T (0x3)
  1544. Jun 27 16:56:38.198278: | length: 40 (0x28)
  1545. Jun 27 16:56:38.198281: | ISAKMP transform number: 30 (0x1e)
  1546. Jun 27 16:56:38.198283: | ISAKMP transform ID: KEY_IKE (0x1)
  1547. Jun 27 16:56:38.198286: | ******parse ISAKMP Oakley attribute:
  1548. Jun 27 16:56:38.198289: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1549. Jun 27 16:56:38.198291: | length/value: 3 (0x3)
  1550. Jun 27 16:56:38.198294: | ******parse ISAKMP Oakley attribute:
  1551. Jun 27 16:56:38.198296: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1552. Jun 27 16:56:38.198299: | length/value: 256 (0x100)
  1553. Jun 27 16:56:38.198301: | ******parse ISAKMP Oakley attribute:
  1554. Jun 27 16:56:38.198304: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1555. Jun 27 16:56:38.198306: | length/value: 2 (0x2)
  1556. Jun 27 16:56:38.198309: | ******parse ISAKMP Oakley attribute:
  1557. Jun 27 16:56:38.198311: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1558. Jun 27 16:56:38.198314: | length/value: 5 (0x5)
  1559. Jun 27 16:56:38.198316: | ******parse ISAKMP Oakley attribute:
  1560. Jun 27 16:56:38.198319: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1561. Jun 27 16:56:38.198321: | length/value: 65001 (0xfde9)
  1562. Jun 27 16:56:38.198324: | ******parse ISAKMP Oakley attribute:
  1563. Jun 27 16:56:38.198326: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1564. Jun 27 16:56:38.198329: | length/value: 1 (0x1)
  1565. Jun 27 16:56:38.198331: | ******parse ISAKMP Oakley attribute:
  1566. Jun 27 16:56:38.198334: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1567. Jun 27 16:56:38.198336: | length/value: 4 (0x4)
  1568. Jun 27 16:56:38.198339: | *****parse ISAKMP Transform Payload (ISAKMP):
  1569. Jun 27 16:56:38.198342: | next payload type: ISAKMP_NEXT_T (0x3)
  1570. Jun 27 16:56:38.198346: | length: 40 (0x28)
  1571. Jun 27 16:56:38.198348: | ISAKMP transform number: 31 (0x1f)
  1572. Jun 27 16:56:38.198351: | ISAKMP transform ID: KEY_IKE (0x1)
  1573. Jun 27 16:56:38.198353: | ******parse ISAKMP Oakley attribute:
  1574. Jun 27 16:56:38.198356: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1575. Jun 27 16:56:38.198359: | length/value: 3 (0x3)
  1576. Jun 27 16:56:38.198361: | ******parse ISAKMP Oakley attribute:
  1577. Jun 27 16:56:38.198364: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1578. Jun 27 16:56:38.198366: | length/value: 256 (0x100)
  1579. Jun 27 16:56:38.198369: | ******parse ISAKMP Oakley attribute:
  1580. Jun 27 16:56:38.198371: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1581. Jun 27 16:56:38.198374: | length/value: 2 (0x2)
  1582. Jun 27 16:56:38.198376: | ******parse ISAKMP Oakley attribute:
  1583. Jun 27 16:56:38.198379: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1584. Jun 27 16:56:38.198381: | length/value: 2 (0x2)
  1585. Jun 27 16:56:38.198384: | ******parse ISAKMP Oakley attribute:
  1586. Jun 27 16:56:38.198386: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1587. Jun 27 16:56:38.198389: | length/value: 65001 (0xfde9)
  1588. Jun 27 16:56:38.198391: | ******parse ISAKMP Oakley attribute:
  1589. Jun 27 16:56:38.198394: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1590. Jun 27 16:56:38.198396: | length/value: 1 (0x1)
  1591. Jun 27 16:56:38.198399: | ******parse ISAKMP Oakley attribute:
  1592. Jun 27 16:56:38.198401: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1593. Jun 27 16:56:38.198404: | length/value: 4 (0x4)
  1594. Jun 27 16:56:38.198407: | *****parse ISAKMP Transform Payload (ISAKMP):
  1595. Jun 27 16:56:38.198409: | next payload type: ISAKMP_NEXT_T (0x3)
  1596. Jun 27 16:56:38.198412: | length: 40 (0x28)
  1597. Jun 27 16:56:38.198414: | ISAKMP transform number: 32 (0x20)
  1598. Jun 27 16:56:38.198417: | ISAKMP transform ID: KEY_IKE (0x1)
  1599. Jun 27 16:56:38.198419: | ******parse ISAKMP Oakley attribute:
  1600. Jun 27 16:56:38.198422: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1601. Jun 27 16:56:38.198424: | length/value: 3 (0x3)
  1602. Jun 27 16:56:38.198427: | ******parse ISAKMP Oakley attribute:
  1603. Jun 27 16:56:38.198429: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1604. Jun 27 16:56:38.198432: | length/value: 256 (0x100)
  1605. Jun 27 16:56:38.198434: | ******parse ISAKMP Oakley attribute:
  1606. Jun 27 16:56:38.198437: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1607. Jun 27 16:56:38.198439: | length/value: 2 (0x2)
  1608. Jun 27 16:56:38.198442: | ******parse ISAKMP Oakley attribute:
  1609. Jun 27 16:56:38.198444: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1610. Jun 27 16:56:38.198447: | length/value: 1 (0x1)
  1611. Jun 27 16:56:38.198449: | ******parse ISAKMP Oakley attribute:
  1612. Jun 27 16:56:38.198452: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1613. Jun 27 16:56:38.198455: | length/value: 65001 (0xfde9)
  1614. Jun 27 16:56:38.198457: | ******parse ISAKMP Oakley attribute:
  1615. Jun 27 16:56:38.198460: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1616. Jun 27 16:56:38.198462: | length/value: 1 (0x1)
  1617. Jun 27 16:56:38.198465: | ******parse ISAKMP Oakley attribute:
  1618. Jun 27 16:56:38.198467: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1619. Jun 27 16:56:38.198470: | length/value: 4 (0x4)
  1620. Jun 27 16:56:38.198472: | *****parse ISAKMP Transform Payload (ISAKMP):
  1621. Jun 27 16:56:38.198475: | next payload type: ISAKMP_NEXT_T (0x3)
  1622. Jun 27 16:56:38.198477: | length: 40 (0x28)
  1623. Jun 27 16:56:38.198480: | ISAKMP transform number: 33 (0x21)
  1624. Jun 27 16:56:38.198482: | ISAKMP transform ID: KEY_IKE (0x1)
  1625. Jun 27 16:56:38.198485: | ******parse ISAKMP Oakley attribute:
  1626. Jun 27 16:56:38.198487: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1627. Jun 27 16:56:38.198490: | length/value: 3 (0x3)
  1628. Jun 27 16:56:38.198492: | ******parse ISAKMP Oakley attribute:
  1629. Jun 27 16:56:38.198495: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1630. Jun 27 16:56:38.198497: | length/value: 192 (0xc0)
  1631. Jun 27 16:56:38.198500: | ******parse ISAKMP Oakley attribute:
  1632. Jun 27 16:56:38.198503: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1633. Jun 27 16:56:38.198505: | length/value: 1 (0x1)
  1634. Jun 27 16:56:38.198508: | ******parse ISAKMP Oakley attribute:
  1635. Jun 27 16:56:38.198510: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1636. Jun 27 16:56:38.198515: | length/value: 14 (0xe)
  1637. Jun 27 16:56:38.198518: | ******parse ISAKMP Oakley attribute:
  1638. Jun 27 16:56:38.198520: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1639. Jun 27 16:56:38.198523: | length/value: 65001 (0xfde9)
  1640. Jun 27 16:56:38.198526: | ******parse ISAKMP Oakley attribute:
  1641. Jun 27 16:56:38.198528: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1642. Jun 27 16:56:38.198531: | length/value: 1 (0x1)
  1643. Jun 27 16:56:38.198533: | ******parse ISAKMP Oakley attribute:
  1644. Jun 27 16:56:38.198536: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1645. Jun 27 16:56:38.198538: | length/value: 4 (0x4)
  1646. Jun 27 16:56:38.198541: | *****parse ISAKMP Transform Payload (ISAKMP):
  1647. Jun 27 16:56:38.198543: | next payload type: ISAKMP_NEXT_T (0x3)
  1648. Jun 27 16:56:38.198546: | length: 40 (0x28)
  1649. Jun 27 16:56:38.198548: | ISAKMP transform number: 34 (0x22)
  1650. Jun 27 16:56:38.198551: | ISAKMP transform ID: KEY_IKE (0x1)
  1651. Jun 27 16:56:38.198554: | ******parse ISAKMP Oakley attribute:
  1652. Jun 27 16:56:38.198556: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1653. Jun 27 16:56:38.198559: | length/value: 3 (0x3)
  1654. Jun 27 16:56:38.198561: | ******parse ISAKMP Oakley attribute:
  1655. Jun 27 16:56:38.198564: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1656. Jun 27 16:56:38.198566: | length/value: 192 (0xc0)
  1657. Jun 27 16:56:38.198569: | ******parse ISAKMP Oakley attribute:
  1658. Jun 27 16:56:38.198571: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1659. Jun 27 16:56:38.198574: | length/value: 1 (0x1)
  1660. Jun 27 16:56:38.198576: | ******parse ISAKMP Oakley attribute:
  1661. Jun 27 16:56:38.198579: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1662. Jun 27 16:56:38.198581: | length/value: 5 (0x5)
  1663. Jun 27 16:56:38.198584: | ******parse ISAKMP Oakley attribute:
  1664. Jun 27 16:56:38.198587: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1665. Jun 27 16:56:38.198589: | length/value: 65001 (0xfde9)
  1666. Jun 27 16:56:38.198592: | ******parse ISAKMP Oakley attribute:
  1667. Jun 27 16:56:38.198594: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1668. Jun 27 16:56:38.198597: | length/value: 1 (0x1)
  1669. Jun 27 16:56:38.198599: | ******parse ISAKMP Oakley attribute:
  1670. Jun 27 16:56:38.198602: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1671. Jun 27 16:56:38.198604: | length/value: 4 (0x4)
  1672. Jun 27 16:56:38.198607: | *****parse ISAKMP Transform Payload (ISAKMP):
  1673. Jun 27 16:56:38.198609: | next payload type: ISAKMP_NEXT_T (0x3)
  1674. Jun 27 16:56:38.198612: | length: 40 (0x28)
  1675. Jun 27 16:56:38.198614: | ISAKMP transform number: 35 (0x23)
  1676. Jun 27 16:56:38.198617: | ISAKMP transform ID: KEY_IKE (0x1)
  1677. Jun 27 16:56:38.198620: | ******parse ISAKMP Oakley attribute:
  1678. Jun 27 16:56:38.198622: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1679. Jun 27 16:56:38.198625: | length/value: 3 (0x3)
  1680. Jun 27 16:56:38.198627: | ******parse ISAKMP Oakley attribute:
  1681. Jun 27 16:56:38.198630: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1682. Jun 27 16:56:38.198632: | length/value: 192 (0xc0)
  1683. Jun 27 16:56:38.198635: | ******parse ISAKMP Oakley attribute:
  1684. Jun 27 16:56:38.198637: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1685. Jun 27 16:56:38.198640: | length/value: 1 (0x1)
  1686. Jun 27 16:56:38.198642: | ******parse ISAKMP Oakley attribute:
  1687. Jun 27 16:56:38.198645: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1688. Jun 27 16:56:38.198647: | length/value: 2 (0x2)
  1689. Jun 27 16:56:38.198650: | ******parse ISAKMP Oakley attribute:
  1690. Jun 27 16:56:38.198653: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1691. Jun 27 16:56:38.198655: | length/value: 65001 (0xfde9)
  1692. Jun 27 16:56:38.198658: | ******parse ISAKMP Oakley attribute:
  1693. Jun 27 16:56:38.198660: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1694. Jun 27 16:56:38.198663: | length/value: 1 (0x1)
  1695. Jun 27 16:56:38.198665: | ******parse ISAKMP Oakley attribute:
  1696. Jun 27 16:56:38.198668: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1697. Jun 27 16:56:38.198670: | length/value: 4 (0x4)
  1698. Jun 27 16:56:38.198673: | *****parse ISAKMP Transform Payload (ISAKMP):
  1699. Jun 27 16:56:38.198675: | next payload type: ISAKMP_NEXT_T (0x3)
  1700. Jun 27 16:56:38.198678: | length: 40 (0x28)
  1701. Jun 27 16:56:38.198682: | ISAKMP transform number: 36 (0x24)
  1702. Jun 27 16:56:38.198685: | ISAKMP transform ID: KEY_IKE (0x1)
  1703. Jun 27 16:56:38.198687: | ******parse ISAKMP Oakley attribute:
  1704. Jun 27 16:56:38.198690: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1705. Jun 27 16:56:38.198692: | length/value: 3 (0x3)
  1706. Jun 27 16:56:38.198695: | ******parse ISAKMP Oakley attribute:
  1707. Jun 27 16:56:38.198698: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1708. Jun 27 16:56:38.198700: | length/value: 192 (0xc0)
  1709. Jun 27 16:56:38.198703: | ******parse ISAKMP Oakley attribute:
  1710. Jun 27 16:56:38.198705: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1711. Jun 27 16:56:38.198708: | length/value: 1 (0x1)
  1712. Jun 27 16:56:38.198710: | ******parse ISAKMP Oakley attribute:
  1713. Jun 27 16:56:38.198713: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1714. Jun 27 16:56:38.198715: | length/value: 1 (0x1)
  1715. Jun 27 16:56:38.198718: | ******parse ISAKMP Oakley attribute:
  1716. Jun 27 16:56:38.198720: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1717. Jun 27 16:56:38.198723: | length/value: 65001 (0xfde9)
  1718. Jun 27 16:56:38.198725: | ******parse ISAKMP Oakley attribute:
  1719. Jun 27 16:56:38.198728: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1720. Jun 27 16:56:38.198730: | length/value: 1 (0x1)
  1721. Jun 27 16:56:38.198733: | ******parse ISAKMP Oakley attribute:
  1722. Jun 27 16:56:38.198735: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1723. Jun 27 16:56:38.198738: | length/value: 4 (0x4)
  1724. Jun 27 16:56:38.198740: | *****parse ISAKMP Transform Payload (ISAKMP):
  1725. Jun 27 16:56:38.198743: | next payload type: ISAKMP_NEXT_T (0x3)
  1726. Jun 27 16:56:38.198745: | length: 40 (0x28)
  1727. Jun 27 16:56:38.198748: | ISAKMP transform number: 37 (0x25)
  1728. Jun 27 16:56:38.198750: | ISAKMP transform ID: KEY_IKE (0x1)
  1729. Jun 27 16:56:38.198753: | ******parse ISAKMP Oakley attribute:
  1730. Jun 27 16:56:38.198756: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1731. Jun 27 16:56:38.198758: | length/value: 3 (0x3)
  1732. Jun 27 16:56:38.198761: | ******parse ISAKMP Oakley attribute:
  1733. Jun 27 16:56:38.198763: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1734. Jun 27 16:56:38.198766: | length/value: 192 (0xc0)
  1735. Jun 27 16:56:38.198768: | ******parse ISAKMP Oakley attribute:
  1736. Jun 27 16:56:38.198771: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1737. Jun 27 16:56:38.198773: | length/value: 2 (0x2)
  1738. Jun 27 16:56:38.198776: | ******parse ISAKMP Oakley attribute:
  1739. Jun 27 16:56:38.198778: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1740. Jun 27 16:56:38.198781: | length/value: 14 (0xe)
  1741. Jun 27 16:56:38.198783: | ******parse ISAKMP Oakley attribute:
  1742. Jun 27 16:56:38.198786: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1743. Jun 27 16:56:38.198788: | length/value: 65001 (0xfde9)
  1744. Jun 27 16:56:38.198791: | ******parse ISAKMP Oakley attribute:
  1745. Jun 27 16:56:38.198794: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1746. Jun 27 16:56:38.198796: | length/value: 1 (0x1)
  1747. Jun 27 16:56:38.198798: | ******parse ISAKMP Oakley attribute:
  1748. Jun 27 16:56:38.198801: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1749. Jun 27 16:56:38.198804: | length/value: 4 (0x4)
  1750. Jun 27 16:56:38.198806: | *****parse ISAKMP Transform Payload (ISAKMP):
  1751. Jun 27 16:56:38.198809: | next payload type: ISAKMP_NEXT_T (0x3)
  1752. Jun 27 16:56:38.198811: | length: 40 (0x28)
  1753. Jun 27 16:56:38.198814: | ISAKMP transform number: 38 (0x26)
  1754. Jun 27 16:56:38.198816: | ISAKMP transform ID: KEY_IKE (0x1)
  1755. Jun 27 16:56:38.198819: | ******parse ISAKMP Oakley attribute:
  1756. Jun 27 16:56:38.198821: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1757. Jun 27 16:56:38.198824: | length/value: 3 (0x3)
  1758. Jun 27 16:56:38.198826: | ******parse ISAKMP Oakley attribute:
  1759. Jun 27 16:56:38.198829: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1760. Jun 27 16:56:38.198831: | length/value: 192 (0xc0)
  1761. Jun 27 16:56:38.198834: | ******parse ISAKMP Oakley attribute:
  1762. Jun 27 16:56:38.198836: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1763. Jun 27 16:56:38.198839: | length/value: 2 (0x2)
  1764. Jun 27 16:56:38.198841: | ******parse ISAKMP Oakley attribute:
  1765. Jun 27 16:56:38.198844: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1766. Jun 27 16:56:38.198846: | length/value: 5 (0x5)
  1767. Jun 27 16:56:38.198851: | ******parse ISAKMP Oakley attribute:
  1768. Jun 27 16:56:38.198854: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1769. Jun 27 16:56:38.198856: | length/value: 65001 (0xfde9)
  1770. Jun 27 16:56:38.198859: | ******parse ISAKMP Oakley attribute:
  1771. Jun 27 16:56:38.198861: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1772. Jun 27 16:56:38.198864: | length/value: 1 (0x1)
  1773. Jun 27 16:56:38.198866: | ******parse ISAKMP Oakley attribute:
  1774. Jun 27 16:56:38.198869: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1775. Jun 27 16:56:38.198871: | length/value: 4 (0x4)
  1776. Jun 27 16:56:38.198874: | *****parse ISAKMP Transform Payload (ISAKMP):
  1777. Jun 27 16:56:38.198876: | next payload type: ISAKMP_NEXT_T (0x3)
  1778. Jun 27 16:56:38.198879: | length: 40 (0x28)
  1779. Jun 27 16:56:38.198881: | ISAKMP transform number: 39 (0x27)
  1780. Jun 27 16:56:38.198884: | ISAKMP transform ID: KEY_IKE (0x1)
  1781. Jun 27 16:56:38.198886: | ******parse ISAKMP Oakley attribute:
  1782. Jun 27 16:56:38.198889: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1783. Jun 27 16:56:38.198891: | length/value: 3 (0x3)
  1784. Jun 27 16:56:38.198894: | ******parse ISAKMP Oakley attribute:
  1785. Jun 27 16:56:38.198896: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1786. Jun 27 16:56:38.198899: | length/value: 192 (0xc0)
  1787. Jun 27 16:56:38.198901: | ******parse ISAKMP Oakley attribute:
  1788. Jun 27 16:56:38.198904: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1789. Jun 27 16:56:38.198906: | length/value: 2 (0x2)
  1790. Jun 27 16:56:38.198909: | ******parse ISAKMP Oakley attribute:
  1791. Jun 27 16:56:38.198912: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1792. Jun 27 16:56:38.198914: | length/value: 2 (0x2)
  1793. Jun 27 16:56:38.198917: | ******parse ISAKMP Oakley attribute:
  1794. Jun 27 16:56:38.198919: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1795. Jun 27 16:56:38.198922: | length/value: 65001 (0xfde9)
  1796. Jun 27 16:56:38.198924: | ******parse ISAKMP Oakley attribute:
  1797. Jun 27 16:56:38.198927: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1798. Jun 27 16:56:38.198929: | length/value: 1 (0x1)
  1799. Jun 27 16:56:38.198932: | ******parse ISAKMP Oakley attribute:
  1800. Jun 27 16:56:38.198934: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1801. Jun 27 16:56:38.198937: | length/value: 4 (0x4)
  1802. Jun 27 16:56:38.198939: | *****parse ISAKMP Transform Payload (ISAKMP):
  1803. Jun 27 16:56:38.198942: | next payload type: ISAKMP_NEXT_T (0x3)
  1804. Jun 27 16:56:38.198944: | length: 40 (0x28)
  1805. Jun 27 16:56:38.198947: | ISAKMP transform number: 40 (0x28)
  1806. Jun 27 16:56:38.198949: | ISAKMP transform ID: KEY_IKE (0x1)
  1807. Jun 27 16:56:38.198952: | ******parse ISAKMP Oakley attribute:
  1808. Jun 27 16:56:38.198955: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1809. Jun 27 16:56:38.198957: | length/value: 3 (0x3)
  1810. Jun 27 16:56:38.198960: | ******parse ISAKMP Oakley attribute:
  1811. Jun 27 16:56:38.198962: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1812. Jun 27 16:56:38.198965: | length/value: 192 (0xc0)
  1813. Jun 27 16:56:38.198967: | ******parse ISAKMP Oakley attribute:
  1814. Jun 27 16:56:38.198970: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1815. Jun 27 16:56:38.198972: | length/value: 2 (0x2)
  1816. Jun 27 16:56:38.198975: | ******parse ISAKMP Oakley attribute:
  1817. Jun 27 16:56:38.198977: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1818. Jun 27 16:56:38.198980: | length/value: 1 (0x1)
  1819. Jun 27 16:56:38.198982: | ******parse ISAKMP Oakley attribute:
  1820. Jun 27 16:56:38.198985: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1821. Jun 27 16:56:38.198987: | length/value: 65001 (0xfde9)
  1822. Jun 27 16:56:38.198990: | ******parse ISAKMP Oakley attribute:
  1823. Jun 27 16:56:38.198992: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1824. Jun 27 16:56:38.198995: | length/value: 1 (0x1)
  1825. Jun 27 16:56:38.198997: | ******parse ISAKMP Oakley attribute:
  1826. Jun 27 16:56:38.199000: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1827. Jun 27 16:56:38.199002: | length/value: 4 (0x4)
  1828. Jun 27 16:56:38.199005: | *****parse ISAKMP Transform Payload (ISAKMP):
  1829. Jun 27 16:56:38.199008: | next payload type: ISAKMP_NEXT_T (0x3)
  1830. Jun 27 16:56:38.199010: | length: 40 (0x28)
  1831. Jun 27 16:56:38.199013: | ISAKMP transform number: 41 (0x29)
  1832. Jun 27 16:56:38.199017: | ISAKMP transform ID: KEY_IKE (0x1)
  1833. Jun 27 16:56:38.199020: | ******parse ISAKMP Oakley attribute:
  1834. Jun 27 16:56:38.199022: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1835. Jun 27 16:56:38.199025: | length/value: 3 (0x3)
  1836. Jun 27 16:56:38.199027: | ******parse ISAKMP Oakley attribute:
  1837. Jun 27 16:56:38.199030: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1838. Jun 27 16:56:38.199032: | length/value: 128 (0x80)
  1839. Jun 27 16:56:38.199035: | ******parse ISAKMP Oakley attribute:
  1840. Jun 27 16:56:38.199037: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1841. Jun 27 16:56:38.199040: | length/value: 1 (0x1)
  1842. Jun 27 16:56:38.199042: | ******parse ISAKMP Oakley attribute:
  1843. Jun 27 16:56:38.199045: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1844. Jun 27 16:56:38.199047: | length/value: 14 (0xe)
  1845. Jun 27 16:56:38.199050: | ******parse ISAKMP Oakley attribute:
  1846. Jun 27 16:56:38.199052: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1847. Jun 27 16:56:38.199055: | length/value: 65001 (0xfde9)
  1848. Jun 27 16:56:38.199058: | ******parse ISAKMP Oakley attribute:
  1849. Jun 27 16:56:38.199060: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1850. Jun 27 16:56:38.199062: | length/value: 1 (0x1)
  1851. Jun 27 16:56:38.199065: | ******parse ISAKMP Oakley attribute:
  1852. Jun 27 16:56:38.199068: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1853. Jun 27 16:56:38.199070: | length/value: 4 (0x4)
  1854. Jun 27 16:56:38.199073: | *****parse ISAKMP Transform Payload (ISAKMP):
  1855. Jun 27 16:56:38.199075: | next payload type: ISAKMP_NEXT_T (0x3)
  1856. Jun 27 16:56:38.199078: | length: 40 (0x28)
  1857. Jun 27 16:56:38.199080: | ISAKMP transform number: 42 (0x2a)
  1858. Jun 27 16:56:38.199083: | ISAKMP transform ID: KEY_IKE (0x1)
  1859. Jun 27 16:56:38.199085: | ******parse ISAKMP Oakley attribute:
  1860. Jun 27 16:56:38.199088: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1861. Jun 27 16:56:38.199090: | length/value: 3 (0x3)
  1862. Jun 27 16:56:38.199093: | ******parse ISAKMP Oakley attribute:
  1863. Jun 27 16:56:38.199096: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1864. Jun 27 16:56:38.199098: | length/value: 128 (0x80)
  1865. Jun 27 16:56:38.199101: | ******parse ISAKMP Oakley attribute:
  1866. Jun 27 16:56:38.199103: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1867. Jun 27 16:56:38.199106: | length/value: 1 (0x1)
  1868. Jun 27 16:56:38.199108: | ******parse ISAKMP Oakley attribute:
  1869. Jun 27 16:56:38.199111: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1870. Jun 27 16:56:38.199113: | length/value: 5 (0x5)
  1871. Jun 27 16:56:38.199116: | ******parse ISAKMP Oakley attribute:
  1872. Jun 27 16:56:38.199118: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1873. Jun 27 16:56:38.199121: | length/value: 65001 (0xfde9)
  1874. Jun 27 16:56:38.199123: | ******parse ISAKMP Oakley attribute:
  1875. Jun 27 16:56:38.199126: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1876. Jun 27 16:56:38.199128: | length/value: 1 (0x1)
  1877. Jun 27 16:56:38.199131: | ******parse ISAKMP Oakley attribute:
  1878. Jun 27 16:56:38.199133: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1879. Jun 27 16:56:38.199136: | length/value: 4 (0x4)
  1880. Jun 27 16:56:38.199139: | *****parse ISAKMP Transform Payload (ISAKMP):
  1881. Jun 27 16:56:38.199141: | next payload type: ISAKMP_NEXT_T (0x3)
  1882. Jun 27 16:56:38.199144: | length: 40 (0x28)
  1883. Jun 27 16:56:38.199146: | ISAKMP transform number: 43 (0x2b)
  1884. Jun 27 16:56:38.199149: | ISAKMP transform ID: KEY_IKE (0x1)
  1885. Jun 27 16:56:38.199151: | ******parse ISAKMP Oakley attribute:
  1886. Jun 27 16:56:38.199154: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1887. Jun 27 16:56:38.199156: | length/value: 3 (0x3)
  1888. Jun 27 16:56:38.199159: | ******parse ISAKMP Oakley attribute:
  1889. Jun 27 16:56:38.199161: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1890. Jun 27 16:56:38.199164: | length/value: 128 (0x80)
  1891. Jun 27 16:56:38.199166: | ******parse ISAKMP Oakley attribute:
  1892. Jun 27 16:56:38.199169: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1893. Jun 27 16:56:38.199171: | length/value: 1 (0x1)
  1894. Jun 27 16:56:38.199174: | ******parse ISAKMP Oakley attribute:
  1895. Jun 27 16:56:38.199176: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1896. Jun 27 16:56:38.199179: | length/value: 2 (0x2)
  1897. Jun 27 16:56:38.199181: | ******parse ISAKMP Oakley attribute:
  1898. Jun 27 16:56:38.199186: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1899. Jun 27 16:56:38.199188: | length/value: 65001 (0xfde9)
  1900. Jun 27 16:56:38.199191: | ******parse ISAKMP Oakley attribute:
  1901. Jun 27 16:56:38.199194: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1902. Jun 27 16:56:38.199196: | length/value: 1 (0x1)
  1903. Jun 27 16:56:38.199199: | ******parse ISAKMP Oakley attribute:
  1904. Jun 27 16:56:38.199201: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1905. Jun 27 16:56:38.199204: | length/value: 4 (0x4)
  1906. Jun 27 16:56:38.199206: | *****parse ISAKMP Transform Payload (ISAKMP):
  1907. Jun 27 16:56:38.199209: | next payload type: ISAKMP_NEXT_T (0x3)
  1908. Jun 27 16:56:38.199211: | length: 40 (0x28)
  1909. Jun 27 16:56:38.199214: | ISAKMP transform number: 44 (0x2c)
  1910. Jun 27 16:56:38.199216: | ISAKMP transform ID: KEY_IKE (0x1)
  1911. Jun 27 16:56:38.199219: | ******parse ISAKMP Oakley attribute:
  1912. Jun 27 16:56:38.199222: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1913. Jun 27 16:56:38.199224: | length/value: 3 (0x3)
  1914. Jun 27 16:56:38.199227: | ******parse ISAKMP Oakley attribute:
  1915. Jun 27 16:56:38.199229: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1916. Jun 27 16:56:38.199232: | length/value: 128 (0x80)
  1917. Jun 27 16:56:38.199234: | ******parse ISAKMP Oakley attribute:
  1918. Jun 27 16:56:38.199237: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1919. Jun 27 16:56:38.199239: | length/value: 1 (0x1)
  1920. Jun 27 16:56:38.199242: | ******parse ISAKMP Oakley attribute:
  1921. Jun 27 16:56:38.199244: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1922. Jun 27 16:56:38.199247: | length/value: 1 (0x1)
  1923. Jun 27 16:56:38.199249: | ******parse ISAKMP Oakley attribute:
  1924. Jun 27 16:56:38.199252: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1925. Jun 27 16:56:38.199254: | length/value: 65001 (0xfde9)
  1926. Jun 27 16:56:38.199257: | ******parse ISAKMP Oakley attribute:
  1927. Jun 27 16:56:38.199259: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1928. Jun 27 16:56:38.199262: | length/value: 1 (0x1)
  1929. Jun 27 16:56:38.199264: | ******parse ISAKMP Oakley attribute:
  1930. Jun 27 16:56:38.199267: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1931. Jun 27 16:56:38.199270: | length/value: 4 (0x4)
  1932. Jun 27 16:56:38.199272: | *****parse ISAKMP Transform Payload (ISAKMP):
  1933. Jun 27 16:56:38.199275: | next payload type: ISAKMP_NEXT_T (0x3)
  1934. Jun 27 16:56:38.199277: | length: 40 (0x28)
  1935. Jun 27 16:56:38.199280: | ISAKMP transform number: 45 (0x2d)
  1936. Jun 27 16:56:38.199282: | ISAKMP transform ID: KEY_IKE (0x1)
  1937. Jun 27 16:56:38.199285: | ******parse ISAKMP Oakley attribute:
  1938. Jun 27 16:56:38.199287: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1939. Jun 27 16:56:38.199290: | length/value: 3 (0x3)
  1940. Jun 27 16:56:38.199292: | ******parse ISAKMP Oakley attribute:
  1941. Jun 27 16:56:38.199295: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1942. Jun 27 16:56:38.199297: | length/value: 128 (0x80)
  1943. Jun 27 16:56:38.199300: | ******parse ISAKMP Oakley attribute:
  1944. Jun 27 16:56:38.199302: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1945. Jun 27 16:56:38.199305: | length/value: 2 (0x2)
  1946. Jun 27 16:56:38.199307: | ******parse ISAKMP Oakley attribute:
  1947. Jun 27 16:56:38.199310: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1948. Jun 27 16:56:38.199312: | length/value: 14 (0xe)
  1949. Jun 27 16:56:38.199315: | ******parse ISAKMP Oakley attribute:
  1950. Jun 27 16:56:38.199318: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1951. Jun 27 16:56:38.199320: | length/value: 65001 (0xfde9)
  1952. Jun 27 16:56:38.199323: | ******parse ISAKMP Oakley attribute:
  1953. Jun 27 16:56:38.199325: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1954. Jun 27 16:56:38.199328: | length/value: 1 (0x1)
  1955. Jun 27 16:56:38.199330: | ******parse ISAKMP Oakley attribute:
  1956. Jun 27 16:56:38.199333: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1957. Jun 27 16:56:38.199335: | length/value: 4 (0x4)
  1958. Jun 27 16:56:38.199338: | *****parse ISAKMP Transform Payload (ISAKMP):
  1959. Jun 27 16:56:38.199340: | next payload type: ISAKMP_NEXT_T (0x3)
  1960. Jun 27 16:56:38.199343: | length: 40 (0x28)
  1961. Jun 27 16:56:38.199345: | ISAKMP transform number: 46 (0x2e)
  1962. Jun 27 16:56:38.199348: | ISAKMP transform ID: KEY_IKE (0x1)
  1963. Jun 27 16:56:38.199352: | ******parse ISAKMP Oakley attribute:
  1964. Jun 27 16:56:38.199355: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1965. Jun 27 16:56:38.199357: | length/value: 3 (0x3)
  1966. Jun 27 16:56:38.199360: | ******parse ISAKMP Oakley attribute:
  1967. Jun 27 16:56:38.199362: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1968. Jun 27 16:56:38.199365: | length/value: 128 (0x80)
  1969. Jun 27 16:56:38.199367: | ******parse ISAKMP Oakley attribute:
  1970. Jun 27 16:56:38.199370: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1971. Jun 27 16:56:38.199372: | length/value: 2 (0x2)
  1972. Jun 27 16:56:38.199375: | ******parse ISAKMP Oakley attribute:
  1973. Jun 27 16:56:38.199378: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  1974. Jun 27 16:56:38.199380: | length/value: 5 (0x5)
  1975. Jun 27 16:56:38.199383: | ******parse ISAKMP Oakley attribute:
  1976. Jun 27 16:56:38.199385: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  1977. Jun 27 16:56:38.199388: | length/value: 65001 (0xfde9)
  1978. Jun 27 16:56:38.199390: | ******parse ISAKMP Oakley attribute:
  1979. Jun 27 16:56:38.199393: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  1980. Jun 27 16:56:38.199395: | length/value: 1 (0x1)
  1981. Jun 27 16:56:38.199398: | ******parse ISAKMP Oakley attribute:
  1982. Jun 27 16:56:38.199400: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  1983. Jun 27 16:56:38.199403: | length/value: 4 (0x4)
  1984. Jun 27 16:56:38.199405: | *****parse ISAKMP Transform Payload (ISAKMP):
  1985. Jun 27 16:56:38.199408: | next payload type: ISAKMP_NEXT_T (0x3)
  1986. Jun 27 16:56:38.199410: | length: 40 (0x28)
  1987. Jun 27 16:56:38.199413: | ISAKMP transform number: 47 (0x2f)
  1988. Jun 27 16:56:38.199415: | ISAKMP transform ID: KEY_IKE (0x1)
  1989. Jun 27 16:56:38.199418: | ******parse ISAKMP Oakley attribute:
  1990. Jun 27 16:56:38.199421: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  1991. Jun 27 16:56:38.199423: | length/value: 3 (0x3)
  1992. Jun 27 16:56:38.199425: | ******parse ISAKMP Oakley attribute:
  1993. Jun 27 16:56:38.199428: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  1994. Jun 27 16:56:38.199430: | length/value: 128 (0x80)
  1995. Jun 27 16:56:38.199433: | ******parse ISAKMP Oakley attribute:
  1996. Jun 27 16:56:38.199436: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  1997. Jun 27 16:56:38.199438: | length/value: 2 (0x2)
  1998. Jun 27 16:56:38.199441: | ******parse ISAKMP Oakley attribute:
  1999. Jun 27 16:56:38.199443: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2000. Jun 27 16:56:38.199446: | length/value: 2 (0x2)
  2001. Jun 27 16:56:38.199448: | ******parse ISAKMP Oakley attribute:
  2002. Jun 27 16:56:38.199451: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2003. Jun 27 16:56:38.199453: | length/value: 65001 (0xfde9)
  2004. Jun 27 16:56:38.199456: | ******parse ISAKMP Oakley attribute:
  2005. Jun 27 16:56:38.199458: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2006. Jun 27 16:56:38.199461: | length/value: 1 (0x1)
  2007. Jun 27 16:56:38.199463: | ******parse ISAKMP Oakley attribute:
  2008. Jun 27 16:56:38.199466: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2009. Jun 27 16:56:38.199468: | length/value: 4 (0x4)
  2010. Jun 27 16:56:38.199471: | *****parse ISAKMP Transform Payload (ISAKMP):
  2011. Jun 27 16:56:38.199474: | next payload type: ISAKMP_NEXT_T (0x3)
  2012. Jun 27 16:56:38.199476: | length: 40 (0x28)
  2013. Jun 27 16:56:38.199478: | ISAKMP transform number: 48 (0x30)
  2014. Jun 27 16:56:38.199481: | ISAKMP transform ID: KEY_IKE (0x1)
  2015. Jun 27 16:56:38.199484: | ******parse ISAKMP Oakley attribute:
  2016. Jun 27 16:56:38.199486: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2017. Jun 27 16:56:38.199489: | length/value: 3 (0x3)
  2018. Jun 27 16:56:38.199491: | ******parse ISAKMP Oakley attribute:
  2019. Jun 27 16:56:38.199494: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  2020. Jun 27 16:56:38.199496: | length/value: 128 (0x80)
  2021. Jun 27 16:56:38.199499: | ******parse ISAKMP Oakley attribute:
  2022. Jun 27 16:56:38.199501: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2023. Jun 27 16:56:38.199504: | length/value: 2 (0x2)
  2024. Jun 27 16:56:38.199506: | ******parse ISAKMP Oakley attribute:
  2025. Jun 27 16:56:38.199509: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2026. Jun 27 16:56:38.199511: | length/value: 1 (0x1)
  2027. Jun 27 16:56:38.199514: | ******parse ISAKMP Oakley attribute:
  2028. Jun 27 16:56:38.199516: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2029. Jun 27 16:56:38.199521: | length/value: 65001 (0xfde9)
  2030. Jun 27 16:56:38.199524: | ******parse ISAKMP Oakley attribute:
  2031. Jun 27 16:56:38.199526: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2032. Jun 27 16:56:38.199529: | length/value: 1 (0x1)
  2033. Jun 27 16:56:38.199531: | ******parse ISAKMP Oakley attribute:
  2034. Jun 27 16:56:38.199534: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2035. Jun 27 16:56:38.199536: | length/value: 4 (0x4)
  2036. Jun 27 16:56:38.199539: | *****parse ISAKMP Transform Payload (ISAKMP):
  2037. Jun 27 16:56:38.199542: | next payload type: ISAKMP_NEXT_T (0x3)
  2038. Jun 27 16:56:38.199544: | length: 36 (0x24)
  2039. Jun 27 16:56:38.199546: | ISAKMP transform number: 49 (0x31)
  2040. Jun 27 16:56:38.199549: | ISAKMP transform ID: KEY_IKE (0x1)
  2041. Jun 27 16:56:38.199552: | ******parse ISAKMP Oakley attribute:
  2042. Jun 27 16:56:38.199554: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2043. Jun 27 16:56:38.199557: | length/value: 5 (0x5)
  2044. Jun 27 16:56:38.199559: | ******parse ISAKMP Oakley attribute:
  2045. Jun 27 16:56:38.199562: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2046. Jun 27 16:56:38.199564: | length/value: 1 (0x1)
  2047. Jun 27 16:56:38.199567: | ******parse ISAKMP Oakley attribute:
  2048. Jun 27 16:56:38.199569: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2049. Jun 27 16:56:38.199572: | length/value: 14 (0xe)
  2050. Jun 27 16:56:38.199574: | ******parse ISAKMP Oakley attribute:
  2051. Jun 27 16:56:38.199577: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2052. Jun 27 16:56:38.199579: | length/value: 65001 (0xfde9)
  2053. Jun 27 16:56:38.199582: | ******parse ISAKMP Oakley attribute:
  2054. Jun 27 16:56:38.199584: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2055. Jun 27 16:56:38.199587: | length/value: 1 (0x1)
  2056. Jun 27 16:56:38.199589: | ******parse ISAKMP Oakley attribute:
  2057. Jun 27 16:56:38.199592: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2058. Jun 27 16:56:38.199594: | length/value: 4 (0x4)
  2059. Jun 27 16:56:38.199597: | *****parse ISAKMP Transform Payload (ISAKMP):
  2060. Jun 27 16:56:38.199600: | next payload type: ISAKMP_NEXT_T (0x3)
  2061. Jun 27 16:56:38.199602: | length: 36 (0x24)
  2062. Jun 27 16:56:38.199605: | ISAKMP transform number: 50 (0x32)
  2063. Jun 27 16:56:38.199607: | ISAKMP transform ID: KEY_IKE (0x1)
  2064. Jun 27 16:56:38.199610: | ******parse ISAKMP Oakley attribute:
  2065. Jun 27 16:56:38.199612: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2066. Jun 27 16:56:38.199615: | length/value: 5 (0x5)
  2067. Jun 27 16:56:38.199617: | ******parse ISAKMP Oakley attribute:
  2068. Jun 27 16:56:38.199620: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2069. Jun 27 16:56:38.199622: | length/value: 1 (0x1)
  2070. Jun 27 16:56:38.199625: | ******parse ISAKMP Oakley attribute:
  2071. Jun 27 16:56:38.199627: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2072. Jun 27 16:56:38.199630: | length/value: 5 (0x5)
  2073. Jun 27 16:56:38.199632: | ******parse ISAKMP Oakley attribute:
  2074. Jun 27 16:56:38.199635: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2075. Jun 27 16:56:38.199637: | length/value: 65001 (0xfde9)
  2076. Jun 27 16:56:38.199640: | ******parse ISAKMP Oakley attribute:
  2077. Jun 27 16:56:38.199643: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2078. Jun 27 16:56:38.199645: | length/value: 1 (0x1)
  2079. Jun 27 16:56:38.199648: | ******parse ISAKMP Oakley attribute:
  2080. Jun 27 16:56:38.199650: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2081. Jun 27 16:56:38.199653: | length/value: 4 (0x4)
  2082. Jun 27 16:56:38.199655: | *****parse ISAKMP Transform Payload (ISAKMP):
  2083. Jun 27 16:56:38.199658: | next payload type: ISAKMP_NEXT_T (0x3)
  2084. Jun 27 16:56:38.199660: | length: 36 (0x24)
  2085. Jun 27 16:56:38.199663: | ISAKMP transform number: 51 (0x33)
  2086. Jun 27 16:56:38.199665: | ISAKMP transform ID: KEY_IKE (0x1)
  2087. Jun 27 16:56:38.199668: | ******parse ISAKMP Oakley attribute:
  2088. Jun 27 16:56:38.199670: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2089. Jun 27 16:56:38.199673: | length/value: 5 (0x5)
  2090. Jun 27 16:56:38.199675: | ******parse ISAKMP Oakley attribute:
  2091. Jun 27 16:56:38.199678: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2092. Jun 27 16:56:38.199680: | length/value: 1 (0x1)
  2093. Jun 27 16:56:38.199683: | ******parse ISAKMP Oakley attribute:
  2094. Jun 27 16:56:38.199688: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2095. Jun 27 16:56:38.199690: | length/value: 2 (0x2)
  2096. Jun 27 16:56:38.199693: | ******parse ISAKMP Oakley attribute:
  2097. Jun 27 16:56:38.199695: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2098. Jun 27 16:56:38.199698: | length/value: 65001 (0xfde9)
  2099. Jun 27 16:56:38.199700: | ******parse ISAKMP Oakley attribute:
  2100. Jun 27 16:56:38.199703: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2101. Jun 27 16:56:38.199705: | length/value: 1 (0x1)
  2102. Jun 27 16:56:38.199708: | ******parse ISAKMP Oakley attribute:
  2103. Jun 27 16:56:38.199710: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2104. Jun 27 16:56:38.199713: | length/value: 4 (0x4)
  2105. Jun 27 16:56:38.199715: | *****parse ISAKMP Transform Payload (ISAKMP):
  2106. Jun 27 16:56:38.199718: | next payload type: ISAKMP_NEXT_T (0x3)
  2107. Jun 27 16:56:38.199720: | length: 36 (0x24)
  2108. Jun 27 16:56:38.199723: | ISAKMP transform number: 52 (0x34)
  2109. Jun 27 16:56:38.199725: | ISAKMP transform ID: KEY_IKE (0x1)
  2110. Jun 27 16:56:38.199728: | ******parse ISAKMP Oakley attribute:
  2111. Jun 27 16:56:38.199731: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2112. Jun 27 16:56:38.199733: | length/value: 5 (0x5)
  2113. Jun 27 16:56:38.199736: | ******parse ISAKMP Oakley attribute:
  2114. Jun 27 16:56:38.199738: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2115. Jun 27 16:56:38.199741: | length/value: 1 (0x1)
  2116. Jun 27 16:56:38.199743: | ******parse ISAKMP Oakley attribute:
  2117. Jun 27 16:56:38.199746: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2118. Jun 27 16:56:38.199748: | length/value: 1 (0x1)
  2119. Jun 27 16:56:38.199751: | ******parse ISAKMP Oakley attribute:
  2120. Jun 27 16:56:38.199753: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2121. Jun 27 16:56:38.199756: | length/value: 65001 (0xfde9)
  2122. Jun 27 16:56:38.199758: | ******parse ISAKMP Oakley attribute:
  2123. Jun 27 16:56:38.199761: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2124. Jun 27 16:56:38.199763: | length/value: 1 (0x1)
  2125. Jun 27 16:56:38.199766: | ******parse ISAKMP Oakley attribute:
  2126. Jun 27 16:56:38.199768: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2127. Jun 27 16:56:38.199771: | length/value: 4 (0x4)
  2128. Jun 27 16:56:38.199774: | *****parse ISAKMP Transform Payload (ISAKMP):
  2129. Jun 27 16:56:38.199776: | next payload type: ISAKMP_NEXT_T (0x3)
  2130. Jun 27 16:56:38.199779: | length: 36 (0x24)
  2131. Jun 27 16:56:38.199781: | ISAKMP transform number: 53 (0x35)
  2132. Jun 27 16:56:38.199784: | ISAKMP transform ID: KEY_IKE (0x1)
  2133. Jun 27 16:56:38.199786: | ******parse ISAKMP Oakley attribute:
  2134. Jun 27 16:56:38.199789: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2135. Jun 27 16:56:38.199791: | length/value: 5 (0x5)
  2136. Jun 27 16:56:38.199794: | ******parse ISAKMP Oakley attribute:
  2137. Jun 27 16:56:38.199796: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2138. Jun 27 16:56:38.199799: | length/value: 2 (0x2)
  2139. Jun 27 16:56:38.199801: | ******parse ISAKMP Oakley attribute:
  2140. Jun 27 16:56:38.199804: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2141. Jun 27 16:56:38.199806: | length/value: 14 (0xe)
  2142. Jun 27 16:56:38.199809: | ******parse ISAKMP Oakley attribute:
  2143. Jun 27 16:56:38.199811: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2144. Jun 27 16:56:38.199814: | length/value: 65001 (0xfde9)
  2145. Jun 27 16:56:38.199816: | ******parse ISAKMP Oakley attribute:
  2146. Jun 27 16:56:38.199819: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2147. Jun 27 16:56:38.199821: | length/value: 1 (0x1)
  2148. Jun 27 16:56:38.199824: | ******parse ISAKMP Oakley attribute:
  2149. Jun 27 16:56:38.199827: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2150. Jun 27 16:56:38.199829: | length/value: 4 (0x4)
  2151. Jun 27 16:56:38.199832: | *****parse ISAKMP Transform Payload (ISAKMP):
  2152. Jun 27 16:56:38.199834: | next payload type: ISAKMP_NEXT_T (0x3)
  2153. Jun 27 16:56:38.199837: | length: 36 (0x24)
  2154. Jun 27 16:56:38.199839: | ISAKMP transform number: 54 (0x36)
  2155. Jun 27 16:56:38.199842: | ISAKMP transform ID: KEY_IKE (0x1)
  2156. Jun 27 16:56:38.199844: | ******parse ISAKMP Oakley attribute:
  2157. Jun 27 16:56:38.199847: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2158. Jun 27 16:56:38.199849: | length/value: 5 (0x5)
  2159. Jun 27 16:56:38.199854: | ******parse ISAKMP Oakley attribute:
  2160. Jun 27 16:56:38.199857: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2161. Jun 27 16:56:38.199859: | length/value: 2 (0x2)
  2162. Jun 27 16:56:38.199862: | ******parse ISAKMP Oakley attribute:
  2163. Jun 27 16:56:38.199864: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2164. Jun 27 16:56:38.199867: | length/value: 5 (0x5)
  2165. Jun 27 16:56:38.199869: | ******parse ISAKMP Oakley attribute:
  2166. Jun 27 16:56:38.199872: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2167. Jun 27 16:56:38.199875: | length/value: 65001 (0xfde9)
  2168. Jun 27 16:56:38.199877: | ******parse ISAKMP Oakley attribute:
  2169. Jun 27 16:56:38.199880: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2170. Jun 27 16:56:38.199882: | length/value: 1 (0x1)
  2171. Jun 27 16:56:38.199885: | ******parse ISAKMP Oakley attribute:
  2172. Jun 27 16:56:38.199887: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2173. Jun 27 16:56:38.199890: | length/value: 4 (0x4)
  2174. Jun 27 16:56:38.199892: | *****parse ISAKMP Transform Payload (ISAKMP):
  2175. Jun 27 16:56:38.199895: | next payload type: ISAKMP_NEXT_T (0x3)
  2176. Jun 27 16:56:38.199897: | length: 36 (0x24)
  2177. Jun 27 16:56:38.199900: | ISAKMP transform number: 55 (0x37)
  2178. Jun 27 16:56:38.199902: | ISAKMP transform ID: KEY_IKE (0x1)
  2179. Jun 27 16:56:38.199905: | ******parse ISAKMP Oakley attribute:
  2180. Jun 27 16:56:38.199908: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2181. Jun 27 16:56:38.199910: | length/value: 5 (0x5)
  2182. Jun 27 16:56:38.199913: | ******parse ISAKMP Oakley attribute:
  2183. Jun 27 16:56:38.199915: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2184. Jun 27 16:56:38.199918: | length/value: 2 (0x2)
  2185. Jun 27 16:56:38.199920: | ******parse ISAKMP Oakley attribute:
  2186. Jun 27 16:56:38.199923: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2187. Jun 27 16:56:38.199926: | length/value: 2 (0x2)
  2188. Jun 27 16:56:38.199928: | ******parse ISAKMP Oakley attribute:
  2189. Jun 27 16:56:38.199931: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2190. Jun 27 16:56:38.199933: | length/value: 65001 (0xfde9)
  2191. Jun 27 16:56:38.199936: | ******parse ISAKMP Oakley attribute:
  2192. Jun 27 16:56:38.199938: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2193. Jun 27 16:56:38.199941: | length/value: 1 (0x1)
  2194. Jun 27 16:56:38.199943: | ******parse ISAKMP Oakley attribute:
  2195. Jun 27 16:56:38.199946: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2196. Jun 27 16:56:38.199948: | length/value: 4 (0x4)
  2197. Jun 27 16:56:38.199951: | *****parse ISAKMP Transform Payload (ISAKMP):
  2198. Jun 27 16:56:38.199954: | next payload type: ISAKMP_NEXT_T (0x3)
  2199. Jun 27 16:56:38.199956: | length: 36 (0x24)
  2200. Jun 27 16:56:38.199959: | ISAKMP transform number: 56 (0x38)
  2201. Jun 27 16:56:38.199961: | ISAKMP transform ID: KEY_IKE (0x1)
  2202. Jun 27 16:56:38.199964: | ******parse ISAKMP Oakley attribute:
  2203. Jun 27 16:56:38.199966: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2204. Jun 27 16:56:38.199969: | length/value: 5 (0x5)
  2205. Jun 27 16:56:38.199971: | ******parse ISAKMP Oakley attribute:
  2206. Jun 27 16:56:38.199974: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2207. Jun 27 16:56:38.199976: | length/value: 2 (0x2)
  2208. Jun 27 16:56:38.199979: | ******parse ISAKMP Oakley attribute:
  2209. Jun 27 16:56:38.199981: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2210. Jun 27 16:56:38.199984: | length/value: 1 (0x1)
  2211. Jun 27 16:56:38.199986: | ******parse ISAKMP Oakley attribute:
  2212. Jun 27 16:56:38.199989: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2213. Jun 27 16:56:38.199991: | length/value: 65001 (0xfde9)
  2214. Jun 27 16:56:38.199994: | ******parse ISAKMP Oakley attribute:
  2215. Jun 27 16:56:38.199997: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2216. Jun 27 16:56:38.199999: | length/value: 1 (0x1)
  2217. Jun 27 16:56:38.200002: | ******parse ISAKMP Oakley attribute:
  2218. Jun 27 16:56:38.200004: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2219. Jun 27 16:56:38.200007: | length/value: 4 (0x4)
  2220. Jun 27 16:56:38.200009: | *****parse ISAKMP Transform Payload (ISAKMP):
  2221. Jun 27 16:56:38.200012: | next payload type: ISAKMP_NEXT_T (0x3)
  2222. Jun 27 16:56:38.200014: | length: 36 (0x24)
  2223. Jun 27 16:56:38.200017: | ISAKMP transform number: 57 (0x39)
  2224. Jun 27 16:56:38.200021: | ISAKMP transform ID: KEY_IKE (0x1)
  2225. Jun 27 16:56:38.200024: | ******parse ISAKMP Oakley attribute:
  2226. Jun 27 16:56:38.200026: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2227. Jun 27 16:56:38.200029: | length/value: 6 (0x6)
  2228. Jun 27 16:56:38.200031: | ******parse ISAKMP Oakley attribute:
  2229. Jun 27 16:56:38.200034: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2230. Jun 27 16:56:38.200036: | length/value: 1 (0x1)
  2231. Jun 27 16:56:38.200039: | ******parse ISAKMP Oakley attribute:
  2232. Jun 27 16:56:38.200041: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2233. Jun 27 16:56:38.200044: | length/value: 14 (0xe)
  2234. Jun 27 16:56:38.200046: | ******parse ISAKMP Oakley attribute:
  2235. Jun 27 16:56:38.200049: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2236. Jun 27 16:56:38.200051: | length/value: 65001 (0xfde9)
  2237. Jun 27 16:56:38.200054: | ******parse ISAKMP Oakley attribute:
  2238. Jun 27 16:56:38.200057: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2239. Jun 27 16:56:38.200059: | length/value: 1 (0x1)
  2240. Jun 27 16:56:38.200062: | ******parse ISAKMP Oakley attribute:
  2241. Jun 27 16:56:38.200064: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2242. Jun 27 16:56:38.200067: | length/value: 4 (0x4)
  2243. Jun 27 16:56:38.200069: | *****parse ISAKMP Transform Payload (ISAKMP):
  2244. Jun 27 16:56:38.200072: | next payload type: ISAKMP_NEXT_T (0x3)
  2245. Jun 27 16:56:38.200074: | length: 36 (0x24)
  2246. Jun 27 16:56:38.200077: | ISAKMP transform number: 58 (0x3a)
  2247. Jun 27 16:56:38.200079: | ISAKMP transform ID: KEY_IKE (0x1)
  2248. Jun 27 16:56:38.200082: | ******parse ISAKMP Oakley attribute:
  2249. Jun 27 16:56:38.200084: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2250. Jun 27 16:56:38.200087: | length/value: 6 (0x6)
  2251. Jun 27 16:56:38.200089: | ******parse ISAKMP Oakley attribute:
  2252. Jun 27 16:56:38.200092: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2253. Jun 27 16:56:38.200094: | length/value: 1 (0x1)
  2254. Jun 27 16:56:38.200097: | ******parse ISAKMP Oakley attribute:
  2255. Jun 27 16:56:38.200100: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2256. Jun 27 16:56:38.200102: | length/value: 5 (0x5)
  2257. Jun 27 16:56:38.200105: | ******parse ISAKMP Oakley attribute:
  2258. Jun 27 16:56:38.200107: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2259. Jun 27 16:56:38.200110: | length/value: 65001 (0xfde9)
  2260. Jun 27 16:56:38.200112: | ******parse ISAKMP Oakley attribute:
  2261. Jun 27 16:56:38.200115: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2262. Jun 27 16:56:38.200117: | length/value: 1 (0x1)
  2263. Jun 27 16:56:38.200120: | ******parse ISAKMP Oakley attribute:
  2264. Jun 27 16:56:38.200122: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2265. Jun 27 16:56:38.200125: | length/value: 4 (0x4)
  2266. Jun 27 16:56:38.200127: | *****parse ISAKMP Transform Payload (ISAKMP):
  2267. Jun 27 16:56:38.200130: | next payload type: ISAKMP_NEXT_T (0x3)
  2268. Jun 27 16:56:38.200132: | length: 36 (0x24)
  2269. Jun 27 16:56:38.200135: | ISAKMP transform number: 59 (0x3b)
  2270. Jun 27 16:56:38.200137: | ISAKMP transform ID: KEY_IKE (0x1)
  2271. Jun 27 16:56:38.200140: | ******parse ISAKMP Oakley attribute:
  2272. Jun 27 16:56:38.200143: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2273. Jun 27 16:56:38.200145: | length/value: 6 (0x6)
  2274. Jun 27 16:56:38.200148: | ******parse ISAKMP Oakley attribute:
  2275. Jun 27 16:56:38.200150: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2276. Jun 27 16:56:38.200153: | length/value: 1 (0x1)
  2277. Jun 27 16:56:38.200155: | ******parse ISAKMP Oakley attribute:
  2278. Jun 27 16:56:38.200158: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2279. Jun 27 16:56:38.200160: | length/value: 2 (0x2)
  2280. Jun 27 16:56:38.200163: | ******parse ISAKMP Oakley attribute:
  2281. Jun 27 16:56:38.200165: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2282. Jun 27 16:56:38.200168: | length/value: 65001 (0xfde9)
  2283. Jun 27 16:56:38.200170: | ******parse ISAKMP Oakley attribute:
  2284. Jun 27 16:56:38.200173: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2285. Jun 27 16:56:38.200175: | length/value: 1 (0x1)
  2286. Jun 27 16:56:38.200178: | ******parse ISAKMP Oakley attribute:
  2287. Jun 27 16:56:38.200181: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2288. Jun 27 16:56:38.200183: | length/value: 4 (0x4)
  2289. Jun 27 16:56:38.200187: | *****parse ISAKMP Transform Payload (ISAKMP):
  2290. Jun 27 16:56:38.200190: | next payload type: ISAKMP_NEXT_T (0x3)
  2291. Jun 27 16:56:38.200192: | length: 36 (0x24)
  2292. Jun 27 16:56:38.200195: | ISAKMP transform number: 60 (0x3c)
  2293. Jun 27 16:56:38.200197: | ISAKMP transform ID: KEY_IKE (0x1)
  2294. Jun 27 16:56:38.200200: | ******parse ISAKMP Oakley attribute:
  2295. Jun 27 16:56:38.200203: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2296. Jun 27 16:56:38.200205: | length/value: 6 (0x6)
  2297. Jun 27 16:56:38.200208: | ******parse ISAKMP Oakley attribute:
  2298. Jun 27 16:56:38.200210: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2299. Jun 27 16:56:38.200213: | length/value: 1 (0x1)
  2300. Jun 27 16:56:38.200215: | ******parse ISAKMP Oakley attribute:
  2301. Jun 27 16:56:38.200218: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2302. Jun 27 16:56:38.200220: | length/value: 1 (0x1)
  2303. Jun 27 16:56:38.200223: | ******parse ISAKMP Oakley attribute:
  2304. Jun 27 16:56:38.200225: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2305. Jun 27 16:56:38.200228: | length/value: 65001 (0xfde9)
  2306. Jun 27 16:56:38.200230: | ******parse ISAKMP Oakley attribute:
  2307. Jun 27 16:56:38.200233: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2308. Jun 27 16:56:38.200235: | length/value: 1 (0x1)
  2309. Jun 27 16:56:38.200238: | ******parse ISAKMP Oakley attribute:
  2310. Jun 27 16:56:38.200241: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2311. Jun 27 16:56:38.200243: | length/value: 4 (0x4)
  2312. Jun 27 16:56:38.200246: | *****parse ISAKMP Transform Payload (ISAKMP):
  2313. Jun 27 16:56:38.200248: | next payload type: ISAKMP_NEXT_T (0x3)
  2314. Jun 27 16:56:38.200251: | length: 36 (0x24)
  2315. Jun 27 16:56:38.200253: | ISAKMP transform number: 61 (0x3d)
  2316. Jun 27 16:56:38.200256: | ISAKMP transform ID: KEY_IKE (0x1)
  2317. Jun 27 16:56:38.200258: | ******parse ISAKMP Oakley attribute:
  2318. Jun 27 16:56:38.200261: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2319. Jun 27 16:56:38.200263: | length/value: 6 (0x6)
  2320. Jun 27 16:56:38.200266: | ******parse ISAKMP Oakley attribute:
  2321. Jun 27 16:56:38.200268: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2322. Jun 27 16:56:38.200271: | length/value: 2 (0x2)
  2323. Jun 27 16:56:38.200273: | ******parse ISAKMP Oakley attribute:
  2324. Jun 27 16:56:38.200276: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2325. Jun 27 16:56:38.200278: | length/value: 14 (0xe)
  2326. Jun 27 16:56:38.200281: | ******parse ISAKMP Oakley attribute:
  2327. Jun 27 16:56:38.200283: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2328. Jun 27 16:56:38.200286: | length/value: 65001 (0xfde9)
  2329. Jun 27 16:56:38.200289: | ******parse ISAKMP Oakley attribute:
  2330. Jun 27 16:56:38.200291: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2331. Jun 27 16:56:38.200293: | length/value: 1 (0x1)
  2332. Jun 27 16:56:38.200296: | ******parse ISAKMP Oakley attribute:
  2333. Jun 27 16:56:38.200299: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2334. Jun 27 16:56:38.200301: | length/value: 4 (0x4)
  2335. Jun 27 16:56:38.200304: | *****parse ISAKMP Transform Payload (ISAKMP):
  2336. Jun 27 16:56:38.200306: | next payload type: ISAKMP_NEXT_T (0x3)
  2337. Jun 27 16:56:38.200309: | length: 36 (0x24)
  2338. Jun 27 16:56:38.200311: | ISAKMP transform number: 62 (0x3e)
  2339. Jun 27 16:56:38.200314: | ISAKMP transform ID: KEY_IKE (0x1)
  2340. Jun 27 16:56:38.200316: | ******parse ISAKMP Oakley attribute:
  2341. Jun 27 16:56:38.200319: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2342. Jun 27 16:56:38.200321: | length/value: 6 (0x6)
  2343. Jun 27 16:56:38.200324: | ******parse ISAKMP Oakley attribute:
  2344. Jun 27 16:56:38.200327: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2345. Jun 27 16:56:38.200329: | length/value: 2 (0x2)
  2346. Jun 27 16:56:38.200332: | ******parse ISAKMP Oakley attribute:
  2347. Jun 27 16:56:38.200334: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2348. Jun 27 16:56:38.200337: | length/value: 5 (0x5)
  2349. Jun 27 16:56:38.200339: | ******parse ISAKMP Oakley attribute:
  2350. Jun 27 16:56:38.200342: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2351. Jun 27 16:56:38.200344: | length/value: 65001 (0xfde9)
  2352. Jun 27 16:56:38.200347: | ******parse ISAKMP Oakley attribute:
  2353. Jun 27 16:56:38.200349: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2354. Jun 27 16:56:38.200352: | length/value: 1 (0x1)
  2355. Jun 27 16:56:38.200356: | ******parse ISAKMP Oakley attribute:
  2356. Jun 27 16:56:38.200359: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2357. Jun 27 16:56:38.200361: | length/value: 4 (0x4)
  2358. Jun 27 16:56:38.200364: | *****parse ISAKMP Transform Payload (ISAKMP):
  2359. Jun 27 16:56:38.200366: | next payload type: ISAKMP_NEXT_T (0x3)
  2360. Jun 27 16:56:38.200369: | length: 36 (0x24)
  2361. Jun 27 16:56:38.200371: | ISAKMP transform number: 63 (0x3f)
  2362. Jun 27 16:56:38.200374: | ISAKMP transform ID: KEY_IKE (0x1)
  2363. Jun 27 16:56:38.200376: | ******parse ISAKMP Oakley attribute:
  2364. Jun 27 16:56:38.200379: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2365. Jun 27 16:56:38.200381: | length/value: 6 (0x6)
  2366. Jun 27 16:56:38.200384: | ******parse ISAKMP Oakley attribute:
  2367. Jun 27 16:56:38.200386: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2368. Jun 27 16:56:38.200389: | length/value: 2 (0x2)
  2369. Jun 27 16:56:38.200391: | ******parse ISAKMP Oakley attribute:
  2370. Jun 27 16:56:38.200394: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2371. Jun 27 16:56:38.200396: | length/value: 2 (0x2)
  2372. Jun 27 16:56:38.200399: | ******parse ISAKMP Oakley attribute:
  2373. Jun 27 16:56:38.200402: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2374. Jun 27 16:56:38.200404: | length/value: 65001 (0xfde9)
  2375. Jun 27 16:56:38.200407: | ******parse ISAKMP Oakley attribute:
  2376. Jun 27 16:56:38.200409: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2377. Jun 27 16:56:38.200412: | length/value: 1 (0x1)
  2378. Jun 27 16:56:38.200414: | ******parse ISAKMP Oakley attribute:
  2379. Jun 27 16:56:38.200417: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2380. Jun 27 16:56:38.200419: | length/value: 4 (0x4)
  2381. Jun 27 16:56:38.200422: | *****parse ISAKMP Transform Payload (ISAKMP):
  2382. Jun 27 16:56:38.200424: | next payload type: ISAKMP_NEXT_T (0x3)
  2383. Jun 27 16:56:38.200427: | length: 36 (0x24)
  2384. Jun 27 16:56:38.200429: | ISAKMP transform number: 64 (0x40)
  2385. Jun 27 16:56:38.200432: | ISAKMP transform ID: KEY_IKE (0x1)
  2386. Jun 27 16:56:38.200434: | ******parse ISAKMP Oakley attribute:
  2387. Jun 27 16:56:38.200437: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2388. Jun 27 16:56:38.200440: | length/value: 6 (0x6)
  2389. Jun 27 16:56:38.200442: | ******parse ISAKMP Oakley attribute:
  2390. Jun 27 16:56:38.200445: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2391. Jun 27 16:56:38.200447: | length/value: 2 (0x2)
  2392. Jun 27 16:56:38.200450: | ******parse ISAKMP Oakley attribute:
  2393. Jun 27 16:56:38.200452: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2394. Jun 27 16:56:38.200455: | length/value: 1 (0x1)
  2395. Jun 27 16:56:38.200457: | ******parse ISAKMP Oakley attribute:
  2396. Jun 27 16:56:38.200460: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2397. Jun 27 16:56:38.200462: | length/value: 65001 (0xfde9)
  2398. Jun 27 16:56:38.200465: | ******parse ISAKMP Oakley attribute:
  2399. Jun 27 16:56:38.200467: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2400. Jun 27 16:56:38.200470: | length/value: 1 (0x1)
  2401. Jun 27 16:56:38.200472: | ******parse ISAKMP Oakley attribute:
  2402. Jun 27 16:56:38.200475: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2403. Jun 27 16:56:38.200477: | length/value: 4 (0x4)
  2404. Jun 27 16:56:38.200480: | *****parse ISAKMP Transform Payload (ISAKMP):
  2405. Jun 27 16:56:38.200483: | next payload type: ISAKMP_NEXT_T (0x3)
  2406. Jun 27 16:56:38.200485: | length: 36 (0x24)
  2407. Jun 27 16:56:38.200487: | ISAKMP transform number: 65 (0x41)
  2408. Jun 27 16:56:38.200490: | ISAKMP transform ID: KEY_IKE (0x1)
  2409. Jun 27 16:56:38.200493: | ******parse ISAKMP Oakley attribute:
  2410. Jun 27 16:56:38.200495: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2411. Jun 27 16:56:38.200498: | length/value: 1 (0x1)
  2412. Jun 27 16:56:38.200500: | ******parse ISAKMP Oakley attribute:
  2413. Jun 27 16:56:38.200503: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2414. Jun 27 16:56:38.200505: | length/value: 1 (0x1)
  2415. Jun 27 16:56:38.200508: | ******parse ISAKMP Oakley attribute:
  2416. Jun 27 16:56:38.200510: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2417. Jun 27 16:56:38.200513: | length/value: 14 (0xe)
  2418. Jun 27 16:56:38.200515: | ******parse ISAKMP Oakley attribute:
  2419. Jun 27 16:56:38.200518: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2420. Jun 27 16:56:38.200522: | length/value: 65001 (0xfde9)
  2421. Jun 27 16:56:38.200525: | ******parse ISAKMP Oakley attribute:
  2422. Jun 27 16:56:38.200528: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2423. Jun 27 16:56:38.200530: | length/value: 1 (0x1)
  2424. Jun 27 16:56:38.200533: | ******parse ISAKMP Oakley attribute:
  2425. Jun 27 16:56:38.200535: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2426. Jun 27 16:56:38.200538: | length/value: 4 (0x4)
  2427. Jun 27 16:56:38.200540: | *****parse ISAKMP Transform Payload (ISAKMP):
  2428. Jun 27 16:56:38.200543: | next payload type: ISAKMP_NEXT_T (0x3)
  2429. Jun 27 16:56:38.200545: | length: 36 (0x24)
  2430. Jun 27 16:56:38.200548: | ISAKMP transform number: 66 (0x42)
  2431. Jun 27 16:56:38.200550: | ISAKMP transform ID: KEY_IKE (0x1)
  2432. Jun 27 16:56:38.200553: | ******parse ISAKMP Oakley attribute:
  2433. Jun 27 16:56:38.200555: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2434. Jun 27 16:56:38.200558: | length/value: 1 (0x1)
  2435. Jun 27 16:56:38.200560: | ******parse ISAKMP Oakley attribute:
  2436. Jun 27 16:56:38.200563: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2437. Jun 27 16:56:38.200565: | length/value: 1 (0x1)
  2438. Jun 27 16:56:38.200568: | ******parse ISAKMP Oakley attribute:
  2439. Jun 27 16:56:38.200571: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2440. Jun 27 16:56:38.200573: | length/value: 5 (0x5)
  2441. Jun 27 16:56:38.200576: | ******parse ISAKMP Oakley attribute:
  2442. Jun 27 16:56:38.200578: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2443. Jun 27 16:56:38.200581: | length/value: 65001 (0xfde9)
  2444. Jun 27 16:56:38.200583: | ******parse ISAKMP Oakley attribute:
  2445. Jun 27 16:56:38.200586: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2446. Jun 27 16:56:38.200588: | length/value: 1 (0x1)
  2447. Jun 27 16:56:38.200591: | ******parse ISAKMP Oakley attribute:
  2448. Jun 27 16:56:38.200593: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2449. Jun 27 16:56:38.200596: | length/value: 4 (0x4)
  2450. Jun 27 16:56:38.200598: | *****parse ISAKMP Transform Payload (ISAKMP):
  2451. Jun 27 16:56:38.200601: | next payload type: ISAKMP_NEXT_T (0x3)
  2452. Jun 27 16:56:38.200603: | length: 36 (0x24)
  2453. Jun 27 16:56:38.200606: | ISAKMP transform number: 67 (0x43)
  2454. Jun 27 16:56:38.200608: | ISAKMP transform ID: KEY_IKE (0x1)
  2455. Jun 27 16:56:38.200611: | ******parse ISAKMP Oakley attribute:
  2456. Jun 27 16:56:38.200614: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2457. Jun 27 16:56:38.200616: | length/value: 1 (0x1)
  2458. Jun 27 16:56:38.200619: | ******parse ISAKMP Oakley attribute:
  2459. Jun 27 16:56:38.200621: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2460. Jun 27 16:56:38.200624: | length/value: 1 (0x1)
  2461. Jun 27 16:56:38.200626: | ******parse ISAKMP Oakley attribute:
  2462. Jun 27 16:56:38.200629: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2463. Jun 27 16:56:38.200631: | length/value: 2 (0x2)
  2464. Jun 27 16:56:38.200634: | ******parse ISAKMP Oakley attribute:
  2465. Jun 27 16:56:38.200636: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2466. Jun 27 16:56:38.200639: | length/value: 65001 (0xfde9)
  2467. Jun 27 16:56:38.200641: | ******parse ISAKMP Oakley attribute:
  2468. Jun 27 16:56:38.200644: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2469. Jun 27 16:56:38.200646: | length/value: 1 (0x1)
  2470. Jun 27 16:56:38.200649: | ******parse ISAKMP Oakley attribute:
  2471. Jun 27 16:56:38.200652: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2472. Jun 27 16:56:38.200654: | length/value: 4 (0x4)
  2473. Jun 27 16:56:38.200657: | *****parse ISAKMP Transform Payload (ISAKMP):
  2474. Jun 27 16:56:38.200659: | next payload type: ISAKMP_NEXT_T (0x3)
  2475. Jun 27 16:56:38.200662: | length: 36 (0x24)
  2476. Jun 27 16:56:38.200664: | ISAKMP transform number: 68 (0x44)
  2477. Jun 27 16:56:38.200667: | ISAKMP transform ID: KEY_IKE (0x1)
  2478. Jun 27 16:56:38.200669: | ******parse ISAKMP Oakley attribute:
  2479. Jun 27 16:56:38.200672: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2480. Jun 27 16:56:38.200674: | length/value: 1 (0x1)
  2481. Jun 27 16:56:38.200677: | ******parse ISAKMP Oakley attribute:
  2482. Jun 27 16:56:38.200679: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2483. Jun 27 16:56:38.200682: | length/value: 1 (0x1)
  2484. Jun 27 16:56:38.200684: | ******parse ISAKMP Oakley attribute:
  2485. Jun 27 16:56:38.200689: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2486. Jun 27 16:56:38.200691: | length/value: 1 (0x1)
  2487. Jun 27 16:56:38.200694: | ******parse ISAKMP Oakley attribute:
  2488. Jun 27 16:56:38.200697: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2489. Jun 27 16:56:38.200699: | length/value: 65001 (0xfde9)
  2490. Jun 27 16:56:38.200702: | ******parse ISAKMP Oakley attribute:
  2491. Jun 27 16:56:38.200704: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2492. Jun 27 16:56:38.200707: | length/value: 1 (0x1)
  2493. Jun 27 16:56:38.200709: | ******parse ISAKMP Oakley attribute:
  2494. Jun 27 16:56:38.200712: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2495. Jun 27 16:56:38.200714: | length/value: 4 (0x4)
  2496. Jun 27 16:56:38.200717: | *****parse ISAKMP Transform Payload (ISAKMP):
  2497. Jun 27 16:56:38.200719: | next payload type: ISAKMP_NEXT_T (0x3)
  2498. Jun 27 16:56:38.200722: | length: 36 (0x24)
  2499. Jun 27 16:56:38.200724: | ISAKMP transform number: 69 (0x45)
  2500. Jun 27 16:56:38.200727: | ISAKMP transform ID: KEY_IKE (0x1)
  2501. Jun 27 16:56:38.200729: | ******parse ISAKMP Oakley attribute:
  2502. Jun 27 16:56:38.200732: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2503. Jun 27 16:56:38.200734: | length/value: 1 (0x1)
  2504. Jun 27 16:56:38.200737: | ******parse ISAKMP Oakley attribute:
  2505. Jun 27 16:56:38.200739: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2506. Jun 27 16:56:38.200742: | length/value: 2 (0x2)
  2507. Jun 27 16:56:38.200744: | ******parse ISAKMP Oakley attribute:
  2508. Jun 27 16:56:38.200747: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2509. Jun 27 16:56:38.200749: | length/value: 14 (0xe)
  2510. Jun 27 16:56:38.200752: | ******parse ISAKMP Oakley attribute:
  2511. Jun 27 16:56:38.200755: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2512. Jun 27 16:56:38.200757: | length/value: 65001 (0xfde9)
  2513. Jun 27 16:56:38.200760: | ******parse ISAKMP Oakley attribute:
  2514. Jun 27 16:56:38.200762: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2515. Jun 27 16:56:38.200765: | length/value: 1 (0x1)
  2516. Jun 27 16:56:38.200767: | ******parse ISAKMP Oakley attribute:
  2517. Jun 27 16:56:38.200770: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2518. Jun 27 16:56:38.200772: | length/value: 4 (0x4)
  2519. Jun 27 16:56:38.200775: | *****parse ISAKMP Transform Payload (ISAKMP):
  2520. Jun 27 16:56:38.200777: | next payload type: ISAKMP_NEXT_T (0x3)
  2521. Jun 27 16:56:38.200780: | length: 36 (0x24)
  2522. Jun 27 16:56:38.200782: | ISAKMP transform number: 70 (0x46)
  2523. Jun 27 16:56:38.200785: | ISAKMP transform ID: KEY_IKE (0x1)
  2524. Jun 27 16:56:38.200787: | ******parse ISAKMP Oakley attribute:
  2525. Jun 27 16:56:38.200790: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2526. Jun 27 16:56:38.200793: | length/value: 1 (0x1)
  2527. Jun 27 16:56:38.200795: | ******parse ISAKMP Oakley attribute:
  2528. Jun 27 16:56:38.200798: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2529. Jun 27 16:56:38.200800: | length/value: 2 (0x2)
  2530. Jun 27 16:56:38.200803: | ******parse ISAKMP Oakley attribute:
  2531. Jun 27 16:56:38.200805: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2532. Jun 27 16:56:38.200808: | length/value: 5 (0x5)
  2533. Jun 27 16:56:38.200810: | ******parse ISAKMP Oakley attribute:
  2534. Jun 27 16:56:38.200813: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2535. Jun 27 16:56:38.200815: | length/value: 65001 (0xfde9)
  2536. Jun 27 16:56:38.200818: | ******parse ISAKMP Oakley attribute:
  2537. Jun 27 16:56:38.200820: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2538. Jun 27 16:56:38.200823: | length/value: 1 (0x1)
  2539. Jun 27 16:56:38.200825: | ******parse ISAKMP Oakley attribute:
  2540. Jun 27 16:56:38.200828: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2541. Jun 27 16:56:38.200830: | length/value: 4 (0x4)
  2542. Jun 27 16:56:38.200833: | *****parse ISAKMP Transform Payload (ISAKMP):
  2543. Jun 27 16:56:38.200836: | next payload type: ISAKMP_NEXT_T (0x3)
  2544. Jun 27 16:56:38.200838: | length: 36 (0x24)
  2545. Jun 27 16:56:38.200840: | ISAKMP transform number: 71 (0x47)
  2546. Jun 27 16:56:38.200843: | ISAKMP transform ID: KEY_IKE (0x1)
  2547. Jun 27 16:56:38.200846: | ******parse ISAKMP Oakley attribute:
  2548. Jun 27 16:56:38.200848: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2549. Jun 27 16:56:38.200851: | length/value: 1 (0x1)
  2550. Jun 27 16:56:38.200855: | ******parse ISAKMP Oakley attribute:
  2551. Jun 27 16:56:38.200858: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2552. Jun 27 16:56:38.200860: | length/value: 2 (0x2)
  2553. Jun 27 16:56:38.200863: | ******parse ISAKMP Oakley attribute:
  2554. Jun 27 16:56:38.200866: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2555. Jun 27 16:56:38.200868: | length/value: 2 (0x2)
  2556. Jun 27 16:56:38.200871: | ******parse ISAKMP Oakley attribute:
  2557. Jun 27 16:56:38.200873: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2558. Jun 27 16:56:38.200876: | length/value: 65001 (0xfde9)
  2559. Jun 27 16:56:38.200878: | ******parse ISAKMP Oakley attribute:
  2560. Jun 27 16:56:38.200881: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2561. Jun 27 16:56:38.200883: | length/value: 1 (0x1)
  2562. Jun 27 16:56:38.200886: | ******parse ISAKMP Oakley attribute:
  2563. Jun 27 16:56:38.200888: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2564. Jun 27 16:56:38.200891: | length/value: 4 (0x4)
  2565. Jun 27 16:56:38.200893: | *****parse ISAKMP Transform Payload (ISAKMP):
  2566. Jun 27 16:56:38.200896: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2567. Jun 27 16:56:38.200899: | length: 36 (0x24)
  2568. Jun 27 16:56:38.200901: | ISAKMP transform number: 72 (0x48)
  2569. Jun 27 16:56:38.200904: | ISAKMP transform ID: KEY_IKE (0x1)
  2570. Jun 27 16:56:38.200906: | ******parse ISAKMP Oakley attribute:
  2571. Jun 27 16:56:38.200909: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2572. Jun 27 16:56:38.200911: | length/value: 1 (0x1)
  2573. Jun 27 16:56:38.200914: | ******parse ISAKMP Oakley attribute:
  2574. Jun 27 16:56:38.200916: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2575. Jun 27 16:56:38.200919: | length/value: 2 (0x2)
  2576. Jun 27 16:56:38.200921: | ******parse ISAKMP Oakley attribute:
  2577. Jun 27 16:56:38.200924: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2578. Jun 27 16:56:38.200926: | length/value: 1 (0x1)
  2579. Jun 27 16:56:38.200929: | ******parse ISAKMP Oakley attribute:
  2580. Jun 27 16:56:38.200931: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2581. Jun 27 16:56:38.200934: | length/value: 65001 (0xfde9)
  2582. Jun 27 16:56:38.200936: | ******parse ISAKMP Oakley attribute:
  2583. Jun 27 16:56:38.200939: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2584. Jun 27 16:56:38.200941: | length/value: 1 (0x1)
  2585. Jun 27 16:56:38.200944: | ******parse ISAKMP Oakley attribute:
  2586. Jun 27 16:56:38.200947: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2587. Jun 27 16:56:38.200949: | length/value: 4 (0x4)
  2588. Jun 27 16:56:38.200954: | find_host_connection me=192.168.1.137:500 him=%any:500 policy=PSK+XAUTH+IKEV1_ALLOW
  2589. Jun 27 16:56:38.200958: | find_host_pair: comparing ::1:500 to :::500
  2590. Jun 27 16:56:38.200961: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  2591. Jun 27 16:56:38.200964: | find_next_host_connection policy=PSK+XAUTH+IKEV1_ALLOW
  2592. Jun 27 16:56:38.200968: | found policy = PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (xauth-aggr)
  2593. Jun 27 16:56:38.200972: | found policy = PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (xauth)
  2594. Jun 27 16:56:38.200975: | find_next_host_connection returns xauth
  2595. Jun 27 16:56:38.200979: | instantiating "xauth" for initial Main Mode message received on 192.168.1.137:500
  2596. Jun 27 16:56:38.200985: | reference addresspool of conn xauth[1] kind CK_TEMPLATE refcnt 2
  2597. Jun 27 16:56:38.200991: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  2598. Jun 27 16:56:38.200995: | find_host_pair: comparing ::1:500 to :::500
  2599. Jun 27 16:56:38.200998: | connect_to_host_pair: 192.168.1.137:500 192.168.1.138:500 -> hp:none
  2600. Jun 27 16:56:38.201002: | rw_instantiate() instantiated "xauth"[1] 192.168.1.138 for 192.168.1.138
  2601. Jun 27 16:56:38.201007: | creating state object #1 at 0x555eacc32cf8
  2602. Jun 27 16:56:38.201010: | parent state #1: new => STATE_UNDEFINED(ignore)
  2603. Jun 27 16:56:38.201017: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in main_inI1_outR1() at ikev1_main.c:757)
  2604. Jun 27 16:56:38.201020: | parent state #1: STATE_UNDEFINED(ignore) => STATE_MAIN_R0(half-open-ike)
  2605. Jun 27 16:56:38.201028: | ignore states: 0
  2606. Jun 27 16:56:38.201031: | half-open-ike states: 1
  2607. Jun 27 16:56:38.201033: | open-ike states: 0
  2608. Jun 27 16:56:38.201036: | established-anonymous-ike states: 0
  2609. Jun 27 16:56:38.201038: | established-authenticated-ike states: 0
  2610. Jun 27 16:56:38.201040: | anonymous-ipsec states: 0
  2611. Jun 27 16:56:38.201043: | authenticated-ipsec states: 0
  2612. Jun 27 16:56:38.201045: | informational states: 0
  2613. Jun 27 16:56:38.201048: | unknown states: 0
  2614. Jun 27 16:56:38.201050: | category states: 1 count states: 1
  2615. Jun 27 16:56:38.201083: | inserting state object #1
  2616. Jun 27 16:56:38.201088: | serialno list: inserting object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 into list 0x555eabcab5c0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
  2617. Jun 27 16:56:38.201092: | serialno list: inserted object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
  2618. Jun 27 16:56:38.201095: | serialno list: list entry 0x555eabcab5c0 is HEAD (older 0x555eacc334a0 newer 0x555eacc334a0)
  2619. Jun 27 16:56:38.201099: | serialno table: inserting object 0x555eacc32cf8 (state #1) entry 0x555eacc334c0 into list 0x555eabc9e360 (older 0x555eabc9e360 newer 0x555eabc9e360)
  2620. Jun 27 16:56:38.201103: | serialno table: inserted object 0x555eacc32cf8 (state #1) entry 0x555eacc334c0 (older 0x555eabc9e360 newer 0x555eabc9e360)
  2621. Jun 27 16:56:38.201106: | serialno table: list entry 0x555eabc9e360 is HEAD (older 0x555eacc334c0 newer 0x555eacc334c0)
  2622. Jun 27 16:56:38.201112: | sender checking NAT-T: enabled and 90
  2623. Jun 27 16:56:38.201114: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
  2624. Jun 27 16:56:38.201117: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
  2625. Jun 27 16:56:38.201121: "xauth"[1] 192.168.1.138 #1: responding to Main Mode from unknown peer 192.168.1.138 on port 500
  2626. Jun 27 16:56:38.201124: | ICOOKIE-DUMP: 0e 20 a4 7f 26 01 0e 7b
  2627. Jun 27 16:56:38.201148: | **emit ISAKMP Message:
  2628. Jun 27 16:56:38.201151: | initiator cookie:
  2629. Jun 27 16:56:38.201154: | 0e 20 a4 7f 26 01 0e 7b
  2630. Jun 27 16:56:38.201156: | responder cookie:
  2631. Jun 27 16:56:38.201159: | a8 fa ce 73 0d 44 8c 4b
  2632. Jun 27 16:56:38.201161: | next payload type: ISAKMP_NEXT_SA (0x1)
  2633. Jun 27 16:56:38.201164: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  2634. Jun 27 16:56:38.201167: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
  2635. Jun 27 16:56:38.201169: | flags: none (0x0)
  2636. Jun 27 16:56:38.201172: | message ID: 00 00 00 00
  2637. Jun 27 16:56:38.201175: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  2638. Jun 27 16:56:38.201178: | NAT-T VID detected, sending NAT-T VID
  2639. Jun 27 16:56:38.201180: | ***emit ISAKMP Security Association Payload:
  2640. Jun 27 16:56:38.201183: | next payload type: ISAKMP_NEXT_VID (0xd)
  2641. Jun 27 16:56:38.201186: | DOI: ISAKMP_DOI_IPSEC (0x1)
  2642. Jun 27 16:56:38.201189: | ****parse IPsec DOI SIT:
  2643. Jun 27 16:56:38.201192: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
  2644. Jun 27 16:56:38.201195: | ****parse ISAKMP Proposal Payload:
  2645. Jun 27 16:56:38.201197: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2646. Jun 27 16:56:38.201200: | length: 2792 (0xae8)
  2647. Jun 27 16:56:38.201209: | proposal number: 1 (0x1)
  2648. Jun 27 16:56:38.201213: | protocol ID: PROTO_ISAKMP (0x1)
  2649. Jun 27 16:56:38.201216: | SPI size: 0 (0x0)
  2650. Jun 27 16:56:38.201218: | number of transforms: 72 (0x48)
  2651. Jun 27 16:56:38.201222: | *****parse ISAKMP Transform Payload (ISAKMP):
  2652. Jun 27 16:56:38.201225: | next payload type: ISAKMP_NEXT_T (0x3)
  2653. Jun 27 16:56:38.201227: | length: 40 (0x28)
  2654. Jun 27 16:56:38.201230: | ISAKMP transform number: 1 (0x1)
  2655. Jun 27 16:56:38.201232: | ISAKMP transform ID: KEY_IKE (0x1)
  2656. Jun 27 16:56:38.201235: | ******parse ISAKMP Oakley attribute:
  2657. Jun 27 16:56:38.201238: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
  2658. Jun 27 16:56:38.201240: | length/value: 7 (0x7)
  2659. Jun 27 16:56:38.201243: | [7 is OAKLEY_AES_CBC]
  2660. Jun 27 16:56:38.201248: | ******parse ISAKMP Oakley attribute:
  2661. Jun 27 16:56:38.201250: | af+type: OAKLEY_KEY_LENGTH (0x800e)
  2662. Jun 27 16:56:38.201253: | length/value: 256 (0x100)
  2663. Jun 27 16:56:38.201256: | ******parse ISAKMP Oakley attribute:
  2664. Jun 27 16:56:38.201261: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
  2665. Jun 27 16:56:38.201264: | length/value: 1 (0x1)
  2666. Jun 27 16:56:38.201267: | [1 is OAKLEY_MD5]
  2667. Jun 27 16:56:38.201270: | ******parse ISAKMP Oakley attribute:
  2668. Jun 27 16:56:38.201272: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
  2669. Jun 27 16:56:38.201275: | length/value: 14 (0xe)
  2670. Jun 27 16:56:38.201288: | [14 is OAKLEY_GROUP_MODP2048]
  2671. Jun 27 16:56:38.201291: | ******parse ISAKMP Oakley attribute:
  2672. Jun 27 16:56:38.201294: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
  2673. Jun 27 16:56:38.201296: | length/value: 65001 (0xfde9)
  2674. Jun 27 16:56:38.201299: | [65001 is XAUTHInitPreShared]
  2675. Jun 27 16:56:38.201304: | started looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
  2676. Jun 27 16:56:38.201308: | actually looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
  2677. Jun 27 16:56:38.201313: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
  2678. Jun 27 16:56:38.201318: | 1: compared key 192.168.1.137 to 192.168.1.137 / 192.168.1.138 -> 8
  2679. Jun 27 16:56:38.201332: | line 1: match=9
  2680. Jun 27 16:56:38.201335: | best_match 0>9 best=0x555eacc30998 (line=1)
  2681. Jun 27 16:56:38.201338: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
  2682. Jun 27 16:56:38.201341: | ******parse ISAKMP Oakley attribute:
  2683. Jun 27 16:56:38.201344: | af+type: OAKLEY_LIFE_TYPE (0x800b)
  2684. Jun 27 16:56:38.201346: | length/value: 1 (0x1)
  2685. Jun 27 16:56:38.201349: | [1 is OAKLEY_LIFE_SECONDS]
  2686. Jun 27 16:56:38.201351: | ******parse ISAKMP Oakley attribute:
  2687. Jun 27 16:56:38.201354: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
  2688. Jun 27 16:56:38.201357: | length/value: 4 (0x4)
  2689. Jun 27 16:56:38.201359: | long duration: 86400
  2690. Jun 27 16:56:38.201365: "xauth"[1] 192.168.1.138 #1: WARNING: connection xauth PSK length of 4 bytes is too short for md5 PRF in FIPS mode (8 bytes required)
  2691. Jun 27 16:56:38.201368: | OAKLEY proposal verified unconditionally; no alg_info to check against
  2692. Jun 27 16:56:38.201371: | Oakley Transform 1 accepted
  2693. Jun 27 16:56:38.201373: | ****emit IPsec DOI SIT:
  2694. Jun 27 16:56:38.201376: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
  2695. Jun 27 16:56:38.201379: | ****emit ISAKMP Proposal Payload:
  2696. Jun 27 16:56:38.201382: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2697. Jun 27 16:56:38.201384: | proposal number: 1 (0x1)
  2698. Jun 27 16:56:38.201387: | protocol ID: PROTO_ISAKMP (0x1)
  2699. Jun 27 16:56:38.201389: | SPI size: 0 (0x0)
  2700. Jun 27 16:56:38.201392: | number of transforms: 1 (0x1)
  2701. Jun 27 16:56:38.201394: | *****emit ISAKMP Transform Payload (ISAKMP):
  2702. Jun 27 16:56:38.201397: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2703. Jun 27 16:56:38.201400: | ISAKMP transform number: 1 (0x1)
  2704. Jun 27 16:56:38.201402: | ISAKMP transform ID: KEY_IKE (0x1)
  2705. Jun 27 16:56:38.201405: | emitting 32 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP)
  2706. Jun 27 16:56:38.201408: | attributes 80 01 00 07 80 0e 01 00 80 02 00 01 80 04 00 0e
  2707. Jun 27 16:56:38.201411: | attributes 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
  2708. Jun 27 16:56:38.201414: | emitting length of ISAKMP Transform Payload (ISAKMP): 40
  2709. Jun 27 16:56:38.201416: | emitting length of ISAKMP Proposal Payload: 48
  2710. Jun 27 16:56:38.201419: | emitting length of ISAKMP Security Association Payload: 60
  2711. Jun 27 16:56:38.201422: | out_vid(): sending [Dead Peer Detection]
  2712. Jun 27 16:56:38.201425: | ***emit ISAKMP Vendor ID Payload:
  2713. Jun 27 16:56:38.201428: | next payload type: ISAKMP_NEXT_VID (0xd)
  2714. Jun 27 16:56:38.201430: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
  2715. Jun 27 16:56:38.201433: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
  2716. Jun 27 16:56:38.201436: | emitting length of ISAKMP Vendor ID Payload: 20
  2717. Jun 27 16:56:38.201438: | out_vid(): sending [FRAGMENTATION]
  2718. Jun 27 16:56:38.201441: | ***emit ISAKMP Vendor ID Payload:
  2719. Jun 27 16:56:38.201444: | next payload type: ISAKMP_NEXT_VID (0xd)
  2720. Jun 27 16:56:38.201446: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
  2721. Jun 27 16:56:38.201449: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
  2722. Jun 27 16:56:38.201455: | emitting length of ISAKMP Vendor ID Payload: 20
  2723. Jun 27 16:56:38.201457: | out_vid(): sending [XAUTH]
  2724. Jun 27 16:56:38.201460: | ***emit ISAKMP Vendor ID Payload:
  2725. Jun 27 16:56:38.201462: | next payload type: ISAKMP_NEXT_VID (0xd)
  2726. Jun 27 16:56:38.201465: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
  2727. Jun 27 16:56:38.201468: | V_ID 09 00 26 89 df d6 b7 12
  2728. Jun 27 16:56:38.201470: | emitting length of ISAKMP Vendor ID Payload: 12
  2729. Jun 27 16:56:38.201473: | out_vid(): sending [RFC 3947]
  2730. Jun 27 16:56:38.201475: | ***emit ISAKMP Vendor ID Payload:
  2731. Jun 27 16:56:38.201478: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2732. Jun 27 16:56:38.201480: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
  2733. Jun 27 16:56:38.201483: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
  2734. Jun 27 16:56:38.201486: | emitting length of ISAKMP Vendor ID Payload: 20
  2735. Jun 27 16:56:38.201488: | no IKEv1 message padding required
  2736. Jun 27 16:56:38.201491: | emitting length of ISAKMP Message: 160
  2737. Jun 27 16:56:38.201496: | complete v1 state transition with STF_OK
  2738. Jun 27 16:56:38.201501: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  2739. Jun 27 16:56:38.201504: | #1 is idle
  2740. Jun 27 16:56:38.201507: | doing_xauth:yes, t_xauth_client_done:no
  2741. Jun 27 16:56:38.201509: | peer supports fragmentation
  2742. Jun 27 16:56:38.201512: | peer supports dpd
  2743. Jun 27 16:56:38.201514: | dpd is active locally
  2744. Jun 27 16:56:38.201517: | IKEv1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  2745. Jun 27 16:56:38.201520: | parent state #1: STATE_MAIN_R0(half-open-ike) => STATE_MAIN_R1(open-ike)
  2746. Jun 27 16:56:38.201522: | ignore states: 0
  2747. Jun 27 16:56:38.201525: | half-open-ike states: 0
  2748. Jun 27 16:56:38.201527: | open-ike states: 1
  2749. Jun 27 16:56:38.201530: | established-anonymous-ike states: 0
  2750. Jun 27 16:56:38.201532: | established-authenticated-ike states: 0
  2751. Jun 27 16:56:38.201535: | anonymous-ipsec states: 0
  2752. Jun 27 16:56:38.201537: | authenticated-ipsec states: 0
  2753. Jun 27 16:56:38.201539: | informational states: 0
  2754. Jun 27 16:56:38.201542: | unknown states: 0
  2755. Jun 27 16:56:38.201544: | category states: 1 count states: 1
  2756. Jun 27 16:56:38.201547: | event_already_set, deleting event
  2757. Jun 27 16:56:38.201550: | state #1 requesting to delete non existing event
  2758. Jun 27 16:56:38.201554: | sending reply packet to 192.168.1.138:500 (from port 500)
  2759. Jun 27 16:56:38.201559: | sending 160 bytes for STATE_MAIN_R0 through eth0:500 to 192.168.1.138:500 (using #1)
  2760. Jun 27 16:56:38.201562: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  2761. Jun 27 16:56:38.201564: | 01 10 02 00 00 00 00 00 00 00 00 a0 0d 00 00 3c
  2762. Jun 27 16:56:38.201567: | 00 00 00 01 00 00 00 01 00 00 00 30 01 01 00 01
  2763. Jun 27 16:56:38.201569: | 00 00 00 28 01 01 00 00 80 01 00 07 80 0e 01 00
  2764. Jun 27 16:56:38.201572: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
  2765. Jun 27 16:56:38.201574: | 00 0c 00 04 00 01 51 80 0d 00 00 14 af ca d7 13
  2766. Jun 27 16:56:38.201577: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 0d 00 00 14
  2767. Jun 27 16:56:38.201579: | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
  2768. Jun 27 16:56:38.201581: | 0d 00 00 0c 09 00 26 89 df d6 b7 12 00 00 00 14
  2769. Jun 27 16:56:38.201584: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
  2770. Jun 27 16:56:38.207446: | !event_already_set at reschedule
  2771. Jun 27 16:56:38.207558: | event_schedule: new EVENT_SO_DISCARD-pe@0x555eacc306e8
  2772. Jun 27 16:56:38.207681: | inserting event EVENT_SO_DISCARD, timeout in 60.000 seconds for #1
  2773. Jun 27 16:56:38.207785: "xauth"[1] 192.168.1.138 #1: STATE_MAIN_R1: sent MR1, expecting MI2
  2774. Jun 27 16:56:38.207896: | modecfg pull: quirk-poll policy:pull not-client
  2775. Jun 27 16:56:38.207989: | phase 1 is done, looking for phase 2 to unpend
  2776. Jun 27 16:56:38.208101: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  2777. Jun 27 16:56:38.208201: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  2778. Jun 27 16:56:38.208323: | serialno table: hash serialno #0 to head 0x555eabc9e340
  2779. Jun 27 16:56:38.208426: | serialno table: hash serialno #0 to head 0x555eabc9e340
  2780. Jun 27 16:56:38.208537: | processing: STOP connection NULL (in process_md() at demux.c:397)
  2781. Jun 27 16:56:38.208872: | *received 352 bytes from 192.168.1.138:500 on eth0 (port=500)
  2782. Jun 27 16:56:38.208969: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  2783. Jun 27 16:56:38.209079: | 04 10 02 00 00 00 00 00 00 00 01 60 0a 00 01 04
  2784. Jun 27 16:56:38.209288: | 4c 6b 88 2e 72 ce 5f 62 c7 d1 dc 2c 4b fa 04 af
  2785. Jun 27 16:56:38.209418: | 29 e1 c2 60 a3 15 1c fa f5 85 2d 6d 12 a7 1d 57
  2786. Jun 27 16:56:38.209560: | 56 93 08 e0 e7 f7 fe 08 f5 fd be ea 02 64 67 b4
  2787. Jun 27 16:56:38.209710: | a7 b5 ce 95 d0 5f 30 f9 b8 62 be c8 53 ac 44 d2
  2788. Jun 27 16:56:38.209875: | 57 32 7d 8e c0 68 dd f2 06 ee a5 fb 95 aa 3e f7
  2789. Jun 27 16:56:38.210000: | 10 97 7b ad 1c 4f ee 22 de 42 80 33 16 06 36 51
  2790. Jun 27 16:56:38.210162: | 48 63 f4 6f a6 21 2e ad 56 cc c7 fb cd d0 97 17
  2791. Jun 27 16:56:38.210282: | 03 b3 8d 32 3c 34 cf a3 ec b5 31 5e dd 42 8d 55
  2792. Jun 27 16:56:38.210406: | 65 fd 3a 74 fd c0 3e ef af 75 4d 04 c9 89 3b a2
  2793. Jun 27 16:56:38.210537: | 1d c8 70 7e 62 12 f7 5b 49 98 97 1e cd e1 ad 2e
  2794. Jun 27 16:56:38.210673: | c3 0f a3 27 a5 8a 8a 76 b4 b2 21 41 ca c5 52 e9
  2795. Jun 27 16:56:38.210754: | 3a e5 cf 5d 3c 3a f1 07 1d 2b 95 6d 03 87 c5 ec
  2796. Jun 27 16:56:38.210860: | 14 ba b3 e6 0c e3 9c 07 53 94 5a e2 77 d7 4e ae
  2797. Jun 27 16:56:38.210950: | 28 96 40 c4 1e 50 b1 0f 44 9b a6 6a 95 7d b4 28
  2798. Jun 27 16:56:38.211040: | 34 b0 19 31 01 a0 36 33 c2 e8 18 ca 01 c9 ce ee
  2799. Jun 27 16:56:38.211159: | 92 bc d8 c0 13 b0 13 ac 9e e2 4b 4b 30 c5 87 c2
  2800. Jun 27 16:56:38.211306: | 14 00 00 18 47 89 0d 6f 4c fa d0 97 ac 13 42 20
  2801. Jun 27 16:56:38.211388: | 1e 90 47 f5 57 0b 1c 46 14 00 00 14 6e 69 ca 60
  2802. Jun 27 16:56:38.211491: | 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61 00 00 00 14
  2803. Jun 27 16:56:38.211569: | 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
  2804. Jun 27 16:56:38.211675: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  2805. Jun 27 16:56:38.211796: | **parse ISAKMP Message:
  2806. Jun 27 16:56:38.211901: | initiator cookie:
  2807. Jun 27 16:56:38.211989: | 0e 20 a4 7f 26 01 0e 7b
  2808. Jun 27 16:56:38.212062: | responder cookie:
  2809. Jun 27 16:56:38.212159: | a8 fa ce 73 0d 44 8c 4b
  2810. Jun 27 16:56:38.212256: | next payload type: ISAKMP_NEXT_KE (0x4)
  2811. Jun 27 16:56:38.212336: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  2812. Jun 27 16:56:38.212423: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
  2813. Jun 27 16:56:38.212496: | flags: none (0x0)
  2814. Jun 27 16:56:38.212581: | message ID: 00 00 00 00
  2815. Jun 27 16:56:38.212655: | length: 352 (0x160)
  2816. Jun 27 16:56:38.212749: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
  2817. Jun 27 16:56:38.212824: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  2818. Jun 27 16:56:38.212929: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  2819. Jun 27 16:56:38.212949: | v1 state object #1 found, in STATE_MAIN_R1
  2820. Jun 27 16:56:38.212967: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1117)
  2821. Jun 27 16:56:38.212981: | #1 is idle
  2822. Jun 27 16:56:38.212994: | #1 idle
  2823. Jun 27 16:56:38.213069: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080
  2824. Jun 27 16:56:38.213089: | ***parse ISAKMP Key Exchange Payload:
  2825. Jun 27 16:56:38.213103: | next payload type: ISAKMP_NEXT_NONCE (0xa)
  2826. Jun 27 16:56:38.213116: | length: 260 (0x104)
  2827. Jun 27 16:56:38.213130: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080
  2828. Jun 27 16:56:38.213144: | ***parse ISAKMP Nonce Payload:
  2829. Jun 27 16:56:38.213157: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
  2830. Jun 27 16:56:38.213170: | length: 24 (0x18)
  2831. Jun 27 16:56:38.213278: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080
  2832. Jun 27 16:56:38.213306: | ***parse ISAKMP NAT-D Payload:
  2833. Jun 27 16:56:38.213321: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
  2834. Jun 27 16:56:38.213335: | length: 20 (0x14)
  2835. Jun 27 16:56:38.213349: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080
  2836. Jun 27 16:56:38.213362: | ***parse ISAKMP NAT-D Payload:
  2837. Jun 27 16:56:38.213376: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2838. Jun 27 16:56:38.213389: | length: 20 (0x14)
  2839. Jun 27 16:56:38.213406: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal)
  2840. Jun 27 16:56:38.213440: | natd_hash: hasher=0x555eabc8a400(16)
  2841. Jun 27 16:56:38.213524: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
  2842. Jun 27 16:56:38.213544: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
  2843. Jun 27 16:56:38.213558: | natd_hash: ip= c0 a8 01 89
  2844. Jun 27 16:56:38.213572: | natd_hash: port=500
  2845. Jun 27 16:56:38.213586: | natd_hash: hash= 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
  2846. Jun 27 16:56:38.213608: | natd_hash: hasher=0x555eabc8a400(16)
  2847. Jun 27 16:56:38.213683: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
  2848. Jun 27 16:56:38.213703: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
  2849. Jun 27 16:56:38.213717: | natd_hash: ip= c0 a8 01 8a
  2850. Jun 27 16:56:38.213731: | natd_hash: port=500
  2851. Jun 27 16:56:38.213745: | natd_hash: hash= 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
  2852. Jun 27 16:56:38.213759: | expected NAT-D(me): 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
  2853. Jun 27 16:56:38.213773: | expected NAT-D(him):
  2854. Jun 27 16:56:38.213868: | 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
  2855. Jun 27 16:56:38.213889: | received NAT-D: 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
  2856. Jun 27 16:56:38.213904: | received NAT-D: 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
  2857. Jun 27 16:56:38.213918: | NAT_TRAVERSAL encaps using auto-detect
  2858. Jun 27 16:56:38.213932: | NAT_TRAVERSAL this end is NOT behind NAT
  2859. Jun 27 16:56:38.213945: | NAT_TRAVERSAL that end is NOT behind NAT
  2860. Jun 27 16:56:38.213960: | NAT_TRAVERSAL nat_keepalive enabled 192.168.1.138
  2861. Jun 27 16:56:38.213975: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
  2862. Jun 27 16:56:38.213989: | NAT_T_WITH_KA detected
  2863. Jun 27 16:56:38.214004: | event_schedule: new EVENT_NAT_T_KEEPALIVE-pe@0x555eacc31d58
  2864. Jun 27 16:56:38.214077: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20.000 seconds
  2865. Jun 27 16:56:38.214104: | adding inI2_outR2 KE work-order 1 for state #1
  2866. Jun 27 16:56:38.214120: | state #1 requesting EVENT_SO_DISCARD to be deleted
  2867. Jun 27 16:56:38.214136: | free_event_entry: release EVENT_SO_DISCARD-pe@0x555eacc306e8
  2868. Jun 27 16:56:38.214151: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
  2869. Jun 27 16:56:38.214166: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1
  2870. Jun 27 16:56:38.214237: | backlog: inserting object 0x555eacc34e48 (work-order 1 state #1) entry 0x555eacc34e50 into list 0x555eabcac5e0 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  2871. Jun 27 16:56:38.214259: | backlog: inserted object 0x555eacc34e48 (work-order 1 state #1) entry 0x555eacc34e50 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  2872. Jun 27 16:56:38.214273: | backlog: list entry 0x555eabcac5e0 is HEAD (older 0x555eacc34e50 newer 0x555eacc34e50)
  2873. Jun 27 16:56:38.214301: | crypto helper 1 resuming
  2874. Jun 27 16:56:38.214308: | backlog: removing object 0x555eacc34e48 (work-order 1 state #1) entry 0x555eacc34e50 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  2875. Jun 27 16:56:38.214311: | backlog: empty
  2876. Jun 27 16:56:38.214314: | crypto helper 1 starting work-order 1 for state #1
  2877. Jun 27 16:56:38.214318: | crypto helper 1 doing build KE and nonce; request ID 1
  2878. Jun 27 16:56:38.215089: | crypto helper 1 finished build KE and nonce; request ID 1 time elapsed 770 usec
  2879. Jun 27 16:56:38.215095: | crypto helper 1 sending results from work-order 1 for state #1 to event queue
  2880. Jun 27 16:56:38.215099: | scheduling now-event sending helper answer for #1
  2881. Jun 27 16:56:38.215105: | crypto helper 1 waiting (nothing to do)
  2882. Jun 27 16:56:38.215127: | complete v1 state transition with STF_SUSPEND
  2883. Jun 27 16:56:38.215146: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2272)
  2884. Jun 27 16:56:38.215257: | suspending state #1 and saving MD
  2885. Jun 27 16:56:38.215279: | #1 is busy; has a suspended MD
  2886. Jun 27 16:56:38.215295: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  2887. Jun 27 16:56:38.215311: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  2888. Jun 27 16:56:38.215325: | serialno table: hash serialno #0 to head 0x555eabc9e340
  2889. Jun 27 16:56:38.215339: | serialno table: hash serialno #0 to head 0x555eabc9e340
  2890. Jun 27 16:56:38.215353: | processing: STOP connection NULL (in process_md() at demux.c:397)
  2891. Jun 27 16:56:38.215375: | executing now-event sending helper answer for 1
  2892. Jun 27 16:56:38.215389: | serialno table: hash serialno #1 to head 0x555eabc9e360
  2893. Jun 27 16:56:38.215482: | serialno table: hash serialno #1 to head 0x555eabc9e360
  2894. Jun 27 16:56:38.215506: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
  2895. Jun 27 16:56:38.215522: | crypto helper 1 replies to request ID 1
  2896. Jun 27 16:56:38.215535: | calling continuation function 0x555eab9a0d60
  2897. Jun 27 16:56:38.215549: | main_inI2_outR2_continue for #1: calculated ke+nonce, sending R2
  2898. Jun 27 16:56:38.215570: | **emit ISAKMP Message:
  2899. Jun 27 16:56:38.215586: | initiator cookie:
  2900. Jun 27 16:56:38.215600: | 0e 20 a4 7f 26 01 0e 7b
  2901. Jun 27 16:56:38.215613: | responder cookie:
  2902. Jun 27 16:56:38.215705: | a8 fa ce 73 0d 44 8c 4b
  2903. Jun 27 16:56:38.215726: | next payload type: ISAKMP_NEXT_KE (0x4)
  2904. Jun 27 16:56:38.215741: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  2905. Jun 27 16:56:38.215755: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
  2906. Jun 27 16:56:38.215769: | flags: none (0x0)
  2907. Jun 27 16:56:38.215784: | message ID: 00 00 00 00
  2908. Jun 27 16:56:38.215798: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  2909. Jun 27 16:56:38.215814: | ***emit ISAKMP Key Exchange Payload:
  2910. Jun 27 16:56:38.215828: | next payload type: ISAKMP_NEXT_NONCE (0xa)
  2911. Jun 27 16:56:38.215843: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
  2912. Jun 27 16:56:38.215915: | keyex value 44 66 ea 21 62 11 e8 95 7b 6d ba 6c 4c 2a f2 f2
  2913. Jun 27 16:56:38.215935: | keyex value 24 e9 e3 b3 7f bc 25 61 fd 6c fb 82 f4 62 b9 aa
  2914. Jun 27 16:56:38.215950: | keyex value 65 c0 40 4e fe 87 8a f5 c1 6f 2f 7c 1f a9 4f af
  2915. Jun 27 16:56:38.215964: | keyex value 98 bf 81 63 81 07 ca f4 e6 bb 2d e1 51 08 4f 6b
  2916. Jun 27 16:56:38.215977: | keyex value 30 a8 d5 0d 5d f6 85 9e b3 35 a0 2b 8f 69 d9 25
  2917. Jun 27 16:56:38.215991: | keyex value d4 f0 d8 5e 23 97 73 74 df 1b d5 db 9f 67 8a 15
  2918. Jun 27 16:56:38.216004: | keyex value 39 f1 ac 8b c3 2e 72 a7 9d fb 5e c5 d1 61 69 a1
  2919. Jun 27 16:56:38.216073: | keyex value 7e ed 47 1a 5d 53 41 8a 8e b2 5e 2e a7 d5 99 3b
  2920. Jun 27 16:56:38.216093: | keyex value a3 9b 88 b6 77 8b ce 4c 02 1d d9 2b 51 d7 dd ad
  2921. Jun 27 16:56:38.216107: | keyex value e3 43 ee 8d 2b 4c 53 22 a1 18 ab 6e 6d 63 ad 44
  2922. Jun 27 16:56:38.216121: | keyex value dd 23 31 90 6c ad 90 91 8b 09 8a 60 a8 2d a7 6f
  2923. Jun 27 16:56:38.216134: | keyex value 74 46 c1 d8 b6 66 b6 8a 85 ae f4 52 72 65 84 5d
  2924. Jun 27 16:56:38.216148: | keyex value cf 07 ee 01 91 42 27 37 02 9f fa eb 2a e9 6d 6e
  2925. Jun 27 16:56:38.216162: | keyex value cb 04 0a 53 3b 85 8a fa 87 3f bd c9 11 34 55 05
  2926. Jun 27 16:56:38.216175: | keyex value 96 91 9c 5a 79 20 8d 1f 91 7e 6f 6a ab 13 48 e9
  2927. Jun 27 16:56:38.216265: | keyex value 1c df 41 25 8d 0f af c7 d9 27 91 7b 80 04 41 93
  2928. Jun 27 16:56:38.216286: | emitting length of ISAKMP Key Exchange Payload: 260
  2929. Jun 27 16:56:38.216301: | ***emit ISAKMP Nonce Payload:
  2930. Jun 27 16:56:38.216315: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2931. Jun 27 16:56:38.216330: | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
  2932. Jun 27 16:56:38.216344: | Nr ca 78 22 43 0b 08 92 6c 71 af f1 28 55 c3 02 90
  2933. Jun 27 16:56:38.216363: | Nr c8 60 ac bf ae 21 c1 58 9f f8 5d 2c 79 d1 cb 20
  2934. Jun 27 16:56:38.216378: | emitting length of ISAKMP Nonce Payload: 36
  2935. Jun 27 16:56:38.216392: | sending NAT-D payloads
  2936. Jun 27 16:56:38.216471: | natd_hash: hasher=0x555eabc8a400(16)
  2937. Jun 27 16:56:38.216493: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
  2938. Jun 27 16:56:38.216507: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
  2939. Jun 27 16:56:38.216521: | natd_hash: ip= c0 a8 01 8a
  2940. Jun 27 16:56:38.216535: | natd_hash: port=500
  2941. Jun 27 16:56:38.216604: | natd_hash: hash= 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
  2942. Jun 27 16:56:38.216624: | ***emit ISAKMP NAT-D Payload:
  2943. Jun 27 16:56:38.216639: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
  2944. Jun 27 16:56:38.216654: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
  2945. Jun 27 16:56:38.216668: | NAT-D 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
  2946. Jun 27 16:56:38.216682: | emitting length of ISAKMP NAT-D Payload: 20
  2947. Jun 27 16:56:38.216704: | natd_hash: hasher=0x555eabc8a400(16)
  2948. Jun 27 16:56:38.216799: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
  2949. Jun 27 16:56:38.216820: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
  2950. Jun 27 16:56:38.216835: | natd_hash: ip= c0 a8 01 89
  2951. Jun 27 16:56:38.216848: | natd_hash: port=500
  2952. Jun 27 16:56:38.216862: | natd_hash: hash= 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
  2953. Jun 27 16:56:38.216876: | ***emit ISAKMP NAT-D Payload:
  2954. Jun 27 16:56:38.216890: | next payload type: ISAKMP_NEXT_NONE (0x0)
  2955. Jun 27 16:56:38.216905: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
  2956. Jun 27 16:56:38.216919: | NAT-D 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
  2957. Jun 27 16:56:38.216989: | emitting length of ISAKMP NAT-D Payload: 20
  2958. Jun 27 16:56:38.217009: | no IKEv1 message padding required
  2959. Jun 27 16:56:38.217023: | emitting length of ISAKMP Message: 364
  2960. Jun 27 16:56:38.217037: | main inI2_outR2: starting async DH calculation (group=14)
  2961. Jun 27 16:56:38.217053: | started looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
  2962. Jun 27 16:56:38.217068: | actually looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
  2963. Jun 27 16:56:38.217083: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
  2964. Jun 27 16:56:38.217153: | 1: compared key 192.168.1.137 to 192.168.1.137 / 192.168.1.138 -> 8
  2965. Jun 27 16:56:38.217172: | line 1: match=9
  2966. Jun 27 16:56:38.217187: | best_match 0>9 best=0x555eacc30998 (line=1)
  2967. Jun 27 16:56:38.217201: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
  2968. Jun 27 16:56:38.217228: | adding main_inI2_outR2_tail work-order 2 for state #1
  2969. Jun 27 16:56:38.217328: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
  2970. Jun 27 16:56:38.217350: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
  2971. Jun 27 16:56:38.217365: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
  2972. Jun 27 16:56:38.217380: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1
  2973. Jun 27 16:56:38.217396: | backlog: inserting object 0x555eacc35a18 (work-order 2 state #1) entry 0x555eacc35a20 into list 0x555eabcac5e0 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  2974. Jun 27 16:56:38.217411: | backlog: inserted object 0x555eacc35a18 (work-order 2 state #1) entry 0x555eacc35a20 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  2975. Jun 27 16:56:38.217425: | backlog: list entry 0x555eabcac5e0 is HEAD (older 0x555eacc35a20 newer 0x555eacc35a20)
  2976. Jun 27 16:56:38.217448: | crypto helper 0 resuming
  2977. Jun 27 16:56:38.217455: | backlog: removing object 0x555eacc35a18 (work-order 2 state #1) entry 0x555eacc35a20 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  2978. Jun 27 16:56:38.217458: | backlog: empty
  2979. Jun 27 16:56:38.217461: | crypto helper 0 starting work-order 2 for state #1
  2980. Jun 27 16:56:38.217464: | crypto helper 0 doing compute dh+iv (V1 Phase 1); request ID 2
  2981. Jun 27 16:56:38.218382: | crypto helper 0 finished compute dh+iv (V1 Phase 1); request ID 2 time elapsed 918 usec
  2982. Jun 27 16:56:38.218389: | crypto helper 0 sending results from work-order 2 for state #1 to event queue
  2983. Jun 27 16:56:38.218392: | scheduling now-event sending helper answer for #1
  2984. Jun 27 16:56:38.218401: | crypto helper 0 waiting (nothing to do)
  2985. Jun 27 16:56:38.218422: | #1 main_inI2_outR2_continue1_tail:1301 st->st_calculating = FALSE;
  2986. Jun 27 16:56:38.218437: | complete v1 state transition with STF_OK
  2987. Jun 27 16:56:38.218545: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  2988. Jun 27 16:56:38.218566: | #1 is idle; has background offloaded task
  2989. Jun 27 16:56:38.218580: | doing_xauth:yes, t_xauth_client_done:no
  2990. Jun 27 16:56:38.218594: | IKEv1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  2991. Jun 27 16:56:38.218608: | parent state #1: STATE_MAIN_R1(open-ike) => STATE_MAIN_R2(open-ike)
  2992. Jun 27 16:56:38.218622: | ignore states: 0
  2993. Jun 27 16:56:38.218635: | half-open-ike states: 0
  2994. Jun 27 16:56:38.218648: | open-ike states: 1
  2995. Jun 27 16:56:38.218661: | established-anonymous-ike states: 0
  2996. Jun 27 16:56:38.218674: | established-authenticated-ike states: 0
  2997. Jun 27 16:56:38.218687: | anonymous-ipsec states: 0
  2998. Jun 27 16:56:38.218700: | authenticated-ipsec states: 0
  2999. Jun 27 16:56:38.218713: | informational states: 0
  3000. Jun 27 16:56:38.218783: | unknown states: 0
  3001. Jun 27 16:56:38.218803: | category states: 1 count states: 1
  3002. Jun 27 16:56:38.218816: | event_already_set, deleting event
  3003. Jun 27 16:56:38.218830: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
  3004. Jun 27 16:56:38.218844: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
  3005. Jun 27 16:56:38.218861: | sending reply packet to 192.168.1.138:500 (from port 500)
  3006. Jun 27 16:56:38.218879: | sending 364 bytes for STATE_MAIN_R1 through eth0:500 to 192.168.1.138:500 (using #1)
  3007. Jun 27 16:56:38.218970: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3008. Jun 27 16:56:38.218990: | 04 10 02 00 00 00 00 00 00 00 01 6c 0a 00 01 04
  3009. Jun 27 16:56:38.219003: | 44 66 ea 21 62 11 e8 95 7b 6d ba 6c 4c 2a f2 f2
  3010. Jun 27 16:56:38.219016: | 24 e9 e3 b3 7f bc 25 61 fd 6c fb 82 f4 62 b9 aa
  3011. Jun 27 16:56:38.219029: | 65 c0 40 4e fe 87 8a f5 c1 6f 2f 7c 1f a9 4f af
  3012. Jun 27 16:56:38.219042: | 98 bf 81 63 81 07 ca f4 e6 bb 2d e1 51 08 4f 6b
  3013. Jun 27 16:56:38.219055: | 30 a8 d5 0d 5d f6 85 9e b3 35 a0 2b 8f 69 d9 25
  3014. Jun 27 16:56:38.219068: | d4 f0 d8 5e 23 97 73 74 df 1b d5 db 9f 67 8a 15
  3015. Jun 27 16:56:38.219081: | 39 f1 ac 8b c3 2e 72 a7 9d fb 5e c5 d1 61 69 a1
  3016. Jun 27 16:56:38.219094: | 7e ed 47 1a 5d 53 41 8a 8e b2 5e 2e a7 d5 99 3b
  3017. Jun 27 16:56:38.219161: | a3 9b 88 b6 77 8b ce 4c 02 1d d9 2b 51 d7 dd ad
  3018. Jun 27 16:56:38.219179: | e3 43 ee 8d 2b 4c 53 22 a1 18 ab 6e 6d 63 ad 44
  3019. Jun 27 16:56:38.219193: | dd 23 31 90 6c ad 90 91 8b 09 8a 60 a8 2d a7 6f
  3020. Jun 27 16:56:38.219205: | 74 46 c1 d8 b6 66 b6 8a 85 ae f4 52 72 65 84 5d
  3021. Jun 27 16:56:38.219218: | cf 07 ee 01 91 42 27 37 02 9f fa eb 2a e9 6d 6e
  3022. Jun 27 16:56:38.219231: | cb 04 0a 53 3b 85 8a fa 87 3f bd c9 11 34 55 05
  3023. Jun 27 16:56:38.219244: | 96 91 9c 5a 79 20 8d 1f 91 7e 6f 6a ab 13 48 e9
  3024. Jun 27 16:56:38.219258: | 1c df 41 25 8d 0f af c7 d9 27 91 7b 80 04 41 93
  3025. Jun 27 16:56:38.219359: | 14 00 00 24 ca 78 22 43 0b 08 92 6c 71 af f1 28
  3026. Jun 27 16:56:38.219380: | 55 c3 02 90 c8 60 ac bf ae 21 c1 58 9f f8 5d 2c
  3027. Jun 27 16:56:38.219394: | 79 d1 cb 20 14 00 00 14 55 27 a7 51 79 5f a3 e2
  3028. Jun 27 16:56:38.219406: | 4b 30 f9 e6 2c 5c 60 ce 00 00 00 14 6e 69 ca 60
  3029. Jun 27 16:56:38.219419: | 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
  3030. Jun 27 16:56:38.219490: | !event_already_set at reschedule
  3031. Jun 27 16:56:38.219614: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
  3032. Jun 27 16:56:38.219651: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1
  3033. Jun 27 16:56:38.219678: | #1 STATE_MAIN_R2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4234.264
  3034. Jun 27 16:56:38.219704: "xauth"[1] 192.168.1.138 #1: STATE_MAIN_R2: sent MR2, expecting MI3
  3035. Jun 27 16:56:38.219725: | modecfg pull: quirk-poll policy:pull not-client
  3036. Jun 27 16:56:38.219860: | phase 1 is done, looking for phase 2 to unpend
  3037. Jun 27 16:56:38.219902: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:597)
  3038. Jun 27 16:56:38.219924: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3039. Jun 27 16:56:38.219943: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3040. Jun 27 16:56:38.219971: | executing now-event sending helper answer for 1
  3041. Jun 27 16:56:38.219990: | serialno table: hash serialno #1 to head 0x555eabc9e360
  3042. Jun 27 16:56:38.220008: | serialno table: hash serialno #1 to head 0x555eabc9e360
  3043. Jun 27 16:56:38.220029: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
  3044. Jun 27 16:56:38.220047: | crypto helper 0 replies to request ID 2
  3045. Jun 27 16:56:38.220175: | calling continuation function 0x555eab99de00
  3046. Jun 27 16:56:38.220200: | main_inI2_outR2_calcdone for #1: calculate DH finished
  3047. Jun 27 16:56:38.220222: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1152)
  3048. Jun 27 16:56:38.220244: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1165)
  3049. Jun 27 16:56:38.220263: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3050. Jun 27 16:56:38.220280: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3051. Jun 27 16:56:38.220299: | processing: STOP state #0 (in schedule_event_now_cb() at server.c:597)
  3052. Jun 27 16:56:38.220317: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3053. Jun 27 16:56:38.220334: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3054. Jun 27 16:56:38.224552: | *received 60 bytes from 192.168.1.138:500 on eth0 (port=500)
  3055. Jun 27 16:56:38.224830: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3056. Jun 27 16:56:38.224975: | 05 10 02 01 00 00 00 00 00 00 00 3c 82 b9 14 59
  3057. Jun 27 16:56:38.225004: | 84 83 42 da 41 74 17 04 86 a9 90 63 f5 5b c3 58
  3058. Jun 27 16:56:38.225026: | f1 4c a6 45 1c cf cc 98 8e 21 c2 dd
  3059. Jun 27 16:56:38.225048: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  3060. Jun 27 16:56:38.225074: | **parse ISAKMP Message:
  3061. Jun 27 16:56:38.225097: | initiator cookie:
  3062. Jun 27 16:56:38.225118: | 0e 20 a4 7f 26 01 0e 7b
  3063. Jun 27 16:56:38.225142: | responder cookie:
  3064. Jun 27 16:56:38.225164: | a8 fa ce 73 0d 44 8c 4b
  3065. Jun 27 16:56:38.225396: | next payload type: ISAKMP_NEXT_ID (0x5)
  3066. Jun 27 16:56:38.225431: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3067. Jun 27 16:56:38.225454: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
  3068. Jun 27 16:56:38.225489: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3069. Jun 27 16:56:38.225513: | message ID: 00 00 00 00
  3070. Jun 27 16:56:38.225536: | length: 60 (0x3c)
  3071. Jun 27 16:56:38.225560: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
  3072. Jun 27 16:56:38.225593: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3073. Jun 27 16:56:38.225621: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  3074. Jun 27 16:56:38.225643: | v1 state object #1 found, in STATE_MAIN_R2
  3075. Jun 27 16:56:38.225672: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1117)
  3076. Jun 27 16:56:38.225696: | #1 is idle
  3077. Jun 27 16:56:38.225715: | #1 idle
  3078. Jun 27 16:56:38.225790: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x120opt: 0x2080
  3079. Jun 27 16:56:38.225928: | ***parse ISAKMP Identification Payload:
  3080. Jun 27 16:56:38.225950: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3081. Jun 27 16:56:38.225964: | length: 8 (0x8)
  3082. Jun 27 16:56:38.225989: | ID type: ID_FQDN (0x2)
  3083. Jun 27 16:56:38.226002: | DOI specific A: 0 (0x0)
  3084. Jun 27 16:56:38.226015: | DOI specific B: 0 (0x0)
  3085. Jun 27 16:56:38.226028: | obj:
  3086. Jun 27 16:56:38.226140: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x2080
  3087. Jun 27 16:56:38.226174: | ***parse ISAKMP Hash Payload:
  3088. Jun 27 16:56:38.226188: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3089. Jun 27 16:56:38.226212: | length: 20 (0x14)
  3090. Jun 27 16:56:38.226226: | removing 4 bytes of padding
  3091. Jun 27 16:56:38.226245: "xauth"[1] 192.168.1.138 #1: Peer ID is ID_FQDN: '@'
  3092. Jun 27 16:56:38.226259: | X509: no CERT payloads to process
  3093. Jun 27 16:56:38.226274: | refine_host_connection for IKEv1: starting with "xauth"[1] 192.168.1.138
  3094. Jun 27 16:56:38.226289: | match_id a=@
  3095. Jun 27 16:56:38.226384: | b=192.168.1.138
  3096. Jun 27 16:56:38.226415: | results fail
  3097. Jun 27 16:56:38.226432: | refine_host_connection: checking "xauth"[1] 192.168.1.138 against "xauth"[1] 192.168.1.138, best=(none) with match=0(id=0/ca=1/reqca=1)
  3098. Jun 27 16:56:38.226446: | Warning: not switching back to template of current instance
  3099. Jun 27 16:56:38.226459: | No IDr payload received from peer
  3100. Jun 27 16:56:38.226472: | skipping because peer_id does not match
  3101. Jun 27 16:56:38.226485: | refine going into 2nd loop allowing instantiated conns as well
  3102. Jun 27 16:56:38.226499: | find_host_pair: comparing 192.168.1.137:500 to 192.168.1.138:500
  3103. Jun 27 16:56:38.226513: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  3104. Jun 27 16:56:38.226527: | match_id a=@
  3105. Jun 27 16:56:38.226540: | b=(none)
  3106. Jun 27 16:56:38.226645: | results matched
  3107. Jun 27 16:56:38.226668: | refine_host_connection: checking "xauth"[1] 192.168.1.138 against "xauth-aggr", best=(none) with match=1(id=1/ca=1/reqca=1)
  3108. Jun 27 16:56:38.226693: | Warning: not switching back to template of current instance
  3109. Jun 27 16:56:38.226706: | No IDr payload received from peer
  3110. Jun 27 16:56:38.226719: | match_id a=@
  3111. Jun 27 16:56:38.226732: | b=(none)
  3112. Jun 27 16:56:38.226746: | results matched
  3113. Jun 27 16:56:38.226761: | refine_host_connection: checking "xauth"[1] 192.168.1.138 against "xauth", best=(none) with match=1(id=1/ca=1/reqca=1)
  3114. Jun 27 16:56:38.226774: | Warning: not switching back to template of current instance
  3115. Jun 27 16:56:38.226787: | No IDr payload received from peer
  3116. Jun 27 16:56:38.226872: | refine_host_connection: checked xauth[1] 192.168.1.138 against xauth, now for see if best
  3117. Jun 27 16:56:38.226895: | started looking for secret for 192.168.1.137->(none) of kind PKK_PSK
  3118. Jun 27 16:56:38.226921: | replace him to 0.0.0.0
  3119. Jun 27 16:56:38.226935: | actually looking for secret for 192.168.1.137->%any of kind PKK_PSK
  3120. Jun 27 16:56:38.226950: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
  3121. Jun 27 16:56:38.226964: | 1: compared key 192.168.1.137 to 192.168.1.137 / %any -> 8
  3122. Jun 27 16:56:38.226978: | line 1: match=9
  3123. Jun 27 16:56:38.227059: | best_match 0>9 best=0x555eacc30998 (line=1)
  3124. Jun 27 16:56:38.227129: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
  3125. Jun 27 16:56:38.227211: | refine_host_connection: picking new best "xauth" (wild=15, peer_pathlen=0/our=0)
  3126. Jun 27 16:56:38.227231: | returning since no better match then original best_found
  3127. Jun 27 16:56:38.227256: | offered CA: '%none'
  3128. Jun 27 16:56:38.227271: "xauth"[1] 192.168.1.138 #1: switched from "xauth"[1] 192.168.1.138 to "xauth"
  3129. Jun 27 16:56:38.227287: | match_id a=@
  3130. Jun 27 16:56:38.227301: | b=(none)
  3131. Jun 27 16:56:38.227430: | results matched
  3132. Jun 27 16:56:38.227453: | reference addresspool of conn xauth[2] kind CK_TEMPLATE refcnt 3
  3133. Jun 27 16:56:38.227469: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
  3134. Jun 27 16:56:38.227483: | find_host_pair: comparing 192.168.1.137:500 to 192.168.1.138:500
  3135. Jun 27 16:56:38.227497: | connect_to_host_pair: 192.168.1.137:500 192.168.1.138:500 -> hp:xauth
  3136. Jun 27 16:56:38.227511: | rw_instantiate() instantiated "xauth"[2] 192.168.1.138 for 192.168.1.138
  3137. Jun 27 16:56:38.227525: | start processing: connection NULL (in update_state_connection() at connections.c:4418)
  3138. Jun 27 16:56:38.227539: | in connection_discard for connection xauth
  3139. Jun 27 16:56:38.227551: | connection is instance
  3140. Jun 27 16:56:38.227565: | not in pending use
  3141. Jun 27 16:56:38.227577: | no states use this connection, deleting
  3142. Jun 27 16:56:38.227592: | processing: start connection "xauth"[1] 192.168.1.138 (BACKGROUND) (in delete_connection() at connections.c:264)
  3143. Jun 27 16:56:38.227613: "xauth"[2] 192.168.1.138 #1: deleting connection "xauth"[1] 192.168.1.138 instance with peer 192.168.1.138 {isakmp=#0/ipsec=#0}
  3144. Jun 27 16:56:38.227701: | Deleting states for connection - not including other IPsec SA's
  3145. Jun 27 16:56:38.227721: | pass 0
  3146. Jun 27 16:56:38.227746: | state #1
  3147. Jun 27 16:56:38.227759: | pass 1
  3148. Jun 27 16:56:38.227771: | state #1
  3149. Jun 27 16:56:38.227786: | unreference addresspool of conn xauth[1] kind CK_GOING_AWAY refcnt 4
  3150. Jun 27 16:56:38.227800: | processing: stop connection "xauth" (BACKGROUND) (in delete_connection() at connections.c:314)
  3151. Jun 27 16:56:38.227816: | retrying ike_decode_peer_id() with new conn
  3152. Jun 27 16:56:38.227831: "xauth"[2] 192.168.1.138 #1: Peer ID is ID_FQDN: '@'
  3153. Jun 27 16:56:38.227845: | X509: no CERT payloads to process
  3154. Jun 27 16:56:38.227950: | refine_host_connection for IKEv1: starting with "xauth"[2] 192.168.1.138
  3155. Jun 27 16:56:38.227972: | match_id a=@
  3156. Jun 27 16:56:38.227986: | b=@
  3157. Jun 27 16:56:38.228000: | results matched
  3158. Jun 27 16:56:38.228016: | refine_host_connection: checking "xauth"[2] 192.168.1.138 against "xauth"[2] 192.168.1.138, best=(none) with match=1(id=1/ca=1/reqca=1)
  3159. Jun 27 16:56:38.228031: | Warning: not switching back to template of current instance
  3160. Jun 27 16:56:38.228044: | No IDr payload received from peer
  3161. Jun 27 16:56:38.228060: | refine_host_connection: checked xauth[2] 192.168.1.138 against xauth[2] 192.168.1.138, now for see if best
  3162. Jun 27 16:56:38.228076: | started looking for secret for 192.168.1.137->@ of kind PKK_PSK
  3163. Jun 27 16:56:38.228091: | actually looking for secret for 192.168.1.137->@ of kind PKK_PSK
  3164. Jun 27 16:56:38.228107: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
  3165. Jun 27 16:56:38.228192: | 1: compared key 192.168.1.137 to 192.168.1.137 / @ -> 8
  3166. Jun 27 16:56:38.228225: | line 1: match=9
  3167. Jun 27 16:56:38.228239: | best_match 0>9 best=0x555eacc30998 (line=1)
  3168. Jun 27 16:56:38.228252: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
  3169. Jun 27 16:56:38.228266: | returning because exact peer id match
  3170. Jun 27 16:56:38.228280: | offered CA: '%none'
  3171. Jun 27 16:56:38.228381: | thinking about whether to send my certificate:
  3172. Jun 27 16:56:38.228540: | I have RSA key: OAKLEY_PRESHARED_KEY cert.type: 0??
  3173. Jun 27 16:56:38.228564: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request
  3174. Jun 27 16:56:38.228580: | so do not send cert.
  3175. Jun 27 16:56:38.228671: | I did not send a certificate because digital signatures are not being used. (PSK)
  3176. Jun 27 16:56:38.228733: | **emit ISAKMP Message:
  3177. Jun 27 16:56:38.228818: | initiator cookie:
  3178. Jun 27 16:56:38.228901: | 0e 20 a4 7f 26 01 0e 7b
  3179. Jun 27 16:56:38.228922: | responder cookie:
  3180. Jun 27 16:56:38.228937: | a8 fa ce 73 0d 44 8c 4b
  3181. Jun 27 16:56:38.228951: | next payload type: ISAKMP_NEXT_ID (0x5)
  3182. Jun 27 16:56:38.228966: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3183. Jun 27 16:56:38.229056: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
  3184. Jun 27 16:56:38.229091: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3185. Jun 27 16:56:38.229109: | message ID: 00 00 00 00
  3186. Jun 27 16:56:38.229125: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  3187. Jun 27 16:56:38.229144: | ***emit ISAKMP Identification Payload (IPsec DOI):
  3188. Jun 27 16:56:38.229158: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3189. Jun 27 16:56:38.229173: | ID type: ID_IPV4_ADDR (0x1)
  3190. Jun 27 16:56:38.229337: | Protocol ID: 0 (0x0)
  3191. Jun 27 16:56:38.229362: | port: 0 (0x0)
  3192. Jun 27 16:56:38.229380: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
  3193. Jun 27 16:56:38.229485: | my identity c0 a8 01 89
  3194. Jun 27 16:56:38.229508: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12
  3195. Jun 27 16:56:38.229627: | ***emit ISAKMP Hash Payload:
  3196. Jun 27 16:56:38.229748: | next payload type: ISAKMP_NEXT_VID (0xd)
  3197. Jun 27 16:56:38.229868: | emitting 16 raw bytes of HASH_R into ISAKMP Hash Payload
  3198. Jun 27 16:56:38.229894: | HASH_R bd 17 50 ae 6e e2 09 c4 36 9a e1 3f 51 b5 5d 1e
  3199. Jun 27 16:56:38.229927: | emitting length of ISAKMP Hash Payload: 20
  3200. Jun 27 16:56:38.229944: | out_vid(): sending [CAN-IKEv2]
  3201. Jun 27 16:56:38.229959: | ***emit ISAKMP Vendor ID Payload:
  3202. Jun 27 16:56:38.229974: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3203. Jun 27 16:56:38.229990: | emitting 5 raw bytes of V_ID into ISAKMP Vendor ID Payload
  3204. Jun 27 16:56:38.230094: | V_ID 49 4b 45 76 32
  3205. Jun 27 16:56:38.230117: | emitting length of ISAKMP Vendor ID Payload: 9
  3206. Jun 27 16:56:38.230135: | encrypting: 08 00 00 0c 01 00 00 00 c0 a8 01 89 0d 00 00 14
  3207. Jun 27 16:56:38.230149: | encrypting: bd 17 50 ae 6e e2 09 c4 36 9a e1 3f 51 b5 5d 1e
  3208. Jun 27 16:56:38.230165: | encrypting: 00 00 00 09 49 4b 45 76 32
  3209. Jun 27 16:56:38.230180: | IV: f5 5b c3 58 f1 4c a6 45 1c cf cc 98 8e 21 c2 dd
  3210. Jun 27 16:56:38.230196: | emitting 7 zero bytes of encryption padding into ISAKMP Message
  3211. Jun 27 16:56:38.230238: | no IKEv1 message padding required
  3212. Jun 27 16:56:38.230346: | emitting length of ISAKMP Message: 76
  3213. Jun 27 16:56:38.230370: | We are a server using PSK and clients are using a group ID
  3214. Jun 27 16:56:38.230385: | complete v1 state transition with STF_OK
  3215. Jun 27 16:56:38.230408: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  3216. Jun 27 16:56:38.230424: | #1 is idle
  3217. Jun 27 16:56:38.230439: | doing_xauth:yes, t_xauth_client_done:no
  3218. Jun 27 16:56:38.230454: | IKEv1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
  3219. Jun 27 16:56:38.230578: | parent state #1: STATE_MAIN_R2(open-ike) => STATE_MAIN_R3(established-authenticated-ike)
  3220. Jun 27 16:56:38.230599: | ignore states: 0
  3221. Jun 27 16:56:38.230612: | half-open-ike states: 0
  3222. Jun 27 16:56:38.230625: | open-ike states: 0
  3223. Jun 27 16:56:38.230638: | established-anonymous-ike states: 0
  3224. Jun 27 16:56:38.230651: | established-authenticated-ike states: 1
  3225. Jun 27 16:56:38.230664: | anonymous-ipsec states: 0
  3226. Jun 27 16:56:38.230677: | authenticated-ipsec states: 0
  3227. Jun 27 16:56:38.230690: | informational states: 0
  3228. Jun 27 16:56:38.230703: | unknown states: 0
  3229. Jun 27 16:56:38.230716: | category states: 1 count states: 1
  3230. Jun 27 16:56:38.230730: | event_already_set, deleting event
  3231. Jun 27 16:56:38.230743: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted
  3232. Jun 27 16:56:38.230757: | #1 STATE_MAIN_R3: retransmits: cleared
  3233. Jun 27 16:56:38.230774: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
  3234. Jun 27 16:56:38.230868: | sending reply packet to 192.168.1.138:500 (from port 500)
  3235. Jun 27 16:56:38.230901: | sending 76 bytes for STATE_MAIN_R2 through eth0:500 to 192.168.1.138:500 (using #1)
  3236. Jun 27 16:56:38.230924: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3237. Jun 27 16:56:38.230937: | 05 10 02 01 00 00 00 00 00 00 00 4c 7a 10 fe 4d
  3238. Jun 27 16:56:38.230951: | c2 c4 6f eb 54 33 a9 50 ab d1 ac d5 71 3e fa 0b
  3239. Jun 27 16:56:38.231058: | ac fa 70 a4 18 79 35 d1 48 14 57 c7 c7 9d f0 14
  3240. Jun 27 16:56:38.231077: | ae 38 e1 98 2a ad 29 9c 8b 4d 39 24
  3241. Jun 27 16:56:38.231148: | !event_already_set at reschedule
  3242. Jun 27 16:56:38.231183: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc306e8
  3243. Jun 27 16:56:38.231339: | inserting event EVENT_SA_REPLACE, timeout in 28530.000 seconds for #1
  3244. Jun 27 16:56:38.231376: "xauth"[2] 192.168.1.138 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=md5 group=MODP2048}
  3245. Jun 27 16:56:38.231406: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3246. Jun 27 16:56:38.231429: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  3247. Jun 27 16:56:38.231453: | v1 state object #1 found, in STATE_MAIN_R3
  3248. Jun 27 16:56:38.231538: | Dead Peer Detection (RFC 3706): enabled
  3249. Jun 27 16:56:38.231563: | event_schedule: new EVENT_DPD-pe@0x555eacc32818
  3250. Jun 27 16:56:38.231716: | inserting event EVENT_DPD, timeout in 10.000 seconds for #1
  3251. Jun 27 16:56:38.231739: | XAUTH: Sending XAUTH Login/Password Request
  3252. Jun 27 16:56:38.231754: | event_schedule: new EVENT_v1_SEND_XAUTH-pe@0x555eacc30858
  3253. Jun 27 16:56:38.231775: | inserting event EVENT_v1_SEND_XAUTH, timeout in 0.080 seconds for #1
  3254. Jun 27 16:56:38.231793: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  3255. Jun 27 16:56:38.231810: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  3256. Jun 27 16:56:38.231902: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3257. Jun 27 16:56:38.231921: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3258. Jun 27 16:56:38.231936: | processing: STOP connection NULL (in process_md() at demux.c:397)
  3259. Jun 27 16:56:38.231966: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
  3260. Jun 27 16:56:38.231981: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3261. Jun 27 16:56:38.232060: | 08 10 05 01 ee 25 c9 80 00 00 00 4c ab 10 44 fb
  3262. Jun 27 16:56:38.232088: | c8 ae 03 12 07 15 7d c7 9e 3d 81 bb 73 5d e4 30
  3263. Jun 27 16:56:38.232102: | 58 38 0c e3 85 07 7f 48 33 2d 06 32 d2 a8 13 80
  3264. Jun 27 16:56:38.232114: | e5 7f 36 0e c4 37 d8 0b 31 60 f0 fb
  3265. Jun 27 16:56:38.232129: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  3266. Jun 27 16:56:38.232143: | **parse ISAKMP Message:
  3267. Jun 27 16:56:38.232157: | initiator cookie:
  3268. Jun 27 16:56:38.232266: | 0e 20 a4 7f 26 01 0e 7b
  3269. Jun 27 16:56:38.232286: | responder cookie:
  3270. Jun 27 16:56:38.232300: | a8 fa ce 73 0d 44 8c 4b
  3271. Jun 27 16:56:38.232313: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3272. Jun 27 16:56:38.232327: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3273. Jun 27 16:56:38.232340: | exchange type: ISAKMP_XCHG_INFO (0x5)
  3274. Jun 27 16:56:38.232354: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3275. Jun 27 16:56:38.232367: | message ID: ee 25 c9 80
  3276. Jun 27 16:56:38.232380: | length: 76 (0x4c)
  3277. Jun 27 16:56:38.232394: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
  3278. Jun 27 16:56:38.232411: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3279. Jun 27 16:56:38.232425: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
  3280. Jun 27 16:56:38.232536: | p15 state object #1 found, in STATE_MAIN_R3
  3281. Jun 27 16:56:38.232558: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1137)
  3282. Jun 27 16:56:38.232583: | #1 is idle
  3283. Jun 27 16:56:38.232598: | #1 idle
  3284. Jun 27 16:56:38.232621: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x0
  3285. Jun 27 16:56:38.232637: | ***parse ISAKMP Hash Payload:
  3286. Jun 27 16:56:38.232650: | next payload type: ISAKMP_NEXT_N (0xb)
  3287. Jun 27 16:56:38.232663: | length: 20 (0x14)
  3288. Jun 27 16:56:38.232677: | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0opt: 0x0
  3289. Jun 27 16:56:38.232690: | ***parse ISAKMP Notification Payload:
  3290. Jun 27 16:56:38.232772: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3291. Jun 27 16:56:38.232800: | length: 28 (0x1c)
  3292. Jun 27 16:56:38.232815: | DOI: ISAKMP_DOI_IPSEC (0x1)
  3293. Jun 27 16:56:38.232829: | protocol ID: 1 (0x1)
  3294. Jun 27 16:56:38.232843: | SPI size: 16 (0x10)
  3295. Jun 27 16:56:38.232857: | Notify Message Type: IPSEC_INITIAL_CONTACT (0x6002)
  3296. Jun 27 16:56:38.232873: "xauth"[2] 192.168.1.138 #1: ignoring informational payload IPSEC_INITIAL_CONTACT, msgid=00000000, length=28
  3297. Jun 27 16:56:38.232955: | ISAKMP Notification Payload
  3298. Jun 27 16:56:38.232983: | 00 00 00 1c 00 00 00 01 01 10 60 02
  3299. Jun 27 16:56:38.232997: | info: 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3300. Jun 27 16:56:38.233011: | processing informational IPSEC_INITIAL_CONTACT (24578)
  3301. Jun 27 16:56:38.233026: "xauth"[2] 192.168.1.138 #1: received and ignored informational message
  3302. Jun 27 16:56:38.233039: | complete v1 state transition with STF_IGNORE
  3303. Jun 27 16:56:38.233054: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  3304. Jun 27 16:56:38.233166: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  3305. Jun 27 16:56:38.233191: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3306. Jun 27 16:56:38.233223: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3307. Jun 27 16:56:38.233239: | processing: STOP connection NULL (in process_md() at demux.c:397)
  3308. Jun 27 16:56:38.306979: | timer_event_cb: processing event@0x555eacc30858
  3309. Jun 27 16:56:38.307869: | handling event EVENT_v1_SEND_XAUTH for parent state #1
  3310. Jun 27 16:56:38.308026: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in timer_event_cb() at timer.c:296)
  3311. Jun 27 16:56:38.308101: | XAUTH: event EVENT_v1_SEND_XAUTH #1 STATE_MAIN_R3
  3312. Jun 27 16:56:38.308177: "xauth"[2] 192.168.1.138 #1: XAUTH: Sending Username/Password request (MAIN_R3->XAUTH_R0)
  3313. Jun 27 16:56:38.308271: | parent state #1: STATE_MAIN_R3(established-authenticated-ike) => STATE_XAUTH_R0(established-authenticated-ike)
  3314. Jun 27 16:56:38.308340: | ignore states: 0
  3315. Jun 27 16:56:38.308385: | half-open-ike states: 0
  3316. Jun 27 16:56:38.308419: | open-ike states: 0
  3317. Jun 27 16:56:38.308447: | established-anonymous-ike states: 0
  3318. Jun 27 16:56:38.308466: | established-authenticated-ike states: 1
  3319. Jun 27 16:56:38.308483: | anonymous-ipsec states: 0
  3320. Jun 27 16:56:38.308506: | authenticated-ipsec states: 0
  3321. Jun 27 16:56:38.308547: | informational states: 0
  3322. Jun 27 16:56:38.308590: | unknown states: 0
  3323. Jun 27 16:56:38.308910: | category states: 1 count states: 1
  3324. Jun 27 16:56:38.308967: | **emit ISAKMP Message:
  3325. Jun 27 16:56:38.309190: | initiator cookie:
  3326. Jun 27 16:56:38.309453: | 0e 20 a4 7f 26 01 0e 7b
  3327. Jun 27 16:56:38.309495: | responder cookie:
  3328. Jun 27 16:56:38.309518: | a8 fa ce 73 0d 44 8c 4b
  3329. Jun 27 16:56:38.309542: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3330. Jun 27 16:56:38.309564: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3331. Jun 27 16:56:38.309587: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
  3332. Jun 27 16:56:38.309608: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3333. Jun 27 16:56:38.309628: | message ID: 90 b4 ba eb
  3334. Jun 27 16:56:38.309652: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  3335. Jun 27 16:56:38.309673: | ***emit ISAKMP Hash Payload:
  3336. Jun 27 16:56:38.309695: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
  3337. Jun 27 16:56:38.309719: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
  3338. Jun 27 16:56:38.309740: | emitting length of ISAKMP Hash Payload: 20
  3339. Jun 27 16:56:38.309761: | ***emit ISAKMP Mode Attribute:
  3340. Jun 27 16:56:38.309783: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3341. Jun 27 16:56:38.309994: | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1)
  3342. Jun 27 16:56:38.310029: | Identifier: 0 (0x0)
  3343. Jun 27 16:56:38.310173: | ****emit ISAKMP ModeCfg attribute:
  3344. Jun 27 16:56:38.310337: | ModeCfg attr type: XAUTH-USER-NAME (0x4089)
  3345. Jun 27 16:56:38.310371: | length/value: 0 (0x0)
  3346. Jun 27 16:56:38.310391: | emitting length of ISAKMP ModeCfg attribute: 0
  3347. Jun 27 16:56:38.310412: | ****emit ISAKMP ModeCfg attribute:
  3348. Jun 27 16:56:38.310432: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a)
  3349. Jun 27 16:56:38.310450: | length/value: 0 (0x0)
  3350. Jun 27 16:56:38.310468: | emitting length of ISAKMP ModeCfg attribute: 0
  3351. Jun 27 16:56:38.310489: | no IKEv1 message padding required
  3352. Jun 27 16:56:38.310509: | emitting length of ISAKMP Mode Attribute: 16
  3353. Jun 27 16:56:38.310716: | XAUTH: HASH computed:
  3354. Jun 27 16:56:38.310879: | ba 5c ec b2 6b d0 9d 07 1f e5 74 3e df 83 1f c8
  3355. Jun 27 16:56:38.311095: | no IKEv1 message padding required
  3356. Jun 27 16:56:38.311127: | emitting length of ISAKMP Message: 64
  3357. Jun 27 16:56:38.311181: | encrypting: 0e 00 00 14 ba 5c ec b2 6b d0 9d 07 1f e5 74 3e
  3358. Jun 27 16:56:38.311207: | encrypting: df 83 1f c8 00 00 00 10 01 00 00 00 40 89 00 00
  3359. Jun 27 16:56:38.311225: | encrypting: 40 8a 00 00
  3360. Jun 27 16:56:38.311399: | IV: 25 e2 d2 0a 55 4d 04 36 d2 6d 05 14 50 e7 2b 3f
  3361. Jun 27 16:56:38.311494: | emitting 12 zero bytes of encryption padding into ISAKMP Message
  3362. Jun 27 16:56:38.311571: | no IKEv1 message padding required
  3363. Jun 27 16:56:38.311738: | emitting length of ISAKMP Message: 76
  3364. Jun 27 16:56:38.311818: | sending 76 bytes for XAUTH: req through eth0:500 to 192.168.1.138:500 (using #1)
  3365. Jun 27 16:56:38.311838: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3366. Jun 27 16:56:38.311854: | 08 10 06 01 90 b4 ba eb 00 00 00 4c a7 bf 29 75
  3367. Jun 27 16:56:38.311869: | ea 11 21 4f 9d 87 52 4a f3 81 36 5c 2f 47 c9 b1
  3368. Jun 27 16:56:38.311887: | c9 ce 00 4a 0c af 50 89 1a 02 ac 7c e2 b3 32 d3
  3369. Jun 27 16:56:38.311905: | a5 2f b1 ec c2 59 80 97 58 d0 ba 66
  3370. Jun 27 16:56:38.312020: | state #1 requesting EVENT_SA_REPLACE to be deleted
  3371. Jun 27 16:56:38.312140: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc306e8
  3372. Jun 27 16:56:38.312330: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
  3373. Jun 27 16:56:38.312364: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1
  3374. Jun 27 16:56:38.312395: | #1 STATE_XAUTH_R0: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4234.357
  3375. Jun 27 16:56:38.312421: | free_event_entry: release EVENT_v1_SEND_XAUTH-pe@0x555eacc30858
  3376. Jun 27 16:56:38.312448: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in timer_event_cb() at timer.c:641)
  3377. Jun 27 16:56:38.312551: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3378. Jun 27 16:56:38.312709: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3379. Jun 27 16:56:38.312961: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
  3380. Jun 27 16:56:38.312995: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3381. Jun 27 16:56:38.313026: | 08 10 06 01 90 b4 ba eb 00 00 00 4c 25 2b 00 7b
  3382. Jun 27 16:56:38.313050: | 20 b3 89 66 36 8a 57 01 44 27 03 3a 8c c8 fa c8
  3383. Jun 27 16:56:38.313071: | df 03 35 59 a8 93 59 4a 09 8f 41 6b 83 4a bf 81
  3384. Jun 27 16:56:38.313086: | 17 7d 99 d6 ce 71 8a 25 e9 bb 60 bc
  3385. Jun 27 16:56:38.313107: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  3386. Jun 27 16:56:38.313127: | **parse ISAKMP Message:
  3387. Jun 27 16:56:38.313144: | initiator cookie:
  3388. Jun 27 16:56:38.313159: | 0e 20 a4 7f 26 01 0e 7b
  3389. Jun 27 16:56:38.313175: | responder cookie:
  3390. Jun 27 16:56:38.313190: | a8 fa ce 73 0d 44 8c 4b
  3391. Jun 27 16:56:38.313229: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3392. Jun 27 16:56:38.313359: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3393. Jun 27 16:56:38.313456: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
  3394. Jun 27 16:56:38.313482: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3395. Jun 27 16:56:38.313498: | message ID: 90 b4 ba eb
  3396. Jun 27 16:56:38.313514: | length: 76 (0x4c)
  3397. Jun 27 16:56:38.313530: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6)
  3398. Jun 27 16:56:38.313552: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3399. Jun 27 16:56:38.313571: | peer and cookies match on #1; msgid=90b4baeb st_msgid=00000000 st_msgid_phase15=90b4baeb
  3400. Jun 27 16:56:38.313677: | p15 state object #1 found, in STATE_XAUTH_R0
  3401. Jun 27 16:56:38.313712: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1475)
  3402. Jun 27 16:56:38.313731: | #1 is idle
  3403. Jun 27 16:56:38.313747: | #1 idle
  3404. Jun 27 16:56:38.313808: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100opt: 0x2000
  3405. Jun 27 16:56:38.313908: | ***parse ISAKMP Hash Payload:
  3406. Jun 27 16:56:38.313932: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
  3407. Jun 27 16:56:38.314016: | length: 20 (0x14)
  3408. Jun 27 16:56:38.314036: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000opt: 0x2000
  3409. Jun 27 16:56:38.314123: | ***parse ISAKMP Mode Attribute:
  3410. Jun 27 16:56:38.314148: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3411. Jun 27 16:56:38.314163: | length: 26 (0x1a)
  3412. Jun 27 16:56:38.314178: | Attr Msg Type: ISAKMP_CFG_REPLY (0x2)
  3413. Jun 27 16:56:38.314194: | Identifier: 0 (0x0)
  3414. Jun 27 16:56:38.314209: | removing 2 bytes of padding
  3415. Jun 27 16:56:38.314319: | XAUTH: HASH computed:
  3416. Jun 27 16:56:38.314415: | 24 46 6c ae 85 bc 39 4b c8 72 e6 15 68 88 c3 a6
  3417. Jun 27 16:56:38.314568: | ****parse ISAKMP ModeCfg attribute:
  3418. Jun 27 16:56:38.314712: | ModeCfg attr type: 49288?? (0xc088)
  3419. Jun 27 16:56:38.314804: | length/value: 0 (0x0)
  3420. Jun 27 16:56:38.314913: | ****parse ISAKMP ModeCfg attribute:
  3421. Jun 27 16:56:38.314938: | ModeCfg attr type: XAUTH-USER-NAME (0x4089)
  3422. Jun 27 16:56:38.314954: | length/value: 3 (0x3)
  3423. Jun 27 16:56:38.314970: | ****parse ISAKMP ModeCfg attribute:
  3424. Jun 27 16:56:38.314986: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a)
  3425. Jun 27 16:56:38.315000: | length/value: 3 (0x3)
  3426. Jun 27 16:56:38.315016: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted
  3427. Jun 27 16:56:38.315033: | #1 STATE_XAUTH_R0: retransmits: cleared
  3428. Jun 27 16:56:38.315052: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
  3429. Jun 27 16:56:38.315151: | state #1 requesting N/A-pe@(nil) be deleted
  3430. Jun 27 16:56:38.315186: | delete_pluto_event cannot delete NULL event
  3431. Jun 27 16:56:38.315206: "xauth"[2] 192.168.1.138 #1: XAUTH: authentication method 'always ok' requested to authenticate user 'sss'
  3432. Jun 27 16:56:38.315222: | scheduling now-event xauth immediate for #1
  3433. Jun 27 16:56:38.315241: | complete v1 state transition with STF_SUSPEND
  3434. Jun 27 16:56:38.315398: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2272)
  3435. Jun 27 16:56:38.315437: | suspending state #1 and saving MD
  3436. Jun 27 16:56:38.315453: | #1 is busy; has a suspended MD
  3437. Jun 27 16:56:38.315471: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  3438. Jun 27 16:56:38.315489: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  3439. Jun 27 16:56:38.315518: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3440. Jun 27 16:56:38.315534: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3441. Jun 27 16:56:38.315550: | processing: STOP connection NULL (in process_md() at demux.c:397)
  3442. Jun 27 16:56:38.315573: | executing now-event xauth immediate for 1
  3443. Jun 27 16:56:38.315588: | serialno table: hash serialno #1 to head 0x555eabc9e360
  3444. Jun 27 16:56:38.315691: | serialno table: hash serialno #1 to head 0x555eabc9e360
  3445. Jun 27 16:56:38.315730: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
  3446. Jun 27 16:56:38.315748: "xauth"[2] 192.168.1.138 #1: XAUTH: User sss: Authentication Successful
  3447. Jun 27 16:56:38.315787: | **emit ISAKMP Message:
  3448. Jun 27 16:56:38.315888: | initiator cookie:
  3449. Jun 27 16:56:38.315924: | 0e 20 a4 7f 26 01 0e 7b
  3450. Jun 27 16:56:38.315940: | responder cookie:
  3451. Jun 27 16:56:38.315953: | a8 fa ce 73 0d 44 8c 4b
  3452. Jun 27 16:56:38.315967: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3453. Jun 27 16:56:38.315981: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3454. Jun 27 16:56:38.316009: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
  3455. Jun 27 16:56:38.316023: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3456. Jun 27 16:56:38.316170: | message ID: a8 d2 b0 b2
  3457. Jun 27 16:56:38.316195: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  3458. Jun 27 16:56:38.316211: | ***emit ISAKMP Hash Payload:
  3459. Jun 27 16:56:38.316226: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
  3460. Jun 27 16:56:38.316241: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
  3461. Jun 27 16:56:38.316255: | emitting length of ISAKMP Hash Payload: 20
  3462. Jun 27 16:56:38.316268: | ***emit ISAKMP Mode Attribute:
  3463. Jun 27 16:56:38.316283: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3464. Jun 27 16:56:38.316297: | Attr Msg Type: ISAKMP_CFG_SET (0x3)
  3465. Jun 27 16:56:38.316325: | Identifier: 0 (0x0)
  3466. Jun 27 16:56:38.316339: | ****emit ISAKMP ModeCfg attribute:
  3467. Jun 27 16:56:38.316368: | ModeCfg attr type: 49295?? (0xc08f)
  3468. Jun 27 16:56:38.316381: | length/value: 1 (0x1)
  3469. Jun 27 16:56:38.316394: | no IKEv1 message padding required
  3470. Jun 27 16:56:38.316408: | emitting length of ISAKMP Mode Attribute: 12
  3471. Jun 27 16:56:38.316649: | XAUTH: HASH computed:
  3472. Jun 27 16:56:38.316788: | 95 e0 81 61 ed df bb 02 6b ed 3e 06 98 e3 86 48
  3473. Jun 27 16:56:38.316824: | no IKEv1 message padding required
  3474. Jun 27 16:56:38.316840: | emitting length of ISAKMP Message: 60
  3475. Jun 27 16:56:38.316868: | encrypting: 0e 00 00 14 95 e0 81 61 ed df bb 02 6b ed 3e 06
  3476. Jun 27 16:56:38.316997: | encrypting: 98 e3 86 48 00 00 00 0c 03 00 00 00 c0 8f 00 01
  3477. Jun 27 16:56:38.317019: | IV: 18 57 9f 56 c5 dc b8 3b 22 3c 40 2e 35 bf f7 48
  3478. Jun 27 16:56:38.317053: | no IKEv1 message padding required
  3479. Jun 27 16:56:38.317071: | emitting length of ISAKMP Message: 60
  3480. Jun 27 16:56:38.317085: | state #1 requesting to delete non existing event
  3481. Jun 27 16:56:38.317103: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
  3482. Jun 27 16:56:38.317119: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1
  3483. Jun 27 16:56:38.317260: | #1 STATE_XAUTH_R0: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4234.361
  3484. Jun 27 16:56:38.317290: | sending 60 bytes for XAUTH: status through eth0:500 to 192.168.1.138:500 (using #1)
  3485. Jun 27 16:56:38.317306: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3486. Jun 27 16:56:38.317322: | 08 10 06 01 a8 d2 b0 b2 00 00 00 3c cb e2 f6 82
  3487. Jun 27 16:56:38.317335: | b3 d1 e6 03 33 96 79 9b 40 3c 78 a3 ba ed fd 5e
  3488. Jun 27 16:56:38.317349: | 07 45 b9 1a 8d db 81 db d5 4f 0f e4
  3489. Jun 27 16:56:38.317442: | parent state #1: STATE_XAUTH_R0(established-authenticated-ike) => STATE_XAUTH_R1(established-authenticated-ike)
  3490. Jun 27 16:56:38.317587: | ignore states: 0
  3491. Jun 27 16:56:38.317693: | half-open-ike states: 0
  3492. Jun 27 16:56:38.317719: | open-ike states: 0
  3493. Jun 27 16:56:38.317736: | established-anonymous-ike states: 0
  3494. Jun 27 16:56:38.317752: | established-authenticated-ike states: 1
  3495. Jun 27 16:56:38.317876: | anonymous-ipsec states: 0
  3496. Jun 27 16:56:38.317905: | authenticated-ipsec states: 0
  3497. Jun 27 16:56:38.317922: | informational states: 0
  3498. Jun 27 16:56:38.317938: | unknown states: 0
  3499. Jun 27 16:56:38.317954: | category states: 1 count states: 1
  3500. Jun 27 16:56:38.317978: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:597)
  3501. Jun 27 16:56:38.317995: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3502. Jun 27 16:56:38.318168: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3503. Jun 27 16:56:38.318231: | *received 60 bytes from 192.168.1.138:500 on eth0 (port=500)
  3504. Jun 27 16:56:38.318368: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3505. Jun 27 16:56:38.318465: | 08 10 06 01 a8 d2 b0 b2 00 00 00 3c ec 5b 15 53
  3506. Jun 27 16:56:38.318491: | 2f 92 d3 3a 40 63 31 d9 ac dc cb e5 9b 44 46 87
  3507. Jun 27 16:56:38.318507: | f3 79 cc 48 c2 5d 5a 2d 41 33 ea 78
  3508. Jun 27 16:56:38.318525: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  3509. Jun 27 16:56:38.318643: | **parse ISAKMP Message:
  3510. Jun 27 16:56:38.318671: | initiator cookie:
  3511. Jun 27 16:56:38.318686: | 0e 20 a4 7f 26 01 0e 7b
  3512. Jun 27 16:56:38.318701: | responder cookie:
  3513. Jun 27 16:56:38.318717: | a8 fa ce 73 0d 44 8c 4b
  3514. Jun 27 16:56:38.318733: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3515. Jun 27 16:56:38.318750: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3516. Jun 27 16:56:38.318766: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
  3517. Jun 27 16:56:38.318782: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3518. Jun 27 16:56:38.318798: | message ID: a8 d2 b0 b2
  3519. Jun 27 16:56:38.318814: | length: 60 (0x3c)
  3520. Jun 27 16:56:38.318926: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6)
  3521. Jun 27 16:56:38.318962: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3522. Jun 27 16:56:38.318983: | peer and cookies match on #1; msgid=a8d2b0b2 st_msgid=00000000 st_msgid_phase15=a8d2b0b2
  3523. Jun 27 16:56:38.318999: | p15 state object #1 found, in STATE_XAUTH_R1
  3524. Jun 27 16:56:38.319020: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1475)
  3525. Jun 27 16:56:38.319038: | #1 is idle
  3526. Jun 27 16:56:38.319205: | #1 idle
  3527. Jun 27 16:56:38.319273: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100opt: 0x2000
  3528. Jun 27 16:56:38.319410: | ***parse ISAKMP Hash Payload:
  3529. Jun 27 16:56:38.319443: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
  3530. Jun 27 16:56:38.319461: | length: 20 (0x14)
  3531. Jun 27 16:56:38.319477: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000opt: 0x2000
  3532. Jun 27 16:56:38.319495: | ***parse ISAKMP Mode Attribute:
  3533. Jun 27 16:56:38.319512: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3534. Jun 27 16:56:38.319620: | length: 8 (0x8)
  3535. Jun 27 16:56:38.319709: | Attr Msg Type: ISAKMP_CFG_ACK (0x4)
  3536. Jun 27 16:56:38.319732: | Identifier: 0 (0x0)
  3537. Jun 27 16:56:38.319748: | removing 4 bytes of padding
  3538. Jun 27 16:56:38.319768: "xauth"[2] 192.168.1.138 #1: XAUTH: xauth_inR1(STF_OK)
  3539. Jun 27 16:56:38.319810: | modecfg server, pull mode. Starting new exchange.
  3540. Jun 27 16:56:38.319976: | complete v1 state transition with STF_OK
  3541. Jun 27 16:56:38.320010: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  3542. Jun 27 16:56:38.320029: | #1 is idle
  3543. Jun 27 16:56:38.320046: | doing_xauth:no, t_xauth_client_done:no
  3544. Jun 27 16:56:38.320077: | IKEv1: transition from state STATE_XAUTH_R1 to state STATE_MAIN_R3
  3545. Jun 27 16:56:38.320099: | parent state #1: STATE_XAUTH_R1(established-authenticated-ike) => STATE_MAIN_R3(established-authenticated-ike)
  3546. Jun 27 16:56:38.320119: | ignore states: 0
  3547. Jun 27 16:56:38.320135: | half-open-ike states: 0
  3548. Jun 27 16:56:38.320151: | open-ike states: 0
  3549. Jun 27 16:56:38.320167: | established-anonymous-ike states: 0
  3550. Jun 27 16:56:38.320271: | established-authenticated-ike states: 1
  3551. Jun 27 16:56:38.320361: | anonymous-ipsec states: 0
  3552. Jun 27 16:56:38.320462: | authenticated-ipsec states: 0
  3553. Jun 27 16:56:38.320489: | informational states: 0
  3554. Jun 27 16:56:38.320505: | unknown states: 0
  3555. Jun 27 16:56:38.320521: | category states: 1 count states: 1
  3556. Jun 27 16:56:38.320537: | event_already_set, deleting event
  3557. Jun 27 16:56:38.320556: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted
  3558. Jun 27 16:56:38.320572: | #1 STATE_MAIN_R3: retransmits: cleared
  3559. Jun 27 16:56:38.320595: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
  3560. Jun 27 16:56:38.320707: | !event_already_set at reschedule
  3561. Jun 27 16:56:38.320832: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc32118
  3562. Jun 27 16:56:38.320854: | inserting event EVENT_SA_REPLACE, timeout in 28530.000 seconds for #1
  3563. Jun 27 16:56:38.320874: "xauth"[2] 192.168.1.138 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=md5 group=MODP2048}
  3564. Jun 27 16:56:38.320983: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3565. Jun 27 16:56:38.321077: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  3566. Jun 27 16:56:38.321096: | v1 state object #1 found, in STATE_MAIN_R3
  3567. Jun 27 16:56:38.321110: | Dead Peer Detection (RFC 3706): enabled
  3568. Jun 27 16:56:38.321125: | modecfg pull: quirk-poll policy:pull not-client
  3569. Jun 27 16:56:38.321138: | phase 1 is done, looking for phase 2 to unpend
  3570. Jun 27 16:56:38.321154: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  3571. Jun 27 16:56:38.321171: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  3572. Jun 27 16:56:38.321186: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3573. Jun 27 16:56:38.321302: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3574. Jun 27 16:56:38.321333: | processing: STOP connection NULL (in process_md() at demux.c:397)
  3575. Jun 27 16:56:38.321363: | *received 92 bytes from 192.168.1.138:500 on eth0 (port=500)
  3576. Jun 27 16:56:38.321378: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3577. Jun 27 16:56:38.321392: | 08 10 06 01 a6 82 1b e1 00 00 00 5c 4b 9e 8e 7d
  3578. Jun 27 16:56:38.321405: | 32 d4 d8 9e ef d4 f0 6f d2 42 04 16 1f f6 5c e4
  3579. Jun 27 16:56:38.321418: | 7e d2 d4 59 0f e2 94 43 3d 0b 90 d9 10 88 1c f0
  3580. Jun 27 16:56:38.321440: | 2c 28 9a 20 5b 17 55 d9 d5 77 f9 60 4a ba 5a c8
  3581. Jun 27 16:56:38.321454: | 83 8c f6 c2 c6 c8 fc cd 35 af 4d 86
  3582. Jun 27 16:56:38.321469: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  3583. Jun 27 16:56:38.321553: | **parse ISAKMP Message:
  3584. Jun 27 16:56:38.321593: | initiator cookie:
  3585. Jun 27 16:56:38.321607: | 0e 20 a4 7f 26 01 0e 7b
  3586. Jun 27 16:56:38.321620: | responder cookie:
  3587. Jun 27 16:56:38.321634: | a8 fa ce 73 0d 44 8c 4b
  3588. Jun 27 16:56:38.321647: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3589. Jun 27 16:56:38.321662: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3590. Jun 27 16:56:38.321675: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
  3591. Jun 27 16:56:38.321822: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3592. Jun 27 16:56:38.321852: | message ID: a6 82 1b e1
  3593. Jun 27 16:56:38.321866: | length: 92 (0x5c)
  3594. Jun 27 16:56:38.321881: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6)
  3595. Jun 27 16:56:38.321898: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3596. Jun 27 16:56:38.321913: | peer and cookies match on #1; msgid=a6821be1 st_msgid=00000000 st_msgid_phase15=00000000
  3597. Jun 27 16:56:38.321926: | p15 state object not found
  3598. Jun 27 16:56:38.322006: | No appropriate Mode Config state yet. See if we have a Main Mode state
  3599. Jun 27 16:56:38.322029: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3600. Jun 27 16:56:38.322044: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
  3601. Jun 27 16:56:38.322067: | p15 state object #1 found, in STATE_MAIN_R3
  3602. Jun 27 16:56:38.322083: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1337)
  3603. Jun 27 16:56:38.322097: | processing received isakmp_xchg_type ISAKMP_XCHG_MODE_CFG.
  3604. Jun 27 16:56:38.322211: | this is a xauthserver modecfgserver
  3605. Jun 27 16:56:38.322232: | call init_phase2_iv
  3606. Jun 27 16:56:38.322262: | set from_state to STATE_MAIN_R3 this is modecfgserver and IS_PHASE1() is TRUE
  3607. Jun 27 16:56:38.322342: | #1 is idle
  3608. Jun 27 16:56:38.322362: | #1 idle
  3609. Jun 27 16:56:38.322395: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100opt: 0x2000
  3610. Jun 27 16:56:38.322491: | ***parse ISAKMP Hash Payload:
  3611. Jun 27 16:56:38.322513: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
  3612. Jun 27 16:56:38.322528: | length: 20 (0x14)
  3613. Jun 27 16:56:38.322543: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000opt: 0x2000
  3614. Jun 27 16:56:38.322557: | ***parse ISAKMP Mode Attribute:
  3615. Jun 27 16:56:38.322572: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3616. Jun 27 16:56:38.322586: | length: 32 (0x20)
  3617. Jun 27 16:56:38.322599: | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1)
  3618. Jun 27 16:56:38.322613: | Identifier: 0 (0x0)
  3619. Jun 27 16:56:38.322627: | removing 12 bytes of padding
  3620. Jun 27 16:56:38.322756: | **emit ISAKMP Message:
  3621. Jun 27 16:56:38.322779: | initiator cookie:
  3622. Jun 27 16:56:38.322794: | 0e 20 a4 7f 26 01 0e 7b
  3623. Jun 27 16:56:38.322808: | responder cookie:
  3624. Jun 27 16:56:38.322900: | a8 fa ce 73 0d 44 8c 4b
  3625. Jun 27 16:56:38.322924: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3626. Jun 27 16:56:38.322944: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3627. Jun 27 16:56:38.322962: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
  3628. Jun 27 16:56:38.322979: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3629. Jun 27 16:56:38.322995: | message ID: a6 82 1b e1
  3630. Jun 27 16:56:38.323012: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  3631. Jun 27 16:56:38.323031: | arrived in modecfg_inR0
  3632. Jun 27 16:56:38.323227: | XAUTH: HASH computed:
  3633. Jun 27 16:56:38.323356: | 6f 9f 2f 3a 0c c4 47 3e 8d 72 dc 3d 35 fb 40 e3
  3634. Jun 27 16:56:38.323394: | ****parse ISAKMP ModeCfg attribute:
  3635. Jun 27 16:56:38.323410: | ModeCfg attr type: INTERNAL_IP4_ADDRESS (0x1)
  3636. Jun 27 16:56:38.323423: | length/value: 0 (0x0)
  3637. Jun 27 16:56:38.323437: | ****parse ISAKMP ModeCfg attribute:
  3638. Jun 27 16:56:38.323538: | ModeCfg attr type: INTERNAL_ADDRESS_EXPIRY (0x5)
  3639. Jun 27 16:56:38.323569: | length/value: 0 (0x0)
  3640. Jun 27 16:56:38.323584: | Unsupported modecfg (CFG_REQUEST) long attribute INTERNAL_ADDRESS_EXPIRY received.
  3641. Jun 27 16:56:38.323598: | ****parse ISAKMP ModeCfg attribute:
  3642. Jun 27 16:56:38.323612: | ModeCfg attr type: INTERNAL_IP4_NETMASK (0x2)
  3643. Jun 27 16:56:38.323626: | length/value: 0 (0x0)
  3644. Jun 27 16:56:38.323639: | ****parse ISAKMP ModeCfg attribute:
  3645. Jun 27 16:56:38.323653: | ModeCfg attr type: INTERNAL_IP4_DNS (0x3)
  3646. Jun 27 16:56:38.323666: | length/value: 0 (0x0)
  3647. Jun 27 16:56:38.323768: | ****parse ISAKMP ModeCfg attribute:
  3648. Jun 27 16:56:38.323799: | ModeCfg attr type: INTERNAL_IP4_NBNS (0x4)
  3649. Jun 27 16:56:38.323814: | length/value: 0 (0x0)
  3650. Jun 27 16:56:38.323828: | ****parse ISAKMP ModeCfg attribute:
  3651. Jun 27 16:56:38.323880: | ModeCfg attr type: INTERNAL_IP4_SUBNET (0xd)
  3652. Jun 27 16:56:38.323895: | length/value: 0 (0x0)
  3653. Jun 27 16:56:38.323913: | ***emit ISAKMP Hash Payload:
  3654. Jun 27 16:56:38.323929: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
  3655. Jun 27 16:56:38.323947: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
  3656. Jun 27 16:56:38.323963: | emitting length of ISAKMP Hash Payload: 20
  3657. Jun 27 16:56:38.323988: | ***emit ISAKMP Mode Attribute:
  3658. Jun 27 16:56:38.324098: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3659. Jun 27 16:56:38.324142: | Attr Msg Type: ISAKMP_CFG_REPLY (0x2)
  3660. Jun 27 16:56:38.324165: | Identifier: 0 (0x0)
  3661. Jun 27 16:56:38.324192: | request lease from addresspool 192.168.20.2-192.168.20.10 reference count 3 thatid '@' that.client.addr 192.168.1.138
  3662. Jun 27 16:56:38.324211: | New lease from addresspool index 0
  3663. Jun 27 16:56:38.324325: | new lease 192.168.20.2 from addresspool 192.168.20.2-192.168.20.10 to that.client.addr 192.168.1.138 thatid '@'
  3664. Jun 27 16:56:38.324417: | ****emit ISAKMP ModeCfg attribute:
  3665. Jun 27 16:56:38.324452: | ModeCfg attr type: INTERNAL_IP4_ADDRESS (0x1)
  3666. Jun 27 16:56:38.324469: | emitting 4 raw bytes of IP4_addr into ISAKMP ModeCfg attribute
  3667. Jun 27 16:56:38.324484: | IP4_addr c0 a8 14 02
  3668. Jun 27 16:56:38.324498: | emitting length of ISAKMP ModeCfg attribute: 4
  3669. Jun 27 16:56:38.324576: | ****emit ISAKMP ModeCfg attribute:
  3670. Jun 27 16:56:38.324602: | ModeCfg attr type: INTERNAL_IP4_NETMASK (0x2)
  3671. Jun 27 16:56:38.324619: | emitting 4 raw bytes of IP4_submsk into ISAKMP ModeCfg attribute
  3672. Jun 27 16:56:38.324634: | IP4_submsk 00 00 00 00
  3673. Jun 27 16:56:38.324648: | emitting length of ISAKMP ModeCfg attribute: 4
  3674. Jun 27 16:56:38.324662: | ****emit ISAKMP ModeCfg attribute:
  3675. Jun 27 16:56:38.324678: | ModeCfg attr type: INTERNAL_IP4_SUBNET (0xd)
  3676. Jun 27 16:56:38.324693: | emitting 4 raw bytes of IP4_subnet into ISAKMP ModeCfg attribute
  3677. Jun 27 16:56:38.324773: | IP4_subnet 00 00 00 00
  3678. Jun 27 16:56:38.324848: | emitting 4 raw bytes of IP4_submsk into ISAKMP ModeCfg attribute
  3679. Jun 27 16:56:38.324868: | IP4_submsk 00 00 00 00
  3680. Jun 27 16:56:38.324882: | emitting length of ISAKMP ModeCfg attribute: 8
  3681. Jun 27 16:56:38.324896: | We are not sending a domain
  3682. Jun 27 16:56:38.324920: | We are not sending a banner
  3683. Jun 27 16:56:38.325002: | We are 0.0.0.0/0 so not sending CISCO_SPLIT_INC
  3684. Jun 27 16:56:38.325022: | no IKEv1 message padding required
  3685. Jun 27 16:56:38.325049: | emitting length of ISAKMP Mode Attribute: 36
  3686. Jun 27 16:56:38.325119: | XAUTH: HASH computed:
  3687. Jun 27 16:56:38.325224: | a5 b5 94 a0 f8 5d 7f ee 2b d8 44 66 d6 c2 26 c7
  3688. Jun 27 16:56:38.325344: | no IKEv1 message padding required
  3689. Jun 27 16:56:38.325364: | emitting length of ISAKMP Message: 84
  3690. Jun 27 16:56:38.325379: | encrypting: 0e 00 00 14 a5 b5 94 a0 f8 5d 7f ee 2b d8 44 66
  3691. Jun 27 16:56:38.325393: | encrypting: d6 c2 26 c7 00 00 00 24 02 00 00 00 00 01 00 04
  3692. Jun 27 16:56:38.325407: | encrypting: c0 a8 14 02 00 02 00 04 00 00 00 00 00 0d 00 08
  3693. Jun 27 16:56:38.325421: | encrypting: 00 00 00 00 00 00 00 00
  3694. Jun 27 16:56:38.325532: | IV: 4a ba 5a c8 83 8c f6 c2 c6 c8 fc cd 35 af 4d 86
  3695. Jun 27 16:56:38.325554: | emitting 8 zero bytes of encryption padding into ISAKMP Message
  3696. Jun 27 16:56:38.325666: | no IKEv1 message padding required
  3697. Jun 27 16:56:38.325688: | emitting length of ISAKMP Message: 92
  3698. Jun 27 16:56:38.325800: "xauth"[2] 192.168.1.138 #1: modecfg_inR0(STF_OK)
  3699. Jun 27 16:56:38.325881: | complete v1 state transition with STF_OK
  3700. Jun 27 16:56:38.325904: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  3701. Jun 27 16:56:38.325919: | #1 is idle
  3702. Jun 27 16:56:38.325934: | doing_xauth:no, t_xauth_client_done:no
  3703. Jun 27 16:56:38.325948: | IKEv1: transition from state STATE_MODE_CFG_R0 to state STATE_MODE_CFG_R1
  3704. Jun 27 16:56:38.325963: | parent state #1: STATE_MAIN_R3(established-authenticated-ike) => STATE_MODE_CFG_R1(established-authenticated-ike)
  3705. Jun 27 16:56:38.326055: | ignore states: 0
  3706. Jun 27 16:56:38.326077: | half-open-ike states: 0
  3707. Jun 27 16:56:38.326091: | open-ike states: 0
  3708. Jun 27 16:56:38.326104: | established-anonymous-ike states: 0
  3709. Jun 27 16:56:38.326118: | established-authenticated-ike states: 1
  3710. Jun 27 16:56:38.326131: | anonymous-ipsec states: 0
  3711. Jun 27 16:56:38.326145: | authenticated-ipsec states: 0
  3712. Jun 27 16:56:38.326160: | informational states: 0
  3713. Jun 27 16:56:38.326174: | unknown states: 0
  3714. Jun 27 16:56:38.326188: | category states: 1 count states: 1
  3715. Jun 27 16:56:38.326274: | event_already_set, deleting event
  3716. Jun 27 16:56:38.326295: | state #1 requesting EVENT_SA_REPLACE to be deleted
  3717. Jun 27 16:56:38.326314: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc32118
  3718. Jun 27 16:56:38.326332: | sending reply packet to 192.168.1.138:500 (from port 500)
  3719. Jun 27 16:56:38.326351: | sending 92 bytes for STATE_MODE_CFG_R0 through eth0:500 to 192.168.1.138:500 (using #1)
  3720. Jun 27 16:56:38.326366: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3721. Jun 27 16:56:38.326380: | 08 10 06 01 a6 82 1b e1 00 00 00 5c 1b eb 4d 05
  3722. Jun 27 16:56:38.326490: | 65 ff 6e 20 05 2e 9c e5 ad a5 28 96 97 39 dc ff
  3723. Jun 27 16:56:38.326513: | 11 d2 d6 09 00 c5 54 0b 95 d3 8f 89 dc 1e a1 40
  3724. Jun 27 16:56:38.326527: | 8c f3 35 3e 18 49 34 b4 24 66 b7 ac 7a d2 fa af
  3725. Jun 27 16:56:38.326540: | ba 30 00 cc 69 cf 76 09 ca f7 6e 35
  3726. Jun 27 16:56:38.326611: | !event_already_set at reschedule
  3727. Jun 27 16:56:38.326703: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc30858
  3728. Jun 27 16:56:38.326725: | inserting event EVENT_SA_REPLACE, timeout in 28530.000 seconds for #1
  3729. Jun 27 16:56:38.326747: "xauth"[2] 192.168.1.138 #1: STATE_MODE_CFG_R1: ModeCfg Set sent, expecting Ack {auth=PRESHARED_KEY cipher=aes_256 integ=md5 group=MODP2048}
  3730. Jun 27 16:56:38.326768: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3731. Jun 27 16:56:38.326784: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  3732. Jun 27 16:56:38.326882: | v1 state object #1 found, in STATE_MODE_CFG_R1
  3733. Jun 27 16:56:38.326974: | Dead Peer Detection (RFC 3706): enabled
  3734. Jun 27 16:56:38.327001: | modecfg pull: quirk-poll policy:pull not-client
  3735. Jun 27 16:56:38.327016: | phase 1 is done, looking for phase 2 to unpend
  3736. Jun 27 16:56:38.327041: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  3737. Jun 27 16:56:38.327064: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  3738. Jun 27 16:56:38.327164: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3739. Jun 27 16:56:38.327190: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3740. Jun 27 16:56:38.327208: | processing: STOP connection NULL (in process_md() at demux.c:397)
  3741. Jun 27 16:56:42.826433: | *received 1516 bytes from 192.168.1.138:500 on eth0 (port=500)
  3742. Jun 27 16:56:42.826499: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  3743. Jun 27 16:56:42.826514: | 08 10 20 01 1f 5a 13 82 00 00 05 ec 02 f4 d5 65
  3744. Jun 27 16:56:42.826527: | eb a3 8c bb 2a 7f ec f7 ef ba 90 e9 f0 87 12 28
  3745. Jun 27 16:56:42.826540: | 22 78 c7 ff a5 c8 64 14 50 ee 0b c5 c7 da 1b a0
  3746. Jun 27 16:56:42.826553: | 34 dd ac 7c 54 90 b7 5b 35 f2 68 2d 3f b5 a9 7f
  3747. Jun 27 16:56:42.826696: | 10 b8 72 96 30 c1 3e e1 eb 01 95 80 8e 24 80 60
  3748. Jun 27 16:56:42.826718: | 5d bc 99 2e 21 6e e5 85 72 df f5 0e f3 53 6b 8d
  3749. Jun 27 16:56:42.826731: | ff 8b e9 4a c7 9b 7c 1d 57 91 03 39 60 1f 68 5a
  3750. Jun 27 16:56:42.826745: | 7c 90 24 39 35 86 8e 3e 82 ab d0 f5 42 81 21 da
  3751. Jun 27 16:56:42.826758: | 38 03 a1 c3 cf 5c ba 86 c0 f5 d9 36 3b 40 06 b6
  3752. Jun 27 16:56:42.826781: | 7d bb 57 e2 58 27 97 af 90 bf d9 81 eb 14 e5 7c
  3753. Jun 27 16:56:42.826794: | 24 52 0e 91 74 e1 dd 9f 6d bb 51 63 50 41 2e fc
  3754. Jun 27 16:56:42.826807: | de 3d 5b 7b 97 55 b3 e0 a5 62 2e dc b4 94 20 42
  3755. Jun 27 16:56:42.826820: | e9 4e 23 8f db 26 5e 6c da de 9e 3f 10 6e 5d 6a
  3756. Jun 27 16:56:42.826833: | a8 b7 06 73 dd 3a e9 c6 60 2f 26 8a b1 c8 0f 75
  3757. Jun 27 16:56:42.826846: | 47 1a 84 30 80 4b 20 f7 5c 83 9e fc 39 ad dc f1
  3758. Jun 27 16:56:42.826859: | 04 75 0a aa e6 21 64 d9 f8 c1 24 59 f2 51 cb 44
  3759. Jun 27 16:56:42.826882: | 9c 4f d1 f9 cd 3c 29 5d 8a 42 41 b3 40 42 c3 0e
  3760. Jun 27 16:56:42.826905: | 88 cf bc a1 fc 6a e7 e4 60 5e 16 3d 54 5b 0b 04
  3761. Jun 27 16:56:42.826918: | 65 c8 30 cb 99 b5 e3 5d 1b dd ec 43 98 c4 83 d2
  3762. Jun 27 16:56:42.826931: | df 6f de 31 d6 ab 2b c8 ed ad 9a ea 0c 9f d8 9f
  3763. Jun 27 16:56:42.826945: | f8 9e 3f c6 65 a0 a0 b8 d3 32 17 d5 20 c1 fa 5d
  3764. Jun 27 16:56:42.827066: | 33 ce bb 9b 74 03 f4 86 60 14 5c ad 78 2e c3 1b
  3765. Jun 27 16:56:42.827088: | c6 04 cd fc 4b de 8b 88 36 d4 6b 43 26 cd 59 62
  3766. Jun 27 16:56:42.827102: | 84 39 d2 28 e7 27 9f e7 5b 79 b6 59 cf 10 8e 54
  3767. Jun 27 16:56:42.827124: | bc 5c fc 97 26 31 88 ae e0 ff 42 84 9b 15 9f 95
  3768. Jun 27 16:56:42.827137: | 47 ab a8 1b 7b 19 22 6d 14 ba e3 49 08 a7 f3 a7
  3769. Jun 27 16:56:42.827150: | f3 6f 4f 3d 3a 81 64 15 9d c9 26 f0 37 1f ff 3b
  3770. Jun 27 16:56:42.827163: | 5a 92 0f b4 33 7c b9 a3 68 96 68 cb 76 65 af c2
  3771. Jun 27 16:56:42.827176: | c4 9c f7 22 df 4f aa 7e 47 73 b8 3c 2e 1f b5 27
  3772. Jun 27 16:56:42.827189: | fb 71 35 1a 0f 88 86 17 3e d7 49 27 1b 9b dc 2b
  3773. Jun 27 16:56:42.827202: | 5c ee 3b ba a2 c0 81 02 ca bc 2f ff 83 51 59 d2
  3774. Jun 27 16:56:42.827215: | 59 bb af 02 d3 79 a5 97 82 dd 86 6e 60 86 04 69
  3775. Jun 27 16:56:42.827228: | f6 23 e3 31 90 c1 f5 50 cf 81 b4 0f f1 dc 30 fa
  3776. Jun 27 16:56:42.827241: | 10 00 9c 0b 58 6c a5 98 e5 ec 34 cf e7 56 60 ea
  3777. Jun 27 16:56:42.827254: | 9c 81 3f 89 d1 7d 2e 15 a6 b3 9c 33 f5 ea c2 ef
  3778. Jun 27 16:56:42.827378: | 79 7f a9 ed 56 66 98 f2 e9 7d b0 56 95 12 aa 49
  3779. Jun 27 16:56:42.827399: | 40 7a be bb 7a 61 6f 0e a1 61 21 eb 4d 7e 52 0c
  3780. Jun 27 16:56:42.827430: | a8 07 0c cd 26 dc a0 d0 75 fd 6c 5d af d0 f5 f7
  3781. Jun 27 16:56:42.827450: | 94 14 d4 05 bf ee 1f 77 ef 47 52 e0 1b 23 42 10
  3782. Jun 27 16:56:42.827470: | df 97 f8 eb 42 aa 1f 6f c3 47 15 1a 3e 08 67 89
  3783. Jun 27 16:56:42.827488: | 3f 5f 1c 60 8a f6 57 9f fd 3c b3 76 aa e7 6f aa
  3784. Jun 27 16:56:42.827501: | 7b cf 6a 9d 73 f1 a2 ee 4c ed 70 cc 67 aa 89 fd
  3785. Jun 27 16:56:42.827514: | 67 f3 e0 cc e2 03 7a f1 56 56 1e 4a 61 e1 e2 f6
  3786. Jun 27 16:56:42.827526: | a8 7f 2e f1 ce 23 e6 46 42 68 e3 4f 12 fd cb f0
  3787. Jun 27 16:56:42.827539: | 9d 8b cb bf 1c 68 4b 1c 8c 39 c4 53 13 f5 c7 d3
  3788. Jun 27 16:56:42.827648: | d0 ca 9f d5 f7 ad ce 92 6b 7f 64 21 0b bc d1 3c
  3789. Jun 27 16:56:42.827669: | 11 ee d8 6d ed 55 42 ec a6 b3 d6 99 da 47 e5 5d
  3790. Jun 27 16:56:42.827693: | 39 7f e4 45 f4 c9 36 dd 11 c6 6b ff e0 0b 1a 14
  3791. Jun 27 16:56:42.827706: | 22 30 3b b5 45 0f 2e ed 8c ec 45 51 da f9 4d 14
  3792. Jun 27 16:56:42.827719: | 6c c7 c5 40 a5 c4 05 3d dc 79 8e 5d e7 ab 54 da
  3793. Jun 27 16:56:42.827732: | c1 80 d5 df 6d d2 e9 91 58 b3 37 e6 8c e5 51 c8
  3794. Jun 27 16:56:42.827745: | d6 57 96 67 e4 75 02 bc bd 5b 55 db d9 ca 93 86
  3795. Jun 27 16:56:42.827758: | 3b e4 c6 6d 50 53 6e 5f b0 43 5b ad 0d da d7 fa
  3796. Jun 27 16:56:42.827771: | c1 d9 f1 a9 76 0e 08 77 b4 aa 38 38 59 5f bd fa
  3797. Jun 27 16:56:42.827784: | ce 5c 51 dd 70 a3 39 8d c4 5f d2 d6 ab 49 12 df
  3798. Jun 27 16:56:42.827797: | 2d dd a0 f6 bc c4 cd c9 fe 86 bf be 51 85 a1 bf
  3799. Jun 27 16:56:42.827816: | 59 5a 12 a9 60 e0 9c 39 99 69 4f 68 22 05 d0 68
  3800. Jun 27 16:56:42.827830: | 47 32 a7 aa 90 56 b2 54 8c fd f4 fa f2 12 4c 07
  3801. Jun 27 16:56:42.827913: | 90 25 a3 f1 31 b5 50 03 68 42 8b 37 74 ff 4c 06
  3802. Jun 27 16:56:42.827933: | a1 1f 2e bb 27 5f 1d d6 45 dc 69 7c 8b f8 c1 90
  3803. Jun 27 16:56:42.827956: | c9 e9 14 37 c9 81 4f b9 0f bc 1a 71 19 f9 ca 59
  3804. Jun 27 16:56:42.827970: | d2 d2 6b 1a 02 66 ac 30 f6 89 09 be bf 28 03 c2
  3805. Jun 27 16:56:42.827984: | 82 6f d5 04 02 4f 72 92 66 f9 eb b9 63 45 2c e9
  3806. Jun 27 16:56:42.827997: | ee fc d7 50 99 ea 6a 08 ea 5d 28 ba 76 d6 96 23
  3807. Jun 27 16:56:42.828011: | 85 8e 2a e8 78 07 54 3c 25 00 c9 20 14 40 06 d5
  3808. Jun 27 16:56:42.828024: | 6d 03 48 18 9a 60 b6 6a 29 78 11 1e b5 da d1 62
  3809. Jun 27 16:56:42.828038: | 7a 82 8e 13 f7 89 c0 4e 37 e2 19 20 b5 92 26 5d
  3810. Jun 27 16:56:42.828150: | 06 7b 57 32 05 27 8f 08 bc c3 b7 64 1f 2d 84 c5
  3811. Jun 27 16:56:42.828172: | c8 f4 e7 02 c1 fc 26 38 16 ea 72 56 e2 fc a3 4b
  3812. Jun 27 16:56:42.828186: | 25 ae 5c 0e 66 e7 88 87 99 11 b0 22 b7 dc 15 34
  3813. Jun 27 16:56:42.828204: | ea 67 2d bf 55 e2 bb 20 ba 01 c5 71 51 31 c7 72
  3814. Jun 27 16:56:42.828237: | ec 60 48 15 25 e6 b7 1a 43 75 24 67 c6 ec ba 40
  3815. Jun 27 16:56:42.828255: | 6d d5 ef 70 b3 bf 36 d7 01 8c 98 a5 f5 d2 0b de
  3816. Jun 27 16:56:42.828275: | 52 e4 6c 1e 57 eb 82 6e 64 8a ca dc 0b c5 fb 9c
  3817. Jun 27 16:56:42.828289: | 1c fd 1b 38 87 37 68 a2 91 1b 5a 05 00 66 e5 24
  3818. Jun 27 16:56:42.828302: | 4e db 8f 12 f1 a3 44 a6 69 73 e7 14 72 6e 67 c4
  3819. Jun 27 16:56:42.828315: | bc 42 75 05 c4 58 08 70 54 dc f9 4b 5b 6c 46 a2
  3820. Jun 27 16:56:42.828401: | d0 6a b2 b4 7b ad 50 37 f0 51 51 98 56 f9 1c 2a
  3821. Jun 27 16:56:42.828421: | 31 85 b0 04 68 e5 bc c9 e8 30 e5 bb f6 57 76 3a
  3822. Jun 27 16:56:42.828444: | 7f 09 ce 5d 98 b4 99 d1 ab 4c cd 8a 5f d6 64 b4
  3823. Jun 27 16:56:42.828457: | 37 95 b3 84 6c b4 08 64 93 5c 87 ca 73 7d 92 56
  3824. Jun 27 16:56:42.828470: | 85 3e ab 8c 61 8a f3 af ee 29 38 3a a5 b1 07 f0
  3825. Jun 27 16:56:42.828483: | 3d 3d 2e 96 ff f8 de 1d 2c 0d 63 d8 02 ef 48 2e
  3826. Jun 27 16:56:42.828496: | 05 17 56 1d 0d a4 e6 bc 32 f7 23 55 69 83 34 49
  3827. Jun 27 16:56:42.828508: | b9 eb 1b 48 67 74 e2 36 ab 98 7c 18 77 05 04 39
  3828. Jun 27 16:56:42.828521: | 0c b2 4d f7 38 21 8a d9 88 6c 8d f3 0a 8d d8 80
  3829. Jun 27 16:56:42.828535: | 6f 9b 7b 07 e4 58 a5 2c 2b 22 34 3a 5c 4b d9 6a
  3830. Jun 27 16:56:42.828640: | 1a 70 04 36 9c a5 66 7c f8 14 36 f3 6a 27 23 85
  3831. Jun 27 16:56:42.828660: | db 21 57 28 35 41 be ad 21 db 27 fc d2 e0 a7 64
  3832. Jun 27 16:56:42.828674: | e7 5d 9b 5e 20 c6 dc 1b b3 90 c2 ea 78 57 c1 45
  3833. Jun 27 16:56:42.828688: | d6 ab 41 3a 5d 98 3b 7c 72 8f e7 64 f7 af 9b e0
  3834. Jun 27 16:56:42.828701: | a7 5a 74 d3 2a 34 e9 ca 42 d7 78 11 33 44 f8 70
  3835. Jun 27 16:56:42.828714: | 76 68 a5 41 7b cf 5e 75 96 bd a7 a0 92 c6 f0 2b
  3836. Jun 27 16:56:42.828736: | 31 0a 66 9b f1 5e cd 48 d1 1b 16 91
  3837. Jun 27 16:56:42.828754: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  3838. Jun 27 16:56:42.828770: | **parse ISAKMP Message:
  3839. Jun 27 16:56:42.828785: | initiator cookie:
  3840. Jun 27 16:56:42.828798: | 0e 20 a4 7f 26 01 0e 7b
  3841. Jun 27 16:56:42.828890: | responder cookie:
  3842. Jun 27 16:56:42.828911: | a8 fa ce 73 0d 44 8c 4b
  3843. Jun 27 16:56:42.828934: | next payload type: ISAKMP_NEXT_HASH (0x8)
  3844. Jun 27 16:56:42.828948: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  3845. Jun 27 16:56:42.828962: | exchange type: ISAKMP_XCHG_QUICK (0x20)
  3846. Jun 27 16:56:42.828976: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  3847. Jun 27 16:56:42.828989: | message ID: 1f 5a 13 82
  3848. Jun 27 16:56:42.829003: | length: 1516 (0x5ec)
  3849. Jun 27 16:56:42.829017: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
  3850. Jun 27 16:56:42.829036: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3851. Jun 27 16:56:42.829211: | v1 peer and cookies match on #1, provided msgid 1f5a1382 == 00000000
  3852. Jun 27 16:56:42.829308: | v1 state object not found
  3853. Jun 27 16:56:42.829333: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  3854. Jun 27 16:56:42.829357: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  3855. Jun 27 16:56:42.829371: | v1 state object #1 found, in STATE_MODE_CFG_R1
  3856. Jun 27 16:56:42.829389: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1265)
  3857. Jun 27 16:56:42.829428: | #1 is idle
  3858. Jun 27 16:56:42.829551: | #1 idle
  3859. Jun 27 16:56:42.829601: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502opt: 0x200030
  3860. Jun 27 16:56:42.829619: | ***parse ISAKMP Hash Payload:
  3861. Jun 27 16:56:42.829633: | next payload type: ISAKMP_NEXT_SA (0x1)
  3862. Jun 27 16:56:42.829647: | length: 20 (0x14)
  3863. Jun 27 16:56:42.829660: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402opt: 0x200030
  3864. Jun 27 16:56:42.829674: | ***parse ISAKMP Security Association Payload:
  3865. Jun 27 16:56:42.829688: | next payload type: ISAKMP_NEXT_NONCE (0xa)
  3866. Jun 27 16:56:42.829702: | length: 1404 (0x57c)
  3867. Jun 27 16:56:42.829785: | DOI: ISAKMP_DOI_IPSEC (0x1)
  3868. Jun 27 16:56:42.829806: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x200030
  3869. Jun 27 16:56:42.829821: | ***parse ISAKMP Nonce Payload:
  3870. Jun 27 16:56:42.829844: | next payload type: ISAKMP_NEXT_ID (0x5)
  3871. Jun 27 16:56:42.829857: | length: 24 (0x18)
  3872. Jun 27 16:56:42.829871: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0opt: 0x200030
  3873. Jun 27 16:56:42.829885: | ***parse ISAKMP Identification Payload (IPsec DOI):
  3874. Jun 27 16:56:42.829988: | next payload type: ISAKMP_NEXT_ID (0x5)
  3875. Jun 27 16:56:42.830017: | length: 12 (0xc)
  3876. Jun 27 16:56:42.830031: | ID type: ID_IPV4_ADDR (0x1)
  3877. Jun 27 16:56:42.830044: | Protocol ID: 0 (0x0)
  3878. Jun 27 16:56:42.830057: | port: 0 (0x0)
  3879. Jun 27 16:56:42.830071: | obj: c0 a8 14 02
  3880. Jun 27 16:56:42.830085: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0opt: 0x200030
  3881. Jun 27 16:56:42.830098: | ***parse ISAKMP Identification Payload (IPsec DOI):
  3882. Jun 27 16:56:42.830112: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3883. Jun 27 16:56:42.830125: | length: 16 (0x10)
  3884. Jun 27 16:56:42.830138: | ID type: ID_IPV4_ADDR_SUBNET (0x4)
  3885. Jun 27 16:56:42.830220: | Protocol ID: 0 (0x0)
  3886. Jun 27 16:56:42.830240: | port: 0 (0x0)
  3887. Jun 27 16:56:42.830254: | obj: 00 00 00 00 00 00 00 00
  3888. Jun 27 16:56:42.830277: | removing 12 bytes of padding
  3889. Jun 27 16:56:42.830344: | peer client is 192.168.20.2
  3890. Jun 27 16:56:42.830454: | peer client protocol/port is 0/0
  3891. Jun 27 16:56:42.830477: | our client is subnet 0.0.0.0/0
  3892. Jun 27 16:56:42.830492: | our client protocol/port is 0/0
  3893. Jun 27 16:56:42.830508: "xauth"[2] 192.168.1.138 #1: the peer proposed: 0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0
  3894. Jun 27 16:56:42.830524: | find_client_connection starting with xauth
  3895. Jun 27 16:56:42.830538: | looking for 0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0
  3896. Jun 27 16:56:42.830611: | concrete checking against sr#0 0.0.0.0/0 -> 192.168.20.2/32
  3897. Jun 27 16:56:42.830644: | match_id a=@
  3898. Jun 27 16:56:42.830658: | b=@
  3899. Jun 27 16:56:42.830671: | results matched
  3900. Jun 27 16:56:42.830686: | fc_try trying xauth:0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0 vs xauth:0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0
  3901. Jun 27 16:56:42.830701: | fc_try concluding with xauth [129]
  3902. Jun 27 16:56:42.830714: | fc_try xauth gives xauth
  3903. Jun 27 16:56:42.830817: | concluding with d = xauth
  3904. Jun 27 16:56:42.830839: | client wildcard: no port wildcard: no virtual: no
  3905. Jun 27 16:56:42.830856: | creating state object #2 at 0x555eacc34e38
  3906. Jun 27 16:56:42.830871: | parent state #2: new => STATE_UNDEFINED(ignore)
  3907. Jun 27 16:56:42.830886: | duplicating state object #1 "xauth"[2] 192.168.1.138 as #2 for IPSEC SA
  3908. Jun 27 16:56:42.830904: | processing: suspend state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1399)
  3909. Jun 27 16:56:42.830920: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1399)
  3910. Jun 27 16:56:42.830943: | child state #2: STATE_UNDEFINED(ignore) => STATE_QUICK_R0(authenticated-ipsec)
  3911. Jun 27 16:56:42.830957: | ignore states: 0
  3912. Jun 27 16:56:42.831033: | half-open-ike states: 0
  3913. Jun 27 16:56:42.831063: | open-ike states: 0
  3914. Jun 27 16:56:42.831076: | established-anonymous-ike states: 0
  3915. Jun 27 16:56:42.831089: | established-authenticated-ike states: 1
  3916. Jun 27 16:56:42.831102: | anonymous-ipsec states: 0
  3917. Jun 27 16:56:42.831115: | authenticated-ipsec states: 1
  3918. Jun 27 16:56:42.831128: | informational states: 0
  3919. Jun 27 16:56:42.831142: | unknown states: 0
  3920. Jun 27 16:56:42.831155: | category states: 2 count states: 2
  3921. Jun 27 16:56:42.831257: | inserting state object #2
  3922. Jun 27 16:56:42.831289: | serialno list: inserting object 0x555eacc34e38 (state #2) entry 0x555eacc355e0 into list 0x555eabcab5c0 (older 0x555eacc334a0 newer 0x555eacc334a0)
  3923. Jun 27 16:56:42.831304: | serialno list: inserted object 0x555eacc34e38 (state #2) entry 0x555eacc355e0 (older 0x555eacc334a0 newer 0x555eabcab5c0)
  3924. Jun 27 16:56:42.831318: | serialno list: list entry 0x555eabcab5c0 is HEAD (older 0x555eacc355e0 newer 0x555eacc334a0)
  3925. Jun 27 16:56:42.831332: | serialno table: inserting object 0x555eacc34e38 (state #2) entry 0x555eacc35600 into list 0x555eabc9e380 (older 0x555eabc9e380 newer 0x555eabc9e380)
  3926. Jun 27 16:56:42.831347: | serialno table: inserted object 0x555eacc34e38 (state #2) entry 0x555eacc35600 (older 0x555eabc9e380 newer 0x555eabc9e380)
  3927. Jun 27 16:56:42.831361: | serialno table: list entry 0x555eabc9e380 is HEAD (older 0x555eacc35600 newer 0x555eacc35600)
  3928. Jun 27 16:56:42.831376: | ****parse IPsec DOI SIT:
  3929. Jun 27 16:56:42.831390: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
  3930. Jun 27 16:56:42.831498: | ****parse ISAKMP Proposal Payload:
  3931. Jun 27 16:56:42.831530: | next payload type: ISAKMP_NEXT_NONE (0x0)
  3932. Jun 27 16:56:42.831544: | length: 1392 (0x570)
  3933. Jun 27 16:56:42.831557: | proposal number: 1 (0x1)
  3934. Jun 27 16:56:42.831571: | protocol ID: PROTO_IPSEC_ESP (0x3)
  3935. Jun 27 16:56:42.831584: | SPI size: 4 (0x4)
  3936. Jun 27 16:56:42.831598: | number of transforms: 45 (0x2d)
  3937. Jun 27 16:56:42.831612: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
  3938. Jun 27 16:56:42.831626: | SPI 21 6d bd 3f
  3939. Jun 27 16:56:42.831641: | *****parse ISAKMP Transform Payload (ESP):
  3940. Jun 27 16:56:42.831655: | next payload type: ISAKMP_NEXT_T (0x3)
  3941. Jun 27 16:56:42.831761: | length: 32 (0x20)
  3942. Jun 27 16:56:42.831791: | ESP transform number: 1 (0x1)
  3943. Jun 27 16:56:42.831805: | ESP transform ID: ESP_AES (0xc)
  3944. Jun 27 16:56:42.831820: | ******parse ISAKMP IPsec DOI attribute:
  3945. Jun 27 16:56:42.831833: | af+type: ENCAPSULATION_MODE (0x8004)
  3946. Jun 27 16:56:42.831847: | length/value: 1 (0x1)
  3947. Jun 27 16:56:42.831861: | [1 is ENCAPSULATION_MODE_TUNNEL]
  3948. Jun 27 16:56:42.831874: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
  3949. Jun 27 16:56:42.831888: | ******parse ISAKMP IPsec DOI attribute:
  3950. Jun 27 16:56:42.831901: | af+type: KEY_LENGTH (0x8006)
  3951. Jun 27 16:56:42.831914: | length/value: 256 (0x100)
  3952. Jun 27 16:56:42.831998: | ******parse ISAKMP IPsec DOI attribute:
  3953. Jun 27 16:56:42.832018: | af+type: AUTH_ALGORITHM (0x8005)
  3954. Jun 27 16:56:42.832042: | length/value: 1 (0x1)
  3955. Jun 27 16:56:42.832055: | [1 is AUTH_ALGORITHM_HMAC_MD5]
  3956. Jun 27 16:56:42.832069: | ******parse ISAKMP IPsec DOI attribute:
  3957. Jun 27 16:56:42.832082: | af+type: SA_LIFE_TYPE (0x8001)
  3958. Jun 27 16:56:42.832095: | length/value: 1 (0x1)
  3959. Jun 27 16:56:42.832108: | [1 is SA_LIFE_TYPE_SECONDS]
  3960. Jun 27 16:56:42.832210: | ******parse ISAKMP IPsec DOI attribute:
  3961. Jun 27 16:56:42.832241: | af+type: SA_LIFE_DURATION (variable length) (0x2)
  3962. Jun 27 16:56:42.832255: | length/value: 4 (0x4)
  3963. Jun 27 16:56:42.832268: | long duration: 3600
  3964. Jun 27 16:56:42.832283: | kernel_alg_esp_sadb_alg(): alg_id=12, sadb_alg=0x555eabcbcfa0
  3965. Jun 27 16:56:42.832296: | check_kernel_encrypt_alg(12,256): OK
  3966. Jun 27 16:56:42.832310: | ESP IPsec Transform verified unconditionally; no alg_info to check against
  3967. Jun 27 16:56:42.832334: | adding quick_outI1 KE work-order 3 for state #2
  3968. Jun 27 16:56:42.832348: | state #2 requesting to delete non existing event
  3969. Jun 27 16:56:42.832362: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555eacc30618
  3970. Jun 27 16:56:42.832378: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #2
  3971. Jun 27 16:56:42.832477: | backlog: inserting object 0x555eacc35808 (work-order 3 state #2) entry 0x555eacc35810 into list 0x555eabcac5e0 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  3972. Jun 27 16:56:42.832509: | backlog: inserted object 0x555eacc35808 (work-order 3 state #2) entry 0x555eacc35810 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  3973. Jun 27 16:56:42.832523: | backlog: list entry 0x555eabcac5e0 is HEAD (older 0x555eacc35810 newer 0x555eacc35810)
  3974. Jun 27 16:56:42.832545: | crypto helper 1 resuming
  3975. Jun 27 16:56:42.832552: | backlog: removing object 0x555eacc35808 (work-order 3 state #2) entry 0x555eacc35810 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
  3976. Jun 27 16:56:42.832555: | backlog: empty
  3977. Jun 27 16:56:42.832558: | crypto helper 1 starting work-order 3 for state #2
  3978. Jun 27 16:56:42.832561: | crypto helper 1 doing build nonce; request ID 3
  3979. Jun 27 16:56:42.832574: | crypto helper 1 finished build nonce; request ID 3 time elapsed 13 usec
  3980. Jun 27 16:56:42.832577: | crypto helper 1 sending results from work-order 3 for state #2 to event queue
  3981. Jun 27 16:56:42.832581: | scheduling now-event sending helper answer for #2
  3982. Jun 27 16:56:42.832587: | crypto helper 1 waiting (nothing to do)
  3983. Jun 27 16:56:42.832605: | complete v1 state transition with STF_SUSPEND
  3984. Jun 27 16:56:42.832623: | processing: [RE]START state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2272)
  3985. Jun 27 16:56:42.832637: | suspending state #2 and saving MD
  3986. Jun 27 16:56:42.832650: | #2 is busy; has a suspended MD
  3987. Jun 27 16:56:42.832666: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  3988. Jun 27 16:56:42.832783: | processing: stop state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  3989. Jun 27 16:56:42.832814: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3990. Jun 27 16:56:42.832828: | serialno table: hash serialno #0 to head 0x555eabc9e340
  3991. Jun 27 16:56:42.832843: | processing: STOP connection NULL (in process_md() at demux.c:397)
  3992. Jun 27 16:56:42.832865: | executing now-event sending helper answer for 2
  3993. Jun 27 16:56:42.832879: | serialno table: hash serialno #2 to head 0x555eabc9e380
  3994. Jun 27 16:56:42.832892: | serialno table: hash serialno #2 to head 0x555eabc9e380
  3995. Jun 27 16:56:42.832908: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
  3996. Jun 27 16:56:42.832922: | crypto helper 1 replies to request ID 3
  3997. Jun 27 16:56:42.832935: | calling continuation function 0x555eab9a4ce0
  3998. Jun 27 16:56:42.833020: | quick_inI1_outR1_cryptocontinue1 for #2: calculated ke+nonce, calculating DH
  3999. Jun 27 16:56:42.833049: | **emit ISAKMP Message:
  4000. Jun 27 16:56:42.833065: | initiator cookie:
  4001. Jun 27 16:56:42.833079: | 0e 20 a4 7f 26 01 0e 7b
  4002. Jun 27 16:56:42.833093: | responder cookie:
  4003. Jun 27 16:56:42.833106: | a8 fa ce 73 0d 44 8c 4b
  4004. Jun 27 16:56:42.833120: | next payload type: ISAKMP_NEXT_HASH (0x8)
  4005. Jun 27 16:56:42.833134: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  4006. Jun 27 16:56:42.833241: | exchange type: ISAKMP_XCHG_QUICK (0x20)
  4007. Jun 27 16:56:42.833272: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  4008. Jun 27 16:56:42.833286: | message ID: 1f 5a 13 82
  4009. Jun 27 16:56:42.833300: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  4010. Jun 27 16:56:42.833315: | ***emit ISAKMP Hash Payload:
  4011. Jun 27 16:56:42.833328: | next payload type: ISAKMP_NEXT_SA (0x1)
  4012. Jun 27 16:56:42.833342: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
  4013. Jun 27 16:56:42.833356: | emitting length of ISAKMP Hash Payload: 20
  4014. Jun 27 16:56:42.833369: | ***emit ISAKMP Security Association Payload:
  4015. Jun 27 16:56:42.833458: | next payload type: ISAKMP_NEXT_NONCE (0xa)
  4016. Jun 27 16:56:42.833478: | DOI: ISAKMP_DOI_IPSEC (0x1)
  4017. Jun 27 16:56:42.833502: | ****parse IPsec DOI SIT:
  4018. Jun 27 16:56:42.833516: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
  4019. Jun 27 16:56:42.833530: | ****parse ISAKMP Proposal Payload:
  4020. Jun 27 16:56:42.833543: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4021. Jun 27 16:56:42.833556: | length: 1392 (0x570)
  4022. Jun 27 16:56:42.833569: | proposal number: 1 (0x1)
  4023. Jun 27 16:56:42.833651: | protocol ID: PROTO_IPSEC_ESP (0x3)
  4024. Jun 27 16:56:42.833672: | SPI size: 4 (0x4)
  4025. Jun 27 16:56:42.833695: | number of transforms: 45 (0x2d)
  4026. Jun 27 16:56:42.833709: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
  4027. Jun 27 16:56:42.833722: | SPI 21 6d bd 3f
  4028. Jun 27 16:56:42.833736: | *****parse ISAKMP Transform Payload (ESP):
  4029. Jun 27 16:56:42.833760: | next payload type: ISAKMP_NEXT_T (0x3)
  4030. Jun 27 16:56:42.833783: | length: 32 (0x20)
  4031. Jun 27 16:56:42.833887: | ESP transform number: 1 (0x1)
  4032. Jun 27 16:56:42.833908: | ESP transform ID: ESP_AES (0xc)
  4033. Jun 27 16:56:42.833922: | ******parse ISAKMP IPsec DOI attribute:
  4034. Jun 27 16:56:42.833936: | af+type: ENCAPSULATION_MODE (0x8004)
  4035. Jun 27 16:56:42.833950: | length/value: 1 (0x1)
  4036. Jun 27 16:56:42.833964: | [1 is ENCAPSULATION_MODE_TUNNEL]
  4037. Jun 27 16:56:42.833977: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
  4038. Jun 27 16:56:42.833991: | ******parse ISAKMP IPsec DOI attribute:
  4039. Jun 27 16:56:42.834005: | af+type: KEY_LENGTH (0x8006)
  4040. Jun 27 16:56:42.834019: | length/value: 256 (0x100)
  4041. Jun 27 16:56:42.834032: | ******parse ISAKMP IPsec DOI attribute:
  4042. Jun 27 16:56:42.834046: | af+type: AUTH_ALGORITHM (0x8005)
  4043. Jun 27 16:56:42.834156: | length/value: 1 (0x1)
  4044. Jun 27 16:56:42.834177: | [1 is AUTH_ALGORITHM_HMAC_MD5]
  4045. Jun 27 16:56:42.834191: | ******parse ISAKMP IPsec DOI attribute:
  4046. Jun 27 16:56:42.834205: | af+type: SA_LIFE_TYPE (0x8001)
  4047. Jun 27 16:56:42.834218: | length/value: 1 (0x1)
  4048. Jun 27 16:56:42.834232: | [1 is SA_LIFE_TYPE_SECONDS]
  4049. Jun 27 16:56:42.834246: | ******parse ISAKMP IPsec DOI attribute:
  4050. Jun 27 16:56:42.834260: | af+type: SA_LIFE_DURATION (variable length) (0x2)
  4051. Jun 27 16:56:42.834273: | length/value: 4 (0x4)
  4052. Jun 27 16:56:42.834286: | long duration: 3600
  4053. Jun 27 16:56:42.834301: | kernel_alg_esp_sadb_alg(): alg_id=12, sadb_alg=0x555eabcbcfa0
  4054. Jun 27 16:56:42.834315: | check_kernel_encrypt_alg(12,256): OK
  4055. Jun 27 16:56:42.834329: | ESP IPsec Transform verified unconditionally; no alg_info to check against
  4056. Jun 27 16:56:42.834414: | ****emit IPsec DOI SIT:
  4057. Jun 27 16:56:42.834435: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
  4058. Jun 27 16:56:42.834450: | ****emit ISAKMP Proposal Payload:
  4059. Jun 27 16:56:42.834464: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4060. Jun 27 16:56:42.834477: | proposal number: 1 (0x1)
  4061. Jun 27 16:56:42.834491: | protocol ID: PROTO_IPSEC_ESP (0x3)
  4062. Jun 27 16:56:42.834504: | SPI size: 4 (0x4)
  4063. Jun 27 16:56:42.834518: | number of transforms: 1 (0x1)
  4064. Jun 27 16:56:42.834558: | netlink_get_spi: allocated 0x61cbecf6 for esp.0@192.168.1.137
  4065. Jun 27 16:56:42.834659: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
  4066. Jun 27 16:56:42.834681: | SPI 61 cb ec f6
  4067. Jun 27 16:56:42.834696: | *****emit ISAKMP Transform Payload (ESP):
  4068. Jun 27 16:56:42.834711: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4069. Jun 27 16:56:42.834725: | ESP transform number: 1 (0x1)
  4070. Jun 27 16:56:42.834739: | ESP transform ID: ESP_AES (0xc)
  4071. Jun 27 16:56:42.834753: | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP)
  4072. Jun 27 16:56:42.834827: | attributes 80 04 00 01 80 06 01 00 80 05 00 01 80 01 00 01
  4073. Jun 27 16:56:42.834847: | attributes 00 02 00 04 00 00 0e 10
  4074. Jun 27 16:56:42.834861: | emitting length of ISAKMP Transform Payload (ESP): 32
  4075. Jun 27 16:56:42.834875: | emitting length of ISAKMP Proposal Payload: 44
  4076. Jun 27 16:56:42.834889: | emitting length of ISAKMP Security Association Payload: 56
  4077. Jun 27 16:56:42.834910: "xauth"[2] 192.168.1.138 #2: responding to Quick Mode proposal {msgid:82135a1f}
  4078. Jun 27 16:56:42.835033: "xauth"[2] 192.168.1.138 #2: us: 0.0.0.0/0===192.168.1.137<192.168.1.137>[MS+XS+S=C]
  4079. Jun 27 16:56:42.835057: "xauth"[2] 192.168.1.138 #2: them: 192.168.1.138[@,+MC+XC+S=C]===192.168.20.2/32
  4080. Jun 27 16:56:42.835078: | ***emit ISAKMP Nonce Payload:
  4081. Jun 27 16:56:42.835093: | next payload type: ISAKMP_NEXT_ID (0x5)
  4082. Jun 27 16:56:42.835116: | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
  4083. Jun 27 16:56:42.835134: | Nr fc 6a 54 72 0f 36 e3 de 78 2d 29 65 4f 98 80 03
  4084. Jun 27 16:56:42.835151: | Nr f2 52 e8 5f 77 b3 3d c0 27 92 dd 74 89 31 04 f0
  4085. Jun 27 16:56:42.835169: | emitting length of ISAKMP Nonce Payload: 36
  4086. Jun 27 16:56:42.835314: | emitting 12 raw bytes of IDci into ISAKMP Message
  4087. Jun 27 16:56:42.835343: | IDci 05 00 00 0c 01 00 00 00 c0 a8 14 02
  4088. Jun 27 16:56:42.835362: | emitting 16 raw bytes of IDcr into ISAKMP Message
  4089. Jun 27 16:56:42.835381: | IDcr 00 00 00 10 04 00 00 00 00 00 00 00 00 00 00 00
  4090. Jun 27 16:56:42.835500: | compute_proto_keymat: needed_len (after ESP enc)=32
  4091. Jun 27 16:56:42.835640: | compute_proto_keymat: needed_len (after ESP auth)=48
  4092. Jun 27 16:56:42.835906: | conn xauth mark 0/00000000, 0/00000000 vs
  4093. Jun 27 16:56:42.835997: | conn xauth mark 0/00000000, 0/00000000
  4094. Jun 27 16:56:42.836105: | conn xauth mark 0/00000000, 0/00000000 vs
  4095. Jun 27 16:56:42.836191: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  4096. Jun 27 16:56:42.836282: | conn xauth mark 0/00000000, 0/00000000 vs
  4097. Jun 27 16:56:42.836303: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4098. Jun 27 16:56:42.836317: | conn xauth mark 0/00000000, 0/00000000 vs
  4099. Jun 27 16:56:42.836331: | conn xauth mark 0/00000000, 0/00000000
  4100. Jun 27 16:56:42.836345: | conn xauth mark 0/00000000, 0/00000000 vs
  4101. Jun 27 16:56:42.836359: | conn xauth-aggr mark 0/00000000, 0/00000000
  4102. Jun 27 16:56:42.836432: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL
  4103. Jun 27 16:56:42.836453: | install_inbound_ipsec_sa() checking if we can route
  4104. Jun 27 16:56:42.836468: | could_route called for xauth (kind=CK_INSTANCE)
  4105. Jun 27 16:56:42.836482: | conn xauth mark 0/00000000, 0/00000000 vs
  4106. Jun 27 16:56:42.836496: | conn xauth mark 0/00000000, 0/00000000
  4107. Jun 27 16:56:42.836510: | conn xauth mark 0/00000000, 0/00000000 vs
  4108. Jun 27 16:56:42.836597: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  4109. Jun 27 16:56:42.836618: | conn xauth mark 0/00000000, 0/00000000 vs
  4110. Jun 27 16:56:42.836632: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4111. Jun 27 16:56:42.836646: | conn xauth mark 0/00000000, 0/00000000 vs
  4112. Jun 27 16:56:42.836659: | conn xauth mark 0/00000000, 0/00000000
  4113. Jun 27 16:56:42.836673: | conn xauth mark 0/00000000, 0/00000000 vs
  4114. Jun 27 16:56:42.836686: | conn xauth-aggr mark 0/00000000, 0/00000000
  4115. Jun 27 16:56:42.836702: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL; eroute owner: NULL
  4116. Jun 27 16:56:42.836716: | routing is easy, or has resolvable near-conflict
  4117. Jun 27 16:56:42.836731: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4118. Jun 27 16:56:42.836811: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4119. Jun 27 16:56:42.836831: | checking if this is a replacement state
  4120. Jun 27 16:56:42.836846: | st=0x555eacc34e38 ost=(nil) st->serialno=#2 ost->serialno=#0
  4121. Jun 27 16:56:42.836860: | installing outgoing SA now as refhim=0
  4122. Jun 27 16:56:42.836874: | looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_MD5_96
  4123. Jun 27 16:56:42.836890: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12
  4124. Jun 27 16:56:42.836905: | st->st_esp.keymat_len=48 is encrypt_keymat_size=32 + integ_keymat_size=16
  4125. Jun 27 16:56:42.836993: | setting IPsec SA replay-window to 32
  4126. Jun 27 16:56:42.837015: | netlink: enabling tunnel mode
  4127. Jun 27 16:56:42.837029: | netlink: setting IPsec SA replay-window to 32 using old-style req
  4128. Jun 27 16:56:42.837101: | netlink response for Add SA esp.216dbd3f@192.168.1.138 included non-error error
  4129. Jun 27 16:56:42.837216: | outgoing SA has refhim=0
  4130. Jun 27 16:56:42.837238: | looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_MD5_96
  4131. Jun 27 16:56:42.837262: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12
  4132. Jun 27 16:56:42.837277: | st->st_esp.keymat_len=48 is encrypt_keymat_size=32 + integ_keymat_size=16
  4133. Jun 27 16:56:42.837291: | setting IPsec SA replay-window to 32
  4134. Jun 27 16:56:42.837306: | netlink: enabling tunnel mode
  4135. Jun 27 16:56:42.837320: | netlink: setting IPsec SA replay-window to 32 using old-style req
  4136. Jun 27 16:56:42.837459: | netlink response for Add SA esp.61cbecf6@192.168.1.137 included non-error error
  4137. Jun 27 16:56:42.837481: | priority calculation of connection "xauth" is 0xfffdf
  4138. Jun 27 16:56:42.837499: | add inbound eroute 192.168.20.2/32:0 --0-> 0.0.0.0/0:0 => tun.10000@192.168.1.137 (raw_eroute)
  4139. Jun 27 16:56:42.837515: | satype(9) is not used in netlink_raw_eroute.
  4140. Jun 27 16:56:42.837530: | IPsec Sa SPD priority set to 1048543
  4141. Jun 27 16:56:42.837560: | raw_eroute result=success
  4142. Jun 27 16:56:42.837577: | encrypting: 01 00 00 14 ca 8e 4b c8 d4 dd 89 4c 24 44 3b 8a
  4143. Jun 27 16:56:42.837685: | encrypting: be 28 63 7d 0a 00 00 38 00 00 00 01 00 00 00 01
  4144. Jun 27 16:56:42.837705: | encrypting: 00 00 00 2c 01 03 04 01 61 cb ec f6 00 00 00 20
  4145. Jun 27 16:56:42.837719: | encrypting: 01 0c 00 00 80 04 00 01 80 06 01 00 80 05 00 01
  4146. Jun 27 16:56:42.837732: | encrypting: 80 01 00 01 00 02 00 04 00 00 0e 10 05 00 00 24
  4147. Jun 27 16:56:42.837746: | encrypting: fc 6a 54 72 0f 36 e3 de 78 2d 29 65 4f 98 80 03
  4148. Jun 27 16:56:42.837759: | encrypting: f2 52 e8 5f 77 b3 3d c0 27 92 dd 74 89 31 04 f0
  4149. Jun 27 16:56:42.837773: | encrypting: 05 00 00 0c 01 00 00 00 c0 a8 14 02 00 00 00 10
  4150. Jun 27 16:56:42.837786: | encrypting: 04 00 00 00 00 00 00 00 00 00 00 00
  4151. Jun 27 16:56:42.837800: | IV: 92 c6 f0 2b 31 0a 66 9b f1 5e cd 48 d1 1b 16 91
  4152. Jun 27 16:56:42.837814: | emitting 4 zero bytes of encryption padding into ISAKMP Message
  4153. Jun 27 16:56:42.837845: | no IKEv1 message padding required
  4154. Jun 27 16:56:42.837977: | emitting length of ISAKMP Message: 172
  4155. Jun 27 16:56:42.837998: | finished processing quick inI1
  4156. Jun 27 16:56:42.838013: | complete v1 state transition with STF_OK
  4157. Jun 27 16:56:42.838032: | processing: [RE]START state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  4158. Jun 27 16:56:42.838046: | #2 is idle
  4159. Jun 27 16:56:42.838060: | doing_xauth:no, t_xauth_client_done:no
  4160. Jun 27 16:56:42.838074: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4161. Jun 27 16:56:42.838088: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4162. Jun 27 16:56:42.838103: | IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  4163. Jun 27 16:56:42.838118: | child state #2: STATE_QUICK_R0(authenticated-ipsec) => STATE_QUICK_R1(authenticated-ipsec)
  4164. Jun 27 16:56:42.838132: | ignore states: 0
  4165. Jun 27 16:56:42.838145: | half-open-ike states: 0
  4166. Jun 27 16:56:42.838158: | open-ike states: 0
  4167. Jun 27 16:56:42.838172: | established-anonymous-ike states: 0
  4168. Jun 27 16:56:42.838273: | established-authenticated-ike states: 1
  4169. Jun 27 16:56:42.838293: | anonymous-ipsec states: 0
  4170. Jun 27 16:56:42.838307: | authenticated-ipsec states: 1
  4171. Jun 27 16:56:42.838321: | informational states: 0
  4172. Jun 27 16:56:42.838334: | unknown states: 0
  4173. Jun 27 16:56:42.838347: | category states: 2 count states: 2
  4174. Jun 27 16:56:42.838362: | event_already_set, deleting event
  4175. Jun 27 16:56:42.838376: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
  4176. Jun 27 16:56:42.838393: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555eacc30618
  4177. Jun 27 16:56:42.838410: | sending reply packet to 192.168.1.138:500 (from port 500)
  4178. Jun 27 16:56:42.838428: | sending 172 bytes for STATE_QUICK_R0 through eth0:500 to 192.168.1.138:500 (using #2)
  4179. Jun 27 16:56:42.838547: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4180. Jun 27 16:56:42.838568: | 08 10 20 01 1f 5a 13 82 00 00 00 ac 15 aa b5 6f
  4181. Jun 27 16:56:42.838582: | 2e 2b b7 d6 57 dc 0b 7c 80 9d 2d c3 86 01 ad ff
  4182. Jun 27 16:56:42.838596: | 2f b6 5f 7e b5 1a e9 33 69 dc f5 e4 eb 26 d1 dd
  4183. Jun 27 16:56:42.838609: | d6 3a b3 f0 88 9b 16 9e 53 19 7f 1a e9 bd 35 6a
  4184. Jun 27 16:56:42.838628: | 5f 5e 4e a6 a8 0d b2 ed 7c 35 4e 14 ce a9 3b 6e
  4185. Jun 27 16:56:42.838642: | 6f 1b 87 0f 00 84 3d 07 85 2e 57 ee f4 b2 15 9b
  4186. Jun 27 16:56:42.838655: | 74 9c f6 30 6c 8a 11 02 05 d4 c9 23 00 88 df 05
  4187. Jun 27 16:56:42.838669: | ff dc 0d 0e fb aa d5 48 f7 7a c1 0e fc 16 fa 15
  4188. Jun 27 16:56:42.838682: | bc ff 5e 85 16 ed 1f 6a 0f df c6 13 f3 cb 18 7c
  4189. Jun 27 16:56:42.838695: | cd d8 b9 6c cb c4 9f b9 05 b1 f6 4c
  4190. Jun 27 16:56:42.838785: | !event_already_set at reschedule
  4191. Jun 27 16:56:42.838897: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc30618
  4192. Jun 27 16:56:42.839014: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #2
  4193. Jun 27 16:56:42.839038: | #2 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4238.883
  4194. Jun 27 16:56:42.839054: | NAT-T: encaps is 'auto'
  4195. Jun 27 16:56:42.839074: "xauth"[2] 192.168.1.138 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x216dbd3f <0x61cbecf6 xfrm=AES_CBC_256-HMAC_MD5_96 NATOA=none NATD=none DPD=active username=sss}
  4196. Jun 27 16:56:42.839089: | modecfg pull: quirk-poll policy:pull not-client
  4197. Jun 27 16:56:42.839103: | phase 1 is done, looking for phase 2 to unpend
  4198. Jun 27 16:56:42.839121: | processing: stop state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:597)
  4199. Jun 27 16:56:42.839137: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4200. Jun 27 16:56:42.839150: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4201. Jun 27 16:56:42.846204: | *received 60 bytes from 192.168.1.138:500 on eth0 (port=500)
  4202. Jun 27 16:56:42.846570: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4203. Jun 27 16:56:42.846717: | 08 10 20 01 1f 5a 13 82 00 00 00 3c f6 d0 44 d7
  4204. Jun 27 16:56:42.846739: | 5d ee 6a d8 3e 15 cf 30 a2 8d 77 c0 7e c7 e9 38
  4205. Jun 27 16:56:42.846757: | 06 19 38 eb 3c 11 df ab ad 52 80 bc
  4206. Jun 27 16:56:42.846776: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  4207. Jun 27 16:56:42.846797: | **parse ISAKMP Message:
  4208. Jun 27 16:56:42.846813: | initiator cookie:
  4209. Jun 27 16:56:42.846827: | 0e 20 a4 7f 26 01 0e 7b
  4210. Jun 27 16:56:42.846841: | responder cookie:
  4211. Jun 27 16:56:42.846855: | a8 fa ce 73 0d 44 8c 4b
  4212. Jun 27 16:56:42.846869: | next payload type: ISAKMP_NEXT_HASH (0x8)
  4213. Jun 27 16:56:42.846883: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  4214. Jun 27 16:56:42.846897: | exchange type: ISAKMP_XCHG_QUICK (0x20)
  4215. Jun 27 16:56:42.846911: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  4216. Jun 27 16:56:42.846925: | message ID: 1f 5a 13 82
  4217. Jun 27 16:56:42.846939: | length: 60 (0x3c)
  4218. Jun 27 16:56:42.846953: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
  4219. Jun 27 16:56:42.846975: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  4220. Jun 27 16:56:42.846991: | v1 peer and cookies match on #2, provided msgid 1f5a1382 == 1f5a1382
  4221. Jun 27 16:56:42.847006: | v1 state object #2 found, in STATE_QUICK_R1
  4222. Jun 27 16:56:42.847026: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1291)
  4223. Jun 27 16:56:42.847214: | #2 is idle
  4224. Jun 27 16:56:42.847238: | #2 idle
  4225. Jun 27 16:56:42.847305: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x0
  4226. Jun 27 16:56:42.847324: | ***parse ISAKMP Hash Payload:
  4227. Jun 27 16:56:42.847339: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4228. Jun 27 16:56:42.847353: | length: 20 (0x14)
  4229. Jun 27 16:56:42.847367: | removing 12 bytes of padding
  4230. Jun 27 16:56:42.847450: | install_ipsec_sa() for #2: outbound only
  4231. Jun 27 16:56:42.847584: | could_route called for xauth (kind=CK_INSTANCE)
  4232. Jun 27 16:56:42.847607: | conn xauth mark 0/00000000, 0/00000000 vs
  4233. Jun 27 16:56:42.847621: | conn xauth mark 0/00000000, 0/00000000
  4234. Jun 27 16:56:42.847635: | conn xauth mark 0/00000000, 0/00000000 vs
  4235. Jun 27 16:56:42.847650: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  4236. Jun 27 16:56:42.847761: | conn xauth mark 0/00000000, 0/00000000 vs
  4237. Jun 27 16:56:42.847839: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4238. Jun 27 16:56:42.847918: | conn xauth mark 0/00000000, 0/00000000 vs
  4239. Jun 27 16:56:42.847941: | conn xauth mark 0/00000000, 0/00000000
  4240. Jun 27 16:56:42.847956: | conn xauth mark 0/00000000, 0/00000000 vs
  4241. Jun 27 16:56:42.847969: | conn xauth-aggr mark 0/00000000, 0/00000000
  4242. Jun 27 16:56:42.847986: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL; eroute owner: NULL
  4243. Jun 27 16:56:42.848001: | sr for #2: unrouted
  4244. Jun 27 16:56:42.848077: | route_and_eroute() for proto 0, and source port 0 dest port 0
  4245. Jun 27 16:56:42.848199: | conn xauth mark 0/00000000, 0/00000000 vs
  4246. Jun 27 16:56:42.848219: | conn xauth mark 0/00000000, 0/00000000
  4247. Jun 27 16:56:42.848233: | conn xauth mark 0/00000000, 0/00000000 vs
  4248. Jun 27 16:56:42.848248: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  4249. Jun 27 16:56:42.848264: | conn xauth mark 0/00000000, 0/00000000 vs
  4250. Jun 27 16:56:42.848278: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4251. Jun 27 16:56:42.848292: | conn xauth mark 0/00000000, 0/00000000 vs
  4252. Jun 27 16:56:42.848369: | conn xauth mark 0/00000000, 0/00000000
  4253. Jun 27 16:56:42.848391: | conn xauth mark 0/00000000, 0/00000000 vs
  4254. Jun 27 16:56:42.848405: | conn xauth-aggr mark 0/00000000, 0/00000000
  4255. Jun 27 16:56:42.848422: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL; eroute owner: NULL
  4256. Jun 27 16:56:42.848438: | route_and_eroute with c: xauth (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2
  4257. Jun 27 16:56:42.848454: | priority calculation of connection "xauth" is 0xfffdf
  4258. Jun 27 16:56:42.848474: | eroute_connection add eroute 0.0.0.0/0:0 --0-> 192.168.20.2/32:0 => tun.0@192.168.1.138 (raw_eroute)
  4259. Jun 27 16:56:42.848579: | satype(9) is not used in netlink_raw_eroute.
  4260. Jun 27 16:56:42.848605: | IPsec Sa SPD priority set to 1048543
  4261. Jun 27 16:56:42.848667: | raw_eroute result=success
  4262. Jun 27 16:56:42.848780: | running updown command "ipsec _updown" for verb up
  4263. Jun 27 16:56:42.848802: | command executing up-client
  4264. Jun 27 16:56:42.848824: | get_sa_info esp.216dbd3f@192.168.1.138
  4265. Jun 27 16:56:42.848853: | get_sa_info esp.61cbecf6@192.168.1.137
  4266. Jun 27 16:56:42.848891: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED=
  4267. Jun 27 16:56:42.848987: | popen cmd is 1138 chars long
  4268. Jun 27 16:56:42.849009: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERF:
  4269. Jun 27 16:56:42.849026: | cmd( 80):ACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID=':
  4270. Jun 27 16:56:42.849040: | cmd( 160):192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_M:
  4271. Jun 27 16:56:42.849054: | cmd( 240):Y_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID=':
  4272. Jun 27 16:56:42.849068: | cmd( 320):16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PE:
  4273. Jun 27 16:56:42.849082: | cmd( 400):ER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIE:
  4274. Jun 27 16:56:42.849337: | cmd( 480):NT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER:
  4275. Jun 27 16:56:42.849362: | cmd( 560):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+EN:
  4276. Jun 27 16:56:42.849377: | cmd( 640):CRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRAC:
  4277. Jun 27 16:56:42.849526: | cmd( 720):K+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ip:
  4278. Jun 27 16:56:42.849550: | cmd( 800):v4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_I:
  4279. Jun 27 16:56:42.849565: | cmd( 880):NFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO:
  4280. Jun 27 16:56:42.849580: | cmd( 960):_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='0' PLUTO_OUTBYTES='0' VTI:
  4281. Jun 27 16:56:42.849594: | cmd(1040):_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61cbecf6 :
  4282. Jun 27 16:56:42.849609: | cmd(1120):ipsec _updown 2>&1:
  4283. Jun 27 16:56:42.854737: | route_and_eroute: firewall_notified: true
  4284. Jun 27 16:56:42.854805: | running updown command "ipsec _updown" for verb prepare
  4285. Jun 27 16:56:42.854814: | command executing prepare-client
  4286. Jun 27 16:56:42.854847: | get_sa_info esp.216dbd3f@192.168.1.138
  4287. Jun 27 16:56:42.854906: | get_sa_info esp.61cbecf6@192.168.1.137
  4288. Jun 27 16:56:42.854948: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_C
  4289. Jun 27 16:56:42.854954: | popen cmd is 1144 chars long
  4290. Jun 27 16:56:42.854959: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_I:
  4291. Jun 27 16:56:42.854962: | cmd( 80):NTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY:
  4292. Jun 27 16:56:42.854965: | cmd( 160):_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PL:
  4293. Jun 27 16:56:42.854968: | cmd( 240):UTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_RE:
  4294. Jun 27 16:56:42.854971: | cmd( 320):QID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLU:
  4295. Jun 27 16:56:42.854974: | cmd( 400):TO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER:
  4296. Jun 27 16:56:42.854977: | cmd( 480):_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
  4297. Jun 27 16:56:42.854980: | cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='P:
  4298. Jun 27 16:56:42.854983: | cmd( 640):SK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF:
  4299. Jun 27 16:56:42.854987: | cmd( 720):_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMIL:
  4300. Jun 27 16:56:42.854990: | cmd( 800):Y='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_:
  4301. Jun 27 16:56:42.854993: | cmd( 880):DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' :
  4302. Jun 27 16:56:42.854996: | cmd( 960):PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='40' PLUTO_OUTBYTES=':
  4303. Jun 27 16:56:42.854999: | cmd(1040):0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61c:
  4304. Jun 27 16:56:42.855021: | cmd(1120):becf6 ipsec _updown 2>&1:
  4305. Jun 27 16:56:42.860454: | running updown command "ipsec _updown" for verb route
  4306. Jun 27 16:56:42.860528: | command executing route-client
  4307. Jun 27 16:56:42.860558: | get_sa_info esp.216dbd3f@192.168.1.138
  4308. Jun 27 16:56:42.860608: | get_sa_info esp.61cbecf6@192.168.1.137
  4309. Jun 27 16:56:42.860655: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFI
  4310. Jun 27 16:56:42.860661: | popen cmd is 1142 chars long
  4311. Jun 27 16:56:42.860667: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INT:
  4312. Jun 27 16:56:42.860670: | cmd( 80):ERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_I:
  4313. Jun 27 16:56:42.860673: | cmd( 160):D='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUT:
  4314. Jun 27 16:56:42.860677: | cmd( 240):O_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQI:
  4315. Jun 27 16:56:42.860680: | cmd( 320):D='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO:
  4316. Jun 27 16:56:42.860683: | cmd( 400):_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_C:
  4317. Jun 27 16:56:42.860686: | cmd( 480):LIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P:
  4318. Jun 27 16:56:42.860689: | cmd( 560):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK:
  4319. Jun 27 16:56:42.860692: | cmd( 640):+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_T:
  4320. Jun 27 16:56:42.860695: | cmd( 720):RACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=:
  4321. Jun 27 16:56:42.860698: | cmd( 800):'ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DN:
  4322. Jun 27 16:56:42.860701: | cmd( 880):S_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PL:
  4323. Jun 27 16:56:42.860705: | cmd( 960):UTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='40' PLUTO_OUTBYTES='0':
  4324. Jun 27 16:56:42.860708: | cmd(1040): VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61cbe:
  4325. Jun 27 16:56:42.860711: | cmd(1120):cf6 ipsec _updown 2>&1:
  4326. Jun 27 16:56:42.871275: | route_and_eroute: instance "xauth"[2] 192.168.1.138, setting eroute_owner {spd=0x555eacc32290,sr=0x555eacc32290} to #2 (was #0) (newest_ipsec_sa=#0)
  4327. Jun 27 16:56:42.871322: | inI2: instance xauth[2], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
  4328. Jun 27 16:56:42.871336: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  4329. Jun 27 16:56:42.871341: | v1 peer and cookies match on #2, provided msgid 00000000 == 1f5a1382
  4330. Jun 27 16:56:42.871344: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
  4331. Jun 27 16:56:42.871348: | v1 state object #1 found, in STATE_MODE_CFG_R1
  4332. Jun 27 16:56:42.871352: | Dead Peer Detection (RFC 3706): enabled
  4333. Jun 27 16:56:42.871360: | event_schedule: new EVENT_DPD-pe@0x555eacc34248
  4334. Jun 27 16:56:42.871368: | inserting event EVENT_DPD, timeout in 10.000 seconds for #2
  4335. Jun 27 16:56:42.871400: | state #1 requesting EVENT_DPD-pe@0x555eacc32818 be deleted
  4336. Jun 27 16:56:42.871408: | free_event_entry: release EVENT_DPD-pe@0x555eacc32818
  4337. Jun 27 16:56:42.871414: | complete v1 state transition with STF_OK
  4338. Jun 27 16:56:42.871422: | processing: [RE]START state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
  4339. Jun 27 16:56:42.871425: | #2 is idle
  4340. Jun 27 16:56:42.871429: | doing_xauth:no, t_xauth_client_done:no
  4341. Jun 27 16:56:42.871433: | IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  4342. Jun 27 16:56:42.871438: | child state #2: STATE_QUICK_R1(authenticated-ipsec) => STATE_QUICK_R2(authenticated-ipsec)
  4343. Jun 27 16:56:42.871441: | ignore states: 0
  4344. Jun 27 16:56:42.871444: | half-open-ike states: 0
  4345. Jun 27 16:56:42.871446: | open-ike states: 0
  4346. Jun 27 16:56:42.871449: | established-anonymous-ike states: 0
  4347. Jun 27 16:56:42.871452: | established-authenticated-ike states: 1
  4348. Jun 27 16:56:42.871454: | anonymous-ipsec states: 0
  4349. Jun 27 16:56:42.871457: | authenticated-ipsec states: 1
  4350. Jun 27 16:56:42.871460: | informational states: 0
  4351. Jun 27 16:56:42.871463: | unknown states: 0
  4352. Jun 27 16:56:42.871465: | category states: 2 count states: 2
  4353. Jun 27 16:56:42.871471: | event_already_set, deleting event
  4354. Jun 27 16:56:42.871474: | state #2 requesting EVENT_v1_RETRANSMIT to be deleted
  4355. Jun 27 16:56:42.871477: | #2 STATE_QUICK_R2: retransmits: cleared
  4356. Jun 27 16:56:42.871481: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc30618
  4357. Jun 27 16:56:42.871491: | !event_already_set at reschedule
  4358. Jun 27 16:56:42.871494: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc30618
  4359. Jun 27 16:56:42.871498: | inserting event EVENT_SA_REPLACE, timeout in 3330.000 seconds for #2
  4360. Jun 27 16:56:42.871502: | NAT-T: encaps is 'auto'
  4361. Jun 27 16:56:42.871513: "xauth"[2] 192.168.1.138 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x216dbd3f <0x61cbecf6 xfrm=AES_CBC_256-HMAC_MD5_96 NATOA=none NATD=none DPD=active username=sss}
  4362. Jun 27 16:56:42.871517: | modecfg pull: quirk-poll policy:pull not-client
  4363. Jun 27 16:56:42.871521: | phase 1 is done, looking for phase 2 to unpend
  4364. Jun 27 16:56:42.871527: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
  4365. Jun 27 16:56:42.871535: | processing: stop state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
  4366. Jun 27 16:56:42.871539: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4367. Jun 27 16:56:42.871542: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4368. Jun 27 16:56:42.871549: | processing: STOP connection NULL (in process_md() at demux.c:397)
  4369. Jun 27 16:56:42.871584: | waitpid returned ECHILD (no child processes left)
  4370. Jun 27 16:56:42.871588: | waitpid returned ECHILD (no child processes left)
  4371. Jun 27 16:56:42.871591: | waitpid returned ECHILD (no child processes left)
  4372. Jun 27 16:56:46.632429: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
  4373. Jun 27 16:56:46.632463: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4374. Jun 27 16:56:46.632469: | 08 10 05 01 bc 09 5b 0b 00 00 00 4c 7d 53 eb d6
  4375. Jun 27 16:56:46.632472: | 89 fb e9 ee 00 bb 2c a2 4f 1a e2 fa 3b 24 72 72
  4376. Jun 27 16:56:46.632475: | e5 4b 81 47 7f 0a e8 fe 11 5c 05 92 70 33 f4 82
  4377. Jun 27 16:56:46.632478: | 9c f3 ee 8b d2 2a 5e c0 d5 60 88 c1
  4378. Jun 27 16:56:46.632485: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  4379. Jun 27 16:56:46.632492: | **parse ISAKMP Message:
  4380. Jun 27 16:56:46.632496: | initiator cookie:
  4381. Jun 27 16:56:46.632499: | 0e 20 a4 7f 26 01 0e 7b
  4382. Jun 27 16:56:46.632502: | responder cookie:
  4383. Jun 27 16:56:46.632504: | a8 fa ce 73 0d 44 8c 4b
  4384. Jun 27 16:56:46.632508: | next payload type: ISAKMP_NEXT_HASH (0x8)
  4385. Jun 27 16:56:46.632511: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  4386. Jun 27 16:56:46.632515: | exchange type: ISAKMP_XCHG_INFO (0x5)
  4387. Jun 27 16:56:46.632521: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  4388. Jun 27 16:56:46.632524: | message ID: bc 09 5b 0b
  4389. Jun 27 16:56:46.632528: | length: 76 (0x4c)
  4390. Jun 27 16:56:46.632542: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
  4391. Jun 27 16:56:46.632552: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  4392. Jun 27 16:56:46.632557: | peer and cookies match on #2; msgid=00000000 st_msgid=1f5a1382 st_msgid_phase15=00000000
  4393. Jun 27 16:56:46.632561: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
  4394. Jun 27 16:56:46.632564: | p15 state object #1 found, in STATE_MODE_CFG_R1
  4395. Jun 27 16:56:46.632571: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1137)
  4396. Jun 27 16:56:46.632607: | #1 is idle
  4397. Jun 27 16:56:46.632612: | #1 idle
  4398. Jun 27 16:56:46.632637: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x0
  4399. Jun 27 16:56:46.632709: | ***parse ISAKMP Hash Payload:
  4400. Jun 27 16:56:46.632714: | next payload type: ISAKMP_NEXT_D (0xc)
  4401. Jun 27 16:56:46.632717: | length: 20 (0x14)
  4402. Jun 27 16:56:46.632721: | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0opt: 0x0
  4403. Jun 27 16:56:46.632724: | ***parse ISAKMP Delete Payload:
  4404. Jun 27 16:56:46.632727: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4405. Jun 27 16:56:46.632729: | length: 16 (0x10)
  4406. Jun 27 16:56:46.632732: | DOI: ISAKMP_DOI_IPSEC (0x1)
  4407. Jun 27 16:56:46.632735: | protocol ID: 3 (0x3)
  4408. Jun 27 16:56:46.632738: | SPI size: 4 (0x4)
  4409. Jun 27 16:56:46.632740: | number of SPIs: 1 (0x1)
  4410. Jun 27 16:56:46.632743: | removing 12 bytes of padding
  4411. Jun 27 16:56:46.632747: | parsing 4 raw bytes of ISAKMP Delete Payload into SPI
  4412. Jun 27 16:56:46.632751: | SPI 21 6d bd 3f
  4413. Jun 27 16:56:46.632758: | processing: start connection "xauth"[2] 192.168.1.138 (BACKGROUND) (in accept_delete() at ikev1_main.c:2693)
  4414. Jun 27 16:56:46.632764: "xauth"[2] 192.168.1.138 #1: received Delete SA(0x216dbd3f) payload: deleting IPSEC State #2
  4415. Jun 27 16:56:46.632769: | processing: suspend state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in delete_state() at state.c:980)
  4416. Jun 27 16:56:46.632773: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in delete_state() at state.c:980)
  4417. Jun 27 16:56:46.632776: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4418. Jun 27 16:56:46.632779: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4419. Jun 27 16:56:46.632783: "xauth"[2] 192.168.1.138 #2: deleting other state #2 (STATE_QUICK_R2) and sending notification
  4420. Jun 27 16:56:46.632787: | child state #2: STATE_QUICK_R2(authenticated-ipsec) => delete
  4421. Jun 27 16:56:46.632792: | get_sa_info esp.216dbd3f@192.168.1.138
  4422. Jun 27 16:56:46.632815: | get_sa_info esp.61cbecf6@192.168.1.137
  4423. Jun 27 16:56:46.632825: "xauth"[2] 192.168.1.138 #2: ESP traffic information: in=506B out=0B XAUTHuser=sss
  4424. Jun 27 16:56:46.632829: | state #2 requesting EVENT_DPD-pe@0x555eacc34248 be deleted
  4425. Jun 27 16:56:46.632836: | free_event_entry: release EVENT_DPD-pe@0x555eacc34248
  4426. Jun 27 16:56:46.632839: | state #2 requesting N/A-pe@(nil) be deleted
  4427. Jun 27 16:56:46.632842: | delete_pluto_event cannot delete NULL event
  4428. Jun 27 16:56:46.632845: | state #2 requesting N/A-pe@(nil) be deleted
  4429. Jun 27 16:56:46.632847: | delete_pluto_event cannot delete NULL event
  4430. Jun 27 16:56:46.632850: | state #2 requesting N/A-pe@(nil) be deleted
  4431. Jun 27 16:56:46.632854: | delete_pluto_event cannot delete NULL event
  4432. Jun 27 16:56:46.632857: | #2 send IKEv1 delete notification for STATE_QUICK_R2
  4433. Jun 27 16:56:46.632872: | **emit ISAKMP Message:
  4434. Jun 27 16:56:46.632876: | initiator cookie:
  4435. Jun 27 16:56:46.632879: | 0e 20 a4 7f 26 01 0e 7b
  4436. Jun 27 16:56:46.632881: | responder cookie:
  4437. Jun 27 16:56:46.632884: | a8 fa ce 73 0d 44 8c 4b
  4438. Jun 27 16:56:46.632887: | next payload type: ISAKMP_NEXT_HASH (0x8)
  4439. Jun 27 16:56:46.632890: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  4440. Jun 27 16:56:46.632893: | exchange type: ISAKMP_XCHG_INFO (0x5)
  4441. Jun 27 16:56:46.632896: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  4442. Jun 27 16:56:46.632898: | message ID: 78 da b4 df
  4443. Jun 27 16:56:46.632909: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  4444. Jun 27 16:56:46.632913: | ***emit ISAKMP Hash Payload:
  4445. Jun 27 16:56:46.632915: | next payload type: ISAKMP_NEXT_D (0xc)
  4446. Jun 27 16:56:46.632919: | emitting 16 zero bytes of HASH(1) into ISAKMP Hash Payload
  4447. Jun 27 16:56:46.632922: | emitting length of ISAKMP Hash Payload: 20
  4448. Jun 27 16:56:46.632924: | ***emit ISAKMP Delete Payload:
  4449. Jun 27 16:56:46.632927: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4450. Jun 27 16:56:46.632930: | DOI: ISAKMP_DOI_IPSEC (0x1)
  4451. Jun 27 16:56:46.632933: | protocol ID: 3 (0x3)
  4452. Jun 27 16:56:46.632936: | SPI size: 4 (0x4)
  4453. Jun 27 16:56:46.632938: | number of SPIs: 1 (0x1)
  4454. Jun 27 16:56:46.632941: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
  4455. Jun 27 16:56:46.632945: | delete payload 61 cb ec f6
  4456. Jun 27 16:56:46.632950: | emitting length of ISAKMP Delete Payload: 16
  4457. Jun 27 16:56:46.633053: | encrypting: 0c 00 00 14 a2 f7 a8 20 e4 aa 0e fe 60 dd 7e c5
  4458. Jun 27 16:56:46.633062: | encrypting: de 1b 6d f9 00 00 00 10 00 00 00 01 03 04 00 01
  4459. Jun 27 16:56:46.633065: | encrypting: 61 cb ec f6
  4460. Jun 27 16:56:46.633067: | IV: 7c 8f 2c 25 08 48 f2 73 e4 9c 59 32 21 d5 23 e2
  4461. Jun 27 16:56:46.633071: | emitting 12 zero bytes of encryption padding into ISAKMP Message
  4462. Jun 27 16:56:46.633080: | no IKEv1 message padding required
  4463. Jun 27 16:56:46.633084: | emitting length of ISAKMP Message: 76
  4464. Jun 27 16:56:46.633105: | sending 76 bytes for delete notify through eth0:500 to 192.168.1.138:500 (using #1)
  4465. Jun 27 16:56:46.633109: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4466. Jun 27 16:56:46.633111: | 08 10 05 01 78 da b4 df 00 00 00 4c b3 d0 91 d5
  4467. Jun 27 16:56:46.633114: | 24 3c 99 8b 5f 6b 9c 83 5f 01 8f ef 25 74 f4 3d
  4468. Jun 27 16:56:46.633116: | e8 fa af f1 46 1a c8 24 b7 ce ba f0 89 e4 17 30
  4469. Jun 27 16:56:46.633119: | e8 70 1f fb 63 59 4f 06 e0 7c 0e a6
  4470. Jun 27 16:56:46.633188: | state #2 requesting EVENT_SA_REPLACE to be deleted
  4471. Jun 27 16:56:46.633196: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc30618
  4472. Jun 27 16:56:46.633201: | serialno list: removing object 0x555eacc34e38 (state #2) entry 0x555eacc355e0 (older 0x555eacc334a0 newer 0x555eabcab5c0)
  4473. Jun 27 16:56:46.633205: | serialno list: updated older object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
  4474. Jun 27 16:56:46.633217: | serialno list: updated newer entry 0x555eabcab5c0 is HEAD (older 0x555eacc334a0 newer 0x555eacc334a0)
  4475. Jun 27 16:56:46.633223: | serialno table: removing object 0x555eacc34e38 (state #2) entry 0x555eacc35600 (older 0x555eabc9e380 newer 0x555eabc9e380)
  4476. Jun 27 16:56:46.633227: | serialno table: empty
  4477. Jun 27 16:56:46.633233: | running updown command "ipsec _updown" for verb down
  4478. Jun 27 16:56:46.633236: | command executing down-client
  4479. Jun 27 16:56:46.633244: | get_sa_info esp.216dbd3f@192.168.1.138
  4480. Jun 27 16:56:46.633256: | get_sa_info esp.61cbecf6@192.168.1.137
  4481. Jun 27 16:56:46.633277: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGU
  4482. Jun 27 16:56:46.633281: | popen cmd is 1142 chars long
  4483. Jun 27 16:56:46.633291: | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTE:
  4484. Jun 27 16:56:46.633294: | cmd( 80):RFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID:
  4485. Jun 27 16:56:46.633297: | cmd( 160):='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO:
  4486. Jun 27 16:56:46.633299: | cmd( 240):_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID:
  4487. Jun 27 16:56:46.633302: | cmd( 320):='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_:
  4488. Jun 27 16:56:46.633305: | cmd( 400):PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CL:
  4489. Jun 27 16:56:46.633307: | cmd( 480):IENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PE:
  4490. Jun 27 16:56:46.633310: | cmd( 560):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+:
  4491. Jun 27 16:56:46.633313: | cmd( 640):ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TR:
  4492. Jun 27 16:56:46.633316: | cmd( 720):ACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=':
  4493. Jun 27 16:56:46.633318: | cmd( 800):ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS:
  4494. Jun 27 16:56:46.633321: | cmd( 880):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLU:
  4495. Jun 27 16:56:46.633324: | cmd( 960):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='506' PLUTO_OUTBYTES='0':
  4496. Jun 27 16:56:46.633326: | cmd(1040): VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61cbe:
  4497. Jun 27 16:56:46.633329: | cmd(1120):cf6 ipsec _updown 2>&1:
  4498. Jun 27 16:56:46.636805: | shunt_eroute() called for connection 'xauth' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
  4499. Jun 27 16:56:46.636824: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
  4500. Jun 27 16:56:46.636831: | priority calculation of connection "xauth" is 0xfffdf
  4501. Jun 27 16:56:46.636836: | IPsec Sa SPD priority set to 1048543
  4502. Jun 27 16:56:46.636862: | delete esp.216dbd3f@192.168.1.138
  4503. Jun 27 16:56:46.636876: | netlink response for Del SA esp.216dbd3f@192.168.1.138 included non-error error
  4504. Jun 27 16:56:46.636880: | priority calculation of connection "xauth" is 0xfffdf
  4505. Jun 27 16:56:46.636885: | delete inbound eroute 192.168.20.2/32:0 --0-> 0.0.0.0/0:0 => unk255.10000@192.168.1.137 (raw_eroute)
  4506. Jun 27 16:56:46.636902: | raw_eroute result=success
  4507. Jun 27 16:56:46.636905: | delete esp.61cbecf6@192.168.1.137
  4508. Jun 27 16:56:46.636912: | netlink response for Del SA esp.61cbecf6@192.168.1.137 included non-error error
  4509. Jun 27 16:56:46.636917: | in connection_discard for connection xauth
  4510. Jun 27 16:56:46.636920: | connection is instance
  4511. Jun 27 16:56:46.636923: | not in pending use
  4512. Jun 27 16:56:46.636929: | child state #2: STATE_QUICK_R2(authenticated-ipsec) => STATE_UNDEFINED(ignore)
  4513. Jun 27 16:56:46.636932: | ignore states: 0
  4514. Jun 27 16:56:46.636934: | half-open-ike states: 0
  4515. Jun 27 16:56:46.636937: | open-ike states: 0
  4516. Jun 27 16:56:46.636940: | established-anonymous-ike states: 0
  4517. Jun 27 16:56:46.636942: | established-authenticated-ike states: 1
  4518. Jun 27 16:56:46.636945: | anonymous-ipsec states: 0
  4519. Jun 27 16:56:46.636947: | authenticated-ipsec states: 0
  4520. Jun 27 16:56:46.636950: | informational states: 0
  4521. Jun 27 16:56:46.636953: | unknown states: 0
  4522. Jun 27 16:56:46.636956: | category states: 1 count states: 1
  4523. Jun 27 16:56:46.636963: | processing: stop state #2 192.168.1.138:500 (in delete_state() at state.c:1198)
  4524. Jun 27 16:56:46.636967: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4525. Jun 27 16:56:46.636971: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4526. Jun 27 16:56:46.636976: | processing: resume state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in delete_state() at state.c:1198)
  4527. Jun 27 16:56:46.636995: | Deleting states for connection - not including other IPsec SA's
  4528. Jun 27 16:56:46.636998: | pass 0
  4529. Jun 27 16:56:46.637001: | state #1
  4530. Jun 27 16:56:46.637003: | pass 1
  4531. Jun 27 16:56:46.637014: | state #1
  4532. Jun 27 16:56:46.637019: | processing: [RE]START state #1 connection "xauth" 192.168.1.138:500 (in foreach_state_by_connection_func_delete() at state.c:1335)
  4533. Jun 27 16:56:46.637023: | processing: [RE]START state #1 connection "xauth" 192.168.1.138:500 (in delete_state() at state.c:980)
  4534. Jun 27 16:56:46.637026: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4535. Jun 27 16:56:46.637028: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4536. Jun 27 16:56:46.637032: "xauth" #1: deleting state (STATE_MODE_CFG_R1) and sending notification
  4537. Jun 27 16:56:46.637036: | parent state #1: STATE_MODE_CFG_R1(established-authenticated-ike) => delete
  4538. Jun 27 16:56:46.637040: | state #1 requesting N/A-pe@(nil) be deleted
  4539. Jun 27 16:56:46.637043: | delete_pluto_event cannot delete NULL event
  4540. Jun 27 16:56:46.637046: | state #1 requesting N/A-pe@(nil) be deleted
  4541. Jun 27 16:56:46.637048: | delete_pluto_event cannot delete NULL event
  4542. Jun 27 16:56:46.637051: | state #1 requesting N/A-pe@(nil) be deleted
  4543. Jun 27 16:56:46.637054: | delete_pluto_event cannot delete NULL event
  4544. Jun 27 16:56:46.637058: | #1 send IKEv1 delete notification for STATE_MODE_CFG_R1
  4545. Jun 27 16:56:46.637075: | **emit ISAKMP Message:
  4546. Jun 27 16:56:46.637079: | initiator cookie:
  4547. Jun 27 16:56:46.637081: | 0e 20 a4 7f 26 01 0e 7b
  4548. Jun 27 16:56:46.637084: | responder cookie:
  4549. Jun 27 16:56:46.637087: | a8 fa ce 73 0d 44 8c 4b
  4550. Jun 27 16:56:46.637100: | next payload type: ISAKMP_NEXT_HASH (0x8)
  4551. Jun 27 16:56:46.637103: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  4552. Jun 27 16:56:46.637107: | exchange type: ISAKMP_XCHG_INFO (0x5)
  4553. Jun 27 16:56:46.637111: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  4554. Jun 27 16:56:46.637114: | message ID: d9 d4 03 78
  4555. Jun 27 16:56:46.637118: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
  4556. Jun 27 16:56:46.637121: | ***emit ISAKMP Hash Payload:
  4557. Jun 27 16:56:46.637124: | next payload type: ISAKMP_NEXT_D (0xc)
  4558. Jun 27 16:56:46.637128: | emitting 16 zero bytes of HASH(1) into ISAKMP Hash Payload
  4559. Jun 27 16:56:46.637131: | emitting length of ISAKMP Hash Payload: 20
  4560. Jun 27 16:56:46.637134: | ***emit ISAKMP Delete Payload:
  4561. Jun 27 16:56:46.637137: | next payload type: ISAKMP_NEXT_NONE (0x0)
  4562. Jun 27 16:56:46.637139: | DOI: ISAKMP_DOI_IPSEC (0x1)
  4563. Jun 27 16:56:46.637142: | protocol ID: 1 (0x1)
  4564. Jun 27 16:56:46.637145: | SPI size: 16 (0x10)
  4565. Jun 27 16:56:46.637148: | number of SPIs: 1 (0x1)
  4566. Jun 27 16:56:46.637151: | emitting 16 raw bytes of delete payload into ISAKMP Delete Payload
  4567. Jun 27 16:56:46.637154: | delete payload 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4568. Jun 27 16:56:46.637157: | emitting length of ISAKMP Delete Payload: 28
  4569. Jun 27 16:56:46.637236: | encrypting: 0c 00 00 14 22 5c 92 84 8d 4a 60 be 3d 3b d3 2b
  4570. Jun 27 16:56:46.637241: | encrypting: af a2 60 b1 00 00 00 1c 00 00 00 01 01 10 00 01
  4571. Jun 27 16:56:46.637244: | encrypting: 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4572. Jun 27 16:56:46.637247: | IV: ba 84 2d 2c f5 0b 67 b2 82 e7 f2 b8 f6 d9 dc b2
  4573. Jun 27 16:56:46.637263: | no IKEv1 message padding required
  4574. Jun 27 16:56:46.637266: | emitting length of ISAKMP Message: 76
  4575. Jun 27 16:56:46.637273: | sending 76 bytes for delete notify through eth0:500 to 192.168.1.138:500 (using #1)
  4576. Jun 27 16:56:46.637276: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4577. Jun 27 16:56:46.637279: | 08 10 05 01 d9 d4 03 78 00 00 00 4c b5 9b e2 10
  4578. Jun 27 16:56:46.637282: | 18 80 3a 00 6f 00 22 b9 92 83 5e ec 4d 10 b4 cb
  4579. Jun 27 16:56:46.637284: | ee c9 f1 9e 2d 4e be 8d 78 84 74 a0 8a d4 a2 a0
  4580. Jun 27 16:56:46.637287: | f6 e8 3a 6e c5 e9 f6 fa 37 58 5d de
  4581. Jun 27 16:56:46.637367: | state #1 requesting EVENT_SA_REPLACE to be deleted
  4582. Jun 27 16:56:46.637388: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc30858
  4583. Jun 27 16:56:46.637393: | serialno list: removing object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
  4584. Jun 27 16:56:46.637396: | serialno list: empty
  4585. Jun 27 16:56:46.637405: | serialno table: removing object 0x555eacc32cf8 (state #1) entry 0x555eacc334c0 (older 0x555eabc9e360 newer 0x555eabc9e360)
  4586. Jun 27 16:56:46.637409: | serialno table: empty
  4587. Jun 27 16:56:46.637413: | in connection_discard for connection xauth
  4588. Jun 27 16:56:46.637417: | parent state #1: STATE_MODE_CFG_R1(established-authenticated-ike) => STATE_UNDEFINED(ignore)
  4589. Jun 27 16:56:46.637420: | ignore states: 0
  4590. Jun 27 16:56:46.637422: | half-open-ike states: 0
  4591. Jun 27 16:56:46.637425: | open-ike states: 0
  4592. Jun 27 16:56:46.637427: | established-anonymous-ike states: 0
  4593. Jun 27 16:56:46.637430: | established-authenticated-ike states: 0
  4594. Jun 27 16:56:46.637433: | anonymous-ipsec states: 0
  4595. Jun 27 16:56:46.637435: | authenticated-ipsec states: 0
  4596. Jun 27 16:56:46.637438: | informational states: 0
  4597. Jun 27 16:56:46.637440: | unknown states: 0
  4598. Jun 27 16:56:46.637443: | category states: 0 count states: 0
  4599. Jun 27 16:56:46.637477: | processing: stop state #1 192.168.1.138:500 (in delete_state() at state.c:1198)
  4600. Jun 27 16:56:46.637481: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4601. Jun 27 16:56:46.637483: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4602. Jun 27 16:56:46.637487: | processing: resume connection "xauth" (in delete_state() at state.c:1198)
  4603. Jun 27 16:56:46.637508: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1335)
  4604. Jun 27 16:56:46.637512: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4605. Jun 27 16:56:46.637514: | serialno table: hash serialno #1 to head 0x555eabc9e360
  4606. Jun 27 16:56:46.637518: | processing: resume connection "xauth" (in foreach_state_by_connection_func_delete() at state.c:1335)
  4607. Jun 27 16:56:46.637522: | processing: [RE]START connection "xauth"[2] 192.168.1.138 (in delete_connection() at connections.c:264)
  4608. Jun 27 16:56:46.637527: "xauth"[2] 192.168.1.138: deleting connection "xauth"[2] 192.168.1.138 instance with peer 192.168.1.138 {isakmp=#0/ipsec=#0}
  4609. Jun 27 16:56:46.637531: | addresspool free lease entry ptr 0x555eacc32918 refcnt 0
  4610. Jun 27 16:56:46.637536: | freed lease refcnt 0 192.168.20.2 from addresspool 192.168.20.2-192.168.20.10 index=0. pool size 9 used 0 lingering=0 address
  4611. Jun 27 16:56:46.637539: | Deleting states for connection - not including other IPsec SA's
  4612. Jun 27 16:56:46.637541: | pass 0
  4613. Jun 27 16:56:46.637544: | pass 1
  4614. Jun 27 16:56:46.637548: | shunt_eroute() called for connection 'xauth' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
  4615. Jun 27 16:56:46.637551: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
  4616. Jun 27 16:56:46.637555: | priority calculation of connection "xauth" is 0xfffdf
  4617. Jun 27 16:56:46.637571: | priority calculation of connection "xauth" is 0xfffdf
  4618. Jun 27 16:56:46.637579: | conn xauth mark 0/00000000, 0/00000000 vs
  4619. Jun 27 16:56:46.637582: | conn xauth mark 0/00000000, 0/00000000
  4620. Jun 27 16:56:46.637585: | conn xauth mark 0/00000000, 0/00000000 vs
  4621. Jun 27 16:56:46.637588: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  4622. Jun 27 16:56:46.637591: | conn xauth mark 0/00000000, 0/00000000 vs
  4623. Jun 27 16:56:46.637594: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4624. Jun 27 16:56:46.637597: | conn xauth mark 0/00000000, 0/00000000 vs
  4625. Jun 27 16:56:46.637600: | conn xauth mark 0/00000000, 0/00000000
  4626. Jun 27 16:56:46.637603: | conn xauth mark 0/00000000, 0/00000000 vs
  4627. Jun 27 16:56:46.637605: | conn xauth-aggr mark 0/00000000, 0/00000000
  4628. Jun 27 16:56:46.637609: | route owner of "xauth" unrouted: NULL
  4629. Jun 27 16:56:46.637612: | running updown command "ipsec _updown" for verb unroute
  4630. Jun 27 16:56:46.637615: | command executing unroute-client
  4631. Jun 27 16:56:46.637633: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE=''
  4632. Jun 27 16:56:46.637641: | popen cmd is 1065 chars long
  4633. Jun 27 16:56:46.637644: | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_I:
  4634. Jun 27 16:56:46.637647: | cmd( 80):NTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY:
  4635. Jun 27 16:56:46.637650: | cmd( 160):_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PL:
  4636. Jun 27 16:56:46.637653: | cmd( 240):UTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_RE:
  4637. Jun 27 16:56:46.637655: | cmd( 320):QID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PL:
  4638. Jun 27 16:56:46.637658: | cmd( 400):UTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEE:
  4639. Jun 27 16:56:46.637661: | cmd( 480):R_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT:
  4640. Jun 27 16:56:46.637664: | cmd( 560):O_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRY:
  4641. Jun 27 16:56:46.637666: | cmd( 640):PT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+I:
  4642. Jun 27 16:56:46.637669: | cmd( 720):KE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv:
  4643. Jun 27 16:56:46.637672: | cmd( 800):4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMA:
  4644. Jun 27 16:56:46.637675: | cmd( 880):IN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_:
  4645. Jun 27 16:56:46.637677: | cmd( 960):NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_O:
  4646. Jun 27 16:56:46.637680: | cmd(1040):UT=0x0 ipsec _updown 2>&1:
  4647. Jun 27 16:56:46.646427: | unreference addresspool of conn xauth[2] kind CK_GOING_AWAY refcnt 3
  4648. Jun 27 16:56:46.646464: | processing: stop connection "xauth" (in delete_connection() at connections.c:314)
  4649. Jun 27 16:56:46.646476: | processing: STOP connection NULL (in accept_delete() at ikev1_main.c:2748)
  4650. Jun 27 16:56:46.646480: | processing: STOP connection NULL (in accept_delete() at ikev1_main.c:2751)
  4651. Jun 27 16:56:46.646484: | del:
  4652. Jun 27 16:56:46.646490: packet from 192.168.1.138:500: received and ignored empty informational notification payload
  4653. Jun 27 16:56:46.646495: | complete v1 state transition with STF_IGNORE
  4654. Jun 27 16:56:46.646501: | processing: stop from 192.168.1.138:500 (in process_md() at demux.c:394)
  4655. Jun 27 16:56:46.646506: | processing: STOP state #0 (in process_md() at demux.c:396)
  4656. Jun 27 16:56:46.646510: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4657. Jun 27 16:56:46.646513: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4658. Jun 27 16:56:46.646516: | processing: STOP connection NULL (in process_md() at demux.c:397)
  4659. Jun 27 16:56:46.646545: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
  4660. Jun 27 16:56:46.646549: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
  4661. Jun 27 16:56:46.646552: | 08 10 05 01 b4 46 db 89 00 00 00 4c e9 48 2f f3
  4662. Jun 27 16:56:46.646555: | c5 15 8f 49 45 59 3f 3f d2 b3 a8 ce 86 20 1c 4c
  4663. Jun 27 16:56:46.646557: | 30 23 25 cc 84 cd 9e af ab e7 b4 ca cb 70 8f ed
  4664. Jun 27 16:56:46.646560: | 11 57 c3 14 cd 9c cc 19 02 79 27 46
  4665. Jun 27 16:56:46.646565: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
  4666. Jun 27 16:56:46.646570: | **parse ISAKMP Message:
  4667. Jun 27 16:56:46.646573: | initiator cookie:
  4668. Jun 27 16:56:46.646576: | 0e 20 a4 7f 26 01 0e 7b
  4669. Jun 27 16:56:46.646579: | responder cookie:
  4670. Jun 27 16:56:46.646581: | a8 fa ce 73 0d 44 8c 4b
  4671. Jun 27 16:56:46.646593: | next payload type: ISAKMP_NEXT_HASH (0x8)
  4672. Jun 27 16:56:46.646597: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
  4673. Jun 27 16:56:46.646601: | exchange type: ISAKMP_XCHG_INFO (0x5)
  4674. Jun 27 16:56:46.646605: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
  4675. Jun 27 16:56:46.646608: | message ID: b4 46 db 89
  4676. Jun 27 16:56:46.646611: | length: 76 (0x4c)
  4677. Jun 27 16:56:46.646614: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
  4678. Jun 27 16:56:46.646621: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
  4679. Jun 27 16:56:46.646624: | p15 state object not found
  4680. Jun 27 16:56:46.646629: | icookie table: hash icookie 0e 20 a4 7f 26 01 0e 7b to 886872774674875013 slot 0x555eabc9ac60
  4681. Jun 27 16:56:46.646631: | v1 state object not found
  4682. Jun 27 16:56:46.646635: | Informational Exchange is for an unknown (expired?) SA with MSGID:0x89db46b4
  4683. Jun 27 16:56:46.646637: | - unknown SA's md->hdr.isa_icookie:
  4684. Jun 27 16:56:46.646640: | 0e 20 a4 7f 26 01 0e 7b
  4685. Jun 27 16:56:46.646643: | - unknown SA's md->hdr.isa_rcookie:
  4686. Jun 27 16:56:46.646645: | a8 fa ce 73 0d 44 8c 4b
  4687. Jun 27 16:56:46.646649: | processing: stop from 192.168.1.138:500 (in process_md() at demux.c:394)
  4688. Jun 27 16:56:46.646652: | processing: STOP state #0 (in process_md() at demux.c:396)
  4689. Jun 27 16:56:46.646655: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4690. Jun 27 16:56:46.646658: | serialno table: hash serialno #0 to head 0x555eabc9e340
  4691. Jun 27 16:56:46.646661: | processing: STOP connection NULL (in process_md() at demux.c:397)
  4692. Jun 27 16:56:46.646670: | waitpid returned ECHILD (no child processes left)
  4693. Jun 27 16:56:46.646674: | waitpid returned ECHILD (no child processes left)
  4694. Jun 27 16:56:51.965375: | timer_event_cb: processing event@0x555eacc30518
  4695. Jun 27 16:56:51.965447: | handling event EVENT_SHUNT_SCAN
  4696. Jun 27 16:56:51.965454: | expiring aged bare shunts from shunt table
  4697. Jun 27 16:56:51.965463: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x555eacc30858
  4698. Jun 27 16:56:51.965470: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
  4699. Jun 27 16:56:51.965484: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x555eacc30518
  4700. Jun 27 16:56:52.266368: shutting down
  4701. Jun 27 16:56:52.266385: | processing: RESET whack log_fd (was 15) (in exit_pluto() at plutomain.c:1784)
  4702. Jun 27 16:56:52.266390: | pluto_sd: executing action action: stopping(6), status 0
  4703. Jun 27 16:56:52.266408: | certs and keys locked by 'free_preshared_secrets'
  4704. Jun 27 16:56:52.266411: forgetting secrets
  4705. Jun 27 16:56:52.266417: | certs and keys unlocked by 'free_preshard_secrets'
  4706. Jun 27 16:56:52.266422: | processing: start connection "v6neighbor-hole-out" (in delete_connection() at connections.c:264)
  4707. Jun 27 16:56:52.266425: "v6neighbor-hole-out": deleting non-instance connection
  4708. Jun 27 16:56:52.266428: | Deleting states for connection - including all other IPsec SA's of this IKE SA
  4709. Jun 27 16:56:52.266431: | pass 0
  4710. Jun 27 16:56:52.266433: | pass 1
  4711. Jun 27 16:56:52.266438: | shunt_eroute() called for connection 'v6neighbor-hole-out' to 'delete' for rt_kind 'unrouted' using protoports 58--34816->-34560
  4712. Jun 27 16:56:52.266442: | netlink_shunt_eroute for proto 58, and source port 34816 dest port 34560
  4713. Jun 27 16:56:52.266447: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
  4714. Jun 27 16:56:52.266471: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
  4715. Jun 27 16:56:52.266484: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  4716. Jun 27 16:56:52.266487: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
  4717. Jun 27 16:56:52.266490: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  4718. Jun 27 16:56:52.266493: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4719. Jun 27 16:56:52.266496: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  4720. Jun 27 16:56:52.266498: | conn xauth mark 0/00000000, 0/00000000
  4721. Jun 27 16:56:52.266501: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
  4722. Jun 27 16:56:52.266510: | conn xauth-aggr mark 0/00000000, 0/00000000
  4723. Jun 27 16:56:52.266514: | route owner of "v6neighbor-hole-out" unrouted: NULL
  4724. Jun 27 16:56:52.266517: | running updown command "ipsec _updown" for verb unroute
  4725. Jun 27 16:56:52.266520: | command executing unroute-client-v6
  4726. Jun 27 16:56:52.266538: | executing unroute-client-v6: PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
  4727. Jun 27 16:56:52.266542: | popen cmd is 903 chars long
  4728. Jun 27 16:56:52.266545: | cmd( 0):PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
  4729. Jun 27 16:56:52.266548: | cmd( 80):hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=:
  4730. Jun 27 16:56:52.266550: | cmd( 160):'::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' :
  4731. Jun 27 16:56:52.266553: | cmd( 240):PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::
  4732. Jun 27 16:56:52.266555: | cmd( 320)::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUT:
  4733. Jun 27 16:56:52.266558: | cmd( 400):O_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_P:
  4734. Jun 27 16:56:52.266560: | cmd( 480):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+P:
  4735. Jun 27 16:56:52.266563: | cmd( 560):ASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6':
  4736. Jun 27 16:56:52.266565: | cmd( 640): XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN:
  4737. Jun 27 16:56:52.266568: | cmd( 720):_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM:
  4738. Jun 27 16:56:52.266570: | cmd( 800):_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT:
  4739. Jun 27 16:56:52.266573: | cmd( 880):=0x0 ipsec _updown 2>&1:
  4740. Jun 27 16:56:52.269881: | processing: stop connection "v6neighbor-hole-out" (in delete_connection() at connections.c:314)
  4741. Jun 27 16:56:52.269894: | processing: start connection "v6neighbor-hole-in" (in delete_connection() at connections.c:264)
  4742. Jun 27 16:56:52.269898: "v6neighbor-hole-in": deleting non-instance connection
  4743. Jun 27 16:56:52.269901: | Deleting states for connection - including all other IPsec SA's of this IKE SA
  4744. Jun 27 16:56:52.269904: | pass 0
  4745. Jun 27 16:56:52.269906: | pass 1
  4746. Jun 27 16:56:52.269910: | shunt_eroute() called for connection 'v6neighbor-hole-in' to 'delete' for rt_kind 'unrouted' using protoports 58--34560->-34816
  4747. Jun 27 16:56:52.269913: | netlink_shunt_eroute for proto 58, and source port 34560 dest port 34816
  4748. Jun 27 16:56:52.269916: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
  4749. Jun 27 16:56:52.269933: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
  4750. Jun 27 16:56:52.269945: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  4751. Jun 27 16:56:52.269948: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
  4752. Jun 27 16:56:52.269950: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  4753. Jun 27 16:56:52.269953: | conn xauth mark 0/00000000, 0/00000000
  4754. Jun 27 16:56:52.269955: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
  4755. Jun 27 16:56:52.269963: | conn xauth-aggr mark 0/00000000, 0/00000000
  4756. Jun 27 16:56:52.269967: | route owner of "v6neighbor-hole-in" unrouted: NULL
  4757. Jun 27 16:56:52.269969: | running updown command "ipsec _updown" for verb unroute
  4758. Jun 27 16:56:52.269972: | command executing unroute-client-v6
  4759. Jun 27 16:56:52.269989: | executing unroute-client-v6: PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
  4760. Jun 27 16:56:52.269993: | popen cmd is 902 chars long
  4761. Jun 27 16:56:52.269996: | cmd( 0):PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
  4762. Jun 27 16:56:52.269998: | cmd( 80):hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=':
  4763. Jun 27 16:56:52.270001: | cmd( 160):::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' P:
  4764. Jun 27 16:56:52.270003: | cmd( 240):LUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER=':::
  4765. Jun 27 16:56:52.270006: | cmd( 320):' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO:
  4766. Jun 27 16:56:52.270009: | cmd( 400):_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PE:
  4767. Jun 27 16:56:52.270011: | cmd( 480):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PA:
  4768. Jun 27 16:56:52.270014: | cmd( 560):SS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' :
  4769. Jun 27 16:56:52.270016: | cmd( 640):XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_:
  4770. Jun 27 16:56:52.270019: | cmd( 720):INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_:
  4771. Jun 27 16:56:52.270021: | cmd( 800):CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=:
  4772. Jun 27 16:56:52.270024: | cmd( 880):0x0 ipsec _updown 2>&1:
  4773. Jun 27 16:56:52.272347: | processing: stop connection "v6neighbor-hole-in" (in delete_connection() at connections.c:314)
  4774. Jun 27 16:56:52.272362: | processing: start connection "xauth" (in delete_connection() at connections.c:264)
  4775. Jun 27 16:56:52.272365: "xauth": deleting non-instance connection
  4776. Jun 27 16:56:52.272369: | Deleting states for connection - including all other IPsec SA's of this IKE SA
  4777. Jun 27 16:56:52.272371: | pass 0
  4778. Jun 27 16:56:52.272374: | pass 1
  4779. Jun 27 16:56:52.272377: | unreference addresspool of conn xauth[2] kind CK_TEMPLATE refcnt 2
  4780. Jun 27 16:56:52.272380: | processing: stop connection "xauth" (in delete_connection() at connections.c:314)
  4781. Jun 27 16:56:52.272384: | processing: start connection "xauth-aggr" (in delete_connection() at connections.c:264)
  4782. Jun 27 16:56:52.272387: "xauth-aggr": deleting non-instance connection
  4783. Jun 27 16:56:52.272390: | Deleting states for connection - including all other IPsec SA's of this IKE SA
  4784. Jun 27 16:56:52.272392: | pass 0
  4785. Jun 27 16:56:52.272394: | pass 1
  4786. Jun 27 16:56:52.272397: | unreference addresspool of conn xauth-aggr[0] kind CK_TEMPLATE refcnt 1
  4787. Jun 27 16:56:52.272400: | freeing memory for addresspool ptr 0x555eacc2f158
  4788. Jun 27 16:56:52.272403: | free_lease_list: addresspool free the lease list ptr (nil)
  4789. Jun 27 16:56:52.272407: | processing: stop connection "xauth-aggr" (in delete_connection() at connections.c:314)
  4790. Jun 27 16:56:52.272411: | crl fetch request list locked by 'free_crl_fetch'
  4791. Jun 27 16:56:52.272418: | crl fetch request list unlocked by 'free_crl_fetch'
  4792. Jun 27 16:56:52.272427: shutting down interface lo/lo ::1:500
  4793. Jun 27 16:56:52.272430: shutting down interface lo/lo 127.0.0.1:4500
  4794. Jun 27 16:56:52.272433: shutting down interface lo/lo 127.0.0.1:500
  4795. Jun 27 16:56:52.272435: shutting down interface eth0/eth0 192.168.1.137:4500
  4796. Jun 27 16:56:52.272438: shutting down interface eth0/eth0 192.168.1.137:500
  4797. Jun 27 16:56:52.272449: | free_event_entry: release EVENT_NULL-pe@0x555eacc2ff18
  4798. Jun 27 16:56:52.272463: | free_event_entry: release EVENT_NULL-pe@0x555eacc30018
  4799. Jun 27 16:56:52.272471: | free_event_entry: release EVENT_NULL-pe@0x555eacc30118
  4800. Jun 27 16:56:52.272477: | free_event_entry: release EVENT_NULL-pe@0x555eacc30218
  4801. Jun 27 16:56:52.272482: | free_event_entry: release EVENT_NULL-pe@0x555eacc30418
  4802. Jun 27 16:56:52.272621: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x555eacc30858
  4803. Jun 27 16:56:52.272627: | free_event_entry: release EVENT_NAT_T_KEEPALIVE-pe@0x555eacc31d58
  4804. Jun 27 16:56:52.272632: | free_event_entry: release EVENT_NULL-pe@0x555eacc2dd38
  4805. Jun 27 16:56:52.272635: | free_event_entry: release EVENT_NULL-pe@0x555eacc2db98
  4806. Jun 27 16:56:52.272639: | free_event_entry: release EVENT_NULL-pe@0x555eacc2d848
  4807. Jun 27 16:56:52.272644: | free_event_entry: release EVENT_NULL-pe@0x555eacc2d748
  4808. Jun 27 16:56:52.272647: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x555eacc2af88
  4809. Jun 27 16:56:52.272653: | free_event_entry: release EVENT_NULL-pe@0x555eacc2ae88
  4810. Jun 27 16:56:52.272658: | free_event_entry: release EVENT_NULL-pe@0x555eacc2ad88
  4811. Jun 27 16:56:52.272661: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x555eacc1df08
  4812. Jun 27 16:56:52.272664: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x555eacc1de08
  4813. Jun 27 16:56:52.272667: | free_event_entry: release EVENT_REINIT_SECRET-pe@0x555eacc1dcb8
  4814. Jun 27 16:56:52.272698: leak detective found no leaks
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement