Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jun 27 16:56:11.887911: NSS DB directory: sql:/etc/ipsec.d
- Jun 27 16:56:11.888081: Initializing NSS
- Jun 27 16:56:11.888091: Opening NSS database "sql:/etc/ipsec.d" read-only
- Jun 27 16:56:11.928798: NSS initialized
- Jun 27 16:56:11.928821: NSS crypto library initialized
- Jun 27 16:56:11.928824: FIPS HMAC integrity support [disabled]
- Jun 27 16:56:11.928912: libcap-ng support [enabled]
- Jun 27 16:56:11.928918: Linux audit support [disabled]
- Jun 27 16:56:11.928922: Starting Pluto (Libreswan Version v3.24-5-gb2b97fc-dirty-master XFRM(netkey) KLIPS FORK PTHREAD_SETSCHEDPRIO NSS DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC LIBCAP_NG XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:3245
- Jun 27 16:56:11.928924: core dump dir: /run/pluto
- Jun 27 16:56:11.928927: secrets file: /etc/ipsec.secrets
- Jun 27 16:56:11.928930: leak-detective enabled
- Jun 27 16:56:11.928932: NSS crypto [enabled]
- Jun 27 16:56:11.928934: XAUTH PAM support [enabled]
- Jun 27 16:56:11.929001: | init_nat_traversal() initialized with keep_alive=0s
- Jun 27 16:56:11.929006: NAT-Traversal support [enabled]
- Jun 27 16:56:11.929023: Initializing libevent in pthreads mode: headers: 2.0.21-stable (2001500); library: 2.0.21-stable (2001500)
- Jun 27 16:56:11.929106: | event_schedule: new EVENT_REINIT_SECRET-pe@0x555eacc1dcb8
- Jun 27 16:56:11.929111: | inserting event EVENT_REINIT_SECRET, timeout in 3600.000 seconds
- Jun 27 16:56:11.929115: | event_schedule: new EVENT_PENDING_DDNS-pe@0x555eacc1de08
- Jun 27 16:56:11.929118: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds
- Jun 27 16:56:11.929121: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x555eacc1df08
- Jun 27 16:56:11.929124: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds
- Jun 27 16:56:11.929148: Encryption algorithms:
- Jun 27 16:56:11.929154: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm aes_ccm_c)
- Jun 27 16:56:11.929157: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_b)
- Jun 27 16:56:11.929160: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_a)
- Jun 27 16:56:11.929163: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] (3des)
- Jun 27 16:56:11.929166: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128}
- Jun 27 16:56:11.929169: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (camellia)
- Jun 27 16:56:11.929172: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm aes_gcm_c)
- Jun 27 16:56:11.929175: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_b)
- Jun 27 16:56:11.929178: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_a)
- Jun 27 16:56:11.929181: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aesctr)
- Jun 27 16:56:11.929184: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes)
- Jun 27 16:56:11.929187: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (serpent)
- Jun 27 16:56:11.929190: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (twofish)
- Jun 27 16:56:11.929193: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} (twofish_cbc_ssh)
- Jun 27 16:56:11.929195: CAST_CBC IKEv1: ESP IKEv2: ESP {*128} (cast)
- Jun 27 16:56:11.929198: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP {256,192,*128} (aes_gmac)
- Jun 27 16:56:11.929201: NULL IKEv1: ESP IKEv2: ESP []
- Jun 27 16:56:11.929207: Hash algorithms:
- Jun 27 16:56:11.929210: MD5 IKEv1: IKE IKEv2:
- Jun 27 16:56:11.929212: SHA1 IKEv1: IKE IKEv2: FIPS (sha)
- Jun 27 16:56:11.929215: SHA2_256 IKEv1: IKE IKEv2: FIPS (sha2 sha256)
- Jun 27 16:56:11.929217: SHA2_384 IKEv1: IKE IKEv2: FIPS (sha384)
- Jun 27 16:56:11.929229: SHA2_512 IKEv1: IKE IKEv2: FIPS (sha512)
- Jun 27 16:56:11.929235: PRF algorithms:
- Jun 27 16:56:11.929238: HMAC_MD5 IKEv1: IKE IKEv2: IKE (md5)
- Jun 27 16:56:11.929241: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS (sha sha1)
- Jun 27 16:56:11.929243: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS (sha2 sha256 sha2_256)
- Jun 27 16:56:11.929246: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS (sha384 sha2_384)
- Jun 27 16:56:11.929249: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS (sha512 sha2_512)
- Jun 27 16:56:11.929251: AES_XCBC IKEv1: IKEv2: IKE FIPS (aes128_xcbc)
- Jun 27 16:56:11.929260: Integrity algorithms:
- Jun 27 16:56:11.929263: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (md5 hmac_md5)
- Jun 27 16:56:11.929265: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha sha1 sha1_96 hmac_sha1)
- Jun 27 16:56:11.929268: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha512 sha2_512 hmac_sha2_512)
- Jun 27 16:56:11.929271: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha384 sha2_384 hmac_sha2_384)
- Jun 27 16:56:11.929274: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha2 sha256 sha2_256 hmac_sha2_256)
- Jun 27 16:56:11.929276: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH FIPS (aes_xcbc aes128_xcbc aes128_xcbc_96)
- Jun 27 16:56:11.929279: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS (aes_cmac)
- Jun 27 16:56:11.929282: NONE IKEv1: ESP IKEv2: ESP FIPS (null)
- Jun 27 16:56:11.929291: DH algorithms:
- Jun 27 16:56:11.929294: NONE IKEv1: IKEv2: IKE ESP AH (null dh0)
- Jun 27 16:56:11.929296: MODP1024 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh2)
- Jun 27 16:56:11.929299: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh5)
- Jun 27 16:56:11.929302: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh14)
- Jun 27 16:56:11.929304: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh15)
- Jun 27 16:56:11.929307: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh16)
- Jun 27 16:56:11.929309: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh17)
- Jun 27 16:56:11.929312: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh18)
- Jun 27 16:56:11.929315: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_256)
- Jun 27 16:56:11.929318: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_384)
- Jun 27 16:56:11.929320: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_521)
- Jun 27 16:56:11.929323: DH23 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS
- Jun 27 16:56:11.929325: DH24 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS
- Jun 27 16:56:11.930882: starting up 2 crypto helpers
- Jun 27 16:56:11.930921: started thread for crypto helper 0
- Jun 27 16:56:11.930936: started thread for crypto helper 1
- Jun 27 16:56:11.930945: | ignoring microcode for XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0) -> MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_v1_RETRANSMIT
- Jun 27 16:56:11.930948: | MAIN_R0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930951: | MAIN_I1 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930953: | MAIN_R1 (timeout: EVENT_SO_DISCARD flags: 200)
- Jun 27 16:56:11.930956: | MAIN_I2 (timeout: EVENT_v1_RETRANSMIT flags: 0)
- Jun 27 16:56:11.930958: | MAIN_R2 (timeout: EVENT_v1_RETRANSMIT flags: 0)
- Jun 27 16:56:11.930960: | MAIN_I3 (timeout: EVENT_v1_RETRANSMIT flags: 0)
- Jun 27 16:56:11.930963: | MAIN_R3 (timeout: EVENT_SA_REPLACE flags: 200)
- Jun 27 16:56:11.930965: | MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.930968: | AGGR_R0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930970: | AGGR_I1 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930977: | AGGR_R1 (timeout: EVENT_SO_DISCARD flags: 200)
- Jun 27 16:56:11.930980: | AGGR_I2 (timeout: EVENT_SA_REPLACE flags: 200)
- Jun 27 16:56:11.930982: | AGGR_R2 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.930985: | QUICK_R0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930987: | QUICK_I1 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930989: | QUICK_R1 (timeout: EVENT_v1_RETRANSMIT flags: 0)
- Jun 27 16:56:11.930992: | QUICK_I2 (timeout: EVENT_SA_REPLACE flags: 200)
- Jun 27 16:56:11.930994: | QUICK_R2 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.930997: | INFO (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.930999: | INFO_PROTECTED (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931002: | XAUTH_R0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931004: | XAUTH_R1 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931006: | MODE_CFG_R0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931009: | MODE_CFG_R1 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.931011: | MODE_CFG_R2 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.931014: | MODE_CFG_I1 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931016: | XAUTH_I0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931018: | XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0)
- Jun 27 16:56:11.931027: | Processing IKEv2 state V2_REKEY_IKE_I0 (microcode Initiate CREATE_CHILD_SA IKE Rekey)
- Jun 27 16:56:11.931030: | Processing IKEv2 state V2_REKEY_CHILD_I0 (microcode Initiate CREATE_CHILD_SA IPsec Rekey SA)
- Jun 27 16:56:11.931032: | Processing IKEv2 state V2_CREATE_I0 (microcode Initiate CREATE_CHILD_SA IPsec SA)
- Jun 27 16:56:11.931035: | Processing IKEv2 state PARENT_I0 (microcode initiate IKE_SA_INIT)
- Jun 27 16:56:11.931037: | Processing IKEv2 state PARENT_I1 (microcode Initiator: process SA_INIT reply notification)
- Jun 27 16:56:11.931040: | Processing IKEv2 state PARENT_I2 (microcode Initiator: process INVALID_SYNTAX AUTH notification)
- Jun 27 16:56:11.931043: | Processing IKEv2 state PARENT_R0 (microcode Respond to IKE_SA_INIT)
- Jun 27 16:56:11.931045: | Processing IKEv2 state PARENT_R1 (microcode Responder: process AUTH request (no SKEYSEED))
- Jun 27 16:56:11.931048: | Processing IKEv2 state V2_REKEY_IKE_R (microcode Respond to CREATE_CHILD_SA IKE Rekey)
- Jun 27 16:56:11.931051: | Processing IKEv2 state V2_REKEY_IKE_I (microcode Process CREATE_CHILD_SA IKE Rekey Response)
- Jun 27 16:56:11.931054: | Processing IKEv2 state V2_CREATE_I (microcode Process CREATE_CHILD_SA IPsec SA Response)
- Jun 27 16:56:11.931056: | Processing IKEv2 state V2_CREATE_R (microcode Respond to CREATE_CHILD_SA IPsec SA Request)
- Jun 27 16:56:11.931059: | Processing IKEv2 state PARENT_I3 (microcode I3: INFORMATIONAL Request)
- Jun 27 16:56:11.931061: | Processing IKEv2 state PARENT_R2 (microcode R2: process INFORMATIONAL Request)
- Jun 27 16:56:11.931064: | Processing IKEv2 state IKESA_DEL (microcode IKE_SA_DEL: process INFORMATIONAL)
- Jun 27 16:56:11.931068: | ignoring microcode for PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_RETAIN
- Jun 27 16:56:11.931071: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
- Jun 27 16:56:11.931074: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
- Jun 27 16:56:11.931077: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
- Jun 27 16:56:11.931080: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL
- Jun 27 16:56:11.931084: | ignoring microcode for PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) -> PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) with event EVENT_SA_REPLACE
- Jun 27 16:56:11.931087: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
- Jun 27 16:56:11.931092: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
- Jun 27 16:56:11.931095: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
- Jun 27 16:56:11.931099: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN
- Jun 27 16:56:11.931101: | IKEv2_BASE (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931104: | PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0)
- Jun 27 16:56:11.931106: | PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0)
- Jun 27 16:56:11.931109: | PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.931111: | PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0)
- Jun 27 16:56:11.931114: | PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.931116: | V2_CREATE_I0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931119: | V2_CREATE_I (timeout: EVENT_v2_RETRANSMIT flags: 0)
- Jun 27 16:56:11.931121: | V2_REKEY_IKE_I0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931124: | V2_REKEY_IKE_I (timeout: EVENT_v2_RETRANSMIT flags: 0)
- Jun 27 16:56:11.931126: | V2_REKEY_CHILD_I0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931129: | V2_REKEY_CHILD_I (timeout: EVENT_v2_RETRANSMIT flags: 0)
- Jun 27 16:56:11.931131: | V2_CREATE_R (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931134: | V2_REKEY_IKE_R (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931136: | V2_REKEY_CHILD_R (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931139: | V2_IPSEC_I (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.931141: | V2_IPSEC_R (timeout: EVENT_SA_REPLACE flags: 0)
- Jun 27 16:56:11.931143: | IKESA_DEL (timeout: EVENT_RETAIN flags: 0)
- Jun 27 16:56:11.931146: | CHILDSA_DEL (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931148: | PARENT_R0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931151: | PARENT_I0 (timeout: EVENT_NULL flags: 0)
- Jun 27 16:56:11.931166: Using Linux XFRM/NETKEY IPsec interface code on 3.16.0-6-amd64
- Jun 27 16:56:11.931186: | process 3245 listening for PF_KEY_V2 on file descriptor 15
- Jun 27 16:56:11.931189: | kernel_alg_init()
- Jun 27 16:56:11.931193: | Hard-wiring new AEAD algorithms
- Jun 27 16:56:11.931197: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=18(ESP_AES_GCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931201: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=19(ESP_AES_GCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931204: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=20(ESP_AES_GCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931207: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=14(ESP_AES_CCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931211: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=15(ESP_AES_CCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931214: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=16(ESP_AES_CCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931217: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=23(ESP_NULL_AUTH_AES_GMAC), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.931219: | Hard-wiring new INTEG algorithms
- Jun 27 16:56:11.931223: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=250(AH_AES_CMAC_96), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
- Jun 27 16:56:11.931289: | finish_pfkey_msg: K_SADB_REGISTER message 1 for AH
- Jun 27 16:56:11.931295: | 02 07 00 02 02 00 00 00 01 00 00 00 ad 0c 00 00
- Jun 27 16:56:11.931371: | starting up helper thread 1
- Jun 27 16:56:11.931376: seccomp security for crypto helper not supported
- Jun 27 16:56:11.931382: | status value returned by setting the priority of this thread (crypto helper 1) 22
- Jun 27 16:56:11.931384: | crypto helper 1 waiting (nothing to do)
- Jun 27 16:56:11.931390: | starting up helper thread 0
- Jun 27 16:56:11.931393: seccomp security for crypto helper not supported
- Jun 27 16:56:11.931396: | status value returned by setting the priority of this thread (crypto helper 0) 22
- Jun 27 16:56:11.931399: | crypto helper 0 waiting (nothing to do)
- Jun 27 16:56:11.933721: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 1 for process 0
- Jun 27 16:56:11.933733: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 2 for process 0
- Jun 27 16:56:11.933737: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 3 for process 0
- Jun 27 16:56:11.933741: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 4 for process 0
- Jun 27 16:56:11.933745: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 5 for process 0
- Jun 27 16:56:11.933748: | pfkey_get: ignoring PF_KEY K_SADB_X_GRPSA message 6 for process 0
- Jun 27 16:56:11.933752: | pfkey_get: K_SADB_REGISTER message 1
- Jun 27 16:56:11.933756: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=72
- Jun 27 16:56:11.933760: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
- Jun 27 16:56:11.933763: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
- Jun 27 16:56:11.933766: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
- Jun 27 16:56:11.933770: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256
- Jun 27 16:56:11.933773: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384
- Jun 27 16:56:11.933776: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512
- Jun 27 16:56:11.933779: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
- Jun 27 16:56:11.933782: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
- Jun 27 16:56:11.933785: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=88
- Jun 27 16:56:11.933788: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
- Jun 27 16:56:11.933791: | kernel_alg_add(2,15,11) fails because alg combo is invalid
- Jun 27 16:56:11.933794: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64
- Jun 27 16:56:11.933797: | kernel_alg_add(2,15,2) fails because alg combo is invalid
- Jun 27 16:56:11.933800: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192
- Jun 27 16:56:11.933803: | kernel_alg_add(2,15,3) fails because alg combo is invalid
- Jun 27 16:56:11.933806: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128
- Jun 27 16:56:11.933808: | kernel_alg_add(2,15,6) fails because alg combo is invalid
- Jun 27 16:56:11.933811: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448
- Jun 27 16:56:11.933814: | kernel_alg_add(2,15,7) fails because alg combo is invalid
- Jun 27 16:56:11.933821: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.933823: | kernel_alg_add(2,15,12) fails because alg combo is invalid
- Jun 27 16:56:11.933827: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.933829: | kernel_alg_add(2,15,252) fails because alg combo is invalid
- Jun 27 16:56:11.933832: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.933835: | kernel_alg_add(2,15,22) fails because alg combo is invalid
- Jun 27 16:56:11.933838: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.933841: | kernel_alg_add(2,15,253) fails because alg combo is invalid
- Jun 27 16:56:11.933844: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288
- Jun 27 16:56:11.933846: | kernel_alg_add(2,15,13) fails because alg combo is invalid
- Jun 27 16:56:11.933849: | AH registered with kernel.
- Jun 27 16:56:11.933853: | finish_pfkey_msg: K_SADB_REGISTER message 2 for ESP
- Jun 27 16:56:11.933856: | 02 07 00 03 02 00 00 00 02 00 00 00 ad 0c 00 00
- Jun 27 16:56:11.935420: | pfkey_get: K_SADB_REGISTER message 2
- Jun 27 16:56:11.935429: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=72
- Jun 27 16:56:11.935433: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
- Jun 27 16:56:11.935436: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=251
- Jun 27 16:56:11.935439: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
- Jun 27 16:56:11.935442: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=2
- Jun 27 16:56:11.935445: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
- Jun 27 16:56:11.935448: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=3
- Jun 27 16:56:11.935451: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256
- Jun 27 16:56:11.935453: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=5
- Jun 27 16:56:11.935457: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384
- Jun 27 16:56:11.935459: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=6
- Jun 27 16:56:11.935462: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512
- Jun 27 16:56:11.935465: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=7
- Jun 27 16:56:11.935468: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160
- Jun 27 16:56:11.935470: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=8
- Jun 27 16:56:11.935474: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128
- Jun 27 16:56:11.935476: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=9
- Jun 27 16:56:11.935479: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=88
- Jun 27 16:56:11.935482: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0
- Jun 27 16:56:11.935489: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64
- Jun 27 16:56:11.935492: | kernel_alg_add(): Ignoring alg_id=2(ESP_DES(UNUSED)) - too weak
- Jun 27 16:56:11.935495: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192
- Jun 27 16:56:11.935498: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128
- Jun 27 16:56:11.935501: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448
- Jun 27 16:56:11.935504: | kernel_alg_add(): Ignoring alg_id=7(ESP_BLOWFISH(UNUSED)) - too weak
- Jun 27 16:56:11.935507: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.935510: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.935514: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.935517: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256
- Jun 27 16:56:11.935520: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288
- Jun 27 16:56:11.935522: | ESP registered with kernel.
- Jun 27 16:56:11.935526: | finish_pfkey_msg: K_SADB_REGISTER message 3 for IPCOMP
- Jun 27 16:56:11.935529: | 02 07 00 09 02 00 00 00 03 00 00 00 ad 0c 00 00
- Jun 27 16:56:11.937198: | pfkey_get: K_SADB_REGISTER message 3
- Jun 27 16:56:11.937207: | IPCOMP registered with kernel.
- Jun 27 16:56:11.937214: | Registered AH, ESP and IPCOMP
- Jun 27 16:56:11.937219: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x555eacc2ac88
- Jun 27 16:56:11.937223: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
- Jun 27 16:56:11.937228: | setup kernel fd callback
- Jun 27 16:56:11.937410: | selinux support is NOT enabled.
- Jun 27 16:56:11.937418: systemd watchdog for ipsec service configured with timeout of 200000000 usecs
- Jun 27 16:56:11.937421: watchdog: sending probes every 100 secs
- Jun 27 16:56:11.937424: | pluto_sd: executing action action: start(2), status 0
- Jun 27 16:56:11.937443: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x555eacc2af88
- Jun 27 16:56:11.937448: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds
- Jun 27 16:56:11.937708: | unbound context created - setting debug level to 5
- Jun 27 16:56:11.937737: | /etc/hosts lookups activated
- Jun 27 16:56:11.937757: | /etc/resolv.conf usage activated
- Jun 27 16:56:11.937761: | Loading dnssec root key from:/var/lib/unbound/root.key
- Jun 27 16:56:11.937764: | No additional dnssec trust anchors defined via dnssec-trusted= option
- Jun 27 16:56:11.937767: | Setting up events, loop start
- Jun 27 16:56:11.937989: | created addconn helper (pid:3274) using fork+execve
- Jun 27 16:56:11.938001: | forked child 3274
- Jun 27 16:56:11.938013: | pid table: inserting object 0x555eacc2ded8 (addconn pid 3274) entry 0x555eacc2dee0 into list 0x555eabca2880 (older 0x555eabca2880 newer 0x555eabca2880)
- Jun 27 16:56:11.938018: | pid table: inserted object 0x555eacc2ded8 (addconn pid 3274) entry 0x555eacc2dee0 (older 0x555eabca2880 newer 0x555eabca2880)
- Jun 27 16:56:11.938021: | pid table: list entry 0x555eabca2880 is HEAD (older 0x555eacc2dee0 newer 0x555eacc2dee0)
- Jun 27 16:56:11.938023: seccomp security not supported
- Jun 27 16:56:11.943519: | Added new connection v6neighbor-hole-in with policy AUTH_NEVER+PASS+NEVER_NEGOTIATE
- Jun 27 16:56:11.943541: | counting wild cards for ::1 is 0
- Jun 27 16:56:11.943546: | counting wild cards for %any is 0
- Jun 27 16:56:11.943553: added connection description "v6neighbor-hole-in"
- Jun 27 16:56:11.943564: | ::/0===::1<::1>:58/34560...%any:58/34816===::/0
- Jun 27 16:56:11.943568: | ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 0; policy: AUTH_NEVER+PASS+NEVER_NEGOTIATE
- Jun 27 16:56:11.943609: | Added new connection v6neighbor-hole-out with policy AUTH_NEVER+PASS+NEVER_NEGOTIATE
- Jun 27 16:56:11.943616: | counting wild cards for ::1 is 0
- Jun 27 16:56:11.943619: | counting wild cards for %any is 0
- Jun 27 16:56:11.943622: added connection description "v6neighbor-hole-out"
- Jun 27 16:56:11.943630: | ::/0===::1<::1>:58/34816...%any:58/34560===::/0
- Jun 27 16:56:11.943633: | ike_life: 0s; ipsec_life: 0s; rekey_margin: 0s; rekey_fuzz: 0%; keyingtries: 0; replay_window: 0; policy: AUTH_NEVER+PASS+NEVER_NEGOTIATE
- Jun 27 16:56:11.943672: | Added new connection xauth-aggr with policy PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
- Jun 27 16:56:11.943679: | counting wild cards for 192.168.1.137 is 0
- Jun 27 16:56:11.943682: | counting wild cards for (none) is 15
- Jun 27 16:56:11.943686: | add new addresspool to global pools 192.168.20.2-192.168.20.10 size 9 ptr 0x555eacc2f158
- Jun 27 16:56:11.943689: | based upon policy, the connection is a template.
- Jun 27 16:56:11.943693: | reference addresspool of conn xauth-aggr[0] kind CK_TEMPLATE refcnt 0
- Jun 27 16:56:11.943695: added connection description "xauth-aggr"
- Jun 27 16:56:11.943703: | 0.0.0.0/0===192.168.1.137<192.168.1.137>[MS+XS+S=C]...%any[+MC+XC+S=C]
- Jun 27 16:56:11.943708: | ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
- Jun 27 16:56:11.943744: | Added new connection xauth with policy PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
- Jun 27 16:56:11.943750: | counting wild cards for 192.168.1.137 is 0
- Jun 27 16:56:11.943753: | counting wild cards for (none) is 15
- Jun 27 16:56:11.943756: | re-use addresspool 192.168.20.2-192.168.20.10 exists ref count 1 used 0 size 9 ptr 0x555eacc2f158 re-use it
- Jun 27 16:56:11.943759: | based upon policy, the connection is a template.
- Jun 27 16:56:11.943762: | reference addresspool of conn xauth[0] kind CK_TEMPLATE refcnt 1
- Jun 27 16:56:11.943764: added connection description "xauth"
- Jun 27 16:56:11.943771: | 0.0.0.0/0===192.168.1.137<192.168.1.137>[MS+XS+S=C]...%any[+MC+XC+S=C]
- Jun 27 16:56:11.943775: | ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
- Jun 27 16:56:11.943810: | pluto_sd: executing action action: reloading(4), status 0
- Jun 27 16:56:11.943826: listening for IKE messages
- Jun 27 16:56:11.943845: | Inspecting interface lo
- Jun 27 16:56:11.943850: | found lo with address 127.0.0.1
- Jun 27 16:56:11.943852: | Inspecting interface eth0
- Jun 27 16:56:11.943856: | found eth0 with address 192.168.1.137
- Jun 27 16:56:11.943878: adding interface eth0/eth0 192.168.1.137:500
- Jun 27 16:56:11.943890: | NAT-Traversal: Trying sockopt style NAT-T
- Jun 27 16:56:11.943894: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
- Jun 27 16:56:11.943897: adding interface eth0/eth0 192.168.1.137:4500
- Jun 27 16:56:11.943906: adding interface lo/lo 127.0.0.1:500
- Jun 27 16:56:11.943915: | NAT-Traversal: Trying sockopt style NAT-T
- Jun 27 16:56:11.943919: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4
- Jun 27 16:56:11.943921: adding interface lo/lo 127.0.0.1:4500
- Jun 27 16:56:11.943958: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
- Jun 27 16:56:11.943996: adding interface lo/lo ::1:500
- Jun 27 16:56:11.944004: | connect_to_host_pair: 192.168.1.137:500 0.0.0.0:500 -> hp:none
- Jun 27 16:56:11.944008: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:11.944011: | connect_to_host_pair: 192.168.1.137:500 0.0.0.0:500 -> hp:xauth
- Jun 27 16:56:11.944014: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:11.944017: | connect_to_host_pair: ::1:500 :::500 -> hp:none
- Jun 27 16:56:11.944020: | find_host_pair: comparing ::1:500 to :::500
- Jun 27 16:56:11.944023: | connect_to_host_pair: ::1:500 :::500 -> hp:v6neighbor-hole-out
- Jun 27 16:56:11.944033: | setup callback for interface lo:500 fd 20
- Jun 27 16:56:11.944046: | setup callback for interface lo:4500 fd 19
- Jun 27 16:56:11.944049: | setup callback for interface lo:500 fd 18
- Jun 27 16:56:11.944053: | setup callback for interface eth0:4500 fd 17
- Jun 27 16:56:11.944057: | setup callback for interface eth0:500 fd 16
- Jun 27 16:56:11.944062: | certs and keys locked by 'free_preshared_secrets'
- Jun 27 16:56:11.944065: | certs and keys unlocked by 'free_preshard_secrets'
- Jun 27 16:56:11.944081: loading secrets from "/etc/ipsec.secrets"
- Jun 27 16:56:11.944111: loading secrets from "/etc/ipsec.d/xauth.secrets"
- Jun 27 16:56:11.944118: | id type added to secret(0x555eacc30998) PKK_PSK: 192.168.1.137
- Jun 27 16:56:11.944122: WARNING: using a weak secret (PSK)
- Jun 27 16:56:11.944126: | Processing PSK at line 1: passed
- Jun 27 16:56:11.944129: | certs and keys locked by 'process_secret'
- Jun 27 16:56:11.944132: | certs and keys unlocked by 'process_secret'
- Jun 27 16:56:11.944143: | pluto_sd: executing action action: ready(5), status 0
- Jun 27 16:56:11.944259: | processing: start connection "v6neighbor-hole-in" (in whack_route_connection() at rcv_whack.c:106)
- Jun 27 16:56:11.944267: | could_route called for v6neighbor-hole-in (kind=CK_PERMANENT)
- Jun 27 16:56:11.944271: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944273: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944276: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944278: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944281: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944283: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944286: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944288: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944292: | route owner of "v6neighbor-hole-in" unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:11.944295: | route_and_eroute() for proto 58, and source port 34560 dest port 34816
- Jun 27 16:56:11.944298: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944300: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944303: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944305: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944308: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944310: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944312: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.944315: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:11.944318: | route owner of "v6neighbor-hole-in" unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:11.944321: | route_and_eroute with c: v6neighbor-hole-in (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
- Jun 27 16:56:11.944325: | shunt_eroute() called for connection 'v6neighbor-hole-in' to 'add' for rt_kind 'prospective erouted' using protoports 58--34560->-34816
- Jun 27 16:56:11.944328: | netlink_shunt_eroute for proto 58, and source port 34560 dest port 34816
- Jun 27 16:56:11.944333: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
- Jun 27 16:56:11.944335: | netlink_raw_eroute: SPI_PASS
- Jun 27 16:56:11.944342: | IPsec Sa SPD priority set to 1
- Jun 27 16:56:11.944364: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
- Jun 27 16:56:11.944367: | netlink_raw_eroute: SPI_PASS
- Jun 27 16:56:11.944370: | IPsec Sa SPD priority set to 1
- Jun 27 16:56:11.944379: | route_and_eroute: firewall_notified: true
- Jun 27 16:56:11.944382: | running updown command "ipsec _updown" for verb prepare
- Jun 27 16:56:11.944385: | command executing prepare-client-v6
- Jun 27 16:56:11.944400: | executing prepare-client-v6: PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
- Jun 27 16:56:11.944404: | popen cmd is 902 chars long
- Jun 27 16:56:11.944407: | cmd( 0):PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
- Jun 27 16:56:11.944410: | cmd( 80):hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=':
- Jun 27 16:56:11.944412: | cmd( 160):::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' P:
- Jun 27 16:56:11.944415: | cmd( 240):LUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER=':::
- Jun 27 16:56:11.944417: | cmd( 320):' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO:
- Jun 27 16:56:11.944420: | cmd( 400):_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PE:
- Jun 27 16:56:11.944422: | cmd( 480):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PA:
- Jun 27 16:56:11.944425: | cmd( 560):SS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' :
- Jun 27 16:56:11.944427: | cmd( 640):XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_:
- Jun 27 16:56:11.944430: | cmd( 720):INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_:
- Jun 27 16:56:11.944432: | cmd( 800):CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=:
- Jun 27 16:56:11.944435: | cmd( 880):0x0 ipsec _updown 2>&1:
- Jun 27 16:56:11.946860: | running updown command "ipsec _updown" for verb route
- Jun 27 16:56:11.946875: | command executing route-client-v6
- Jun 27 16:56:11.946895: | executing route-client-v6: PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
- Jun 27 16:56:11.946899: | popen cmd is 900 chars long
- Jun 27 16:56:11.946902: | cmd( 0):PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-ho:
- Jun 27 16:56:11.946910: | cmd( 80):le-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=':::
- Jun 27 16:56:11.946913: | cmd( 160):/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLU:
- Jun 27 16:56:11.946916: | cmd( 240):TO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' :
- Jun 27 16:56:11.946918: | cmd( 320):PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_P:
- Jun 27 16:56:11.946921: | cmd( 400):EER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER:
- Jun 27 16:56:11.946923: | cmd( 480):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS:
- Jun 27 16:56:11.946926: | cmd( 560):+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XA:
- Jun 27 16:56:11.946929: | cmd( 640):UTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_IN:
- Jun 27 16:56:11.946931: | cmd( 720):FO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CO:
- Jun 27 16:56:11.946934: | cmd( 800):NFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x:
- Jun 27 16:56:11.946936: | cmd( 880):0 ipsec _updown 2>&1:
- Jun 27 16:56:11.949544: | processing: stop connection "v6neighbor-hole-in" (in whack_route_connection() at rcv_whack.c:116)
- Jun 27 16:56:11.949748: | waitpid returned nothing left to do (all child processes are busy)
- Jun 27 16:56:11.949756: | waitpid returned nothing left to do (all child processes are busy)
- Jun 27 16:56:11.949902: | processing: start connection "v6neighbor-hole-out" (in whack_route_connection() at rcv_whack.c:106)
- Jun 27 16:56:11.949918: | could_route called for v6neighbor-hole-out (kind=CK_PERMANENT)
- Jun 27 16:56:11.949929: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949932: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949935: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949937: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949943: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949945: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949948: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949952: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949963: | route owner of "v6neighbor-hole-out" unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:11.949967: | route_and_eroute() for proto 58, and source port 34816 dest port 34560
- Jun 27 16:56:11.949971: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949974: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949977: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949981: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949983: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949986: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949989: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:11.949992: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:11.949996: | route owner of "v6neighbor-hole-out" unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:11.950001: | route_and_eroute with c: v6neighbor-hole-out (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #0
- Jun 27 16:56:11.950006: | shunt_eroute() called for connection 'v6neighbor-hole-out' to 'add' for rt_kind 'prospective erouted' using protoports 58--34816->-34560
- Jun 27 16:56:11.950011: | netlink_shunt_eroute for proto 58, and source port 34816 dest port 34560
- Jun 27 16:56:11.950016: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
- Jun 27 16:56:11.950023: | netlink_raw_eroute: SPI_PASS
- Jun 27 16:56:11.950031: | IPsec Sa SPD priority set to 1
- Jun 27 16:56:11.950096: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
- Jun 27 16:56:11.950116: | netlink_raw_eroute: SPI_PASS
- Jun 27 16:56:11.950119: | IPsec Sa SPD priority set to 1
- Jun 27 16:56:11.950135: | route_and_eroute: firewall_notified: true
- Jun 27 16:56:11.950140: | running updown command "ipsec _updown" for verb prepare
- Jun 27 16:56:11.950142: | command executing prepare-client-v6
- Jun 27 16:56:11.950173: | executing prepare-client-v6: PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
- Jun 27 16:56:11.950178: | popen cmd is 903 chars long
- Jun 27 16:56:11.950183: | cmd( 0):PLUTO_VERB='prepare-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
- Jun 27 16:56:11.950186: | cmd( 80):hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=:
- Jun 27 16:56:11.950189: | cmd( 160):'::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' :
- Jun 27 16:56:11.950192: | cmd( 240):PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::
- Jun 27 16:56:11.950195: | cmd( 320)::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUT:
- Jun 27 16:56:11.950198: | cmd( 400):O_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_P:
- Jun 27 16:56:11.950201: | cmd( 480):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+P:
- Jun 27 16:56:11.950204: | cmd( 560):ASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6':
- Jun 27 16:56:11.950206: | cmd( 640): XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN:
- Jun 27 16:56:11.950209: | cmd( 720):_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM:
- Jun 27 16:56:11.950213: | cmd( 800):_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT:
- Jun 27 16:56:11.950215: | cmd( 880):=0x0 ipsec _updown 2>&1:
- Jun 27 16:56:11.955443: | running updown command "ipsec _updown" for verb route
- Jun 27 16:56:11.955485: | command executing route-client-v6
- Jun 27 16:56:11.955524: | executing route-client-v6: PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
- Jun 27 16:56:11.955529: | popen cmd is 901 chars long
- Jun 27 16:56:11.955532: | cmd( 0):PLUTO_VERB='route-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-ho:
- Jun 27 16:56:11.955535: | cmd( 80):le-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::
- Jun 27 16:56:11.955553: | cmd( 160)::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PL:
- Jun 27 16:56:11.955556: | cmd( 240):UTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::':
- Jun 27 16:56:11.955558: | cmd( 320): PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_:
- Jun 27 16:56:11.955561: | cmd( 400):PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEE:
- Jun 27 16:56:11.955563: | cmd( 480):R_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PAS:
- Jun 27 16:56:11.955566: | cmd( 560):S+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' X:
- Jun 27 16:56:11.955568: | cmd( 640):AUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_I:
- Jun 27 16:56:11.955571: | cmd( 720):NFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_C:
- Jun 27 16:56:11.955573: | cmd( 800):ONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0:
- Jun 27 16:56:11.955576: | cmd( 880):x0 ipsec _updown 2>&1:
- Jun 27 16:56:11.958100: | processing: stop connection "v6neighbor-hole-out" (in whack_route_connection() at rcv_whack.c:116)
- Jun 27 16:56:11.958149: | waitpid returned nothing left to do (all child processes are busy)
- Jun 27 16:56:11.958154: | waitpid returned nothing left to do (all child processes are busy)
- Jun 27 16:56:11.958497: | waitpid returned pid 3274 (exited with status 0)
- Jun 27 16:56:11.958506: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:11.958511: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:11.958514: | reaped addconn helper child (status 0)
- Jun 27 16:56:11.958519: | pid table: removing object 0x555eacc2ded8 (addconn pid 3274) entry 0x555eacc2dee0 (older 0x555eabca2880 newer 0x555eabca2880)
- Jun 27 16:56:11.958522: | pid table: empty
- Jun 27 16:56:11.958528: | waitpid returned ECHILD (no child processes left)
- Jun 27 16:56:31.959414: | timer_event_cb: processing event@0x555eacc2ac88
- Jun 27 16:56:31.959458: | handling event EVENT_SHUNT_SCAN
- Jun 27 16:56:31.959467: | expiring aged bare shunts from shunt table
- Jun 27 16:56:31.959473: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x555eacc30518
- Jun 27 16:56:31.959478: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
- Jun 27 16:56:31.959486: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x555eacc2ac88
- Jun 27 16:56:38.193806: | *received 3092 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.193853: | 0e 20 a4 7f 26 01 0e 7b 00 00 00 00 00 00 00 00
- Jun 27 16:56:38.193861: | 01 10 02 00 00 00 00 00 00 00 0c 14 0d 00 0a f4
- Jun 27 16:56:38.193866: | 00 00 00 01 00 00 00 01 00 00 0a e8 01 01 00 48
- Jun 27 16:56:38.193871: | 03 00 00 28 01 01 00 00 80 01 00 07 80 0e 01 00
- Jun 27 16:56:38.193876: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.193882: | 00 0c 00 04 00 01 51 80 03 00 00 28 02 01 00 00
- Jun 27 16:56:38.193887: | 80 01 00 07 80 0e 01 00 80 02 00 01 80 04 00 05
- Jun 27 16:56:38.193893: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.193898: | 03 00 00 28 03 01 00 00 80 01 00 07 80 0e 01 00
- Jun 27 16:56:38.193904: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.193909: | 00 0c 00 04 00 01 51 80 03 00 00 28 04 01 00 00
- Jun 27 16:56:38.193913: | 80 01 00 07 80 0e 01 00 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.193918: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.193923: | 03 00 00 28 05 01 00 00 80 01 00 07 80 0e 01 00
- Jun 27 16:56:38.193928: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.193933: | 00 0c 00 04 00 01 51 80 03 00 00 28 06 01 00 00
- Jun 27 16:56:38.193939: | 80 01 00 07 80 0e 01 00 80 02 00 02 80 04 00 05
- Jun 27 16:56:38.193944: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.193949: | 03 00 00 28 07 01 00 00 80 01 00 07 80 0e 01 00
- Jun 27 16:56:38.193967: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.193973: | 00 0c 00 04 00 01 51 80 03 00 00 28 08 01 00 00
- Jun 27 16:56:38.193979: | 80 01 00 07 80 0e 01 00 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.193984: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.193990: | 03 00 00 28 09 01 00 00 80 01 00 07 80 0e 00 c0
- Jun 27 16:56:38.193995: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194001: | 00 0c 00 04 00 01 51 80 03 00 00 28 0a 01 00 00
- Jun 27 16:56:38.194006: | 80 01 00 07 80 0e 00 c0 80 02 00 01 80 04 00 05
- Jun 27 16:56:38.194011: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194016: | 03 00 00 28 0b 01 00 00 80 01 00 07 80 0e 00 c0
- Jun 27 16:56:38.194021: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194026: | 00 0c 00 04 00 01 51 80 03 00 00 28 0c 01 00 00
- Jun 27 16:56:38.194031: | 80 01 00 07 80 0e 00 c0 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194036: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194042: | 03 00 00 28 0d 01 00 00 80 01 00 07 80 0e 00 c0
- Jun 27 16:56:38.194047: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194052: | 00 0c 00 04 00 01 51 80 03 00 00 28 0e 01 00 00
- Jun 27 16:56:38.194057: | 80 01 00 07 80 0e 00 c0 80 02 00 02 80 04 00 05
- Jun 27 16:56:38.194062: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194068: | 03 00 00 28 0f 01 00 00 80 01 00 07 80 0e 00 c0
- Jun 27 16:56:38.194073: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194078: | 00 0c 00 04 00 01 51 80 03 00 00 28 10 01 00 00
- Jun 27 16:56:38.194084: | 80 01 00 07 80 0e 00 c0 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194089: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194094: | 03 00 00 28 11 01 00 00 80 01 00 07 80 0e 00 80
- Jun 27 16:56:38.194099: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194105: | 00 0c 00 04 00 01 51 80 03 00 00 28 12 01 00 00
- Jun 27 16:56:38.194110: | 80 01 00 07 80 0e 00 80 80 02 00 01 80 04 00 05
- Jun 27 16:56:38.194116: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194121: | 03 00 00 28 13 01 00 00 80 01 00 07 80 0e 00 80
- Jun 27 16:56:38.194126: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194131: | 00 0c 00 04 00 01 51 80 03 00 00 28 14 01 00 00
- Jun 27 16:56:38.194136: | 80 01 00 07 80 0e 00 80 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194141: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194147: | 03 00 00 28 15 01 00 00 80 01 00 07 80 0e 00 80
- Jun 27 16:56:38.194152: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194158: | 00 0c 00 04 00 01 51 80 03 00 00 28 16 01 00 00
- Jun 27 16:56:38.194163: | 80 01 00 07 80 0e 00 80 80 02 00 02 80 04 00 05
- Jun 27 16:56:38.194168: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194174: | 03 00 00 28 17 01 00 00 80 01 00 07 80 0e 00 80
- Jun 27 16:56:38.194179: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194184: | 00 0c 00 04 00 01 51 80 03 00 00 28 18 01 00 00
- Jun 27 16:56:38.194190: | 80 01 00 07 80 0e 00 80 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194195: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194201: | 03 00 00 28 19 01 00 00 80 01 00 03 80 0e 01 00
- Jun 27 16:56:38.194206: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194211: | 00 0c 00 04 00 01 51 80 03 00 00 28 1a 01 00 00
- Jun 27 16:56:38.194216: | 80 01 00 03 80 0e 01 00 80 02 00 01 80 04 00 05
- Jun 27 16:56:38.194221: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194226: | 03 00 00 28 1b 01 00 00 80 01 00 03 80 0e 01 00
- Jun 27 16:56:38.194231: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194237: | 00 0c 00 04 00 01 51 80 03 00 00 28 1c 01 00 00
- Jun 27 16:56:38.194249: | 80 01 00 03 80 0e 01 00 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194255: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194261: | 03 00 00 28 1d 01 00 00 80 01 00 03 80 0e 01 00
- Jun 27 16:56:38.194266: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194272: | 00 0c 00 04 00 01 51 80 03 00 00 28 1e 01 00 00
- Jun 27 16:56:38.194277: | 80 01 00 03 80 0e 01 00 80 02 00 02 80 04 00 05
- Jun 27 16:56:38.194282: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194288: | 03 00 00 28 1f 01 00 00 80 01 00 03 80 0e 01 00
- Jun 27 16:56:38.194293: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194299: | 00 0c 00 04 00 01 51 80 03 00 00 28 20 01 00 00
- Jun 27 16:56:38.194304: | 80 01 00 03 80 0e 01 00 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194309: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194315: | 03 00 00 28 21 01 00 00 80 01 00 03 80 0e 00 c0
- Jun 27 16:56:38.194320: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194325: | 00 0c 00 04 00 01 51 80 03 00 00 28 22 01 00 00
- Jun 27 16:56:38.194331: | 80 01 00 03 80 0e 00 c0 80 02 00 01 80 04 00 05
- Jun 27 16:56:38.194336: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194341: | 03 00 00 28 23 01 00 00 80 01 00 03 80 0e 00 c0
- Jun 27 16:56:38.194347: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194352: | 00 0c 00 04 00 01 51 80 03 00 00 28 24 01 00 00
- Jun 27 16:56:38.194357: | 80 01 00 03 80 0e 00 c0 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194362: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194367: | 03 00 00 28 25 01 00 00 80 01 00 03 80 0e 00 c0
- Jun 27 16:56:38.194372: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194377: | 00 0c 00 04 00 01 51 80 03 00 00 28 26 01 00 00
- Jun 27 16:56:38.194382: | 80 01 00 03 80 0e 00 c0 80 02 00 02 80 04 00 05
- Jun 27 16:56:38.194388: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194393: | 03 00 00 28 27 01 00 00 80 01 00 03 80 0e 00 c0
- Jun 27 16:56:38.194398: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194403: | 00 0c 00 04 00 01 51 80 03 00 00 28 28 01 00 00
- Jun 27 16:56:38.194407: | 80 01 00 03 80 0e 00 c0 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194412: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194418: | 03 00 00 28 29 01 00 00 80 01 00 03 80 0e 00 80
- Jun 27 16:56:38.194423: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194429: | 00 0c 00 04 00 01 51 80 03 00 00 28 2a 01 00 00
- Jun 27 16:56:38.194435: | 80 01 00 03 80 0e 00 80 80 02 00 01 80 04 00 05
- Jun 27 16:56:38.194440: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194446: | 03 00 00 28 2b 01 00 00 80 01 00 03 80 0e 00 80
- Jun 27 16:56:38.194451: | 80 02 00 01 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194456: | 00 0c 00 04 00 01 51 80 03 00 00 28 2c 01 00 00
- Jun 27 16:56:38.194461: | 80 01 00 03 80 0e 00 80 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194467: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194472: | 03 00 00 28 2d 01 00 00 80 01 00 03 80 0e 00 80
- Jun 27 16:56:38.194478: | 80 02 00 02 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194483: | 00 0c 00 04 00 01 51 80 03 00 00 28 2e 01 00 00
- Jun 27 16:56:38.194488: | 80 01 00 03 80 0e 00 80 80 02 00 02 80 04 00 05
- Jun 27 16:56:38.194493: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194499: | 03 00 00 28 2f 01 00 00 80 01 00 03 80 0e 00 80
- Jun 27 16:56:38.194505: | 80 02 00 02 80 04 00 02 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194510: | 00 0c 00 04 00 01 51 80 03 00 00 28 30 01 00 00
- Jun 27 16:56:38.194515: | 80 01 00 03 80 0e 00 80 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194521: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194533: | 03 00 00 24 31 01 00 00 80 01 00 05 80 02 00 01
- Jun 27 16:56:38.194539: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
- Jun 27 16:56:38.194544: | 00 01 51 80 03 00 00 24 32 01 00 00 80 01 00 05
- Jun 27 16:56:38.194550: | 80 02 00 01 80 04 00 05 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194555: | 00 0c 00 04 00 01 51 80 03 00 00 24 33 01 00 00
- Jun 27 16:56:38.194560: | 80 01 00 05 80 02 00 01 80 04 00 02 80 03 fd e9
- Jun 27 16:56:38.194566: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
- Jun 27 16:56:38.194571: | 34 01 00 00 80 01 00 05 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194577: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194582: | 03 00 00 24 35 01 00 00 80 01 00 05 80 02 00 02
- Jun 27 16:56:38.194588: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
- Jun 27 16:56:38.194593: | 00 01 51 80 03 00 00 24 36 01 00 00 80 01 00 05
- Jun 27 16:56:38.194599: | 80 02 00 02 80 04 00 05 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194604: | 00 0c 00 04 00 01 51 80 03 00 00 24 37 01 00 00
- Jun 27 16:56:38.194610: | 80 01 00 05 80 02 00 02 80 04 00 02 80 03 fd e9
- Jun 27 16:56:38.194615: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
- Jun 27 16:56:38.194620: | 38 01 00 00 80 01 00 05 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194625: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194631: | 03 00 00 24 39 01 00 00 80 01 00 06 80 02 00 01
- Jun 27 16:56:38.194636: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
- Jun 27 16:56:38.194641: | 00 01 51 80 03 00 00 24 3a 01 00 00 80 01 00 06
- Jun 27 16:56:38.194647: | 80 02 00 01 80 04 00 05 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194652: | 00 0c 00 04 00 01 51 80 03 00 00 24 3b 01 00 00
- Jun 27 16:56:38.194658: | 80 01 00 06 80 02 00 01 80 04 00 02 80 03 fd e9
- Jun 27 16:56:38.194663: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
- Jun 27 16:56:38.194668: | 3c 01 00 00 80 01 00 06 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194673: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194678: | 03 00 00 24 3d 01 00 00 80 01 00 06 80 02 00 02
- Jun 27 16:56:38.194683: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
- Jun 27 16:56:38.194689: | 00 01 51 80 03 00 00 24 3e 01 00 00 80 01 00 06
- Jun 27 16:56:38.194694: | 80 02 00 02 80 04 00 05 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194699: | 00 0c 00 04 00 01 51 80 03 00 00 24 3f 01 00 00
- Jun 27 16:56:38.194705: | 80 01 00 06 80 02 00 02 80 04 00 02 80 03 fd e9
- Jun 27 16:56:38.194710: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
- Jun 27 16:56:38.194715: | 40 01 00 00 80 01 00 06 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194721: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194726: | 03 00 00 24 41 01 00 00 80 01 00 01 80 02 00 01
- Jun 27 16:56:38.194731: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
- Jun 27 16:56:38.194736: | 00 01 51 80 03 00 00 24 42 01 00 00 80 01 00 01
- Jun 27 16:56:38.194741: | 80 02 00 01 80 04 00 05 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194746: | 00 0c 00 04 00 01 51 80 03 00 00 24 43 01 00 00
- Jun 27 16:56:38.194751: | 80 01 00 01 80 02 00 01 80 04 00 02 80 03 fd e9
- Jun 27 16:56:38.194757: | 80 0b 00 01 00 0c 00 04 00 01 51 80 03 00 00 24
- Jun 27 16:56:38.194762: | 44 01 00 00 80 01 00 01 80 02 00 01 80 04 00 01
- Jun 27 16:56:38.194768: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194773: | 03 00 00 24 45 01 00 00 80 01 00 01 80 02 00 02
- Jun 27 16:56:38.194779: | 80 04 00 0e 80 03 fd e9 80 0b 00 01 00 0c 00 04
- Jun 27 16:56:38.194784: | 00 01 51 80 03 00 00 24 46 01 00 00 80 01 00 01
- Jun 27 16:56:38.194789: | 80 02 00 02 80 04 00 05 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.194794: | 00 0c 00 04 00 01 51 80 03 00 00 24 47 01 00 00
- Jun 27 16:56:38.194800: | 80 01 00 01 80 02 00 02 80 04 00 02 80 03 fd e9
- Jun 27 16:56:38.194805: | 80 0b 00 01 00 0c 00 04 00 01 51 80 00 00 00 24
- Jun 27 16:56:38.194817: | 48 01 00 00 80 01 00 01 80 02 00 02 80 04 00 01
- Jun 27 16:56:38.194823: | 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.194828: | 0d 00 00 0c 09 00 26 89 df d6 b7 12 0d 00 00 14
- Jun 27 16:56:38.194833: | 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
- Jun 27 16:56:38.194839: | 0d 00 00 14 16 f6 ca 16 e4 a4 06 6d 83 82 1a 0f
- Jun 27 16:56:38.194844: | 0a ea a8 62 0d 00 00 14 90 cb 80 91 3e bb 69 6e
- Jun 27 16:56:38.194850: | 08 63 81 b5 ec 42 7b 1f 0d 00 00 14 7d 94 19 a6
- Jun 27 16:56:38.194855: | 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14
- Jun 27 16:56:38.194860: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
- Jun 27 16:56:38.194865: | 0d 00 00 18 40 48 b7 d5 6e bc e8 85 25 e7 de 7f
- Jun 27 16:56:38.194871: | 00 d6 c2 d3 80 00 00 00 0d 00 00 14 af ca d7 13
- Jun 27 16:56:38.194876: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 0d 00 00 14
- Jun 27 16:56:38.194881: | 3b 90 31 dc e4 fc f8 8b 48 9a 92 39 63 dd 0c 49
- Jun 27 16:56:38.194886: | 0d 00 00 14 f1 4b 94 b7 bf f1 fe f0 27 73 b8 c4
- Jun 27 16:56:38.194891: | 9f ed ed 26 0d 00 00 18 16 6f 93 2d 55 eb 64 d8
- Jun 27 16:56:38.194896: | e4 df 4f d3 7e 23 13 f0 d0 fd 84 51 0d 00 00 14
- Jun 27 16:56:38.194901: | 84 04 ad f9 cd a0 57 60 b2 ca 29 2e 4b ff 53 7b
- Jun 27 16:56:38.194907: | 00 00 00 14 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2
- Jun 27 16:56:38.194912: | 74 cc 01 00
- Jun 27 16:56:38.194926: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.194936: | **parse ISAKMP Message:
- Jun 27 16:56:38.194951: | initiator cookie:
- Jun 27 16:56:38.194956: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.194960: | responder cookie:
- Jun 27 16:56:38.194964: | 00 00 00 00 00 00 00 00
- Jun 27 16:56:38.194968: | next payload type: ISAKMP_NEXT_SA (0x1)
- Jun 27 16:56:38.194973: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.194978: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
- Jun 27 16:56:38.194983: | flags: none (0x0)
- Jun 27 16:56:38.194988: | message ID: 00 00 00 00
- Jun 27 16:56:38.194992: | length: 3092 (0xc14)
- Jun 27 16:56:38.194997: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
- Jun 27 16:56:38.195016: | icookie table: hash icookie 0e 20 a4 7f 26 01 0e 7b to 886872774674875013 slot 0x555eabc9ac60
- Jun 27 16:56:38.195020: | v1 state object not found
- Jun 27 16:56:38.195025: | #null state always idle
- Jun 27 16:56:38.195030: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2opt: 0x2080
- Jun 27 16:56:38.195035: | ***parse ISAKMP Security Association Payload:
- Jun 27 16:56:38.195039: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195043: | length: 2804 (0xaf4)
- Jun 27 16:56:38.195047: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:38.195051: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195056: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195060: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195063: | length: 12 (0xc)
- Jun 27 16:56:38.195067: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195071: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195075: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195079: | length: 20 (0x14)
- Jun 27 16:56:38.195083: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195087: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195090: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195094: | length: 20 (0x14)
- Jun 27 16:56:38.195098: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195102: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195107: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195111: | length: 20 (0x14)
- Jun 27 16:56:38.195115: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195119: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195122: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195131: | length: 20 (0x14)
- Jun 27 16:56:38.195135: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195139: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195143: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195146: | length: 20 (0x14)
- Jun 27 16:56:38.195151: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195155: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195159: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195162: | length: 24 (0x18)
- Jun 27 16:56:38.195166: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195169: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195173: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195176: | length: 20 (0x14)
- Jun 27 16:56:38.195180: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195184: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195188: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195192: | length: 20 (0x14)
- Jun 27 16:56:38.195196: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195200: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195203: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195206: | length: 20 (0x14)
- Jun 27 16:56:38.195210: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195214: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195219: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195222: | length: 24 (0x18)
- Jun 27 16:56:38.195227: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195230: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195234: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.195238: | length: 20 (0x14)
- Jun 27 16:56:38.195242: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080
- Jun 27 16:56:38.195247: | ***parse ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.195251: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.195254: | length: 20 (0x14)
- Jun 27 16:56:38.195271: | received Vendor ID payload [XAUTH]
- Jun 27 16:56:38.195278: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
- Jun 27 16:56:38.195283: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-01]
- Jun 27 16:56:38.195297: | quirks.qnat_traversal_vid set to=81
- Jun 27 16:56:38.195301: | received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
- Jun 27 16:56:38.195305: | quirks.qnat_traversal_vid set to=83
- Jun 27 16:56:38.195310: | received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
- Jun 27 16:56:38.195314: | quirks.qnat_traversal_vid set to=90
- Jun 27 16:56:38.195318: | received Vendor ID payload [RFC 3947]
- Jun 27 16:56:38.195324: | received Vendor ID payload [FRAGMENTATION 80000000]
- Jun 27 16:56:38.195330: | received Vendor ID payload [Dead Peer Detection]
- Jun 27 16:56:38.195335: | received Vendor ID payload [DPDv1_NG]
- Jun 27 16:56:38.195341: | ignoring Vendor ID payload [Shrew Soft client]
- Jun 27 16:56:38.195346: | ignoring Vendor ID payload [Netscreen-15]
- Jun 27 16:56:38.195351: | ignoring Vendor ID payload [Sidewinder]
- Jun 27 16:56:38.195356: | received Vendor ID payload [Cisco-Unity]
- Jun 27 16:56:38.195363: | find_host_connection me=192.168.1.137:500 him=192.168.1.138:500 policy=IKEV1_ALLOW
- Jun 27 16:56:38.195369: | find_host_pair: comparing ::1:500 to :::500
- Jun 27 16:56:38.195374: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:38.195379: | find_next_host_connection policy=IKEV1_ALLOW
- Jun 27 16:56:38.195384: | find_next_host_connection returns empty
- Jun 27 16:56:38.195389: | ****parse IPsec DOI SIT:
- Jun 27 16:56:38.195395: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
- Jun 27 16:56:38.195400: | ****parse ISAKMP Proposal Payload:
- Jun 27 16:56:38.195403: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.195407: | length: 2792 (0xae8)
- Jun 27 16:56:38.195411: | proposal number: 1 (0x1)
- Jun 27 16:56:38.195420: | protocol ID: PROTO_ISAKMP (0x1)
- Jun 27 16:56:38.195424: | SPI size: 0 (0x0)
- Jun 27 16:56:38.195428: | number of transforms: 72 (0x48)
- Jun 27 16:56:38.195433: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.195437: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.195441: | length: 40 (0x28)
- Jun 27 16:56:38.195445: | ISAKMP transform number: 1 (0x1)
- Jun 27 16:56:38.195449: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.195454: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195458: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.195462: | length/value: 7 (0x7)
- Jun 27 16:56:38.195467: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195471: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.195475: | length/value: 256 (0x100)
- Jun 27 16:56:38.195480: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195484: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.195488: | length/value: 1 (0x1)
- Jun 27 16:56:38.195492: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195496: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.195500: | length/value: 14 (0xe)
- Jun 27 16:56:38.195505: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195509: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.195513: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.195517: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195521: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.195525: | length/value: 1 (0x1)
- Jun 27 16:56:38.195529: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195534: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.195538: | length/value: 4 (0x4)
- Jun 27 16:56:38.195542: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.195546: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.195550: | length: 40 (0x28)
- Jun 27 16:56:38.195554: | ISAKMP transform number: 2 (0x2)
- Jun 27 16:56:38.195558: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.195562: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195567: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.195571: | length/value: 7 (0x7)
- Jun 27 16:56:38.195575: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195579: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.195583: | length/value: 256 (0x100)
- Jun 27 16:56:38.195587: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195591: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.195594: | length/value: 1 (0x1)
- Jun 27 16:56:38.195598: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195602: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.195606: | length/value: 5 (0x5)
- Jun 27 16:56:38.195610: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195614: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.195618: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.195623: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195626: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.195630: | length/value: 1 (0x1)
- Jun 27 16:56:38.195634: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195638: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.195643: | length/value: 4 (0x4)
- Jun 27 16:56:38.195647: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.195652: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.195656: | length: 40 (0x28)
- Jun 27 16:56:38.195659: | ISAKMP transform number: 3 (0x3)
- Jun 27 16:56:38.195664: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.195668: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195672: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.195676: | length/value: 7 (0x7)
- Jun 27 16:56:38.195680: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195684: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.195694: | length/value: 256 (0x100)
- Jun 27 16:56:38.195698: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195702: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.195706: | length/value: 1 (0x1)
- Jun 27 16:56:38.195710: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195714: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.195718: | length/value: 2 (0x2)
- Jun 27 16:56:38.195722: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195726: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.195730: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.195734: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195738: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.195742: | length/value: 1 (0x1)
- Jun 27 16:56:38.195746: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195750: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.195754: | length/value: 4 (0x4)
- Jun 27 16:56:38.195758: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.195762: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.195766: | length: 40 (0x28)
- Jun 27 16:56:38.195770: | ISAKMP transform number: 4 (0x4)
- Jun 27 16:56:38.195784: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.195788: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195792: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.195796: | length/value: 7 (0x7)
- Jun 27 16:56:38.195800: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195815: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.195819: | length/value: 256 (0x100)
- Jun 27 16:56:38.195832: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195837: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.195841: | length/value: 1 (0x1)
- Jun 27 16:56:38.195845: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195849: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.195853: | length/value: 1 (0x1)
- Jun 27 16:56:38.195857: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195861: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.195865: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.195869: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195883: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.195887: | length/value: 1 (0x1)
- Jun 27 16:56:38.195891: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195895: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.195909: | length/value: 4 (0x4)
- Jun 27 16:56:38.195913: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.195918: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.195931: | length: 40 (0x28)
- Jun 27 16:56:38.195934: | ISAKMP transform number: 5 (0x5)
- Jun 27 16:56:38.195938: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.195942: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195946: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.195949: | length/value: 7 (0x7)
- Jun 27 16:56:38.195953: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195957: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.195961: | length/value: 256 (0x100)
- Jun 27 16:56:38.195965: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195969: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.195973: | length/value: 2 (0x2)
- Jun 27 16:56:38.195977: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195981: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.195985: | length/value: 14 (0xe)
- Jun 27 16:56:38.195989: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.195994: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.195998: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196002: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196006: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196010: | length/value: 1 (0x1)
- Jun 27 16:56:38.196014: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196024: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196028: | length/value: 4 (0x4)
- Jun 27 16:56:38.196032: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196037: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196041: | length: 40 (0x28)
- Jun 27 16:56:38.196045: | ISAKMP transform number: 6 (0x6)
- Jun 27 16:56:38.196049: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196053: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196057: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196061: | length/value: 7 (0x7)
- Jun 27 16:56:38.196065: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196069: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196073: | length/value: 256 (0x100)
- Jun 27 16:56:38.196077: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196081: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196085: | length/value: 2 (0x2)
- Jun 27 16:56:38.196088: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196092: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196095: | length/value: 5 (0x5)
- Jun 27 16:56:38.196099: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196103: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196107: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196111: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196115: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196118: | length/value: 1 (0x1)
- Jun 27 16:56:38.196121: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196125: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196128: | length/value: 4 (0x4)
- Jun 27 16:56:38.196132: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196136: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196140: | length: 40 (0x28)
- Jun 27 16:56:38.196144: | ISAKMP transform number: 7 (0x7)
- Jun 27 16:56:38.196148: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196152: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196156: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196160: | length/value: 7 (0x7)
- Jun 27 16:56:38.196163: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196167: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196171: | length/value: 256 (0x100)
- Jun 27 16:56:38.196175: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196179: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196183: | length/value: 2 (0x2)
- Jun 27 16:56:38.196186: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196190: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196194: | length/value: 2 (0x2)
- Jun 27 16:56:38.196198: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196203: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196207: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196211: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196215: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196219: | length/value: 1 (0x1)
- Jun 27 16:56:38.196223: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196227: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196231: | length/value: 4 (0x4)
- Jun 27 16:56:38.196236: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196240: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196244: | length: 40 (0x28)
- Jun 27 16:56:38.196248: | ISAKMP transform number: 8 (0x8)
- Jun 27 16:56:38.196252: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196256: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196260: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196264: | length/value: 7 (0x7)
- Jun 27 16:56:38.196268: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196272: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196276: | length/value: 256 (0x100)
- Jun 27 16:56:38.196280: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196290: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196294: | length/value: 2 (0x2)
- Jun 27 16:56:38.196298: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196302: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196306: | length/value: 1 (0x1)
- Jun 27 16:56:38.196310: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196314: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196318: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196322: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196325: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196329: | length/value: 1 (0x1)
- Jun 27 16:56:38.196332: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196336: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196340: | length/value: 4 (0x4)
- Jun 27 16:56:38.196345: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196349: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196353: | length: 40 (0x28)
- Jun 27 16:56:38.196357: | ISAKMP transform number: 9 (0x9)
- Jun 27 16:56:38.196361: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196365: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196369: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196373: | length/value: 7 (0x7)
- Jun 27 16:56:38.196377: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196381: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196385: | length/value: 192 (0xc0)
- Jun 27 16:56:38.196390: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196394: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196398: | length/value: 1 (0x1)
- Jun 27 16:56:38.196402: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196406: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196410: | length/value: 14 (0xe)
- Jun 27 16:56:38.196414: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196419: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196423: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196427: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196431: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196435: | length/value: 1 (0x1)
- Jun 27 16:56:38.196439: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196444: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196448: | length/value: 4 (0x4)
- Jun 27 16:56:38.196452: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196456: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196460: | length: 40 (0x28)
- Jun 27 16:56:38.196464: | ISAKMP transform number: 10 (0xa)
- Jun 27 16:56:38.196468: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196472: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196476: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196480: | length/value: 7 (0x7)
- Jun 27 16:56:38.196484: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196488: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196491: | length/value: 192 (0xc0)
- Jun 27 16:56:38.196495: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196499: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196503: | length/value: 1 (0x1)
- Jun 27 16:56:38.196506: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196510: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196514: | length/value: 5 (0x5)
- Jun 27 16:56:38.196518: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196531: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196546: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196550: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196554: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196559: | length/value: 1 (0x1)
- Jun 27 16:56:38.196563: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196567: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196577: | length/value: 4 (0x4)
- Jun 27 16:56:38.196582: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196586: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196590: | length: 40 (0x28)
- Jun 27 16:56:38.196594: | ISAKMP transform number: 11 (0xb)
- Jun 27 16:56:38.196599: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196603: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196617: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196621: | length/value: 7 (0x7)
- Jun 27 16:56:38.196624: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196628: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196632: | length/value: 192 (0xc0)
- Jun 27 16:56:38.196636: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196640: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196644: | length/value: 1 (0x1)
- Jun 27 16:56:38.196647: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196651: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196655: | length/value: 2 (0x2)
- Jun 27 16:56:38.196658: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196663: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196666: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196671: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196674: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196678: | length/value: 1 (0x1)
- Jun 27 16:56:38.196682: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196686: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196690: | length/value: 4 (0x4)
- Jun 27 16:56:38.196695: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196699: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196703: | length: 40 (0x28)
- Jun 27 16:56:38.196707: | ISAKMP transform number: 12 (0xc)
- Jun 27 16:56:38.196711: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196715: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196719: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196722: | length/value: 7 (0x7)
- Jun 27 16:56:38.196726: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196730: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196734: | length/value: 192 (0xc0)
- Jun 27 16:56:38.196738: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196742: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196746: | length/value: 1 (0x1)
- Jun 27 16:56:38.196750: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196754: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196758: | length/value: 1 (0x1)
- Jun 27 16:56:38.196762: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196766: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196770: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196774: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196778: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196782: | length/value: 1 (0x1)
- Jun 27 16:56:38.196786: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196790: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196794: | length/value: 4 (0x4)
- Jun 27 16:56:38.196798: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196802: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196806: | length: 40 (0x28)
- Jun 27 16:56:38.196810: | ISAKMP transform number: 13 (0xd)
- Jun 27 16:56:38.196813: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196817: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196822: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196825: | length/value: 7 (0x7)
- Jun 27 16:56:38.196829: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196833: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196837: | length/value: 192 (0xc0)
- Jun 27 16:56:38.196841: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196845: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196854: | length/value: 2 (0x2)
- Jun 27 16:56:38.196859: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196863: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196867: | length/value: 14 (0xe)
- Jun 27 16:56:38.196871: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196875: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196879: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196883: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196887: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196891: | length/value: 1 (0x1)
- Jun 27 16:56:38.196895: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196899: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.196902: | length/value: 4 (0x4)
- Jun 27 16:56:38.196907: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.196911: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.196914: | length: 40 (0x28)
- Jun 27 16:56:38.196918: | ISAKMP transform number: 14 (0xe)
- Jun 27 16:56:38.196922: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.196926: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196930: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.196934: | length/value: 7 (0x7)
- Jun 27 16:56:38.196938: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196942: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.196946: | length/value: 192 (0xc0)
- Jun 27 16:56:38.196950: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196955: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.196959: | length/value: 2 (0x2)
- Jun 27 16:56:38.196962: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196966: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.196970: | length/value: 5 (0x5)
- Jun 27 16:56:38.196974: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196978: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.196982: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.196986: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.196990: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.196994: | length/value: 1 (0x1)
- Jun 27 16:56:38.196998: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197002: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197006: | length/value: 4 (0x4)
- Jun 27 16:56:38.197010: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197014: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197018: | length: 40 (0x28)
- Jun 27 16:56:38.197022: | ISAKMP transform number: 15 (0xf)
- Jun 27 16:56:38.197026: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197030: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197034: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197038: | length/value: 7 (0x7)
- Jun 27 16:56:38.197042: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197046: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197050: | length/value: 192 (0xc0)
- Jun 27 16:56:38.197055: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197059: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197063: | length/value: 2 (0x2)
- Jun 27 16:56:38.197067: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197071: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197075: | length/value: 2 (0x2)
- Jun 27 16:56:38.197079: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197083: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197087: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197091: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197096: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197099: | length/value: 1 (0x1)
- Jun 27 16:56:38.197103: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197107: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197111: | length/value: 4 (0x4)
- Jun 27 16:56:38.197120: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197125: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197129: | length: 40 (0x28)
- Jun 27 16:56:38.197133: | ISAKMP transform number: 16 (0x10)
- Jun 27 16:56:38.197137: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197141: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197145: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197149: | length/value: 7 (0x7)
- Jun 27 16:56:38.197153: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197157: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197161: | length/value: 192 (0xc0)
- Jun 27 16:56:38.197165: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197169: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197173: | length/value: 2 (0x2)
- Jun 27 16:56:38.197177: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197191: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197194: | length/value: 1 (0x1)
- Jun 27 16:56:38.197198: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197213: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197229: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197233: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197247: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197251: | length/value: 1 (0x1)
- Jun 27 16:56:38.197255: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197268: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197272: | length/value: 4 (0x4)
- Jun 27 16:56:38.197276: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197280: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197284: | length: 40 (0x28)
- Jun 27 16:56:38.197288: | ISAKMP transform number: 17 (0x11)
- Jun 27 16:56:38.197292: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197296: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197300: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197304: | length/value: 7 (0x7)
- Jun 27 16:56:38.197308: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197312: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197316: | length/value: 128 (0x80)
- Jun 27 16:56:38.197320: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197324: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197328: | length/value: 1 (0x1)
- Jun 27 16:56:38.197331: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197335: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197339: | length/value: 14 (0xe)
- Jun 27 16:56:38.197343: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197347: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197351: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197356: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197360: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197363: | length/value: 1 (0x1)
- Jun 27 16:56:38.197367: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197371: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197375: | length/value: 4 (0x4)
- Jun 27 16:56:38.197379: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197383: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197387: | length: 40 (0x28)
- Jun 27 16:56:38.197391: | ISAKMP transform number: 18 (0x12)
- Jun 27 16:56:38.197394: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197399: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197403: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197406: | length/value: 7 (0x7)
- Jun 27 16:56:38.197410: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197414: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197418: | length/value: 128 (0x80)
- Jun 27 16:56:38.197422: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197426: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197437: | length/value: 1 (0x1)
- Jun 27 16:56:38.197441: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197446: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197450: | length/value: 5 (0x5)
- Jun 27 16:56:38.197453: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197458: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197462: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197466: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197470: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197474: | length/value: 1 (0x1)
- Jun 27 16:56:38.197478: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197482: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197486: | length/value: 4 (0x4)
- Jun 27 16:56:38.197490: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197494: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197498: | length: 40 (0x28)
- Jun 27 16:56:38.197502: | ISAKMP transform number: 19 (0x13)
- Jun 27 16:56:38.197506: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197511: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197515: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197519: | length/value: 7 (0x7)
- Jun 27 16:56:38.197523: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197527: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197531: | length/value: 128 (0x80)
- Jun 27 16:56:38.197534: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197538: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197542: | length/value: 1 (0x1)
- Jun 27 16:56:38.197547: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197551: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197554: | length/value: 2 (0x2)
- Jun 27 16:56:38.197558: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197562: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197566: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197570: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197574: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197578: | length/value: 1 (0x1)
- Jun 27 16:56:38.197582: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197585: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197589: | length/value: 4 (0x4)
- Jun 27 16:56:38.197593: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197597: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197601: | length: 40 (0x28)
- Jun 27 16:56:38.197604: | ISAKMP transform number: 20 (0x14)
- Jun 27 16:56:38.197608: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197612: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197616: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197620: | length/value: 7 (0x7)
- Jun 27 16:56:38.197623: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197626: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197628: | length/value: 128 (0x80)
- Jun 27 16:56:38.197631: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197634: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197636: | length/value: 1 (0x1)
- Jun 27 16:56:38.197639: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197641: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197644: | length/value: 1 (0x1)
- Jun 27 16:56:38.197646: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197649: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197651: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197654: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197656: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197659: | length/value: 1 (0x1)
- Jun 27 16:56:38.197661: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197664: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197667: | length/value: 4 (0x4)
- Jun 27 16:56:38.197669: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197676: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197678: | length: 40 (0x28)
- Jun 27 16:56:38.197681: | ISAKMP transform number: 21 (0x15)
- Jun 27 16:56:38.197683: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197686: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197689: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197691: | length/value: 7 (0x7)
- Jun 27 16:56:38.197694: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197696: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197699: | length/value: 128 (0x80)
- Jun 27 16:56:38.197701: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197704: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197706: | length/value: 2 (0x2)
- Jun 27 16:56:38.197709: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197711: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197714: | length/value: 14 (0xe)
- Jun 27 16:56:38.197716: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197719: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197721: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197724: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197727: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197729: | length/value: 1 (0x1)
- Jun 27 16:56:38.197732: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197734: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197737: | length/value: 4 (0x4)
- Jun 27 16:56:38.197739: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197742: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197744: | length: 40 (0x28)
- Jun 27 16:56:38.197747: | ISAKMP transform number: 22 (0x16)
- Jun 27 16:56:38.197749: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197752: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197755: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197757: | length/value: 7 (0x7)
- Jun 27 16:56:38.197760: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197762: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197765: | length/value: 128 (0x80)
- Jun 27 16:56:38.197767: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197770: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197772: | length/value: 2 (0x2)
- Jun 27 16:56:38.197775: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197777: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197780: | length/value: 5 (0x5)
- Jun 27 16:56:38.197782: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197785: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197788: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197790: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197793: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197795: | length/value: 1 (0x1)
- Jun 27 16:56:38.197798: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197800: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197803: | length/value: 4 (0x4)
- Jun 27 16:56:38.197805: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197808: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197810: | length: 40 (0x28)
- Jun 27 16:56:38.197813: | ISAKMP transform number: 23 (0x17)
- Jun 27 16:56:38.197815: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197818: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197821: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197823: | length/value: 7 (0x7)
- Jun 27 16:56:38.197826: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197828: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197831: | length/value: 128 (0x80)
- Jun 27 16:56:38.197833: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197836: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197838: | length/value: 2 (0x2)
- Jun 27 16:56:38.197844: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197847: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197849: | length/value: 2 (0x2)
- Jun 27 16:56:38.197852: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197854: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197857: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197860: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197862: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197864: | length/value: 1 (0x1)
- Jun 27 16:56:38.197867: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197870: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197872: | length/value: 4 (0x4)
- Jun 27 16:56:38.197875: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197877: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197880: | length: 40 (0x28)
- Jun 27 16:56:38.197882: | ISAKMP transform number: 24 (0x18)
- Jun 27 16:56:38.197885: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197887: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197890: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197892: | length/value: 7 (0x7)
- Jun 27 16:56:38.197895: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197898: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197900: | length/value: 128 (0x80)
- Jun 27 16:56:38.197903: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197905: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197908: | length/value: 2 (0x2)
- Jun 27 16:56:38.197910: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197913: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197915: | length/value: 1 (0x1)
- Jun 27 16:56:38.197918: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197920: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197923: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197925: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197928: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197930: | length/value: 1 (0x1)
- Jun 27 16:56:38.197933: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197935: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.197938: | length/value: 4 (0x4)
- Jun 27 16:56:38.197941: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.197943: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.197946: | length: 40 (0x28)
- Jun 27 16:56:38.197948: | ISAKMP transform number: 25 (0x19)
- Jun 27 16:56:38.197951: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.197953: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197956: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.197958: | length/value: 3 (0x3)
- Jun 27 16:56:38.197961: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197963: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.197966: | length/value: 256 (0x100)
- Jun 27 16:56:38.197968: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197971: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.197973: | length/value: 1 (0x1)
- Jun 27 16:56:38.197976: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197979: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.197981: | length/value: 14 (0xe)
- Jun 27 16:56:38.197984: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197986: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.197989: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.197991: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.197994: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.197996: | length/value: 1 (0x1)
- Jun 27 16:56:38.197999: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198002: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198004: | length/value: 4 (0x4)
- Jun 27 16:56:38.198007: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198009: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198014: | length: 40 (0x28)
- Jun 27 16:56:38.198016: | ISAKMP transform number: 26 (0x1a)
- Jun 27 16:56:38.198019: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198021: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198024: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198026: | length/value: 3 (0x3)
- Jun 27 16:56:38.198029: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198031: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198034: | length/value: 256 (0x100)
- Jun 27 16:56:38.198036: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198039: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198041: | length/value: 1 (0x1)
- Jun 27 16:56:38.198044: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198047: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198049: | length/value: 5 (0x5)
- Jun 27 16:56:38.198052: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198054: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198057: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198059: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198062: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198064: | length/value: 1 (0x1)
- Jun 27 16:56:38.198067: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198069: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198072: | length/value: 4 (0x4)
- Jun 27 16:56:38.198074: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198077: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198079: | length: 40 (0x28)
- Jun 27 16:56:38.198082: | ISAKMP transform number: 27 (0x1b)
- Jun 27 16:56:38.198084: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198087: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198090: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198092: | length/value: 3 (0x3)
- Jun 27 16:56:38.198095: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198097: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198100: | length/value: 256 (0x100)
- Jun 27 16:56:38.198102: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198105: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198107: | length/value: 1 (0x1)
- Jun 27 16:56:38.198110: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198112: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198115: | length/value: 2 (0x2)
- Jun 27 16:56:38.198117: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198120: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198122: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198125: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198127: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198130: | length/value: 1 (0x1)
- Jun 27 16:56:38.198132: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198135: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198138: | length/value: 4 (0x4)
- Jun 27 16:56:38.198140: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198143: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198145: | length: 40 (0x28)
- Jun 27 16:56:38.198148: | ISAKMP transform number: 28 (0x1c)
- Jun 27 16:56:38.198150: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198153: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198155: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198158: | length/value: 3 (0x3)
- Jun 27 16:56:38.198160: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198163: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198165: | length/value: 256 (0x100)
- Jun 27 16:56:38.198168: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198171: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198173: | length/value: 1 (0x1)
- Jun 27 16:56:38.198176: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198180: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198182: | length/value: 1 (0x1)
- Jun 27 16:56:38.198185: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198188: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198190: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198193: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198195: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198198: | length/value: 1 (0x1)
- Jun 27 16:56:38.198200: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198203: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198205: | length/value: 4 (0x4)
- Jun 27 16:56:38.198208: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198210: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198213: | length: 40 (0x28)
- Jun 27 16:56:38.198215: | ISAKMP transform number: 29 (0x1d)
- Jun 27 16:56:38.198218: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198220: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198223: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198225: | length/value: 3 (0x3)
- Jun 27 16:56:38.198228: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198230: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198233: | length/value: 256 (0x100)
- Jun 27 16:56:38.198235: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198238: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198240: | length/value: 2 (0x2)
- Jun 27 16:56:38.198243: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198246: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198248: | length/value: 14 (0xe)
- Jun 27 16:56:38.198251: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198253: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198256: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198258: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198261: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198263: | length/value: 1 (0x1)
- Jun 27 16:56:38.198266: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198268: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198271: | length/value: 4 (0x4)
- Jun 27 16:56:38.198273: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198276: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198278: | length: 40 (0x28)
- Jun 27 16:56:38.198281: | ISAKMP transform number: 30 (0x1e)
- Jun 27 16:56:38.198283: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198286: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198289: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198291: | length/value: 3 (0x3)
- Jun 27 16:56:38.198294: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198296: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198299: | length/value: 256 (0x100)
- Jun 27 16:56:38.198301: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198304: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198306: | length/value: 2 (0x2)
- Jun 27 16:56:38.198309: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198311: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198314: | length/value: 5 (0x5)
- Jun 27 16:56:38.198316: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198319: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198321: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198324: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198326: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198329: | length/value: 1 (0x1)
- Jun 27 16:56:38.198331: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198334: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198336: | length/value: 4 (0x4)
- Jun 27 16:56:38.198339: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198342: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198346: | length: 40 (0x28)
- Jun 27 16:56:38.198348: | ISAKMP transform number: 31 (0x1f)
- Jun 27 16:56:38.198351: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198353: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198356: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198359: | length/value: 3 (0x3)
- Jun 27 16:56:38.198361: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198364: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198366: | length/value: 256 (0x100)
- Jun 27 16:56:38.198369: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198371: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198374: | length/value: 2 (0x2)
- Jun 27 16:56:38.198376: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198379: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198381: | length/value: 2 (0x2)
- Jun 27 16:56:38.198384: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198386: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198389: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198391: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198394: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198396: | length/value: 1 (0x1)
- Jun 27 16:56:38.198399: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198401: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198404: | length/value: 4 (0x4)
- Jun 27 16:56:38.198407: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198409: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198412: | length: 40 (0x28)
- Jun 27 16:56:38.198414: | ISAKMP transform number: 32 (0x20)
- Jun 27 16:56:38.198417: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198419: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198422: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198424: | length/value: 3 (0x3)
- Jun 27 16:56:38.198427: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198429: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198432: | length/value: 256 (0x100)
- Jun 27 16:56:38.198434: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198437: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198439: | length/value: 2 (0x2)
- Jun 27 16:56:38.198442: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198444: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198447: | length/value: 1 (0x1)
- Jun 27 16:56:38.198449: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198452: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198455: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198457: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198460: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198462: | length/value: 1 (0x1)
- Jun 27 16:56:38.198465: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198467: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198470: | length/value: 4 (0x4)
- Jun 27 16:56:38.198472: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198475: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198477: | length: 40 (0x28)
- Jun 27 16:56:38.198480: | ISAKMP transform number: 33 (0x21)
- Jun 27 16:56:38.198482: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198485: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198487: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198490: | length/value: 3 (0x3)
- Jun 27 16:56:38.198492: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198495: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198497: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198500: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198503: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198505: | length/value: 1 (0x1)
- Jun 27 16:56:38.198508: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198510: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198515: | length/value: 14 (0xe)
- Jun 27 16:56:38.198518: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198520: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198523: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198526: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198528: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198531: | length/value: 1 (0x1)
- Jun 27 16:56:38.198533: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198536: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198538: | length/value: 4 (0x4)
- Jun 27 16:56:38.198541: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198543: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198546: | length: 40 (0x28)
- Jun 27 16:56:38.198548: | ISAKMP transform number: 34 (0x22)
- Jun 27 16:56:38.198551: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198554: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198556: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198559: | length/value: 3 (0x3)
- Jun 27 16:56:38.198561: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198564: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198566: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198569: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198571: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198574: | length/value: 1 (0x1)
- Jun 27 16:56:38.198576: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198579: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198581: | length/value: 5 (0x5)
- Jun 27 16:56:38.198584: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198587: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198589: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198592: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198594: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198597: | length/value: 1 (0x1)
- Jun 27 16:56:38.198599: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198602: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198604: | length/value: 4 (0x4)
- Jun 27 16:56:38.198607: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198609: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198612: | length: 40 (0x28)
- Jun 27 16:56:38.198614: | ISAKMP transform number: 35 (0x23)
- Jun 27 16:56:38.198617: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198620: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198622: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198625: | length/value: 3 (0x3)
- Jun 27 16:56:38.198627: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198630: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198632: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198635: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198637: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198640: | length/value: 1 (0x1)
- Jun 27 16:56:38.198642: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198645: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198647: | length/value: 2 (0x2)
- Jun 27 16:56:38.198650: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198653: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198655: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198658: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198660: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198663: | length/value: 1 (0x1)
- Jun 27 16:56:38.198665: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198668: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198670: | length/value: 4 (0x4)
- Jun 27 16:56:38.198673: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198675: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198678: | length: 40 (0x28)
- Jun 27 16:56:38.198682: | ISAKMP transform number: 36 (0x24)
- Jun 27 16:56:38.198685: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198687: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198690: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198692: | length/value: 3 (0x3)
- Jun 27 16:56:38.198695: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198698: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198700: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198703: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198705: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198708: | length/value: 1 (0x1)
- Jun 27 16:56:38.198710: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198713: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198715: | length/value: 1 (0x1)
- Jun 27 16:56:38.198718: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198720: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198723: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198725: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198728: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198730: | length/value: 1 (0x1)
- Jun 27 16:56:38.198733: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198735: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198738: | length/value: 4 (0x4)
- Jun 27 16:56:38.198740: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198743: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198745: | length: 40 (0x28)
- Jun 27 16:56:38.198748: | ISAKMP transform number: 37 (0x25)
- Jun 27 16:56:38.198750: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198753: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198756: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198758: | length/value: 3 (0x3)
- Jun 27 16:56:38.198761: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198763: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198766: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198768: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198771: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198773: | length/value: 2 (0x2)
- Jun 27 16:56:38.198776: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198778: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198781: | length/value: 14 (0xe)
- Jun 27 16:56:38.198783: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198786: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198788: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198791: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198794: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198796: | length/value: 1 (0x1)
- Jun 27 16:56:38.198798: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198801: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198804: | length/value: 4 (0x4)
- Jun 27 16:56:38.198806: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198809: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198811: | length: 40 (0x28)
- Jun 27 16:56:38.198814: | ISAKMP transform number: 38 (0x26)
- Jun 27 16:56:38.198816: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198819: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198821: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198824: | length/value: 3 (0x3)
- Jun 27 16:56:38.198826: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198829: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198831: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198834: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198836: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198839: | length/value: 2 (0x2)
- Jun 27 16:56:38.198841: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198844: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198846: | length/value: 5 (0x5)
- Jun 27 16:56:38.198851: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198854: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198856: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198859: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198861: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198864: | length/value: 1 (0x1)
- Jun 27 16:56:38.198866: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198869: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198871: | length/value: 4 (0x4)
- Jun 27 16:56:38.198874: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198876: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198879: | length: 40 (0x28)
- Jun 27 16:56:38.198881: | ISAKMP transform number: 39 (0x27)
- Jun 27 16:56:38.198884: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198886: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198889: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198891: | length/value: 3 (0x3)
- Jun 27 16:56:38.198894: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198896: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198899: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198901: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198904: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198906: | length/value: 2 (0x2)
- Jun 27 16:56:38.198909: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198912: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198914: | length/value: 2 (0x2)
- Jun 27 16:56:38.198917: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198919: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198922: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198924: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198927: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198929: | length/value: 1 (0x1)
- Jun 27 16:56:38.198932: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198934: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.198937: | length/value: 4 (0x4)
- Jun 27 16:56:38.198939: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.198942: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.198944: | length: 40 (0x28)
- Jun 27 16:56:38.198947: | ISAKMP transform number: 40 (0x28)
- Jun 27 16:56:38.198949: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.198952: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198955: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.198957: | length/value: 3 (0x3)
- Jun 27 16:56:38.198960: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198962: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.198965: | length/value: 192 (0xc0)
- Jun 27 16:56:38.198967: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198970: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.198972: | length/value: 2 (0x2)
- Jun 27 16:56:38.198975: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198977: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.198980: | length/value: 1 (0x1)
- Jun 27 16:56:38.198982: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198985: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.198987: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.198990: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.198992: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.198995: | length/value: 1 (0x1)
- Jun 27 16:56:38.198997: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199000: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199002: | length/value: 4 (0x4)
- Jun 27 16:56:38.199005: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199008: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199010: | length: 40 (0x28)
- Jun 27 16:56:38.199013: | ISAKMP transform number: 41 (0x29)
- Jun 27 16:56:38.199017: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199020: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199022: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199025: | length/value: 3 (0x3)
- Jun 27 16:56:38.199027: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199030: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199032: | length/value: 128 (0x80)
- Jun 27 16:56:38.199035: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199037: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199040: | length/value: 1 (0x1)
- Jun 27 16:56:38.199042: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199045: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199047: | length/value: 14 (0xe)
- Jun 27 16:56:38.199050: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199052: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199055: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199058: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199060: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199062: | length/value: 1 (0x1)
- Jun 27 16:56:38.199065: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199068: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199070: | length/value: 4 (0x4)
- Jun 27 16:56:38.199073: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199075: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199078: | length: 40 (0x28)
- Jun 27 16:56:38.199080: | ISAKMP transform number: 42 (0x2a)
- Jun 27 16:56:38.199083: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199085: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199088: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199090: | length/value: 3 (0x3)
- Jun 27 16:56:38.199093: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199096: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199098: | length/value: 128 (0x80)
- Jun 27 16:56:38.199101: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199103: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199106: | length/value: 1 (0x1)
- Jun 27 16:56:38.199108: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199111: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199113: | length/value: 5 (0x5)
- Jun 27 16:56:38.199116: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199118: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199121: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199123: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199126: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199128: | length/value: 1 (0x1)
- Jun 27 16:56:38.199131: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199133: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199136: | length/value: 4 (0x4)
- Jun 27 16:56:38.199139: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199141: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199144: | length: 40 (0x28)
- Jun 27 16:56:38.199146: | ISAKMP transform number: 43 (0x2b)
- Jun 27 16:56:38.199149: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199151: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199154: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199156: | length/value: 3 (0x3)
- Jun 27 16:56:38.199159: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199161: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199164: | length/value: 128 (0x80)
- Jun 27 16:56:38.199166: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199169: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199171: | length/value: 1 (0x1)
- Jun 27 16:56:38.199174: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199176: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199179: | length/value: 2 (0x2)
- Jun 27 16:56:38.199181: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199186: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199188: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199191: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199194: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199196: | length/value: 1 (0x1)
- Jun 27 16:56:38.199199: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199201: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199204: | length/value: 4 (0x4)
- Jun 27 16:56:38.199206: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199209: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199211: | length: 40 (0x28)
- Jun 27 16:56:38.199214: | ISAKMP transform number: 44 (0x2c)
- Jun 27 16:56:38.199216: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199219: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199222: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199224: | length/value: 3 (0x3)
- Jun 27 16:56:38.199227: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199229: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199232: | length/value: 128 (0x80)
- Jun 27 16:56:38.199234: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199237: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199239: | length/value: 1 (0x1)
- Jun 27 16:56:38.199242: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199244: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199247: | length/value: 1 (0x1)
- Jun 27 16:56:38.199249: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199252: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199254: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199257: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199259: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199262: | length/value: 1 (0x1)
- Jun 27 16:56:38.199264: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199267: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199270: | length/value: 4 (0x4)
- Jun 27 16:56:38.199272: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199275: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199277: | length: 40 (0x28)
- Jun 27 16:56:38.199280: | ISAKMP transform number: 45 (0x2d)
- Jun 27 16:56:38.199282: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199285: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199287: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199290: | length/value: 3 (0x3)
- Jun 27 16:56:38.199292: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199295: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199297: | length/value: 128 (0x80)
- Jun 27 16:56:38.199300: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199302: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199305: | length/value: 2 (0x2)
- Jun 27 16:56:38.199307: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199310: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199312: | length/value: 14 (0xe)
- Jun 27 16:56:38.199315: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199318: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199320: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199323: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199325: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199328: | length/value: 1 (0x1)
- Jun 27 16:56:38.199330: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199333: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199335: | length/value: 4 (0x4)
- Jun 27 16:56:38.199338: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199340: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199343: | length: 40 (0x28)
- Jun 27 16:56:38.199345: | ISAKMP transform number: 46 (0x2e)
- Jun 27 16:56:38.199348: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199352: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199355: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199357: | length/value: 3 (0x3)
- Jun 27 16:56:38.199360: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199362: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199365: | length/value: 128 (0x80)
- Jun 27 16:56:38.199367: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199370: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199372: | length/value: 2 (0x2)
- Jun 27 16:56:38.199375: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199378: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199380: | length/value: 5 (0x5)
- Jun 27 16:56:38.199383: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199385: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199388: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199390: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199393: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199395: | length/value: 1 (0x1)
- Jun 27 16:56:38.199398: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199400: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199403: | length/value: 4 (0x4)
- Jun 27 16:56:38.199405: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199408: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199410: | length: 40 (0x28)
- Jun 27 16:56:38.199413: | ISAKMP transform number: 47 (0x2f)
- Jun 27 16:56:38.199415: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199418: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199421: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199423: | length/value: 3 (0x3)
- Jun 27 16:56:38.199425: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199428: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199430: | length/value: 128 (0x80)
- Jun 27 16:56:38.199433: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199436: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199438: | length/value: 2 (0x2)
- Jun 27 16:56:38.199441: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199443: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199446: | length/value: 2 (0x2)
- Jun 27 16:56:38.199448: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199451: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199453: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199456: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199458: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199461: | length/value: 1 (0x1)
- Jun 27 16:56:38.199463: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199466: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199468: | length/value: 4 (0x4)
- Jun 27 16:56:38.199471: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199474: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199476: | length: 40 (0x28)
- Jun 27 16:56:38.199478: | ISAKMP transform number: 48 (0x30)
- Jun 27 16:56:38.199481: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199484: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199486: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199489: | length/value: 3 (0x3)
- Jun 27 16:56:38.199491: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199494: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.199496: | length/value: 128 (0x80)
- Jun 27 16:56:38.199499: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199501: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199504: | length/value: 2 (0x2)
- Jun 27 16:56:38.199506: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199509: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199511: | length/value: 1 (0x1)
- Jun 27 16:56:38.199514: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199516: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199521: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199524: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199526: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199529: | length/value: 1 (0x1)
- Jun 27 16:56:38.199531: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199534: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199536: | length/value: 4 (0x4)
- Jun 27 16:56:38.199539: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199542: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199544: | length: 36 (0x24)
- Jun 27 16:56:38.199546: | ISAKMP transform number: 49 (0x31)
- Jun 27 16:56:38.199549: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199552: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199554: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199557: | length/value: 5 (0x5)
- Jun 27 16:56:38.199559: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199562: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199564: | length/value: 1 (0x1)
- Jun 27 16:56:38.199567: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199569: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199572: | length/value: 14 (0xe)
- Jun 27 16:56:38.199574: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199577: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199579: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199582: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199584: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199587: | length/value: 1 (0x1)
- Jun 27 16:56:38.199589: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199592: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199594: | length/value: 4 (0x4)
- Jun 27 16:56:38.199597: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199600: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199602: | length: 36 (0x24)
- Jun 27 16:56:38.199605: | ISAKMP transform number: 50 (0x32)
- Jun 27 16:56:38.199607: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199610: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199612: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199615: | length/value: 5 (0x5)
- Jun 27 16:56:38.199617: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199620: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199622: | length/value: 1 (0x1)
- Jun 27 16:56:38.199625: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199627: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199630: | length/value: 5 (0x5)
- Jun 27 16:56:38.199632: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199635: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199637: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199640: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199643: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199645: | length/value: 1 (0x1)
- Jun 27 16:56:38.199648: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199650: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199653: | length/value: 4 (0x4)
- Jun 27 16:56:38.199655: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199658: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199660: | length: 36 (0x24)
- Jun 27 16:56:38.199663: | ISAKMP transform number: 51 (0x33)
- Jun 27 16:56:38.199665: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199668: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199670: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199673: | length/value: 5 (0x5)
- Jun 27 16:56:38.199675: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199678: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199680: | length/value: 1 (0x1)
- Jun 27 16:56:38.199683: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199688: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199690: | length/value: 2 (0x2)
- Jun 27 16:56:38.199693: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199695: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199698: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199700: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199703: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199705: | length/value: 1 (0x1)
- Jun 27 16:56:38.199708: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199710: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199713: | length/value: 4 (0x4)
- Jun 27 16:56:38.199715: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199718: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199720: | length: 36 (0x24)
- Jun 27 16:56:38.199723: | ISAKMP transform number: 52 (0x34)
- Jun 27 16:56:38.199725: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199728: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199731: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199733: | length/value: 5 (0x5)
- Jun 27 16:56:38.199736: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199738: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199741: | length/value: 1 (0x1)
- Jun 27 16:56:38.199743: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199746: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199748: | length/value: 1 (0x1)
- Jun 27 16:56:38.199751: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199753: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199756: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199758: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199761: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199763: | length/value: 1 (0x1)
- Jun 27 16:56:38.199766: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199768: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199771: | length/value: 4 (0x4)
- Jun 27 16:56:38.199774: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199776: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199779: | length: 36 (0x24)
- Jun 27 16:56:38.199781: | ISAKMP transform number: 53 (0x35)
- Jun 27 16:56:38.199784: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199786: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199789: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199791: | length/value: 5 (0x5)
- Jun 27 16:56:38.199794: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199796: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199799: | length/value: 2 (0x2)
- Jun 27 16:56:38.199801: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199804: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199806: | length/value: 14 (0xe)
- Jun 27 16:56:38.199809: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199811: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199814: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199816: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199819: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199821: | length/value: 1 (0x1)
- Jun 27 16:56:38.199824: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199827: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199829: | length/value: 4 (0x4)
- Jun 27 16:56:38.199832: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199834: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199837: | length: 36 (0x24)
- Jun 27 16:56:38.199839: | ISAKMP transform number: 54 (0x36)
- Jun 27 16:56:38.199842: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199844: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199847: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199849: | length/value: 5 (0x5)
- Jun 27 16:56:38.199854: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199857: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199859: | length/value: 2 (0x2)
- Jun 27 16:56:38.199862: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199864: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199867: | length/value: 5 (0x5)
- Jun 27 16:56:38.199869: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199872: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199875: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199877: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199880: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199882: | length/value: 1 (0x1)
- Jun 27 16:56:38.199885: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199887: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199890: | length/value: 4 (0x4)
- Jun 27 16:56:38.199892: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199895: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199897: | length: 36 (0x24)
- Jun 27 16:56:38.199900: | ISAKMP transform number: 55 (0x37)
- Jun 27 16:56:38.199902: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199905: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199908: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199910: | length/value: 5 (0x5)
- Jun 27 16:56:38.199913: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199915: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199918: | length/value: 2 (0x2)
- Jun 27 16:56:38.199920: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199923: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199926: | length/value: 2 (0x2)
- Jun 27 16:56:38.199928: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199931: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199933: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199936: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199938: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199941: | length/value: 1 (0x1)
- Jun 27 16:56:38.199943: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199946: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.199948: | length/value: 4 (0x4)
- Jun 27 16:56:38.199951: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.199954: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.199956: | length: 36 (0x24)
- Jun 27 16:56:38.199959: | ISAKMP transform number: 56 (0x38)
- Jun 27 16:56:38.199961: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.199964: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199966: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.199969: | length/value: 5 (0x5)
- Jun 27 16:56:38.199971: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199974: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.199976: | length/value: 2 (0x2)
- Jun 27 16:56:38.199979: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199981: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.199984: | length/value: 1 (0x1)
- Jun 27 16:56:38.199986: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199989: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.199991: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.199994: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.199997: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.199999: | length/value: 1 (0x1)
- Jun 27 16:56:38.200002: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200004: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200007: | length/value: 4 (0x4)
- Jun 27 16:56:38.200009: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200012: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200014: | length: 36 (0x24)
- Jun 27 16:56:38.200017: | ISAKMP transform number: 57 (0x39)
- Jun 27 16:56:38.200021: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200024: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200026: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200029: | length/value: 6 (0x6)
- Jun 27 16:56:38.200031: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200034: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200036: | length/value: 1 (0x1)
- Jun 27 16:56:38.200039: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200041: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200044: | length/value: 14 (0xe)
- Jun 27 16:56:38.200046: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200049: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200051: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200054: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200057: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200059: | length/value: 1 (0x1)
- Jun 27 16:56:38.200062: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200064: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200067: | length/value: 4 (0x4)
- Jun 27 16:56:38.200069: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200072: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200074: | length: 36 (0x24)
- Jun 27 16:56:38.200077: | ISAKMP transform number: 58 (0x3a)
- Jun 27 16:56:38.200079: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200082: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200084: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200087: | length/value: 6 (0x6)
- Jun 27 16:56:38.200089: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200092: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200094: | length/value: 1 (0x1)
- Jun 27 16:56:38.200097: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200100: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200102: | length/value: 5 (0x5)
- Jun 27 16:56:38.200105: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200107: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200110: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200112: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200115: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200117: | length/value: 1 (0x1)
- Jun 27 16:56:38.200120: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200122: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200125: | length/value: 4 (0x4)
- Jun 27 16:56:38.200127: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200130: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200132: | length: 36 (0x24)
- Jun 27 16:56:38.200135: | ISAKMP transform number: 59 (0x3b)
- Jun 27 16:56:38.200137: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200140: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200143: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200145: | length/value: 6 (0x6)
- Jun 27 16:56:38.200148: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200150: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200153: | length/value: 1 (0x1)
- Jun 27 16:56:38.200155: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200158: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200160: | length/value: 2 (0x2)
- Jun 27 16:56:38.200163: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200165: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200168: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200170: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200173: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200175: | length/value: 1 (0x1)
- Jun 27 16:56:38.200178: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200181: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200183: | length/value: 4 (0x4)
- Jun 27 16:56:38.200187: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200190: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200192: | length: 36 (0x24)
- Jun 27 16:56:38.200195: | ISAKMP transform number: 60 (0x3c)
- Jun 27 16:56:38.200197: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200200: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200203: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200205: | length/value: 6 (0x6)
- Jun 27 16:56:38.200208: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200210: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200213: | length/value: 1 (0x1)
- Jun 27 16:56:38.200215: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200218: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200220: | length/value: 1 (0x1)
- Jun 27 16:56:38.200223: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200225: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200228: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200230: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200233: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200235: | length/value: 1 (0x1)
- Jun 27 16:56:38.200238: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200241: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200243: | length/value: 4 (0x4)
- Jun 27 16:56:38.200246: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200248: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200251: | length: 36 (0x24)
- Jun 27 16:56:38.200253: | ISAKMP transform number: 61 (0x3d)
- Jun 27 16:56:38.200256: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200258: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200261: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200263: | length/value: 6 (0x6)
- Jun 27 16:56:38.200266: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200268: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200271: | length/value: 2 (0x2)
- Jun 27 16:56:38.200273: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200276: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200278: | length/value: 14 (0xe)
- Jun 27 16:56:38.200281: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200283: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200286: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200289: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200291: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200293: | length/value: 1 (0x1)
- Jun 27 16:56:38.200296: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200299: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200301: | length/value: 4 (0x4)
- Jun 27 16:56:38.200304: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200306: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200309: | length: 36 (0x24)
- Jun 27 16:56:38.200311: | ISAKMP transform number: 62 (0x3e)
- Jun 27 16:56:38.200314: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200316: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200319: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200321: | length/value: 6 (0x6)
- Jun 27 16:56:38.200324: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200327: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200329: | length/value: 2 (0x2)
- Jun 27 16:56:38.200332: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200334: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200337: | length/value: 5 (0x5)
- Jun 27 16:56:38.200339: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200342: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200344: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200347: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200349: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200352: | length/value: 1 (0x1)
- Jun 27 16:56:38.200356: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200359: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200361: | length/value: 4 (0x4)
- Jun 27 16:56:38.200364: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200366: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200369: | length: 36 (0x24)
- Jun 27 16:56:38.200371: | ISAKMP transform number: 63 (0x3f)
- Jun 27 16:56:38.200374: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200376: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200379: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200381: | length/value: 6 (0x6)
- Jun 27 16:56:38.200384: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200386: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200389: | length/value: 2 (0x2)
- Jun 27 16:56:38.200391: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200394: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200396: | length/value: 2 (0x2)
- Jun 27 16:56:38.200399: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200402: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200404: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200407: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200409: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200412: | length/value: 1 (0x1)
- Jun 27 16:56:38.200414: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200417: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200419: | length/value: 4 (0x4)
- Jun 27 16:56:38.200422: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200424: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200427: | length: 36 (0x24)
- Jun 27 16:56:38.200429: | ISAKMP transform number: 64 (0x40)
- Jun 27 16:56:38.200432: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200434: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200437: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200440: | length/value: 6 (0x6)
- Jun 27 16:56:38.200442: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200445: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200447: | length/value: 2 (0x2)
- Jun 27 16:56:38.200450: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200452: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200455: | length/value: 1 (0x1)
- Jun 27 16:56:38.200457: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200460: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200462: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200465: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200467: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200470: | length/value: 1 (0x1)
- Jun 27 16:56:38.200472: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200475: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200477: | length/value: 4 (0x4)
- Jun 27 16:56:38.200480: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200483: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200485: | length: 36 (0x24)
- Jun 27 16:56:38.200487: | ISAKMP transform number: 65 (0x41)
- Jun 27 16:56:38.200490: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200493: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200495: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200498: | length/value: 1 (0x1)
- Jun 27 16:56:38.200500: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200503: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200505: | length/value: 1 (0x1)
- Jun 27 16:56:38.200508: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200510: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200513: | length/value: 14 (0xe)
- Jun 27 16:56:38.200515: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200518: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200522: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200525: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200528: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200530: | length/value: 1 (0x1)
- Jun 27 16:56:38.200533: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200535: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200538: | length/value: 4 (0x4)
- Jun 27 16:56:38.200540: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200543: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200545: | length: 36 (0x24)
- Jun 27 16:56:38.200548: | ISAKMP transform number: 66 (0x42)
- Jun 27 16:56:38.200550: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200553: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200555: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200558: | length/value: 1 (0x1)
- Jun 27 16:56:38.200560: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200563: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200565: | length/value: 1 (0x1)
- Jun 27 16:56:38.200568: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200571: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200573: | length/value: 5 (0x5)
- Jun 27 16:56:38.200576: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200578: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200581: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200583: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200586: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200588: | length/value: 1 (0x1)
- Jun 27 16:56:38.200591: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200593: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200596: | length/value: 4 (0x4)
- Jun 27 16:56:38.200598: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200601: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200603: | length: 36 (0x24)
- Jun 27 16:56:38.200606: | ISAKMP transform number: 67 (0x43)
- Jun 27 16:56:38.200608: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200611: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200614: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200616: | length/value: 1 (0x1)
- Jun 27 16:56:38.200619: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200621: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200624: | length/value: 1 (0x1)
- Jun 27 16:56:38.200626: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200629: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200631: | length/value: 2 (0x2)
- Jun 27 16:56:38.200634: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200636: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200639: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200641: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200644: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200646: | length/value: 1 (0x1)
- Jun 27 16:56:38.200649: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200652: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200654: | length/value: 4 (0x4)
- Jun 27 16:56:38.200657: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200659: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200662: | length: 36 (0x24)
- Jun 27 16:56:38.200664: | ISAKMP transform number: 68 (0x44)
- Jun 27 16:56:38.200667: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200669: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200672: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200674: | length/value: 1 (0x1)
- Jun 27 16:56:38.200677: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200679: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200682: | length/value: 1 (0x1)
- Jun 27 16:56:38.200684: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200689: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200691: | length/value: 1 (0x1)
- Jun 27 16:56:38.200694: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200697: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200699: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200702: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200704: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200707: | length/value: 1 (0x1)
- Jun 27 16:56:38.200709: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200712: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200714: | length/value: 4 (0x4)
- Jun 27 16:56:38.200717: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200719: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200722: | length: 36 (0x24)
- Jun 27 16:56:38.200724: | ISAKMP transform number: 69 (0x45)
- Jun 27 16:56:38.200727: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200729: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200732: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200734: | length/value: 1 (0x1)
- Jun 27 16:56:38.200737: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200739: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200742: | length/value: 2 (0x2)
- Jun 27 16:56:38.200744: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200747: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200749: | length/value: 14 (0xe)
- Jun 27 16:56:38.200752: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200755: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200757: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200760: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200762: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200765: | length/value: 1 (0x1)
- Jun 27 16:56:38.200767: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200770: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200772: | length/value: 4 (0x4)
- Jun 27 16:56:38.200775: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200777: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200780: | length: 36 (0x24)
- Jun 27 16:56:38.200782: | ISAKMP transform number: 70 (0x46)
- Jun 27 16:56:38.200785: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200787: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200790: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200793: | length/value: 1 (0x1)
- Jun 27 16:56:38.200795: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200798: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200800: | length/value: 2 (0x2)
- Jun 27 16:56:38.200803: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200805: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200808: | length/value: 5 (0x5)
- Jun 27 16:56:38.200810: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200813: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200815: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200818: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200820: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200823: | length/value: 1 (0x1)
- Jun 27 16:56:38.200825: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200828: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200830: | length/value: 4 (0x4)
- Jun 27 16:56:38.200833: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200836: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.200838: | length: 36 (0x24)
- Jun 27 16:56:38.200840: | ISAKMP transform number: 71 (0x47)
- Jun 27 16:56:38.200843: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200846: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200848: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200851: | length/value: 1 (0x1)
- Jun 27 16:56:38.200855: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200858: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200860: | length/value: 2 (0x2)
- Jun 27 16:56:38.200863: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200866: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200868: | length/value: 2 (0x2)
- Jun 27 16:56:38.200871: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200873: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200876: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200878: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200881: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200883: | length/value: 1 (0x1)
- Jun 27 16:56:38.200886: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200888: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200891: | length/value: 4 (0x4)
- Jun 27 16:56:38.200893: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.200896: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.200899: | length: 36 (0x24)
- Jun 27 16:56:38.200901: | ISAKMP transform number: 72 (0x48)
- Jun 27 16:56:38.200904: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.200906: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200909: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.200911: | length/value: 1 (0x1)
- Jun 27 16:56:38.200914: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200916: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.200919: | length/value: 2 (0x2)
- Jun 27 16:56:38.200921: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200924: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.200926: | length/value: 1 (0x1)
- Jun 27 16:56:38.200929: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200931: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.200934: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.200936: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200939: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.200941: | length/value: 1 (0x1)
- Jun 27 16:56:38.200944: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.200947: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.200949: | length/value: 4 (0x4)
- Jun 27 16:56:38.200954: | find_host_connection me=192.168.1.137:500 him=%any:500 policy=PSK+XAUTH+IKEV1_ALLOW
- Jun 27 16:56:38.200958: | find_host_pair: comparing ::1:500 to :::500
- Jun 27 16:56:38.200961: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:38.200964: | find_next_host_connection policy=PSK+XAUTH+IKEV1_ALLOW
- Jun 27 16:56:38.200968: | found policy = PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+AGGRESSIVE+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (xauth-aggr)
- Jun 27 16:56:38.200972: | found policy = PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (xauth)
- Jun 27 16:56:38.200975: | find_next_host_connection returns xauth
- Jun 27 16:56:38.200979: | instantiating "xauth" for initial Main Mode message received on 192.168.1.137:500
- Jun 27 16:56:38.200985: | reference addresspool of conn xauth[1] kind CK_TEMPLATE refcnt 2
- Jun 27 16:56:38.200991: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:38.200995: | find_host_pair: comparing ::1:500 to :::500
- Jun 27 16:56:38.200998: | connect_to_host_pair: 192.168.1.137:500 192.168.1.138:500 -> hp:none
- Jun 27 16:56:38.201002: | rw_instantiate() instantiated "xauth"[1] 192.168.1.138 for 192.168.1.138
- Jun 27 16:56:38.201007: | creating state object #1 at 0x555eacc32cf8
- Jun 27 16:56:38.201010: | parent state #1: new => STATE_UNDEFINED(ignore)
- Jun 27 16:56:38.201017: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in main_inI1_outR1() at ikev1_main.c:757)
- Jun 27 16:56:38.201020: | parent state #1: STATE_UNDEFINED(ignore) => STATE_MAIN_R0(half-open-ike)
- Jun 27 16:56:38.201028: | ignore states: 0
- Jun 27 16:56:38.201031: | half-open-ike states: 1
- Jun 27 16:56:38.201033: | open-ike states: 0
- Jun 27 16:56:38.201036: | established-anonymous-ike states: 0
- Jun 27 16:56:38.201038: | established-authenticated-ike states: 0
- Jun 27 16:56:38.201040: | anonymous-ipsec states: 0
- Jun 27 16:56:38.201043: | authenticated-ipsec states: 0
- Jun 27 16:56:38.201045: | informational states: 0
- Jun 27 16:56:38.201048: | unknown states: 0
- Jun 27 16:56:38.201050: | category states: 1 count states: 1
- Jun 27 16:56:38.201083: | inserting state object #1
- Jun 27 16:56:38.201088: | serialno list: inserting object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 into list 0x555eabcab5c0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
- Jun 27 16:56:38.201092: | serialno list: inserted object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
- Jun 27 16:56:38.201095: | serialno list: list entry 0x555eabcab5c0 is HEAD (older 0x555eacc334a0 newer 0x555eacc334a0)
- Jun 27 16:56:38.201099: | serialno table: inserting object 0x555eacc32cf8 (state #1) entry 0x555eacc334c0 into list 0x555eabc9e360 (older 0x555eabc9e360 newer 0x555eabc9e360)
- Jun 27 16:56:38.201103: | serialno table: inserted object 0x555eacc32cf8 (state #1) entry 0x555eacc334c0 (older 0x555eabc9e360 newer 0x555eabc9e360)
- Jun 27 16:56:38.201106: | serialno table: list entry 0x555eabc9e360 is HEAD (older 0x555eacc334c0 newer 0x555eacc334c0)
- Jun 27 16:56:38.201112: | sender checking NAT-T: enabled and 90
- Jun 27 16:56:38.201114: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC
- Jun 27 16:56:38.201117: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
- Jun 27 16:56:38.201121: "xauth"[1] 192.168.1.138 #1: responding to Main Mode from unknown peer 192.168.1.138 on port 500
- Jun 27 16:56:38.201124: | ICOOKIE-DUMP: 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.201148: | **emit ISAKMP Message:
- Jun 27 16:56:38.201151: | initiator cookie:
- Jun 27 16:56:38.201154: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.201156: | responder cookie:
- Jun 27 16:56:38.201159: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.201161: | next payload type: ISAKMP_NEXT_SA (0x1)
- Jun 27 16:56:38.201164: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.201167: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
- Jun 27 16:56:38.201169: | flags: none (0x0)
- Jun 27 16:56:38.201172: | message ID: 00 00 00 00
- Jun 27 16:56:38.201175: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:38.201178: | NAT-T VID detected, sending NAT-T VID
- Jun 27 16:56:38.201180: | ***emit ISAKMP Security Association Payload:
- Jun 27 16:56:38.201183: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.201186: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:38.201189: | ****parse IPsec DOI SIT:
- Jun 27 16:56:38.201192: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
- Jun 27 16:56:38.201195: | ****parse ISAKMP Proposal Payload:
- Jun 27 16:56:38.201197: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.201200: | length: 2792 (0xae8)
- Jun 27 16:56:38.201209: | proposal number: 1 (0x1)
- Jun 27 16:56:38.201213: | protocol ID: PROTO_ISAKMP (0x1)
- Jun 27 16:56:38.201216: | SPI size: 0 (0x0)
- Jun 27 16:56:38.201218: | number of transforms: 72 (0x48)
- Jun 27 16:56:38.201222: | *****parse ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.201225: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:38.201227: | length: 40 (0x28)
- Jun 27 16:56:38.201230: | ISAKMP transform number: 1 (0x1)
- Jun 27 16:56:38.201232: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.201235: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201238: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
- Jun 27 16:56:38.201240: | length/value: 7 (0x7)
- Jun 27 16:56:38.201243: | [7 is OAKLEY_AES_CBC]
- Jun 27 16:56:38.201248: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201250: | af+type: OAKLEY_KEY_LENGTH (0x800e)
- Jun 27 16:56:38.201253: | length/value: 256 (0x100)
- Jun 27 16:56:38.201256: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201261: | af+type: OAKLEY_HASH_ALGORITHM (0x8002)
- Jun 27 16:56:38.201264: | length/value: 1 (0x1)
- Jun 27 16:56:38.201267: | [1 is OAKLEY_MD5]
- Jun 27 16:56:38.201270: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201272: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004)
- Jun 27 16:56:38.201275: | length/value: 14 (0xe)
- Jun 27 16:56:38.201288: | [14 is OAKLEY_GROUP_MODP2048]
- Jun 27 16:56:38.201291: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201294: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003)
- Jun 27 16:56:38.201296: | length/value: 65001 (0xfde9)
- Jun 27 16:56:38.201299: | [65001 is XAUTHInitPreShared]
- Jun 27 16:56:38.201304: | started looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
- Jun 27 16:56:38.201308: | actually looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
- Jun 27 16:56:38.201313: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
- Jun 27 16:56:38.201318: | 1: compared key 192.168.1.137 to 192.168.1.137 / 192.168.1.138 -> 8
- Jun 27 16:56:38.201332: | line 1: match=9
- Jun 27 16:56:38.201335: | best_match 0>9 best=0x555eacc30998 (line=1)
- Jun 27 16:56:38.201338: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
- Jun 27 16:56:38.201341: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201344: | af+type: OAKLEY_LIFE_TYPE (0x800b)
- Jun 27 16:56:38.201346: | length/value: 1 (0x1)
- Jun 27 16:56:38.201349: | [1 is OAKLEY_LIFE_SECONDS]
- Jun 27 16:56:38.201351: | ******parse ISAKMP Oakley attribute:
- Jun 27 16:56:38.201354: | af+type: OAKLEY_LIFE_DURATION (variable length) (0xc)
- Jun 27 16:56:38.201357: | length/value: 4 (0x4)
- Jun 27 16:56:38.201359: | long duration: 86400
- Jun 27 16:56:38.201365: "xauth"[1] 192.168.1.138 #1: WARNING: connection xauth PSK length of 4 bytes is too short for md5 PRF in FIPS mode (8 bytes required)
- Jun 27 16:56:38.201368: | OAKLEY proposal verified unconditionally; no alg_info to check against
- Jun 27 16:56:38.201371: | Oakley Transform 1 accepted
- Jun 27 16:56:38.201373: | ****emit IPsec DOI SIT:
- Jun 27 16:56:38.201376: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
- Jun 27 16:56:38.201379: | ****emit ISAKMP Proposal Payload:
- Jun 27 16:56:38.201382: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.201384: | proposal number: 1 (0x1)
- Jun 27 16:56:38.201387: | protocol ID: PROTO_ISAKMP (0x1)
- Jun 27 16:56:38.201389: | SPI size: 0 (0x0)
- Jun 27 16:56:38.201392: | number of transforms: 1 (0x1)
- Jun 27 16:56:38.201394: | *****emit ISAKMP Transform Payload (ISAKMP):
- Jun 27 16:56:38.201397: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.201400: | ISAKMP transform number: 1 (0x1)
- Jun 27 16:56:38.201402: | ISAKMP transform ID: KEY_IKE (0x1)
- Jun 27 16:56:38.201405: | emitting 32 raw bytes of attributes into ISAKMP Transform Payload (ISAKMP)
- Jun 27 16:56:38.201408: | attributes 80 01 00 07 80 0e 01 00 80 02 00 01 80 04 00 0e
- Jun 27 16:56:38.201411: | attributes 80 03 fd e9 80 0b 00 01 00 0c 00 04 00 01 51 80
- Jun 27 16:56:38.201414: | emitting length of ISAKMP Transform Payload (ISAKMP): 40
- Jun 27 16:56:38.201416: | emitting length of ISAKMP Proposal Payload: 48
- Jun 27 16:56:38.201419: | emitting length of ISAKMP Security Association Payload: 60
- Jun 27 16:56:38.201422: | out_vid(): sending [Dead Peer Detection]
- Jun 27 16:56:38.201425: | ***emit ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.201428: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.201430: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
- Jun 27 16:56:38.201433: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
- Jun 27 16:56:38.201436: | emitting length of ISAKMP Vendor ID Payload: 20
- Jun 27 16:56:38.201438: | out_vid(): sending [FRAGMENTATION]
- Jun 27 16:56:38.201441: | ***emit ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.201444: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.201446: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
- Jun 27 16:56:38.201449: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
- Jun 27 16:56:38.201455: | emitting length of ISAKMP Vendor ID Payload: 20
- Jun 27 16:56:38.201457: | out_vid(): sending [XAUTH]
- Jun 27 16:56:38.201460: | ***emit ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.201462: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.201465: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
- Jun 27 16:56:38.201468: | V_ID 09 00 26 89 df d6 b7 12
- Jun 27 16:56:38.201470: | emitting length of ISAKMP Vendor ID Payload: 12
- Jun 27 16:56:38.201473: | out_vid(): sending [RFC 3947]
- Jun 27 16:56:38.201475: | ***emit ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.201478: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.201480: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
- Jun 27 16:56:38.201483: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
- Jun 27 16:56:38.201486: | emitting length of ISAKMP Vendor ID Payload: 20
- Jun 27 16:56:38.201488: | no IKEv1 message padding required
- Jun 27 16:56:38.201491: | emitting length of ISAKMP Message: 160
- Jun 27 16:56:38.201496: | complete v1 state transition with STF_OK
- Jun 27 16:56:38.201501: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:38.201504: | #1 is idle
- Jun 27 16:56:38.201507: | doing_xauth:yes, t_xauth_client_done:no
- Jun 27 16:56:38.201509: | peer supports fragmentation
- Jun 27 16:56:38.201512: | peer supports dpd
- Jun 27 16:56:38.201514: | dpd is active locally
- Jun 27 16:56:38.201517: | IKEv1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Jun 27 16:56:38.201520: | parent state #1: STATE_MAIN_R0(half-open-ike) => STATE_MAIN_R1(open-ike)
- Jun 27 16:56:38.201522: | ignore states: 0
- Jun 27 16:56:38.201525: | half-open-ike states: 0
- Jun 27 16:56:38.201527: | open-ike states: 1
- Jun 27 16:56:38.201530: | established-anonymous-ike states: 0
- Jun 27 16:56:38.201532: | established-authenticated-ike states: 0
- Jun 27 16:56:38.201535: | anonymous-ipsec states: 0
- Jun 27 16:56:38.201537: | authenticated-ipsec states: 0
- Jun 27 16:56:38.201539: | informational states: 0
- Jun 27 16:56:38.201542: | unknown states: 0
- Jun 27 16:56:38.201544: | category states: 1 count states: 1
- Jun 27 16:56:38.201547: | event_already_set, deleting event
- Jun 27 16:56:38.201550: | state #1 requesting to delete non existing event
- Jun 27 16:56:38.201554: | sending reply packet to 192.168.1.138:500 (from port 500)
- Jun 27 16:56:38.201559: | sending 160 bytes for STATE_MAIN_R0 through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:38.201562: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.201564: | 01 10 02 00 00 00 00 00 00 00 00 a0 0d 00 00 3c
- Jun 27 16:56:38.201567: | 00 00 00 01 00 00 00 01 00 00 00 30 01 01 00 01
- Jun 27 16:56:38.201569: | 00 00 00 28 01 01 00 00 80 01 00 07 80 0e 01 00
- Jun 27 16:56:38.201572: | 80 02 00 01 80 04 00 0e 80 03 fd e9 80 0b 00 01
- Jun 27 16:56:38.201574: | 00 0c 00 04 00 01 51 80 0d 00 00 14 af ca d7 13
- Jun 27 16:56:38.201577: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 0d 00 00 14
- Jun 27 16:56:38.201579: | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
- Jun 27 16:56:38.201581: | 0d 00 00 0c 09 00 26 89 df d6 b7 12 00 00 00 14
- Jun 27 16:56:38.201584: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
- Jun 27 16:56:38.207446: | !event_already_set at reschedule
- Jun 27 16:56:38.207558: | event_schedule: new EVENT_SO_DISCARD-pe@0x555eacc306e8
- Jun 27 16:56:38.207681: | inserting event EVENT_SO_DISCARD, timeout in 60.000 seconds for #1
- Jun 27 16:56:38.207785: "xauth"[1] 192.168.1.138 #1: STATE_MAIN_R1: sent MR1, expecting MI2
- Jun 27 16:56:38.207896: | modecfg pull: quirk-poll policy:pull not-client
- Jun 27 16:56:38.207989: | phase 1 is done, looking for phase 2 to unpend
- Jun 27 16:56:38.208101: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.208201: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.208323: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.208426: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.208537: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:38.208872: | *received 352 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.208969: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.209079: | 04 10 02 00 00 00 00 00 00 00 01 60 0a 00 01 04
- Jun 27 16:56:38.209288: | 4c 6b 88 2e 72 ce 5f 62 c7 d1 dc 2c 4b fa 04 af
- Jun 27 16:56:38.209418: | 29 e1 c2 60 a3 15 1c fa f5 85 2d 6d 12 a7 1d 57
- Jun 27 16:56:38.209560: | 56 93 08 e0 e7 f7 fe 08 f5 fd be ea 02 64 67 b4
- Jun 27 16:56:38.209710: | a7 b5 ce 95 d0 5f 30 f9 b8 62 be c8 53 ac 44 d2
- Jun 27 16:56:38.209875: | 57 32 7d 8e c0 68 dd f2 06 ee a5 fb 95 aa 3e f7
- Jun 27 16:56:38.210000: | 10 97 7b ad 1c 4f ee 22 de 42 80 33 16 06 36 51
- Jun 27 16:56:38.210162: | 48 63 f4 6f a6 21 2e ad 56 cc c7 fb cd d0 97 17
- Jun 27 16:56:38.210282: | 03 b3 8d 32 3c 34 cf a3 ec b5 31 5e dd 42 8d 55
- Jun 27 16:56:38.210406: | 65 fd 3a 74 fd c0 3e ef af 75 4d 04 c9 89 3b a2
- Jun 27 16:56:38.210537: | 1d c8 70 7e 62 12 f7 5b 49 98 97 1e cd e1 ad 2e
- Jun 27 16:56:38.210673: | c3 0f a3 27 a5 8a 8a 76 b4 b2 21 41 ca c5 52 e9
- Jun 27 16:56:38.210754: | 3a e5 cf 5d 3c 3a f1 07 1d 2b 95 6d 03 87 c5 ec
- Jun 27 16:56:38.210860: | 14 ba b3 e6 0c e3 9c 07 53 94 5a e2 77 d7 4e ae
- Jun 27 16:56:38.210950: | 28 96 40 c4 1e 50 b1 0f 44 9b a6 6a 95 7d b4 28
- Jun 27 16:56:38.211040: | 34 b0 19 31 01 a0 36 33 c2 e8 18 ca 01 c9 ce ee
- Jun 27 16:56:38.211159: | 92 bc d8 c0 13 b0 13 ac 9e e2 4b 4b 30 c5 87 c2
- Jun 27 16:56:38.211306: | 14 00 00 18 47 89 0d 6f 4c fa d0 97 ac 13 42 20
- Jun 27 16:56:38.211388: | 1e 90 47 f5 57 0b 1c 46 14 00 00 14 6e 69 ca 60
- Jun 27 16:56:38.211491: | 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61 00 00 00 14
- Jun 27 16:56:38.211569: | 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
- Jun 27 16:56:38.211675: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.211796: | **parse ISAKMP Message:
- Jun 27 16:56:38.211901: | initiator cookie:
- Jun 27 16:56:38.211989: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.212062: | responder cookie:
- Jun 27 16:56:38.212159: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.212256: | next payload type: ISAKMP_NEXT_KE (0x4)
- Jun 27 16:56:38.212336: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.212423: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
- Jun 27 16:56:38.212496: | flags: none (0x0)
- Jun 27 16:56:38.212581: | message ID: 00 00 00 00
- Jun 27 16:56:38.212655: | length: 352 (0x160)
- Jun 27 16:56:38.212749: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
- Jun 27 16:56:38.212824: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.212929: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:38.212949: | v1 state object #1 found, in STATE_MAIN_R1
- Jun 27 16:56:38.212967: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1117)
- Jun 27 16:56:38.212981: | #1 is idle
- Jun 27 16:56:38.212994: | #1 idle
- Jun 27 16:56:38.213069: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080
- Jun 27 16:56:38.213089: | ***parse ISAKMP Key Exchange Payload:
- Jun 27 16:56:38.213103: | next payload type: ISAKMP_NEXT_NONCE (0xa)
- Jun 27 16:56:38.213116: | length: 260 (0x104)
- Jun 27 16:56:38.213130: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080
- Jun 27 16:56:38.213144: | ***parse ISAKMP Nonce Payload:
- Jun 27 16:56:38.213157: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
- Jun 27 16:56:38.213170: | length: 24 (0x18)
- Jun 27 16:56:38.213278: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080
- Jun 27 16:56:38.213306: | ***parse ISAKMP NAT-D Payload:
- Jun 27 16:56:38.213321: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
- Jun 27 16:56:38.213335: | length: 20 (0x14)
- Jun 27 16:56:38.213349: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080
- Jun 27 16:56:38.213362: | ***parse ISAKMP NAT-D Payload:
- Jun 27 16:56:38.213376: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.213389: | length: 20 (0x14)
- Jun 27 16:56:38.213406: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal)
- Jun 27 16:56:38.213440: | natd_hash: hasher=0x555eabc8a400(16)
- Jun 27 16:56:38.213524: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.213544: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.213558: | natd_hash: ip= c0 a8 01 89
- Jun 27 16:56:38.213572: | natd_hash: port=500
- Jun 27 16:56:38.213586: | natd_hash: hash= 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
- Jun 27 16:56:38.213608: | natd_hash: hasher=0x555eabc8a400(16)
- Jun 27 16:56:38.213683: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.213703: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.213717: | natd_hash: ip= c0 a8 01 8a
- Jun 27 16:56:38.213731: | natd_hash: port=500
- Jun 27 16:56:38.213745: | natd_hash: hash= 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
- Jun 27 16:56:38.213759: | expected NAT-D(me): 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
- Jun 27 16:56:38.213773: | expected NAT-D(him):
- Jun 27 16:56:38.213868: | 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
- Jun 27 16:56:38.213889: | received NAT-D: 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
- Jun 27 16:56:38.213904: | received NAT-D: 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
- Jun 27 16:56:38.213918: | NAT_TRAVERSAL encaps using auto-detect
- Jun 27 16:56:38.213932: | NAT_TRAVERSAL this end is NOT behind NAT
- Jun 27 16:56:38.213945: | NAT_TRAVERSAL that end is NOT behind NAT
- Jun 27 16:56:38.213960: | NAT_TRAVERSAL nat_keepalive enabled 192.168.1.138
- Jun 27 16:56:38.213975: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected
- Jun 27 16:56:38.213989: | NAT_T_WITH_KA detected
- Jun 27 16:56:38.214004: | event_schedule: new EVENT_NAT_T_KEEPALIVE-pe@0x555eacc31d58
- Jun 27 16:56:38.214077: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20.000 seconds
- Jun 27 16:56:38.214104: | adding inI2_outR2 KE work-order 1 for state #1
- Jun 27 16:56:38.214120: | state #1 requesting EVENT_SO_DISCARD to be deleted
- Jun 27 16:56:38.214136: | free_event_entry: release EVENT_SO_DISCARD-pe@0x555eacc306e8
- Jun 27 16:56:38.214151: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
- Jun 27 16:56:38.214166: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1
- Jun 27 16:56:38.214237: | backlog: inserting object 0x555eacc34e48 (work-order 1 state #1) entry 0x555eacc34e50 into list 0x555eabcac5e0 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:38.214259: | backlog: inserted object 0x555eacc34e48 (work-order 1 state #1) entry 0x555eacc34e50 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:38.214273: | backlog: list entry 0x555eabcac5e0 is HEAD (older 0x555eacc34e50 newer 0x555eacc34e50)
- Jun 27 16:56:38.214301: | crypto helper 1 resuming
- Jun 27 16:56:38.214308: | backlog: removing object 0x555eacc34e48 (work-order 1 state #1) entry 0x555eacc34e50 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:38.214311: | backlog: empty
- Jun 27 16:56:38.214314: | crypto helper 1 starting work-order 1 for state #1
- Jun 27 16:56:38.214318: | crypto helper 1 doing build KE and nonce; request ID 1
- Jun 27 16:56:38.215089: | crypto helper 1 finished build KE and nonce; request ID 1 time elapsed 770 usec
- Jun 27 16:56:38.215095: | crypto helper 1 sending results from work-order 1 for state #1 to event queue
- Jun 27 16:56:38.215099: | scheduling now-event sending helper answer for #1
- Jun 27 16:56:38.215105: | crypto helper 1 waiting (nothing to do)
- Jun 27 16:56:38.215127: | complete v1 state transition with STF_SUSPEND
- Jun 27 16:56:38.215146: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2272)
- Jun 27 16:56:38.215257: | suspending state #1 and saving MD
- Jun 27 16:56:38.215279: | #1 is busy; has a suspended MD
- Jun 27 16:56:38.215295: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.215311: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.215325: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.215339: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.215353: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:38.215375: | executing now-event sending helper answer for 1
- Jun 27 16:56:38.215389: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:38.215482: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:38.215506: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
- Jun 27 16:56:38.215522: | crypto helper 1 replies to request ID 1
- Jun 27 16:56:38.215535: | calling continuation function 0x555eab9a0d60
- Jun 27 16:56:38.215549: | main_inI2_outR2_continue for #1: calculated ke+nonce, sending R2
- Jun 27 16:56:38.215570: | **emit ISAKMP Message:
- Jun 27 16:56:38.215586: | initiator cookie:
- Jun 27 16:56:38.215600: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.215613: | responder cookie:
- Jun 27 16:56:38.215705: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.215726: | next payload type: ISAKMP_NEXT_KE (0x4)
- Jun 27 16:56:38.215741: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.215755: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
- Jun 27 16:56:38.215769: | flags: none (0x0)
- Jun 27 16:56:38.215784: | message ID: 00 00 00 00
- Jun 27 16:56:38.215798: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:38.215814: | ***emit ISAKMP Key Exchange Payload:
- Jun 27 16:56:38.215828: | next payload type: ISAKMP_NEXT_NONCE (0xa)
- Jun 27 16:56:38.215843: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload
- Jun 27 16:56:38.215915: | keyex value 44 66 ea 21 62 11 e8 95 7b 6d ba 6c 4c 2a f2 f2
- Jun 27 16:56:38.215935: | keyex value 24 e9 e3 b3 7f bc 25 61 fd 6c fb 82 f4 62 b9 aa
- Jun 27 16:56:38.215950: | keyex value 65 c0 40 4e fe 87 8a f5 c1 6f 2f 7c 1f a9 4f af
- Jun 27 16:56:38.215964: | keyex value 98 bf 81 63 81 07 ca f4 e6 bb 2d e1 51 08 4f 6b
- Jun 27 16:56:38.215977: | keyex value 30 a8 d5 0d 5d f6 85 9e b3 35 a0 2b 8f 69 d9 25
- Jun 27 16:56:38.215991: | keyex value d4 f0 d8 5e 23 97 73 74 df 1b d5 db 9f 67 8a 15
- Jun 27 16:56:38.216004: | keyex value 39 f1 ac 8b c3 2e 72 a7 9d fb 5e c5 d1 61 69 a1
- Jun 27 16:56:38.216073: | keyex value 7e ed 47 1a 5d 53 41 8a 8e b2 5e 2e a7 d5 99 3b
- Jun 27 16:56:38.216093: | keyex value a3 9b 88 b6 77 8b ce 4c 02 1d d9 2b 51 d7 dd ad
- Jun 27 16:56:38.216107: | keyex value e3 43 ee 8d 2b 4c 53 22 a1 18 ab 6e 6d 63 ad 44
- Jun 27 16:56:38.216121: | keyex value dd 23 31 90 6c ad 90 91 8b 09 8a 60 a8 2d a7 6f
- Jun 27 16:56:38.216134: | keyex value 74 46 c1 d8 b6 66 b6 8a 85 ae f4 52 72 65 84 5d
- Jun 27 16:56:38.216148: | keyex value cf 07 ee 01 91 42 27 37 02 9f fa eb 2a e9 6d 6e
- Jun 27 16:56:38.216162: | keyex value cb 04 0a 53 3b 85 8a fa 87 3f bd c9 11 34 55 05
- Jun 27 16:56:38.216175: | keyex value 96 91 9c 5a 79 20 8d 1f 91 7e 6f 6a ab 13 48 e9
- Jun 27 16:56:38.216265: | keyex value 1c df 41 25 8d 0f af c7 d9 27 91 7b 80 04 41 93
- Jun 27 16:56:38.216286: | emitting length of ISAKMP Key Exchange Payload: 260
- Jun 27 16:56:38.216301: | ***emit ISAKMP Nonce Payload:
- Jun 27 16:56:38.216315: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.216330: | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
- Jun 27 16:56:38.216344: | Nr ca 78 22 43 0b 08 92 6c 71 af f1 28 55 c3 02 90
- Jun 27 16:56:38.216363: | Nr c8 60 ac bf ae 21 c1 58 9f f8 5d 2c 79 d1 cb 20
- Jun 27 16:56:38.216378: | emitting length of ISAKMP Nonce Payload: 36
- Jun 27 16:56:38.216392: | sending NAT-D payloads
- Jun 27 16:56:38.216471: | natd_hash: hasher=0x555eabc8a400(16)
- Jun 27 16:56:38.216493: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.216507: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.216521: | natd_hash: ip= c0 a8 01 8a
- Jun 27 16:56:38.216535: | natd_hash: port=500
- Jun 27 16:56:38.216604: | natd_hash: hash= 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
- Jun 27 16:56:38.216624: | ***emit ISAKMP NAT-D Payload:
- Jun 27 16:56:38.216639: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14)
- Jun 27 16:56:38.216654: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
- Jun 27 16:56:38.216668: | NAT-D 55 27 a7 51 79 5f a3 e2 4b 30 f9 e6 2c 5c 60 ce
- Jun 27 16:56:38.216682: | emitting length of ISAKMP NAT-D Payload: 20
- Jun 27 16:56:38.216704: | natd_hash: hasher=0x555eabc8a400(16)
- Jun 27 16:56:38.216799: | natd_hash: icookie= 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.216820: | natd_hash: rcookie= a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.216835: | natd_hash: ip= c0 a8 01 89
- Jun 27 16:56:38.216848: | natd_hash: port=500
- Jun 27 16:56:38.216862: | natd_hash: hash= 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
- Jun 27 16:56:38.216876: | ***emit ISAKMP NAT-D Payload:
- Jun 27 16:56:38.216890: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.216905: | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload
- Jun 27 16:56:38.216919: | NAT-D 6e 69 ca 60 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
- Jun 27 16:56:38.216989: | emitting length of ISAKMP NAT-D Payload: 20
- Jun 27 16:56:38.217009: | no IKEv1 message padding required
- Jun 27 16:56:38.217023: | emitting length of ISAKMP Message: 364
- Jun 27 16:56:38.217037: | main inI2_outR2: starting async DH calculation (group=14)
- Jun 27 16:56:38.217053: | started looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
- Jun 27 16:56:38.217068: | actually looking for secret for 192.168.1.137->192.168.1.138 of kind PKK_PSK
- Jun 27 16:56:38.217083: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
- Jun 27 16:56:38.217153: | 1: compared key 192.168.1.137 to 192.168.1.137 / 192.168.1.138 -> 8
- Jun 27 16:56:38.217172: | line 1: match=9
- Jun 27 16:56:38.217187: | best_match 0>9 best=0x555eacc30998 (line=1)
- Jun 27 16:56:38.217201: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
- Jun 27 16:56:38.217228: | adding main_inI2_outR2_tail work-order 2 for state #1
- Jun 27 16:56:38.217328: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
- Jun 27 16:56:38.217350: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
- Jun 27 16:56:38.217365: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
- Jun 27 16:56:38.217380: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1
- Jun 27 16:56:38.217396: | backlog: inserting object 0x555eacc35a18 (work-order 2 state #1) entry 0x555eacc35a20 into list 0x555eabcac5e0 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:38.217411: | backlog: inserted object 0x555eacc35a18 (work-order 2 state #1) entry 0x555eacc35a20 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:38.217425: | backlog: list entry 0x555eabcac5e0 is HEAD (older 0x555eacc35a20 newer 0x555eacc35a20)
- Jun 27 16:56:38.217448: | crypto helper 0 resuming
- Jun 27 16:56:38.217455: | backlog: removing object 0x555eacc35a18 (work-order 2 state #1) entry 0x555eacc35a20 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:38.217458: | backlog: empty
- Jun 27 16:56:38.217461: | crypto helper 0 starting work-order 2 for state #1
- Jun 27 16:56:38.217464: | crypto helper 0 doing compute dh+iv (V1 Phase 1); request ID 2
- Jun 27 16:56:38.218382: | crypto helper 0 finished compute dh+iv (V1 Phase 1); request ID 2 time elapsed 918 usec
- Jun 27 16:56:38.218389: | crypto helper 0 sending results from work-order 2 for state #1 to event queue
- Jun 27 16:56:38.218392: | scheduling now-event sending helper answer for #1
- Jun 27 16:56:38.218401: | crypto helper 0 waiting (nothing to do)
- Jun 27 16:56:38.218422: | #1 main_inI2_outR2_continue1_tail:1301 st->st_calculating = FALSE;
- Jun 27 16:56:38.218437: | complete v1 state transition with STF_OK
- Jun 27 16:56:38.218545: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:38.218566: | #1 is idle; has background offloaded task
- Jun 27 16:56:38.218580: | doing_xauth:yes, t_xauth_client_done:no
- Jun 27 16:56:38.218594: | IKEv1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Jun 27 16:56:38.218608: | parent state #1: STATE_MAIN_R1(open-ike) => STATE_MAIN_R2(open-ike)
- Jun 27 16:56:38.218622: | ignore states: 0
- Jun 27 16:56:38.218635: | half-open-ike states: 0
- Jun 27 16:56:38.218648: | open-ike states: 1
- Jun 27 16:56:38.218661: | established-anonymous-ike states: 0
- Jun 27 16:56:38.218674: | established-authenticated-ike states: 0
- Jun 27 16:56:38.218687: | anonymous-ipsec states: 0
- Jun 27 16:56:38.218700: | authenticated-ipsec states: 0
- Jun 27 16:56:38.218713: | informational states: 0
- Jun 27 16:56:38.218783: | unknown states: 0
- Jun 27 16:56:38.218803: | category states: 1 count states: 1
- Jun 27 16:56:38.218816: | event_already_set, deleting event
- Jun 27 16:56:38.218830: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
- Jun 27 16:56:38.218844: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555eacc306e8
- Jun 27 16:56:38.218861: | sending reply packet to 192.168.1.138:500 (from port 500)
- Jun 27 16:56:38.218879: | sending 364 bytes for STATE_MAIN_R1 through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:38.218970: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.218990: | 04 10 02 00 00 00 00 00 00 00 01 6c 0a 00 01 04
- Jun 27 16:56:38.219003: | 44 66 ea 21 62 11 e8 95 7b 6d ba 6c 4c 2a f2 f2
- Jun 27 16:56:38.219016: | 24 e9 e3 b3 7f bc 25 61 fd 6c fb 82 f4 62 b9 aa
- Jun 27 16:56:38.219029: | 65 c0 40 4e fe 87 8a f5 c1 6f 2f 7c 1f a9 4f af
- Jun 27 16:56:38.219042: | 98 bf 81 63 81 07 ca f4 e6 bb 2d e1 51 08 4f 6b
- Jun 27 16:56:38.219055: | 30 a8 d5 0d 5d f6 85 9e b3 35 a0 2b 8f 69 d9 25
- Jun 27 16:56:38.219068: | d4 f0 d8 5e 23 97 73 74 df 1b d5 db 9f 67 8a 15
- Jun 27 16:56:38.219081: | 39 f1 ac 8b c3 2e 72 a7 9d fb 5e c5 d1 61 69 a1
- Jun 27 16:56:38.219094: | 7e ed 47 1a 5d 53 41 8a 8e b2 5e 2e a7 d5 99 3b
- Jun 27 16:56:38.219161: | a3 9b 88 b6 77 8b ce 4c 02 1d d9 2b 51 d7 dd ad
- Jun 27 16:56:38.219179: | e3 43 ee 8d 2b 4c 53 22 a1 18 ab 6e 6d 63 ad 44
- Jun 27 16:56:38.219193: | dd 23 31 90 6c ad 90 91 8b 09 8a 60 a8 2d a7 6f
- Jun 27 16:56:38.219205: | 74 46 c1 d8 b6 66 b6 8a 85 ae f4 52 72 65 84 5d
- Jun 27 16:56:38.219218: | cf 07 ee 01 91 42 27 37 02 9f fa eb 2a e9 6d 6e
- Jun 27 16:56:38.219231: | cb 04 0a 53 3b 85 8a fa 87 3f bd c9 11 34 55 05
- Jun 27 16:56:38.219244: | 96 91 9c 5a 79 20 8d 1f 91 7e 6f 6a ab 13 48 e9
- Jun 27 16:56:38.219258: | 1c df 41 25 8d 0f af c7 d9 27 91 7b 80 04 41 93
- Jun 27 16:56:38.219359: | 14 00 00 24 ca 78 22 43 0b 08 92 6c 71 af f1 28
- Jun 27 16:56:38.219380: | 55 c3 02 90 c8 60 ac bf ae 21 c1 58 9f f8 5d 2c
- Jun 27 16:56:38.219394: | 79 d1 cb 20 14 00 00 14 55 27 a7 51 79 5f a3 e2
- Jun 27 16:56:38.219406: | 4b 30 f9 e6 2c 5c 60 ce 00 00 00 14 6e 69 ca 60
- Jun 27 16:56:38.219419: | 61 e9 b1 f0 c6 d5 f6 3d cb 66 dd 61
- Jun 27 16:56:38.219490: | !event_already_set at reschedule
- Jun 27 16:56:38.219614: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
- Jun 27 16:56:38.219651: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1
- Jun 27 16:56:38.219678: | #1 STATE_MAIN_R2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4234.264
- Jun 27 16:56:38.219704: "xauth"[1] 192.168.1.138 #1: STATE_MAIN_R2: sent MR2, expecting MI3
- Jun 27 16:56:38.219725: | modecfg pull: quirk-poll policy:pull not-client
- Jun 27 16:56:38.219860: | phase 1 is done, looking for phase 2 to unpend
- Jun 27 16:56:38.219902: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:597)
- Jun 27 16:56:38.219924: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.219943: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.219971: | executing now-event sending helper answer for 1
- Jun 27 16:56:38.219990: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:38.220008: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:38.220029: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
- Jun 27 16:56:38.220047: | crypto helper 0 replies to request ID 2
- Jun 27 16:56:38.220175: | calling continuation function 0x555eab99de00
- Jun 27 16:56:38.220200: | main_inI2_outR2_calcdone for #1: calculate DH finished
- Jun 27 16:56:38.220222: | processing: [RE]START state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1152)
- Jun 27 16:56:38.220244: | processing: stop state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in main_inI2_outR2_continue2() at ikev1_main.c:1165)
- Jun 27 16:56:38.220263: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.220280: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.220299: | processing: STOP state #0 (in schedule_event_now_cb() at server.c:597)
- Jun 27 16:56:38.220317: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.220334: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.224552: | *received 60 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.224830: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.224975: | 05 10 02 01 00 00 00 00 00 00 00 3c 82 b9 14 59
- Jun 27 16:56:38.225004: | 84 83 42 da 41 74 17 04 86 a9 90 63 f5 5b c3 58
- Jun 27 16:56:38.225026: | f1 4c a6 45 1c cf cc 98 8e 21 c2 dd
- Jun 27 16:56:38.225048: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.225074: | **parse ISAKMP Message:
- Jun 27 16:56:38.225097: | initiator cookie:
- Jun 27 16:56:38.225118: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.225142: | responder cookie:
- Jun 27 16:56:38.225164: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.225396: | next payload type: ISAKMP_NEXT_ID (0x5)
- Jun 27 16:56:38.225431: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.225454: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
- Jun 27 16:56:38.225489: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.225513: | message ID: 00 00 00 00
- Jun 27 16:56:38.225536: | length: 60 (0x3c)
- Jun 27 16:56:38.225560: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
- Jun 27 16:56:38.225593: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.225621: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:38.225643: | v1 state object #1 found, in STATE_MAIN_R2
- Jun 27 16:56:38.225672: | processing: start state #1 connection "xauth"[1] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1117)
- Jun 27 16:56:38.225696: | #1 is idle
- Jun 27 16:56:38.225715: | #1 idle
- Jun 27 16:56:38.225790: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x120opt: 0x2080
- Jun 27 16:56:38.225928: | ***parse ISAKMP Identification Payload:
- Jun 27 16:56:38.225950: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.225964: | length: 8 (0x8)
- Jun 27 16:56:38.225989: | ID type: ID_FQDN (0x2)
- Jun 27 16:56:38.226002: | DOI specific A: 0 (0x0)
- Jun 27 16:56:38.226015: | DOI specific B: 0 (0x0)
- Jun 27 16:56:38.226028: | obj:
- Jun 27 16:56:38.226140: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x2080
- Jun 27 16:56:38.226174: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:38.226188: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.226212: | length: 20 (0x14)
- Jun 27 16:56:38.226226: | removing 4 bytes of padding
- Jun 27 16:56:38.226245: "xauth"[1] 192.168.1.138 #1: Peer ID is ID_FQDN: '@'
- Jun 27 16:56:38.226259: | X509: no CERT payloads to process
- Jun 27 16:56:38.226274: | refine_host_connection for IKEv1: starting with "xauth"[1] 192.168.1.138
- Jun 27 16:56:38.226289: | match_id a=@
- Jun 27 16:56:38.226384: | b=192.168.1.138
- Jun 27 16:56:38.226415: | results fail
- Jun 27 16:56:38.226432: | refine_host_connection: checking "xauth"[1] 192.168.1.138 against "xauth"[1] 192.168.1.138, best=(none) with match=0(id=0/ca=1/reqca=1)
- Jun 27 16:56:38.226446: | Warning: not switching back to template of current instance
- Jun 27 16:56:38.226459: | No IDr payload received from peer
- Jun 27 16:56:38.226472: | skipping because peer_id does not match
- Jun 27 16:56:38.226485: | refine going into 2nd loop allowing instantiated conns as well
- Jun 27 16:56:38.226499: | find_host_pair: comparing 192.168.1.137:500 to 192.168.1.138:500
- Jun 27 16:56:38.226513: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:38.226527: | match_id a=@
- Jun 27 16:56:38.226540: | b=(none)
- Jun 27 16:56:38.226645: | results matched
- Jun 27 16:56:38.226668: | refine_host_connection: checking "xauth"[1] 192.168.1.138 against "xauth-aggr", best=(none) with match=1(id=1/ca=1/reqca=1)
- Jun 27 16:56:38.226693: | Warning: not switching back to template of current instance
- Jun 27 16:56:38.226706: | No IDr payload received from peer
- Jun 27 16:56:38.226719: | match_id a=@
- Jun 27 16:56:38.226732: | b=(none)
- Jun 27 16:56:38.226746: | results matched
- Jun 27 16:56:38.226761: | refine_host_connection: checking "xauth"[1] 192.168.1.138 against "xauth", best=(none) with match=1(id=1/ca=1/reqca=1)
- Jun 27 16:56:38.226774: | Warning: not switching back to template of current instance
- Jun 27 16:56:38.226787: | No IDr payload received from peer
- Jun 27 16:56:38.226872: | refine_host_connection: checked xauth[1] 192.168.1.138 against xauth, now for see if best
- Jun 27 16:56:38.226895: | started looking for secret for 192.168.1.137->(none) of kind PKK_PSK
- Jun 27 16:56:38.226921: | replace him to 0.0.0.0
- Jun 27 16:56:38.226935: | actually looking for secret for 192.168.1.137->%any of kind PKK_PSK
- Jun 27 16:56:38.226950: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
- Jun 27 16:56:38.226964: | 1: compared key 192.168.1.137 to 192.168.1.137 / %any -> 8
- Jun 27 16:56:38.226978: | line 1: match=9
- Jun 27 16:56:38.227059: | best_match 0>9 best=0x555eacc30998 (line=1)
- Jun 27 16:56:38.227129: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
- Jun 27 16:56:38.227211: | refine_host_connection: picking new best "xauth" (wild=15, peer_pathlen=0/our=0)
- Jun 27 16:56:38.227231: | returning since no better match then original best_found
- Jun 27 16:56:38.227256: | offered CA: '%none'
- Jun 27 16:56:38.227271: "xauth"[1] 192.168.1.138 #1: switched from "xauth"[1] 192.168.1.138 to "xauth"
- Jun 27 16:56:38.227287: | match_id a=@
- Jun 27 16:56:38.227301: | b=(none)
- Jun 27 16:56:38.227430: | results matched
- Jun 27 16:56:38.227453: | reference addresspool of conn xauth[2] kind CK_TEMPLATE refcnt 3
- Jun 27 16:56:38.227469: | find_host_pair: comparing 192.168.1.137:500 to 0.0.0.0:500
- Jun 27 16:56:38.227483: | find_host_pair: comparing 192.168.1.137:500 to 192.168.1.138:500
- Jun 27 16:56:38.227497: | connect_to_host_pair: 192.168.1.137:500 192.168.1.138:500 -> hp:xauth
- Jun 27 16:56:38.227511: | rw_instantiate() instantiated "xauth"[2] 192.168.1.138 for 192.168.1.138
- Jun 27 16:56:38.227525: | start processing: connection NULL (in update_state_connection() at connections.c:4418)
- Jun 27 16:56:38.227539: | in connection_discard for connection xauth
- Jun 27 16:56:38.227551: | connection is instance
- Jun 27 16:56:38.227565: | not in pending use
- Jun 27 16:56:38.227577: | no states use this connection, deleting
- Jun 27 16:56:38.227592: | processing: start connection "xauth"[1] 192.168.1.138 (BACKGROUND) (in delete_connection() at connections.c:264)
- Jun 27 16:56:38.227613: "xauth"[2] 192.168.1.138 #1: deleting connection "xauth"[1] 192.168.1.138 instance with peer 192.168.1.138 {isakmp=#0/ipsec=#0}
- Jun 27 16:56:38.227701: | Deleting states for connection - not including other IPsec SA's
- Jun 27 16:56:38.227721: | pass 0
- Jun 27 16:56:38.227746: | state #1
- Jun 27 16:56:38.227759: | pass 1
- Jun 27 16:56:38.227771: | state #1
- Jun 27 16:56:38.227786: | unreference addresspool of conn xauth[1] kind CK_GOING_AWAY refcnt 4
- Jun 27 16:56:38.227800: | processing: stop connection "xauth" (BACKGROUND) (in delete_connection() at connections.c:314)
- Jun 27 16:56:38.227816: | retrying ike_decode_peer_id() with new conn
- Jun 27 16:56:38.227831: "xauth"[2] 192.168.1.138 #1: Peer ID is ID_FQDN: '@'
- Jun 27 16:56:38.227845: | X509: no CERT payloads to process
- Jun 27 16:56:38.227950: | refine_host_connection for IKEv1: starting with "xauth"[2] 192.168.1.138
- Jun 27 16:56:38.227972: | match_id a=@
- Jun 27 16:56:38.227986: | b=@
- Jun 27 16:56:38.228000: | results matched
- Jun 27 16:56:38.228016: | refine_host_connection: checking "xauth"[2] 192.168.1.138 against "xauth"[2] 192.168.1.138, best=(none) with match=1(id=1/ca=1/reqca=1)
- Jun 27 16:56:38.228031: | Warning: not switching back to template of current instance
- Jun 27 16:56:38.228044: | No IDr payload received from peer
- Jun 27 16:56:38.228060: | refine_host_connection: checked xauth[2] 192.168.1.138 against xauth[2] 192.168.1.138, now for see if best
- Jun 27 16:56:38.228076: | started looking for secret for 192.168.1.137->@ of kind PKK_PSK
- Jun 27 16:56:38.228091: | actually looking for secret for 192.168.1.137->@ of kind PKK_PSK
- Jun 27 16:56:38.228107: | line 1: key type PKK_PSK(192.168.1.137) to type PKK_PSK
- Jun 27 16:56:38.228192: | 1: compared key 192.168.1.137 to 192.168.1.137 / @ -> 8
- Jun 27 16:56:38.228225: | line 1: match=9
- Jun 27 16:56:38.228239: | best_match 0>9 best=0x555eacc30998 (line=1)
- Jun 27 16:56:38.228252: | concluding with best_match=9 best=0x555eacc30998 (lineno=1)
- Jun 27 16:56:38.228266: | returning because exact peer id match
- Jun 27 16:56:38.228280: | offered CA: '%none'
- Jun 27 16:56:38.228381: | thinking about whether to send my certificate:
- Jun 27 16:56:38.228540: | I have RSA key: OAKLEY_PRESHARED_KEY cert.type: 0??
- Jun 27 16:56:38.228564: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request
- Jun 27 16:56:38.228580: | so do not send cert.
- Jun 27 16:56:38.228671: | I did not send a certificate because digital signatures are not being used. (PSK)
- Jun 27 16:56:38.228733: | **emit ISAKMP Message:
- Jun 27 16:56:38.228818: | initiator cookie:
- Jun 27 16:56:38.228901: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.228922: | responder cookie:
- Jun 27 16:56:38.228937: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.228951: | next payload type: ISAKMP_NEXT_ID (0x5)
- Jun 27 16:56:38.228966: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.229056: | exchange type: ISAKMP_XCHG_IDPROT (0x2)
- Jun 27 16:56:38.229091: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.229109: | message ID: 00 00 00 00
- Jun 27 16:56:38.229125: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:38.229144: | ***emit ISAKMP Identification Payload (IPsec DOI):
- Jun 27 16:56:38.229158: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.229173: | ID type: ID_IPV4_ADDR (0x1)
- Jun 27 16:56:38.229337: | Protocol ID: 0 (0x0)
- Jun 27 16:56:38.229362: | port: 0 (0x0)
- Jun 27 16:56:38.229380: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
- Jun 27 16:56:38.229485: | my identity c0 a8 01 89
- Jun 27 16:56:38.229508: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12
- Jun 27 16:56:38.229627: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:38.229748: | next payload type: ISAKMP_NEXT_VID (0xd)
- Jun 27 16:56:38.229868: | emitting 16 raw bytes of HASH_R into ISAKMP Hash Payload
- Jun 27 16:56:38.229894: | HASH_R bd 17 50 ae 6e e2 09 c4 36 9a e1 3f 51 b5 5d 1e
- Jun 27 16:56:38.229927: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:38.229944: | out_vid(): sending [CAN-IKEv2]
- Jun 27 16:56:38.229959: | ***emit ISAKMP Vendor ID Payload:
- Jun 27 16:56:38.229974: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.229990: | emitting 5 raw bytes of V_ID into ISAKMP Vendor ID Payload
- Jun 27 16:56:38.230094: | V_ID 49 4b 45 76 32
- Jun 27 16:56:38.230117: | emitting length of ISAKMP Vendor ID Payload: 9
- Jun 27 16:56:38.230135: | encrypting: 08 00 00 0c 01 00 00 00 c0 a8 01 89 0d 00 00 14
- Jun 27 16:56:38.230149: | encrypting: bd 17 50 ae 6e e2 09 c4 36 9a e1 3f 51 b5 5d 1e
- Jun 27 16:56:38.230165: | encrypting: 00 00 00 09 49 4b 45 76 32
- Jun 27 16:56:38.230180: | IV: f5 5b c3 58 f1 4c a6 45 1c cf cc 98 8e 21 c2 dd
- Jun 27 16:56:38.230196: | emitting 7 zero bytes of encryption padding into ISAKMP Message
- Jun 27 16:56:38.230238: | no IKEv1 message padding required
- Jun 27 16:56:38.230346: | emitting length of ISAKMP Message: 76
- Jun 27 16:56:38.230370: | We are a server using PSK and clients are using a group ID
- Jun 27 16:56:38.230385: | complete v1 state transition with STF_OK
- Jun 27 16:56:38.230408: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:38.230424: | #1 is idle
- Jun 27 16:56:38.230439: | doing_xauth:yes, t_xauth_client_done:no
- Jun 27 16:56:38.230454: | IKEv1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Jun 27 16:56:38.230578: | parent state #1: STATE_MAIN_R2(open-ike) => STATE_MAIN_R3(established-authenticated-ike)
- Jun 27 16:56:38.230599: | ignore states: 0
- Jun 27 16:56:38.230612: | half-open-ike states: 0
- Jun 27 16:56:38.230625: | open-ike states: 0
- Jun 27 16:56:38.230638: | established-anonymous-ike states: 0
- Jun 27 16:56:38.230651: | established-authenticated-ike states: 1
- Jun 27 16:56:38.230664: | anonymous-ipsec states: 0
- Jun 27 16:56:38.230677: | authenticated-ipsec states: 0
- Jun 27 16:56:38.230690: | informational states: 0
- Jun 27 16:56:38.230703: | unknown states: 0
- Jun 27 16:56:38.230716: | category states: 1 count states: 1
- Jun 27 16:56:38.230730: | event_already_set, deleting event
- Jun 27 16:56:38.230743: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted
- Jun 27 16:56:38.230757: | #1 STATE_MAIN_R3: retransmits: cleared
- Jun 27 16:56:38.230774: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
- Jun 27 16:56:38.230868: | sending reply packet to 192.168.1.138:500 (from port 500)
- Jun 27 16:56:38.230901: | sending 76 bytes for STATE_MAIN_R2 through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:38.230924: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.230937: | 05 10 02 01 00 00 00 00 00 00 00 4c 7a 10 fe 4d
- Jun 27 16:56:38.230951: | c2 c4 6f eb 54 33 a9 50 ab d1 ac d5 71 3e fa 0b
- Jun 27 16:56:38.231058: | ac fa 70 a4 18 79 35 d1 48 14 57 c7 c7 9d f0 14
- Jun 27 16:56:38.231077: | ae 38 e1 98 2a ad 29 9c 8b 4d 39 24
- Jun 27 16:56:38.231148: | !event_already_set at reschedule
- Jun 27 16:56:38.231183: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc306e8
- Jun 27 16:56:38.231339: | inserting event EVENT_SA_REPLACE, timeout in 28530.000 seconds for #1
- Jun 27 16:56:38.231376: "xauth"[2] 192.168.1.138 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=md5 group=MODP2048}
- Jun 27 16:56:38.231406: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.231429: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:38.231453: | v1 state object #1 found, in STATE_MAIN_R3
- Jun 27 16:56:38.231538: | Dead Peer Detection (RFC 3706): enabled
- Jun 27 16:56:38.231563: | event_schedule: new EVENT_DPD-pe@0x555eacc32818
- Jun 27 16:56:38.231716: | inserting event EVENT_DPD, timeout in 10.000 seconds for #1
- Jun 27 16:56:38.231739: | XAUTH: Sending XAUTH Login/Password Request
- Jun 27 16:56:38.231754: | event_schedule: new EVENT_v1_SEND_XAUTH-pe@0x555eacc30858
- Jun 27 16:56:38.231775: | inserting event EVENT_v1_SEND_XAUTH, timeout in 0.080 seconds for #1
- Jun 27 16:56:38.231793: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.231810: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.231902: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.231921: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.231936: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:38.231966: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.231981: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.232060: | 08 10 05 01 ee 25 c9 80 00 00 00 4c ab 10 44 fb
- Jun 27 16:56:38.232088: | c8 ae 03 12 07 15 7d c7 9e 3d 81 bb 73 5d e4 30
- Jun 27 16:56:38.232102: | 58 38 0c e3 85 07 7f 48 33 2d 06 32 d2 a8 13 80
- Jun 27 16:56:38.232114: | e5 7f 36 0e c4 37 d8 0b 31 60 f0 fb
- Jun 27 16:56:38.232129: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.232143: | **parse ISAKMP Message:
- Jun 27 16:56:38.232157: | initiator cookie:
- Jun 27 16:56:38.232266: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.232286: | responder cookie:
- Jun 27 16:56:38.232300: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.232313: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.232327: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.232340: | exchange type: ISAKMP_XCHG_INFO (0x5)
- Jun 27 16:56:38.232354: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.232367: | message ID: ee 25 c9 80
- Jun 27 16:56:38.232380: | length: 76 (0x4c)
- Jun 27 16:56:38.232394: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
- Jun 27 16:56:38.232411: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.232425: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
- Jun 27 16:56:38.232536: | p15 state object #1 found, in STATE_MAIN_R3
- Jun 27 16:56:38.232558: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1137)
- Jun 27 16:56:38.232583: | #1 is idle
- Jun 27 16:56:38.232598: | #1 idle
- Jun 27 16:56:38.232621: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x0
- Jun 27 16:56:38.232637: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:38.232650: | next payload type: ISAKMP_NEXT_N (0xb)
- Jun 27 16:56:38.232663: | length: 20 (0x14)
- Jun 27 16:56:38.232677: | got payload 0x800 (ISAKMP_NEXT_N) needed: 0x0opt: 0x0
- Jun 27 16:56:38.232690: | ***parse ISAKMP Notification Payload:
- Jun 27 16:56:38.232772: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.232800: | length: 28 (0x1c)
- Jun 27 16:56:38.232815: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:38.232829: | protocol ID: 1 (0x1)
- Jun 27 16:56:38.232843: | SPI size: 16 (0x10)
- Jun 27 16:56:38.232857: | Notify Message Type: IPSEC_INITIAL_CONTACT (0x6002)
- Jun 27 16:56:38.232873: "xauth"[2] 192.168.1.138 #1: ignoring informational payload IPSEC_INITIAL_CONTACT, msgid=00000000, length=28
- Jun 27 16:56:38.232955: | ISAKMP Notification Payload
- Jun 27 16:56:38.232983: | 00 00 00 1c 00 00 00 01 01 10 60 02
- Jun 27 16:56:38.232997: | info: 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.233011: | processing informational IPSEC_INITIAL_CONTACT (24578)
- Jun 27 16:56:38.233026: "xauth"[2] 192.168.1.138 #1: received and ignored informational message
- Jun 27 16:56:38.233039: | complete v1 state transition with STF_IGNORE
- Jun 27 16:56:38.233054: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.233166: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.233191: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.233223: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.233239: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:38.306979: | timer_event_cb: processing event@0x555eacc30858
- Jun 27 16:56:38.307869: | handling event EVENT_v1_SEND_XAUTH for parent state #1
- Jun 27 16:56:38.308026: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in timer_event_cb() at timer.c:296)
- Jun 27 16:56:38.308101: | XAUTH: event EVENT_v1_SEND_XAUTH #1 STATE_MAIN_R3
- Jun 27 16:56:38.308177: "xauth"[2] 192.168.1.138 #1: XAUTH: Sending Username/Password request (MAIN_R3->XAUTH_R0)
- Jun 27 16:56:38.308271: | parent state #1: STATE_MAIN_R3(established-authenticated-ike) => STATE_XAUTH_R0(established-authenticated-ike)
- Jun 27 16:56:38.308340: | ignore states: 0
- Jun 27 16:56:38.308385: | half-open-ike states: 0
- Jun 27 16:56:38.308419: | open-ike states: 0
- Jun 27 16:56:38.308447: | established-anonymous-ike states: 0
- Jun 27 16:56:38.308466: | established-authenticated-ike states: 1
- Jun 27 16:56:38.308483: | anonymous-ipsec states: 0
- Jun 27 16:56:38.308506: | authenticated-ipsec states: 0
- Jun 27 16:56:38.308547: | informational states: 0
- Jun 27 16:56:38.308590: | unknown states: 0
- Jun 27 16:56:38.308910: | category states: 1 count states: 1
- Jun 27 16:56:38.308967: | **emit ISAKMP Message:
- Jun 27 16:56:38.309190: | initiator cookie:
- Jun 27 16:56:38.309453: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.309495: | responder cookie:
- Jun 27 16:56:38.309518: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.309542: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.309564: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.309587: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
- Jun 27 16:56:38.309608: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.309628: | message ID: 90 b4 ba eb
- Jun 27 16:56:38.309652: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:38.309673: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:38.309695: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
- Jun 27 16:56:38.309719: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
- Jun 27 16:56:38.309740: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:38.309761: | ***emit ISAKMP Mode Attribute:
- Jun 27 16:56:38.309783: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.309994: | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1)
- Jun 27 16:56:38.310029: | Identifier: 0 (0x0)
- Jun 27 16:56:38.310173: | ****emit ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.310337: | ModeCfg attr type: XAUTH-USER-NAME (0x4089)
- Jun 27 16:56:38.310371: | length/value: 0 (0x0)
- Jun 27 16:56:38.310391: | emitting length of ISAKMP ModeCfg attribute: 0
- Jun 27 16:56:38.310412: | ****emit ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.310432: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a)
- Jun 27 16:56:38.310450: | length/value: 0 (0x0)
- Jun 27 16:56:38.310468: | emitting length of ISAKMP ModeCfg attribute: 0
- Jun 27 16:56:38.310489: | no IKEv1 message padding required
- Jun 27 16:56:38.310509: | emitting length of ISAKMP Mode Attribute: 16
- Jun 27 16:56:38.310716: | XAUTH: HASH computed:
- Jun 27 16:56:38.310879: | ba 5c ec b2 6b d0 9d 07 1f e5 74 3e df 83 1f c8
- Jun 27 16:56:38.311095: | no IKEv1 message padding required
- Jun 27 16:56:38.311127: | emitting length of ISAKMP Message: 64
- Jun 27 16:56:38.311181: | encrypting: 0e 00 00 14 ba 5c ec b2 6b d0 9d 07 1f e5 74 3e
- Jun 27 16:56:38.311207: | encrypting: df 83 1f c8 00 00 00 10 01 00 00 00 40 89 00 00
- Jun 27 16:56:38.311225: | encrypting: 40 8a 00 00
- Jun 27 16:56:38.311399: | IV: 25 e2 d2 0a 55 4d 04 36 d2 6d 05 14 50 e7 2b 3f
- Jun 27 16:56:38.311494: | emitting 12 zero bytes of encryption padding into ISAKMP Message
- Jun 27 16:56:38.311571: | no IKEv1 message padding required
- Jun 27 16:56:38.311738: | emitting length of ISAKMP Message: 76
- Jun 27 16:56:38.311818: | sending 76 bytes for XAUTH: req through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:38.311838: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.311854: | 08 10 06 01 90 b4 ba eb 00 00 00 4c a7 bf 29 75
- Jun 27 16:56:38.311869: | ea 11 21 4f 9d 87 52 4a f3 81 36 5c 2f 47 c9 b1
- Jun 27 16:56:38.311887: | c9 ce 00 4a 0c af 50 89 1a 02 ac 7c e2 b3 32 d3
- Jun 27 16:56:38.311905: | a5 2f b1 ec c2 59 80 97 58 d0 ba 66
- Jun 27 16:56:38.312020: | state #1 requesting EVENT_SA_REPLACE to be deleted
- Jun 27 16:56:38.312140: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc306e8
- Jun 27 16:56:38.312330: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
- Jun 27 16:56:38.312364: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1
- Jun 27 16:56:38.312395: | #1 STATE_XAUTH_R0: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4234.357
- Jun 27 16:56:38.312421: | free_event_entry: release EVENT_v1_SEND_XAUTH-pe@0x555eacc30858
- Jun 27 16:56:38.312448: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in timer_event_cb() at timer.c:641)
- Jun 27 16:56:38.312551: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.312709: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.312961: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.312995: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.313026: | 08 10 06 01 90 b4 ba eb 00 00 00 4c 25 2b 00 7b
- Jun 27 16:56:38.313050: | 20 b3 89 66 36 8a 57 01 44 27 03 3a 8c c8 fa c8
- Jun 27 16:56:38.313071: | df 03 35 59 a8 93 59 4a 09 8f 41 6b 83 4a bf 81
- Jun 27 16:56:38.313086: | 17 7d 99 d6 ce 71 8a 25 e9 bb 60 bc
- Jun 27 16:56:38.313107: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.313127: | **parse ISAKMP Message:
- Jun 27 16:56:38.313144: | initiator cookie:
- Jun 27 16:56:38.313159: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.313175: | responder cookie:
- Jun 27 16:56:38.313190: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.313229: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.313359: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.313456: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
- Jun 27 16:56:38.313482: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.313498: | message ID: 90 b4 ba eb
- Jun 27 16:56:38.313514: | length: 76 (0x4c)
- Jun 27 16:56:38.313530: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6)
- Jun 27 16:56:38.313552: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.313571: | peer and cookies match on #1; msgid=90b4baeb st_msgid=00000000 st_msgid_phase15=90b4baeb
- Jun 27 16:56:38.313677: | p15 state object #1 found, in STATE_XAUTH_R0
- Jun 27 16:56:38.313712: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1475)
- Jun 27 16:56:38.313731: | #1 is idle
- Jun 27 16:56:38.313747: | #1 idle
- Jun 27 16:56:38.313808: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100opt: 0x2000
- Jun 27 16:56:38.313908: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:38.313932: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
- Jun 27 16:56:38.314016: | length: 20 (0x14)
- Jun 27 16:56:38.314036: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000opt: 0x2000
- Jun 27 16:56:38.314123: | ***parse ISAKMP Mode Attribute:
- Jun 27 16:56:38.314148: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.314163: | length: 26 (0x1a)
- Jun 27 16:56:38.314178: | Attr Msg Type: ISAKMP_CFG_REPLY (0x2)
- Jun 27 16:56:38.314194: | Identifier: 0 (0x0)
- Jun 27 16:56:38.314209: | removing 2 bytes of padding
- Jun 27 16:56:38.314319: | XAUTH: HASH computed:
- Jun 27 16:56:38.314415: | 24 46 6c ae 85 bc 39 4b c8 72 e6 15 68 88 c3 a6
- Jun 27 16:56:38.314568: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.314712: | ModeCfg attr type: 49288?? (0xc088)
- Jun 27 16:56:38.314804: | length/value: 0 (0x0)
- Jun 27 16:56:38.314913: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.314938: | ModeCfg attr type: XAUTH-USER-NAME (0x4089)
- Jun 27 16:56:38.314954: | length/value: 3 (0x3)
- Jun 27 16:56:38.314970: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.314986: | ModeCfg attr type: XAUTH-USER-PASSWORD (0x408a)
- Jun 27 16:56:38.315000: | length/value: 3 (0x3)
- Jun 27 16:56:38.315016: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted
- Jun 27 16:56:38.315033: | #1 STATE_XAUTH_R0: retransmits: cleared
- Jun 27 16:56:38.315052: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
- Jun 27 16:56:38.315151: | state #1 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:38.315186: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:38.315206: "xauth"[2] 192.168.1.138 #1: XAUTH: authentication method 'always ok' requested to authenticate user 'sss'
- Jun 27 16:56:38.315222: | scheduling now-event xauth immediate for #1
- Jun 27 16:56:38.315241: | complete v1 state transition with STF_SUSPEND
- Jun 27 16:56:38.315398: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2272)
- Jun 27 16:56:38.315437: | suspending state #1 and saving MD
- Jun 27 16:56:38.315453: | #1 is busy; has a suspended MD
- Jun 27 16:56:38.315471: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.315489: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.315518: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.315534: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.315550: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:38.315573: | executing now-event xauth immediate for 1
- Jun 27 16:56:38.315588: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:38.315691: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:38.315730: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
- Jun 27 16:56:38.315748: "xauth"[2] 192.168.1.138 #1: XAUTH: User sss: Authentication Successful
- Jun 27 16:56:38.315787: | **emit ISAKMP Message:
- Jun 27 16:56:38.315888: | initiator cookie:
- Jun 27 16:56:38.315924: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.315940: | responder cookie:
- Jun 27 16:56:38.315953: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.315967: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.315981: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.316009: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
- Jun 27 16:56:38.316023: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.316170: | message ID: a8 d2 b0 b2
- Jun 27 16:56:38.316195: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:38.316211: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:38.316226: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
- Jun 27 16:56:38.316241: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
- Jun 27 16:56:38.316255: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:38.316268: | ***emit ISAKMP Mode Attribute:
- Jun 27 16:56:38.316283: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.316297: | Attr Msg Type: ISAKMP_CFG_SET (0x3)
- Jun 27 16:56:38.316325: | Identifier: 0 (0x0)
- Jun 27 16:56:38.316339: | ****emit ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.316368: | ModeCfg attr type: 49295?? (0xc08f)
- Jun 27 16:56:38.316381: | length/value: 1 (0x1)
- Jun 27 16:56:38.316394: | no IKEv1 message padding required
- Jun 27 16:56:38.316408: | emitting length of ISAKMP Mode Attribute: 12
- Jun 27 16:56:38.316649: | XAUTH: HASH computed:
- Jun 27 16:56:38.316788: | 95 e0 81 61 ed df bb 02 6b ed 3e 06 98 e3 86 48
- Jun 27 16:56:38.316824: | no IKEv1 message padding required
- Jun 27 16:56:38.316840: | emitting length of ISAKMP Message: 60
- Jun 27 16:56:38.316868: | encrypting: 0e 00 00 14 95 e0 81 61 ed df bb 02 6b ed 3e 06
- Jun 27 16:56:38.316997: | encrypting: 98 e3 86 48 00 00 00 0c 03 00 00 00 c0 8f 00 01
- Jun 27 16:56:38.317019: | IV: 18 57 9f 56 c5 dc b8 3b 22 3c 40 2e 35 bf f7 48
- Jun 27 16:56:38.317053: | no IKEv1 message padding required
- Jun 27 16:56:38.317071: | emitting length of ISAKMP Message: 60
- Jun 27 16:56:38.317085: | state #1 requesting to delete non existing event
- Jun 27 16:56:38.317103: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
- Jun 27 16:56:38.317119: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1
- Jun 27 16:56:38.317260: | #1 STATE_XAUTH_R0: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4234.361
- Jun 27 16:56:38.317290: | sending 60 bytes for XAUTH: status through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:38.317306: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.317322: | 08 10 06 01 a8 d2 b0 b2 00 00 00 3c cb e2 f6 82
- Jun 27 16:56:38.317335: | b3 d1 e6 03 33 96 79 9b 40 3c 78 a3 ba ed fd 5e
- Jun 27 16:56:38.317349: | 07 45 b9 1a 8d db 81 db d5 4f 0f e4
- Jun 27 16:56:38.317442: | parent state #1: STATE_XAUTH_R0(established-authenticated-ike) => STATE_XAUTH_R1(established-authenticated-ike)
- Jun 27 16:56:38.317587: | ignore states: 0
- Jun 27 16:56:38.317693: | half-open-ike states: 0
- Jun 27 16:56:38.317719: | open-ike states: 0
- Jun 27 16:56:38.317736: | established-anonymous-ike states: 0
- Jun 27 16:56:38.317752: | established-authenticated-ike states: 1
- Jun 27 16:56:38.317876: | anonymous-ipsec states: 0
- Jun 27 16:56:38.317905: | authenticated-ipsec states: 0
- Jun 27 16:56:38.317922: | informational states: 0
- Jun 27 16:56:38.317938: | unknown states: 0
- Jun 27 16:56:38.317954: | category states: 1 count states: 1
- Jun 27 16:56:38.317978: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:597)
- Jun 27 16:56:38.317995: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.318168: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.318231: | *received 60 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.318368: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.318465: | 08 10 06 01 a8 d2 b0 b2 00 00 00 3c ec 5b 15 53
- Jun 27 16:56:38.318491: | 2f 92 d3 3a 40 63 31 d9 ac dc cb e5 9b 44 46 87
- Jun 27 16:56:38.318507: | f3 79 cc 48 c2 5d 5a 2d 41 33 ea 78
- Jun 27 16:56:38.318525: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.318643: | **parse ISAKMP Message:
- Jun 27 16:56:38.318671: | initiator cookie:
- Jun 27 16:56:38.318686: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.318701: | responder cookie:
- Jun 27 16:56:38.318717: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.318733: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.318750: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.318766: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
- Jun 27 16:56:38.318782: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.318798: | message ID: a8 d2 b0 b2
- Jun 27 16:56:38.318814: | length: 60 (0x3c)
- Jun 27 16:56:38.318926: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6)
- Jun 27 16:56:38.318962: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.318983: | peer and cookies match on #1; msgid=a8d2b0b2 st_msgid=00000000 st_msgid_phase15=a8d2b0b2
- Jun 27 16:56:38.318999: | p15 state object #1 found, in STATE_XAUTH_R1
- Jun 27 16:56:38.319020: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1475)
- Jun 27 16:56:38.319038: | #1 is idle
- Jun 27 16:56:38.319205: | #1 idle
- Jun 27 16:56:38.319273: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100opt: 0x2000
- Jun 27 16:56:38.319410: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:38.319443: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
- Jun 27 16:56:38.319461: | length: 20 (0x14)
- Jun 27 16:56:38.319477: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000opt: 0x2000
- Jun 27 16:56:38.319495: | ***parse ISAKMP Mode Attribute:
- Jun 27 16:56:38.319512: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.319620: | length: 8 (0x8)
- Jun 27 16:56:38.319709: | Attr Msg Type: ISAKMP_CFG_ACK (0x4)
- Jun 27 16:56:38.319732: | Identifier: 0 (0x0)
- Jun 27 16:56:38.319748: | removing 4 bytes of padding
- Jun 27 16:56:38.319768: "xauth"[2] 192.168.1.138 #1: XAUTH: xauth_inR1(STF_OK)
- Jun 27 16:56:38.319810: | modecfg server, pull mode. Starting new exchange.
- Jun 27 16:56:38.319976: | complete v1 state transition with STF_OK
- Jun 27 16:56:38.320010: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:38.320029: | #1 is idle
- Jun 27 16:56:38.320046: | doing_xauth:no, t_xauth_client_done:no
- Jun 27 16:56:38.320077: | IKEv1: transition from state STATE_XAUTH_R1 to state STATE_MAIN_R3
- Jun 27 16:56:38.320099: | parent state #1: STATE_XAUTH_R1(established-authenticated-ike) => STATE_MAIN_R3(established-authenticated-ike)
- Jun 27 16:56:38.320119: | ignore states: 0
- Jun 27 16:56:38.320135: | half-open-ike states: 0
- Jun 27 16:56:38.320151: | open-ike states: 0
- Jun 27 16:56:38.320167: | established-anonymous-ike states: 0
- Jun 27 16:56:38.320271: | established-authenticated-ike states: 1
- Jun 27 16:56:38.320361: | anonymous-ipsec states: 0
- Jun 27 16:56:38.320462: | authenticated-ipsec states: 0
- Jun 27 16:56:38.320489: | informational states: 0
- Jun 27 16:56:38.320505: | unknown states: 0
- Jun 27 16:56:38.320521: | category states: 1 count states: 1
- Jun 27 16:56:38.320537: | event_already_set, deleting event
- Jun 27 16:56:38.320556: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted
- Jun 27 16:56:38.320572: | #1 STATE_MAIN_R3: retransmits: cleared
- Jun 27 16:56:38.320595: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc306e8
- Jun 27 16:56:38.320707: | !event_already_set at reschedule
- Jun 27 16:56:38.320832: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc32118
- Jun 27 16:56:38.320854: | inserting event EVENT_SA_REPLACE, timeout in 28530.000 seconds for #1
- Jun 27 16:56:38.320874: "xauth"[2] 192.168.1.138 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=PRESHARED_KEY cipher=aes_256 integ=md5 group=MODP2048}
- Jun 27 16:56:38.320983: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.321077: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:38.321096: | v1 state object #1 found, in STATE_MAIN_R3
- Jun 27 16:56:38.321110: | Dead Peer Detection (RFC 3706): enabled
- Jun 27 16:56:38.321125: | modecfg pull: quirk-poll policy:pull not-client
- Jun 27 16:56:38.321138: | phase 1 is done, looking for phase 2 to unpend
- Jun 27 16:56:38.321154: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.321171: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.321186: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.321302: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.321333: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:38.321363: | *received 92 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:38.321378: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.321392: | 08 10 06 01 a6 82 1b e1 00 00 00 5c 4b 9e 8e 7d
- Jun 27 16:56:38.321405: | 32 d4 d8 9e ef d4 f0 6f d2 42 04 16 1f f6 5c e4
- Jun 27 16:56:38.321418: | 7e d2 d4 59 0f e2 94 43 3d 0b 90 d9 10 88 1c f0
- Jun 27 16:56:38.321440: | 2c 28 9a 20 5b 17 55 d9 d5 77 f9 60 4a ba 5a c8
- Jun 27 16:56:38.321454: | 83 8c f6 c2 c6 c8 fc cd 35 af 4d 86
- Jun 27 16:56:38.321469: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:38.321553: | **parse ISAKMP Message:
- Jun 27 16:56:38.321593: | initiator cookie:
- Jun 27 16:56:38.321607: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.321620: | responder cookie:
- Jun 27 16:56:38.321634: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.321647: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.321662: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.321675: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
- Jun 27 16:56:38.321822: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.321852: | message ID: a6 82 1b e1
- Jun 27 16:56:38.321866: | length: 92 (0x5c)
- Jun 27 16:56:38.321881: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_MODE_CFG (6)
- Jun 27 16:56:38.321898: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.321913: | peer and cookies match on #1; msgid=a6821be1 st_msgid=00000000 st_msgid_phase15=00000000
- Jun 27 16:56:38.321926: | p15 state object not found
- Jun 27 16:56:38.322006: | No appropriate Mode Config state yet. See if we have a Main Mode state
- Jun 27 16:56:38.322029: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.322044: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
- Jun 27 16:56:38.322067: | p15 state object #1 found, in STATE_MAIN_R3
- Jun 27 16:56:38.322083: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1337)
- Jun 27 16:56:38.322097: | processing received isakmp_xchg_type ISAKMP_XCHG_MODE_CFG.
- Jun 27 16:56:38.322211: | this is a xauthserver modecfgserver
- Jun 27 16:56:38.322232: | call init_phase2_iv
- Jun 27 16:56:38.322262: | set from_state to STATE_MAIN_R3 this is modecfgserver and IS_PHASE1() is TRUE
- Jun 27 16:56:38.322342: | #1 is idle
- Jun 27 16:56:38.322362: | #1 idle
- Jun 27 16:56:38.322395: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x4100opt: 0x2000
- Jun 27 16:56:38.322491: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:38.322513: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
- Jun 27 16:56:38.322528: | length: 20 (0x14)
- Jun 27 16:56:38.322543: | got payload 0x4000 (ISAKMP_NEXT_MODECFG) needed: 0x4000opt: 0x2000
- Jun 27 16:56:38.322557: | ***parse ISAKMP Mode Attribute:
- Jun 27 16:56:38.322572: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.322586: | length: 32 (0x20)
- Jun 27 16:56:38.322599: | Attr Msg Type: ISAKMP_CFG_REQUEST (0x1)
- Jun 27 16:56:38.322613: | Identifier: 0 (0x0)
- Jun 27 16:56:38.322627: | removing 12 bytes of padding
- Jun 27 16:56:38.322756: | **emit ISAKMP Message:
- Jun 27 16:56:38.322779: | initiator cookie:
- Jun 27 16:56:38.322794: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:38.322808: | responder cookie:
- Jun 27 16:56:38.322900: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.322924: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:38.322944: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:38.322962: | exchange type: ISAKMP_XCHG_MODE_CFG (0x6)
- Jun 27 16:56:38.322979: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:38.322995: | message ID: a6 82 1b e1
- Jun 27 16:56:38.323012: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:38.323031: | arrived in modecfg_inR0
- Jun 27 16:56:38.323227: | XAUTH: HASH computed:
- Jun 27 16:56:38.323356: | 6f 9f 2f 3a 0c c4 47 3e 8d 72 dc 3d 35 fb 40 e3
- Jun 27 16:56:38.323394: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.323410: | ModeCfg attr type: INTERNAL_IP4_ADDRESS (0x1)
- Jun 27 16:56:38.323423: | length/value: 0 (0x0)
- Jun 27 16:56:38.323437: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.323538: | ModeCfg attr type: INTERNAL_ADDRESS_EXPIRY (0x5)
- Jun 27 16:56:38.323569: | length/value: 0 (0x0)
- Jun 27 16:56:38.323584: | Unsupported modecfg (CFG_REQUEST) long attribute INTERNAL_ADDRESS_EXPIRY received.
- Jun 27 16:56:38.323598: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.323612: | ModeCfg attr type: INTERNAL_IP4_NETMASK (0x2)
- Jun 27 16:56:38.323626: | length/value: 0 (0x0)
- Jun 27 16:56:38.323639: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.323653: | ModeCfg attr type: INTERNAL_IP4_DNS (0x3)
- Jun 27 16:56:38.323666: | length/value: 0 (0x0)
- Jun 27 16:56:38.323768: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.323799: | ModeCfg attr type: INTERNAL_IP4_NBNS (0x4)
- Jun 27 16:56:38.323814: | length/value: 0 (0x0)
- Jun 27 16:56:38.323828: | ****parse ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.323880: | ModeCfg attr type: INTERNAL_IP4_SUBNET (0xd)
- Jun 27 16:56:38.323895: | length/value: 0 (0x0)
- Jun 27 16:56:38.323913: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:38.323929: | next payload type: ISAKMP_NEXT_MODECFG (0xe)
- Jun 27 16:56:38.323947: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
- Jun 27 16:56:38.323963: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:38.323988: | ***emit ISAKMP Mode Attribute:
- Jun 27 16:56:38.324098: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:38.324142: | Attr Msg Type: ISAKMP_CFG_REPLY (0x2)
- Jun 27 16:56:38.324165: | Identifier: 0 (0x0)
- Jun 27 16:56:38.324192: | request lease from addresspool 192.168.20.2-192.168.20.10 reference count 3 thatid '@' that.client.addr 192.168.1.138
- Jun 27 16:56:38.324211: | New lease from addresspool index 0
- Jun 27 16:56:38.324325: | new lease 192.168.20.2 from addresspool 192.168.20.2-192.168.20.10 to that.client.addr 192.168.1.138 thatid '@'
- Jun 27 16:56:38.324417: | ****emit ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.324452: | ModeCfg attr type: INTERNAL_IP4_ADDRESS (0x1)
- Jun 27 16:56:38.324469: | emitting 4 raw bytes of IP4_addr into ISAKMP ModeCfg attribute
- Jun 27 16:56:38.324484: | IP4_addr c0 a8 14 02
- Jun 27 16:56:38.324498: | emitting length of ISAKMP ModeCfg attribute: 4
- Jun 27 16:56:38.324576: | ****emit ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.324602: | ModeCfg attr type: INTERNAL_IP4_NETMASK (0x2)
- Jun 27 16:56:38.324619: | emitting 4 raw bytes of IP4_submsk into ISAKMP ModeCfg attribute
- Jun 27 16:56:38.324634: | IP4_submsk 00 00 00 00
- Jun 27 16:56:38.324648: | emitting length of ISAKMP ModeCfg attribute: 4
- Jun 27 16:56:38.324662: | ****emit ISAKMP ModeCfg attribute:
- Jun 27 16:56:38.324678: | ModeCfg attr type: INTERNAL_IP4_SUBNET (0xd)
- Jun 27 16:56:38.324693: | emitting 4 raw bytes of IP4_subnet into ISAKMP ModeCfg attribute
- Jun 27 16:56:38.324773: | IP4_subnet 00 00 00 00
- Jun 27 16:56:38.324848: | emitting 4 raw bytes of IP4_submsk into ISAKMP ModeCfg attribute
- Jun 27 16:56:38.324868: | IP4_submsk 00 00 00 00
- Jun 27 16:56:38.324882: | emitting length of ISAKMP ModeCfg attribute: 8
- Jun 27 16:56:38.324896: | We are not sending a domain
- Jun 27 16:56:38.324920: | We are not sending a banner
- Jun 27 16:56:38.325002: | We are 0.0.0.0/0 so not sending CISCO_SPLIT_INC
- Jun 27 16:56:38.325022: | no IKEv1 message padding required
- Jun 27 16:56:38.325049: | emitting length of ISAKMP Mode Attribute: 36
- Jun 27 16:56:38.325119: | XAUTH: HASH computed:
- Jun 27 16:56:38.325224: | a5 b5 94 a0 f8 5d 7f ee 2b d8 44 66 d6 c2 26 c7
- Jun 27 16:56:38.325344: | no IKEv1 message padding required
- Jun 27 16:56:38.325364: | emitting length of ISAKMP Message: 84
- Jun 27 16:56:38.325379: | encrypting: 0e 00 00 14 a5 b5 94 a0 f8 5d 7f ee 2b d8 44 66
- Jun 27 16:56:38.325393: | encrypting: d6 c2 26 c7 00 00 00 24 02 00 00 00 00 01 00 04
- Jun 27 16:56:38.325407: | encrypting: c0 a8 14 02 00 02 00 04 00 00 00 00 00 0d 00 08
- Jun 27 16:56:38.325421: | encrypting: 00 00 00 00 00 00 00 00
- Jun 27 16:56:38.325532: | IV: 4a ba 5a c8 83 8c f6 c2 c6 c8 fc cd 35 af 4d 86
- Jun 27 16:56:38.325554: | emitting 8 zero bytes of encryption padding into ISAKMP Message
- Jun 27 16:56:38.325666: | no IKEv1 message padding required
- Jun 27 16:56:38.325688: | emitting length of ISAKMP Message: 92
- Jun 27 16:56:38.325800: "xauth"[2] 192.168.1.138 #1: modecfg_inR0(STF_OK)
- Jun 27 16:56:38.325881: | complete v1 state transition with STF_OK
- Jun 27 16:56:38.325904: | processing: [RE]START state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:38.325919: | #1 is idle
- Jun 27 16:56:38.325934: | doing_xauth:no, t_xauth_client_done:no
- Jun 27 16:56:38.325948: | IKEv1: transition from state STATE_MODE_CFG_R0 to state STATE_MODE_CFG_R1
- Jun 27 16:56:38.325963: | parent state #1: STATE_MAIN_R3(established-authenticated-ike) => STATE_MODE_CFG_R1(established-authenticated-ike)
- Jun 27 16:56:38.326055: | ignore states: 0
- Jun 27 16:56:38.326077: | half-open-ike states: 0
- Jun 27 16:56:38.326091: | open-ike states: 0
- Jun 27 16:56:38.326104: | established-anonymous-ike states: 0
- Jun 27 16:56:38.326118: | established-authenticated-ike states: 1
- Jun 27 16:56:38.326131: | anonymous-ipsec states: 0
- Jun 27 16:56:38.326145: | authenticated-ipsec states: 0
- Jun 27 16:56:38.326160: | informational states: 0
- Jun 27 16:56:38.326174: | unknown states: 0
- Jun 27 16:56:38.326188: | category states: 1 count states: 1
- Jun 27 16:56:38.326274: | event_already_set, deleting event
- Jun 27 16:56:38.326295: | state #1 requesting EVENT_SA_REPLACE to be deleted
- Jun 27 16:56:38.326314: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc32118
- Jun 27 16:56:38.326332: | sending reply packet to 192.168.1.138:500 (from port 500)
- Jun 27 16:56:38.326351: | sending 92 bytes for STATE_MODE_CFG_R0 through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:38.326366: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:38.326380: | 08 10 06 01 a6 82 1b e1 00 00 00 5c 1b eb 4d 05
- Jun 27 16:56:38.326490: | 65 ff 6e 20 05 2e 9c e5 ad a5 28 96 97 39 dc ff
- Jun 27 16:56:38.326513: | 11 d2 d6 09 00 c5 54 0b 95 d3 8f 89 dc 1e a1 40
- Jun 27 16:56:38.326527: | 8c f3 35 3e 18 49 34 b4 24 66 b7 ac 7a d2 fa af
- Jun 27 16:56:38.326540: | ba 30 00 cc 69 cf 76 09 ca f7 6e 35
- Jun 27 16:56:38.326611: | !event_already_set at reschedule
- Jun 27 16:56:38.326703: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc30858
- Jun 27 16:56:38.326725: | inserting event EVENT_SA_REPLACE, timeout in 28530.000 seconds for #1
- Jun 27 16:56:38.326747: "xauth"[2] 192.168.1.138 #1: STATE_MODE_CFG_R1: ModeCfg Set sent, expecting Ack {auth=PRESHARED_KEY cipher=aes_256 integ=md5 group=MODP2048}
- Jun 27 16:56:38.326768: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:38.326784: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:38.326882: | v1 state object #1 found, in STATE_MODE_CFG_R1
- Jun 27 16:56:38.326974: | Dead Peer Detection (RFC 3706): enabled
- Jun 27 16:56:38.327001: | modecfg pull: quirk-poll policy:pull not-client
- Jun 27 16:56:38.327016: | phase 1 is done, looking for phase 2 to unpend
- Jun 27 16:56:38.327041: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:38.327064: | processing: stop state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:38.327164: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.327190: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:38.327208: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:42.826433: | *received 1516 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:42.826499: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:42.826514: | 08 10 20 01 1f 5a 13 82 00 00 05 ec 02 f4 d5 65
- Jun 27 16:56:42.826527: | eb a3 8c bb 2a 7f ec f7 ef ba 90 e9 f0 87 12 28
- Jun 27 16:56:42.826540: | 22 78 c7 ff a5 c8 64 14 50 ee 0b c5 c7 da 1b a0
- Jun 27 16:56:42.826553: | 34 dd ac 7c 54 90 b7 5b 35 f2 68 2d 3f b5 a9 7f
- Jun 27 16:56:42.826696: | 10 b8 72 96 30 c1 3e e1 eb 01 95 80 8e 24 80 60
- Jun 27 16:56:42.826718: | 5d bc 99 2e 21 6e e5 85 72 df f5 0e f3 53 6b 8d
- Jun 27 16:56:42.826731: | ff 8b e9 4a c7 9b 7c 1d 57 91 03 39 60 1f 68 5a
- Jun 27 16:56:42.826745: | 7c 90 24 39 35 86 8e 3e 82 ab d0 f5 42 81 21 da
- Jun 27 16:56:42.826758: | 38 03 a1 c3 cf 5c ba 86 c0 f5 d9 36 3b 40 06 b6
- Jun 27 16:56:42.826781: | 7d bb 57 e2 58 27 97 af 90 bf d9 81 eb 14 e5 7c
- Jun 27 16:56:42.826794: | 24 52 0e 91 74 e1 dd 9f 6d bb 51 63 50 41 2e fc
- Jun 27 16:56:42.826807: | de 3d 5b 7b 97 55 b3 e0 a5 62 2e dc b4 94 20 42
- Jun 27 16:56:42.826820: | e9 4e 23 8f db 26 5e 6c da de 9e 3f 10 6e 5d 6a
- Jun 27 16:56:42.826833: | a8 b7 06 73 dd 3a e9 c6 60 2f 26 8a b1 c8 0f 75
- Jun 27 16:56:42.826846: | 47 1a 84 30 80 4b 20 f7 5c 83 9e fc 39 ad dc f1
- Jun 27 16:56:42.826859: | 04 75 0a aa e6 21 64 d9 f8 c1 24 59 f2 51 cb 44
- Jun 27 16:56:42.826882: | 9c 4f d1 f9 cd 3c 29 5d 8a 42 41 b3 40 42 c3 0e
- Jun 27 16:56:42.826905: | 88 cf bc a1 fc 6a e7 e4 60 5e 16 3d 54 5b 0b 04
- Jun 27 16:56:42.826918: | 65 c8 30 cb 99 b5 e3 5d 1b dd ec 43 98 c4 83 d2
- Jun 27 16:56:42.826931: | df 6f de 31 d6 ab 2b c8 ed ad 9a ea 0c 9f d8 9f
- Jun 27 16:56:42.826945: | f8 9e 3f c6 65 a0 a0 b8 d3 32 17 d5 20 c1 fa 5d
- Jun 27 16:56:42.827066: | 33 ce bb 9b 74 03 f4 86 60 14 5c ad 78 2e c3 1b
- Jun 27 16:56:42.827088: | c6 04 cd fc 4b de 8b 88 36 d4 6b 43 26 cd 59 62
- Jun 27 16:56:42.827102: | 84 39 d2 28 e7 27 9f e7 5b 79 b6 59 cf 10 8e 54
- Jun 27 16:56:42.827124: | bc 5c fc 97 26 31 88 ae e0 ff 42 84 9b 15 9f 95
- Jun 27 16:56:42.827137: | 47 ab a8 1b 7b 19 22 6d 14 ba e3 49 08 a7 f3 a7
- Jun 27 16:56:42.827150: | f3 6f 4f 3d 3a 81 64 15 9d c9 26 f0 37 1f ff 3b
- Jun 27 16:56:42.827163: | 5a 92 0f b4 33 7c b9 a3 68 96 68 cb 76 65 af c2
- Jun 27 16:56:42.827176: | c4 9c f7 22 df 4f aa 7e 47 73 b8 3c 2e 1f b5 27
- Jun 27 16:56:42.827189: | fb 71 35 1a 0f 88 86 17 3e d7 49 27 1b 9b dc 2b
- Jun 27 16:56:42.827202: | 5c ee 3b ba a2 c0 81 02 ca bc 2f ff 83 51 59 d2
- Jun 27 16:56:42.827215: | 59 bb af 02 d3 79 a5 97 82 dd 86 6e 60 86 04 69
- Jun 27 16:56:42.827228: | f6 23 e3 31 90 c1 f5 50 cf 81 b4 0f f1 dc 30 fa
- Jun 27 16:56:42.827241: | 10 00 9c 0b 58 6c a5 98 e5 ec 34 cf e7 56 60 ea
- Jun 27 16:56:42.827254: | 9c 81 3f 89 d1 7d 2e 15 a6 b3 9c 33 f5 ea c2 ef
- Jun 27 16:56:42.827378: | 79 7f a9 ed 56 66 98 f2 e9 7d b0 56 95 12 aa 49
- Jun 27 16:56:42.827399: | 40 7a be bb 7a 61 6f 0e a1 61 21 eb 4d 7e 52 0c
- Jun 27 16:56:42.827430: | a8 07 0c cd 26 dc a0 d0 75 fd 6c 5d af d0 f5 f7
- Jun 27 16:56:42.827450: | 94 14 d4 05 bf ee 1f 77 ef 47 52 e0 1b 23 42 10
- Jun 27 16:56:42.827470: | df 97 f8 eb 42 aa 1f 6f c3 47 15 1a 3e 08 67 89
- Jun 27 16:56:42.827488: | 3f 5f 1c 60 8a f6 57 9f fd 3c b3 76 aa e7 6f aa
- Jun 27 16:56:42.827501: | 7b cf 6a 9d 73 f1 a2 ee 4c ed 70 cc 67 aa 89 fd
- Jun 27 16:56:42.827514: | 67 f3 e0 cc e2 03 7a f1 56 56 1e 4a 61 e1 e2 f6
- Jun 27 16:56:42.827526: | a8 7f 2e f1 ce 23 e6 46 42 68 e3 4f 12 fd cb f0
- Jun 27 16:56:42.827539: | 9d 8b cb bf 1c 68 4b 1c 8c 39 c4 53 13 f5 c7 d3
- Jun 27 16:56:42.827648: | d0 ca 9f d5 f7 ad ce 92 6b 7f 64 21 0b bc d1 3c
- Jun 27 16:56:42.827669: | 11 ee d8 6d ed 55 42 ec a6 b3 d6 99 da 47 e5 5d
- Jun 27 16:56:42.827693: | 39 7f e4 45 f4 c9 36 dd 11 c6 6b ff e0 0b 1a 14
- Jun 27 16:56:42.827706: | 22 30 3b b5 45 0f 2e ed 8c ec 45 51 da f9 4d 14
- Jun 27 16:56:42.827719: | 6c c7 c5 40 a5 c4 05 3d dc 79 8e 5d e7 ab 54 da
- Jun 27 16:56:42.827732: | c1 80 d5 df 6d d2 e9 91 58 b3 37 e6 8c e5 51 c8
- Jun 27 16:56:42.827745: | d6 57 96 67 e4 75 02 bc bd 5b 55 db d9 ca 93 86
- Jun 27 16:56:42.827758: | 3b e4 c6 6d 50 53 6e 5f b0 43 5b ad 0d da d7 fa
- Jun 27 16:56:42.827771: | c1 d9 f1 a9 76 0e 08 77 b4 aa 38 38 59 5f bd fa
- Jun 27 16:56:42.827784: | ce 5c 51 dd 70 a3 39 8d c4 5f d2 d6 ab 49 12 df
- Jun 27 16:56:42.827797: | 2d dd a0 f6 bc c4 cd c9 fe 86 bf be 51 85 a1 bf
- Jun 27 16:56:42.827816: | 59 5a 12 a9 60 e0 9c 39 99 69 4f 68 22 05 d0 68
- Jun 27 16:56:42.827830: | 47 32 a7 aa 90 56 b2 54 8c fd f4 fa f2 12 4c 07
- Jun 27 16:56:42.827913: | 90 25 a3 f1 31 b5 50 03 68 42 8b 37 74 ff 4c 06
- Jun 27 16:56:42.827933: | a1 1f 2e bb 27 5f 1d d6 45 dc 69 7c 8b f8 c1 90
- Jun 27 16:56:42.827956: | c9 e9 14 37 c9 81 4f b9 0f bc 1a 71 19 f9 ca 59
- Jun 27 16:56:42.827970: | d2 d2 6b 1a 02 66 ac 30 f6 89 09 be bf 28 03 c2
- Jun 27 16:56:42.827984: | 82 6f d5 04 02 4f 72 92 66 f9 eb b9 63 45 2c e9
- Jun 27 16:56:42.827997: | ee fc d7 50 99 ea 6a 08 ea 5d 28 ba 76 d6 96 23
- Jun 27 16:56:42.828011: | 85 8e 2a e8 78 07 54 3c 25 00 c9 20 14 40 06 d5
- Jun 27 16:56:42.828024: | 6d 03 48 18 9a 60 b6 6a 29 78 11 1e b5 da d1 62
- Jun 27 16:56:42.828038: | 7a 82 8e 13 f7 89 c0 4e 37 e2 19 20 b5 92 26 5d
- Jun 27 16:56:42.828150: | 06 7b 57 32 05 27 8f 08 bc c3 b7 64 1f 2d 84 c5
- Jun 27 16:56:42.828172: | c8 f4 e7 02 c1 fc 26 38 16 ea 72 56 e2 fc a3 4b
- Jun 27 16:56:42.828186: | 25 ae 5c 0e 66 e7 88 87 99 11 b0 22 b7 dc 15 34
- Jun 27 16:56:42.828204: | ea 67 2d bf 55 e2 bb 20 ba 01 c5 71 51 31 c7 72
- Jun 27 16:56:42.828237: | ec 60 48 15 25 e6 b7 1a 43 75 24 67 c6 ec ba 40
- Jun 27 16:56:42.828255: | 6d d5 ef 70 b3 bf 36 d7 01 8c 98 a5 f5 d2 0b de
- Jun 27 16:56:42.828275: | 52 e4 6c 1e 57 eb 82 6e 64 8a ca dc 0b c5 fb 9c
- Jun 27 16:56:42.828289: | 1c fd 1b 38 87 37 68 a2 91 1b 5a 05 00 66 e5 24
- Jun 27 16:56:42.828302: | 4e db 8f 12 f1 a3 44 a6 69 73 e7 14 72 6e 67 c4
- Jun 27 16:56:42.828315: | bc 42 75 05 c4 58 08 70 54 dc f9 4b 5b 6c 46 a2
- Jun 27 16:56:42.828401: | d0 6a b2 b4 7b ad 50 37 f0 51 51 98 56 f9 1c 2a
- Jun 27 16:56:42.828421: | 31 85 b0 04 68 e5 bc c9 e8 30 e5 bb f6 57 76 3a
- Jun 27 16:56:42.828444: | 7f 09 ce 5d 98 b4 99 d1 ab 4c cd 8a 5f d6 64 b4
- Jun 27 16:56:42.828457: | 37 95 b3 84 6c b4 08 64 93 5c 87 ca 73 7d 92 56
- Jun 27 16:56:42.828470: | 85 3e ab 8c 61 8a f3 af ee 29 38 3a a5 b1 07 f0
- Jun 27 16:56:42.828483: | 3d 3d 2e 96 ff f8 de 1d 2c 0d 63 d8 02 ef 48 2e
- Jun 27 16:56:42.828496: | 05 17 56 1d 0d a4 e6 bc 32 f7 23 55 69 83 34 49
- Jun 27 16:56:42.828508: | b9 eb 1b 48 67 74 e2 36 ab 98 7c 18 77 05 04 39
- Jun 27 16:56:42.828521: | 0c b2 4d f7 38 21 8a d9 88 6c 8d f3 0a 8d d8 80
- Jun 27 16:56:42.828535: | 6f 9b 7b 07 e4 58 a5 2c 2b 22 34 3a 5c 4b d9 6a
- Jun 27 16:56:42.828640: | 1a 70 04 36 9c a5 66 7c f8 14 36 f3 6a 27 23 85
- Jun 27 16:56:42.828660: | db 21 57 28 35 41 be ad 21 db 27 fc d2 e0 a7 64
- Jun 27 16:56:42.828674: | e7 5d 9b 5e 20 c6 dc 1b b3 90 c2 ea 78 57 c1 45
- Jun 27 16:56:42.828688: | d6 ab 41 3a 5d 98 3b 7c 72 8f e7 64 f7 af 9b e0
- Jun 27 16:56:42.828701: | a7 5a 74 d3 2a 34 e9 ca 42 d7 78 11 33 44 f8 70
- Jun 27 16:56:42.828714: | 76 68 a5 41 7b cf 5e 75 96 bd a7 a0 92 c6 f0 2b
- Jun 27 16:56:42.828736: | 31 0a 66 9b f1 5e cd 48 d1 1b 16 91
- Jun 27 16:56:42.828754: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:42.828770: | **parse ISAKMP Message:
- Jun 27 16:56:42.828785: | initiator cookie:
- Jun 27 16:56:42.828798: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:42.828890: | responder cookie:
- Jun 27 16:56:42.828911: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:42.828934: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:42.828948: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:42.828962: | exchange type: ISAKMP_XCHG_QUICK (0x20)
- Jun 27 16:56:42.828976: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:42.828989: | message ID: 1f 5a 13 82
- Jun 27 16:56:42.829003: | length: 1516 (0x5ec)
- Jun 27 16:56:42.829017: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
- Jun 27 16:56:42.829036: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:42.829211: | v1 peer and cookies match on #1, provided msgid 1f5a1382 == 00000000
- Jun 27 16:56:42.829308: | v1 state object not found
- Jun 27 16:56:42.829333: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:42.829357: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:42.829371: | v1 state object #1 found, in STATE_MODE_CFG_R1
- Jun 27 16:56:42.829389: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1265)
- Jun 27 16:56:42.829428: | #1 is idle
- Jun 27 16:56:42.829551: | #1 idle
- Jun 27 16:56:42.829601: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502opt: 0x200030
- Jun 27 16:56:42.829619: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:42.829633: | next payload type: ISAKMP_NEXT_SA (0x1)
- Jun 27 16:56:42.829647: | length: 20 (0x14)
- Jun 27 16:56:42.829660: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402opt: 0x200030
- Jun 27 16:56:42.829674: | ***parse ISAKMP Security Association Payload:
- Jun 27 16:56:42.829688: | next payload type: ISAKMP_NEXT_NONCE (0xa)
- Jun 27 16:56:42.829702: | length: 1404 (0x57c)
- Jun 27 16:56:42.829785: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:42.829806: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x200030
- Jun 27 16:56:42.829821: | ***parse ISAKMP Nonce Payload:
- Jun 27 16:56:42.829844: | next payload type: ISAKMP_NEXT_ID (0x5)
- Jun 27 16:56:42.829857: | length: 24 (0x18)
- Jun 27 16:56:42.829871: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0opt: 0x200030
- Jun 27 16:56:42.829885: | ***parse ISAKMP Identification Payload (IPsec DOI):
- Jun 27 16:56:42.829988: | next payload type: ISAKMP_NEXT_ID (0x5)
- Jun 27 16:56:42.830017: | length: 12 (0xc)
- Jun 27 16:56:42.830031: | ID type: ID_IPV4_ADDR (0x1)
- Jun 27 16:56:42.830044: | Protocol ID: 0 (0x0)
- Jun 27 16:56:42.830057: | port: 0 (0x0)
- Jun 27 16:56:42.830071: | obj: c0 a8 14 02
- Jun 27 16:56:42.830085: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0opt: 0x200030
- Jun 27 16:56:42.830098: | ***parse ISAKMP Identification Payload (IPsec DOI):
- Jun 27 16:56:42.830112: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:42.830125: | length: 16 (0x10)
- Jun 27 16:56:42.830138: | ID type: ID_IPV4_ADDR_SUBNET (0x4)
- Jun 27 16:56:42.830220: | Protocol ID: 0 (0x0)
- Jun 27 16:56:42.830240: | port: 0 (0x0)
- Jun 27 16:56:42.830254: | obj: 00 00 00 00 00 00 00 00
- Jun 27 16:56:42.830277: | removing 12 bytes of padding
- Jun 27 16:56:42.830344: | peer client is 192.168.20.2
- Jun 27 16:56:42.830454: | peer client protocol/port is 0/0
- Jun 27 16:56:42.830477: | our client is subnet 0.0.0.0/0
- Jun 27 16:56:42.830492: | our client protocol/port is 0/0
- Jun 27 16:56:42.830508: "xauth"[2] 192.168.1.138 #1: the peer proposed: 0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0
- Jun 27 16:56:42.830524: | find_client_connection starting with xauth
- Jun 27 16:56:42.830538: | looking for 0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0
- Jun 27 16:56:42.830611: | concrete checking against sr#0 0.0.0.0/0 -> 192.168.20.2/32
- Jun 27 16:56:42.830644: | match_id a=@
- Jun 27 16:56:42.830658: | b=@
- Jun 27 16:56:42.830671: | results matched
- Jun 27 16:56:42.830686: | fc_try trying xauth:0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0 vs xauth:0.0.0.0/0:0/0 -> 192.168.20.2/32:0/0
- Jun 27 16:56:42.830701: | fc_try concluding with xauth [129]
- Jun 27 16:56:42.830714: | fc_try xauth gives xauth
- Jun 27 16:56:42.830817: | concluding with d = xauth
- Jun 27 16:56:42.830839: | client wildcard: no port wildcard: no virtual: no
- Jun 27 16:56:42.830856: | creating state object #2 at 0x555eacc34e38
- Jun 27 16:56:42.830871: | parent state #2: new => STATE_UNDEFINED(ignore)
- Jun 27 16:56:42.830886: | duplicating state object #1 "xauth"[2] 192.168.1.138 as #2 for IPSEC SA
- Jun 27 16:56:42.830904: | processing: suspend state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1399)
- Jun 27 16:56:42.830920: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in quick_inI1_outR1_tail() at ikev1_quick.c:1399)
- Jun 27 16:56:42.830943: | child state #2: STATE_UNDEFINED(ignore) => STATE_QUICK_R0(authenticated-ipsec)
- Jun 27 16:56:42.830957: | ignore states: 0
- Jun 27 16:56:42.831033: | half-open-ike states: 0
- Jun 27 16:56:42.831063: | open-ike states: 0
- Jun 27 16:56:42.831076: | established-anonymous-ike states: 0
- Jun 27 16:56:42.831089: | established-authenticated-ike states: 1
- Jun 27 16:56:42.831102: | anonymous-ipsec states: 0
- Jun 27 16:56:42.831115: | authenticated-ipsec states: 1
- Jun 27 16:56:42.831128: | informational states: 0
- Jun 27 16:56:42.831142: | unknown states: 0
- Jun 27 16:56:42.831155: | category states: 2 count states: 2
- Jun 27 16:56:42.831257: | inserting state object #2
- Jun 27 16:56:42.831289: | serialno list: inserting object 0x555eacc34e38 (state #2) entry 0x555eacc355e0 into list 0x555eabcab5c0 (older 0x555eacc334a0 newer 0x555eacc334a0)
- Jun 27 16:56:42.831304: | serialno list: inserted object 0x555eacc34e38 (state #2) entry 0x555eacc355e0 (older 0x555eacc334a0 newer 0x555eabcab5c0)
- Jun 27 16:56:42.831318: | serialno list: list entry 0x555eabcab5c0 is HEAD (older 0x555eacc355e0 newer 0x555eacc334a0)
- Jun 27 16:56:42.831332: | serialno table: inserting object 0x555eacc34e38 (state #2) entry 0x555eacc35600 into list 0x555eabc9e380 (older 0x555eabc9e380 newer 0x555eabc9e380)
- Jun 27 16:56:42.831347: | serialno table: inserted object 0x555eacc34e38 (state #2) entry 0x555eacc35600 (older 0x555eabc9e380 newer 0x555eabc9e380)
- Jun 27 16:56:42.831361: | serialno table: list entry 0x555eabc9e380 is HEAD (older 0x555eacc35600 newer 0x555eacc35600)
- Jun 27 16:56:42.831376: | ****parse IPsec DOI SIT:
- Jun 27 16:56:42.831390: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
- Jun 27 16:56:42.831498: | ****parse ISAKMP Proposal Payload:
- Jun 27 16:56:42.831530: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:42.831544: | length: 1392 (0x570)
- Jun 27 16:56:42.831557: | proposal number: 1 (0x1)
- Jun 27 16:56:42.831571: | protocol ID: PROTO_IPSEC_ESP (0x3)
- Jun 27 16:56:42.831584: | SPI size: 4 (0x4)
- Jun 27 16:56:42.831598: | number of transforms: 45 (0x2d)
- Jun 27 16:56:42.831612: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
- Jun 27 16:56:42.831626: | SPI 21 6d bd 3f
- Jun 27 16:56:42.831641: | *****parse ISAKMP Transform Payload (ESP):
- Jun 27 16:56:42.831655: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:42.831761: | length: 32 (0x20)
- Jun 27 16:56:42.831791: | ESP transform number: 1 (0x1)
- Jun 27 16:56:42.831805: | ESP transform ID: ESP_AES (0xc)
- Jun 27 16:56:42.831820: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.831833: | af+type: ENCAPSULATION_MODE (0x8004)
- Jun 27 16:56:42.831847: | length/value: 1 (0x1)
- Jun 27 16:56:42.831861: | [1 is ENCAPSULATION_MODE_TUNNEL]
- Jun 27 16:56:42.831874: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
- Jun 27 16:56:42.831888: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.831901: | af+type: KEY_LENGTH (0x8006)
- Jun 27 16:56:42.831914: | length/value: 256 (0x100)
- Jun 27 16:56:42.831998: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.832018: | af+type: AUTH_ALGORITHM (0x8005)
- Jun 27 16:56:42.832042: | length/value: 1 (0x1)
- Jun 27 16:56:42.832055: | [1 is AUTH_ALGORITHM_HMAC_MD5]
- Jun 27 16:56:42.832069: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.832082: | af+type: SA_LIFE_TYPE (0x8001)
- Jun 27 16:56:42.832095: | length/value: 1 (0x1)
- Jun 27 16:56:42.832108: | [1 is SA_LIFE_TYPE_SECONDS]
- Jun 27 16:56:42.832210: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.832241: | af+type: SA_LIFE_DURATION (variable length) (0x2)
- Jun 27 16:56:42.832255: | length/value: 4 (0x4)
- Jun 27 16:56:42.832268: | long duration: 3600
- Jun 27 16:56:42.832283: | kernel_alg_esp_sadb_alg(): alg_id=12, sadb_alg=0x555eabcbcfa0
- Jun 27 16:56:42.832296: | check_kernel_encrypt_alg(12,256): OK
- Jun 27 16:56:42.832310: | ESP IPsec Transform verified unconditionally; no alg_info to check against
- Jun 27 16:56:42.832334: | adding quick_outI1 KE work-order 3 for state #2
- Jun 27 16:56:42.832348: | state #2 requesting to delete non existing event
- Jun 27 16:56:42.832362: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x555eacc30618
- Jun 27 16:56:42.832378: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #2
- Jun 27 16:56:42.832477: | backlog: inserting object 0x555eacc35808 (work-order 3 state #2) entry 0x555eacc35810 into list 0x555eabcac5e0 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:42.832509: | backlog: inserted object 0x555eacc35808 (work-order 3 state #2) entry 0x555eacc35810 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:42.832523: | backlog: list entry 0x555eabcac5e0 is HEAD (older 0x555eacc35810 newer 0x555eacc35810)
- Jun 27 16:56:42.832545: | crypto helper 1 resuming
- Jun 27 16:56:42.832552: | backlog: removing object 0x555eacc35808 (work-order 3 state #2) entry 0x555eacc35810 (older 0x555eabcac5e0 newer 0x555eabcac5e0)
- Jun 27 16:56:42.832555: | backlog: empty
- Jun 27 16:56:42.832558: | crypto helper 1 starting work-order 3 for state #2
- Jun 27 16:56:42.832561: | crypto helper 1 doing build nonce; request ID 3
- Jun 27 16:56:42.832574: | crypto helper 1 finished build nonce; request ID 3 time elapsed 13 usec
- Jun 27 16:56:42.832577: | crypto helper 1 sending results from work-order 3 for state #2 to event queue
- Jun 27 16:56:42.832581: | scheduling now-event sending helper answer for #2
- Jun 27 16:56:42.832587: | crypto helper 1 waiting (nothing to do)
- Jun 27 16:56:42.832605: | complete v1 state transition with STF_SUSPEND
- Jun 27 16:56:42.832623: | processing: [RE]START state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2272)
- Jun 27 16:56:42.832637: | suspending state #2 and saving MD
- Jun 27 16:56:42.832650: | #2 is busy; has a suspended MD
- Jun 27 16:56:42.832666: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:42.832783: | processing: stop state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:42.832814: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.832828: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.832843: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:42.832865: | executing now-event sending helper answer for 2
- Jun 27 16:56:42.832879: | serialno table: hash serialno #2 to head 0x555eabc9e380
- Jun 27 16:56:42.832892: | serialno table: hash serialno #2 to head 0x555eabc9e380
- Jun 27 16:56:42.832908: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:594)
- Jun 27 16:56:42.832922: | crypto helper 1 replies to request ID 3
- Jun 27 16:56:42.832935: | calling continuation function 0x555eab9a4ce0
- Jun 27 16:56:42.833020: | quick_inI1_outR1_cryptocontinue1 for #2: calculated ke+nonce, calculating DH
- Jun 27 16:56:42.833049: | **emit ISAKMP Message:
- Jun 27 16:56:42.833065: | initiator cookie:
- Jun 27 16:56:42.833079: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:42.833093: | responder cookie:
- Jun 27 16:56:42.833106: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:42.833120: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:42.833134: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:42.833241: | exchange type: ISAKMP_XCHG_QUICK (0x20)
- Jun 27 16:56:42.833272: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:42.833286: | message ID: 1f 5a 13 82
- Jun 27 16:56:42.833300: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:42.833315: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:42.833328: | next payload type: ISAKMP_NEXT_SA (0x1)
- Jun 27 16:56:42.833342: | emitting 16 zero bytes of HASH into ISAKMP Hash Payload
- Jun 27 16:56:42.833356: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:42.833369: | ***emit ISAKMP Security Association Payload:
- Jun 27 16:56:42.833458: | next payload type: ISAKMP_NEXT_NONCE (0xa)
- Jun 27 16:56:42.833478: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:42.833502: | ****parse IPsec DOI SIT:
- Jun 27 16:56:42.833516: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
- Jun 27 16:56:42.833530: | ****parse ISAKMP Proposal Payload:
- Jun 27 16:56:42.833543: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:42.833556: | length: 1392 (0x570)
- Jun 27 16:56:42.833569: | proposal number: 1 (0x1)
- Jun 27 16:56:42.833651: | protocol ID: PROTO_IPSEC_ESP (0x3)
- Jun 27 16:56:42.833672: | SPI size: 4 (0x4)
- Jun 27 16:56:42.833695: | number of transforms: 45 (0x2d)
- Jun 27 16:56:42.833709: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
- Jun 27 16:56:42.833722: | SPI 21 6d bd 3f
- Jun 27 16:56:42.833736: | *****parse ISAKMP Transform Payload (ESP):
- Jun 27 16:56:42.833760: | next payload type: ISAKMP_NEXT_T (0x3)
- Jun 27 16:56:42.833783: | length: 32 (0x20)
- Jun 27 16:56:42.833887: | ESP transform number: 1 (0x1)
- Jun 27 16:56:42.833908: | ESP transform ID: ESP_AES (0xc)
- Jun 27 16:56:42.833922: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.833936: | af+type: ENCAPSULATION_MODE (0x8004)
- Jun 27 16:56:42.833950: | length/value: 1 (0x1)
- Jun 27 16:56:42.833964: | [1 is ENCAPSULATION_MODE_TUNNEL]
- Jun 27 16:56:42.833977: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none
- Jun 27 16:56:42.833991: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.834005: | af+type: KEY_LENGTH (0x8006)
- Jun 27 16:56:42.834019: | length/value: 256 (0x100)
- Jun 27 16:56:42.834032: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.834046: | af+type: AUTH_ALGORITHM (0x8005)
- Jun 27 16:56:42.834156: | length/value: 1 (0x1)
- Jun 27 16:56:42.834177: | [1 is AUTH_ALGORITHM_HMAC_MD5]
- Jun 27 16:56:42.834191: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.834205: | af+type: SA_LIFE_TYPE (0x8001)
- Jun 27 16:56:42.834218: | length/value: 1 (0x1)
- Jun 27 16:56:42.834232: | [1 is SA_LIFE_TYPE_SECONDS]
- Jun 27 16:56:42.834246: | ******parse ISAKMP IPsec DOI attribute:
- Jun 27 16:56:42.834260: | af+type: SA_LIFE_DURATION (variable length) (0x2)
- Jun 27 16:56:42.834273: | length/value: 4 (0x4)
- Jun 27 16:56:42.834286: | long duration: 3600
- Jun 27 16:56:42.834301: | kernel_alg_esp_sadb_alg(): alg_id=12, sadb_alg=0x555eabcbcfa0
- Jun 27 16:56:42.834315: | check_kernel_encrypt_alg(12,256): OK
- Jun 27 16:56:42.834329: | ESP IPsec Transform verified unconditionally; no alg_info to check against
- Jun 27 16:56:42.834414: | ****emit IPsec DOI SIT:
- Jun 27 16:56:42.834435: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
- Jun 27 16:56:42.834450: | ****emit ISAKMP Proposal Payload:
- Jun 27 16:56:42.834464: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:42.834477: | proposal number: 1 (0x1)
- Jun 27 16:56:42.834491: | protocol ID: PROTO_IPSEC_ESP (0x3)
- Jun 27 16:56:42.834504: | SPI size: 4 (0x4)
- Jun 27 16:56:42.834518: | number of transforms: 1 (0x1)
- Jun 27 16:56:42.834558: | netlink_get_spi: allocated 0x61cbecf6 for esp.0@192.168.1.137
- Jun 27 16:56:42.834659: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
- Jun 27 16:56:42.834681: | SPI 61 cb ec f6
- Jun 27 16:56:42.834696: | *****emit ISAKMP Transform Payload (ESP):
- Jun 27 16:56:42.834711: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:42.834725: | ESP transform number: 1 (0x1)
- Jun 27 16:56:42.834739: | ESP transform ID: ESP_AES (0xc)
- Jun 27 16:56:42.834753: | emitting 24 raw bytes of attributes into ISAKMP Transform Payload (ESP)
- Jun 27 16:56:42.834827: | attributes 80 04 00 01 80 06 01 00 80 05 00 01 80 01 00 01
- Jun 27 16:56:42.834847: | attributes 00 02 00 04 00 00 0e 10
- Jun 27 16:56:42.834861: | emitting length of ISAKMP Transform Payload (ESP): 32
- Jun 27 16:56:42.834875: | emitting length of ISAKMP Proposal Payload: 44
- Jun 27 16:56:42.834889: | emitting length of ISAKMP Security Association Payload: 56
- Jun 27 16:56:42.834910: "xauth"[2] 192.168.1.138 #2: responding to Quick Mode proposal {msgid:82135a1f}
- Jun 27 16:56:42.835033: "xauth"[2] 192.168.1.138 #2: us: 0.0.0.0/0===192.168.1.137<192.168.1.137>[MS+XS+S=C]
- Jun 27 16:56:42.835057: "xauth"[2] 192.168.1.138 #2: them: 192.168.1.138[@,+MC+XC+S=C]===192.168.20.2/32
- Jun 27 16:56:42.835078: | ***emit ISAKMP Nonce Payload:
- Jun 27 16:56:42.835093: | next payload type: ISAKMP_NEXT_ID (0x5)
- Jun 27 16:56:42.835116: | emitting 32 raw bytes of Nr into ISAKMP Nonce Payload
- Jun 27 16:56:42.835134: | Nr fc 6a 54 72 0f 36 e3 de 78 2d 29 65 4f 98 80 03
- Jun 27 16:56:42.835151: | Nr f2 52 e8 5f 77 b3 3d c0 27 92 dd 74 89 31 04 f0
- Jun 27 16:56:42.835169: | emitting length of ISAKMP Nonce Payload: 36
- Jun 27 16:56:42.835314: | emitting 12 raw bytes of IDci into ISAKMP Message
- Jun 27 16:56:42.835343: | IDci 05 00 00 0c 01 00 00 00 c0 a8 14 02
- Jun 27 16:56:42.835362: | emitting 16 raw bytes of IDcr into ISAKMP Message
- Jun 27 16:56:42.835381: | IDcr 00 00 00 10 04 00 00 00 00 00 00 00 00 00 00 00
- Jun 27 16:56:42.835500: | compute_proto_keymat: needed_len (after ESP enc)=32
- Jun 27 16:56:42.835640: | compute_proto_keymat: needed_len (after ESP auth)=48
- Jun 27 16:56:42.835906: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.835997: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836105: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836191: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836282: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836303: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836317: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836331: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836345: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836359: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836432: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL
- Jun 27 16:56:42.836453: | install_inbound_ipsec_sa() checking if we can route
- Jun 27 16:56:42.836468: | could_route called for xauth (kind=CK_INSTANCE)
- Jun 27 16:56:42.836482: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836496: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836510: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836597: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836618: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836632: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836646: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836659: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836673: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.836686: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:42.836702: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:42.836716: | routing is easy, or has resolvable near-conflict
- Jun 27 16:56:42.836731: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.836811: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.836831: | checking if this is a replacement state
- Jun 27 16:56:42.836846: | st=0x555eacc34e38 ost=(nil) st->serialno=#2 ost->serialno=#0
- Jun 27 16:56:42.836860: | installing outgoing SA now as refhim=0
- Jun 27 16:56:42.836874: | looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_MD5_96
- Jun 27 16:56:42.836890: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12
- Jun 27 16:56:42.836905: | st->st_esp.keymat_len=48 is encrypt_keymat_size=32 + integ_keymat_size=16
- Jun 27 16:56:42.836993: | setting IPsec SA replay-window to 32
- Jun 27 16:56:42.837015: | netlink: enabling tunnel mode
- Jun 27 16:56:42.837029: | netlink: setting IPsec SA replay-window to 32 using old-style req
- Jun 27 16:56:42.837101: | netlink response for Add SA esp.216dbd3f@192.168.1.138 included non-error error
- Jun 27 16:56:42.837216: | outgoing SA has refhim=0
- Jun 27 16:56:42.837238: | looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_MD5_96
- Jun 27 16:56:42.837262: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12
- Jun 27 16:56:42.837277: | st->st_esp.keymat_len=48 is encrypt_keymat_size=32 + integ_keymat_size=16
- Jun 27 16:56:42.837291: | setting IPsec SA replay-window to 32
- Jun 27 16:56:42.837306: | netlink: enabling tunnel mode
- Jun 27 16:56:42.837320: | netlink: setting IPsec SA replay-window to 32 using old-style req
- Jun 27 16:56:42.837459: | netlink response for Add SA esp.61cbecf6@192.168.1.137 included non-error error
- Jun 27 16:56:42.837481: | priority calculation of connection "xauth" is 0xfffdf
- Jun 27 16:56:42.837499: | add inbound eroute 192.168.20.2/32:0 --0-> 0.0.0.0/0:0 => tun.10000@192.168.1.137 (raw_eroute)
- Jun 27 16:56:42.837515: | satype(9) is not used in netlink_raw_eroute.
- Jun 27 16:56:42.837530: | IPsec Sa SPD priority set to 1048543
- Jun 27 16:56:42.837560: | raw_eroute result=success
- Jun 27 16:56:42.837577: | encrypting: 01 00 00 14 ca 8e 4b c8 d4 dd 89 4c 24 44 3b 8a
- Jun 27 16:56:42.837685: | encrypting: be 28 63 7d 0a 00 00 38 00 00 00 01 00 00 00 01
- Jun 27 16:56:42.837705: | encrypting: 00 00 00 2c 01 03 04 01 61 cb ec f6 00 00 00 20
- Jun 27 16:56:42.837719: | encrypting: 01 0c 00 00 80 04 00 01 80 06 01 00 80 05 00 01
- Jun 27 16:56:42.837732: | encrypting: 80 01 00 01 00 02 00 04 00 00 0e 10 05 00 00 24
- Jun 27 16:56:42.837746: | encrypting: fc 6a 54 72 0f 36 e3 de 78 2d 29 65 4f 98 80 03
- Jun 27 16:56:42.837759: | encrypting: f2 52 e8 5f 77 b3 3d c0 27 92 dd 74 89 31 04 f0
- Jun 27 16:56:42.837773: | encrypting: 05 00 00 0c 01 00 00 00 c0 a8 14 02 00 00 00 10
- Jun 27 16:56:42.837786: | encrypting: 04 00 00 00 00 00 00 00 00 00 00 00
- Jun 27 16:56:42.837800: | IV: 92 c6 f0 2b 31 0a 66 9b f1 5e cd 48 d1 1b 16 91
- Jun 27 16:56:42.837814: | emitting 4 zero bytes of encryption padding into ISAKMP Message
- Jun 27 16:56:42.837845: | no IKEv1 message padding required
- Jun 27 16:56:42.837977: | emitting length of ISAKMP Message: 172
- Jun 27 16:56:42.837998: | finished processing quick inI1
- Jun 27 16:56:42.838013: | complete v1 state transition with STF_OK
- Jun 27 16:56:42.838032: | processing: [RE]START state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:42.838046: | #2 is idle
- Jun 27 16:56:42.838060: | doing_xauth:no, t_xauth_client_done:no
- Jun 27 16:56:42.838074: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:42.838088: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:42.838103: | IKEv1: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Jun 27 16:56:42.838118: | child state #2: STATE_QUICK_R0(authenticated-ipsec) => STATE_QUICK_R1(authenticated-ipsec)
- Jun 27 16:56:42.838132: | ignore states: 0
- Jun 27 16:56:42.838145: | half-open-ike states: 0
- Jun 27 16:56:42.838158: | open-ike states: 0
- Jun 27 16:56:42.838172: | established-anonymous-ike states: 0
- Jun 27 16:56:42.838273: | established-authenticated-ike states: 1
- Jun 27 16:56:42.838293: | anonymous-ipsec states: 0
- Jun 27 16:56:42.838307: | authenticated-ipsec states: 1
- Jun 27 16:56:42.838321: | informational states: 0
- Jun 27 16:56:42.838334: | unknown states: 0
- Jun 27 16:56:42.838347: | category states: 2 count states: 2
- Jun 27 16:56:42.838362: | event_already_set, deleting event
- Jun 27 16:56:42.838376: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted
- Jun 27 16:56:42.838393: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x555eacc30618
- Jun 27 16:56:42.838410: | sending reply packet to 192.168.1.138:500 (from port 500)
- Jun 27 16:56:42.838428: | sending 172 bytes for STATE_QUICK_R0 through eth0:500 to 192.168.1.138:500 (using #2)
- Jun 27 16:56:42.838547: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:42.838568: | 08 10 20 01 1f 5a 13 82 00 00 00 ac 15 aa b5 6f
- Jun 27 16:56:42.838582: | 2e 2b b7 d6 57 dc 0b 7c 80 9d 2d c3 86 01 ad ff
- Jun 27 16:56:42.838596: | 2f b6 5f 7e b5 1a e9 33 69 dc f5 e4 eb 26 d1 dd
- Jun 27 16:56:42.838609: | d6 3a b3 f0 88 9b 16 9e 53 19 7f 1a e9 bd 35 6a
- Jun 27 16:56:42.838628: | 5f 5e 4e a6 a8 0d b2 ed 7c 35 4e 14 ce a9 3b 6e
- Jun 27 16:56:42.838642: | 6f 1b 87 0f 00 84 3d 07 85 2e 57 ee f4 b2 15 9b
- Jun 27 16:56:42.838655: | 74 9c f6 30 6c 8a 11 02 05 d4 c9 23 00 88 df 05
- Jun 27 16:56:42.838669: | ff dc 0d 0e fb aa d5 48 f7 7a c1 0e fc 16 fa 15
- Jun 27 16:56:42.838682: | bc ff 5e 85 16 ed 1f 6a 0f df c6 13 f3 cb 18 7c
- Jun 27 16:56:42.838695: | cd d8 b9 6c cb c4 9f b9 05 b1 f6 4c
- Jun 27 16:56:42.838785: | !event_already_set at reschedule
- Jun 27 16:56:42.838897: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x555eacc30618
- Jun 27 16:56:42.839014: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #2
- Jun 27 16:56:42.839038: | #2 STATE_QUICK_R1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 4238.883
- Jun 27 16:56:42.839054: | NAT-T: encaps is 'auto'
- Jun 27 16:56:42.839074: "xauth"[2] 192.168.1.138 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 tunnel mode {ESP=>0x216dbd3f <0x61cbecf6 xfrm=AES_CBC_256-HMAC_MD5_96 NATOA=none NATD=none DPD=active username=sss}
- Jun 27 16:56:42.839089: | modecfg pull: quirk-poll policy:pull not-client
- Jun 27 16:56:42.839103: | phase 1 is done, looking for phase 2 to unpend
- Jun 27 16:56:42.839121: | processing: stop state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in schedule_event_now_cb() at server.c:597)
- Jun 27 16:56:42.839137: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.839150: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.846204: | *received 60 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:42.846570: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:42.846717: | 08 10 20 01 1f 5a 13 82 00 00 00 3c f6 d0 44 d7
- Jun 27 16:56:42.846739: | 5d ee 6a d8 3e 15 cf 30 a2 8d 77 c0 7e c7 e9 38
- Jun 27 16:56:42.846757: | 06 19 38 eb 3c 11 df ab ad 52 80 bc
- Jun 27 16:56:42.846776: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:42.846797: | **parse ISAKMP Message:
- Jun 27 16:56:42.846813: | initiator cookie:
- Jun 27 16:56:42.846827: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:42.846841: | responder cookie:
- Jun 27 16:56:42.846855: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:42.846869: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:42.846883: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:42.846897: | exchange type: ISAKMP_XCHG_QUICK (0x20)
- Jun 27 16:56:42.846911: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:42.846925: | message ID: 1f 5a 13 82
- Jun 27 16:56:42.846939: | length: 60 (0x3c)
- Jun 27 16:56:42.846953: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
- Jun 27 16:56:42.846975: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:42.846991: | v1 peer and cookies match on #2, provided msgid 1f5a1382 == 1f5a1382
- Jun 27 16:56:42.847006: | v1 state object #2 found, in STATE_QUICK_R1
- Jun 27 16:56:42.847026: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1291)
- Jun 27 16:56:42.847214: | #2 is idle
- Jun 27 16:56:42.847238: | #2 idle
- Jun 27 16:56:42.847305: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x0
- Jun 27 16:56:42.847324: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:42.847339: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:42.847353: | length: 20 (0x14)
- Jun 27 16:56:42.847367: | removing 12 bytes of padding
- Jun 27 16:56:42.847450: | install_ipsec_sa() for #2: outbound only
- Jun 27 16:56:42.847584: | could_route called for xauth (kind=CK_INSTANCE)
- Jun 27 16:56:42.847607: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.847621: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.847635: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.847650: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:42.847761: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.847839: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:42.847918: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.847941: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.847956: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.847969: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:42.847986: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:42.848001: | sr for #2: unrouted
- Jun 27 16:56:42.848077: | route_and_eroute() for proto 0, and source port 0 dest port 0
- Jun 27 16:56:42.848199: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.848219: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.848233: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.848248: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:42.848264: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.848278: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:42.848292: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.848369: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:42.848391: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:42.848405: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:42.848422: | route owner of "xauth"[2] 192.168.1.138 unrouted: NULL; eroute owner: NULL
- Jun 27 16:56:42.848438: | route_and_eroute with c: xauth (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2
- Jun 27 16:56:42.848454: | priority calculation of connection "xauth" is 0xfffdf
- Jun 27 16:56:42.848474: | eroute_connection add eroute 0.0.0.0/0:0 --0-> 192.168.20.2/32:0 => tun.0@192.168.1.138 (raw_eroute)
- Jun 27 16:56:42.848579: | satype(9) is not used in netlink_raw_eroute.
- Jun 27 16:56:42.848605: | IPsec Sa SPD priority set to 1048543
- Jun 27 16:56:42.848667: | raw_eroute result=success
- Jun 27 16:56:42.848780: | running updown command "ipsec _updown" for verb up
- Jun 27 16:56:42.848802: | command executing up-client
- Jun 27 16:56:42.848824: | get_sa_info esp.216dbd3f@192.168.1.138
- Jun 27 16:56:42.848853: | get_sa_info esp.61cbecf6@192.168.1.137
- Jun 27 16:56:42.848891: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED=
- Jun 27 16:56:42.848987: | popen cmd is 1138 chars long
- Jun 27 16:56:42.849009: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERF:
- Jun 27 16:56:42.849026: | cmd( 80):ACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID=':
- Jun 27 16:56:42.849040: | cmd( 160):192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_M:
- Jun 27 16:56:42.849054: | cmd( 240):Y_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID=':
- Jun 27 16:56:42.849068: | cmd( 320):16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PE:
- Jun 27 16:56:42.849082: | cmd( 400):ER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIE:
- Jun 27 16:56:42.849337: | cmd( 480):NT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER:
- Jun 27 16:56:42.849362: | cmd( 560):_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+EN:
- Jun 27 16:56:42.849377: | cmd( 640):CRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRAC:
- Jun 27 16:56:42.849526: | cmd( 720):K+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ip:
- Jun 27 16:56:42.849550: | cmd( 800):v4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_I:
- Jun 27 16:56:42.849565: | cmd( 880):NFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO:
- Jun 27 16:56:42.849580: | cmd( 960):_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='0' PLUTO_OUTBYTES='0' VTI:
- Jun 27 16:56:42.849594: | cmd(1040):_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61cbecf6 :
- Jun 27 16:56:42.849609: | cmd(1120):ipsec _updown 2>&1:
- Jun 27 16:56:42.854737: | route_and_eroute: firewall_notified: true
- Jun 27 16:56:42.854805: | running updown command "ipsec _updown" for verb prepare
- Jun 27 16:56:42.854814: | command executing prepare-client
- Jun 27 16:56:42.854847: | get_sa_info esp.216dbd3f@192.168.1.138
- Jun 27 16:56:42.854906: | get_sa_info esp.61cbecf6@192.168.1.137
- Jun 27 16:56:42.854948: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_C
- Jun 27 16:56:42.854954: | popen cmd is 1144 chars long
- Jun 27 16:56:42.854959: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_I:
- Jun 27 16:56:42.854962: | cmd( 80):NTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY:
- Jun 27 16:56:42.854965: | cmd( 160):_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PL:
- Jun 27 16:56:42.854968: | cmd( 240):UTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_RE:
- Jun 27 16:56:42.854971: | cmd( 320):QID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLU:
- Jun 27 16:56:42.854974: | cmd( 400):TO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER:
- Jun 27 16:56:42.854977: | cmd( 480):_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO:
- Jun 27 16:56:42.854980: | cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='P:
- Jun 27 16:56:42.854983: | cmd( 640):SK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF:
- Jun 27 16:56:42.854987: | cmd( 720):_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMIL:
- Jun 27 16:56:42.854990: | cmd( 800):Y='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_:
- Jun 27 16:56:42.854993: | cmd( 880):DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' :
- Jun 27 16:56:42.854996: | cmd( 960):PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='40' PLUTO_OUTBYTES=':
- Jun 27 16:56:42.854999: | cmd(1040):0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61c:
- Jun 27 16:56:42.855021: | cmd(1120):becf6 ipsec _updown 2>&1:
- Jun 27 16:56:42.860454: | running updown command "ipsec _updown" for verb route
- Jun 27 16:56:42.860528: | command executing route-client
- Jun 27 16:56:42.860558: | get_sa_info esp.216dbd3f@192.168.1.138
- Jun 27 16:56:42.860608: | get_sa_info esp.61cbecf6@192.168.1.137
- Jun 27 16:56:42.860655: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFI
- Jun 27 16:56:42.860661: | popen cmd is 1142 chars long
- Jun 27 16:56:42.860667: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INT:
- Jun 27 16:56:42.860670: | cmd( 80):ERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_I:
- Jun 27 16:56:42.860673: | cmd( 160):D='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUT:
- Jun 27 16:56:42.860677: | cmd( 240):O_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQI:
- Jun 27 16:56:42.860680: | cmd( 320):D='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO:
- Jun 27 16:56:42.860683: | cmd( 400):_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_C:
- Jun 27 16:56:42.860686: | cmd( 480):LIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P:
- Jun 27 16:56:42.860689: | cmd( 560):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK:
- Jun 27 16:56:42.860692: | cmd( 640):+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_T:
- Jun 27 16:56:42.860695: | cmd( 720):RACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=:
- Jun 27 16:56:42.860698: | cmd( 800):'ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DN:
- Jun 27 16:56:42.860701: | cmd( 880):S_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PL:
- Jun 27 16:56:42.860705: | cmd( 960):UTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='40' PLUTO_OUTBYTES='0':
- Jun 27 16:56:42.860708: | cmd(1040): VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61cbe:
- Jun 27 16:56:42.860711: | cmd(1120):cf6 ipsec _updown 2>&1:
- Jun 27 16:56:42.871275: | route_and_eroute: instance "xauth"[2] 192.168.1.138, setting eroute_owner {spd=0x555eacc32290,sr=0x555eacc32290} to #2 (was #0) (newest_ipsec_sa=#0)
- Jun 27 16:56:42.871322: | inI2: instance xauth[2], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1
- Jun 27 16:56:42.871336: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:42.871341: | v1 peer and cookies match on #2, provided msgid 00000000 == 1f5a1382
- Jun 27 16:56:42.871344: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000
- Jun 27 16:56:42.871348: | v1 state object #1 found, in STATE_MODE_CFG_R1
- Jun 27 16:56:42.871352: | Dead Peer Detection (RFC 3706): enabled
- Jun 27 16:56:42.871360: | event_schedule: new EVENT_DPD-pe@0x555eacc34248
- Jun 27 16:56:42.871368: | inserting event EVENT_DPD, timeout in 10.000 seconds for #2
- Jun 27 16:56:42.871400: | state #1 requesting EVENT_DPD-pe@0x555eacc32818 be deleted
- Jun 27 16:56:42.871408: | free_event_entry: release EVENT_DPD-pe@0x555eacc32818
- Jun 27 16:56:42.871414: | complete v1 state transition with STF_OK
- Jun 27 16:56:42.871422: | processing: [RE]START state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in complete_v1_state_transition() at ikev1.c:2297)
- Jun 27 16:56:42.871425: | #2 is idle
- Jun 27 16:56:42.871429: | doing_xauth:no, t_xauth_client_done:no
- Jun 27 16:56:42.871433: | IKEv1: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Jun 27 16:56:42.871438: | child state #2: STATE_QUICK_R1(authenticated-ipsec) => STATE_QUICK_R2(authenticated-ipsec)
- Jun 27 16:56:42.871441: | ignore states: 0
- Jun 27 16:56:42.871444: | half-open-ike states: 0
- Jun 27 16:56:42.871446: | open-ike states: 0
- Jun 27 16:56:42.871449: | established-anonymous-ike states: 0
- Jun 27 16:56:42.871452: | established-authenticated-ike states: 1
- Jun 27 16:56:42.871454: | anonymous-ipsec states: 0
- Jun 27 16:56:42.871457: | authenticated-ipsec states: 1
- Jun 27 16:56:42.871460: | informational states: 0
- Jun 27 16:56:42.871463: | unknown states: 0
- Jun 27 16:56:42.871465: | category states: 2 count states: 2
- Jun 27 16:56:42.871471: | event_already_set, deleting event
- Jun 27 16:56:42.871474: | state #2 requesting EVENT_v1_RETRANSMIT to be deleted
- Jun 27 16:56:42.871477: | #2 STATE_QUICK_R2: retransmits: cleared
- Jun 27 16:56:42.871481: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x555eacc30618
- Jun 27 16:56:42.871491: | !event_already_set at reschedule
- Jun 27 16:56:42.871494: | event_schedule: new EVENT_SA_REPLACE-pe@0x555eacc30618
- Jun 27 16:56:42.871498: | inserting event EVENT_SA_REPLACE, timeout in 3330.000 seconds for #2
- Jun 27 16:56:42.871502: | NAT-T: encaps is 'auto'
- Jun 27 16:56:42.871513: "xauth"[2] 192.168.1.138 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x216dbd3f <0x61cbecf6 xfrm=AES_CBC_256-HMAC_MD5_96 NATOA=none NATD=none DPD=active username=sss}
- Jun 27 16:56:42.871517: | modecfg pull: quirk-poll policy:pull not-client
- Jun 27 16:56:42.871521: | phase 1 is done, looking for phase 2 to unpend
- Jun 27 16:56:42.871527: | processing: stop from 192.168.1.138:500 (BACKGROUND) (in process_md() at demux.c:394)
- Jun 27 16:56:42.871535: | processing: stop state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_md() at demux.c:396)
- Jun 27 16:56:42.871539: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.871542: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:42.871549: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:42.871584: | waitpid returned ECHILD (no child processes left)
- Jun 27 16:56:42.871588: | waitpid returned ECHILD (no child processes left)
- Jun 27 16:56:42.871591: | waitpid returned ECHILD (no child processes left)
- Jun 27 16:56:46.632429: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:46.632463: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.632469: | 08 10 05 01 bc 09 5b 0b 00 00 00 4c 7d 53 eb d6
- Jun 27 16:56:46.632472: | 89 fb e9 ee 00 bb 2c a2 4f 1a e2 fa 3b 24 72 72
- Jun 27 16:56:46.632475: | e5 4b 81 47 7f 0a e8 fe 11 5c 05 92 70 33 f4 82
- Jun 27 16:56:46.632478: | 9c f3 ee 8b d2 2a 5e c0 d5 60 88 c1
- Jun 27 16:56:46.632485: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:46.632492: | **parse ISAKMP Message:
- Jun 27 16:56:46.632496: | initiator cookie:
- Jun 27 16:56:46.632499: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:46.632502: | responder cookie:
- Jun 27 16:56:46.632504: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.632508: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:46.632511: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:46.632515: | exchange type: ISAKMP_XCHG_INFO (0x5)
- Jun 27 16:56:46.632521: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:46.632524: | message ID: bc 09 5b 0b
- Jun 27 16:56:46.632528: | length: 76 (0x4c)
- Jun 27 16:56:46.632542: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
- Jun 27 16:56:46.632552: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:46.632557: | peer and cookies match on #2; msgid=00000000 st_msgid=1f5a1382 st_msgid_phase15=00000000
- Jun 27 16:56:46.632561: | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000
- Jun 27 16:56:46.632564: | p15 state object #1 found, in STATE_MODE_CFG_R1
- Jun 27 16:56:46.632571: | processing: start state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in process_v1_packet() at ikev1.c:1137)
- Jun 27 16:56:46.632607: | #1 is idle
- Jun 27 16:56:46.632612: | #1 idle
- Jun 27 16:56:46.632637: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100opt: 0x0
- Jun 27 16:56:46.632709: | ***parse ISAKMP Hash Payload:
- Jun 27 16:56:46.632714: | next payload type: ISAKMP_NEXT_D (0xc)
- Jun 27 16:56:46.632717: | length: 20 (0x14)
- Jun 27 16:56:46.632721: | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0opt: 0x0
- Jun 27 16:56:46.632724: | ***parse ISAKMP Delete Payload:
- Jun 27 16:56:46.632727: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:46.632729: | length: 16 (0x10)
- Jun 27 16:56:46.632732: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:46.632735: | protocol ID: 3 (0x3)
- Jun 27 16:56:46.632738: | SPI size: 4 (0x4)
- Jun 27 16:56:46.632740: | number of SPIs: 1 (0x1)
- Jun 27 16:56:46.632743: | removing 12 bytes of padding
- Jun 27 16:56:46.632747: | parsing 4 raw bytes of ISAKMP Delete Payload into SPI
- Jun 27 16:56:46.632751: | SPI 21 6d bd 3f
- Jun 27 16:56:46.632758: | processing: start connection "xauth"[2] 192.168.1.138 (BACKGROUND) (in accept_delete() at ikev1_main.c:2693)
- Jun 27 16:56:46.632764: "xauth"[2] 192.168.1.138 #1: received Delete SA(0x216dbd3f) payload: deleting IPSEC State #2
- Jun 27 16:56:46.632769: | processing: suspend state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in delete_state() at state.c:980)
- Jun 27 16:56:46.632773: | processing: start state #2 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in delete_state() at state.c:980)
- Jun 27 16:56:46.632776: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.632779: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.632783: "xauth"[2] 192.168.1.138 #2: deleting other state #2 (STATE_QUICK_R2) and sending notification
- Jun 27 16:56:46.632787: | child state #2: STATE_QUICK_R2(authenticated-ipsec) => delete
- Jun 27 16:56:46.632792: | get_sa_info esp.216dbd3f@192.168.1.138
- Jun 27 16:56:46.632815: | get_sa_info esp.61cbecf6@192.168.1.137
- Jun 27 16:56:46.632825: "xauth"[2] 192.168.1.138 #2: ESP traffic information: in=506B out=0B XAUTHuser=sss
- Jun 27 16:56:46.632829: | state #2 requesting EVENT_DPD-pe@0x555eacc34248 be deleted
- Jun 27 16:56:46.632836: | free_event_entry: release EVENT_DPD-pe@0x555eacc34248
- Jun 27 16:56:46.632839: | state #2 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:46.632842: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:46.632845: | state #2 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:46.632847: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:46.632850: | state #2 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:46.632854: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:46.632857: | #2 send IKEv1 delete notification for STATE_QUICK_R2
- Jun 27 16:56:46.632872: | **emit ISAKMP Message:
- Jun 27 16:56:46.632876: | initiator cookie:
- Jun 27 16:56:46.632879: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:46.632881: | responder cookie:
- Jun 27 16:56:46.632884: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.632887: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:46.632890: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:46.632893: | exchange type: ISAKMP_XCHG_INFO (0x5)
- Jun 27 16:56:46.632896: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:46.632898: | message ID: 78 da b4 df
- Jun 27 16:56:46.632909: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:46.632913: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:46.632915: | next payload type: ISAKMP_NEXT_D (0xc)
- Jun 27 16:56:46.632919: | emitting 16 zero bytes of HASH(1) into ISAKMP Hash Payload
- Jun 27 16:56:46.632922: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:46.632924: | ***emit ISAKMP Delete Payload:
- Jun 27 16:56:46.632927: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:46.632930: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:46.632933: | protocol ID: 3 (0x3)
- Jun 27 16:56:46.632936: | SPI size: 4 (0x4)
- Jun 27 16:56:46.632938: | number of SPIs: 1 (0x1)
- Jun 27 16:56:46.632941: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
- Jun 27 16:56:46.632945: | delete payload 61 cb ec f6
- Jun 27 16:56:46.632950: | emitting length of ISAKMP Delete Payload: 16
- Jun 27 16:56:46.633053: | encrypting: 0c 00 00 14 a2 f7 a8 20 e4 aa 0e fe 60 dd 7e c5
- Jun 27 16:56:46.633062: | encrypting: de 1b 6d f9 00 00 00 10 00 00 00 01 03 04 00 01
- Jun 27 16:56:46.633065: | encrypting: 61 cb ec f6
- Jun 27 16:56:46.633067: | IV: 7c 8f 2c 25 08 48 f2 73 e4 9c 59 32 21 d5 23 e2
- Jun 27 16:56:46.633071: | emitting 12 zero bytes of encryption padding into ISAKMP Message
- Jun 27 16:56:46.633080: | no IKEv1 message padding required
- Jun 27 16:56:46.633084: | emitting length of ISAKMP Message: 76
- Jun 27 16:56:46.633105: | sending 76 bytes for delete notify through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:46.633109: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.633111: | 08 10 05 01 78 da b4 df 00 00 00 4c b3 d0 91 d5
- Jun 27 16:56:46.633114: | 24 3c 99 8b 5f 6b 9c 83 5f 01 8f ef 25 74 f4 3d
- Jun 27 16:56:46.633116: | e8 fa af f1 46 1a c8 24 b7 ce ba f0 89 e4 17 30
- Jun 27 16:56:46.633119: | e8 70 1f fb 63 59 4f 06 e0 7c 0e a6
- Jun 27 16:56:46.633188: | state #2 requesting EVENT_SA_REPLACE to be deleted
- Jun 27 16:56:46.633196: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc30618
- Jun 27 16:56:46.633201: | serialno list: removing object 0x555eacc34e38 (state #2) entry 0x555eacc355e0 (older 0x555eacc334a0 newer 0x555eabcab5c0)
- Jun 27 16:56:46.633205: | serialno list: updated older object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
- Jun 27 16:56:46.633217: | serialno list: updated newer entry 0x555eabcab5c0 is HEAD (older 0x555eacc334a0 newer 0x555eacc334a0)
- Jun 27 16:56:46.633223: | serialno table: removing object 0x555eacc34e38 (state #2) entry 0x555eacc35600 (older 0x555eabc9e380 newer 0x555eabc9e380)
- Jun 27 16:56:46.633227: | serialno table: empty
- Jun 27 16:56:46.633233: | running updown command "ipsec _updown" for verb down
- Jun 27 16:56:46.633236: | command executing down-client
- Jun 27 16:56:46.633244: | get_sa_info esp.216dbd3f@192.168.1.138
- Jun 27 16:56:46.633256: | get_sa_info esp.61cbecf6@192.168.1.137
- Jun 27 16:56:46.633277: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGU
- Jun 27 16:56:46.633281: | popen cmd is 1142 chars long
- Jun 27 16:56:46.633291: | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTE:
- Jun 27 16:56:46.633294: | cmd( 80):RFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID:
- Jun 27 16:56:46.633297: | cmd( 160):='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO:
- Jun 27 16:56:46.633299: | cmd( 240):_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID:
- Jun 27 16:56:46.633302: | cmd( 320):='16408' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_:
- Jun 27 16:56:46.633305: | cmd( 400):PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CL:
- Jun 27 16:56:46.633307: | cmd( 480):IENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PE:
- Jun 27 16:56:46.633310: | cmd( 560):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1530111402' PLUTO_CONN_POLICY='PSK+:
- Jun 27 16:56:46.633313: | cmd( 640):ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TR:
- Jun 27 16:56:46.633316: | cmd( 720):ACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY=':
- Jun 27 16:56:46.633318: | cmd( 800):ipv4' XAUTH_FAILED=0 PLUTO_USERNAME='sss' PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS:
- Jun 27 16:56:46.633321: | cmd( 880):_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLU:
- Jun 27 16:56:46.633324: | cmd( 960):TO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='506' PLUTO_OUTBYTES='0':
- Jun 27 16:56:46.633326: | cmd(1040): VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x216dbd3f SPI_OUT=0x61cbe:
- Jun 27 16:56:46.633329: | cmd(1120):cf6 ipsec _updown 2>&1:
- Jun 27 16:56:46.636805: | shunt_eroute() called for connection 'xauth' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0
- Jun 27 16:56:46.636824: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
- Jun 27 16:56:46.636831: | priority calculation of connection "xauth" is 0xfffdf
- Jun 27 16:56:46.636836: | IPsec Sa SPD priority set to 1048543
- Jun 27 16:56:46.636862: | delete esp.216dbd3f@192.168.1.138
- Jun 27 16:56:46.636876: | netlink response for Del SA esp.216dbd3f@192.168.1.138 included non-error error
- Jun 27 16:56:46.636880: | priority calculation of connection "xauth" is 0xfffdf
- Jun 27 16:56:46.636885: | delete inbound eroute 192.168.20.2/32:0 --0-> 0.0.0.0/0:0 => unk255.10000@192.168.1.137 (raw_eroute)
- Jun 27 16:56:46.636902: | raw_eroute result=success
- Jun 27 16:56:46.636905: | delete esp.61cbecf6@192.168.1.137
- Jun 27 16:56:46.636912: | netlink response for Del SA esp.61cbecf6@192.168.1.137 included non-error error
- Jun 27 16:56:46.636917: | in connection_discard for connection xauth
- Jun 27 16:56:46.636920: | connection is instance
- Jun 27 16:56:46.636923: | not in pending use
- Jun 27 16:56:46.636929: | child state #2: STATE_QUICK_R2(authenticated-ipsec) => STATE_UNDEFINED(ignore)
- Jun 27 16:56:46.636932: | ignore states: 0
- Jun 27 16:56:46.636934: | half-open-ike states: 0
- Jun 27 16:56:46.636937: | open-ike states: 0
- Jun 27 16:56:46.636940: | established-anonymous-ike states: 0
- Jun 27 16:56:46.636942: | established-authenticated-ike states: 1
- Jun 27 16:56:46.636945: | anonymous-ipsec states: 0
- Jun 27 16:56:46.636947: | authenticated-ipsec states: 0
- Jun 27 16:56:46.636950: | informational states: 0
- Jun 27 16:56:46.636953: | unknown states: 0
- Jun 27 16:56:46.636956: | category states: 1 count states: 1
- Jun 27 16:56:46.636963: | processing: stop state #2 192.168.1.138:500 (in delete_state() at state.c:1198)
- Jun 27 16:56:46.636967: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.636971: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.636976: | processing: resume state #1 connection "xauth"[2] 192.168.1.138 192.168.1.138:500 (in delete_state() at state.c:1198)
- Jun 27 16:56:46.636995: | Deleting states for connection - not including other IPsec SA's
- Jun 27 16:56:46.636998: | pass 0
- Jun 27 16:56:46.637001: | state #1
- Jun 27 16:56:46.637003: | pass 1
- Jun 27 16:56:46.637014: | state #1
- Jun 27 16:56:46.637019: | processing: [RE]START state #1 connection "xauth" 192.168.1.138:500 (in foreach_state_by_connection_func_delete() at state.c:1335)
- Jun 27 16:56:46.637023: | processing: [RE]START state #1 connection "xauth" 192.168.1.138:500 (in delete_state() at state.c:980)
- Jun 27 16:56:46.637026: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.637028: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.637032: "xauth" #1: deleting state (STATE_MODE_CFG_R1) and sending notification
- Jun 27 16:56:46.637036: | parent state #1: STATE_MODE_CFG_R1(established-authenticated-ike) => delete
- Jun 27 16:56:46.637040: | state #1 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:46.637043: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:46.637046: | state #1 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:46.637048: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:46.637051: | state #1 requesting N/A-pe@(nil) be deleted
- Jun 27 16:56:46.637054: | delete_pluto_event cannot delete NULL event
- Jun 27 16:56:46.637058: | #1 send IKEv1 delete notification for STATE_MODE_CFG_R1
- Jun 27 16:56:46.637075: | **emit ISAKMP Message:
- Jun 27 16:56:46.637079: | initiator cookie:
- Jun 27 16:56:46.637081: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:46.637084: | responder cookie:
- Jun 27 16:56:46.637087: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.637100: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:46.637103: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:46.637107: | exchange type: ISAKMP_XCHG_INFO (0x5)
- Jun 27 16:56:46.637111: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:46.637114: | message ID: d9 d4 03 78
- Jun 27 16:56:46.637118: | next payload type: saving message location 'ISAKMP Message' 'next payload type'
- Jun 27 16:56:46.637121: | ***emit ISAKMP Hash Payload:
- Jun 27 16:56:46.637124: | next payload type: ISAKMP_NEXT_D (0xc)
- Jun 27 16:56:46.637128: | emitting 16 zero bytes of HASH(1) into ISAKMP Hash Payload
- Jun 27 16:56:46.637131: | emitting length of ISAKMP Hash Payload: 20
- Jun 27 16:56:46.637134: | ***emit ISAKMP Delete Payload:
- Jun 27 16:56:46.637137: | next payload type: ISAKMP_NEXT_NONE (0x0)
- Jun 27 16:56:46.637139: | DOI: ISAKMP_DOI_IPSEC (0x1)
- Jun 27 16:56:46.637142: | protocol ID: 1 (0x1)
- Jun 27 16:56:46.637145: | SPI size: 16 (0x10)
- Jun 27 16:56:46.637148: | number of SPIs: 1 (0x1)
- Jun 27 16:56:46.637151: | emitting 16 raw bytes of delete payload into ISAKMP Delete Payload
- Jun 27 16:56:46.637154: | delete payload 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.637157: | emitting length of ISAKMP Delete Payload: 28
- Jun 27 16:56:46.637236: | encrypting: 0c 00 00 14 22 5c 92 84 8d 4a 60 be 3d 3b d3 2b
- Jun 27 16:56:46.637241: | encrypting: af a2 60 b1 00 00 00 1c 00 00 00 01 01 10 00 01
- Jun 27 16:56:46.637244: | encrypting: 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.637247: | IV: ba 84 2d 2c f5 0b 67 b2 82 e7 f2 b8 f6 d9 dc b2
- Jun 27 16:56:46.637263: | no IKEv1 message padding required
- Jun 27 16:56:46.637266: | emitting length of ISAKMP Message: 76
- Jun 27 16:56:46.637273: | sending 76 bytes for delete notify through eth0:500 to 192.168.1.138:500 (using #1)
- Jun 27 16:56:46.637276: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.637279: | 08 10 05 01 d9 d4 03 78 00 00 00 4c b5 9b e2 10
- Jun 27 16:56:46.637282: | 18 80 3a 00 6f 00 22 b9 92 83 5e ec 4d 10 b4 cb
- Jun 27 16:56:46.637284: | ee c9 f1 9e 2d 4e be 8d 78 84 74 a0 8a d4 a2 a0
- Jun 27 16:56:46.637287: | f6 e8 3a 6e c5 e9 f6 fa 37 58 5d de
- Jun 27 16:56:46.637367: | state #1 requesting EVENT_SA_REPLACE to be deleted
- Jun 27 16:56:46.637388: | free_event_entry: release EVENT_SA_REPLACE-pe@0x555eacc30858
- Jun 27 16:56:46.637393: | serialno list: removing object 0x555eacc32cf8 (state #1) entry 0x555eacc334a0 (older 0x555eabcab5c0 newer 0x555eabcab5c0)
- Jun 27 16:56:46.637396: | serialno list: empty
- Jun 27 16:56:46.637405: | serialno table: removing object 0x555eacc32cf8 (state #1) entry 0x555eacc334c0 (older 0x555eabc9e360 newer 0x555eabc9e360)
- Jun 27 16:56:46.637409: | serialno table: empty
- Jun 27 16:56:46.637413: | in connection_discard for connection xauth
- Jun 27 16:56:46.637417: | parent state #1: STATE_MODE_CFG_R1(established-authenticated-ike) => STATE_UNDEFINED(ignore)
- Jun 27 16:56:46.637420: | ignore states: 0
- Jun 27 16:56:46.637422: | half-open-ike states: 0
- Jun 27 16:56:46.637425: | open-ike states: 0
- Jun 27 16:56:46.637427: | established-anonymous-ike states: 0
- Jun 27 16:56:46.637430: | established-authenticated-ike states: 0
- Jun 27 16:56:46.637433: | anonymous-ipsec states: 0
- Jun 27 16:56:46.637435: | authenticated-ipsec states: 0
- Jun 27 16:56:46.637438: | informational states: 0
- Jun 27 16:56:46.637440: | unknown states: 0
- Jun 27 16:56:46.637443: | category states: 0 count states: 0
- Jun 27 16:56:46.637477: | processing: stop state #1 192.168.1.138:500 (in delete_state() at state.c:1198)
- Jun 27 16:56:46.637481: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.637483: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.637487: | processing: resume connection "xauth" (in delete_state() at state.c:1198)
- Jun 27 16:56:46.637508: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1335)
- Jun 27 16:56:46.637512: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.637514: | serialno table: hash serialno #1 to head 0x555eabc9e360
- Jun 27 16:56:46.637518: | processing: resume connection "xauth" (in foreach_state_by_connection_func_delete() at state.c:1335)
- Jun 27 16:56:46.637522: | processing: [RE]START connection "xauth"[2] 192.168.1.138 (in delete_connection() at connections.c:264)
- Jun 27 16:56:46.637527: "xauth"[2] 192.168.1.138: deleting connection "xauth"[2] 192.168.1.138 instance with peer 192.168.1.138 {isakmp=#0/ipsec=#0}
- Jun 27 16:56:46.637531: | addresspool free lease entry ptr 0x555eacc32918 refcnt 0
- Jun 27 16:56:46.637536: | freed lease refcnt 0 192.168.20.2 from addresspool 192.168.20.2-192.168.20.10 index=0. pool size 9 used 0 lingering=0 address
- Jun 27 16:56:46.637539: | Deleting states for connection - not including other IPsec SA's
- Jun 27 16:56:46.637541: | pass 0
- Jun 27 16:56:46.637544: | pass 1
- Jun 27 16:56:46.637548: | shunt_eroute() called for connection 'xauth' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0
- Jun 27 16:56:46.637551: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0
- Jun 27 16:56:46.637555: | priority calculation of connection "xauth" is 0xfffdf
- Jun 27 16:56:46.637571: | priority calculation of connection "xauth" is 0xfffdf
- Jun 27 16:56:46.637579: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:46.637582: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:46.637585: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:46.637588: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:46.637591: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:46.637594: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:46.637597: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:46.637600: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:46.637603: | conn xauth mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:46.637605: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:46.637609: | route owner of "xauth" unrouted: NULL
- Jun 27 16:56:46.637612: | running updown command "ipsec _updown" for verb unroute
- Jun 27 16:56:46.637615: | command executing unroute-client
- Jun 27 16:56:46.637633: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PLUTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE=''
- Jun 27 16:56:46.637641: | popen cmd is 1065 chars long
- Jun 27 16:56:46.637644: | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='xauth' PLUTO_I:
- Jun 27 16:56:46.637647: | cmd( 80):NTERFACE='eth0' PLUTO_NEXT_HOP='192.168.1.138' PLUTO_ME='192.168.1.137' PLUTO_MY:
- Jun 27 16:56:46.637650: | cmd( 160):_ID='192.168.1.137' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PL:
- Jun 27 16:56:46.637653: | cmd( 240):UTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_RE:
- Jun 27 16:56:46.637655: | cmd( 320):QID='16408' PLUTO_SA_TYPE='none' PLUTO_PEER='192.168.1.138' PLUTO_PEER_ID='@' PL:
- Jun 27 16:56:46.637658: | cmd( 400):UTO_PEER_CLIENT='192.168.20.2/32' PLUTO_PEER_CLIENT_NET='192.168.20.2' PLUTO_PEE:
- Jun 27 16:56:46.637661: | cmd( 480):R_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT:
- Jun 27 16:56:46.637664: | cmd( 560):O_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='PSK+ENCRY:
- Jun 27 16:56:46.637666: | cmd( 640):PT+TUNNEL+SHA2_TRUNCBUG+XAUTH+MODECFG_PULL+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+I:
- Jun 27 16:56:46.637669: | cmd( 720):KE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_GOING_AWAY' PLUTO_CONN_ADDRFAMILY='ipv:
- Jun 27 16:56:46.637672: | cmd( 800):4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMA:
- Jun 27 16:56:46.637675: | cmd( 880):IN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_:
- Jun 27 16:56:46.637677: | cmd( 960):NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_O:
- Jun 27 16:56:46.637680: | cmd(1040):UT=0x0 ipsec _updown 2>&1:
- Jun 27 16:56:46.646427: | unreference addresspool of conn xauth[2] kind CK_GOING_AWAY refcnt 3
- Jun 27 16:56:46.646464: | processing: stop connection "xauth" (in delete_connection() at connections.c:314)
- Jun 27 16:56:46.646476: | processing: STOP connection NULL (in accept_delete() at ikev1_main.c:2748)
- Jun 27 16:56:46.646480: | processing: STOP connection NULL (in accept_delete() at ikev1_main.c:2751)
- Jun 27 16:56:46.646484: | del:
- Jun 27 16:56:46.646490: packet from 192.168.1.138:500: received and ignored empty informational notification payload
- Jun 27 16:56:46.646495: | complete v1 state transition with STF_IGNORE
- Jun 27 16:56:46.646501: | processing: stop from 192.168.1.138:500 (in process_md() at demux.c:394)
- Jun 27 16:56:46.646506: | processing: STOP state #0 (in process_md() at demux.c:396)
- Jun 27 16:56:46.646510: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:46.646513: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:46.646516: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:46.646545: | *received 76 bytes from 192.168.1.138:500 on eth0 (port=500)
- Jun 27 16:56:46.646549: | 0e 20 a4 7f 26 01 0e 7b a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.646552: | 08 10 05 01 b4 46 db 89 00 00 00 4c e9 48 2f f3
- Jun 27 16:56:46.646555: | c5 15 8f 49 45 59 3f 3f d2 b3 a8 ce 86 20 1c 4c
- Jun 27 16:56:46.646557: | 30 23 25 cc 84 cd 9e af ab e7 b4 ca cb 70 8f ed
- Jun 27 16:56:46.646560: | 11 57 c3 14 cd 9c cc 19 02 79 27 46
- Jun 27 16:56:46.646565: | processing: start from 192.168.1.138:500 (in process_md() at demux.c:392)
- Jun 27 16:56:46.646570: | **parse ISAKMP Message:
- Jun 27 16:56:46.646573: | initiator cookie:
- Jun 27 16:56:46.646576: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:46.646579: | responder cookie:
- Jun 27 16:56:46.646581: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.646593: | next payload type: ISAKMP_NEXT_HASH (0x8)
- Jun 27 16:56:46.646597: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
- Jun 27 16:56:46.646601: | exchange type: ISAKMP_XCHG_INFO (0x5)
- Jun 27 16:56:46.646605: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1)
- Jun 27 16:56:46.646608: | message ID: b4 46 db 89
- Jun 27 16:56:46.646611: | length: 76 (0x4c)
- Jun 27 16:56:46.646614: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
- Jun 27 16:56:46.646621: | cookies table: hash icookie 0e 20 a4 7f 26 01 0e 7b rcookie a8 fa ce 73 0d 44 8c 4b to 8703804519041008950 slot 0x555eabc983c0
- Jun 27 16:56:46.646624: | p15 state object not found
- Jun 27 16:56:46.646629: | icookie table: hash icookie 0e 20 a4 7f 26 01 0e 7b to 886872774674875013 slot 0x555eabc9ac60
- Jun 27 16:56:46.646631: | v1 state object not found
- Jun 27 16:56:46.646635: | Informational Exchange is for an unknown (expired?) SA with MSGID:0x89db46b4
- Jun 27 16:56:46.646637: | - unknown SA's md->hdr.isa_icookie:
- Jun 27 16:56:46.646640: | 0e 20 a4 7f 26 01 0e 7b
- Jun 27 16:56:46.646643: | - unknown SA's md->hdr.isa_rcookie:
- Jun 27 16:56:46.646645: | a8 fa ce 73 0d 44 8c 4b
- Jun 27 16:56:46.646649: | processing: stop from 192.168.1.138:500 (in process_md() at demux.c:394)
- Jun 27 16:56:46.646652: | processing: STOP state #0 (in process_md() at demux.c:396)
- Jun 27 16:56:46.646655: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:46.646658: | serialno table: hash serialno #0 to head 0x555eabc9e340
- Jun 27 16:56:46.646661: | processing: STOP connection NULL (in process_md() at demux.c:397)
- Jun 27 16:56:46.646670: | waitpid returned ECHILD (no child processes left)
- Jun 27 16:56:46.646674: | waitpid returned ECHILD (no child processes left)
- Jun 27 16:56:51.965375: | timer_event_cb: processing event@0x555eacc30518
- Jun 27 16:56:51.965447: | handling event EVENT_SHUNT_SCAN
- Jun 27 16:56:51.965454: | expiring aged bare shunts from shunt table
- Jun 27 16:56:51.965463: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x555eacc30858
- Jun 27 16:56:51.965470: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
- Jun 27 16:56:51.965484: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x555eacc30518
- Jun 27 16:56:52.266368: shutting down
- Jun 27 16:56:52.266385: | processing: RESET whack log_fd (was 15) (in exit_pluto() at plutomain.c:1784)
- Jun 27 16:56:52.266390: | pluto_sd: executing action action: stopping(6), status 0
- Jun 27 16:56:52.266408: | certs and keys locked by 'free_preshared_secrets'
- Jun 27 16:56:52.266411: forgetting secrets
- Jun 27 16:56:52.266417: | certs and keys unlocked by 'free_preshard_secrets'
- Jun 27 16:56:52.266422: | processing: start connection "v6neighbor-hole-out" (in delete_connection() at connections.c:264)
- Jun 27 16:56:52.266425: "v6neighbor-hole-out": deleting non-instance connection
- Jun 27 16:56:52.266428: | Deleting states for connection - including all other IPsec SA's of this IKE SA
- Jun 27 16:56:52.266431: | pass 0
- Jun 27 16:56:52.266433: | pass 1
- Jun 27 16:56:52.266438: | shunt_eroute() called for connection 'v6neighbor-hole-out' to 'delete' for rt_kind 'unrouted' using protoports 58--34816->-34560
- Jun 27 16:56:52.266442: | netlink_shunt_eroute for proto 58, and source port 34816 dest port 34560
- Jun 27 16:56:52.266447: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
- Jun 27 16:56:52.266471: | priority calculation of connection "v6neighbor-hole-out" overruled by connection specification of 0x1
- Jun 27 16:56:52.266484: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.266487: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000
- Jun 27 16:56:52.266490: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.266493: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:52.266496: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.266498: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:52.266501: | conn v6neighbor-hole-out mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.266510: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:52.266514: | route owner of "v6neighbor-hole-out" unrouted: NULL
- Jun 27 16:56:52.266517: | running updown command "ipsec _updown" for verb unroute
- Jun 27 16:56:52.266520: | command executing unroute-client-v6
- Jun 27 16:56:52.266538: | executing unroute-client-v6: PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
- Jun 27 16:56:52.266542: | popen cmd is 903 chars long
- Jun 27 16:56:52.266545: | cmd( 0):PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
- Jun 27 16:56:52.266548: | cmd( 80):hole-out' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=:
- Jun 27 16:56:52.266550: | cmd( 160):'::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34816' :
- Jun 27 16:56:52.266553: | cmd( 240):PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='::
- Jun 27 16:56:52.266555: | cmd( 320)::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUT:
- Jun 27 16:56:52.266558: | cmd( 400):O_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34560' PLUTO_PEER_PROTOCOL='58' PLUTO_P:
- Jun 27 16:56:52.266560: | cmd( 480):EER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+P:
- Jun 27 16:56:52.266563: | cmd( 560):ASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6':
- Jun 27 16:56:52.266565: | cmd( 640): XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN:
- Jun 27 16:56:52.266568: | cmd( 720):_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM:
- Jun 27 16:56:52.266570: | cmd( 800):_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT:
- Jun 27 16:56:52.266573: | cmd( 880):=0x0 ipsec _updown 2>&1:
- Jun 27 16:56:52.269881: | processing: stop connection "v6neighbor-hole-out" (in delete_connection() at connections.c:314)
- Jun 27 16:56:52.269894: | processing: start connection "v6neighbor-hole-in" (in delete_connection() at connections.c:264)
- Jun 27 16:56:52.269898: "v6neighbor-hole-in": deleting non-instance connection
- Jun 27 16:56:52.269901: | Deleting states for connection - including all other IPsec SA's of this IKE SA
- Jun 27 16:56:52.269904: | pass 0
- Jun 27 16:56:52.269906: | pass 1
- Jun 27 16:56:52.269910: | shunt_eroute() called for connection 'v6neighbor-hole-in' to 'delete' for rt_kind 'unrouted' using protoports 58--34560->-34816
- Jun 27 16:56:52.269913: | netlink_shunt_eroute for proto 58, and source port 34560 dest port 34816
- Jun 27 16:56:52.269916: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
- Jun 27 16:56:52.269933: | priority calculation of connection "v6neighbor-hole-in" overruled by connection specification of 0x1
- Jun 27 16:56:52.269945: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.269948: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000
- Jun 27 16:56:52.269950: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.269953: | conn xauth mark 0/00000000, 0/00000000
- Jun 27 16:56:52.269955: | conn v6neighbor-hole-in mark 0/00000000, 0/00000000 vs
- Jun 27 16:56:52.269963: | conn xauth-aggr mark 0/00000000, 0/00000000
- Jun 27 16:56:52.269967: | route owner of "v6neighbor-hole-in" unrouted: NULL
- Jun 27 16:56:52.269969: | running updown command "ipsec _updown" for verb unroute
- Jun 27 16:56:52.269972: | command executing unroute-client-v6
- Jun 27 16:56:52.269989: | executing unroute-client-v6: PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT='::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' PLUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='::' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PASS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1
- Jun 27 16:56:52.269993: | popen cmd is 902 chars long
- Jun 27 16:56:52.269996: | cmd( 0):PLUTO_VERB='unroute-client-v6' PLUTO_VERSION='2.0' PLUTO_CONNECTION='v6neighbor-:
- Jun 27 16:56:52.269998: | cmd( 80):hole-in' PLUTO_INTERFACE='lo' PLUTO_ME='::1' PLUTO_MY_ID='::1' PLUTO_MY_CLIENT=':
- Jun 27 16:56:52.270001: | cmd( 160):::/0' PLUTO_MY_CLIENT_NET='::' PLUTO_MY_CLIENT_MASK='::' PLUTO_MY_PORT='34560' P:
- Jun 27 16:56:52.270003: | cmd( 240):LUTO_MY_PROTOCOL='58' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER=':::
- Jun 27 16:56:52.270006: | cmd( 320):' PLUTO_PEER_ID='%any' PLUTO_PEER_CLIENT='::/0' PLUTO_PEER_CLIENT_NET='::' PLUTO:
- Jun 27 16:56:52.270009: | cmd( 400):_PEER_CLIENT_MASK='::' PLUTO_PEER_PORT='34816' PLUTO_PEER_PROTOCOL='58' PLUTO_PE:
- Jun 27 16:56:52.270011: | cmd( 480):ER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='AUTH_NEVER+PA:
- Jun 27 16:56:52.270014: | cmd( 560):SS+NEVER_NEGOTIATE' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv6' :
- Jun 27 16:56:52.270016: | cmd( 640):XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_:
- Jun 27 16:56:52.270019: | cmd( 720):INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_:
- Jun 27 16:56:52.270021: | cmd( 800):CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=:
- Jun 27 16:56:52.270024: | cmd( 880):0x0 ipsec _updown 2>&1:
- Jun 27 16:56:52.272347: | processing: stop connection "v6neighbor-hole-in" (in delete_connection() at connections.c:314)
- Jun 27 16:56:52.272362: | processing: start connection "xauth" (in delete_connection() at connections.c:264)
- Jun 27 16:56:52.272365: "xauth": deleting non-instance connection
- Jun 27 16:56:52.272369: | Deleting states for connection - including all other IPsec SA's of this IKE SA
- Jun 27 16:56:52.272371: | pass 0
- Jun 27 16:56:52.272374: | pass 1
- Jun 27 16:56:52.272377: | unreference addresspool of conn xauth[2] kind CK_TEMPLATE refcnt 2
- Jun 27 16:56:52.272380: | processing: stop connection "xauth" (in delete_connection() at connections.c:314)
- Jun 27 16:56:52.272384: | processing: start connection "xauth-aggr" (in delete_connection() at connections.c:264)
- Jun 27 16:56:52.272387: "xauth-aggr": deleting non-instance connection
- Jun 27 16:56:52.272390: | Deleting states for connection - including all other IPsec SA's of this IKE SA
- Jun 27 16:56:52.272392: | pass 0
- Jun 27 16:56:52.272394: | pass 1
- Jun 27 16:56:52.272397: | unreference addresspool of conn xauth-aggr[0] kind CK_TEMPLATE refcnt 1
- Jun 27 16:56:52.272400: | freeing memory for addresspool ptr 0x555eacc2f158
- Jun 27 16:56:52.272403: | free_lease_list: addresspool free the lease list ptr (nil)
- Jun 27 16:56:52.272407: | processing: stop connection "xauth-aggr" (in delete_connection() at connections.c:314)
- Jun 27 16:56:52.272411: | crl fetch request list locked by 'free_crl_fetch'
- Jun 27 16:56:52.272418: | crl fetch request list unlocked by 'free_crl_fetch'
- Jun 27 16:56:52.272427: shutting down interface lo/lo ::1:500
- Jun 27 16:56:52.272430: shutting down interface lo/lo 127.0.0.1:4500
- Jun 27 16:56:52.272433: shutting down interface lo/lo 127.0.0.1:500
- Jun 27 16:56:52.272435: shutting down interface eth0/eth0 192.168.1.137:4500
- Jun 27 16:56:52.272438: shutting down interface eth0/eth0 192.168.1.137:500
- Jun 27 16:56:52.272449: | free_event_entry: release EVENT_NULL-pe@0x555eacc2ff18
- Jun 27 16:56:52.272463: | free_event_entry: release EVENT_NULL-pe@0x555eacc30018
- Jun 27 16:56:52.272471: | free_event_entry: release EVENT_NULL-pe@0x555eacc30118
- Jun 27 16:56:52.272477: | free_event_entry: release EVENT_NULL-pe@0x555eacc30218
- Jun 27 16:56:52.272482: | free_event_entry: release EVENT_NULL-pe@0x555eacc30418
- Jun 27 16:56:52.272621: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x555eacc30858
- Jun 27 16:56:52.272627: | free_event_entry: release EVENT_NAT_T_KEEPALIVE-pe@0x555eacc31d58
- Jun 27 16:56:52.272632: | free_event_entry: release EVENT_NULL-pe@0x555eacc2dd38
- Jun 27 16:56:52.272635: | free_event_entry: release EVENT_NULL-pe@0x555eacc2db98
- Jun 27 16:56:52.272639: | free_event_entry: release EVENT_NULL-pe@0x555eacc2d848
- Jun 27 16:56:52.272644: | free_event_entry: release EVENT_NULL-pe@0x555eacc2d748
- Jun 27 16:56:52.272647: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x555eacc2af88
- Jun 27 16:56:52.272653: | free_event_entry: release EVENT_NULL-pe@0x555eacc2ae88
- Jun 27 16:56:52.272658: | free_event_entry: release EVENT_NULL-pe@0x555eacc2ad88
- Jun 27 16:56:52.272661: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x555eacc1df08
- Jun 27 16:56:52.272664: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x555eacc1de08
- Jun 27 16:56:52.272667: | free_event_entry: release EVENT_REINIT_SECRET-pe@0x555eacc1dcb8
- Jun 27 16:56:52.272698: leak detective found no leaks
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement