Jan 13 22:56:50.082820: | spent 0.00996 (0.0099) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:57:08.748843: | spent 0.00676 (0.00675) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.748945: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.748976: | addref struct iface_endpoint@0x55c83801ef68(7->8) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.748995: | newref alloc logger@0x55c838043798(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.749026: | *received 632 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 22:57:08.749048: | 8d 77 44 17 30 6b 26 bc 00 00 00 00 00 00 00 00 .wD.0k&......... Jan 13 22:57:08.749064: | 21 20 22 08 00 00 00 00 00 00 02 78 22 00 00 88 ! "........x"... Jan 13 22:57:08.749084: | 02 00 00 2c 01 01 00 04 03 00 00 0c 01 00 00 0c ...,............ Jan 13 22:57:08.749098: | 80 0e 01 00 03 00 00 08 03 00 00 02 03 00 00 08 ................ Jan 13 22:57:08.749113: | 02 00 00 02 00 00 00 08 04 00 00 0e 02 00 00 2c ..............., Jan 13 22:57:08.749131: | 02 01 00 04 03 00 00 0c 01 00 00 0c 80 0e 01 00 ................ Jan 13 22:57:08.749146: | 03 00 00 08 03 00 00 0c 03 00 00 08 02 00 00 05 ................ Jan 13 22:57:08.749164: | 00 00 00 08 04 00 00 0e 00 00 00 2c 03 01 00 04 ...........,.... Jan 13 22:57:08.749179: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 ................ Jan 13 22:57:08.749193: | 03 00 00 0d 03 00 00 08 02 00 00 06 00 00 00 08 ................ Jan 13 22:57:08.749206: | 04 00 00 0e 28 00 01 08 00 0e 00 00 19 86 da 86 ....(........... Jan 13 22:57:08.749220: | 86 61 d0 17 f8 a9 14 e2 08 3a fa 11 52 99 c7 51 .a.......:..R..Q Jan 13 22:57:08.749239: | d4 d3 9e 74 ab 68 00 50 9d e3 f9 0f ec 0e f3 0d ...t.h.P........ Jan 13 22:57:08.749253: | 2a b2 50 2f 8f e7 cd 5b ec bb 02 82 18 63 c6 a8 *.P/...[.....c.. Jan 13 22:57:08.749268: | dc 64 53 df 99 ec ce 78 79 14 97 7c 48 42 d8 81 .dS....xy..|HB.. Jan 13 22:57:08.749282: | 67 10 cc 39 22 6c 92 a6 c9 c3 34 3d cd 40 f4 e1 g..9"l....4=.@.. Jan 13 22:57:08.749297: | 91 2c bc b5 18 21 05 1d 1d 2f 43 b6 6c c9 e1 f5 .,...!.../C.l... Jan 13 22:57:08.749316: | bf 55 09 7c 7e a2 73 96 b2 78 c3 a4 3c 6d eb 94 .U.|~.s..x..w..?.].. Jan 13 22:57:08.749421: | 3d da ce 7e 18 ce 7a af bc ff bc c9 57 8f 67 de =..~..z.....W.g. Jan 13 22:57:08.749436: | 17 a7 f5 79 e3 90 ed ae 80 dd 00 8b a3 59 df 14 ...y.........Y.. Jan 13 22:57:08.749450: | e2 ef cc 05 5c ff c2 4d 6b c5 62 3f 61 33 18 95 ....\..Mk.b?a3.. Jan 13 22:57:08.749464: | b6 cf 9a c2 86 21 8a 54 3e 69 a5 ae d3 87 71 f1 .....!.T>i....q. Jan 13 22:57:08.749479: | 20 32 1c e7 f9 70 9b 99 85 1c e0 37 29 00 00 34 2...p.....7)..4 Jan 13 22:57:08.749493: | 1e 7a 38 70 7c 59 e9 b1 00 08 05 7c 85 ad 81 15 .z8p|Y.....|.... Jan 13 22:57:08.749507: | 98 29 62 8b f3 94 0a c7 0f e7 32 fd e1 a6 19 fb .)b.......2..... Jan 13 22:57:08.749521: | f3 b7 98 09 18 4c 10 f5 e8 12 70 12 63 12 e5 00 .....L....p.c... Jan 13 22:57:08.749535: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 ).....@.).....@. Jan 13 22:57:08.749549: | eb a8 c8 a5 a1 ff e7 0c 9b 5f 4f 69 3a fe bf b1 ........._Oi:... Jan 13 22:57:08.749564: | e8 66 59 ad 2b 00 00 1c 00 00 40 05 d9 e0 3e c2 .fY.+.....@...>. Jan 13 22:57:08.749578: | 6e 8a f3 f0 78 02 fa 80 20 25 59 87 2f 5d 49 8c n...x... %Y./]I. Jan 13 22:57:08.749591: | 2b 00 00 18 1e 2b 51 69 05 99 1c 7d 7c 96 fc bf +....+Qi...}|... Jan 13 22:57:08.749605: | b5 87 e4 61 00 00 00 09 2b 00 00 14 fb 1d e3 cd ...a....+....... Jan 13 22:57:08.749619: | f3 41 b7 ea 16 b7 e5 be 08 55 f1 20 2b 00 00 14 .A.......U. +... Jan 13 22:57:08.749633: | 26 24 4d 38 ed db 61 b3 17 2a 36 e3 d0 cf b8 19 &$M8..a..*6..... Jan 13 22:57:08.749647: | 00 00 00 18 01 52 8b bb c0 06 96 12 18 49 ab 9a .....R.......I.. Jan 13 22:57:08.749661: | 1c 5b 2a 51 00 00 00 02 .[*Q.... Jan 13 22:57:08.749686: | **parse ISAKMP Message: Jan 13 22:57:08.749714: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.749736: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 22:57:08.749755: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 22:57:08.749771: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.749787: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Jan 13 22:57:08.749802: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 22:57:08.749821: | Message ID: 0 (00 00 00 00) Jan 13 22:57:08.749842: | length: 632 (00 00 02 78) Jan 13 22:57:08.749860: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Jan 13 22:57:08.749882: | I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request Jan 13 22:57:08.749900: | State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi) Jan 13 22:57:08.749920: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 22:57:08.749937: | ***parse IKEv2 Security Association Payload: Jan 13 22:57:08.749952: | next payload type: ISAKMP_NEXT_v2KE (0x22) Jan 13 22:57:08.749972: | flags: none (0x0) Jan 13 22:57:08.749990: | length: 136 (00 88) Jan 13 22:57:08.750006: | processing payload: ISAKMP_NEXT_v2SA (len=132) Jan 13 22:57:08.750023: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Jan 13 22:57:08.750039: | ***parse IKEv2 Key Exchange Payload: Jan 13 22:57:08.750053: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 22:57:08.750068: | flags: none (0x0) Jan 13 22:57:08.750084: | length: 264 (01 08) Jan 13 22:57:08.750101: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 22:57:08.750116: | processing payload: ISAKMP_NEXT_v2KE (len=256) Jan 13 22:57:08.750131: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 22:57:08.750145: | ***parse IKEv2 Nonce Payload: Jan 13 22:57:08.750159: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 22:57:08.750173: | flags: none (0x0) Jan 13 22:57:08.750194: | length: 52 (00 34) Jan 13 22:57:08.750209: | processing payload: ISAKMP_NEXT_v2Ni (len=48) Jan 13 22:57:08.750223: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 22:57:08.750237: | ***parse IKEv2 Notify Payload: Jan 13 22:57:08.750271: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 22:57:08.750290: | flags: none (0x0) Jan 13 22:57:08.750307: | length: 8 (00 08) Jan 13 22:57:08.750322: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.750338: | SPI size: 0 (00) Jan 13 22:57:08.750356: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Jan 13 22:57:08.750373: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 22:57:08.750388: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 22:57:08.750402: | ***parse IKEv2 Notify Payload: Jan 13 22:57:08.750420: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 22:57:08.750436: | flags: none (0x0) Jan 13 22:57:08.750453: | length: 28 (00 1c) Jan 13 22:57:08.750471: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.750488: | SPI size: 0 (00) Jan 13 22:57:08.750503: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Jan 13 22:57:08.750518: | processing payload: ISAKMP_NEXT_v2N (len=20) Jan 13 22:57:08.750536: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 22:57:08.750551: | ***parse IKEv2 Notify Payload: Jan 13 22:57:08.750566: | next payload type: ISAKMP_NEXT_v2V (0x2b) Jan 13 22:57:08.750580: | flags: none (0x0) Jan 13 22:57:08.750596: | length: 28 (00 1c) Jan 13 22:57:08.750614: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.750631: | SPI size: 0 (00) Jan 13 22:57:08.750650: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Jan 13 22:57:08.750665: | processing payload: ISAKMP_NEXT_v2N (len=20) Jan 13 22:57:08.750680: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Jan 13 22:57:08.750694: | ***parse IKEv2 Vendor ID Payload: Jan 13 22:57:08.750707: | next payload type: ISAKMP_NEXT_v2V (0x2b) Jan 13 22:57:08.750721: | flags: none (0x0) Jan 13 22:57:08.750742: | length: 24 (00 18) Jan 13 22:57:08.750758: | processing payload: ISAKMP_NEXT_v2V (len=20) Jan 13 22:57:08.750772: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Jan 13 22:57:08.750786: | ***parse IKEv2 Vendor ID Payload: Jan 13 22:57:08.750802: | next payload type: ISAKMP_NEXT_v2V (0x2b) Jan 13 22:57:08.750821: | flags: none (0x0) Jan 13 22:57:08.750839: | length: 20 (00 14) Jan 13 22:57:08.750853: | processing payload: ISAKMP_NEXT_v2V (len=16) Jan 13 22:57:08.750868: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Jan 13 22:57:08.750886: | ***parse IKEv2 Vendor ID Payload: Jan 13 22:57:08.750901: | next payload type: ISAKMP_NEXT_v2V (0x2b) Jan 13 22:57:08.750916: | flags: none (0x0) Jan 13 22:57:08.750932: | length: 20 (00 14) Jan 13 22:57:08.750946: | processing payload: ISAKMP_NEXT_v2V (len=16) Jan 13 22:57:08.750961: | Now let's proceed with payload (ISAKMP_NEXT_v2V) Jan 13 22:57:08.750974: | ***parse IKEv2 Vendor ID Payload: Jan 13 22:57:08.750989: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.751003: | flags: none (0x0) Jan 13 22:57:08.751020: | length: 24 (00 18) Jan 13 22:57:08.751034: | processing payload: ISAKMP_NEXT_v2V (len=20) Jan 13 22:57:08.751048: | DDOS disabled and no cookie sent, continuing Jan 13 22:57:08.751073: | looking for transition from PARENT_R0 matching IKE_SA_INIT request: SA,KE,Ni,N,N,N,V,V,V,V Jan 13 22:57:08.751094: | trying: Respond to IKE_SA_INIT Jan 13 22:57:08.751111: | unsecured message matched Jan 13 22:57:08.751136: | ikev2_find_host_connection() 94.253.210.164->161.53.235.3 policy=ECDSA Jan 13 22:57:08.751163: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (ikev2_find_host_connection() +115 programs/pluto/ikev2_host_pair.c) Jan 13 22:57:08.751199: | host_pair: 94.253.210.164->161.53.235.3 matches "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 22:57:08.751224: | skipping "L2TP-PSK-NAT"[1] 94.253.210.164, not IKEv2 Jan 13 22:57:08.751244: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (ikev2_find_host_connection() +170 programs/pluto/ikev2_host_pair.c) Jan 13 22:57:08.751266: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 22:57:08.751301: | skipping "MYCONN-ikev2-cp", missing policy Jan 13 22:57:08.751318: | skipping "L2TP-PSK-NAT", not IKEv2 Jan 13 22:57:08.751332: | skipping "L2TP-PSK-noNAT", not IKEv2 Jan 13 22:57:08.751347: | skipping "L2TP-PSK-common", not IKEv2 Jan 13 22:57:08.751367: | ISAKMP_v2_IKE_SA_INIT message received on 161.53.235.3:500 but no connection has been authorized with policy ECDSA Jan 13 22:57:08.751393: | ikev2_find_host_connection() 94.253.210.164->161.53.235.3 policy=RSASIG Jan 13 22:57:08.751421: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (ikev2_find_host_connection() +115 programs/pluto/ikev2_host_pair.c) Jan 13 22:57:08.751448: | host_pair: 94.253.210.164->161.53.235.3 matches "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 22:57:08.751470: | skipping "L2TP-PSK-NAT"[1] 94.253.210.164, not IKEv2 Jan 13 22:57:08.751489: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (ikev2_find_host_connection() +170 programs/pluto/ikev2_host_pair.c) Jan 13 22:57:08.751511: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 22:57:08.751526: | accepting non-opportunistic Jan 13 22:57:08.751539: | rw_instantiate Jan 13 22:57:08.751560: | newref MYCONN-ikev2-cp@0x55c83803cca8(0->1) (instantiate() +2587 programs/pluto/connections.c) Jan 13 22:57:08.751581: | newref alloc logger@0x55c83802e6d8(0->1) (instantiate() +2587 programs/pluto/connections.c) Jan 13 22:57:08.751603: | entry connection hash_table_entries.serialno@0x55c83803cca8 "MYCONN-ikev2-cp" $1 initialized Jan 13 22:57:08.751634: | entry connection hash_table_entries.that_id@0x55c83803cca8 "MYCONN-ikev2-cp" $1: that_id=O=ALU-UNIZG, CN=win7client.alu.hr initialized Jan 13 22:57:08.751658: | entry spd_route hash_table_entries.remote_client@0x55c83803cdc8 "MYCONN-ikev2-cp" initialized Jan 13 22:57:08.751679: | addref struct iface_endpoint@0x55c83801ef68(8->9) (unshare_connection() +781 programs/pluto/connections.c) Jan 13 22:57:08.751705: | addref vip@NULL (unshare_connection_end() +739 programs/pluto/connections.c) Jan 13 22:57:08.751727: | addref vip@NULL (unshare_connection_end() +739 programs/pluto/connections.c) Jan 13 22:57:08.751753: | pool 192.168.101.10-192.168.101.253: adding connection "MYCONN-ikev2-cp" of kind CK_TEMPLATE Jan 13 22:57:08.751776: | updating ends from right.host_addr 94.253.210.164 Jan 13 22:57:08.751796: | updated left.host_nexthop to 94.253.210.164 Jan 13 22:57:08.751815: | updated right.host_port to 500 Jan 13 22:57:08.751838: | updated right.client to 94.253.210.164/32 Jan 13 22:57:08.751862: | updating ends from left.host_addr 161.53.235.3 Jan 13 22:57:08.751878: | updated left.host_port to 500 Jan 13 22:57:08.751901: | MYCONN-ikev2-cp d->spd.reqid=16420 because c->sa_reqid=0 Jan 13 22:57:08.751927: | looking for host pair matching 94.253.210.164->161.53.235.3 Jan 13 22:57:08.751962: | entry connection hash_table_entries.serialno@0x55c83803cca8 "MYCONN-ikev2-cp"[2] 94.253.210.164 $9 added to hash table bucket 0x55c836596ba0 Jan 13 22:57:08.752004: | entry connection hash_table_entries.that_id@0x55c83803cca8 "MYCONN-ikev2-cp"[2] 94.253.210.164 $9: that_id=O=ALU-UNIZG, CN=win7client.alu.hr added to hash table bucket 0x55c83658fa40 Jan 13 22:57:08.752038: | entry spd_route hash_table_entries.remote_client@0x55c83803cdc8 "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 94.253.210.164/32 added to hash table bucket 0x55c83658b680 Jan 13 22:57:08.752068: | instantiated $1 "MYCONN-ikev2-cp" as $9 "MYCONN-ikev2-cp"[2] 94.253.210.164 using kind=CK_INSTANCE remote_address=94.253.210.164 remote_id=N/A sec_label= Jan 13 22:57:08.752095: | rw_instantiate() instantiated "MYCONN-ikev2-cp"[2] 94.253.210.164 for 94.253.210.164 Jan 13 22:57:08.752117: | found connection: "MYCONN-ikev2-cp"[2] 94.253.210.164 with policy RSASIG Jan 13 22:57:08.752140: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (find_v2_host_pair_connection() +343 programs/pluto/ikev2_host_pair.c) Jan 13 22:57:08.752161: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 22:57:08.752251: | newref alloc logger@0x55c838017da8(0->1) (new_v2_ike_state() +505 programs/pluto/state.c) Jan 13 22:57:08.752275: | addref fd@NULL (new_v2_ike_state() +505 programs/pluto/state.c) Jan 13 22:57:08.752299: | entry state hash_table_entries.serialno@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 initialized Jan 13 22:57:08.752340: | entry state hash_table_entries.connection_serialno@0x55c83804e468 $9 initialized Jan 13 22:57:08.752364: | entry state hash_table_entries.reqid@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: reqid=0 initialized Jan 13 22:57:08.752394: | entry state hash_table_entries.ike_initiator_spi@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: 00 00 00 00 00 00 00 00 initialized Jan 13 22:57:08.752431: | entry state hash_table_entries.ike_spis@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 22:57:08.752452: | creating state object #41 at 0x55c83804e468 Jan 13 22:57:08.752480: | entry state hash_table_entries.serialno@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 added to hash table bucket 0x55c836587f60 Jan 13 22:57:08.752502: | entry state hash_table_entries.connection_serialno@0x55c83804e468 $9 added to hash table bucket 0x55c8365870e0 Jan 13 22:57:08.752525: | entry state hash_table_entries.reqid@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 22:57:08.752555: | entry state hash_table_entries.ike_initiator_spi@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: 8d 77 44 17 30 6b 26 bc added to hash table bucket 0x55c83657eca0 Jan 13 22:57:08.752596: | entry state hash_table_entries.ike_spis@0x55c83804e468 "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e added to hash table bucket 0x55c83657b6e0 Jan 13 22:57:08.752616: | pstats #41 ikev2.ike started Jan 13 22:57:08.752635: | parent state #41: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA) Jan 13 22:57:08.752656: | #41.st_v2_transition NULL -> PARENT_R0->PARENT_R1 (new_v2_ike_state() +510 programs/pluto/state.c) Jan 13 22:57:08.752694: | Message ID: IKE #41 initializing (IKE SA): ike.initiator .sent=0->-1 .recv=0->-1 .recv_frags=0 .recv_wip=0->-1 .last_contact=0->9594096.773743 ike.responder .sent=0->-1 .recv=0->-1 .recv_frags=0 .recv_wip=0->-1 .last_contact=0->9594096.773743 ike.wip.initiator=0->-1 Jan 13 22:57:08.752714: | delref struct iface_endpoint@0x55c83801ef68(9->8) (initialize_new_state() +224 programs/pluto/ipsec_doi.c) Jan 13 22:57:08.752736: | orienting "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.752758: | left(THIS) host-address=161.53.235.3 host-port=500 ikeport=0 encap=no Jan 13 22:57:08.752778: | right(THAT) host-address=94.253.210.164 host-port=500 ikeport=0 encap=no Jan 13 22:57:08.752802: | interface endpoint [::1]:500 does not match left(THIS) or right(THAT) Jan 13 22:57:08.752825: | interface endpoint 127.0.0.1:4500 does not match left(THIS) or right(THAT) Jan 13 22:57:08.752846: | interface endpoint 127.0.0.1:500 does not match left(THIS) or right(THAT) Jan 13 22:57:08.752867: | interface endpoint 161.53.235.3:4500 does not match left(THIS) or right(THAT) Jan 13 22:57:08.752890: | interface endpoint 161.53.235.3:500 matches left(THIS); orienting Jan 13 22:57:08.752910: | interface endpoint 192.168.100.1:4500 does not match left(THIS) or right(THAT) Jan 13 22:57:08.752932: | interface endpoint 192.168.100.1:500 does not match left(THIS) or right(THAT) Jan 13 22:57:08.752951: | addref struct iface_endpoint@0x55c83801ef68(8->9) (orient() +299 programs/pluto/orient.c) Jan 13 22:57:08.752971: | addref struct iface_endpoint@0x55c83801ef68(9->10) (initialize_new_state() +227 programs/pluto/ipsec_doi.c) Jan 13 22:57:08.752990: | in initialize_new_state with remote endpoint set to 94.253.210.164:500 Jan 13 22:57:08.753016: | event_schedule_where: newref EVENT_SA_DISCARD-pe@0x55c83800da48 timeout in 200 seconds for #41 Jan 13 22:57:08.753038: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.753086: | #41 spent 4.26 (4.26) milliseconds Jan 13 22:57:08.753112: | #41.st_v2_transition PARENT_R0->PARENT_R1 -> PARENT_R0->PARENT_R1 (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 22:57:08.753143: | Message ID: IKE #41 responder starting message request 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=-1 .recv=-1 .recv_frags=0 .recv_wip=0 .last_contact=9594096.773743 ike.wip.initiator=-1 Jan 13 22:57:08.753161: | calling processor Respond to IKE_SA_INIT Jan 13 22:57:08.753182: | #41 spent 4.36 (4.36) milliseconds Jan 13 22:57:08.753210: | #41 updating local interface from 161.53.235.3:500 to 161.53.235.3:500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 22:57:08.753231: | delref struct iface_endpoint@0x55c83801ef68(10->9) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 22:57:08.753249: | addref struct iface_endpoint@0x55c83801ef68(9->10) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 22:57:08.753267: | ignoring Vendor ID payload [Windows 8, 8.1, 10, Server 2012 R2, Server 2016] Jan 13 22:57:08.753286: | ignoring Vendor ID payload [MS-Negotiation Discovery Capable] Jan 13 22:57:08.753306: | ignoring Vendor ID payload [Vid-Initial-Contact] Jan 13 22:57:08.753325: | ignoring Vendor ID payload [Windows KEY_MODS (IKEv2)] Jan 13 22:57:08.753341: | comparing remote proposals against IKE responder 4 local proposals Jan 13 22:57:08.753361: | local proposal 1 type ENCR has 1 transforms Jan 13 22:57:08.753383: | local proposal 1 type PRF has 2 transforms Jan 13 22:57:08.753400: | local proposal 1 type INTEG has 1 transforms Jan 13 22:57:08.753415: | local proposal 1 type DH has 8 transforms Jan 13 22:57:08.753435: | local proposal 1 type ESN has 0 transforms Jan 13 22:57:08.753453: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Jan 13 22:57:08.753473: | local proposal 2 type ENCR has 1 transforms Jan 13 22:57:08.753489: | local proposal 2 type PRF has 2 transforms Jan 13 22:57:08.753505: | local proposal 2 type INTEG has 1 transforms Jan 13 22:57:08.753520: | local proposal 2 type DH has 8 transforms Jan 13 22:57:08.753539: | local proposal 2 type ESN has 0 transforms Jan 13 22:57:08.753556: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Jan 13 22:57:08.753571: | local proposal 3 type ENCR has 1 transforms Jan 13 22:57:08.753585: | local proposal 3 type PRF has 2 transforms Jan 13 22:57:08.753604: | local proposal 3 type INTEG has 2 transforms Jan 13 22:57:08.753620: | local proposal 3 type DH has 8 transforms Jan 13 22:57:08.753635: | local proposal 3 type ESN has 0 transforms Jan 13 22:57:08.753652: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Jan 13 22:57:08.753669: | local proposal 4 type ENCR has 1 transforms Jan 13 22:57:08.753686: | local proposal 4 type PRF has 2 transforms Jan 13 22:57:08.753701: | local proposal 4 type INTEG has 2 transforms Jan 13 22:57:08.753716: | local proposal 4 type DH has 8 transforms Jan 13 22:57:08.753734: | local proposal 4 type ESN has 0 transforms Jan 13 22:57:08.753752: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Jan 13 22:57:08.753769: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.753787: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 22:57:08.753805: | length: 44 (00 2c) Jan 13 22:57:08.753825: | prop #: 1 (01) Jan 13 22:57:08.753841: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 22:57:08.753856: | spi size: 0 (00) Jan 13 22:57:08.753877: | # transforms: 4 (04) Jan 13 22:57:08.753897: | Comparing remote proposal 1 containing 4 transforms against local proposal [1..4] of 4 local proposals Jan 13 22:57:08.753915: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.753931: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.753948: | length: 12 (00 0c) Jan 13 22:57:08.753968: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.754034: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 22:57:08.754055: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 22:57:08.754076: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 22:57:08.754094: | length/value: 256 (01 00) Jan 13 22:57:08.754116: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 3 type 1 (ENCR) transform 0 Jan 13 22:57:08.754136: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.754152: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.754170: | length: 8 (00 08) Jan 13 22:57:08.754189: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.754204: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 22:57:08.754222: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.754240: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.754257: | length: 8 (00 08) Jan 13 22:57:08.754272: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 22:57:08.754291: | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) Jan 13 22:57:08.754310: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.754325: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.754345: | length: 8 (00 08) Jan 13 22:57:08.754360: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 22:57:08.754375: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 22:57:08.754394: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 22:57:08.754416: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 22:57:08.754435: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Jan 13 22:57:08.754458: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Jan 13 22:57:08.754478: | remote proposal 1 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+DH; unmatched: PRF+INTEG Jan 13 22:57:08.754496: | remote proposal 1 does not match; unmatched remote transforms: PRF+INTEG Jan 13 22:57:08.754512: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.754528: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 22:57:08.754550: | length: 44 (00 2c) Jan 13 22:57:08.754566: | prop #: 2 (02) Jan 13 22:57:08.754581: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 22:57:08.754601: | spi size: 0 (00) Jan 13 22:57:08.754617: | # transforms: 4 (04) Jan 13 22:57:08.754634: | Comparing remote proposal 2 containing 4 transforms against local proposal [1..4] of 4 local proposals Jan 13 22:57:08.754652: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.754667: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.754684: | length: 12 (00 0c) Jan 13 22:57:08.754698: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.754717: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 22:57:08.754733: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 22:57:08.754747: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 22:57:08.754763: | length/value: 256 (01 00) Jan 13 22:57:08.754786: | remote proposal 2 transform 0 (ENCR=AES_CBC_256) matches local proposal 3 type 1 (ENCR) transform 0 Jan 13 22:57:08.754804: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.754824: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.754841: | length: 8 (00 08) Jan 13 22:57:08.754855: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.754869: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Jan 13 22:57:08.754888: | remote proposal 2 transform 1 (INTEG=HMAC_SHA2_256_128) matches local proposal 3 type 3 (INTEG) transform 1 Jan 13 22:57:08.754910: | remote proposal 2 transform 1 (INTEG=HMAC_SHA2_256_128) matches local proposal 4 type 3 (INTEG) transform 1 Jan 13 22:57:08.754927: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.754942: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.754962: | length: 8 (00 08) Jan 13 22:57:08.755025: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 22:57:08.755044: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Jan 13 22:57:08.755063: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_256) matches local proposal 1 type 2 (PRF) transform 1 Jan 13 22:57:08.755083: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_256) matches local proposal 2 type 2 (PRF) transform 1 Jan 13 22:57:08.755101: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_256) matches local proposal 3 type 2 (PRF) transform 1 Jan 13 22:57:08.755118: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_256) matches local proposal 4 type 2 (PRF) transform 1 Jan 13 22:57:08.755136: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.755152: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.755170: | length: 8 (00 08) Jan 13 22:57:08.755188: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 22:57:08.755203: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 22:57:08.755221: | remote proposal 2 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 22:57:08.755242: | remote proposal 2 transform 3 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 22:57:08.755260: | remote proposal 2 transform 3 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Jan 13 22:57:08.755281: | remote proposal 2 transform 3 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Jan 13 22:57:08.755302: | remote proposal 2 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+PRF+INTEG+DH; unmatched: none Jan 13 22:57:08.755325: | comparing remote proposal 2 containing ENCR+PRF+INTEG+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: PRF+DH Jan 13 22:57:08.755345: | remote proposal 2 does not match local proposal 1; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 22:57:08.755366: | comparing remote proposal 2 containing ENCR+PRF+INTEG+DH transforms to local proposal 2; required: ENCR+PRF+DH; optional: INTEG; matched: PRF+DH Jan 13 22:57:08.755387: | remote proposal 2 does not match local proposal 2; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 22:57:08.755408: | comparing remote proposal 2 containing ENCR+PRF+INTEG+DH transforms to local proposal 3; required: ENCR+PRF+INTEG+DH; optional: none; matched: ENCR+PRF+INTEG+DH Jan 13 22:57:08.755426: | remote proposal 2 matches local proposal 3 Jan 13 22:57:08.755443: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.755458: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 22:57:08.755474: | length: 44 (00 2c) Jan 13 22:57:08.755493: | prop #: 3 (03) Jan 13 22:57:08.755508: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 22:57:08.755524: | spi size: 0 (00) Jan 13 22:57:08.755538: | # transforms: 4 (04) Jan 13 22:57:08.755555: | Comparing remote proposal 3 containing 4 transforms against local proposal [1..2] of 4 local proposals Jan 13 22:57:08.755575: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.755591: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.755606: | length: 12 (00 0c) Jan 13 22:57:08.755621: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.755639: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 22:57:08.755656: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 22:57:08.755670: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 22:57:08.755686: | length/value: 256 (01 00) Jan 13 22:57:08.755706: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.755722: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.755738: | length: 8 (00 08) Jan 13 22:57:08.755756: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.755771: | IKEv2 transform ID: AUTH_HMAC_SHA2_384_192 (0xd) Jan 13 22:57:08.755788: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.755802: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.755823: | length: 8 (00 08) Jan 13 22:57:08.755838: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 22:57:08.755875: | IKEv2 transform ID: PRF_HMAC_SHA2_384 (0x6) Jan 13 22:57:08.755894: | *****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.755912: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.755930: | length: 8 (00 08) Jan 13 22:57:08.755945: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 22:57:08.755964: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 22:57:08.755984: | remote proposal 3 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 22:57:08.756004: | remote proposal 3 transform 3 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 22:57:08.756023: | remote proposal 3 proposed transforms: ENCR+PRF+INTEG+DH; matched: DH; unmatched: ENCR+PRF+INTEG Jan 13 22:57:08.756043: | remote proposal 3 does not match; unmatched remote transforms: ENCR+PRF+INTEG Jan 13 22:57:08.756075: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: proposal 2:IKE=AES_CBC_256-HMAC_SHA2_256-HMAC_SHA2_256_128-MODP2048 chosen from remote proposals 1:IKE:ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;PRF=HMAC_SHA1;DH=MODP2048 2:IKE:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_256_128;PRF=HMAC_SHA2_256;DH=MODP2048[first-match] 3:IKE:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_384_192;PRF=HMAC_SHA2_384;DH=MODP2048 Jan 13 22:57:08.756100: | accepted IKE proposal ikev2_proposal: 2:IKE=AES_CBC_256-HMAC_SHA2_256-HMAC_SHA2_256_128-MODP2048 Jan 13 22:57:08.756116: | converting proposal to internal trans attrs Jan 13 22:57:08.756138: | nat: IKE.SPIr is zero Jan 13 22:57:08.756188: | natd_hash: hasher=0x55c83656d160(20) Jan 13 22:57:08.756208: | natd_hash: icookie= Jan 13 22:57:08.756224: | 8d 77 44 17 30 6b 26 bc .wD.0k&. Jan 13 22:57:08.756238: | natd_hash: rcookie= Jan 13 22:57:08.756252: | 00 00 00 00 00 00 00 00 ........ Jan 13 22:57:08.756265: | natd_hash: ip= Jan 13 22:57:08.756279: | a1 35 eb 03 .5.. Jan 13 22:57:08.756293: | natd_hash: port= Jan 13 22:57:08.756320: | 01 f4 .. Jan 13 22:57:08.756338: | natd_hash: hash= Jan 13 22:57:08.756352: | d9 e0 3e c2 6e 8a f3 f0 78 02 fa 80 20 25 59 87 ..>.n...x... %Y. Jan 13 22:57:08.756366: | 2f 5d 49 8c /]I. Jan 13 22:57:08.756379: | nat: IKE.SPIr is zero Jan 13 22:57:08.756417: | natd_hash: hasher=0x55c83656d160(20) Jan 13 22:57:08.756436: | natd_hash: icookie= Jan 13 22:57:08.756452: | 8d 77 44 17 30 6b 26 bc .wD.0k&. Jan 13 22:57:08.756467: | natd_hash: rcookie= Jan 13 22:57:08.756480: | 00 00 00 00 00 00 00 00 ........ Jan 13 22:57:08.756493: | natd_hash: ip= Jan 13 22:57:08.756507: | 5e fd d2 a4 ^... Jan 13 22:57:08.756520: | natd_hash: port= Jan 13 22:57:08.756533: | 01 f4 .. Jan 13 22:57:08.756547: | natd_hash: hash= Jan 13 22:57:08.756560: | 54 01 eb a2 e7 56 83 2e 59 d0 a9 32 15 d5 c0 37 T....V..Y..2...7 Jan 13 22:57:08.756574: | 99 08 84 8a .... Jan 13 22:57:08.756588: | NAT_TRAVERSAL encaps using auto-detect Jan 13 22:57:08.756602: | NAT_TRAVERSAL this end is NOT behind NAT Jan 13 22:57:08.756621: | NAT_TRAVERSAL that end is behind NAT 94.253.210.164:500 Jan 13 22:57:08.756642: | NAT_TRAVERSAL nat-keepalive enabled 94.253.210.164:500 Jan 13 22:57:08.756657: | NAT: responder so initiator gets to switch ports Jan 13 22:57:08.756684: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.756703: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.756721: | newref clone logger@0x55c838017ee8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.756739: | job 50 helper 0 #41 process_v2_IKE_SA_INIT_request_continue (dh): added to pending queue Jan 13 22:57:08.756757: | #41 deleting EVENT_SA_DISCARD Jan 13 22:57:08.756778: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.756813: | delref state-event@0x55c83800da48(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 22:57:08.756832: | #41 STATE_V2_PARENT_R0: retransmits: cleared Jan 13 22:57:08.756853: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c83800da48 timeout in 60 seconds for #41 Jan 13 22:57:08.756874: | newref tt@0x55c838024008(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.756909: | #41 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_SUSPEND Jan 13 22:57:08.756936: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 22:57:08.756959: | addref struct msg_digest@0x55c838050b08(1->2) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 22:57:08.756975: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 22:57:08.756977: | job 50 helper 6 #41 process_v2_IKE_SA_INIT_request_continue (dh): started Jan 13 22:57:08.757002: | #41 spent 3.78 (3.82) milliseconds in processing: Respond to IKE_SA_INIT in v2_dispatch() Jan 13 22:57:08.757064: | #41 spent 8.19 (8.24) milliseconds in process_v2_IKE_SA_INIT() Jan 13 22:57:08.757089: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.757112: | spent 8.24 (8.29) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.759422: | newref struct dh_local_secret@0x7ff8a8004898(0->1) (calc_dh_local_secret() +93 programs/pluto/crypt_dh.c) Jan 13 22:57:08.759470: | job 50 helper 6 #41 process_v2_IKE_SA_INIT_request_continue (dh): finished Jan 13 22:57:08.759495: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 2.52 (2.52) milliseconds in job 50 helper 6 #41 process_v2_IKE_SA_INIT_request_continue (dh) Jan 13 22:57:08.759509: | scheduling resume sending job back to main thread for #41 Jan 13 22:57:08.759522: | newref tt@0x7ff8a8004948(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.759545: | helper 6: waiting for work Jan 13 22:57:08.759567: | processing resume sending job back to main thread for #41 Jan 13 22:57:08.759599: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 22:57:08.759622: | job 50 helper 6 #41 process_v2_IKE_SA_INIT_request_continue (dh): calling state's callback function Jan 13 22:57:08.759640: | process_v2_IKE_SA_INIT_request_continue() for #41 STATE_V2_PARENT_R0: calculated ke+nonce, sending R1 Jan 13 22:57:08.759710: | opening output PBS reply packet Jan 13 22:57:08.759729: | **emit ISAKMP Message: Jan 13 22:57:08.759750: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.759772: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.759787: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 22:57:08.759801: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.759822: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Jan 13 22:57:08.759839: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.759857: | Message ID: 0 (00 00 00 00) Jan 13 22:57:08.759875: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 22:57:08.759892: | emitting ikev2_proposal ... Jan 13 22:57:08.759907: | ***emit IKEv2 Security Association Payload: Jan 13 22:57:08.759926: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.759941: | flags: none (0x0) Jan 13 22:57:08.759958: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 22:57:08.759973: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.759996: | ****emit IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.760012: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 22:57:08.760033: | prop #: 2 (02) Jan 13 22:57:08.760049: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 22:57:08.760087: | spi size: 0 (00) Jan 13 22:57:08.760106: | # transforms: 4 (04) Jan 13 22:57:08.760126: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 22:57:08.760145: | *****emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.760161: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.760180: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.760195: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 22:57:08.760210: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.760226: | ******emit IKEv2 Attribute Substructure Payload: Jan 13 22:57:08.760241: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 22:57:08.760258: | length/value: 256 (01 00) Jan 13 22:57:08.760285: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 22:57:08.760294: | *****emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.760303: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.760325: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 22:57:08.760334: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Jan 13 22:57:08.760356: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.760365: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.760374: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 22:57:08.760383: | *****emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.760392: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.760400: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.760408: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Jan 13 22:57:08.760416: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.760426: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.760435: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 22:57:08.760443: | *****emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.760451: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.760461: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 22:57:08.760469: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 22:57:08.760477: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.760487: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.760495: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 22:57:08.760504: | emitting length of IKEv2 Proposal Substructure Payload: 44 Jan 13 22:57:08.760513: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 22:57:08.760522: | emitting length of IKEv2 Security Association Payload: 48 Jan 13 22:57:08.760530: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 22:57:08.760540: | addref struct dh_local_secret@0x7ff8a8004898(1->2) (unpack_KE_from_helper() +152 programs/pluto/crypt_ke.c) Jan 13 22:57:08.760550: | ***emit IKEv2 Key Exchange Payload: Jan 13 22:57:08.760559: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.760567: | flags: none (0x0) Jan 13 22:57:08.760574: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 22:57:08.760593: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Jan 13 22:57:08.760602: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.760611: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Jan 13 22:57:08.760620: | ikev2 g^x: Jan 13 22:57:08.760628: | 3c 0e e6 60 e4 8c f3 b3 5a 58 f8 df 0c b7 5e 25 <..`....ZX....^% Jan 13 22:57:08.760636: | e0 af 5e bc 83 df 89 49 6e 83 d4 cc e9 55 ac f6 ..^....In....U.. Jan 13 22:57:08.760643: | 42 69 5e ce 73 ee 59 26 5b 5a 13 27 f4 2b e3 7f Bi^.s.Y&[Z.'.+.. Jan 13 22:57:08.760651: | 9b 4e bc 47 25 72 d8 d0 3f 57 c4 d8 60 21 d4 48 .N.G%r..?W..`!.H Jan 13 22:57:08.760660: | 5f 9c a3 58 79 6d eb 64 5c 09 24 4c e6 a2 d7 d1 _..Xym.d\.$L.... Jan 13 22:57:08.760668: | 52 3e 0b 8f f2 b0 a5 45 1d b2 07 d0 1f c7 57 5e R>.....E......W^ Jan 13 22:57:08.760676: | 5a da 64 c7 ca 95 a7 23 7c ea 4a 34 e5 92 c1 ad Z.d....#|.J4.... Jan 13 22:57:08.760685: | 14 78 1d c5 45 2d 9b fb 77 90 6b 87 a0 0e fa 32 .x..E-..w.k....2 Jan 13 22:57:08.760693: | a0 c4 42 43 b9 bc cf 09 8d 63 88 25 32 6c 18 e9 ..BC.....c.%2l.. Jan 13 22:57:08.760700: | 43 6c e9 b8 f5 eb d7 a6 8f 1a 82 99 39 9b 0a c0 Cl..........9... Jan 13 22:57:08.760708: | bc 7c 72 5b 7d 4d ca c9 ec e8 84 0b 1a d5 32 e1 .|r[}M........2. Jan 13 22:57:08.760715: | 02 e5 47 83 ff 55 f4 82 dd 80 44 8b 25 24 a8 26 ..G..U....D.%$.& Jan 13 22:57:08.760722: | 4e d4 d2 96 11 51 e3 18 f0 22 83 02 45 37 10 25 N....Q..."..E7.% Jan 13 22:57:08.760732: | 7e fb 96 0c e3 7f fb fb d9 38 18 bf 78 15 de 5e ~........8..x..^ Jan 13 22:57:08.760740: | dd 1a e1 b1 3e 68 37 74 87 43 21 7d 56 16 a6 e4 ....>h7t.C!}V... Jan 13 22:57:08.760748: | 03 af c8 39 31 27 f3 04 47 d4 50 94 21 2a c0 0c ...91'..G.P.!*.. Jan 13 22:57:08.760755: | emitting length of IKEv2 Key Exchange Payload: 264 Jan 13 22:57:08.760763: | ***emit IKEv2 Nonce Payload: Jan 13 22:57:08.760773: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.760781: | flags: none (0x0) Jan 13 22:57:08.760789: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Jan 13 22:57:08.760799: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.760808: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Jan 13 22:57:08.760816: | IKEv2 nonce: Jan 13 22:57:08.760823: | 26 d4 f5 ba 86 b7 fa 6b 52 12 7e 71 6e 86 81 cc &......kR.~qn... Jan 13 22:57:08.760831: | 1f 6e 6a 95 90 67 fd d6 d3 67 73 5a da 03 98 5f .nj..g...gsZ..._ Jan 13 22:57:08.760841: | emitting length of IKEv2 Nonce Payload: 36 Jan 13 22:57:08.760850: | adding a v2N Payload Jan 13 22:57:08.760858: | ***emit IKEv2 Notify Payload: Jan 13 22:57:08.760868: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.760877: | flags: none (0x0) Jan 13 22:57:08.760887: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.760896: | SPI size: 0 (00) Jan 13 22:57:08.760905: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Jan 13 22:57:08.760914: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 22:57:08.760921: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.760929: | emitting length of IKEv2 Notify Payload: 8 Jan 13 22:57:08.760940: | NAT-Traversal support [enabled] add v2N payloads. Jan 13 22:57:08.760962: | natd_hash: hasher=0x55c83656d160(20) Jan 13 22:57:08.760973: | natd_hash: icookie= Jan 13 22:57:08.760981: | 8d 77 44 17 30 6b 26 bc .wD.0k&. Jan 13 22:57:08.760988: | natd_hash: rcookie= Jan 13 22:57:08.760995: | 31 79 0d 45 82 26 37 8e 1y.E.&7. Jan 13 22:57:08.761012: | natd_hash: ip= Jan 13 22:57:08.761021: | a1 35 eb 03 .5.. Jan 13 22:57:08.761028: | natd_hash: port= Jan 13 22:57:08.761035: | 01 f4 .. Jan 13 22:57:08.761042: | natd_hash: hash= Jan 13 22:57:08.761049: | 47 12 84 ec 2b a7 43 f0 f3 3b 68 67 8d 22 b4 d8 G...+.C..;hg.".. Jan 13 22:57:08.761059: | 9f 37 3c 0e .7<. Jan 13 22:57:08.761067: | adding a v2N Payload Jan 13 22:57:08.761075: | ***emit IKEv2 Notify Payload: Jan 13 22:57:08.761083: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.761093: | flags: none (0x0) Jan 13 22:57:08.761101: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.761109: | SPI size: 0 (00) Jan 13 22:57:08.761119: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Jan 13 22:57:08.761127: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 22:57:08.761136: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.761146: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Jan 13 22:57:08.761156: | Notify data: Jan 13 22:57:08.761164: | 47 12 84 ec 2b a7 43 f0 f3 3b 68 67 8d 22 b4 d8 G...+.C..;hg.".. Jan 13 22:57:08.761172: | 9f 37 3c 0e .7<. Jan 13 22:57:08.761179: | emitting length of IKEv2 Notify Payload: 28 Jan 13 22:57:08.761199: | natd_hash: hasher=0x55c83656d160(20) Jan 13 22:57:08.761209: | natd_hash: icookie= Jan 13 22:57:08.761217: | 8d 77 44 17 30 6b 26 bc .wD.0k&. Jan 13 22:57:08.761225: | natd_hash: rcookie= Jan 13 22:57:08.761232: | 31 79 0d 45 82 26 37 8e 1y.E.&7. Jan 13 22:57:08.761239: | natd_hash: ip= Jan 13 22:57:08.761246: | 5e fd d2 a4 ^... Jan 13 22:57:08.761253: | natd_hash: port= Jan 13 22:57:08.761260: | 01 f4 .. Jan 13 22:57:08.761267: | natd_hash: hash= Jan 13 22:57:08.761274: | 9c d8 9d b8 77 6d 2e 94 fa 84 0d 2d 6d 93 54 04 ....wm.....-m.T. Jan 13 22:57:08.761281: | 95 58 e5 1f .X.. Jan 13 22:57:08.761288: | adding a v2N Payload Jan 13 22:57:08.761296: | ***emit IKEv2 Notify Payload: Jan 13 22:57:08.761307: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.761315: | flags: none (0x0) Jan 13 22:57:08.761323: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.761331: | SPI size: 0 (00) Jan 13 22:57:08.761340: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Jan 13 22:57:08.761349: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 22:57:08.761357: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.761365: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Jan 13 22:57:08.761374: | Notify data: Jan 13 22:57:08.761382: | 9c d8 9d b8 77 6d 2e 94 fa 84 0d 2d 6d 93 54 04 ....wm.....-m.T. Jan 13 22:57:08.761389: | 95 58 e5 1f .X.. Jan 13 22:57:08.761396: | emitting length of IKEv2 Notify Payload: 28 Jan 13 22:57:08.761404: | going to send a certreq Jan 13 22:57:08.761413: | connection->kind is not CK_PERMANENT (instance), so collect CAs Jan 13 22:57:08.761425: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (collect_rw_ca_candidates() +288 programs/pluto/x509.c) Jan 13 22:57:08.761437: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 22:57:08.761447: | connection is RW, lookup CA candidates Jan 13 22:57:08.761458: | ***emit IKEv2 Certificate Request Payload: Jan 13 22:57:08.761467: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.761499: | flags: none (0x0) Jan 13 22:57:08.761509: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 22:57:08.761521: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Certificate Request Payload (38:ISAKMP_NEXT_v2CERTREQ) Jan 13 22:57:08.761530: | next payload chain: saving location 'IKEv2 Certificate Request Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.761851: | located CA cert O=ALU-UNIZG,CN=ALU-UNIZG CA for CERTREQ Jan 13 22:57:08.761884: | emitting 20 raw bytes of CA cert public key hash into IKEv2 Certificate Request Payload Jan 13 22:57:08.761897: | CA cert public key hash: Jan 13 22:57:08.761906: | d8 18 a0 99 8b 0d 79 d4 5c 2e 82 10 43 4e e2 99 ......y.\...CN.. Jan 13 22:57:08.761914: | 45 05 57 ff E.W. Jan 13 22:57:08.761922: | emitting length of IKEv2 Certificate Request Payload: 25 Jan 13 22:57:08.761932: | emitting length of ISAKMP Message: 465 Jan 13 22:57:08.761944: | job 50 helper 6 #41 process_v2_IKE_SA_INIT_request_continue (dh): final status STF_OK; cleaning up Jan 13 22:57:08.761957: | delref struct dh_local_secret@0x7ff8a8004898(2->1) (cleanup_ke_and_nonce() +83 programs/pluto/crypt_ke.c) Jan 13 22:57:08.761967: | delref logger@0x55c838017ee8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.761977: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.761985: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.761996: | #41 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_OK Jan 13 22:57:08.762008: | transitioning from state STATE_V2_PARENT_R0 to state STATE_V2_PARENT_R1 Jan 13 22:57:08.762017: | Message ID: updating counters for #41 Jan 13 22:57:08.762035: | Message ID: IKE #41 updating responder received message request 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=-1 .recv=-1->0 .recv_frags=0 .recv_wip=0->-1 .last_contact=9594096.773743->9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.762051: | Message ID: IKE #41 updating responder sent message response 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=-1->0 .recv=0 .recv_frags=0 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.762063: | parent state #41: PARENT_R0(half-open IKE SA) => PARENT_R1(half-open IKE SA) Jan 13 22:57:08.762078: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.762089: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 22:57:08.762100: | delref tt@0x55c838024008(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.762111: | delref state-event@0x55c83800da48(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 22:57:08.762122: | event_schedule_where: newref EVENT_SA_DISCARD-pe@0x55c83800da48 timeout in 200 seconds for #41 Jan 13 22:57:08.762133: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.762149: | sending 465 bytes for STATE_V2_PARENT_R0 through eth0 from 161.53.235.3:500 to 94.253.210.164:500 using UDP (for #41) Jan 13 22:57:08.762159: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.762167: | 21 20 22 20 00 00 00 00 00 00 01 d1 22 00 00 30 ! " ........"..0 Jan 13 22:57:08.762174: | 00 00 00 2c 02 01 00 04 03 00 00 0c 01 00 00 0c ...,............ Jan 13 22:57:08.762182: | 80 0e 01 00 03 00 00 08 02 00 00 05 03 00 00 08 ................ Jan 13 22:57:08.762189: | 03 00 00 0c 00 00 00 08 04 00 00 0e 28 00 01 08 ............(... Jan 13 22:57:08.762197: | 00 0e 00 00 3c 0e e6 60 e4 8c f3 b3 5a 58 f8 df ....<..`....ZX.. Jan 13 22:57:08.762204: | 0c b7 5e 25 e0 af 5e bc 83 df 89 49 6e 83 d4 cc ..^%..^....In... Jan 13 22:57:08.762211: | e9 55 ac f6 42 69 5e ce 73 ee 59 26 5b 5a 13 27 .U..Bi^.s.Y&[Z.' Jan 13 22:57:08.762231: | f4 2b e3 7f 9b 4e bc 47 25 72 d8 d0 3f 57 c4 d8 .+...N.G%r..?W.. Jan 13 22:57:08.762240: | 60 21 d4 48 5f 9c a3 58 79 6d eb 64 5c 09 24 4c `!.H_..Xym.d\.$L Jan 13 22:57:08.762248: | e6 a2 d7 d1 52 3e 0b 8f f2 b0 a5 45 1d b2 07 d0 ....R>.....E.... Jan 13 22:57:08.762255: | 1f c7 57 5e 5a da 64 c7 ca 95 a7 23 7c ea 4a 34 ..W^Z.d....#|.J4 Jan 13 22:57:08.762262: | e5 92 c1 ad 14 78 1d c5 45 2d 9b fb 77 90 6b 87 .....x..E-..w.k. Jan 13 22:57:08.762273: | a0 0e fa 32 a0 c4 42 43 b9 bc cf 09 8d 63 88 25 ...2..BC.....c.% Jan 13 22:57:08.762281: | 32 6c 18 e9 43 6c e9 b8 f5 eb d7 a6 8f 1a 82 99 2l..Cl.......... Jan 13 22:57:08.762289: | 39 9b 0a c0 bc 7c 72 5b 7d 4d ca c9 ec e8 84 0b 9....|r[}M...... Jan 13 22:57:08.762296: | 1a d5 32 e1 02 e5 47 83 ff 55 f4 82 dd 80 44 8b ..2...G..U....D. Jan 13 22:57:08.762303: | 25 24 a8 26 4e d4 d2 96 11 51 e3 18 f0 22 83 02 %$.&N....Q...".. Jan 13 22:57:08.762310: | 45 37 10 25 7e fb 96 0c e3 7f fb fb d9 38 18 bf E7.%~........8.. Jan 13 22:57:08.762320: | 78 15 de 5e dd 1a e1 b1 3e 68 37 74 87 43 21 7d x..^....>h7t.C!} Jan 13 22:57:08.762328: | 56 16 a6 e4 03 af c8 39 31 27 f3 04 47 d4 50 94 V......91'..G.P. Jan 13 22:57:08.762336: | 21 2a c0 0c 29 00 00 24 26 d4 f5 ba 86 b7 fa 6b !*..)..$&......k Jan 13 22:57:08.762343: | 52 12 7e 71 6e 86 81 cc 1f 6e 6a 95 90 67 fd d6 R.~qn....nj..g.. Jan 13 22:57:08.762351: | d3 67 73 5a da 03 98 5f 29 00 00 08 00 00 40 2e .gsZ..._).....@. Jan 13 22:57:08.762361: | 29 00 00 1c 00 00 40 04 47 12 84 ec 2b a7 43 f0 ).....@.G...+.C. Jan 13 22:57:08.762369: | f3 3b 68 67 8d 22 b4 d8 9f 37 3c 0e 26 00 00 1c .;hg."...7<.&... Jan 13 22:57:08.762379: | 00 00 40 05 9c d8 9d b8 77 6d 2e 94 fa 84 0d 2d ..@.....wm.....- Jan 13 22:57:08.762387: | 6d 93 54 04 95 58 e5 1f 00 00 00 19 04 d8 18 a0 m.T..X.......... Jan 13 22:57:08.762394: | 99 8b 0d 79 d4 5c 2e 82 10 43 4e e2 99 45 05 57 ...y.\...CN..E.W Jan 13 22:57:08.762402: | ff . Jan 13 22:57:08.762436: | sent 1 messages Jan 13 22:57:08.762448: | announcing the state transition Jan 13 22:57:08.762462: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: sent IKE_SA_INIT reply {cipher=AES_CBC_256 integ=HMAC_SHA2_256_128 prf=HMAC_SHA2_256 group=MODP2048} Jan 13 22:57:08.762475: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.762484: | delref logger@0x55c838043798(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.762495: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.762503: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.762512: | delref struct iface_endpoint@0x55c83801ef68(10->9) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.762528: | #41 spent 2.92 (2.93) milliseconds in resume sending job back to main thread Jan 13 22:57:08.762541: | delref tt@0x7ff8a8004948(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.824815: | spent 0.00458 (0.00459) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.824864: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.824880: | addref struct iface_endpoint@0x55c83801f058(1->2) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.824894: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.824916: | *received 580 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 22:57:08.824942: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.824952: | 35 20 23 08 00 00 00 01 00 00 02 44 23 00 02 28 5 #........D#..( Jan 13 22:57:08.824962: | 00 01 00 06 b8 43 44 c8 b9 7a 3b 38 31 28 e1 64 .....CD..z;81(.d Jan 13 22:57:08.824988: | ad 7a 03 1c 0e 8f 45 4d 5f cf 50 93 87 04 80 a7 .z....EM_.P..... Jan 13 22:57:08.824998: | 43 ee 7d e3 cc 9b 45 a2 63 ed 2b 9a 25 f4 f4 51 C.}...E.c.+.%..Q Jan 13 22:57:08.825009: | dd 96 de 4c ea e3 8a 5a f9 4d 2b 25 58 23 6c 5a ...L...Z.M+%X#lZ Jan 13 22:57:08.825018: | 37 bd fc 27 07 a5 08 3a 23 9e 1f 3d c2 9b 16 dc 7..'...:#..=.... Jan 13 22:57:08.825027: | b2 c7 b3 4e cd f0 a5 2c ea 4c 37 72 e2 64 59 fd ...N...,.L7r.dY. Jan 13 22:57:08.825035: | 42 e8 87 39 6d 6d 10 e0 0e 28 ce 24 16 dd ef 6b B..9mm...(.$...k Jan 13 22:57:08.825047: | 7a a8 93 19 c4 0e b7 e2 fe 7e 81 c3 cd c3 c1 00 z........~...... Jan 13 22:57:08.825057: | 81 b2 ed db 9f 94 9a 92 00 01 88 63 82 a8 7f ab ...........c.... Jan 13 22:57:08.825066: | 42 79 e1 f6 4e 86 97 b3 e0 5c 73 28 f6 a4 c2 15 By..N....\s(.... Jan 13 22:57:08.825075: | 1e 8d 26 ae 4c 61 8d ba c3 47 8f 66 98 5a 33 b4 ..&.La...G.f.Z3. Jan 13 22:57:08.825084: | 93 35 ab a8 c0 76 fc b1 61 15 f2 29 a3 97 3f 9d .5...v..a..)..?. Jan 13 22:57:08.825096: | 19 be 8e ff e6 ce 3c 3b a8 da fd 0e 0d e9 7a 9a ......<;......z. Jan 13 22:57:08.825105: | 58 b3 34 d7 8e f1 03 ac 43 98 9a 9f 42 d5 9d d1 X.4.....C...B... Jan 13 22:57:08.825115: | 20 9e 58 ed 74 ff 8e 66 3d 14 46 8f 0a 34 1a 21 .X.t..f=.F..4.! Jan 13 22:57:08.825124: | 68 9e bc 98 30 9a 80 80 27 ca c5 c5 b2 40 a5 10 h...0...'....@.. Jan 13 22:57:08.825133: | 02 3c 37 7b 77 9e 8a ce bf 13 05 87 d3 28 7b 82 .<7{w........({. Jan 13 22:57:08.825145: | 25 35 01 ad ee 91 a0 e1 3b 7a 8f 91 fd a2 f5 cd %5......;z...... Jan 13 22:57:08.825155: | a8 75 bd d4 1a a4 8a ac 9d 25 31 e0 57 6d ad d9 .u.......%1.Wm.. Jan 13 22:57:08.825167: | 32 3b b7 a7 55 9b f0 7d 24 89 5d 54 89 11 7f 86 2;..U..}$.]T.... Jan 13 22:57:08.825176: | ce 0c 6e f0 82 18 e5 dc 43 a5 b1 39 b7 44 68 e1 ..n.....C..9.Dh. Jan 13 22:57:08.825185: | 18 64 75 83 ce 20 75 09 a7 ac 27 01 aa 56 2f 27 .du.. u...'..V/' Jan 13 22:57:08.825195: | 72 29 d0 47 db c6 ff 5d 11 55 38 a7 3e 3e 4b d9 r).G...].U8.>>K. Jan 13 22:57:08.825204: | f6 60 a0 68 e1 f2 8e 6d 96 f7 42 61 ad c2 0c 66 .`.h...m..Ba...f Jan 13 22:57:08.825215: | 52 56 c9 19 cd e5 ca a1 ce 4a 8a 31 85 ee 0a a3 RV.......J.1.... Jan 13 22:57:08.825225: | 8d 35 cf 18 19 bb 4e b5 2b 0d 08 3e f0 86 5d 0a .5....N.+..>..]. Jan 13 22:57:08.825234: | de 41 2d de d6 d2 ed d7 67 ff 79 7c 69 fc 2a fa .A-.....g.y|i.*. Jan 13 22:57:08.825243: | 27 56 00 25 93 00 f4 90 42 36 74 3c e5 ed 87 1f 'V.%....B6t<.... Jan 13 22:57:08.825252: | 96 aa 41 e9 54 a0 2b 26 75 46 29 90 c6 8a 5d ee ..A.T.+&uF)...]. Jan 13 22:57:08.825267: | 63 c6 92 49 d9 e6 d2 84 ae 33 d4 c8 c1 0e 8b f1 c..I.....3...... Jan 13 22:57:08.825277: | e5 62 18 9e ce 3c 76 2b cc e6 2e e8 6d 18 b6 02 .b...2) (collect_v2_incoming_fragment() +1032 programs/pluto/ikev2_message.c) Jan 13 22:57:08.825775: | delref struct msg_digest@0x55c838050b08(2->1) (collect_v2_incoming_fragment() +1084 programs/pluto/ikev2_message.c) Jan 13 22:57:08.825790: | addref struct msg_digest@0x55c838050b08(1->2) (collect_v2_incoming_fragment() +1085 programs/pluto/ikev2_message.c) Jan 13 22:57:08.825802: | submitting DH shared secret for #41/#41 (process_v2_request_no_skeyseed() +1544 programs/pluto/ikev2_ike_sa_init.c) Jan 13 22:57:08.825819: | addref struct dh_local_secret@0x7ff8a8004898(1->2) (submit_dh_shared_secret() +215 programs/pluto/crypt_dh.c) Jan 13 22:57:08.825838: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.825852: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.825865: | newref clone logger@0x55c83804dcf8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.825877: | job 51 helper 0 #41 DH shared secret (dh): added to pending queue Jan 13 22:57:08.825890: | #41 deleting EVENT_SA_DISCARD Jan 13 22:57:08.825905: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.825920: | delref state-event@0x55c83800da48(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 22:57:08.825933: | #41 STATE_V2_PARENT_R1: retransmits: cleared Jan 13 22:57:08.825951: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c83800da48 timeout in 60 seconds for #41 Jan 13 22:57:08.825967: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.825997: | #41 spent 1.2 (1.2) milliseconds in ikev2_process_packet() Jan 13 22:57:08.826012: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.826028: | spent 1.23 (1.24) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.826039: | job 51 helper 7 #41 DH shared secret (dh): started Jan 13 22:57:08.826059: | spent 0.00348 (0.00351) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.826104: | newref struct msg_digest@0x55c83801fab8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.826121: | addref struct iface_endpoint@0x55c83801f058(2->3) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.826134: | newref alloc logger@0x55c83803dd78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.826169: | *received 580 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 22:57:08.826184: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.826196: | 35 20 23 08 00 00 00 01 00 00 02 44 00 00 02 28 5 #........D...( Jan 13 22:57:08.826206: | 00 02 00 06 6d d3 00 ea e7 ad 58 b5 22 e6 44 85 ....m.....X.".D. Jan 13 22:57:08.826217: | ad 39 67 ef 91 b2 67 77 37 75 31 aa a8 e9 38 b3 .9g...gw7u1...8. Jan 13 22:57:08.826228: | 44 89 ba 26 f1 56 20 28 df df 9f 41 01 2e c9 10 D..&.V (...A.... Jan 13 22:57:08.826240: | 20 64 3c 8d f5 6b d3 ad 9e 2e 01 c2 2d c5 ad 06 d<..k......-... Jan 13 22:57:08.826251: | 3d f1 1e a7 e4 c3 0d e3 06 3a 70 cb d1 17 f6 ab =........:p..... Jan 13 22:57:08.826262: | 65 e7 a1 f4 87 2b dc 07 82 de e3 82 f8 0e 12 fc e....+.......... Jan 13 22:57:08.826271: | 24 67 b5 71 25 97 6a 0c 02 be f5 2c 1b 63 c0 46 $g.q%.j....,.c.F Jan 13 22:57:08.826281: | 39 b8 85 20 f0 69 fc 2b c1 80 2b f2 17 4b a9 fb 9.. .i.+..+..K.. Jan 13 22:57:08.826291: | 7f c2 ce c2 84 c1 2f 73 24 e9 e6 dc 4a 0a 81 65 ....../s$...J..e Jan 13 22:57:08.826305: | f0 a4 4c 99 71 27 65 53 94 d1 a5 34 b5 a0 83 d6 ..L.q'eS...4.... Jan 13 22:57:08.826316: | 68 89 d1 b7 10 03 13 ef 88 28 bd 60 10 44 16 45 h........(.`.D.E Jan 13 22:57:08.826326: | d2 bc 3c 53 9b 42 e9 41 6a df 91 9e cb f2 ea f0 ..*i4m.....Ka... Jan 13 22:57:08.826528: | a1 d8 75 26 a7 b3 2b cc 04 e2 4c dd 99 55 dc 37 ..u&..+...L..U.7 Jan 13 22:57:08.826538: | 27 1f b6 aa dc 05 b2 8f 0e cc 62 f5 05 d1 3c 9c '.........b...<. Jan 13 22:57:08.826548: | a1 4e 20 5a 1b 2a 6e 46 be 71 e5 0d 6f 6f 4a ed .N Z.*nF.q..ooJ. Jan 13 22:57:08.826558: | 98 54 cd cb d1 78 ee e2 34 e0 94 43 b1 24 9c 41 .T...x..4..C.$.A Jan 13 22:57:08.826571: | ed f2 52 68 ..Rh Jan 13 22:57:08.826584: | **parse ISAKMP Message: Jan 13 22:57:08.826601: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.826616: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.826628: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Jan 13 22:57:08.826639: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.826668: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.826681: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 22:57:08.826694: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.826710: | length: 580 (00 00 02 44) Jan 13 22:57:08.826722: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Jan 13 22:57:08.826733: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Jan 13 22:57:08.826748: | State DB: found IKEv2 state #41 in PARENT_R1 (find_v2_ike_sa) Jan 13 22:57:08.826763: | #41 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Jan 13 22:57:08.826784: | Message ID: IKE #41 not a duplicate - responder is accumulating encrypted fragments for message with request 1 (SKEYSEED is being computed): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.826798: | unpacking clear payload Jan 13 22:57:08.826810: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.826821: | ***parse IKEv2 Encrypted Fragment: Jan 13 22:57:08.826831: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.826845: | flags: none (0x0) Jan 13 22:57:08.826858: | length: 552 (02 28) Jan 13 22:57:08.826869: | fragment number: 2 (00 02) Jan 13 22:57:08.826883: | total fragments: 6 (00 06) Jan 13 22:57:08.826894: | processing payload: ISAKMP_NEXT_v2SKF (len=544) Jan 13 22:57:08.826909: | looking for transition from PARENT_R1 matching IKE_AUTH request: SKF (ignoring secured payloads) Jan 13 22:57:08.826920: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 22:57:08.826931: | exchange type does not match IKE_INTERMEDIATE Jan 13 22:57:08.826939: | trying: Responder: process IKE_AUTH request Jan 13 22:57:08.826949: | matching by ignoring secured payloads Jan 13 22:57:08.826959: | received IKE encrypted fragment number '2', total number '6', next payload '0' Jan 13 22:57:08.826978: | #41 spent 0.912 (0.924) milliseconds in ikev2_process_packet() Jan 13 22:57:08.826994: | delref struct msg_digest@0x55c83801fab8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.827006: | delref logger@0x55c83803dd78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.827017: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.827030: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.827044: | delref struct iface_endpoint@0x55c83801f058(3->2) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.827063: | spent 0.999 (1.01) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.827092: | spent 0.00328 (0.00332) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.827116: | newref struct msg_digest@0x55c83801fab8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.827133: | addref struct iface_endpoint@0x55c83801f058(2->3) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.827146: | newref alloc logger@0x55c83803dd78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.827163: | *received 580 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 22:57:08.827176: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.827188: | 35 20 23 08 00 00 00 01 00 00 02 44 00 00 02 28 5 #........D...( Jan 13 22:57:08.827198: | 00 03 00 06 de 33 dc 63 9e d5 04 c4 33 3f a7 62 .....3.c....3?.b Jan 13 22:57:08.827208: | e9 e2 69 84 c2 b9 35 7a 87 f6 16 5b 55 ea 0e 75 ..i...5z...[U..u Jan 13 22:57:08.827218: | 30 9a 04 dd 22 34 d6 10 32 f3 66 63 c3 eb e2 c0 0..."4..2.fc.... Jan 13 22:57:08.827231: | 36 66 fc 5b 1c 1c ee 8f f0 01 46 7c 30 ea 9d 92 6f.[......F|0... Jan 13 22:57:08.827242: | 17 8a a5 44 67 bf e0 3a 3b 28 59 1e 9e b2 8e 89 ...Dg..:;(Y..... Jan 13 22:57:08.827252: | d2 c2 c9 ba 27 8b 4d 5c 70 0c 32 fe d4 22 95 e6 ....'.M\p.2..".. Jan 13 22:57:08.827278: | 77 6f 14 ee 77 01 a1 9f fb 97 6e 5c 5c e9 ca 22 wo..w.....n\\.." Jan 13 22:57:08.827290: | f8 1d bd bf 56 46 81 91 93 0a c5 20 cd 15 7f 21 ....VF..... ...! Jan 13 22:57:08.827299: | 76 9e 68 77 4c ab f3 57 65 bf f1 d7 7b 51 67 44 v.hwL..We...{QgD Jan 13 22:57:08.827309: | d6 47 a7 37 34 55 f9 da b4 a6 16 f8 35 fe 39 b3 .G.74U......5.9. Jan 13 22:57:08.827319: | e7 6b d1 9a 6f db 4f 3a 9d d0 e5 81 a0 8c 69 b0 .k..o.O:......i. Jan 13 22:57:08.827331: | ae ea 81 a2 64 fc 43 16 48 27 52 4a a6 ce 6b f5 ....d.C.H'RJ..k. Jan 13 22:57:08.827342: | 94 a4 14 a8 2a 5e 13 f5 dd 5b 08 bc 25 54 9c a8 ....*^...[..%T.. Jan 13 22:57:08.827352: | 4d 97 64 76 22 bc c8 09 22 1a 65 7c b7 53 c6 5f M.dv"...".e|.S._ Jan 13 22:57:08.827362: | 5e ed e5 30 f5 02 f1 93 63 b1 10 47 2e 8c f1 f1 ^..0....c..G.... Jan 13 22:57:08.827372: | e4 b4 10 10 8b 8b c3 a9 1a 37 01 73 f2 ed 9e 8e .........7.s.... Jan 13 22:57:08.827382: | 0a ec e1 16 3f 88 ba 5a 29 a1 e7 c5 41 ec 4b 1b ....?..Z)...A.K. Jan 13 22:57:08.827391: | 3c a0 e0 c2 24 a1 53 e7 bd a6 24 21 13 14 4f eb <...$.S...$!..O. Jan 13 22:57:08.827405: | f9 ae 3a ea cf 92 4c 53 e4 ca 7d 54 9e 6c 45 a0 ..:...LS..}T.lE. Jan 13 22:57:08.827416: | 8b d5 7d 2b 4d f6 73 f3 12 9c 51 b5 30 79 ad 98 ..}+M.s...Q.0y.. Jan 13 22:57:08.827426: | c5 47 65 71 3f c7 37 2e 65 61 68 4c 22 30 fc 0a .Geq?.7.eahL"0.. Jan 13 22:57:08.827430: | newref : g_ir-key@0x55c838003fc0 (256-bytes, CONCATENATE_DATA_AND_BASE) Jan 13 22:57:08.827443: | d2 91 a7 66 a3 d1 93 1e a3 fc a8 7d cc 9e f6 53 ...f.......}...S Jan 13 22:57:08.827462: | job 51 helper 7 #41 DH shared secret (dh): finished Jan 13 22:57:08.827479: | 28 39 cb fb 70 6d c2 de 76 6f 6c 40 ac 35 ae a0 (9..pm..vol@.5.. Jan 13 22:57:08.827497: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 1.44 (1.46) milliseconds in job 51 helper 7 #41 DH shared secret (dh) Jan 13 22:57:08.827508: | c0 a5 ed 99 f2 aa 9c 92 bc 4b 50 d3 01 d2 42 66 .........KP...Bf Jan 13 22:57:08.827522: | scheduling resume sending job back to main thread for #41 Jan 13 22:57:08.827536: | bf 18 33 1b b3 01 e6 43 28 a1 47 d4 ca f4 cb 1c ..3....C(.G..... Jan 13 22:57:08.827552: | newref tt@0x7ff8ac0020e8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.827565: | 16 14 34 3b 24 8e f8 2d c6 54 0b 60 cc 88 ea db ..4;$..-.T.`.... Jan 13 22:57:08.827584: | helper 7: waiting for work Jan 13 22:57:08.827594: | 2f 41 1b 1e 0a 24 da 09 7c 6d 54 c7 6a 6d 4b ab /A...$..|mT.jmK. Jan 13 22:57:08.827621: | 19 7c 2b a4 a9 58 b0 d7 0f 2c cf 44 dc 72 4e 20 .|+..X...,.D.rN Jan 13 22:57:08.827634: | 76 65 a3 5d d1 ad e8 44 c0 d5 74 c8 e0 3f 6f 85 ve.]...D..t..?o. Jan 13 22:57:08.827645: | 94 7f 05 b5 1b 71 cc a1 34 84 63 e2 1f 24 6c 04 .....q..4.c..$l. Jan 13 22:57:08.827656: | 52 5d 14 50 31 75 22 ec c6 01 48 e7 86 b0 54 d7 R].P1u"...H...T. Jan 13 22:57:08.827668: | a8 f1 01 e1 66 5f 4c a0 ad 85 f3 17 72 0b 4e 3d ....f_L.....r.N= Jan 13 22:57:08.827678: | 26 65 01 46 b2 0e 7a dd d2 46 1d e5 3d d3 c1 aa &e.F..z..F..=... Jan 13 22:57:08.827688: | 9b 72 a3 5c a7 f3 f2 42 c4 16 fb 04 df d2 3b dc .r.\...B......;. Jan 13 22:57:08.827699: | 28 ca 29 c1 (.). Jan 13 22:57:08.827710: | **parse ISAKMP Message: Jan 13 22:57:08.827727: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.827744: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.827755: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Jan 13 22:57:08.827765: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.827779: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.827790: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 22:57:08.827803: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.827817: | length: 580 (00 00 02 44) Jan 13 22:57:08.827829: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Jan 13 22:57:08.827855: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Jan 13 22:57:08.827869: | State DB: found IKEv2 state #41 in PARENT_R1 (find_v2_ike_sa) Jan 13 22:57:08.827886: | #41 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Jan 13 22:57:08.827906: | Message ID: IKE #41 not a duplicate - responder is accumulating encrypted fragments for message with request 1 (SKEYSEED is being computed): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.827919: | unpacking clear payload Jan 13 22:57:08.827930: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.827941: | ***parse IKEv2 Encrypted Fragment: Jan 13 22:57:08.827951: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.827965: | flags: none (0x0) Jan 13 22:57:08.827978: | length: 552 (02 28) Jan 13 22:57:08.827989: | fragment number: 3 (00 03) Jan 13 22:57:08.828002: | total fragments: 6 (00 06) Jan 13 22:57:08.828013: | processing payload: ISAKMP_NEXT_v2SKF (len=544) Jan 13 22:57:08.828025: | looking for transition from PARENT_R1 matching IKE_AUTH request: SKF (ignoring secured payloads) Jan 13 22:57:08.828037: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 22:57:08.828047: | exchange type does not match IKE_INTERMEDIATE Jan 13 22:57:08.828057: | trying: Responder: process IKE_AUTH request Jan 13 22:57:08.828066: | matching by ignoring secured payloads Jan 13 22:57:08.828076: | received IKE encrypted fragment number '3', total number '6', next payload '0' Jan 13 22:57:08.828094: | #41 spent 0.958 (1.01) milliseconds in ikev2_process_packet() Jan 13 22:57:08.828109: | delref struct msg_digest@0x55c83801fab8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.828121: | delref logger@0x55c83803dd78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.828131: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.828142: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.828157: | delref struct iface_endpoint@0x55c83801f058(3->2) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.828173: | spent 1.04 (1.09) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.828204: | spent 0.00325 (0.00329) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.828228: | newref struct msg_digest@0x55c83801fab8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.828245: | addref struct iface_endpoint@0x55c83801f058(2->3) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.828257: | newref alloc logger@0x55c83803dd78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.828275: | *received 580 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 22:57:08.828288: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.828299: | 35 20 23 08 00 00 00 01 00 00 02 44 00 00 02 28 5 #........D...( Jan 13 22:57:08.828320: | 00 04 00 06 07 b9 70 50 23 f6 18 d7 69 9f ae 3b ......pP#...i..; Jan 13 22:57:08.828333: | ac 3e cf 4e 66 1b a0 92 f9 bc 7e c0 87 5c 0b aa .>.Nf.....~..\.. Jan 13 22:57:08.828343: | d6 19 d7 24 cd 96 32 2c 59 9a 16 39 48 eb 80 7e ...$..2,Y..9H..~ Jan 13 22:57:08.828353: | 8b 81 a2 51 c6 bc 52 69 24 92 61 e7 f1 77 ef 81 ...Q..Ri$.a..w.. Jan 13 22:57:08.828362: | e8 f7 4f 2a 56 75 84 67 16 e7 84 b7 34 b1 76 9e ..O*Vu.g....4.v. Jan 13 22:57:08.828372: | 3a c4 40 5c 4a c2 17 f6 70 16 b9 3e 05 c9 4e 45 :.@\J...p..>..NE Jan 13 22:57:08.828382: | eb 1b 24 04 49 17 ac c7 0b 90 54 41 2b ef c4 9c ..$.I.....TA+... Jan 13 22:57:08.828393: | 58 d4 5d 00 c9 76 63 81 2d 30 22 65 80 f9 f9 c2 X.]..vc.-0"e.... Jan 13 22:57:08.828408: | e9 da 7e d6 80 e6 32 bc 56 91 a5 1c 93 9e bc 4d ..~...2.V......M Jan 13 22:57:08.828446: | 21 00 06 c8 29 ae 02 2d d5 d9 2b 4e 41 fc fa 5f !...)..-..+NA.._ Jan 13 22:57:08.828458: | 34 f0 6a 9e 88 6c 5f aa 65 0b 89 3e 12 53 7f 70 4.j..l_.e..>.S.p Jan 13 22:57:08.828468: | da 6d 6f cd fd 3d 91 37 c8 f4 81 7f 2e f1 64 2d .mo..=.7......d- Jan 13 22:57:08.828483: | 55 1b b2 47 0d f9 e5 f5 31 e2 ab 0d fe 48 ae 8a U..G....1....H.. Jan 13 22:57:08.828494: | cd 85 80 ee 2f 26 28 b5 57 ea d0 4b 53 ea 72 3d ..../&(.W..KS.r= Jan 13 22:57:08.828504: | 2f f1 79 9d bf 91 3f c0 8c 33 a3 a2 7e c6 da a0 /.y...?..3..~... Jan 13 22:57:08.828517: | 53 b1 67 0a 39 24 64 06 51 a8 74 8f 95 52 15 c8 S.g.9$d.Q.t..R.. Jan 13 22:57:08.828528: | f2 e7 dd 60 50 79 da fe ff c6 a3 ff ea a0 b0 ad ...`Py.......... Jan 13 22:57:08.828539: | ed b2 19 e0 84 8e 48 22 ae 4f 78 b7 03 eb 84 59 ......H".Ox....Y Jan 13 22:57:08.828549: | 80 2d 64 4b d3 fe 82 5f 61 17 0a 3c b5 7d c7 88 .-dK..._a..<.}.. Jan 13 22:57:08.828559: | e8 a2 e3 f7 00 4c 16 b0 cc 93 55 44 cf 2c ab 19 .....L....UD.,.. Jan 13 22:57:08.828568: | 17 44 d4 58 b4 48 96 62 98 fb 33 70 02 12 f4 d9 .D.X.H.b..3p.... Jan 13 22:57:08.828579: | d1 44 66 61 4e 50 7a 5e ca fe 98 7c 1b 1a 1d ca .DfaNPz^...|.... Jan 13 22:57:08.828588: | d9 ca 71 6c 05 1d d1 4b ac 62 0b 43 e0 18 32 18 ..ql...K.b.C..2. Jan 13 22:57:08.828599: | a0 79 84 30 8e f0 61 b0 3c 61 bf d5 fe 87 ee b3 .y.0..a.0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.829134: | delref logger@0x55c83803dd78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.829146: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.829158: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.829172: | delref struct iface_endpoint@0x55c83801f058(3->2) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.829191: | spent 0.987 (0.993) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.829210: | processing resume sending job back to main thread for #41 Jan 13 22:57:08.829226: | suspend: no MD saved in state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 22:57:08.829239: | job 51 helper 7 #41 DH shared secret (dh): calling state's callback function Jan 13 22:57:08.829253: | completing DH shared secret for #41/#41 Jan 13 22:57:08.829264: | complete_dh_shared_secret: delref st_dh_shared_secret-key@NULL Jan 13 22:57:08.829275: | process_v2_request_no_skeyseed_continue() for #41 STATE_V2_PARENT_R1: calculating g^{xy}, sending R2 Jan 13 22:57:08.829286: | calculating skeyseed using prf=HMAC_SHA2_256 integ=HMAC_SHA2_256_128 cipherkey-size=32 salt-size=0 Jan 13 22:57:08.829351: | result: newref Ni | Nr-key@0x55c838002520 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829385: | result: newref Ni | Nr-key@0x55c837ffbd90 (80-bytes, SHA256_HMAC)(init_bytes() +117 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.829401: | Ni | Nr: delref tmp-key@0x55c838002520 Jan 13 22:57:08.829434: | SKEYSEED = prf(Ni | Nr, g^ir): delref clone-key@0x55c837ffbd90 Jan 13 22:57:08.829473: | nss hmac digest hack: newref slot-key@0x55c838003da0 (256-bytes, CONCATENATE_DATA_AND_BASE) Jan 13 22:57:08.829518: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.829583: | result: newref final-key@0x55c838002520 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829615: | result: newref final-key@0x55c837ffbd90 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829631: | final: delref tmp-key@0x55c838002520 Jan 13 22:57:08.829677: | result: newref data=Ni-key@0x55c838005890 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829706: | result: newref data=Ni-key@0x55c838002520 (48-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829721: | data=Ni: delref tmp-key@0x55c838005890 Jan 13 22:57:08.829753: | result: newref data+=Nr-key@0x55c838005890 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829767: | append_symkey_bytes: delref lhs-key@0x55c838002520 Jan 13 22:57:08.829799: | result: newref data+=SPIi-key@0x55c838002520 (88-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829821: | append_symkey_bytes: delref lhs-key@0x55c838005890 Jan 13 22:57:08.829855: | result: newref data+=SPIr-key@0x55c838005890 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.829868: | append_symkey_bytes: delref lhs-key@0x55c838002520 Jan 13 22:57:08.829899: | result: newref clone-key@0x55c838002520 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.829923: | prf+0: delref clone-key@0x55c838002520 Jan 13 22:57:08.829955: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.829988: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.830047: | result: newref final-key@0x55c8380405b0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830077: | result: newref final-key@0x55c838002520 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830093: | final: delref tmp-key@0x55c8380405b0 Jan 13 22:57:08.830110: | prfplus: addref old_t[1]-key@0x55c838002520 Jan 13 22:57:08.830140: | result: newref clone-key@0x55c8380405b0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.830165: | prf+N: delref clone-key@0x55c8380405b0 Jan 13 22:57:08.830202: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.830233: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.830266: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.830296: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.830356: | result: newref final-key@0x55c838029cd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830386: | result: newref final-key@0x55c8380405b0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830402: | final: delref tmp-key@0x55c838029cd0 Jan 13 22:57:08.830435: | result: newref result-key@0x55c838029cd0 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830448: | append_symkey_symkey: delref lhs-key@0x55c838002520 Jan 13 22:57:08.830459: | prfplus: delref old_t[N]-key@0x55c838002520 Jan 13 22:57:08.830487: | result: newref clone-key@0x55c838002520 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.830511: | prf+N: delref clone-key@0x55c838002520 Jan 13 22:57:08.830543: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.830576: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.830608: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.830643: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.830703: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830733: | result: newref final-key@0x55c838002520 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830748: | final: delref tmp-key@0x55c838041fd0 Jan 13 22:57:08.830781: | result: newref result-key@0x55c838041fd0 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.830795: | append_symkey_symkey: delref lhs-key@0x55c838029cd0 Jan 13 22:57:08.830810: | prfplus: delref old_t[N]-key@0x55c8380405b0 Jan 13 22:57:08.830843: | result: newref clone-key@0x55c8380405b0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.830867: | prf+N: delref clone-key@0x55c8380405b0 Jan 13 22:57:08.830900: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.830941: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.830974: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.831004: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.831064: | result: newref final-key@0x55c838029cd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831093: | result: newref final-key@0x55c8380405b0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831109: | final: delref tmp-key@0x55c838029cd0 Jan 13 22:57:08.831142: | result: newref result-key@0x55c838029cd0 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831155: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 22:57:08.831170: | prfplus: delref old_t[N]-key@0x55c838002520 Jan 13 22:57:08.831202: | result: newref clone-key@0x55c838002520 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.831226: | prf+N: delref clone-key@0x55c838002520 Jan 13 22:57:08.831257: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.831289: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.831320: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.831350: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.831409: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831439: | result: newref final-key@0x55c838002520 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831455: | final: delref tmp-key@0x55c838041fd0 Jan 13 22:57:08.831489: | result: newref result-key@0x55c838041fd0 (160-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831502: | append_symkey_symkey: delref lhs-key@0x55c838029cd0 Jan 13 22:57:08.831518: | prfplus: delref old_t[N]-key@0x55c8380405b0 Jan 13 22:57:08.831550: | result: newref clone-key@0x55c8380405b0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.831575: | prf+N: delref clone-key@0x55c8380405b0 Jan 13 22:57:08.831608: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.831640: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.831672: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.831701: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.831761: | result: newref final-key@0x55c838029cd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831790: | result: newref final-key@0x55c8380405b0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831806: | final: delref tmp-key@0x55c838029cd0 Jan 13 22:57:08.831845: | result: newref result-key@0x55c838029cd0 (192-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.831858: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 22:57:08.831873: | prfplus: delref old_t[N]-key@0x55c838002520 Jan 13 22:57:08.831906: | result: newref clone-key@0x55c838002520 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.831931: | prf+N: delref clone-key@0x55c838002520 Jan 13 22:57:08.831963: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.831995: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.832028: | nss hmac digest hack: newref slot-key@0x55c838003da0 (96-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.832067: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.832127: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.832158: | result: newref final-key@0x55c838002520 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.832173: | final: delref tmp-key@0x55c838041fd0 Jan 13 22:57:08.832207: | result: newref result-key@0x55c838041fd0 (224-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.832220: | append_symkey_symkey: delref lhs-key@0x55c838029cd0 Jan 13 22:57:08.832235: | prfplus: delref old_t[N]-key@0x55c8380405b0 Jan 13 22:57:08.832252: | prfplus: delref old_t[final]-key@0x55c838002520 Jan 13 22:57:08.832266: | ike_sa_keymat: delref data-key@0x55c838005890 Jan 13 22:57:08.832283: | calc_skeyseed_v2: delref skeyseed-key@0x55c837ffbd90 Jan 13 22:57:08.832325: | result: newref SK_d-key@0x55c837ffbd90 (32-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +115 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832368: | result: newref SK_ai-key@0x55c838005890 (32-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +120 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832393: | result: newref SK_ar-key@0x55c838002520 (32-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +125 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832418: | result: newref SK_ei-key@0x55c8380405b0 (32-bytes, AES_CBC)(calc_skeyseed_v2() +135 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832429: | calc_skeyseed_v2: delref initiator-salt-key-key@NULL Jan 13 22:57:08.832451: | result: newref SK_er_k-key@0x55c838029cd0 (32-bytes, AES_CBC)(calc_skeyseed_v2() +156 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832461: | calc_skeyseed_v2: delref responder-salt-key-key@NULL Jan 13 22:57:08.832488: | result: newref SK_pi-key@0x55c838000ab0 (32-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +172 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832512: | chunk_SK_pi: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.832538: | chunk_SK_pi: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.832565: | result: newref SK_pr-key@0x55c838013660 (32-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +180 programs/pluto/crypt_dh_v2.c) Jan 13 22:57:08.832589: | chunk_SK_pr: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.832614: | chunk_SK_pr: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.832629: | calc_skeyseed_v2: delref finalkey-key@0x55c838041fd0 Jan 13 22:57:08.832654: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.832674: | auth: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.832707: | authenticator matched Jan 13 22:57:08.832732: | stripping 16 octets as pad Jan 13 22:57:08.832745: | saved fragment 1 of 6 decrypted Jan 13 22:57:08.832768: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.832787: | auth: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.832819: | authenticator matched Jan 13 22:57:08.832841: | stripping 16 octets as pad Jan 13 22:57:08.832854: | saved fragment 2 of 6 decrypted Jan 13 22:57:08.832877: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.832896: | auth: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.832929: | authenticator matched Jan 13 22:57:08.832949: | stripping 16 octets as pad Jan 13 22:57:08.832963: | saved fragment 3 of 6 decrypted Jan 13 22:57:08.832986: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.833005: | auth: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.833037: | authenticator matched Jan 13 22:57:08.833058: | stripping 16 octets as pad Jan 13 22:57:08.833077: | saved fragment 4 of 6 decrypted Jan 13 22:57:08.833087: | some, but not all fragments were invalid, .total can be trusted Jan 13 22:57:08.833096: | job 51 helper 7 #41 DH shared secret (dh): final status STF_SKIP_COMPLETE_STATE_TRANSITION; cleaning up Jan 13 22:57:08.833109: | delref struct dh_local_secret@0x7ff8a8004898(2->1) (cleanup_dh_shared_secret() +173 programs/pluto/crypt_dh.c) Jan 13 22:57:08.833119: | DH: delref secret-key@NULL Jan 13 22:57:08.833129: | delref logger@0x55c83804dcf8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.833139: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.833148: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.833158: | resume sending job back to main thread for #41 suppresed complete_v2_state_transition() Jan 13 22:57:08.833169: | delref mdp@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.833184: | #41 spent 3.96 (3.96) milliseconds in resume sending job back to main thread Jan 13 22:57:08.833197: | delref tt@0x7ff8ac0020e8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.833222: | spent 0.00269 (0.00266) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.833243: | newref struct msg_digest@0x55c83801fab8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.833256: | addref struct iface_endpoint@0x55c83801f058(2->3) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.833267: | newref alloc logger@0x55c838043798(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.833284: | *received 580 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 22:57:08.833296: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.833305: | 35 20 23 08 00 00 00 01 00 00 02 44 00 00 02 28 5 #........D...( Jan 13 22:57:08.833314: | 00 05 00 06 bb 6c 64 c8 bd f9 ea 22 6d db da ef .....ld...."m... Jan 13 22:57:08.833322: | 38 2c a6 9a 05 0f 6a a1 ad 44 77 65 02 df f8 8b 8,....j..Dwe.... Jan 13 22:57:08.833330: | cc 67 83 80 60 40 5d ba 47 5c 17 54 15 cf b9 ad .g..`@].G\.T.... Jan 13 22:57:08.833341: | 62 a6 83 e5 19 35 61 26 71 fa 1c 18 6c f7 4a c9 b....5a&q...l.J. Jan 13 22:57:08.833349: | 38 da 56 b4 bd 89 d0 30 9b 9f fc 74 51 f2 62 14 8.V....0...tQ.b. Jan 13 22:57:08.833358: | 5f 0a df d1 e1 d1 43 7e 64 8c 19 98 62 58 c6 b7 _.....C~d...bX.. Jan 13 22:57:08.833366: | d8 7e 00 17 5f e2 75 c8 96 89 ae df 41 a9 ee 5b .~.._.u.....A..[ Jan 13 22:57:08.833377: | bb 27 92 b7 0a 2c 99 f3 f6 4c ed 58 a9 57 df e6 .'...,...L.X.W.. Jan 13 22:57:08.833385: | b8 94 b0 b2 d8 d3 28 bb d0 ab 7b 15 2d 73 a9 61 ......(...{.-s.a Jan 13 22:57:08.833394: | 32 3b 3d 4d e4 7c 60 c9 1c 44 a1 85 d1 0e 7d a4 2;=M.|`..D....}. Jan 13 22:57:08.833402: | bd 4a d8 33 c4 8e 41 fc e6 9e 2c 65 e7 a5 b2 df .J.3..A...,e.... Jan 13 22:57:08.833413: | 07 d5 49 e0 3c 9b cd 84 b8 37 e8 5a d7 a0 22 96 ..I.<....7.Z..". Jan 13 22:57:08.833422: | b2 1f fa 44 bf 96 6f 6f 5d 23 a7 ea 4d 86 6d c7 ...D..oo]#..M.m. Jan 13 22:57:08.833430: | e4 5f e8 32 86 19 88 e2 05 9b 8b 37 30 fc b1 76 ._.2.......70..v Jan 13 22:57:08.833438: | ee 51 97 07 64 eb 4c 7f ab d8 f5 a3 6c d9 6b 18 .Q..d.L.....l.k. Jan 13 22:57:08.833446: | d8 06 cf 6d a0 4e 7f a0 63 f2 57 f4 6e e1 4f c0 ...m.N..c.W.n.O. Jan 13 22:57:08.833456: | da 54 fd d9 e3 cb ba c4 a4 2a 00 fd 7a be b0 28 .T.......*..z..( Jan 13 22:57:08.833465: | 02 e7 97 2d 1e e9 44 1f b8 ff 41 42 51 62 91 c7 ...-..D...ABQb.. Jan 13 22:57:08.833474: | 3b 48 be 64 a0 86 66 4a 23 02 24 14 84 35 b3 ba ;H.d..fJ#.$..5.. Jan 13 22:57:08.833482: | f4 8c f3 aa ab 46 fa 6c b7 1b 31 b4 4e 1e 3b 1b .....F.l..1.N.;. Jan 13 22:57:08.833490: | 9b aa a5 b4 39 57 1b 9e 42 03 2a 71 5a 0b 06 b0 ....9W..B.*qZ... Jan 13 22:57:08.833501: | 0f 09 3b 2c 95 86 30 50 ca ab 7c 9b b2 16 3a 0d ..;,..0P..|...:. Jan 13 22:57:08.833521: | b1 83 6b e2 21 7e 73 ab 0a 35 f3 7d 0a 69 33 13 ..k.!~s..5.}.i3. Jan 13 22:57:08.833532: | 7c 62 55 35 56 57 98 92 5e a5 96 5f 44 86 45 06 |bU5VW..^.._D.E. Jan 13 22:57:08.833540: | cc 96 c4 18 6d 06 76 b9 e1 70 db 72 c9 f5 b1 b3 ....m.v..p.r.... Jan 13 22:57:08.833548: | c9 4d 39 a5 25 80 0d 56 60 69 16 ff c9 3a e0 9c .M9.%..V`i...:.. Jan 13 22:57:08.833559: | 25 99 c2 f6 7a 98 94 74 15 dd 92 37 f3 9d d8 7c %...z..t...7...| Jan 13 22:57:08.833568: | f6 d0 00 24 83 d1 72 53 93 9f 44 6d 23 84 b4 b2 ...$..rS..Dm#... Jan 13 22:57:08.833577: | c3 ba a6 82 17 f4 30 ad f4 7b fe f1 be 21 46 6a ......0..{...!Fj Jan 13 22:57:08.833585: | 8f 1f 38 51 96 45 92 1c e9 c5 af de 09 e1 3b d5 ..8Q.E........;. Jan 13 22:57:08.833593: | 42 74 39 f7 ea 2e ff c1 ba e9 05 30 ef 80 54 ff Bt9........0..T. Jan 13 22:57:08.833604: | 17 ee 8c a8 4d 28 75 58 7f 3d 12 0a 55 7f c4 d2 ....M(uX.=..U... Jan 13 22:57:08.833613: | f9 67 8e 47 cf 21 db 43 47 f1 6f 29 31 c9 4e 5b .g.G.!.CG.o)1.N[ Jan 13 22:57:08.833621: | 9c 84 f7 15 e2 63 dc 0f e3 0a 09 57 48 6f 68 f4 .....c.....WHoh. Jan 13 22:57:08.833630: | 66 bf 68 a5 f.h. Jan 13 22:57:08.833640: | **parse ISAKMP Message: Jan 13 22:57:08.833653: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.833665: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.833675: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Jan 13 22:57:08.833684: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.833695: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.833705: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 22:57:08.833716: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.833728: | length: 580 (00 00 02 44) Jan 13 22:57:08.833739: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Jan 13 22:57:08.833751: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Jan 13 22:57:08.833761: | State DB: found IKEv2 state #41 in PARENT_R1 (find_v2_ike_sa) Jan 13 22:57:08.833775: | #41 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Jan 13 22:57:08.833792: | Message ID: IKE #41 not a duplicate - responder is accumulating decrypted fragments for message request 1 (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.833802: | unpacking clear payload Jan 13 22:57:08.833811: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.833820: | ***parse IKEv2 Encrypted Fragment: Jan 13 22:57:08.833829: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.833839: | flags: none (0x0) Jan 13 22:57:08.833850: | length: 552 (02 28) Jan 13 22:57:08.833859: | fragment number: 5 (00 05) Jan 13 22:57:08.833869: | total fragments: 6 (00 06) Jan 13 22:57:08.833878: | processing payload: ISAKMP_NEXT_v2SKF (len=544) Jan 13 22:57:08.833888: | looking for transition from PARENT_R1 matching IKE_AUTH request: SKF (ignoring secured payloads) Jan 13 22:57:08.833898: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 22:57:08.833907: | exchange type does not match IKE_INTERMEDIATE Jan 13 22:57:08.833915: | trying: Responder: process IKE_AUTH request Jan 13 22:57:08.833922: | matching by ignoring secured payloads Jan 13 22:57:08.833930: | received IKE encrypted fragment number '5', total number '6', next payload '0' Jan 13 22:57:08.833955: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.833975: | auth: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.834009: | authenticator matched Jan 13 22:57:08.834031: | stripping 16 octets as pad Jan 13 22:57:08.834044: | fragment 5 of 6 decrypted Jan 13 22:57:08.834054: | waiting for more fragments Jan 13 22:57:08.834068: | #41 spent 0.849 (0.849) milliseconds in ikev2_process_packet() Jan 13 22:57:08.834087: | delref struct msg_digest@0x55c83801fab8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.834098: | delref logger@0x55c838043798(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.834106: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.834115: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.834127: | delref struct iface_endpoint@0x55c83801f058(3->2) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.834141: | spent 0.924 (0.924) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.834166: | spent 0.00277 (0.0028) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 22:57:08.834187: | newref struct msg_digest@0x55c83801fab8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.834200: | addref struct iface_endpoint@0x55c83801f058(2->3) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.834210: | newref alloc logger@0x55c838043798(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 22:57:08.834227: | *received 532 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 22:57:08.834239: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 22:57:08.834249: | 35 20 23 08 00 00 00 01 00 00 02 14 00 00 01 f8 5 #............. Jan 13 22:57:08.834257: | 00 06 00 06 8c 3c e9 f3 be 54 de 92 f6 4b 90 8e .....<...T...K.. Jan 13 22:57:08.834265: | a1 4f c6 ca cb 21 80 79 f3 84 8a 68 c0 b0 a0 14 .O...!.y...h.... Jan 13 22:57:08.834273: | f5 31 c2 55 93 b2 09 6f 07 34 6a dd 78 c9 d1 37 .1.U...o.4j.x..7 Jan 13 22:57:08.834281: | ab 8f 89 94 7a b1 95 24 e4 84 eb b6 f3 af 20 37 ....z..$...... 7 Jan 13 22:57:08.834292: | 9d 0e ba d3 bf ab ee ae 6a fa 8e 7e 7a 93 ab 99 ........j..~z... Jan 13 22:57:08.834301: | 14 b9 fd 2f d7 c4 b5 dc 49 63 f0 05 17 da eb 15 .../....Ic...... Jan 13 22:57:08.834309: | c4 ad 79 03 35 88 47 f9 f2 90 d0 5f 84 fa b0 ec ..y.5.G...._.... Jan 13 22:57:08.834318: | 09 6e 72 99 bc a9 95 35 e4 b8 af 01 c9 65 8a 44 .nr....5.....e.D Jan 13 22:57:08.834325: | 18 ef af f0 81 de a0 1b 9b 62 6a 57 9f 3e 5a cd .........bjW.>Z. Jan 13 22:57:08.834334: | 1b ae 69 32 d0 65 fa 69 72 a0 d1 75 74 22 90 49 ..i2.e.ir..ut".I Jan 13 22:57:08.834344: | 40 2f e9 22 e8 a2 12 5f 85 fc bd e3 6e 51 22 c3 @/."..._....nQ". Jan 13 22:57:08.834353: | da bf 7b 58 7a ba 0a 44 27 9c 36 ad e2 97 96 be ..{Xz..D'.6..... Jan 13 22:57:08.834361: | c5 67 b8 b2 0f 85 8f 81 d2 4f 34 b3 0e c0 6c b1 .g.......O4...l. Jan 13 22:57:08.834369: | 85 d3 44 c3 ae f7 68 f2 55 b3 1d 76 57 da dd f6 ..D...h.U..vW... Jan 13 22:57:08.834380: | 84 43 94 68 32 4b b7 e9 d6 44 45 d4 13 7c 1f e3 .C.h2K...DE..|.. Jan 13 22:57:08.834389: | 84 5d f3 9a 04 5d c5 fc 3d d3 6d ec 62 07 8b a4 .]...]..=.m.b... Jan 13 22:57:08.834397: | 48 5b 95 c0 7b 7a 59 0d c5 8d 78 6a 0f 41 35 5f H[..{zY...xj.A5_ Jan 13 22:57:08.834405: | c2 1a f4 81 9c 91 1e c5 02 2f ff 61 8a 1b 6a ae ........./.a..j. Jan 13 22:57:08.834414: | f9 7d f7 f5 1d c2 17 a3 83 87 ed eb 22 84 54 26 .}..........".T& Jan 13 22:57:08.834422: | 97 94 ad 65 a3 5d 97 6c f4 12 fc 03 8a b0 e6 d4 ...e.].l........ Jan 13 22:57:08.834432: | d1 df 1c 5f 9c 96 83 aa f5 31 56 8b 0b ce d2 e9 ..._.....1V..... Jan 13 22:57:08.834441: | 32 c4 ea 6a 98 05 b8 37 2a f7 81 37 4d 86 86 1e 2..j...7*..7M... Jan 13 22:57:08.834449: | 65 d0 a8 f8 51 52 0d 63 25 af ea b0 94 79 90 76 e...QR.c%....y.v Jan 13 22:57:08.834457: | 37 eb 81 35 5f 22 b7 00 d5 39 6d 02 e2 1b d5 83 7..5_"...9m..... Jan 13 22:57:08.834466: | c6 d1 b6 f8 f8 d3 5c 46 ca 11 90 0e 10 79 94 6b ......\F.....y.k Jan 13 22:57:08.834473: | 8f 97 9a 18 b9 5b 09 ca f3 6c ed dc 23 b0 27 7e .....[...l..#.'~ Jan 13 22:57:08.834492: | b0 6b a4 3d 9d 48 94 97 b8 e0 0a a4 b8 f0 d1 d0 .k.=.H.......... Jan 13 22:57:08.834501: | 40 f8 54 39 de 2a 33 03 a7 3a f9 5b 7f bb e5 ba @.T9.*3..:.[.... Jan 13 22:57:08.834509: | cf ec d8 f3 f2 18 2f 2a 01 79 73 b2 62 92 a9 cd ....../*.ys.b... Jan 13 22:57:08.834518: | a2 75 5d c1 ec 64 06 14 e2 c8 63 3b 10 96 40 84 .u]..d....c;..@. Jan 13 22:57:08.834526: | 78 b4 91 ff 1a d1 59 15 8f ba f9 18 7a b6 0a 7d x.....Y.....z..} Jan 13 22:57:08.834534: | 0f 9a 9d d7 .... Jan 13 22:57:08.834543: | **parse ISAKMP Message: Jan 13 22:57:08.834556: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.834568: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.834578: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Jan 13 22:57:08.834587: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.834596: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.834604: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 22:57:08.834614: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.834624: | length: 532 (00 00 02 14) Jan 13 22:57:08.834635: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Jan 13 22:57:08.834644: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Jan 13 22:57:08.834654: | State DB: found IKEv2 state #41 in PARENT_R1 (find_v2_ike_sa) Jan 13 22:57:08.834666: | #41 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Jan 13 22:57:08.834682: | Message ID: IKE #41 not a duplicate - responder is accumulating decrypted fragments for message request 1 (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.834693: | unpacking clear payload Jan 13 22:57:08.834702: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.834710: | ***parse IKEv2 Encrypted Fragment: Jan 13 22:57:08.834718: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.834727: | flags: none (0x0) Jan 13 22:57:08.834736: | length: 504 (01 f8) Jan 13 22:57:08.834745: | fragment number: 6 (00 06) Jan 13 22:57:08.834757: | total fragments: 6 (00 06) Jan 13 22:57:08.834766: | processing payload: ISAKMP_NEXT_v2SKF (len=496) Jan 13 22:57:08.834776: | looking for transition from PARENT_R1 matching IKE_AUTH request: SKF (ignoring secured payloads) Jan 13 22:57:08.834785: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 22:57:08.834794: | exchange type does not match IKE_INTERMEDIATE Jan 13 22:57:08.834802: | trying: Responder: process IKE_AUTH request Jan 13 22:57:08.834810: | matching by ignoring secured payloads Jan 13 22:57:08.834818: | received IKE encrypted fragment number '6', total number '6', next payload '0' Jan 13 22:57:08.834842: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.834862: | auth: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.834895: | authenticator matched Jan 13 22:57:08.834918: | stripping 2 octets as pad Jan 13 22:57:08.834930: | fragment 6 of 6 decrypted Jan 13 22:57:08.834941: | reassembling incoming fragments Jan 13 22:57:08.834951: | addref struct msg_digest@0x55c838050b08(1->2) (reassemble_v2_incoming_fragments() +1150 programs/pluto/ikev2_message.c) Jan 13 22:57:08.834966: | delref struct msg_digest@0x55c838050b08(2->1) (free_v2_incoming_fragments() +554 programs/pluto/ikev2_send.c) Jan 13 22:57:08.834978: | Now let's proceed with payload (ISAKMP_NEXT_v2IDi) Jan 13 22:57:08.834989: | **parse IKEv2 Identification - Initiator - Payload: Jan 13 22:57:08.834997: | next payload type: ISAKMP_NEXT_v2CERT (0x25) Jan 13 22:57:08.835008: | flags: none (0x0) Jan 13 22:57:08.835018: | length: 58 (00 3a) Jan 13 22:57:08.835027: | ID type: ID_DER_ASN1_DN (0x9) Jan 13 22:57:08.835038: | reserved: 00 00 00 Jan 13 22:57:08.835047: | processing payload: ISAKMP_NEXT_v2IDi (len=50) Jan 13 22:57:08.835065: | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) Jan 13 22:57:08.835074: | **parse IKEv2 Certificate Payload: Jan 13 22:57:08.835083: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) Jan 13 22:57:08.835094: | flags: none (0x0) Jan 13 22:57:08.835104: | length: 1327 (05 2f) Jan 13 22:57:08.835112: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 22:57:08.835121: | processing payload: ISAKMP_NEXT_v2CERT (len=1322) Jan 13 22:57:08.835131: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) Jan 13 22:57:08.835140: | **parse IKEv2 Certificate Request Payload: Jan 13 22:57:08.835148: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Jan 13 22:57:08.835157: | flags: none (0x0) Jan 13 22:57:08.835166: | length: 785 (03 11) Jan 13 22:57:08.835174: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 22:57:08.835186: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=780) Jan 13 22:57:08.835194: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) Jan 13 22:57:08.835203: | **parse IKEv2 Authentication Payload: Jan 13 22:57:08.835211: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 22:57:08.835219: | flags: none (0x0) Jan 13 22:57:08.835229: | length: 520 (02 08) Jan 13 22:57:08.835240: | auth method: IKEv2_AUTH_RSA (0x1) Jan 13 22:57:08.835248: | processing payload: ISAKMP_NEXT_v2AUTH (len=512) Jan 13 22:57:08.835256: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 22:57:08.835265: | **parse IKEv2 Notify Payload: Jan 13 22:57:08.835273: | next payload type: ISAKMP_NEXT_v2CP (0x2f) Jan 13 22:57:08.835281: | flags: none (0x0) Jan 13 22:57:08.835289: | length: 8 (00 08) Jan 13 22:57:08.835300: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 22:57:08.835310: | SPI size: 0 (00) Jan 13 22:57:08.835319: | Notify Message Type: v2N_MOBIKE_SUPPORTED (0x400c) Jan 13 22:57:08.835327: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 22:57:08.835335: | Now let's proceed with payload (ISAKMP_NEXT_v2CP) Jan 13 22:57:08.835344: | **parse IKEv2 Configuration Payload: Jan 13 22:57:08.835352: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 22:57:08.835361: | flags: none (0x0) Jan 13 22:57:08.835370: | length: 36 (00 24) Jan 13 22:57:08.835378: | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) Jan 13 22:57:08.835386: | processing payload: ISAKMP_NEXT_v2CP (len=28) Jan 13 22:57:08.835394: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 22:57:08.835401: | **parse IKEv2 Security Association Payload: Jan 13 22:57:08.835409: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Jan 13 22:57:08.835418: | flags: none (0x0) Jan 13 22:57:08.835429: | length: 80 (00 50) Jan 13 22:57:08.835438: | processing payload: ISAKMP_NEXT_v2SA (len=76) Jan 13 22:57:08.835446: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Jan 13 22:57:08.835455: | **parse IKEv2 Traffic Selector - Initiator - Payload: Jan 13 22:57:08.835462: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Jan 13 22:57:08.835471: | flags: none (0x0) Jan 13 22:57:08.835480: | length: 64 (00 40) Jan 13 22:57:08.835490: | number of TS: 2 (02) Jan 13 22:57:08.835499: | processing payload: ISAKMP_NEXT_v2TSi (len=56) Jan 13 22:57:08.835507: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Jan 13 22:57:08.835515: | **parse IKEv2 Traffic Selector - Responder - Payload: Jan 13 22:57:08.835523: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.835531: | flags: none (0x0) Jan 13 22:57:08.835539: | length: 64 (00 40) Jan 13 22:57:08.835551: | number of TS: 2 (02) Jan 13 22:57:08.835559: | processing payload: ISAKMP_NEXT_v2TSr (len=56) Jan 13 22:57:08.835572: | looking for transition from PARENT_R1 matching IKE_AUTH request: SK{IDi,CERT,CERTREQ,AUTH,N,CP,SA,TSi,TSr} Jan 13 22:57:08.835583: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 22:57:08.835592: | exchange type does not match IKE_INTERMEDIATE Jan 13 22:57:08.835600: | trying: Responder: process IKE_AUTH request Jan 13 22:57:08.835607: | secured message matched Jan 13 22:57:08.835626: | selected state microcode Responder: process IKE_AUTH request Jan 13 22:57:08.835638: | #41.st_v2_transition PARENT_R0->PARENT_R1 -> PARENT_R1->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 22:57:08.835654: | Message ID: IKE #41 responder starting message request 1: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .recv_wip=1 .last_contact=9594096.783096 ike.wip.initiator=-1 Jan 13 22:57:08.835664: | calling processor Responder: process IKE_AUTH request Jan 13 22:57:08.835677: | #41 spent 1.52 (1.52) milliseconds Jan 13 22:57:08.835697: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: processing decrypted IKE_AUTH request: SK{IDi,CERT,CERTREQ,AUTH,N,CP,SA,TSi,TSr} Jan 13 22:57:08.835711: | addref struct msg_digest@0x55c838050b08(1->2) (submit_cert_decode() +81 programs/pluto/cert_decode_helper.c) Jan 13 22:57:08.835723: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds Jan 13 22:57:08.835739: | addref struct root_certs@0x55c838029ca8(1->2) (submit_cert_decode() +80 programs/pluto/cert_decode_helper.c) Jan 13 22:57:08.835754: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.835765: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.835787: | newref clone logger@0x55c838040788(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.835798: | job 52 helper 0 #41 responder decoding certificates (decode certificate payload): added to pending queue Jan 13 22:57:08.835806: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 22:57:08.835816: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.835826: | delref state-event@0x55c83800da48(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 22:57:08.835834: | #41 STATE_V2_PARENT_R1: retransmits: cleared Jan 13 22:57:08.835846: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c83800da48 timeout in 60 seconds for #41 Jan 13 22:57:08.835857: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.835870: | process_v2_IKE_AUTH_request_continue_tail returned STF_SUSPEND Jan 13 22:57:08.835882: | #41 complete_v2_state_transition() PARENT_R1->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 22:57:08.835893: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 22:57:08.835904: | addref struct msg_digest@0x55c838050b08(2->3) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 22:57:08.835908: | job 52 helper 8 #41 responder decoding certificates (decode certificate payload): started Jan 13 22:57:08.835912: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 22:57:08.835936: | checking for known CERT payloads Jan 13 22:57:08.835953: | #41 spent 0.258 (0.275) milliseconds in processing: Responder: process IKE_AUTH request in v2_dispatch() Jan 13 22:57:08.835956: | saving certificate of type 'X509_SIGNATURE' Jan 13 22:57:08.835967: | delref struct msg_digest@0x55c838050b08(3->2) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 22:57:08.835989: | #41 spent 1.81 (1.83) milliseconds in ikev2_process_packet() Jan 13 22:57:08.836000: | delref struct msg_digest@0x55c83801fab8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.836009: | delref logger@0x55c838043798(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.836016: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.836023: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.836032: | delref struct iface_endpoint@0x55c83801f058(3->2) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 22:57:08.836042: | decoded cert: O=ALU-UNIZG,CN=win7client.alu.hr Jan 13 22:57:08.836045: | spent 1.86 (1.88) milliseconds in process_iface_packet() reading and processing packet Jan 13 22:57:08.836061: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.109 (0.122) milliseconds in find_and_verify_certs() calling decode_cert_payloads() Jan 13 22:57:08.836086: | cert_issuer_has_current_crl: looking for a CRL issued by O=ALU-UNIZG,CN=ALU-UNIZG CA Jan 13 22:57:08.836187: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.0968 (0.0971) milliseconds in find_and_verify_certs() calling crl_update_check() Jan 13 22:57:08.836199: | missing or expired CRL Jan 13 22:57:08.836206: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 Jan 13 22:57:08.836213: | verify_end_cert verifying O=ALU-UNIZG,CN=win7client.alu.hr using: Jan 13 22:57:08.836217: | trusted CA: O=ALU-UNIZG,CN=ALU-UNIZG CA Jan 13 22:57:08.836222: | verify_end_cert trying profile IPsec Jan 13 22:57:08.836808: | certificate is valid (profile IPsec) Jan 13 22:57:08.836829: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.62 (0.621) milliseconds in find_and_verify_certs() calling verify_end_cert() Jan 13 22:57:08.836919: | newref struct pubkey@0x7ff8a0008f18(0->1) (create_pubkey_from_cert_1() +1717 lib/libswan/secrets.c) Jan 13 22:57:08.836940: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x7ff8a000be58 Jan 13 22:57:08.836948: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x7ff8a00012a8 Jan 13 22:57:08.837024: | newref struct pubkey@0x7ff8a0002ea8(0->1) (create_pubkey_from_cert_1() +1717 lib/libswan/secrets.c) Jan 13 22:57:08.837106: | newref struct pubkey@0x7ff8a0002c98(0->1) (create_pubkey_from_cert_1() +1717 lib/libswan/secrets.c) Jan 13 22:57:08.837122: | delref struct pubkey@0x7ff8a0008f18(1->0) (free_public_keyentry() +1346 lib/libswan/secrets.c) Jan 13 22:57:08.837136: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.297 (0.297) milliseconds in find_and_verify_certs() calling add_pubkey_from_nss_cert() Jan 13 22:57:08.837143: | job 52 helper 8 #41 responder decoding certificates (decode certificate payload): finished Jan 13 22:57:08.837151: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 1.22 (1.25) milliseconds in job 52 helper 8 #41 responder decoding certificates (decode certificate payload) Jan 13 22:57:08.837158: | scheduling resume sending job back to main thread for #41 Jan 13 22:57:08.837164: | newref tt@0x7ff8a000d418(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.837176: | helper 8: waiting for work Jan 13 22:57:08.837186: | processing resume sending job back to main thread for #41 Jan 13 22:57:08.837203: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 22:57:08.837215: | job 52 helper 8 #41 responder decoding certificates (decode certificate payload): calling state's callback function Jan 13 22:57:08.837223: | certificate verified OK: O=ALU-UNIZG,CN=win7client.alu.hr Jan 13 22:57:08.837236: | #41 updating local interface from 161.53.235.3:500 to 161.53.235.3:4500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 22:57:08.837246: | delref struct iface_endpoint@0x55c83801ef68(9->8) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 22:57:08.837254: | addref struct iface_endpoint@0x55c83801f058(2->3) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 22:57:08.837263: | DER ASN1 DN: Jan 13 22:57:08.837272: | 30 30 31 1a 30 18 06 03 55 04 03 13 11 77 69 6e 001.0...U....win Jan 13 22:57:08.837280: | 37 63 6c 69 65 6e 74 2e 61 6c 75 2e 68 72 31 12 7client.alu.hr1. Jan 13 22:57:08.837287: | 30 10 06 03 55 04 0a 13 09 41 4c 55 2d 55 4e 49 0...U....ALU-UNI Jan 13 22:57:08.837295: | 5a 47 ZG Jan 13 22:57:08.837306: | initiator ID is ID_DER_ASN1_DN: 'CN=win7client.alu.hr, O=ALU-UNIZG' Jan 13 22:57:08.837316: | CR Jan 13 22:57:08.837324: | 5e 95 eb cb 59 b7 fa 37 3a d3 20 19 b4 cb f3 be ^...Y..7:. ..... Jan 13 22:57:08.837331: | 11 a3 a5 44 0e ac 82 60 40 56 27 97 e5 25 13 fc ...D...`@V'..%.. Jan 13 22:57:08.837338: | 2a e1 0a 53 95 59 e4 a4 dd bc bd 86 9c 3f 07 ed *..S.Y.......?.. Jan 13 22:57:08.837345: | 40 e3 1b 08 ef ce c4 d1 88 cd 3b 15 6e 58 4e 33 @.........;.nXN3 Jan 13 22:57:08.837361: | 75 bd 57 f6 d5 42 1b 16 01 c2 d8 c0 f5 3a 9f 6e u.W..B.......:.n Jan 13 22:57:08.837370: | 4a 5c 75 22 aa 46 bf a4 08 9d 39 97 4e bd b4 a3 J\u".F....9.N... Jan 13 22:57:08.837377: | 60 f7 a0 1d 5c b8 69 fe 8d ef c1 ed 66 27 ee b2 `...\.i.....f'.. Jan 13 22:57:08.837384: | 12 0f 72 1b b8 0a 0e 04 6a 47 a2 67 c9 2e 2f 19 ..r.....jG.g../. Jan 13 22:57:08.837392: | 68 8b 9b 86 61 66 95 ed c1 2c 13 00 01 f0 33 4c h...af...,....3L Jan 13 22:57:08.837399: | 1a a1 d9 ee 5b 7b a9 de 43 bc 02 7d 57 09 33 fb ....[{..C..}W.3. Jan 13 22:57:08.837408: | ff 00 d7 43 20 2f ba a5 44 38 ca 0f 88 36 03 ac ...C /..D8...6.. Jan 13 22:57:08.837416: | a8 f7 9e 17 d8 18 a0 99 8b 0d 79 d4 5c 2e 82 10 ..........y.\... Jan 13 22:57:08.837423: | 43 4e e2 99 45 05 57 ff 88 a9 5a ef c0 84 fc 13 CN..E.W...Z..... Jan 13 22:57:08.837430: | 74 41 6b b1 63 32 c2 cf 92 59 bb 3b bb c2 3e 29 tAk.c2...Y.;..>) Jan 13 22:57:08.837437: | 0b b3 28 77 1d ad 3e a2 4d bd f4 23 bd 06 b0 3d ..(w..>.M..#...= Jan 13 22:57:08.837444: | f9 27 b6 1b 0a 37 f3 c3 1a fa 17 ec 2d 46 17 16 .'...7......-F.. Jan 13 22:57:08.837450: | 12 9d 0c 0e 34 4f 30 2d 25 69 31 91 ea f7 73 5c ....4O0-%i1...s\ Jan 13 22:57:08.837457: | ab f5 86 8d 37 82 40 ec 3e df 29 0c c1 f5 cc 73 ....7.@.>.)....s Jan 13 22:57:08.837467: | 2c eb 3d 24 e1 7e 52 da bd 27 e2 f0 7c 32 d4 85 ,.=$.~R..'..|2.. Jan 13 22:57:08.837475: | fd 89 0a 66 b5 97 ce 86 f4 d5 26 a9 21 07 e8 3e ...f......&.!..> Jan 13 22:57:08.837481: | 64 1d f8 d5 0e 23 31 c2 29 b2 50 cb 32 f5 6d f5 d....#1.).P.2.m. Jan 13 22:57:08.837489: | 5c 8e 00 fa 5e 8c 53 18 22 60 1d 56 71 d6 6a a0 \...^.S."`.Vq.j. Jan 13 22:57:08.837496: | cc 64 a0 60 07 43 d5 a8 86 26 cb 1b c5 54 b3 9f .d.`.C...&...T.. Jan 13 22:57:08.837503: | bd 6b ed 63 7f b9 89 a9 80 f1 f4 8a ed 0d c8 d6 .k.c............ Jan 13 22:57:08.837512: | 2c d3 13 29 d8 82 fe 2d c3 fc c5 10 d3 4d bb 14 ,..)...-.....M.. Jan 13 22:57:08.837520: | a8 e3 02 96 70 a6 8b 57 eb ec ef cc 29 4e 91 74 ....p..W....)N.t Jan 13 22:57:08.837527: | 9a d4 92 38 f7 93 19 ef df c1 f5 20 fb ac 85 55 ...8....... ...U Jan 13 22:57:08.837534: | 2c f2 d2 8f 5a b9 ca 0b 30 a4 e6 4f de 76 8a fc ,...Z...0..O.v.. Jan 13 22:57:08.837541: | ed 5a 90 84 28 30 46 79 2c 29 15 70 c4 30 28 c5 .Z..(0Fy,).p.0(. Jan 13 22:57:08.837551: | d3 e3 08 0c 10 44 8b 2c 77 ba 24 53 97 60 bb f9 .....D.,w.$S.`.. Jan 13 22:57:08.837559: | f8 16 51 3c fd 1b 44 9f 2e 6b 28 a1 97 22 1f b8 ..Q<..D..k(..".. Jan 13 22:57:08.837566: | 1f 51 4e 3c 87 db d4 5f b0 92 8d 4e 1d f8 15 67 .QN<..._...N...g Jan 13 22:57:08.837572: | e7 f2 ab af d6 2b 67 75 4a 81 0c de f0 c0 90 0f .....+guJ....... Jan 13 22:57:08.837579: | 19 06 42 31 35 a2 a2 8d d3 44 fd 08 d5 2e 13 c1 ..B15....D...... Jan 13 22:57:08.837586: | ab e3 49 da e8 b4 95 94 ef 7c 38 43 60 64 66 bd ..I......|8C`df. Jan 13 22:57:08.837593: | e2 7f 7b d8 77 d5 df 9e 0a 3f 9e b4 cb 0e 2e a9 ..{.w....?...... Jan 13 22:57:08.837600: | ef db 69 77 6d aa 9b 09 87 c4 d0 d4 22 ed 40 07 ..iwm.......".@. Jan 13 22:57:08.837607: | 37 4d 19 f1 91 ff de d3 83 31 7e 62 85 42 53 d6 7M.......1~b.BS. Jan 13 22:57:08.837616: | d7 78 31 90 ec 91 90 56 e9 91 b9 e3 3e 22 d4 2c .x1....V....>"., Jan 13 22:57:08.837624: | 1f 02 44 b8 04 10 65 61 7c c7 6b ae da 87 29 9c ..D...ea|.k...). Jan 13 22:57:08.837631: | 74 0b 0c d2 1b e6 a5 01 5e 02 42 a4 0b e7 f1 b7 t.......^.B..... Jan 13 22:57:08.837638: | bc bd 42 93 b1 81 08 1a 19 a4 c0 94 1f fa e8 95 ..B............. Jan 13 22:57:08.837645: | 28 c1 24 c9 9b 34 ac c7 c8 95 13 68 01 97 28 0a (.$..4.....h..(. Jan 13 22:57:08.837652: | 2c 55 c3 fc d3 90 f5 3a 05 3b c9 fb ee e5 9f 1e ,U.....:.;...... Jan 13 22:57:08.837659: | 2a a5 44 c3 cb 25 43 a6 9a 5b d4 6a 25 bc bb 8e *.D..%C..[.j%... Jan 13 22:57:08.837679: | 17 4a b8 2b 5f fb 05 67 75 27 ad 49 5a 4a 5d c4 .J.+_..gu'.IZJ]. Jan 13 22:57:08.837688: | 22 cc ea 4e 68 33 0e 61 35 85 21 59 29 83 a3 c8 "..Nh3.a5.!Y)... Jan 13 22:57:08.837695: | d2 d2 e1 40 6e 7a b3 c1 4f 9c 7d 21 79 9c ad 0e ...@nz..O.}!y... Jan 13 22:57:08.837703: | d8 b9 0c 57 9f 1a 02 99 e7 90 f3 87 ...W........ Jan 13 22:57:08.837709: | cert blob content is not binary ASN.1 Jan 13 22:57:08.837720: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: ignoring CERTREQ payload that is not ASN1 Jan 13 22:57:08.837732: | rhc: looking for an IKEv2 connection more refined than "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.837747: | rhc: trying connections matching 161.53.235.3->94.253.210.164 Jan 13 22:57:08.837760: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (refine_host_connection_on_responder() +234 programs/pluto/peer_id.c) Jan 13 22:57:08.837776: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.837790: | rhc: checking "MYCONN-ikev2-cp"[2] 94.253.210.164 against existing "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.837800: | rhc: no IDr payload received from peer Jan 13 22:57:08.837812: | get_connection_private_key() using certificate vpn.alu.hr to find private key for @vpn.alu.hr->O=ALU-UNIZG, CN=win7client.alu.hr of kind RSA Jan 13 22:57:08.837925: | trying secret PKK_RSA:AwEAAaDIW Jan 13 22:57:08.837939: | matched Jan 13 22:57:08.837948: | secrets entry for certificate already exists: vpn.alu.hr Jan 13 22:57:08.837959: | connection MYCONN-ikev2-cp's RSA private key found in NSS DB using cert Jan 13 22:57:08.837972: | rhc: match_dn_any_order_wild: not an exact match, now checking any RDN order with 0 wildcards Jan 13 22:57:08.837988: | rhc: matching unordered DNs A: 'CN=win7client.alu.hr, O=ALU-UNIZG' B: 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 22:57:08.838015: | rhc: match_dn_unordered matched: 2, rdn_num: 2, wc 0 Jan 13 22:57:08.838028: | rhc: match_id a=CN=win7client.alu.hr, O=ALU-UNIZG Jan 13 22:57:08.838037: | rhc: b=O=ALU-UNIZG, CN=win7client.alu.hr Jan 13 22:57:08.838047: | rhc: results matched wildcards=0 Jan 13 22:57:08.838059: | trusted_ca_nss: trustee A = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838070: | trusted_ca_nss: trustor B = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838083: | rhc: matching_peer_ca=yes(0)/matching_request_ca=yes(0)) Jan 13 22:57:08.838094: | rhc: returning "MYCONN-ikev2-cp"[2] 94.253.210.164 because exact peer id match Jan 13 22:57:08.838104: | rhc: returning TRUE as "MYCONN-ikev2-cp"[2] 94.253.210.164 is most refined Jan 13 22:57:08.838114: | rhc: most refined is "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.838123: | rhc: comparing certificate: O=ALU-UNIZG,CN=win7client.alu.hr Jan 13 22:57:08.838139: | comparing ID_DER_ASN1_DN 'O=ALU-UNIZG, CN=win7client.alu.hr' to certificate derSubject='CN=win7client.alu.hr, O=ALU-UNIZG' (subjectName='O=ALU-UNIZG,CN=win7client.alu.hr') Jan 13 22:57:08.838149: | match_dn_any_order_wild: not an exact match, now checking any RDN order with 0 wildcards Jan 13 22:57:08.838164: | matching unordered DNs A: 'CN=win7client.alu.hr, O=ALU-UNIZG' B: 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 22:57:08.838187: | match_dn_unordered matched: 2, rdn_num: 2, wc 0 Jan 13 22:57:08.838200: | ID_DER_ASN1_DN 'O=ALU-UNIZG,CN=win7client.alu.hr' matched our ID 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 22:57:08.838208: | X509: CERT and ID matches current connection Jan 13 22:57:08.838216: | received v2N_MOBIKE_SUPPORTED while it did not sent Jan 13 22:57:08.838241: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.838261: | IDi verify hash: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.838285: | responder verifying AUTH payload Jan 13 22:57:08.838301: | #41 spent 1.1 (1.1) milliseconds Jan 13 22:57:08.838332: | required RSA CA is 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838352: | trying all 'peer's for RSA key that matches ID: O=ALU-UNIZG, CN=win7client.alu.hr Jan 13 22:57:08.838362: | match_dn_any_order_wild: not an exact match, now checking any RDN order with 0 wildcards Jan 13 22:57:08.838376: | matching unordered DNs A: 'CN=win7client.alu.hr, O=ALU-UNIZG' B: 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 22:57:08.838400: | match_dn_unordered matched: 2, rdn_num: 2, wc 0 Jan 13 22:57:08.838412: | match_id a=CN=win7client.alu.hr, O=ALU-UNIZG Jan 13 22:57:08.838421: | b=O=ALU-UNIZG, CN=win7client.alu.hr Jan 13 22:57:08.838431: | results matched wildcards=0 Jan 13 22:57:08.838442: | trusted_ca_nss: trustee A = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838453: | trusted_ca_nss: trustor B = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838468: | trying 'CN=win7client.alu.hr, O=ALU-UNIZG' aka *AwEAAbxfe issued by CA 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838481: | NSS RSA: verifying that decrypted signature matches hash: Jan 13 22:57:08.838492: | 44 7b 58 f3 d8 52 51 fb 54 a8 25 4c 53 d1 19 bf D{X..RQ.T.%LS... Jan 13 22:57:08.838500: | 3c 8d 50 ec <.P. Jan 13 22:57:08.838777: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.291 (0.291) milliseconds in try_all_keys() trying a pubkey Jan 13 22:57:08.838789: | 'AwEAAbxfe' passed Jan 13 22:57:08.838808: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: established IKE SA; authenticated using RSA with SHA1 and peer certificate 'CN=win7client.alu.hr, O=ALU-UNIZG' issued by CA 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 22:57:08.838819: | delref pkp@NULL (authsig_and_log_using_pubkey() +562 programs/pluto/keys.c) Jan 13 22:57:08.838829: | addref struct pubkey@0x7ff8a0002c98(1->2) (authsig_and_log_using_pubkey() +563 programs/pluto/keys.c) Jan 13 22:57:08.838841: | #41 spent 0.54 (0.54) milliseconds in v2_authsig_and_log_using_RSA_pubkey() Jan 13 22:57:08.838867: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.838886: | IDr: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.838924: | get_connection_private_key() using certificate vpn.alu.hr to find private key for @vpn.alu.hr->O=ALU-UNIZG, CN=win7client.alu.hr of kind RSA Jan 13 22:57:08.839025: | trying secret PKK_RSA:AwEAAaDIW Jan 13 22:57:08.839039: | matched Jan 13 22:57:08.839047: | secrets entry for certificate already exists: vpn.alu.hr Jan 13 22:57:08.839058: | connection MYCONN-ikev2-cp's RSA private key found in NSS DB using cert Jan 13 22:57:08.839074: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.839085: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.839094: | newref clone logger@0x55c838019ae8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 22:57:08.839105: | job 53 helper 0 #41 computing responder signature (signature): added to pending queue Jan 13 22:57:08.839113: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 22:57:08.839123: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.839134: | delref state-event@0x55c83800da48(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 22:57:08.839143: | #41 STATE_V2_PARENT_R1: retransmits: cleared Jan 13 22:57:08.839154: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c83800da48 timeout in 60 seconds for #41 Jan 13 22:57:08.839164: | newref tt@0x55c838024008(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.839180: | job 52 helper 8 #41 responder decoding certificates (decode certificate payload): final status STF_SUSPEND; cleaning up Jan 13 22:57:08.839191: | delref struct msg_digest@0x55c838050b08(2->1) (cert_decode_cleanup() +193 programs/pluto/cert_decode_helper.c) Jan 13 22:57:08.839201: | delref struct root_certs@0x55c838029ca8(2->1) (cert_decode_cleanup() +194 programs/pluto/cert_decode_helper.c) Jan 13 22:57:08.839209: | delref logger@0x55c838040788(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.839219: | job 53 helper 9 #41 computing responder signature (signature): started Jan 13 22:57:08.839230: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.839252: | hash to sign Jan 13 22:57:08.839265: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.839273: | 30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 0f 0!0...+......... Jan 13 22:57:08.839288: | #41 complete_v2_state_transition() PARENT_R1->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 22:57:08.839292: | b5 b5 ed c2 8c fc c7 bf 61 5a cc bb 71 00 74 a7 ........aZ..q.t. Jan 13 22:57:08.839304: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 22:57:08.839310: | 3d e5 b4 =.. Jan 13 22:57:08.839321: | addref struct msg_digest@0x55c838050b08(1->2) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 22:57:08.839330: | RSA_sign_hash: Started using NSS Jan 13 22:57:08.839341: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 22:57:08.839362: | delref struct msg_digest@0x55c838050b08(2->1) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.839375: | #41 spent 2.14 (2.17) milliseconds in resume sending job back to main thread Jan 13 22:57:08.839386: | delref tt@0x7ff8a000d418(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.855275: | RSA_sign_hash: Ended using NSS Jan 13 22:57:08.855302: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 16 (16) milliseconds in v2_auth_signature() calling sign_hash() Jan 13 22:57:08.855312: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 16 (16.1) milliseconds in v2_auth_signature() Jan 13 22:57:08.855320: | job 53 helper 9 #41 computing responder signature (signature): finished Jan 13 22:57:08.855327: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 16.1 (16.1) milliseconds in job 53 helper 9 #41 computing responder signature (signature) Jan 13 22:57:08.855335: | scheduling resume sending job back to main thread for #41 Jan 13 22:57:08.855342: | newref tt@0x7ff8a4002988(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.855353: | helper 9: waiting for work Jan 13 22:57:08.855364: | processing resume sending job back to main thread for #41 Jan 13 22:57:08.855381: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 22:57:08.855390: | job 53 helper 9 #41 computing responder signature (signature): calling state's callback function Jan 13 22:57:08.855401: | wipe_old_v2_connections() contemplating releasing older self Jan 13 22:57:08.855412: | FOR_EACH_CONNECTION[that_id_eq=O=ALU-UNIZG, CN=win7client.alu.hr].... in (wipe_old_v2_connections() +702 programs/pluto/ikev2_parent.c) Jan 13 22:57:08.855425: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.855435: | matches: 1 Jan 13 22:57:08.855447: | opening output PBS reply packet Jan 13 22:57:08.855457: | **emit ISAKMP Message: Jan 13 22:57:08.855468: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.855479: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.855487: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 22:57:08.855496: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.855505: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.855512: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.855521: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.855530: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 22:57:08.855539: | IKEv2 CERT: send a certificate? Jan 13 22:57:08.855546: | IKEv2 CERT: OK to send a certificate (always) Jan 13 22:57:08.855553: | ***emit IKEv2 Encryption Payload: Jan 13 22:57:08.855563: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.855572: | flags: none (0x0) Jan 13 22:57:08.855580: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 22:57:08.855600: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.855611: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 22:57:08.855627: | ****emit IKEv2 Identification - Responder - Payload: Jan 13 22:57:08.855637: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.855645: | flags: none (0x0) Jan 13 22:57:08.855653: | ID type: ID_FQDN (0x2) Jan 13 22:57:08.855661: | reserved: 00 00 00 Jan 13 22:57:08.855669: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Jan 13 22:57:08.855680: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.855689: | emitting 10 raw bytes of my identity into IKEv2 Identification - Responder - Payload Jan 13 22:57:08.855699: | my identity: 76 70 6e 2e 61 6c 75 2e 68 72 Jan 13 22:57:08.855709: | emitting length of IKEv2 Identification - Responder - Payload: 18 Jan 13 22:57:08.855716: | added IDr payload to packet Jan 13 22:57:08.855724: | sending [CERT] of certificate: vpn.alu.hr Jan 13 22:57:08.855730: | ****emit IKEv2 Certificate Payload: Jan 13 22:57:08.855738: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.855746: | flags: none (0x0) Jan 13 22:57:08.855752: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 22:57:08.855760: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) Jan 13 22:57:08.855770: | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.855779: | emitting 1308 raw bytes of CERT into IKEv2 Certificate Payload Jan 13 22:57:08.855786: | CERT: Jan 13 22:57:08.855794: | 30 82 05 18 30 82 03 00 a0 03 02 01 02 02 05 00 0...0........... Jan 13 22:57:08.855803: | ba 98 ea 76 30 0d 06 09 2a 86 48 86 f7 0d 01 01 ...v0...*.H..... Jan 13 22:57:08.855811: | 0b 05 00 30 2b 31 15 30 13 06 03 55 04 03 13 0c ...0+1.0...U.... Jan 13 22:57:08.855818: | 41 4c 55 2d 55 4e 49 5a 47 20 43 41 31 12 30 10 ALU-UNIZG CA1.0. Jan 13 22:57:08.855825: | 06 03 55 04 0a 13 09 41 4c 55 2d 55 4e 49 5a 47 ..U....ALU-UNIZG Jan 13 22:57:08.855832: | 30 1e 17 0d 32 32 30 31 30 34 32 30 31 37 35 39 0...220104201759 Jan 13 22:57:08.855839: | 5a 17 0d 32 33 30 31 30 34 32 30 31 37 35 39 5a Z..230104201759Z Jan 13 22:57:08.855846: | 30 29 31 13 30 11 06 03 55 04 03 13 0a 76 70 6e 0)1.0...U....vpn Jan 13 22:57:08.855855: | 2e 61 6c 75 2e 68 72 31 12 30 10 06 03 55 04 0a .alu.hr1.0...U.. Jan 13 22:57:08.855863: | 13 09 41 4c 55 2d 55 4e 49 5a 47 30 82 02 22 30 ..ALU-UNIZG0.."0 Jan 13 22:57:08.855870: | 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 ...*.H.......... Jan 13 22:57:08.855877: | 02 0f 00 30 82 02 0a 02 82 02 01 00 a0 c8 59 55 ...0..........YU Jan 13 22:57:08.855887: | 92 89 aa 4b 8a 33 c0 38 71 7a e9 c6 c3 90 02 a2 ...K.3.8qz...... Jan 13 22:57:08.855894: | e7 3b 94 5d 17 08 f8 ee 60 63 3d 93 fa 0c c4 7a .;.]....`c=....z Jan 13 22:57:08.855901: | 42 7d 0c 09 c2 0b ba b7 e7 ab 06 94 1b 33 85 0b B}...........3.. Jan 13 22:57:08.855908: | 67 bb 36 65 01 38 ab 4f 00 fa 52 f1 ed f5 eb 2c g.6e.8.O..R...., Jan 13 22:57:08.855915: | 14 98 88 70 74 6e 3f 19 ef cb 51 0e b6 22 54 b7 ...ptn?...Q.."T. Jan 13 22:57:08.855924: | 65 6d cb e6 99 4d fb 20 07 f3 1e 99 2a 1d 8c dd em...M. ....*... Jan 13 22:57:08.855932: | 89 0e e9 37 80 f5 a9 c3 86 04 dc e2 1e e9 4e 5a ...7..........NZ Jan 13 22:57:08.855939: | b2 f3 c6 c5 9d 92 da 0d c2 f2 ea 60 6b b9 56 3e ...........`k.V> Jan 13 22:57:08.855946: | 0c 70 6f e9 57 bf eb d9 aa 51 7d 65 a4 21 10 4b .po.W....Q}e.!.K Jan 13 22:57:08.855953: | d9 d9 28 1e 28 88 64 a5 26 32 4f e6 f7 b0 64 fe ..(.(.d.&2O...d. Jan 13 22:57:08.855969: | d5 96 fb c3 01 e3 f8 60 d0 3f 1d ea a2 fd 4b 3a .......`.?....K: Jan 13 22:57:08.855978: | 53 7b 75 de 7b b7 86 ca ec b3 1e 59 32 12 4e ea S{u.{......Y2.N. Jan 13 22:57:08.855985: | 40 26 89 ba 15 5c de 56 4c bc 0d 0e 5e 83 3a fa @&...\.VL...^.:. Jan 13 22:57:08.855993: | a5 ab a4 cf 31 af f0 ee 18 5b 6e 3e a7 6f 6d 6b ....1....[n>.omk Jan 13 22:57:08.856000: | 00 c0 3a 07 f1 c4 06 85 04 bb c2 3f 8d f9 e2 b2 ..:........?.... Jan 13 22:57:08.856009: | ed f8 0c df 23 94 52 69 ea 8b 4d f5 bb 0b fb 24 ....#.Ri..M....$ Jan 13 22:57:08.856017: | 74 8b 30 95 36 e0 0d 99 e2 3c e4 5f 5d a9 4d 08 t.0.6....<._].M. Jan 13 22:57:08.856024: | 96 b2 be 4d a0 9b 3f 69 2a 51 9c 8a 8d ed 30 bb ...M..?i*Q....0. Jan 13 22:57:08.856031: | f0 1d 51 0f 2f 14 69 12 40 f2 57 07 6a 8a 5f 24 ..Q./.i.@.W.j._$ Jan 13 22:57:08.856038: | 64 4f 21 37 0e c4 17 87 1d 0b 37 cd 45 c1 0b a2 dO!7......7.E... Jan 13 22:57:08.856045: | 6e d7 03 1c d5 a9 e3 80 c1 3d d5 54 52 4e bf 8d n........=.TRN.. Jan 13 22:57:08.856055: | 05 6c 72 a8 e2 56 3c bb 9c f2 06 85 98 9d a9 04 .lr..V<......... Jan 13 22:57:08.856062: | c8 75 dd d6 7a 4a 93 f0 b5 e8 60 43 c4 8d f9 08 .u..zJ....`C.... Jan 13 22:57:08.856070: | 31 98 21 de 16 4d 24 49 7a 6d 5d a3 41 cc e2 ac 1.!..M$Izm].A... Jan 13 22:57:08.856077: | 77 d8 c1 fa ee e5 4b 23 51 8a 28 26 75 c8 bc 9a w.....K#Q.(&u... Jan 13 22:57:08.856084: | 51 0d 94 c1 f2 62 ee 5d 7e 8f 1b 32 84 3d d2 d8 Q....b.]~..2.=.. Jan 13 22:57:08.856091: | 52 af 53 20 f4 60 29 d6 c7 52 7f 60 05 37 20 77 R.S .`)..R.`.7 w Jan 13 22:57:08.856100: | 8e b7 08 c5 9e d4 05 8d 25 33 61 03 74 89 37 90 ........%3a.t.7. Jan 13 22:57:08.856108: | 09 53 35 db 3c a9 58 b1 5b d8 11 da c6 c8 18 2e .S5.<.X.[....... Jan 13 22:57:08.856115: | 5c fb 0a cd 6b 29 a6 7c 6b f3 17 0c 9d 3a 79 d2 \...k).|k....:y. Jan 13 22:57:08.856124: | a0 45 cb a0 b2 8f 45 ba 50 21 a4 b9 aa e2 6b 18 .E....E.P!....k. Jan 13 22:57:08.856132: | 91 a9 d0 6e 41 6c bf 5d ba 8b 55 39 02 03 01 00 ...nAl.]..U9.... Jan 13 22:57:08.856139: | 01 a3 45 30 43 30 15 06 03 55 1d 11 04 0e 30 0c ..E0C0...U....0. Jan 13 22:57:08.856146: | 82 0a 76 70 6e 2e 61 6c 75 2e 68 72 30 1d 06 03 ..vpn.alu.hr0... Jan 13 22:57:08.856153: | 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 U.%..0...+...... Jan 13 22:57:08.856163: | 01 06 08 2b 06 01 05 05 07 03 02 30 0b 06 03 55 ...+.......0...U Jan 13 22:57:08.856170: | 1d 0f 04 04 03 02 05 a0 30 0d 06 09 2a 86 48 86 ........0...*.H. Jan 13 22:57:08.856177: | f7 0d 01 01 0b 05 00 03 82 02 01 00 08 06 54 5f ..............T_ Jan 13 22:57:08.856184: | c6 9d 4c 1b 16 04 f4 35 07 86 97 04 a9 4a 7e c4 ..L....5.....J~. Jan 13 22:57:08.856192: | 0f fd e7 15 df f7 33 e9 38 6c 89 fb e5 01 d6 71 ......3.8l.....q Jan 13 22:57:08.856201: | 97 7d 29 72 bb 4f b6 a2 25 8e c9 4e c2 df b3 91 .})r.O..%..N.... Jan 13 22:57:08.856208: | bb 35 76 10 9b 8a ca ac 30 20 ff 80 55 63 a6 48 .5v.....0 ..Uc.H Jan 13 22:57:08.856215: | 59 d8 c7 ab 5e cb ac c9 77 0b 93 7d 6e 11 81 ae Y...^...w..}n... Jan 13 22:57:08.856222: | a6 75 2f 1d c2 86 54 5b a9 33 40 03 e3 28 f2 f4 .u/...T[.3@..(.. Jan 13 22:57:08.856229: | 6e 3e e4 47 89 e5 07 02 85 84 c2 b9 3c 86 21 85 n>.G........<.!. Jan 13 22:57:08.856236: | fc 7a 40 74 0e ce d1 df 70 e5 82 48 09 6d 8c ee .z@t....p..H.m.. Jan 13 22:57:08.856243: | 95 20 5b d7 c8 6e 55 76 44 6d 53 ef b0 ae fe 63 . [..nUvDmS....c Jan 13 22:57:08.856252: | 15 97 28 61 d3 64 af ca 1f 82 83 06 a8 0a 64 85 ..(a.d........d. Jan 13 22:57:08.856260: | 6f 58 7a 24 d5 cb 80 e1 d3 25 27 6b f3 93 a1 b7 oXz$.....%'k.... Jan 13 22:57:08.856267: | b0 be 59 d0 eb 2f 24 61 84 a1 23 e5 e5 5a c2 86 ..Y../$a..#..Z.. Jan 13 22:57:08.856273: | d9 af 95 a5 ef aa ee 63 be 36 7c ec b5 db 67 69 .......c.6|...gi Jan 13 22:57:08.856280: | d8 bc 80 80 08 26 c6 c3 e2 96 34 5e 16 a5 23 88 .....&....4^..#. Jan 13 22:57:08.856297: | 51 49 f6 50 07 3b 6f 59 65 4c 1b 2a 4b ba bd f0 QI.P.;oYeL.*K... Jan 13 22:57:08.856312: | 42 51 e7 73 cd 27 19 94 5a 84 48 bc 98 56 9b 41 BQ.s.'..Z.H..V.A Jan 13 22:57:08.856321: | 34 0a 89 86 5a 35 4f 20 19 25 d0 75 27 ae e0 f6 4...Z5O .%.u'... Jan 13 22:57:08.856328: | 22 04 b1 46 fa ac 18 3a fc 0d b0 a3 ff 7d cc a8 "..F...:.....}.. Jan 13 22:57:08.856335: | 87 8e 5c fd dc 71 a9 47 2b 5e 4e 5c 76 a3 29 b8 ..\..q.G+^N\v.). Jan 13 22:57:08.856342: | 91 a6 67 43 2d 16 40 fe 6d d5 f5 40 a2 79 2c 91 ..gC-.@.m..@.y,. Jan 13 22:57:08.856349: | 1d 43 b1 1d 59 3a c6 58 b6 71 f6 43 9f e7 f3 36 .C..Y:.X.q.C...6 Jan 13 22:57:08.856356: | a3 21 90 aa 78 85 eb 5a 29 ff bc 90 8e 67 f9 e5 .!..x..Z)....g.. Jan 13 22:57:08.856366: | fa d2 c9 e6 3d 4f ed 90 b4 1c 53 53 92 c6 91 c2 ....=O....SS.... Jan 13 22:57:08.856374: | 72 19 c4 ad d6 68 4f d7 b4 1a 6e bb c0 f6 bf 43 r....hO...n....C Jan 13 22:57:08.856381: | 79 87 f0 19 0f a9 6f c6 69 1f 04 6f ed fc 2b c3 y.....o.i..o..+. Jan 13 22:57:08.856388: | 9f 7f d6 34 3e 80 ce b1 e5 c8 5b be e3 8b 13 f2 ...4>.....[..... Jan 13 22:57:08.856395: | af 66 d4 07 9c 4e ca c6 0a a0 ee 14 09 c0 5e e4 .f...N........^. Jan 13 22:57:08.856402: | fd 6f 5c 6d 1f ba 8d ae 93 5b ee f7 17 2f f8 3d .o\m.....[.../.= Jan 13 22:57:08.856409: | f7 3f 8a a0 eb b2 bd 68 18 99 0e 86 a7 11 af e5 .?.....h........ Jan 13 22:57:08.856419: | c1 8d 83 68 f7 aa 3c 59 b3 15 3b e0 c4 42 e2 23 ...h.. Jan 13 22:57:08.856589: | 94 f3 87 af 22 d9 ac 8d cd 32 d6 64 5b 1f 37 e9 ...."....2.d[.7. Jan 13 22:57:08.856596: | c2 37 84 0f 93 64 f5 06 03 41 85 e4 4d 5f 97 97 .7...d...A..M_.. Jan 13 22:57:08.856603: | ad 34 b9 e1 e8 42 8e 3c f9 57 61 04 31 37 ba c5 .4...B.<.Wa.17.. Jan 13 22:57:08.856612: | f8 0e bc 70 f1 9d cd b0 e9 25 4c 58 d2 b7 c7 bd ...p.....%LX.... Jan 13 22:57:08.856620: | 55 e1 03 82 2f b4 8b 1d 5c 1e 6f 9d 31 50 59 ce U.../...\.o.1PY. Jan 13 22:57:08.856627: | 5b 42 bd 88 64 50 eb fb 16 7c 46 e5 c5 ac 77 0e [B..dP...|F...w. Jan 13 22:57:08.856634: | 3e a3 fe cb 38 e7 1f ec 85 86 e5 50 9f 55 73 45 >...8......P.UsE Jan 13 22:57:08.856649: | ad c0 d1 95 74 ca 7f 7f cc f0 7c a1 36 67 53 ee ....t.....|.6gS. Jan 13 22:57:08.856658: | 8f 9d 1f 22 f7 5a 58 f6 d2 35 97 e8 5d b3 c3 ca ...".ZX..5..]... Jan 13 22:57:08.856665: | 26 8c fe 61 67 84 38 46 c5 b4 7c a7 a8 8a 8c aa &..ag.8F..|..... Jan 13 22:57:08.856673: | 61 64 29 a0 01 de 98 24 1a 01 e6 27 9f 9f 23 80 ad)....$...'..#. Jan 13 22:57:08.856680: | 76 ae 7f 3d 57 e2 6e b5 38 4f f4 c6 a1 aa ed f4 v..=W.n.8O...... Jan 13 22:57:08.856689: | eb 22 bf a0 6f f8 a3 80 72 f1 1c 75 00 1f e6 e8 ."..o...r..u.... Jan 13 22:57:08.856697: | ea 35 c8 f7 72 1c 8e e6 73 7d 2a d1 f7 d8 3a 97 .5..r...s}*...:. Jan 13 22:57:08.856704: | 06 a6 b7 1b ad 5c 06 d1 ca b9 58 01 d9 ea d3 1b .....\....X..... Jan 13 22:57:08.856711: | 5b 74 ff 37 0b a2 27 f7 70 77 7a 49 ed 5c 06 bf [t.7..'.pwzI.\.. Jan 13 22:57:08.856718: | 38 a2 8e 34 61 37 87 67 8a 3d 75 d4 67 b2 db f8 8..4a7.g.=u.g... Jan 13 22:57:08.856724: | d6 71 cf 64 99 77 0a 83 87 39 e2 c9 8a bf 01 5a .q.d.w...9.....Z Jan 13 22:57:08.856731: | f0 44 0a 86 b0 a3 a7 21 fc 27 ab aa 27 9f 8f 3a .D.....!.'..'..: Jan 13 22:57:08.856738: | 2e 22 e1 b5 f4 a3 fd fd b7 06 08 a7 d2 8b 14 5a .".............Z Jan 13 22:57:08.856745: | 57 06 a2 88 ed e6 fc fa 59 24 e2 6c 58 6b 69 65 W.......Y$.lXkie Jan 13 22:57:08.856755: | b9 5e c3 18 50 41 4e a8 ee ca 2d e4 79 e5 06 04 .^..PAN...-.y... Jan 13 22:57:08.856763: | 60 ad 39 fe bc 75 a2 76 b6 92 74 5a 3c 9f 78 78 `.9..u.v..tZ<.xx Jan 13 22:57:08.856770: | emitting length of IKEv2 Authentication Payload: 520 Jan 13 22:57:08.856783: | newref alloc logger@0x7ff8a000b5d8(0->1) (duplicate_state() +1549 programs/pluto/state.c) Jan 13 22:57:08.856793: | addref fd@NULL (duplicate_state() +1549 programs/pluto/state.c) Jan 13 22:57:08.856805: | entry state hash_table_entries.serialno@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42 initialized Jan 13 22:57:08.856816: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $9 initialized Jan 13 22:57:08.856827: | entry state hash_table_entries.reqid@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: reqid=0 initialized Jan 13 22:57:08.856843: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: 00 00 00 00 00 00 00 00 initialized Jan 13 22:57:08.856862: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 22:57:08.856872: | creating state object #42 at 0x55c83801fab8 Jan 13 22:57:08.856886: | entry state hash_table_entries.serialno@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42 added to hash table bucket 0x55c83658a800 Jan 13 22:57:08.856897: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 22:57:08.856908: | entry state hash_table_entries.reqid@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 22:57:08.856924: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: 8d 77 44 17 30 6b 26 bc added to hash table bucket 0x55c83657eca0 Jan 13 22:57:08.856943: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e added to hash table bucket 0x55c83657b6e0 Jan 13 22:57:08.856953: | pstats #42 ikev2.child started Jan 13 22:57:08.856964: | duplicating state object #41 "MYCONN-ikev2-cp"[2] 94.253.210.164 as #42 for IPSEC SA Jan 13 22:57:08.856975: | #42 setting local endpoint to 161.53.235.3:4500 from #41.st_localport (duplicate_state() +1567 programs/pluto/state.c) Jan 13 22:57:08.856987: | addref struct iface_endpoint@0x55c83801f058(3->4) (duplicate_state() +1569 programs/pluto/state.c) Jan 13 22:57:08.856994: | duplicate_state: addref st_skeyid_nss-key@NULL Jan 13 22:57:08.857010: | duplicate_state: addref st_skey_d_nss-key@0x55c837ffbd90 Jan 13 22:57:08.857019: | duplicate_state: addref st_skey_ai_nss-key@0x55c838005890 Jan 13 22:57:08.857027: | duplicate_state: addref st_skey_ar_nss-key@0x55c838002520 Jan 13 22:57:08.857034: | duplicate_state: addref st_skey_ei_nss-key@0x55c8380405b0 Jan 13 22:57:08.857041: | duplicate_state: addref st_skey_er_nss-key@0x55c838029cd0 Jan 13 22:57:08.857048: | duplicate_state: addref st_skey_pi_nss-key@0x55c838000ab0 Jan 13 22:57:08.857055: | duplicate_state: addref st_skey_pr_nss-key@0x55c838013660 Jan 13 22:57:08.857062: | duplicate_state: addref st_enc_key_nss-key@NULL Jan 13 22:57:08.857081: | Message ID: CHILD #41.#42 initializing (CHILD SA): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0 .recv_frags=0 .recv_wip=1 .last_contact=9594096.783096 child.wip.initiator=0->-1 Jan 13 22:57:08.857091: | child state #42: UNDEFINED(ignore) => IKE_AUTH_CHILD_R0(ignore) Jan 13 22:57:08.857101: | #42.st_v2_transition NULL -> NULL (new_v2_child_state() +1645 programs/pluto/state.c) Jan 13 22:57:08.857123: | pool 192.168.101.10-192.168.101.253: requesting reusable lease for connection "MYCONN-ikev2-cp"[2] 94.253.210.164 with 'O=ALU-UNIZG, CN=win7client.alu.hr' and old address 94.253.210.164/32 Jan 13 22:57:08.857145: | pool 192.168.101.10-192.168.101.253 lease 192.168.101.10 unassigned: recovered by "MYCONN-ikev2-cp"[2] 94.253.210.164 using 'O=ALU-UNIZG, CN=win7client.alu.hr'; was on free-list Jan 13 22:57:08.857163: | entry spd_route hash_table_entries.remote_client@0x55c83803cdc8 "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 deleted from hash table Jan 13 22:57:08.857180: | entry spd_route hash_table_entries.remote_client@0x55c83803cdc8 "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 added to hash table bucket 0x55c83658cca0 Jan 13 22:57:08.857201: | pool 192.168.101.10-192.168.101.253 lease 192.168.101.10 $9: assign recovered reusable lease to "MYCONN-ikev2-cp"[2] 94.253.210.164 $9 with ID 'O=ALU-UNIZG, CN=win7client.alu.hr' and that.client 192.168.101.10/32; leases 1 in-use 1 free 0 reusable 1 Jan 13 22:57:08.857211: | comparing remote proposals against IKE_AUTH responder matching remote ESP/AH proposals 6 local proposals Jan 13 22:57:08.857222: | local proposal 1 type ENCR has 1 transforms Jan 13 22:57:08.857231: | local proposal 1 type PRF has 0 transforms Jan 13 22:57:08.857240: | local proposal 1 type INTEG has 1 transforms Jan 13 22:57:08.857247: | local proposal 1 type DH has 1 transforms Jan 13 22:57:08.857256: | local proposal 1 type ESN has 2 transforms Jan 13 22:57:08.857266: | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH Jan 13 22:57:08.857276: | local proposal 2 type ENCR has 1 transforms Jan 13 22:57:08.857284: | local proposal 2 type PRF has 0 transforms Jan 13 22:57:08.857291: | local proposal 2 type INTEG has 1 transforms Jan 13 22:57:08.857301: | local proposal 2 type DH has 1 transforms Jan 13 22:57:08.857309: | local proposal 2 type ESN has 2 transforms Jan 13 22:57:08.857317: | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH Jan 13 22:57:08.857326: | local proposal 3 type ENCR has 1 transforms Jan 13 22:57:08.857334: | local proposal 3 type PRF has 0 transforms Jan 13 22:57:08.857342: | local proposal 3 type INTEG has 1 transforms Jan 13 22:57:08.857349: | local proposal 3 type DH has 1 transforms Jan 13 22:57:08.857359: | local proposal 3 type ESN has 2 transforms Jan 13 22:57:08.857367: | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 22:57:08.857375: | local proposal 4 type ENCR has 1 transforms Jan 13 22:57:08.857384: | local proposal 4 type PRF has 0 transforms Jan 13 22:57:08.857392: | local proposal 4 type INTEG has 1 transforms Jan 13 22:57:08.857400: | local proposal 4 type DH has 1 transforms Jan 13 22:57:08.857407: | local proposal 4 type ESN has 2 transforms Jan 13 22:57:08.857417: | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 22:57:08.857434: | local proposal 5 type ENCR has 1 transforms Jan 13 22:57:08.857443: | local proposal 5 type PRF has 0 transforms Jan 13 22:57:08.857451: | local proposal 5 type INTEG has 1 transforms Jan 13 22:57:08.857459: | local proposal 5 type DH has 1 transforms Jan 13 22:57:08.857468: | local proposal 5 type ESN has 2 transforms Jan 13 22:57:08.857477: | local proposal 5 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 22:57:08.857484: | local proposal 6 type ENCR has 1 transforms Jan 13 22:57:08.857494: | local proposal 6 type PRF has 0 transforms Jan 13 22:57:08.857501: | local proposal 6 type INTEG has 1 transforms Jan 13 22:57:08.857509: | local proposal 6 type DH has 1 transforms Jan 13 22:57:08.857518: | local proposal 6 type ESN has 2 transforms Jan 13 22:57:08.857526: | local proposal 6 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 22:57:08.857534: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.857543: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 22:57:08.857552: | length: 40 (00 28) Jan 13 22:57:08.857562: | prop #: 1 (01) Jan 13 22:57:08.857570: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 22:57:08.857580: | spi size: 4 (04) Jan 13 22:57:08.857587: | # transforms: 3 (03) Jan 13 22:57:08.857596: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 22:57:08.857605: | remote SPI Jan 13 22:57:08.857613: | c9 35 b8 fa .5.. Jan 13 22:57:08.857621: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..6] of 6 local proposals Jan 13 22:57:08.857631: | ****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.857639: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.857647: | length: 12 (00 0c) Jan 13 22:57:08.857657: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.857664: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 22:57:08.857672: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 22:57:08.857680: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 22:57:08.857690: | length/value: 256 (01 00) Jan 13 22:57:08.857701: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 3 type 1 (ENCR) transform 0 Jan 13 22:57:08.857712: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 5 type 1 (ENCR) transform 0 Jan 13 22:57:08.857720: | ****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.857727: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.857738: | length: 8 (00 08) Jan 13 22:57:08.857745: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.857753: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 22:57:08.857762: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 5 type 3 (INTEG) transform 0 Jan 13 22:57:08.857774: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 6 type 3 (INTEG) transform 0 Jan 13 22:57:08.857783: | ****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.857789: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.857798: | length: 8 (00 08) Jan 13 22:57:08.857806: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 22:57:08.857814: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 22:57:08.857823: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 1 Jan 13 22:57:08.857833: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 1 Jan 13 22:57:08.857842: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 3 type 5 (ESN) transform 1 Jan 13 22:57:08.857853: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 4 type 5 (ESN) transform 1 Jan 13 22:57:08.857862: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 5 type 5 (ESN) transform 1 Jan 13 22:57:08.857871: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 6 type 5 (ESN) transform 1 Jan 13 22:57:08.857888: | remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none Jan 13 22:57:08.857899: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ESN Jan 13 22:57:08.857909: | remote proposal 1 does not match local proposal 1; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 22:57:08.857919: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 2; required: ENCR+ESN; optional: INTEG+DH; matched: ESN Jan 13 22:57:08.857929: | remote proposal 1 does not match local proposal 2; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 22:57:08.857938: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 3; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+ESN Jan 13 22:57:08.857947: | remote proposal 1 does not match local proposal 3; unmatched transforms: INTEG; missing transforms: INTEG Jan 13 22:57:08.857957: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 4; required: ENCR+INTEG+ESN; optional: DH; matched: ESN Jan 13 22:57:08.857966: | remote proposal 1 does not match local proposal 4; unmatched transforms: ENCR+INTEG; missing transforms: ENCR+INTEG Jan 13 22:57:08.857976: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 5; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN Jan 13 22:57:08.857984: | remote proposal 1 matches local proposal 5 Jan 13 22:57:08.857992: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.858000: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 22:57:08.858008: | length: 36 (00 24) Jan 13 22:57:08.858017: | prop #: 2 (02) Jan 13 22:57:08.858025: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 22:57:08.858033: | spi size: 4 (04) Jan 13 22:57:08.858043: | # transforms: 3 (03) Jan 13 22:57:08.858051: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 22:57:08.858059: | remote SPI Jan 13 22:57:08.858067: | c9 35 b8 fa .5.. Jan 13 22:57:08.858075: | Comparing remote proposal 2 containing 3 transforms against local proposal [1..4] of 6 local proposals Jan 13 22:57:08.858082: | ****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.858089: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.858097: | length: 8 (00 08) Jan 13 22:57:08.858106: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.858114: | IKEv2 transform ID: 3DES (0x3) Jan 13 22:57:08.858122: | ****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.858132: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.858141: | length: 8 (00 08) Jan 13 22:57:08.858148: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.858158: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 22:57:08.858166: | ****parse IKEv2 Transform Substructure Payload: Jan 13 22:57:08.858174: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.858182: | length: 8 (00 08) Jan 13 22:57:08.858191: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 22:57:08.858199: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 22:57:08.858208: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 1 Jan 13 22:57:08.858218: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 1 Jan 13 22:57:08.858226: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 3 type 5 (ESN) transform 1 Jan 13 22:57:08.858237: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 4 type 5 (ESN) transform 1 Jan 13 22:57:08.858247: | remote proposal 2 proposed transforms: ENCR+INTEG+ESN; matched: ESN; unmatched: ENCR+INTEG Jan 13 22:57:08.858256: | remote proposal 2 does not match; unmatched remote transforms: ENCR+INTEG Jan 13 22:57:08.858272: "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: proposal 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=c935b8fa chosen from remote proposals 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;ESN=DISABLED[first-match] 2:ESP:ENCR=3DES;INTEG=HMAC_SHA1_96;ESN=DISABLED Jan 13 22:57:08.858290: | IKE_AUTH responder matching remote ESP/AH proposals ikev2_proposal: 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=c935b8fa Jan 13 22:57:08.858299: | converting proposal to internal trans attrs Jan 13 22:57:08.858309: | process_v2_childs_sa_payload returned v2N_RESERVED Jan 13 22:57:08.858324: | xfrm: sendrecv_xfrm_msg() sending 22 Jan 13 22:57:08.858356: | kernel: netlink_get_spi: allocated 0x191978da for esp.0@161.53.235.3 Jan 13 22:57:08.858369: | kernel: allocated incoming spi 94.253.210.164 -> esp.191978da@161.53.235.3 in tunnel-mode Jan 13 22:57:08.858379: | integ=HMAC_SHA1_96: .key_size=20 encrypt=AES_CBC: .key_size=32 .salt_size=0 keymat_len=52 Jan 13 22:57:08.858419: | result: newref data=Ni-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858442: | result: newref data=Ni-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858453: | data=Ni: delref tmp-key@0x55c838012940 Jan 13 22:57:08.858476: | result: newref data+=Nr-key@0x55c838012940 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858485: | append_symkey_bytes: delref lhs-key@0x55c838041fd0 Jan 13 22:57:08.858507: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.858525: | prf+0: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.858552: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.858578: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.858622: | result: newref final-key@0x55c83801c850 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858643: | result: newref final-key@0x55c838041fd0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858654: | final: delref tmp-key@0x55c83801c850 Jan 13 22:57:08.858666: | prfplus: addref old_t[1]-key@0x55c838041fd0 Jan 13 22:57:08.858687: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.858705: | prf+N: delref clone-key@0x55c83801c850 Jan 13 22:57:08.858731: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.858753: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.858776: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.858798: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.858855: | result: newref final-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858884: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858899: | final: delref tmp-key@0x55c838026d80 Jan 13 22:57:08.858931: | result: newref result-key@0x55c838026d80 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.858943: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 22:57:08.858954: | prfplus: delref old_t[N]-key@0x55c838041fd0 Jan 13 22:57:08.858981: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.859005: | prf+N: delref clone-key@0x55c838041fd0 Jan 13 22:57:08.859043: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.859072: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.859103: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.859153: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.859211: | result: newref final-key@0x55c8380199c0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.859240: | result: newref final-key@0x55c838041fd0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.859255: | final: delref tmp-key@0x55c8380199c0 Jan 13 22:57:08.859288: | result: newref result-key@0x55c8380199c0 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.859300: | append_symkey_symkey: delref lhs-key@0x55c838026d80 Jan 13 22:57:08.859314: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 22:57:08.859345: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.859368: | prf+N: delref clone-key@0x55c83801c850 Jan 13 22:57:08.859398: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.859428: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.859459: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.859488: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.859543: | result: newref final-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.859570: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.859585: | final: delref tmp-key@0x55c838026d80 Jan 13 22:57:08.859616: | result: newref result-key@0x55c838026d80 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 22:57:08.859629: | append_symkey_symkey: delref lhs-key@0x55c8380199c0 Jan 13 22:57:08.859643: | prfplus: delref old_t[N]-key@0x55c838041fd0 Jan 13 22:57:08.859659: | prfplus: delref old_t[final]-key@0x55c83801c850 Jan 13 22:57:08.859673: | child_sa_keymat: delref data-key@0x55c838012940 Jan 13 22:57:08.859703: | result: newref initiator to responder key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +125 programs/pluto/ikev2_crypto.c) Jan 13 22:57:08.859731: | initiator to responder keys: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.859761: | initiator to responder keys: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.859779: | ikev2_derive_child_keys: delref ikey-key@0x55c838012940 Jan 13 22:57:08.859807: | result: newref responder to initiator key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +133 programs/pluto/ikev2_crypto.c) Jan 13 22:57:08.859833: | responder to initiator keys:: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 22:57:08.859863: | responder to initiator keys:: delref slot-key-key@0x55c838003da0 Jan 13 22:57:08.859881: | ikev2_derive_child_keys: delref rkey-key@0x55c838012940 Jan 13 22:57:08.859895: | ikev2_derive_child_keys: delref keymat-key@0x55c838026d80 Jan 13 22:57:08.859911: | kernel: install_ipsec_sa() for #42: inbound and outbound Jan 13 22:57:08.859927: | kernel: could_route called for MYCONN-ikev2-cp; kind=CK_INSTANCE that.has_client=yes oppo=no this.host_port=500 sec_label= Jan 13 22:57:08.859943: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 22:57:08.859967: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 22:57:08.859980: | matches: 1 Jan 13 22:57:08.859996: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 unrouted: NULL; eroute owner: NULL Jan 13 22:57:08.860015: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 22:57:08.860039: | kernel: setup_half_ipsec_sa() outbound 0.0.0.0/0-ALL->[161.53.235.3=IPv4=>94.253.210.164]-ALL->192.168.101.10/32 sec_label= Jan 13 22:57:08.860061: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 22:57:08.860072: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 22:57:08.860084: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 22:57:08.860097: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 22:57:08.860107: | kernel: setting IPsec SA replay-window to 128 Jan 13 22:57:08.860121: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 22:57:08.860147: | kernel: add_sa() 0 outbound tunnel 0.0.0.0/0-ALL->161.53.235.3=ESP=c935b8fa=espinudp=>94.253.210.164-ALL->192.168.101.10/32 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 22:57:08.860161: | xfrm: enabling tunnel mode Jan 13 22:57:08.860172: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 22:57:08.860182: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 22:57:08.860194: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 22:57:08.860204: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 22:57:08.860215: | xfrm: sendrecv_xfrm_msg() sending 16 Jan 13 22:57:08.860325: | netlink response for Add SA esp.c935b8fa@94.253.210.164 included non-error error Jan 13 22:57:08.860358: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=0 owner=#0 tunnel Jan 13 22:57:08.860370: | kernel: set up outgoing SA Jan 13 22:57:08.860387: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 22:57:08.860411: | kernel: setup_half_ipsec_sa() inbound 192.168.101.10/32-ALL->[94.253.210.164=IPv4=>161.53.235.3]-ALL->0.0.0.0/0 sec_label= Jan 13 22:57:08.860426: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 22:57:08.860437: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 22:57:08.860448: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 22:57:08.860458: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 22:57:08.860468: | kernel: setting IPsec SA replay-window to 128 Jan 13 22:57:08.860485: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 22:57:08.860510: | kernel: add_sa() 0 inbound tunnel 192.168.101.10/32-ALL->94.253.210.164=ESP=191978da=espinudp=>161.53.235.3-ALL->0.0.0.0/0 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 22:57:08.860523: | xfrm: enabling tunnel mode Jan 13 22:57:08.860534: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 22:57:08.860544: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 22:57:08.860555: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 22:57:08.860569: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 22:57:08.860579: | xfrm: sendrecv_xfrm_msg() sending 26 Jan 13 22:57:08.860655: | netlink response for Add SA esp.191978da@161.53.235.3 included non-error error Jan 13 22:57:08.860673: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=1 owner=#0 tunnel Jan 13 22:57:08.860684: | kernel: setup_half_ipsec_sa() is installing inbound eroute Jan 13 22:57:08.860701: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 22:57:08.860739: | kernel: raw_policy() ADD_INBOUND REPORT_NO_INBOUND setup_half_ipsec_sa() add inbound Child SA 192.168.101.10/32-ALL-94.253.210.164==161.53.235.3-ALL-0.0.0.0/0 shunt_policy=UNSET encap=tunnel,94.253.210.164=>161.53.235.3,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 22:57:08.860753: | xfrm_raw_policy() policy=IPv4/3 dir=0 Jan 13 22:57:08.860766: | xfrm_raw_policy() using family IPv4 (2) Jan 13 22:57:08.860806: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 22:57:08.860825: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=94.253.210.164 id.daddr=161.53.235.3 Jan 13 22:57:08.860839: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 22:57:08.860872: | xfrm: xfrm_raw_policy() adding policy forward (suspect a tunnel) Jan 13 22:57:08.860885: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 22:57:08.860911: | kernel: policy: result=success Jan 13 22:57:08.860925: | kernel: set up incoming SA Jan 13 22:57:08.860937: | kernel: sr for #42: unrouted Jan 13 22:57:08.860955: | kernel: route_and_eroute() for 0.0.0.0/0 --> 192.168.101.10/32; proto 0, and source port 0 dest port 0 sec_label Jan 13 22:57:08.860972: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 22:57:08.860995: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 22:57:08.861008: | matches: 1 Jan 13 22:57:08.861023: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 unrouted: NULL; eroute owner: NULL Jan 13 22:57:08.861037: | kernel: route_and_eroute with c: MYCONN-ikev2-cp (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #42 Jan 13 22:57:08.861054: | kernel: route and eroute looking for 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 22:57:08.861074: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 22:57:08.861094: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 22:57:08.861129: | kernel: raw_policy() ADD_OUTBOUND THIS_IS_NOT_INBOUND eroute_connection() sag_eroute() add 0.0.0.0/0-ALL-161.53.235.3==94.253.210.164-ALL-192.168.101.10/32 shunt_policy=UNSET encap=tunnel,161.53.235.3=>94.253.210.164,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 22:57:08.861142: | xfrm_raw_policy() policy=IPv4/3 dir=1 Jan 13 22:57:08.861154: | xfrm_raw_policy() using family IPv4 (2) Jan 13 22:57:08.861166: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 22:57:08.861185: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=161.53.235.3 id.daddr=94.253.210.164 Jan 13 22:57:08.861198: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 22:57:08.861227: | kernel: policy: result=success Jan 13 22:57:08.861241: | kernel: running updown command "ipsec _updown" for verb up Jan 13 22:57:08.861255: | kernel: command executing up-client Jan 13 22:57:08.861274: | kernel: get_sa_info esp.c935b8fa@94.253.210.164 Jan 13 22:57:08.861287: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:08.861315: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:57:08.861329: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:08.861405: | executing up-client: 2>&1 PLUTO_VERB='up-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='1642111028' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_D... Jan 13 22:57:08.861421: | popen cmd is 1232 chars long Jan 13 22:57:08.861433: | cmd( 0):2>&1 PLUTO_VERB='up-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTION_: Jan 13 22:57:08.861464: | cmd( 80):TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_ROU: Jan 13 22:57:08.861477: | cmd( 160):TE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vpn.: Jan 13 22:57:08.861487: | cmd( 240):alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIEN: Jan 13 22:57:08.861498: | cmd( 320):T_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' : Jan 13 22:57:08.861509: | cmd( 400):PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN=w: Jan 13 22:57:08.861518: | cmd( 480):in7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET='1: Jan 13 22:57:08.861533: | cmd( 560):92.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUT: Jan 13 22:57:08.861544: | cmd( 640):O_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='164211102: Jan 13 22:57:08.861554: | cmd( 720):8' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+: Jan 13 22:57:08.861564: | cmd( 800):IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND: Jan 13 22:57:08.861574: | cmd( 880):='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO=': Jan 13 22:57:08.861584: | cmd( 960):0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_C: Jan 13 22:57:08.861595: | cmd(1040):FG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='0' PLU: Jan 13 22:57:08.861605: | cmd(1120):TO_OUTBYTES='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc935b8fa : Jan 13 22:57:08.861615: | cmd(1200):SPI_OUT=0x191978da ipsec _updown: Jan 13 22:57:08.867638: | kernel: route_and_eroute: firewall_notified: true Jan 13 22:57:08.867664: | kernel: running updown command "ipsec _updown" for verb prepare Jan 13 22:57:08.867678: | kernel: command executing prepare-client Jan 13 22:57:08.867694: | kernel: get_sa_info esp.c935b8fa@94.253.210.164 Jan 13 22:57:08.867714: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:08.867749: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:57:08.867763: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:08.867836: | executing prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='1642111028' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PL... Jan 13 22:57:08.867853: | popen cmd is 1237 chars long Jan 13 22:57:08.867865: | cmd( 0):2>&1 PLUTO_VERB='prepare-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNEC: Jan 13 22:57:08.867876: | cmd( 80):TION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRM: Jan 13 22:57:08.867887: | cmd( 160):I_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID=': Jan 13 22:57:08.867897: | cmd( 240):@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_: Jan 13 22:57:08.867906: | cmd( 320):CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16: Jan 13 22:57:08.867916: | cmd( 400):420' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG,: Jan 13 22:57:08.867948: | cmd( 480): CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_N: Jan 13 22:57:08.867961: | cmd( 560):ET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0': Jan 13 22:57:08.867971: | cmd( 640): PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='1642: Jan 13 22:57:08.867981: | cmd( 720):111028' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_R: Jan 13 22:57:08.867994: | cmd( 800):EKEY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN: Jan 13 22:57:08.868006: | cmd( 880):_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CI: Jan 13 22:57:08.868015: | cmd( 960):SCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PL: Jan 13 22:57:08.868026: | cmd(1040):UTO_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='0: Jan 13 22:57:08.868039: | cmd(1120):' PLUTO_OUTBYTES='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc935: Jan 13 22:57:08.868050: | cmd(1200):b8fa SPI_OUT=0x191978da ipsec _updown: Jan 13 22:57:08.872261: | kernel: running updown command "ipsec _updown" for verb route Jan 13 22:57:08.872286: | kernel: command executing route-client Jan 13 22:57:08.872300: | kernel: get_sa_info esp.c935b8fa@94.253.210.164 Jan 13 22:57:08.872322: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:08.872357: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:57:08.872369: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:08.872426: | executing route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='1642111028' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_... Jan 13 22:57:08.872440: | popen cmd is 1235 chars long Jan 13 22:57:08.872449: | cmd( 0):2>&1 PLUTO_VERB='route-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTI: Jan 13 22:57:08.872458: | cmd( 80):ON_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_: Jan 13 22:57:08.872466: | cmd( 160):ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@v: Jan 13 22:57:08.872473: | cmd( 240):pn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CL: Jan 13 22:57:08.872481: | cmd( 320):IENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='1642: Jan 13 22:57:08.872491: | cmd( 400):0' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, C: Jan 13 22:57:08.872499: | cmd( 480):N=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET: Jan 13 22:57:08.872507: | cmd( 560):='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' P: Jan 13 22:57:08.872514: | cmd( 640):LUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='164211: Jan 13 22:57:08.872521: | cmd( 720):1028' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REK: Jan 13 22:57:08.872529: | cmd( 800):EY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_K: Jan 13 22:57:08.872536: | cmd( 880):IND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISC: Jan 13 22:57:08.872558: | cmd( 960):O='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUT: Jan 13 22:57:08.872568: | cmd(1040):O_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='0' : Jan 13 22:57:08.872575: | cmd(1120):PLUTO_OUTBYTES='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc935b8: Jan 13 22:57:08.872582: | cmd(1200):fa SPI_OUT=0x191978da ipsec _updown: Jan 13 22:57:08.885491: | kernel: route_and_eroute: instance "MYCONN-ikev2-cp"[2] 94.253.210.164, setting eroute_owner {spd=0x55c83803cdc8,sr=0x55c83803cdc8} to #42 (was #0) (newest_ipsec_sa=#0) Jan 13 22:57:08.885526: | ISAKMP_v2_IKE_AUTH: instance MYCONN-ikev2-cp[2], setting IKEv2 newest_ipsec_sa to #42 (was #0) (spd.eroute=#42) cloned from #41 Jan 13 22:57:08.885542: | Send Configuration Payload reply Jan 13 22:57:08.885553: | ****emit IKEv2 Configuration Payload: Jan 13 22:57:08.885569: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.885581: | flags: none (0x0) Jan 13 22:57:08.885596: | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) Jan 13 22:57:08.885612: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) Jan 13 22:57:08.885625: | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.885638: | *****emit IKEv2 Configuration Payload Attribute: Jan 13 22:57:08.885652: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) Jan 13 22:57:08.885665: | emitting 4 raw bytes of Internal IP Address into IKEv2 Configuration Payload Attribute Jan 13 22:57:08.885692: | Internal IP Address: c0 a8 65 0a Jan 13 22:57:08.885702: | emitting length of IKEv2 Configuration Payload Attribute: 4 Jan 13 22:57:08.885716: | *****emit IKEv2 Configuration Payload Attribute: Jan 13 22:57:08.885727: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) Jan 13 22:57:08.885737: | emitting 4 raw bytes of IP4_DNS into IKEv2 Configuration Payload Attribute Jan 13 22:57:08.885746: | IP4_DNS: 08 08 08 08 Jan 13 22:57:08.885755: | emitting length of IKEv2 Configuration Payload Attribute: 4 Jan 13 22:57:08.885766: | *****emit IKEv2 Configuration Payload Attribute: Jan 13 22:57:08.885776: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) Jan 13 22:57:08.885785: | emitting 4 raw bytes of IP4_DNS into IKEv2 Configuration Payload Attribute Jan 13 22:57:08.885794: | IP4_DNS: c0 a8 64 01 Jan 13 22:57:08.885803: | emitting length of IKEv2 Configuration Payload Attribute: 4 Jan 13 22:57:08.885811: | emitting length of IKEv2 Configuration Payload: 32 Jan 13 22:57:08.885819: | emitting ikev2_proposal ... Jan 13 22:57:08.885826: | ****emit IKEv2 Security Association Payload: Jan 13 22:57:08.885836: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.885844: | flags: none (0x0) Jan 13 22:57:08.885853: | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 22:57:08.885863: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.885874: | *****emit IKEv2 Proposal Substructure Payload: Jan 13 22:57:08.885883: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 22:57:08.885893: | prop #: 1 (01) Jan 13 22:57:08.885903: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 22:57:08.885912: | spi size: 4 (04) Jan 13 22:57:08.885920: | # transforms: 3 (03) Jan 13 22:57:08.885929: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 22:57:08.885939: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Jan 13 22:57:08.885948: | our spi: 19 19 78 da Jan 13 22:57:08.885958: | ******emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.885966: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.885973: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 22:57:08.885981: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 22:57:08.886003: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.886014: | *******emit IKEv2 Attribute Substructure Payload: Jan 13 22:57:08.886022: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 22:57:08.886031: | length/value: 256 (01 00) Jan 13 22:57:08.886041: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 22:57:08.886050: | ******emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.886058: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.886066: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 22:57:08.886077: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 22:57:08.886086: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.886096: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.886105: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 22:57:08.886113: | ******emit IKEv2 Transform Substructure Payload: Jan 13 22:57:08.886121: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 22:57:08.886130: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 22:57:08.886138: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 22:57:08.886147: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 22:57:08.886154: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 22:57:08.886164: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 22:57:08.886172: | emitting length of IKEv2 Proposal Substructure Payload: 40 Jan 13 22:57:08.886180: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 22:57:08.886187: | emitting length of IKEv2 Security Association Payload: 44 Jan 13 22:57:08.886194: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 22:57:08.886203: | that TSi TS Jan 13 22:57:08.886212: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 22:57:08.886220: | ipprotoid: 0 Jan 13 22:57:08.886227: | port range: 0-65535 Jan 13 22:57:08.886238: | ip range: 192.168.101.10-192.168.101.10 Jan 13 22:57:08.886246: | sec_label: Jan 13 22:57:08.886255: | this TSr TS Jan 13 22:57:08.886262: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 22:57:08.886269: | ipprotoid: 0 Jan 13 22:57:08.886276: | port range: 0-65535 Jan 13 22:57:08.886286: | ip range: 0.0.0.0-255.255.255.255 Jan 13 22:57:08.886295: | sec_label: Jan 13 22:57:08.886304: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Jan 13 22:57:08.886312: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.886322: | flags: none (0x0) Jan 13 22:57:08.886331: | number of TS: 1 (01) Jan 13 22:57:08.886339: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Jan 13 22:57:08.886348: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.886357: | *****emit IKEv2 Traffic Selector Header: Jan 13 22:57:08.886365: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 22:57:08.886372: | IP Protocol ID: ALL (0x0) Jan 13 22:57:08.886382: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 22:57:08.886391: | start port: 0 (00 00) Jan 13 22:57:08.886400: | end port: 65535 (ff ff) Jan 13 22:57:08.886410: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 22:57:08.886430: | IP start: c0 a8 65 0a Jan 13 22:57:08.886440: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 22:57:08.886451: | IP end: c0 a8 65 0a Jan 13 22:57:08.886459: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 22:57:08.886466: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Jan 13 22:57:08.886474: | ****emit IKEv2 Traffic Selector - Responder - Payload: Jan 13 22:57:08.886485: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.886493: | flags: none (0x0) Jan 13 22:57:08.886501: | number of TS: 1 (01) Jan 13 22:57:08.886509: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Jan 13 22:57:08.886518: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Jan 13 22:57:08.886527: | *****emit IKEv2 Traffic Selector Header: Jan 13 22:57:08.886534: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 22:57:08.886544: | IP Protocol ID: ALL (0x0) Jan 13 22:57:08.886553: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 22:57:08.886562: | start port: 0 (00 00) Jan 13 22:57:08.886572: | end port: 65535 (ff ff) Jan 13 22:57:08.886581: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 22:57:08.886593: | IP start: 00 00 00 00 Jan 13 22:57:08.886601: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 22:57:08.886612: | IP end: ff ff ff ff Jan 13 22:57:08.886620: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 22:57:08.886627: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Jan 13 22:57:08.886639: | child state #42: IKE_AUTH_CHILD_R0(ignore) => ESTABLISHED_CHILD_SA(established CHILD SA) Jan 13 22:57:08.886650: | pstats #42 ikev2.child established Jan 13 22:57:08.886667: | this TS Jan 13 22:57:08.886677: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 22:57:08.886684: | ipprotoid: 0 Jan 13 22:57:08.886691: | port range: 0-65535 Jan 13 22:57:08.886701: | ip range: 0.0.0.0-255.255.255.255 Jan 13 22:57:08.886710: | sec_label: Jan 13 22:57:08.886718: | that TS Jan 13 22:57:08.886725: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 22:57:08.886732: | ipprotoid: 0 Jan 13 22:57:08.886739: | port range: 0-65535 Jan 13 22:57:08.886751: | ip range: 192.168.101.10-192.168.101.10 Jan 13 22:57:08.886759: | sec_label: Jan 13 22:57:08.886774: | NAT-T: NAT Traversal detected - their IKE port is '500' Jan 13 22:57:08.886783: | NAT-T: encaps is 'auto' Jan 13 22:57:08.886796: "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: established Child SA using #41; IPsec tunnel [0.0.0.0-255.255.255.255:0-65535 0] -> [192.168.101.10-192.168.101.10:0-65535 0] {ESPinUDP=>0xc935b8fa <0x191978da xfrm=AES_CBC_256-HMAC_SHA1_96 NATD=94.253.210.164:4500 DPD=active} Jan 13 22:57:08.886808: | #42 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 22:57:08.886824: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c83804df78 timeout in 28800 seconds for #42 Jan 13 22:57:08.886839: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.886856: | dpd enabled, scheduling ikev2 liveness checks Jan 13 22:57:08.886870: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c83804f078 timeout in 30 seconds for #42 Jan 13 22:57:08.886880: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.886896: | unpending IKE SA #41 CHILD SA #42 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.886909: | unpending state #41 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:08.886919: | adding 9 bytes of padding (including 1 byte padding-length) Jan 13 22:57:08.886930: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.886938: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.886956: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.886966: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.886974: | emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.886984: | emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.886992: | emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.887000: | emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.887011: | emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 22:57:08.887019: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 22:57:08.887029: | emitting length of IKEv2 Encryption Payload: 2020 Jan 13 22:57:08.887037: | emitting length of ISAKMP Message: 2048 Jan 13 22:57:08.887053: | **parse ISAKMP Message: Jan 13 22:57:08.887065: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.887076: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.887085: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 22:57:08.887093: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.887101: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.887109: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.887118: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.887130: | length: 2048 (00 00 08 00) Jan 13 22:57:08.887139: | **parse IKEv2 Encryption Payload: Jan 13 22:57:08.887146: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Jan 13 22:57:08.887157: | flags: none (0x0) Jan 13 22:57:08.887166: | length: 2020 (07 e4) Jan 13 22:57:08.887173: | opening output PBS reply frag packet Jan 13 22:57:08.887183: | **emit ISAKMP Message: Jan 13 22:57:08.887193: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.887205: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.887213: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 22:57:08.887223: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.887232: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.887240: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.887249: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.887258: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 22:57:08.887267: | ***emit IKEv2 Encrypted Fragment: Jan 13 22:57:08.887275: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Jan 13 22:57:08.887285: | flags: none (0x0) Jan 13 22:57:08.887294: | fragment number: 1 (00 01) Jan 13 22:57:08.887302: | total fragments: 5 (00 05) Jan 13 22:57:08.887312: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 36:ISAKMP_NEXT_v2IDr Jan 13 22:57:08.887320: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.887328: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 22:57:08.887336: | emitting 16 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 22:57:08.887360: | emitting 462 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 22:57:08.887370: | cleartext fragment: Jan 13 22:57:08.887378: | 25 00 00 12 02 00 00 00 76 70 6e 2e 61 6c 75 2e %.......vpn.alu. Jan 13 22:57:08.887386: | 68 72 27 00 05 21 04 30 82 05 18 30 82 03 00 a0 hr'..!.0...0.... Jan 13 22:57:08.887393: | 03 02 01 02 02 05 00 ba 98 ea 76 30 0d 06 09 2a ..........v0...* Jan 13 22:57:08.887401: | 86 48 86 f7 0d 01 01 0b 05 00 30 2b 31 15 30 13 .H........0+1.0. Jan 13 22:57:08.887408: | 06 03 55 04 03 13 0c 41 4c 55 2d 55 4e 49 5a 47 ..U....ALU-UNIZG Jan 13 22:57:08.887416: | 20 43 41 31 12 30 10 06 03 55 04 0a 13 09 41 4c CA1.0...U....AL Jan 13 22:57:08.887433: | 55 2d 55 4e 49 5a 47 30 1e 17 0d 32 32 30 31 30 U-UNIZG0...22010 Jan 13 22:57:08.887442: | 34 32 30 31 37 35 39 5a 17 0d 32 33 30 31 30 34 4201759Z..230104 Jan 13 22:57:08.887449: | 32 30 31 37 35 39 5a 30 29 31 13 30 11 06 03 55 201759Z0)1.0...U Jan 13 22:57:08.887457: | 04 03 13 0a 76 70 6e 2e 61 6c 75 2e 68 72 31 12 ....vpn.alu.hr1. Jan 13 22:57:08.887467: | 30 10 06 03 55 04 0a 13 09 41 4c 55 2d 55 4e 49 0...U....ALU-UNI Jan 13 22:57:08.887475: | 5a 47 30 82 02 22 30 0d 06 09 2a 86 48 86 f7 0d ZG0.."0...*.H... Jan 13 22:57:08.887483: | 01 01 01 05 00 03 82 02 0f 00 30 82 02 0a 02 82 ..........0..... Jan 13 22:57:08.887490: | 02 01 00 a0 c8 59 55 92 89 aa 4b 8a 33 c0 38 71 .....YU...K.3.8q Jan 13 22:57:08.887497: | 7a e9 c6 c3 90 02 a2 e7 3b 94 5d 17 08 f8 ee 60 z.......;.]....` Jan 13 22:57:08.887505: | 63 3d 93 fa 0c c4 7a 42 7d 0c 09 c2 0b ba b7 e7 c=....zB}....... Jan 13 22:57:08.887512: | ab 06 94 1b 33 85 0b 67 bb 36 65 01 38 ab 4f 00 ....3..g.6e.8.O. Jan 13 22:57:08.887519: | fa 52 f1 ed f5 eb 2c 14 98 88 70 74 6e 3f 19 ef .R....,...ptn?.. Jan 13 22:57:08.887529: | cb 51 0e b6 22 54 b7 65 6d cb e6 99 4d fb 20 07 .Q.."T.em...M. . Jan 13 22:57:08.887537: | f3 1e 99 2a 1d 8c dd 89 0e e9 37 80 f5 a9 c3 86 ...*......7..... Jan 13 22:57:08.887545: | 04 dc e2 1e e9 4e 5a b2 f3 c6 c5 9d 92 da 0d c2 .....NZ......... Jan 13 22:57:08.887552: | f2 ea 60 6b b9 56 3e 0c 70 6f e9 57 bf eb d9 aa ..`k.V>.po.W.... Jan 13 22:57:08.887560: | 51 7d 65 a4 21 10 4b d9 d9 28 1e 28 88 64 a5 26 Q}e.!.K..(.(.d.& Jan 13 22:57:08.887570: | 32 4f e6 f7 b0 64 fe d5 96 fb c3 01 e3 f8 60 d0 2O...d........`. Jan 13 22:57:08.887578: | 3f 1d ea a2 fd 4b 3a 53 7b 75 de 7b b7 86 ca ec ?....K:S{u.{.... Jan 13 22:57:08.887585: | b3 1e 59 32 12 4e ea 40 26 89 ba 15 5c de 56 4c ..Y2.N.@&...\.VL Jan 13 22:57:08.887593: | bc 0d 0e 5e 83 3a fa a5 ab a4 cf 31 af f0 ee 18 ...^.:.....1.... Jan 13 22:57:08.887600: | 5b 6e 3e a7 6f 6d 6b 00 c0 3a 07 f1 c4 06 85 04 [n>.omk..:...... Jan 13 22:57:08.887608: | bb c2 3f 8d f9 e2 b2 ed f8 0c df 23 94 52 ..?........#.R Jan 13 22:57:08.887615: | adding 2 bytes of padding (including 1 byte padding-length) Jan 13 22:57:08.887624: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.887631: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.887639: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 22:57:08.887646: | emitting length of IKEv2 Encrypted Fragment: 504 Jan 13 22:57:08.887653: | emitting length of ISAKMP Message: 532 Jan 13 22:57:08.887715: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.887743: | integ: delref clone-key@0x55c838026d80 Jan 13 22:57:08.887777: | recording fragment 1 Jan 13 22:57:08.887789: | opening output PBS reply frag packet Jan 13 22:57:08.887798: | **emit ISAKMP Message: Jan 13 22:57:08.887808: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.887820: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.887828: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 22:57:08.887835: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.887843: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.887851: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.887860: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.887869: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 22:57:08.887878: | ***emit IKEv2 Encrypted Fragment: Jan 13 22:57:08.887886: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.887896: | flags: none (0x0) Jan 13 22:57:08.887906: | fragment number: 2 (00 02) Jan 13 22:57:08.887914: | total fragments: 5 (00 05) Jan 13 22:57:08.887932: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Jan 13 22:57:08.887941: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.887949: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 22:57:08.887957: | emitting 16 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 22:57:08.887978: | emitting 462 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 22:57:08.887988: | cleartext fragment: Jan 13 22:57:08.887996: | 69 ea 8b 4d f5 bb 0b fb 24 74 8b 30 95 36 e0 0d i..M....$t.0.6.. Jan 13 22:57:08.888004: | 99 e2 3c e4 5f 5d a9 4d 08 96 b2 be 4d a0 9b 3f ..<._].M....M..? Jan 13 22:57:08.888011: | 69 2a 51 9c 8a 8d ed 30 bb f0 1d 51 0f 2f 14 69 i*Q....0...Q./.i Jan 13 22:57:08.888019: | 12 40 f2 57 07 6a 8a 5f 24 64 4f 21 37 0e c4 17 .@.W.j._$dO!7... Jan 13 22:57:08.888026: | 87 1d 0b 37 cd 45 c1 0b a2 6e d7 03 1c d5 a9 e3 ...7.E...n...... Jan 13 22:57:08.888034: | 80 c1 3d d5 54 52 4e bf 8d 05 6c 72 a8 e2 56 3c ..=.TRN...lr..V< Jan 13 22:57:08.888041: | bb 9c f2 06 85 98 9d a9 04 c8 75 dd d6 7a 4a 93 ..........u..zJ. Jan 13 22:57:08.888048: | f0 b5 e8 60 43 c4 8d f9 08 31 98 21 de 16 4d 24 ...`C....1.!..M$ Jan 13 22:57:08.888055: | 49 7a 6d 5d a3 41 cc e2 ac 77 d8 c1 fa ee e5 4b Izm].A...w.....K Jan 13 22:57:08.888063: | 23 51 8a 28 26 75 c8 bc 9a 51 0d 94 c1 f2 62 ee #Q.(&u...Q....b. Jan 13 22:57:08.888073: | 5d 7e 8f 1b 32 84 3d d2 d8 52 af 53 20 f4 60 29 ]~..2.=..R.S .`) Jan 13 22:57:08.888081: | d6 c7 52 7f 60 05 37 20 77 8e b7 08 c5 9e d4 05 ..R.`.7 w....... Jan 13 22:57:08.888088: | 8d 25 33 61 03 74 89 37 90 09 53 35 db 3c a9 58 .%3a.t.7..S5.<.X Jan 13 22:57:08.888096: | b1 5b d8 11 da c6 c8 18 2e 5c fb 0a cd 6b 29 a6 .[.......\...k). Jan 13 22:57:08.888103: | 7c 6b f3 17 0c 9d 3a 79 d2 a0 45 cb a0 b2 8f 45 |k....:y..E....E Jan 13 22:57:08.888113: | ba 50 21 a4 b9 aa e2 6b 18 91 a9 d0 6e 41 6c bf .P!....k....nAl. Jan 13 22:57:08.888120: | 5d ba 8b 55 39 02 03 01 00 01 a3 45 30 43 30 15 ]..U9......E0C0. Jan 13 22:57:08.888128: | 06 03 55 1d 11 04 0e 30 0c 82 0a 76 70 6e 2e 61 ..U....0...vpn.a Jan 13 22:57:08.888137: | 6c 75 2e 68 72 30 1d 06 03 55 1d 25 04 16 30 14 lu.hr0...U.%..0. Jan 13 22:57:08.888145: | 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 ..+.........+... Jan 13 22:57:08.888153: | 05 07 03 02 30 0b 06 03 55 1d 0f 04 04 03 02 05 ....0...U....... Jan 13 22:57:08.888160: | a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 .0...*.H........ Jan 13 22:57:08.888167: | 03 82 02 01 00 08 06 54 5f c6 9d 4c 1b 16 04 f4 .......T_..L.... Jan 13 22:57:08.888174: | 35 07 86 97 04 a9 4a 7e c4 0f fd e7 15 df f7 33 5.....J~.......3 Jan 13 22:57:08.888184: | e9 38 6c 89 fb e5 01 d6 71 97 7d 29 72 bb 4f b6 .8l.....q.})r.O. Jan 13 22:57:08.888193: | a2 25 8e c9 4e c2 df b3 91 bb 35 76 10 9b 8a ca .%..N.....5v.... Jan 13 22:57:08.888200: | ac 30 20 ff 80 55 63 a6 48 59 d8 c7 ab 5e cb ac .0 ..Uc.HY...^.. Jan 13 22:57:08.888208: | c9 77 0b 93 7d 6e 11 81 ae a6 75 2f 1d c2 86 54 .w..}n....u/...T Jan 13 22:57:08.888215: | 5b a9 33 40 03 e3 28 f2 f4 6e 3e e4 47 89 [.3@..(..n>.G. Jan 13 22:57:08.888222: | adding 2 bytes of padding (including 1 byte padding-length) Jan 13 22:57:08.888231: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.888242: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.888251: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 22:57:08.888258: | emitting length of IKEv2 Encrypted Fragment: 504 Jan 13 22:57:08.888268: | emitting length of ISAKMP Message: 532 Jan 13 22:57:08.888303: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.888356: | integ: delref clone-key@0x55c838026d80 Jan 13 22:57:08.888388: | recording fragment 2 Jan 13 22:57:08.888401: | opening output PBS reply frag packet Jan 13 22:57:08.888411: | **emit ISAKMP Message: Jan 13 22:57:08.888423: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.888433: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.888442: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 22:57:08.888449: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.888457: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.888464: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.888476: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.888483: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 22:57:08.888491: | ***emit IKEv2 Encrypted Fragment: Jan 13 22:57:08.888499: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.888506: | flags: none (0x0) Jan 13 22:57:08.888514: | fragment number: 3 (00 03) Jan 13 22:57:08.888522: | total fragments: 5 (00 05) Jan 13 22:57:08.888531: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Jan 13 22:57:08.888539: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.888546: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 22:57:08.888554: | emitting 16 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 22:57:08.888566: | emitting 462 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 22:57:08.888576: | cleartext fragment: Jan 13 22:57:08.888584: | e5 07 02 85 84 c2 b9 3c 86 21 85 fc 7a 40 74 0e .......<.!..z@t. Jan 13 22:57:08.888591: | ce d1 df 70 e5 82 48 09 6d 8c ee 95 20 5b d7 c8 ...p..H.m... [.. Jan 13 22:57:08.888598: | 6e 55 76 44 6d 53 ef b0 ae fe 63 15 97 28 61 d3 nUvDmS....c..(a. Jan 13 22:57:08.888607: | 64 af ca 1f 82 83 06 a8 0a 64 85 6f 58 7a 24 d5 d........d.oXz$. Jan 13 22:57:08.888615: | cb 80 e1 d3 25 27 6b f3 93 a1 b7 b0 be 59 d0 eb ....%'k......Y.. Jan 13 22:57:08.888622: | 2f 24 61 84 a1 23 e5 e5 5a c2 86 d9 af 95 a5 ef /$a..#..Z....... Jan 13 22:57:08.888628: | aa ee 63 be 36 7c ec b5 db 67 69 d8 bc 80 80 08 ..c.6|...gi..... Jan 13 22:57:08.888635: | 26 c6 c3 e2 96 34 5e 16 a5 23 88 51 49 f6 50 07 &....4^..#.QI.P. Jan 13 22:57:08.888642: | 3b 6f 59 65 4c 1b 2a 4b ba bd f0 42 51 e7 73 cd ;oYeL.*K...BQ.s. Jan 13 22:57:08.888649: | 27 19 94 5a 84 48 bc 98 56 9b 41 34 0a 89 86 5a '..Z.H..V.A4...Z Jan 13 22:57:08.888656: | 35 4f 20 19 25 d0 75 27 ae e0 f6 22 04 b1 46 fa 5O .%.u'..."..F. Jan 13 22:57:08.888663: | ac 18 3a fc 0d b0 a3 ff 7d cc a8 87 8e 5c fd dc ..:.....}....\.. Jan 13 22:57:08.888670: | 71 a9 47 2b 5e 4e 5c 76 a3 29 b8 91 a6 67 43 2d q.G+^N\v.)...gC- Jan 13 22:57:08.888677: | 16 40 fe 6d d5 f5 40 a2 79 2c 91 1d 43 b1 1d 59 .@.m..@.y,..C..Y Jan 13 22:57:08.888685: | 3a c6 58 b6 71 f6 43 9f e7 f3 36 a3 21 90 aa 78 :.X.q.C...6.!..x Jan 13 22:57:08.888692: | 85 eb 5a 29 ff bc 90 8e 67 f9 e5 fa d2 c9 e6 3d ..Z)....g......= Jan 13 22:57:08.888699: | 4f ed 90 b4 1c 53 53 92 c6 91 c2 72 19 c4 ad d6 O....SS....r.... Jan 13 22:57:08.888705: | 68 4f d7 b4 1a 6e bb c0 f6 bf 43 79 87 f0 19 0f hO...n....Cy.... Jan 13 22:57:08.888713: | a9 6f c6 69 1f 04 6f ed fc 2b c3 9f 7f d6 34 3e .o.i..o..+....4> Jan 13 22:57:08.888722: | 80 ce b1 e5 c8 5b be e3 8b 13 f2 af 66 d4 07 9c .....[......f... Jan 13 22:57:08.888729: | 4e ca c6 0a a0 ee 14 09 c0 5e e4 fd 6f 5c 6d 1f N........^..o\m. Jan 13 22:57:08.888736: | ba 8d ae 93 5b ee f7 17 2f f8 3d f7 3f 8a a0 eb ....[.../.=.?... Jan 13 22:57:08.888743: | b2 bd 68 18 99 0e 86 a7 11 af e5 c1 8d 83 68 f7 ..h...........h. Jan 13 22:57:08.888759: | aa 3c 59 b3 15 3b e0 c4 42 e2 23 32 45 5a cd 10 ....."....2.d[.7 Jan 13 22:57:08.889272: | e9 c2 37 84 0f 93 64 f5 06 03 41 85 e4 4d 5f 97 ..7...d...A..M_. Jan 13 22:57:08.889285: | 97 ad 34 b9 e1 e8 42 8e 3c f9 57 61 04 31 37 ba ..4...B.<.Wa.17. Jan 13 22:57:08.889296: | c5 f8 0e bc 70 f1 9d cd b0 e9 25 4c 58 d2 b7 c7 ....p.....%LX... Jan 13 22:57:08.889321: | bd 55 e1 03 82 2f b4 8b 1d 5c 1e 6f 9d 31 50 59 .U.../...\.o.1PY Jan 13 22:57:08.889333: | ce 5b 42 bd 88 64 50 eb fb 16 7c 46 e5 c5 ac 77 .[B..dP...|F...w Jan 13 22:57:08.889343: | 0e 3e a3 fe cb 38 e7 1f ec 85 86 e5 50 9f 55 73 .>...8......P.Us Jan 13 22:57:08.889354: | 45 ad c0 d1 95 74 ca 7f 7f cc f0 7c a1 36 67 53 E....t.....|.6gS Jan 13 22:57:08.889363: | ee 8f 9d 1f 22 f7 5a 58 f6 d2 35 97 e8 5d b3 c3 ....".ZX..5..].. Jan 13 22:57:08.889373: | ca 26 8c fe 61 67 84 38 46 c5 b4 7c a7 a8 8a 8c .&..ag.8F..|.... Jan 13 22:57:08.889383: | aa 61 64 29 a0 01 de 98 24 1a 01 e6 27 9f 9f 23 .ad)....$...'..# Jan 13 22:57:08.889393: | 80 76 ae 7f 3d 57 e2 6e b5 38 4f f4 c6 a1 aa ed .v..=W.n.8O..... Jan 13 22:57:08.889402: | f4 eb 22 bf a0 6f f8 a3 80 72 f1 1c 75 00 1f e6 .."..o...r..u... Jan 13 22:57:08.889412: | e8 ea 35 c8 f7 72 1c 8e e6 73 7d 2a d1 f7 d8 3a ..5..r...s}*...: Jan 13 22:57:08.889421: | 97 06 a6 b7 1b ad 5c 06 d1 ca b9 58 01 d9 ea d3 ......\....X.... Jan 13 22:57:08.889431: | 1b 5b 74 ff 37 0b a2 27 f7 70 77 7a 49 ed 5c 06 .[t.7..'.pwzI.\. Jan 13 22:57:08.889440: | bf 38 a2 8e 34 61 37 87 67 8a 3d 75 d4 67 b2 db .8..4a7.g.=u.g.. Jan 13 22:57:08.889453: | f8 d6 71 cf 64 99 77 0a 83 87 39 e2 c9 8a bf 01 ..q.d.w...9..... Jan 13 22:57:08.889464: | 5a f0 44 0a 86 b0 a3 a7 21 fc 27 ab aa 27 9f 8f Z.D.....!.'..'.. Jan 13 22:57:08.889474: | 3a 2e 22 e1 b5 f4 a3 fd fd b7 06 08 a7 d2 8b 14 :."............. Jan 13 22:57:08.889484: | 5a 57 06 a2 88 ed e6 fc fa 59 24 e2 6c 58 6b 69 ZW.......Y$.lXki Jan 13 22:57:08.889497: | 65 b9 5e c3 18 50 41 4e a8 ee ca 2d e4 79 e5 06 e.^..PAN...-.y.. Jan 13 22:57:08.889508: | 04 60 ad 39 fe bc 75 a2 76 b6 92 74 5a 3c .`.9..u.v..tZ< Jan 13 22:57:08.889519: | adding 2 bytes of padding (including 1 byte padding-length) Jan 13 22:57:08.889530: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.889543: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.889555: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 22:57:08.889569: | emitting length of IKEv2 Encrypted Fragment: 504 Jan 13 22:57:08.889580: | emitting length of ISAKMP Message: 532 Jan 13 22:57:08.889619: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.889649: | integ: delref clone-key@0x55c838026d80 Jan 13 22:57:08.889690: | recording fragment 4 Jan 13 22:57:08.889706: | opening output PBS reply frag packet Jan 13 22:57:08.889718: | **emit ISAKMP Message: Jan 13 22:57:08.889731: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 22:57:08.889746: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 22:57:08.889757: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 22:57:08.889771: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 22:57:08.889782: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 22:57:08.889796: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 22:57:08.889809: | Message ID: 1 (00 00 00 01) Jan 13 22:57:08.889822: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 22:57:08.889834: | ***emit IKEv2 Encrypted Fragment: Jan 13 22:57:08.889845: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 22:57:08.889855: | flags: none (0x0) Jan 13 22:57:08.889869: | fragment number: 5 (00 05) Jan 13 22:57:08.889881: | total fragments: 5 (00 05) Jan 13 22:57:08.889892: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Jan 13 22:57:08.889903: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 22:57:08.889913: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 22:57:08.889949: | emitting 16 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 22:57:08.889967: | emitting 127 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 22:57:08.889980: | cleartext fragment: Jan 13 22:57:08.889992: | 9f 78 78 21 00 00 20 02 00 00 00 00 01 00 04 c0 .xx!.. ......... Jan 13 22:57:08.890002: | a8 65 0a 00 03 00 04 08 08 08 08 00 03 00 04 c0 .e.............. Jan 13 22:57:08.890013: | a8 64 01 2c 00 00 2c 00 00 00 28 01 03 04 03 19 .d.,..,...(..... Jan 13 22:57:08.890022: | 19 78 da 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 .x.............. Jan 13 22:57:08.890032: | 00 00 08 03 00 00 02 00 00 00 08 05 00 00 00 2d ...............- Jan 13 22:57:08.890041: | 00 00 18 01 00 00 00 07 00 00 10 00 00 ff ff c0 ................ Jan 13 22:57:08.890050: | a8 65 0a c0 a8 65 0a 00 00 00 18 01 00 00 00 07 .e...e.......... Jan 13 22:57:08.890061: | 00 00 10 00 00 ff ff 00 00 00 00 ff ff ff ff ............... Jan 13 22:57:08.890071: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 22:57:08.890082: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 22:57:08.890096: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 22:57:08.890108: | emitting length of IKEv2 Encrypted Fragment: 168 Jan 13 22:57:08.890118: | emitting length of ISAKMP Message: 196 Jan 13 22:57:08.890156: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 22:57:08.890186: | integ: delref clone-key@0x55c838026d80 Jan 13 22:57:08.890221: | recording fragment 5 Jan 13 22:57:08.890241: | job 53 helper 9 #41 computing responder signature (signature): final status STF_OK; cleaning up Jan 13 22:57:08.890263: | delref logger@0x55c838019ae8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.890278: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.890289: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 22:57:08.890308: | #41 complete_v2_state_transition() PARENT_R1->ESTABLISHED_IKE_SA with status STF_OK Jan 13 22:57:08.890327: | transitioning from state STATE_V2_PARENT_R1 to state STATE_V2_ESTABLISHED_IKE_SA Jan 13 22:57:08.890342: | Message ID: updating counters for #41 Jan 13 22:57:08.890367: | Message ID: IKE #41 updating responder received message request 1: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0 .recv=0->1 .recv_frags=0->6 .recv_wip=1->-1 .last_contact=9594096.783096->9594096.911424 ike.wip.initiator=-1 Jan 13 22:57:08.890388: | Message ID: IKE #41 updating responder sent message response 1: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=0->1 .recv=1 .recv_frags=6 .last_contact=9594096.911424 ike.wip.initiator=-1 Jan 13 22:57:08.890404: | parent state #41: PARENT_R1(half-open IKE SA) => ESTABLISHED_IKE_SA(established IKE SA) Jan 13 22:57:08.890424: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594096.773743 ike.responder .sent=1 .recv=1 .recv_frags=6 .last_contact=9594096.911424 ike.wip.initiator=-1 Jan 13 22:57:08.890437: | pstats #41 ikev2.ike established Jan 13 22:57:08.890451: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 22:57:08.890466: | delref tt@0x55c838024008(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.890488: | delref state-event@0x55c83800da48(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 22:57:08.890505: | #41 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 22:57:08.890521: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c83800da48 timeout in 28800 seconds for #41 Jan 13 22:57:08.890536: | newref tt@0x55c838024008(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:08.890564: | sending 536 bytes for STATE_V2_PARENT_R1 through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 22:57:08.890586: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 22:57:08.890598: | 82 26 37 8e 35 20 23 20 00 00 00 01 00 00 02 14 .&7.5 # ........ Jan 13 22:57:08.890609: | 24 00 01 f8 00 01 00 05 22 8b 0c 1c fb 85 d3 37 $......."......7 Jan 13 22:57:08.890619: | a4 49 03 28 04 31 73 7e f9 8d 71 ee 11 37 70 c6 .I.(.1s~..q..7p. Jan 13 22:57:08.890628: | b0 29 9d 0d 86 32 84 65 b6 28 25 29 5e ea 16 c6 .)...2.e.(%)^... Jan 13 22:57:08.890639: | 06 55 b2 26 13 eb ed 34 2a 13 19 5a ed 81 9b 7d .U.&...4*..Z...} Jan 13 22:57:08.890651: | 19 7c 2b 3e b4 d6 42 81 0f 80 44 14 cd a6 5d 7b .|+>..B...D...]{ Jan 13 22:57:08.890662: | c6 85 16 77 1c 38 d6 5e d7 55 59 6b 44 37 15 80 ...w.8.^.UYkD7.. Jan 13 22:57:08.890672: | f8 67 a0 83 5c 87 af ad 97 2a bc 57 9a 1b 4c 7d .g..\....*.W..L} Jan 13 22:57:08.890682: | 86 f4 f3 af 03 d6 fc d8 e2 33 8f 8e fd 2e 0e ce .........3...... Jan 13 22:57:08.890692: | 7e 27 fd 5c 2c bb 0a 7f 83 a3 8a cb c1 80 e1 59 ~'.\,..........Y Jan 13 22:57:08.890702: | 19 1e cf e2 d6 7e 4e dd 81 d4 b9 38 f9 f2 30 19 .....~N....8..0. Jan 13 22:57:08.890712: | 6f 8c f2 22 d3 12 e1 3d ed 34 b9 c0 4b e3 ac 13 o.."...=.4..K... Jan 13 22:57:08.890722: | 1f aa a4 09 f5 7f 9e 6a 00 af 9b 37 8d f2 27 37 .......j...7..'7 Jan 13 22:57:08.890731: | 14 66 29 bd ee 30 d4 c2 77 2c a9 81 d8 fa 75 ba .f)..0..w,....u. Jan 13 22:57:08.890741: | 0f 5c 50 0c 6f 0c c7 e7 6f d0 50 a3 d8 2e 34 e1 .\P.o...o.P...4. Jan 13 22:57:08.890751: | 83 05 10 2d 48 d0 5a ce c2 ad 07 6d ff 70 1e 74 ...-H.Z....m.p.t Jan 13 22:57:08.890765: | b8 9e 3d f4 d7 d6 52 dc 4d 02 6d 9b 15 a0 7c 0e ..=...R.M.m...|. Jan 13 22:57:08.890776: | e6 60 2b ee 5a 11 ab c6 a4 de 49 af 70 90 5f ba .`+.Z.....I.p._. Jan 13 22:57:08.890786: | 7a 75 8f 82 1f a2 38 63 e4 2c 0b f6 55 bd b2 f2 zu....8c.,..U... Jan 13 22:57:08.890796: | 39 86 86 a3 a3 68 c3 81 93 39 b0 2f ae d7 d4 0e 9....h...9./.... Jan 13 22:57:08.890806: | 05 d2 08 63 fc 6f b3 58 e6 bd 9e 51 af 98 93 74 ...c.o.X...Q...t Jan 13 22:57:08.890816: | a4 1d b0 9c 71 62 71 f0 08 6e f1 2e a8 38 82 51 ....qbq..n...8.Q Jan 13 22:57:08.890826: | 78 4a a4 75 41 d4 54 d1 9c 18 1a aa 3c 50 ab 75 xJ.uA.T.......7...DO.T.V Jan 13 22:57:08.891078: | 37 01 67 60 3a d4 bc d7 f2 24 c3 bb 84 73 70 d8 7.g`:....$...sp. Jan 13 22:57:08.891091: | bb b0 d0 de c4 2f c8 06 db 3c 29 01 72 19 e0 b0 ...../...<).r... Jan 13 22:57:08.891101: | 21 21 d9 25 be 17 9b a9 cf a1 8a 50 e1 a2 2f 03 !!.%.......P../. Jan 13 22:57:08.891111: | 12 54 82 41 89 73 d9 b5 28 0c 0c f0 d3 e0 dc 0c .T.A.s..(....... Jan 13 22:57:08.891121: | 00 79 aa 1a a5 f1 83 cd be 00 27 a9 d9 f2 3b e0 .y........'...;. Jan 13 22:57:08.891132: | e5 07 23 82 a5 dc 4b cf aa 99 10 d7 6c 91 33 b7 ..#...K.....l.3. Jan 13 22:57:08.891144: | 7c 88 c1 19 4e 0b 21 f2 79 61 84 66 83 b5 10 ca |...N.!.ya.f.... Jan 13 22:57:08.891155: | 40 20 76 6f c7 40 44 e8 6e ca 75 c7 cc 2d 31 ed @ vo.@D.n.u..-1. Jan 13 22:57:08.891165: | 2b 20 e4 b6 b4 33 13 23 c3 0c 05 36 37 03 e3 de + ...3.#...67... Jan 13 22:57:08.891175: | 1a e5 a2 4d f6 9c 60 0e c1 b5 f0 bd 49 87 f9 c8 ...M..`.....I... Jan 13 22:57:08.891184: | 6b 3b 77 20 33 39 91 b7 61 69 5e 97 9e a0 d9 92 k;w 39..ai^..... Jan 13 22:57:08.891194: | c2 15 84 7b 17 76 e2 dd 48 12 d5 a9 cb 09 d8 ca ...{.v..H....... Jan 13 22:57:08.891204: | 66 19 8f 1d 61 20 d5 57 92 5f 63 5f 2e 2d 53 04 f...a .W._c_.-S. Jan 13 22:57:08.891214: | d8 ff 59 0a 35 a0 bf 84 b1 cd a1 0c 7e 2c f8 68 ..Y.5.......~,.h Jan 13 22:57:08.891224: | 2a 58 da b5 57 ab fd 22 51 e1 9e 67 24 8c 95 7d *X..W.."Q..g$..} Jan 13 22:57:08.891234: | ad 35 e4 e7 5e f8 3f d2 ea 1f 86 f9 c0 df 4b 48 .5..^.?.......KH Jan 13 22:57:08.891248: | d2 fd 8f 50 5f fa 5c c4 7d 0f 0a 74 34 36 74 c4 ...P_.\.}..t46t. Jan 13 22:57:08.891259: | 7f 90 f5 7d e0 dd 33 91 e2 43 f0 20 77 1c 90 69 ...}..3..C. w..i Jan 13 22:57:08.891269: | 93 8b 0c 1f f7 44 da 7e d5 6d 96 5e c0 39 98 5a .....D.~.m.^.9.Z Jan 13 22:57:08.891279: | 08 77 4e e9 c5 92 5f d8 2d c7 01 9f 9c 35 dc 06 .wN..._.-....5.. Jan 13 22:57:08.891289: | 3a 6d 36 45 88 29 e2 55 a6 78 44 91 e5 30 d1 fb :m6E.).U.xD..0.. Jan 13 22:57:08.891299: | ff e4 73 9f f1 75 06 29 dd 6a 5f 60 b1 56 a7 e1 ..s..u.).j_`.V.. Jan 13 22:57:08.891309: | 0b 44 65 b2 d4 53 26 42 27 4a 3d 19 43 5e 7a dc .De..S&B'J=.C^z. Jan 13 22:57:08.891319: | f7 a2 e3 fe 51 b9 41 71 44 ca 75 3f 4f c1 9f 76 ....Q.AqD.u?O..v Jan 13 22:57:08.891329: | 80 13 51 9a fe 61 ca 30 3d 1f 3b b7 a1 90 19 31 ..Q..a.0=.;....1 Jan 13 22:57:08.891343: | c5 87 10 7b 7c 7d fb 92 d1 8a 6f 9a ab a2 34 b7 ...{|}....o...4. Jan 13 22:57:08.891354: | c1 fd 73 d8 dc 99 e0 31 a8 2e aa de 8c f2 a8 d6 ..s....1........ Jan 13 22:57:08.891365: | 63 5d 07 fb 9e 1c 38 2c c]....8, Jan 13 22:57:08.891404: | sending 536 bytes for STATE_V2_PARENT_R1 through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 22:57:08.891420: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 22:57:08.891430: | 82 26 37 8e 35 20 23 20 00 00 00 01 00 00 02 14 .&7.5 # ........ Jan 13 22:57:08.891441: | 00 00 01 f8 00 03 00 05 52 7c 15 07 66 bb 31 cc ........R|..f.1. Jan 13 22:57:08.891451: | 4a 84 70 46 1b f5 28 49 da bf bf bd 9f 64 4a 23 J.pF..(I.....dJ# Jan 13 22:57:08.891460: | 8d d4 d6 1a a7 58 e0 0a e9 7c 5a 2e 0b 3b ff 15 .....X...|Z..;.. Jan 13 22:57:08.891474: | e7 2d b3 c4 86 56 95 5c 31 01 ab e4 73 9a 40 81 .-...V.\1...s.@. Jan 13 22:57:08.891485: | 87 87 11 f8 36 31 fc 8c c8 0b 26 e6 df 4e 5e 1d ....61....&..N^. Jan 13 22:57:08.891495: | 4b 3b 04 54 88 08 8d 1c d0 58 d1 1b 9c f8 ea 55 K;.T.....X.....U Jan 13 22:57:08.891505: | b7 a3 92 9f 7d b7 7b 4d cb 53 bb 48 0d d5 b1 cd ....}.{M.S.H.... Jan 13 22:57:08.891515: | 10 a0 ea 5c b7 1f 99 0a 28 98 1d 78 2f 39 b1 85 ...\....(..x/9.. Jan 13 22:57:08.891525: | aa 30 a3 9f d8 e7 91 7f 15 2e 2e 07 cc b9 ad 6d .0.............m Jan 13 22:57:08.891535: | 1e fd bd 3d 9a 4d 15 8a 85 17 a9 75 26 52 25 b1 ...=.M.....u&R%. Jan 13 22:57:08.891572: | 16 eb 2e 90 27 19 dd ba f1 80 0c 11 05 8c 28 34 ....'.........(4 Jan 13 22:57:08.891597: | 91 f4 9f 63 6f 72 f3 50 a2 9e a3 5e 9f 54 01 84 ...cor.P...^.T.. Jan 13 22:57:08.891607: | 1d a3 42 e9 0e 42 e4 7c c2 00 a8 92 84 c3 b5 b1 ..B..B.|........ Jan 13 22:57:08.891616: | 82 25 61 de 46 48 61 c5 5d 4e de 86 61 84 7d 84 .%a.FHa.]N..a.}. Jan 13 22:57:08.891629: | 73 e6 0a 47 77 6f 22 6f 4b 2e e1 fb 64 18 a8 2b s..Gwo"oK...d..+ Jan 13 22:57:08.891639: | a6 6f 38 a7 e9 ec 6a be de 5f 85 73 f8 ef 61 68 .o8...j.._.s..ah Jan 13 22:57:08.891649: | ee c2 a6 24 49 4e 03 78 78 5d d5 c7 51 36 fd ff ...$IN.xx]..Q6.. Jan 13 22:57:08.891658: | 2d 2d d2 68 8b 1f 75 66 e0 25 bf db 50 73 a7 07 --.h..uf.%..Ps.. Jan 13 22:57:08.891667: | 26 22 aa 63 8f 0a 99 47 9e 05 7f 70 6d ce e6 38 &".c...G...pm..8 Jan 13 22:57:08.891677: | c5 2c 1f e1 05 5c 85 2d b0 91 20 e8 b8 3a 6f 9c .,...\.-.. ..:o. Jan 13 22:57:08.891686: | 44 17 0b 3d df 9b 4b 83 30 20 f9 e8 e8 58 46 32 D..=..K.0 ...XF2 Jan 13 22:57:08.891696: | 22 cd 70 a5 bb 6d 67 1a b6 78 fd 5f 75 30 e7 9b ".p..mg..x._u0.. Jan 13 22:57:08.891708: | 7f 2c 6a 68 55 5b a4 c3 cd 9e bc c4 31 ee b3 ac .,jhU[......1... Jan 13 22:57:08.891718: | 15 43 52 ad 1c 4e 8f 2c 0a 5d 40 b3 67 11 6a 1c .CR..N.,.]@.g.j. Jan 13 22:57:08.891728: | 30 ab b5 c5 4d 07 71 a3 9d f9 68 bd ef 1d ec 18 0...M.q...h..... Jan 13 22:57:08.891738: | a3 0f e2 9a 09 a0 8c e9 8b 49 2e a9 03 dc 30 01 .........I....0. Jan 13 22:57:08.891747: | 80 9f bd b8 4c 4e 3f 80 bf 5a b4 c3 55 14 08 5c ....LN?..Z..U..\ Jan 13 22:57:08.891756: | 10 f5 2c 39 3f 89 d6 59 a7 82 e5 35 10 88 83 2e ..,9?..Y...5.... Jan 13 22:57:08.891765: | 7e e8 e6 35 66 c3 51 1b 1a 73 9b b9 e8 3a 29 8d ~..5f.Q..s...:). Jan 13 22:57:08.891778: | ca 45 b9 58 5b f6 57 b9 33 fe f1 5f 98 a4 ba 9b .E.X[.W.3.._.... Jan 13 22:57:08.891788: | 2b 61 05 be 8a ba b8 eb 2c 81 28 fb a1 cc 61 73 +a......,.(...as Jan 13 22:57:08.891798: | bc bf b6 0e b5 d4 7d 78 ......}x Jan 13 22:57:08.891835: | sending 536 bytes for STATE_V2_PARENT_R1 through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 22:57:08.891848: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 22:57:08.891859: | 82 26 37 8e 35 20 23 20 00 00 00 01 00 00 02 14 .&7.5 # ........ Jan 13 22:57:08.891870: | 00 00 01 f8 00 04 00 05 e5 e1 21 d5 46 3e 87 3e ..........!.F>.> Jan 13 22:57:08.891880: | c0 51 50 76 a5 98 e6 10 ea 38 16 11 16 14 86 13 .QPv.....8...... Jan 13 22:57:08.891890: | c2 84 d4 a8 69 bc 08 2b 2c 28 76 d8 ce cb 14 21 ....i..+,(v....! Jan 13 22:57:08.891898: | 5a ba 00 21 10 b5 d4 19 c1 08 8a 16 3e 89 bc 05 Z..!........>... Jan 13 22:57:08.891908: | 90 f6 67 a6 43 c8 f3 39 63 91 2e c9 e4 c6 2a 2d ..g.C..9c.....*- Jan 13 22:57:08.891917: | 64 cd d6 a0 95 00 7c 3f ad 5e 48 85 ce 87 bb 03 d.....|?.^H..... Jan 13 22:57:08.891926: | 25 df 77 8a fd 08 bc f5 15 0c 77 96 be 06 fe 8e %.w.......w..... Jan 13 22:57:08.891936: | 2c 8e f0 e6 3a 91 3a 34 9e 10 43 f2 24 9d 3e 96 ,...:.:4..C.$.>. Jan 13 22:57:08.891945: | 67 5a 8f 75 3d 4c 54 a7 92 c6 81 65 93 22 54 4d gZ.u=LT....e."TM Jan 13 22:57:08.891955: | 86 9c 60 6f cf 8e 70 88 1d 79 6f 57 f7 6e d0 1b ..`o..p..yoW.n.. Jan 13 22:57:08.891967: | db 76 a9 4a 3b 50 bb 4c c4 47 2a 4b 6d 31 dd 98 .v.J;P.L.G*Km1.. Jan 13 22:57:08.891978: | a1 fe 18 bd fd 78 4d 17 67 c3 f4 6d 3e fd 40 0f .....xM.g..m>.@. Jan 13 22:57:08.891990: | 72 9b 7d 7c f0 fa f6 91 a5 ca 8e 8c 63 05 ff 68 r.}|........c..h Jan 13 22:57:08.892000: | 5a 24 c7 8a 1c a7 7b e3 72 33 61 92 43 f6 c4 54 Z$....{.r3a.C..T Jan 13 22:57:08.892012: | 1e 4c 89 5b 67 b6 49 1c a9 c4 91 5c 7c 23 be 8f .L.[g.I....\|#.. Jan 13 22:57:08.892022: | e9 55 5b 35 46 e8 1e 14 02 7d 28 c6 e8 b6 15 77 .U[5F....}(....w Jan 13 22:57:08.892032: | b8 4b 67 58 64 b3 14 5b 88 b0 a4 40 37 50 a4 e8 .KgXd..[...@7P.. Jan 13 22:57:08.892052: | d2 21 4e 28 44 f4 58 4b 12 7e a8 c2 5e c5 83 bc .!N(D.XK.~..^... Jan 13 22:57:08.892063: | 7e be 88 5f 2a 94 5c 05 76 1e b0 e1 02 7a ab 1a ~.._*.\.v....z.. Jan 13 22:57:08.892073: | 4c 48 21 0b a5 45 1b 16 6b 41 24 78 b9 a8 84 bf LH!..E..kA$x.... Jan 13 22:57:08.892085: | 22 bb fa dd 6e 7e b0 3b 6c 95 db aa 9c 19 6c 43 "...n~.;l.....lC Jan 13 22:57:08.892096: | b4 9e fc da a2 07 90 d0 f5 38 39 ba 34 ec e3 85 .........89.4... Jan 13 22:57:08.892105: | 76 4d b4 f0 59 59 29 f2 c5 fe d7 ea b8 77 37 23 vM..YY)......w7# Jan 13 22:57:08.892117: | da 10 54 34 5b f2 f0 fd 06 65 69 54 62 2b f2 40 ..T4[....eiTb+.@ Jan 13 22:57:08.892129: | ef bf 31 4d c6 b0 d4 c7 4a 22 db 5b 49 93 c8 50 ..1M....J".[I..P Jan 13 22:57:08.892139: | e2 55 28 2e d8 40 62 30 59 62 13 79 8f 93 88 ad .U(..@b0Yb.y.... Jan 13 22:57:08.892149: | 9d 9a ed 7e 7a 24 39 8d f7 f9 7e 02 19 bf 9c 2f ...~z$9...~..../ Jan 13 22:57:08.892158: | 53 82 ed 81 d6 bd e0 77 fd ac 69 dd 6a 36 06 94 S......w..i.j6.. Jan 13 22:57:08.892172: | bf 65 a4 c7 fd 80 cf 74 ab 3c 5a 68 f0 6c f3 a9 .e.....t.....8.. Jan 13 22:57:08.892297: | d9 6b 45 e0 c8 d4 f1 b5 48 5e 53 1c 17 87 6a ec .kE.....H^S...j. Jan 13 22:57:08.892320: | 24 1d a4 5d 45 e7 65 82 76 c8 40 51 a4 fc 53 d3 $..]E.e.v.@Q..S. Jan 13 22:57:08.892334: | cd 1b f2 6e e7 3f 33 4c cd 7f cd e1 e6 bb fb 8c ...n.?3L........ Jan 13 22:57:08.892343: | 9a 02 fd f0 3a 33 39 05 6b 64 ce 97 9a d4 f0 9c ....:39.kd...... Jan 13 22:57:08.892352: | 07 c1 b5 be 33 5c ff b4 47 0a 5f 85 ce 27 28 d0 ....3\..G._..'(. Jan 13 22:57:08.892366: | 86 c0 2b 0c 50 a4 ee bd d0 1c 24 c6 3f 4f 7b 0a ..+.P.....$.?O{. Jan 13 22:57:08.892376: | e3 25 49 d0 dc 15 53 36 1a 62 4c db 22 22 bb 55 .%I...S6.bL."".U Jan 13 22:57:08.892388: | 6e 61 16 06 cb a0 a0 b4 bc cf 36 b8 1a c6 3e e1 na........6...>. Jan 13 22:57:08.892398: | a9 2d ce 8d 37 9b 7d 90 .-..7.}. Jan 13 22:57:08.892433: | sent 5 messages Jan 13 22:57:08.892446: | announcing the state transition Jan 13 22:57:08.892465: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: Responder: process IKE_AUTH request: established IKE SA {cipher=AES_CBC_256 integ=HMAC_SHA2_256_128 prf=HMAC_SHA2_256 group=MODP2048} Jan 13 22:57:08.892479: | releasing #41's fd@(nil) because IKEv2 transitions finished Jan 13 22:57:08.892490: | delref fd@NULL (success_v2_state_transition() +2486 programs/pluto/ikev2.c) Jan 13 22:57:08.892506: | delref fd@NULL (success_v2_state_transition() +2486 programs/pluto/ikev2.c) Jan 13 22:57:08.892520: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.892539: | delref logger@0x55c83803ae78(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.892552: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.892563: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.892581: | delref struct iface_endpoint@0x55c83801f058(4->3) (resume_handler() +696 programs/pluto/server.c) Jan 13 22:57:08.892609: | #41 spent 15.7 (37.2) milliseconds in resume sending job back to main thread Jan 13 22:57:08.892632: | delref tt@0x7ff8a4002988(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:08.892660: | processing signal PLUTO_SIGCHLD Jan 13 22:57:08.892676: | waitpid returned ECHILD (no child processes left) Jan 13 22:57:08.892695: | spent 0.018 (0.0179) milliseconds in signal handler PLUTO_SIGCHLD Jan 13 22:57:08.892708: | processing signal PLUTO_SIGCHLD Jan 13 22:57:08.892721: | waitpid returned ECHILD (no child processes left) Jan 13 22:57:08.892736: | spent 0.0136 (0.0135) milliseconds in signal handler PLUTO_SIGCHLD Jan 13 22:57:08.892751: | processing signal PLUTO_SIGCHLD Jan 13 22:57:08.892763: | waitpid returned ECHILD (no child processes left) Jan 13 22:57:08.892778: | spent 0.0131 (0.013) milliseconds in signal handler PLUTO_SIGCHLD Jan 13 22:57:10.072379: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:57:10.072437: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:57:10.072467: | spent 0.0236 (0.0215) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:57:30.087812: | processing global timer EVENT_SD_WATCHDOG Jan 13 22:57:30.087882: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 22:57:30.087969: | spent 0.0827 (0.0808) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 22:57:30.087992: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:57:30.088004: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:57:30.088018: | spent 0.012 (0.012) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:57:38.861870: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c83804f078 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 22:57:38.861923: | #42 deleting EVENT_v2_LIVENESS Jan 13 22:57:38.861941: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:57:38.861956: | delref state-event@0x55c83804f078(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 22:57:38.861983: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:57:38.862006: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:57:38.862058: | liveness: #42 updating #41 last contact from 9594096.773743 to 9594126.883044 (last IPsec traffic flow) Jan 13 22:57:38.862080: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 22:57:38.862097: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 22:57:38.862112: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:57:38.862138: | #42 spent 0.274 (0.271) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 22:57:50.077413: | processing global timer EVENT_PENDING_DDNS Jan 13 22:57:50.077478: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 22:57:50.077499: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:57:50.077512: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 22:57:50.077522: | found "L2TP-PSK-common" Jan 13 22:57:50.077531: | found "L2TP-PSK-noNAT" Jan 13 22:57:50.077541: | found "L2TP-PSK-NAT" Jan 13 22:57:50.077551: | found "MYCONN-ikev2-cp" Jan 13 22:57:50.077560: | matches: 6 Jan 13 22:57:50.077571: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 22:57:50.077620: | spent 0.136 (0.136) milliseconds in in connection_check_ddns for hostname lookup Jan 13 22:57:50.077638: | spent 0.164 (0.162) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 22:57:50.077650: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:57:50.077662: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:57:50.077676: | spent 0.012 (0.0119) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:58:08.864375: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838034cb8 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 22:58:08.864406: | #42 deleting EVENT_v2_LIVENESS Jan 13 22:58:08.864416: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:58:08.864435: | delref state-event@0x55c838034cb8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 22:58:08.864451: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:58:08.864458: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:58:08.864482: | liveness: #42 updating #41 last contact from 9594126.883044 to 9594156.885517 (last IPsec traffic flow) Jan 13 22:58:08.864493: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic) Jan 13 22:58:08.864502: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 22:58:08.864510: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:58:08.864522: | #42 spent 0.152 (0.15) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 22:58:10.073785: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:58:10.073832: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:58:10.073853: | spent 0.0167 (0.0152) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:58:30.092374: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:58:30.092435: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:58:30.092458: | spent 0.018 (0.0161) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:58:38.870313: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838034cb8 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 22:58:38.870365: | #42 deleting EVENT_v2_LIVENESS Jan 13 22:58:38.870382: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:58:38.870397: | delref state-event@0x55c838034cb8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 22:58:38.870424: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:58:38.870438: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:58:38.870483: | liveness: #42 updating #41 last contact from 9594156.885517 to 9594186.891485 (last IPsec traffic flow) Jan 13 22:58:38.870506: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 22:58:38.870524: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 22:58:38.870539: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:58:38.870563: | #42 spent 0.256 (0.254) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 22:58:50.064370: | processing global timer EVENT_PENDING_PHASE2 Jan 13 22:58:50.064433: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 22:58:50.064453: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:58:50.064466: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 22:58:50.064478: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 22:58:50.064490: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 22:58:50.064500: | found "L2TP-PSK-common" Jan 13 22:58:50.064510: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 22:58:50.064519: | found "L2TP-PSK-noNAT" Jan 13 22:58:50.064528: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 22:58:50.064538: | found "L2TP-PSK-NAT" Jan 13 22:58:50.064547: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 22:58:50.064556: | found "MYCONN-ikev2-cp" Jan 13 22:58:50.064565: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 22:58:50.064574: | matches: 6 Jan 13 22:58:50.064594: | spent 0.157 (0.155) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 22:58:50.064609: | processing global timer EVENT_PENDING_DDNS Jan 13 22:58:50.064622: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 22:58:50.064634: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:58:50.064648: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 22:58:50.064682: | found "L2TP-PSK-common" Jan 13 22:58:50.064693: | found "L2TP-PSK-noNAT" Jan 13 22:58:50.064702: | found "L2TP-PSK-NAT" Jan 13 22:58:50.064711: | found "MYCONN-ikev2-cp" Jan 13 22:58:50.064719: | matches: 6 Jan 13 22:58:50.064729: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 22:58:50.064774: | spent 0.15 (0.15) milliseconds in in connection_check_ddns for hostname lookup Jan 13 22:58:50.064791: | spent 0.169 (0.169) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 22:58:50.068887: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:58:50.068934: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:58:50.068954: | spent 0.0166 (0.0152) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:59:08.888844: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838034cb8 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 22:59:08.888901: | #42 deleting EVENT_v2_LIVENESS Jan 13 22:59:08.888919: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:59:08.888934: | delref state-event@0x55c838034cb8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 22:59:08.888961: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:59:08.888975: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:59:08.889021: | liveness: #42 updating #41 last contact from 9594186.891485 to 9594216.910023 (last IPsec traffic flow) Jan 13 22:59:08.889043: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 22:59:08.889060: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 22:59:08.889075: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:59:08.889098: | #42 spent 0.261 (0.258) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 22:59:10.072432: | processing global timer EVENT_SD_WATCHDOG Jan 13 22:59:10.072490: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 22:59:10.072580: | spent 0.0846 (0.0835) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 22:59:10.072602: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:59:10.072615: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:59:10.072632: | spent 0.0152 (0.0151) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:59:30.080380: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:59:30.080440: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:59:30.080462: | spent 0.0178 (0.0156) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 22:59:38.898351: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838034cb8 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 22:59:38.898406: | #42 deleting EVENT_v2_LIVENESS Jan 13 22:59:38.898424: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 22:59:38.898439: | delref state-event@0x55c838034cb8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 22:59:38.898466: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 22:59:38.898480: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 22:59:38.898526: | liveness: #42 updating #41 last contact from 9594216.910023 to 9594246.919527 (last IPsec traffic flow) Jan 13 22:59:38.898548: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 22:59:38.898570: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 22:59:38.898594: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 22:59:38.898631: | #42 spent 0.283 (0.282) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 22:59:50.074882: | processing global timer EVENT_PENDING_DDNS Jan 13 22:59:50.074943: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 22:59:50.074964: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 22:59:50.075002: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 22:59:50.075015: | found "L2TP-PSK-common" Jan 13 22:59:50.075024: | found "L2TP-PSK-noNAT" Jan 13 22:59:50.075033: | found "L2TP-PSK-NAT" Jan 13 22:59:50.075042: | found "MYCONN-ikev2-cp" Jan 13 22:59:50.075051: | matches: 6 Jan 13 22:59:50.075061: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 22:59:50.075111: | spent 0.16 (0.161) milliseconds in in connection_check_ddns for hostname lookup Jan 13 22:59:50.075141: | spent 0.198 (0.196) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 22:59:50.075165: | processing global timer EVENT_SHUNT_SCAN Jan 13 22:59:50.075187: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 22:59:50.075212: | spent 0.0214 (0.0206) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:00:08.919126: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838034cb8 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 23:00:08.919183: | #42 deleting EVENT_v2_LIVENESS Jan 13 23:00:08.919201: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:00:08.919216: | delref state-event@0x55c838034cb8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:00:08.919243: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 23:00:08.919258: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:00:08.919303: | liveness: #42 updating #41 last contact from 9594246.919527 to 9594276.940304 (last IPsec traffic flow) Jan 13 23:00:08.919325: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:00:08.919347: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 23:00:08.919371: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:00:08.919403: | #42 spent 0.282 (0.28) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:00:10.073641: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:00:10.073696: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:00:10.073718: | spent 0.0179 (0.0159) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:00:30.090767: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:00:30.090814: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:00:30.090828: | spent 0.0236 (0.0223) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:00:38.928731: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838034cb8 for CHILD SA #42 in state ESTABLISHED_CHILD_SA Jan 13 23:00:38.928785: | #42 deleting EVENT_v2_LIVENESS Jan 13 23:00:38.928803: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:00:38.928818: | delref state-event@0x55c838034cb8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:00:38.928844: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 23:00:38.928858: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:00:38.928904: | liveness: #42 updating #41 last contact from 9594276.940304 to 9594306.949906 (last IPsec traffic flow) Jan 13 23:00:38.928927: | liveness: #42 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:00:38.928945: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838034cb8 timeout in 30 seconds for #42 Jan 13 23:00:38.928968: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:00:38.929005: | #42 spent 0.278 (0.276) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:00:50.074215: | processing global timer EVENT_PENDING_PHASE2 Jan 13 23:00:50.074276: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 23:00:50.074296: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:00:50.074310: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 23:00:50.074322: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:00:50.074369: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 23:00:50.074380: | found "L2TP-PSK-common" Jan 13 23:00:50.074390: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 23:00:50.074399: | found "L2TP-PSK-noNAT" Jan 13 23:00:50.074408: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 23:00:50.074416: | found "L2TP-PSK-NAT" Jan 13 23:00:50.074425: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 23:00:50.074434: | found "MYCONN-ikev2-cp" Jan 13 23:00:50.074444: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 23:00:50.074458: | matches: 6 Jan 13 23:00:50.074485: | spent 0.204 (0.203) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 23:00:50.074508: | processing global timer EVENT_PENDING_DDNS Jan 13 23:00:50.074523: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:00:50.074536: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:00:50.074550: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:00:50.074570: | found "L2TP-PSK-common" Jan 13 23:00:50.074584: | found "L2TP-PSK-noNAT" Jan 13 23:00:50.074593: | found "L2TP-PSK-NAT" Jan 13 23:00:50.074607: | found "MYCONN-ikev2-cp" Jan 13 23:00:50.074622: | matches: 6 Jan 13 23:00:50.074637: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:00:50.074680: | spent 0.153 (0.154) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:00:50.074694: | spent 0.17 (0.17) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:00:50.074705: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:00:50.074717: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:00:50.074738: | spent 0.0186 (0.0185) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:00:50.074757: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:00:50.074777: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:00:50.074869: | spent 0.0862 (0.0868) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 23:00:51.546915: | spent 0.0066 (0.00659) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:00:51.546990: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:00:51.547007: | addref struct iface_endpoint@0x55c83801f058(3->4) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:00:51.547018: | newref alloc logger@0x55c838043798(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:00:51.547044: | *received 352 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:00:51.547058: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:00:51.547075: | 2e 20 24 08 00 00 00 02 00 00 01 60 29 00 01 44 . $........`)..D Jan 13 23:00:51.547106: | d4 d6 29 38 4c 6f c3 53 84 86 11 ff 01 a0 0d b5 ..)8Lo.S........ Jan 13 23:00:51.547122: | 75 28 7e 4c 3c 76 53 0f 66 e8 98 6a fb 75 23 6b u(~Li.0....9.C..q.. Jan 13 23:00:51.547171: | 42 1e 7b 2a ca cc 89 43 03 4f bf c9 73 56 79 a8 B.{*...C.O..sVy. Jan 13 23:00:51.547189: | 90 5d be 16 29 d2 d6 24 0b 1e 06 6d 9b b7 53 03 .]..)..$...m..S. Jan 13 23:00:51.547207: | 08 5f b4 42 4a c2 65 cf 04 05 19 35 37 dd 90 fe ._.BJ.e....57... Jan 13 23:00:51.547222: | 9c e0 60 f2 35 f6 6d 1b c3 fc 2a 98 8f 2d 50 18 ..`.5.m...*..-P. Jan 13 23:00:51.547239: | fe e0 a9 8d 0b 25 c2 7c ce e2 fe 81 fe c5 4f 10 .....%.|......O. Jan 13 23:00:51.547256: | 57 a2 b6 00 b6 19 6d 0b af 29 2b fe 84 62 4b 5c W.....m..)+..bK\ Jan 13 23:00:51.547274: | a4 18 cb c3 81 4a 45 82 76 10 f8 da 6a c4 8a b0 .....JE.v...j... Jan 13 23:00:51.547292: | c9 1b 7f 9d 08 6f 51 2f 73 40 61 be 66 19 78 e5 .....oQ/s@a.f.x. Jan 13 23:00:51.547335: | e7 97 63 ae cb a0 c7 bc 9c ed ac 28 82 d0 22 89 ..c........(..". Jan 13 23:00:51.547348: | 16 46 65 cc f8 2e 12 3d a7 eb a2 10 8e fa b6 02 .Fe....=........ Jan 13 23:00:51.547365: | ce de 8a 49 22 97 a5 ed d1 d4 b8 69 e7 3b 03 af ...I"......i.;.. Jan 13 23:00:51.547384: | a9 18 d1 0b 31 3e 87 17 13 66 54 1b 4c c4 9b d9 ....1>...fT.L... Jan 13 23:00:51.547401: | d1 b6 85 8c 58 58 f1 f1 74 39 6b ab 17 78 ab cd ....XX..t9k..x.. Jan 13 23:00:51.547419: | f8 7a 50 44 35 c3 f5 af 08 51 01 55 5f 2d ac cb .zPD5....Q.U_-.. Jan 13 23:00:51.547437: | 55 de 3b 1c 60 c0 b7 8b 0e e8 a7 2d ca bd fd f8 U.;.`......-.... Jan 13 23:00:51.547455: | ab 10 56 af da a5 63 7d 90 02 3b 89 26 67 88 57 ..V...c}..;.&g.W Jan 13 23:00:51.547477: | **parse ISAKMP Message: Jan 13 23:00:51.547502: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:00:51.547527: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:00:51.547546: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:00:51.547565: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:00:51.547583: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:00:51.547599: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:00:51.547622: | Message ID: 2 (00 00 00 02) Jan 13 23:00:51.547645: | length: 352 (00 00 01 60) Jan 13 23:00:51.547665: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Jan 13 23:00:51.547686: | I am the IKE SA Original Responder receiving an IKEv2 CREATE_CHILD_SA request Jan 13 23:00:51.547724: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:00:51.547749: | #41 st.st_msgid_lastrecv 1 md.hdr.isa_msgid 00000002 Jan 13 23:00:51.547783: | Message ID: IKE #41 not a duplicate - message request 2 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=1 .recv=1 .recv_frags=6 .last_contact=9594096.911424 ike.wip.initiator=-1 Jan 13 23:00:51.547802: | unpacking clear payload Jan 13 23:00:51.547819: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:00:51.547839: | ***parse IKEv2 Encryption Payload: Jan 13 23:00:51.547858: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:00:51.547875: | flags: none (0x0) Jan 13 23:00:51.547896: | length: 324 (01 44) Jan 13 23:00:51.547912: | processing payload: ISAKMP_NEXT_v2SK (len=320) Jan 13 23:00:51.547944: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK (ignoring secured payloads) Jan 13 23:00:51.547963: | trying: Informational Request (liveness probe) Jan 13 23:00:51.547979: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.547997: | trying: Informational Response (liveness probe) Jan 13 23:00:51.548015: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.548031: | trying: Informational Request Jan 13 23:00:51.548049: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.548066: | trying: Informational Response Jan 13 23:00:51.548080: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.548096: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:00:51.548111: | matching by ignoring secured payloads Jan 13 23:00:51.548185: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.548243: | auth: delref clone-key@0x55c838026d80 Jan 13 23:00:51.548302: | authenticator matched Jan 13 23:00:51.548387: | stripping 16 octets as pad Jan 13 23:00:51.548412: | #41 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success Jan 13 23:00:51.548430: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:00:51.548450: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:00:51.548478: | **parse IKEv2 Notify Payload: Jan 13 23:00:51.548496: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:00:51.548512: | flags: none (0x0) Jan 13 23:00:51.548550: | length: 12 (00 0c) Jan 13 23:00:51.548571: | Protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:00:51.548591: | SPI size: 4 (04) Jan 13 23:00:51.548609: | Notify Message Type: v2N_REKEY_SA (0x4009) Jan 13 23:00:51.548626: | processing payload: ISAKMP_NEXT_v2N (len=4) Jan 13 23:00:51.548646: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:00:51.548664: | **parse IKEv2 Security Association Payload: Jan 13 23:00:51.548682: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 23:00:51.548698: | flags: none (0x0) Jan 13 23:00:51.548717: | length: 80 (00 50) Jan 13 23:00:51.548733: | processing payload: ISAKMP_NEXT_v2SA (len=76) Jan 13 23:00:51.548751: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 23:00:51.548769: | **parse IKEv2 Nonce Payload: Jan 13 23:00:51.548783: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Jan 13 23:00:51.548802: | flags: none (0x0) Jan 13 23:00:51.548829: | length: 52 (00 34) Jan 13 23:00:51.548848: | processing payload: ISAKMP_NEXT_v2Ni (len=48) Jan 13 23:00:51.548865: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Jan 13 23:00:51.548884: | **parse IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:00:51.548901: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Jan 13 23:00:51.548919: | flags: none (0x0) Jan 13 23:00:51.548940: | length: 64 (00 40) Jan 13 23:00:51.548958: | number of TS: 2 (02) Jan 13 23:00:51.548978: | processing payload: ISAKMP_NEXT_v2TSi (len=56) Jan 13 23:00:51.548997: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Jan 13 23:00:51.549016: | **parse IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:00:51.549034: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.549052: | flags: none (0x0) Jan 13 23:00:51.549115: | length: 64 (00 40) Jan 13 23:00:51.549137: | number of TS: 2 (02) Jan 13 23:00:51.549156: | processing payload: ISAKMP_NEXT_v2TSr (len=56) Jan 13 23:00:51.549179: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK{N,SA,Ni,TSi,TSr} Jan 13 23:00:51.549198: | trying: Informational Request (liveness probe) Jan 13 23:00:51.549214: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.549231: | trying: Informational Response (liveness probe) Jan 13 23:00:51.549247: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.549263: | trying: Informational Request Jan 13 23:00:51.549279: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.549295: | trying: Informational Response Jan 13 23:00:51.549344: | exchange type does not match INFORMATIONAL Jan 13 23:00:51.549362: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:00:51.549373: | secured payloads do not match Jan 13 23:00:51.549390: | trying: process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:00:51.549408: | secured message matched Jan 13 23:00:51.549425: | selected state microcode process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:00:51.549453: | #41 updating local interface from 161.53.235.3:4500 to 161.53.235.3:4500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:00:51.549473: | delref struct iface_endpoint@0x55c83801f058(4->3) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:00:51.549493: | addref struct iface_endpoint@0x55c83801f058(3->4) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:00:51.549516: | #41.st_v2_transition PARENT_R1->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:00:51.549575: | Message ID: IKE #41 responder starting message request 2: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=1 .recv=1 .recv_frags=6 .recv_wip=2 .last_contact=9594096.911424 ike.wip.initiator=-1 Jan 13 23:00:51.549597: | calling processor process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:00:51.549618: | #41 spent 2.72 (2.72) milliseconds Jan 13 23:00:51.549636: | CREATE_CHILD_SA IPsec SA rekey Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:00:51.549671: | parsing 4 raw bytes of IKEv2 Notify Payload into SPI Jan 13 23:00:51.549690: | SPI Jan 13 23:00:51.549709: | c9 35 b8 fa .5.. Jan 13 23:00:51.549726: | CREATE_CHILD_S to rekey IPsec SA(0xc935b8fa) Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:00:51.549745: | v2 CHILD SA #42 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:00:51.549764: | State DB: found IKEv2 state #42 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:00:51.549788: | #41 hasa a rekey request for "MYCONN-ikev2-cp"[2] 94.253.210.164 #42 TSi TSr Jan 13 23:00:51.549825: | newref alloc logger@0x55c83801a228(0->1) (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:00:51.549848: | addref fd@NULL (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:00:51.549876: | entry state hash_table_entries.serialno@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 initialized Jan 13 23:00:51.549895: | entry state hash_table_entries.connection_serialno@0x55c838020928 $9 initialized Jan 13 23:00:51.549921: | entry state hash_table_entries.reqid@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: reqid=0 initialized Jan 13 23:00:51.549953: | entry state hash_table_entries.ike_initiator_spi@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: 00 00 00 00 00 00 00 00 initialized Jan 13 23:00:51.549990: | entry state hash_table_entries.ike_spis@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:00:51.550010: | creating state object #43 at 0x55c838020928 Jan 13 23:00:51.550042: | entry state hash_table_entries.serialno@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 added to hash table bucket 0x55c836588b60 Jan 13 23:00:51.550067: | entry state hash_table_entries.connection_serialno@0x55c838020928 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:00:51.550097: | entry state hash_table_entries.reqid@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:00:51.550132: | entry state hash_table_entries.ike_initiator_spi@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: 8d 77 44 17 30 6b 26 bc added to hash table bucket 0x55c83657eca0 Jan 13 23:00:51.550172: | entry state hash_table_entries.ike_spis@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e added to hash table bucket 0x55c83657b6e0 Jan 13 23:00:51.550195: | pstats #43 ikev2.child started Jan 13 23:00:51.550219: | duplicating state object #41 "MYCONN-ikev2-cp"[2] 94.253.210.164 as #43 for IPSEC SA Jan 13 23:00:51.550243: | #43 setting local endpoint to 161.53.235.3:4500 from #41.st_localport (duplicate_state() +1567 programs/pluto/state.c) Jan 13 23:00:51.550264: | addref struct iface_endpoint@0x55c83801f058(4->5) (duplicate_state() +1569 programs/pluto/state.c) Jan 13 23:00:51.550283: | duplicate_state: addref st_skeyid_nss-key@NULL Jan 13 23:00:51.550301: | duplicate_state: addref st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:00:51.550319: | duplicate_state: addref st_skey_ai_nss-key@0x55c838005890 Jan 13 23:00:51.550341: | duplicate_state: addref st_skey_ar_nss-key@0x55c838002520 Jan 13 23:00:51.550361: | duplicate_state: addref st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:00:51.550378: | duplicate_state: addref st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:00:51.550395: | duplicate_state: addref st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:00:51.550412: | duplicate_state: addref st_skey_pr_nss-key@0x55c838013660 Jan 13 23:00:51.550429: | duplicate_state: addref st_enc_key_nss-key@NULL Jan 13 23:00:51.550460: | Message ID: CHILD #41.#43 initializing (CHILD SA): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=1 .recv=1 .recv_frags=6 .recv_wip=2 .last_contact=9594096.911424 child.wip.initiator=0->-1 Jan 13 23:00:51.550481: | child state #43: UNDEFINED(ignore) => REKEY_CHILD_R0(established IKE SA) Jan 13 23:00:51.550515: | #43.st_v2_transition NULL -> NULL (new_v2_child_state() +1645 programs/pluto/state.c) Jan 13 23:00:51.550559: | rekeying Child SA with PFS1:ESP=AES_CBC_256-HMAC_SHA1_96-MODP2048-DISABLED 2:ESP=AES_CBC_256-HMAC_SHA1_96-NONE-DISABLED Jan 13 23:00:51.550582: | TSi: parsing 2 traffic selectors Jan 13 23:00:51.550601: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:00:51.550621: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:00:51.550638: | IP Protocol ID: ALL (0x0) Jan 13 23:00:51.550658: | length: 16 (00 10) Jan 13 23:00:51.550675: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:00:51.550694: | start port: 0 (00 00) Jan 13 23:00:51.550714: | end port: 65535 (ff ff) Jan 13 23:00:51.550734: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:00:51.550751: | TS IP start Jan 13 23:00:51.550770: | 00 00 00 00 .... Jan 13 23:00:51.550788: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:00:51.550805: | TS IP end Jan 13 23:00:51.550820: | ff ff ff ff .... Jan 13 23:00:51.550846: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:00:51.550866: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:00:51.550883: | IP Protocol ID: ALL (0x0) Jan 13 23:00:51.550904: | length: 40 (00 28) Jan 13 23:00:51.550920: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:00:51.550940: | start port: 0 (00 00) Jan 13 23:00:51.550961: | end port: 65535 (ff ff) Jan 13 23:00:51.550979: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:00:51.550995: | TS IP start Jan 13 23:00:51.551014: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:00:51.551030: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:00:51.551047: | TS IP end Jan 13 23:00:51.551066: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:00:51.551087: | TSi: parsed 2 traffic selectors Jan 13 23:00:51.551105: | TSr: parsing 2 traffic selectors Jan 13 23:00:51.551123: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:00:51.551141: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:00:51.551158: | IP Protocol ID: ALL (0x0) Jan 13 23:00:51.551179: | length: 16 (00 10) Jan 13 23:00:51.551196: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:00:51.551214: | start port: 0 (00 00) Jan 13 23:00:51.551234: | end port: 65535 (ff ff) Jan 13 23:00:51.551252: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:00:51.551268: | TS IP start Jan 13 23:00:51.551282: | 00 00 00 00 .... Jan 13 23:00:51.551299: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:00:51.551319: | TS IP end Jan 13 23:00:51.551338: | ff ff ff ff .... Jan 13 23:00:51.551359: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:00:51.551377: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:00:51.551393: | IP Protocol ID: ALL (0x0) Jan 13 23:00:51.551413: | length: 40 (00 28) Jan 13 23:00:51.551431: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:00:51.551448: | start port: 0 (00 00) Jan 13 23:00:51.551467: | end port: 65535 (ff ff) Jan 13 23:00:51.551486: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:00:51.551504: | TS IP start Jan 13 23:00:51.551522: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:00:51.551536: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:00:51.551553: | TS IP end Jan 13 23:00:51.551570: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:00:51.551591: | TSr: parsed 2 traffic selectors Jan 13 23:00:51.551628: | evaluating local "MYCONN-ikev2-cp"[2] 94.253.210.164 $9 I=192.168.101.10/32:0/0 R=0.0.0.0/0:0/0 fit <= to remote: Jan 13 23:00:51.551666: | TSi[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:00:51.551699: | match address end->client=192.168.101.10/32 <= TSi[0]net=0.0.0.0-255.255.255.255: YES fitness 64 Jan 13 23:00:51.551720: | narrow port end=0..65535 <= TSi[0]=0..65535: 0 Jan 13 23:00:51.551740: | TSi[0] port match: YES fitness 65536 Jan 13 23:00:51.551760: | narrow protocol end=*0 <= TSi[0]=*0: 0 Jan 13 23:00:51.551778: | match end->client.ipproto=*0 <= TSi[0].ipprotoid=*0: YES fitness 255 Jan 13 23:00:51.551802: | TSr[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:00:51.551835: | match address end->client=0.0.0.0/0 <= TSr[0]net=0.0.0.0-255.255.255.255: YES fitness 32 Jan 13 23:00:51.551854: | narrow port end=0..65535 <= TSr[0]=0..65535: 0 Jan 13 23:00:51.551872: | TSr[0] port match: YES fitness 65536 Jan 13 23:00:51.551891: | narrow protocol end=*0 <= TSr[0]=*0: 0 Jan 13 23:00:51.551909: | match end->client.ipproto=*0 <= TSr[0].ipprotoid=*0: YES fitness 255 Jan 13 23:00:51.551926: | best fit so far: TSi[0] TSr[0] Jan 13 23:00:51.551953: | TSr[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:00:51.551982: | match address end->client=0.0.0.0/0 <= TSr[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:00:51.552009: | TSi[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:00:51.552040: | match address end->client=192.168.101.10/32 <= TSi[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:00:51.552066: | comparing remote proposals against CREATE_CHILD_SA request 2 local proposals Jan 13 23:00:51.552090: | local proposal 1 type ENCR has 1 transforms Jan 13 23:00:51.552111: | local proposal 1 type PRF has 0 transforms Jan 13 23:00:51.552130: | local proposal 1 type INTEG has 1 transforms Jan 13 23:00:51.552148: | local proposal 1 type DH has 1 transforms Jan 13 23:00:51.552167: | local proposal 1 type ESN has 1 transforms Jan 13 23:00:51.552188: | local proposal 1 transforms: required: ENCR+INTEG+DH+ESN; optional: none Jan 13 23:00:51.552206: | local proposal 2 type ENCR has 1 transforms Jan 13 23:00:51.552223: | local proposal 2 type PRF has 0 transforms Jan 13 23:00:51.552241: | local proposal 2 type INTEG has 1 transforms Jan 13 23:00:51.552259: | local proposal 2 type DH has 1 transforms Jan 13 23:00:51.552276: | local proposal 2 type ESN has 1 transforms Jan 13 23:00:51.552296: | local proposal 2 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:00:51.552329: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:00:51.552350: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:00:51.552371: | length: 40 (00 28) Jan 13 23:00:51.552391: | prop #: 1 (01) Jan 13 23:00:51.552408: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:00:51.552427: | spi size: 4 (04) Jan 13 23:00:51.552446: | # transforms: 3 (03) Jan 13 23:00:51.552466: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:00:51.552483: | remote SPI Jan 13 23:00:51.552499: | 24 9f 0e 74 $..t Jan 13 23:00:51.552519: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..2] of 2 local proposals Jan 13 23:00:51.552539: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:00:51.552558: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.552578: | length: 12 (00 0c) Jan 13 23:00:51.552595: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:00:51.552613: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:00:51.552631: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:00:51.552649: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:00:51.552667: | length/value: 256 (01 00) Jan 13 23:00:51.552693: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:00:51.552729: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:00:51.552750: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:00:51.552768: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.552787: | length: 8 (00 08) Jan 13 23:00:51.552804: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:00:51.552817: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:00:51.552840: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:00:51.552863: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 2 type 3 (INTEG) transform 0 Jan 13 23:00:51.552883: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:00:51.552898: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:00:51.552919: | length: 8 (00 08) Jan 13 23:00:51.552938: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:00:51.552956: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:00:51.552978: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:00:51.552998: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 0 Jan 13 23:00:51.553021: | remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none Jan 13 23:00:51.553045: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+INTEG+DH+ESN; optional: none; matched: ENCR+INTEG+ESN Jan 13 23:00:51.553065: | remote proposal 1 does not match local proposal 1; unmatched transforms: none; missing transforms: DH Jan 13 23:00:51.553088: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 2; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN Jan 13 23:00:51.553106: | remote proposal 1 matches local proposal 2 Jan 13 23:00:51.553126: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:00:51.553145: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:00:51.553162: | length: 36 (00 24) Jan 13 23:00:51.553182: | prop #: 2 (02) Jan 13 23:00:51.553200: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:00:51.553218: | spi size: 4 (04) Jan 13 23:00:51.553236: | # transforms: 3 (03) Jan 13 23:00:51.553253: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:00:51.553269: | remote SPI Jan 13 23:00:51.553284: | 24 9f 0e 74 $..t Jan 13 23:00:51.553304: | Comparing remote proposal 2 containing 3 transforms against local proposal [1..1] of 2 local proposals Jan 13 23:00:51.553322: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:00:51.553341: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.553358: | length: 8 (00 08) Jan 13 23:00:51.553377: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:00:51.553396: | IKEv2 transform ID: 3DES (0x3) Jan 13 23:00:51.553416: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:00:51.553433: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.553453: | length: 8 (00 08) Jan 13 23:00:51.553470: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:00:51.553487: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:00:51.553510: | remote proposal 2 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:00:51.553527: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:00:51.553543: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:00:51.553563: | length: 8 (00 08) Jan 13 23:00:51.553581: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:00:51.553599: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:00:51.553620: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:00:51.553641: | remote proposal 2 proposed transforms: ENCR+INTEG+ESN; matched: INTEG+ESN; unmatched: ENCR Jan 13 23:00:51.553657: | remote proposal 2 does not match; unmatched remote transforms: ENCR Jan 13 23:00:51.553703: "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: proposal 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=249f0e74 chosen from remote proposals 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;ESN=DISABLED[first-match] 2:ESP:ENCR=3DES;INTEG=HMAC_SHA1_96;ESN=DISABLED Jan 13 23:00:51.553732: | CREATE_CHILD_SA request ikev2_proposal: 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=249f0e74 Jan 13 23:00:51.553750: | converting proposal to internal trans attrs Jan 13 23:00:51.553789: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:00:51.553809: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:00:51.553831: | newref clone logger@0x55c838021e98(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:00:51.553851: | job 54 helper 0 #41 Child Rekey Responder KE and nonce nr (dh): added to pending queue Jan 13 23:00:51.553870: | #41 STATE_V2_ESTABLISHED_IKE_SA: retransmits: cleared Jan 13 23:00:51.553896: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c83804f078 timeout in 60 seconds for #41 Jan 13 23:00:51.553923: | newref tt@0x55c838034f58(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:00:51.553961: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 23:00:51.553991: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:00:51.554014: | addref struct msg_digest@0x55c838050b08(2->3) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:00:51.554018: | job 54 helper 10 #41 Child Rekey Responder KE and nonce nr (dh): started Jan 13 23:00:51.554039: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 23:00:51.554111: | job 54 helper 10 #41 Child Rekey Responder KE and nonce nr (dh): finished Jan 13 23:00:51.554121: | #41 spent 4.46 (4.5) milliseconds in processing: process rekey Child SA request (CREATE_CHILD_SA) in v2_dispatch() Jan 13 23:00:51.554143: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.123 (0.127) milliseconds in job 54 helper 10 #41 Child Rekey Responder KE and nonce nr (dh) Jan 13 23:00:51.554164: | delref struct msg_digest@0x55c838050b08(3->2) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:00:51.554186: | scheduling resume sending job back to main thread for #41 Jan 13 23:00:51.554214: | #41 spent 7.27 (7.32) milliseconds in ikev2_process_packet() Jan 13 23:00:51.554233: | newref tt@0x7ff898000b48(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:00:51.554236: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:00:51.554259: | helper 10: waiting for work Jan 13 23:00:51.554286: | spent 7.34 (7.39) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:00:51.554343: | processing resume sending job back to main thread for #41 Jan 13 23:00:51.554370: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:00:51.554390: | job 54 helper 10 #41 Child Rekey Responder KE and nonce nr (dh): calling state's callback function Jan 13 23:00:51.554409: | process_v2_CREATE_CHILD_SA_request_continue_1() for #43 STATE_V2_REKEY_CHILD_R0 Jan 13 23:00:51.554438: | xfrm: sendrecv_xfrm_msg() sending 22 Jan 13 23:00:51.554500: | kernel: netlink_get_spi: allocated 0x3e9fc2e6 for esp.0@161.53.235.3 Jan 13 23:00:51.554526: | kernel: allocated incoming spi 94.253.210.164 -> esp.3e9fc2e6@161.53.235.3 in tunnel-mode Jan 13 23:00:51.554544: | integ=HMAC_SHA1_96: .key_size=20 encrypt=AES_CBC: .key_size=32 .salt_size=0 keymat_len=52 Jan 13 23:00:51.554641: | result: newref data=Ni-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.554680: | result: newref data=Ni-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.554719: | data=Ni: delref tmp-key@0x55c838012940 Jan 13 23:00:51.554771: | result: newref data+=Nr-key@0x55c838012940 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.554793: | append_symkey_bytes: delref lhs-key@0x55c838026d80 Jan 13 23:00:51.554837: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.554874: | prf+0: delref clone-key@0x55c838026d80 Jan 13 23:00:51.554942: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.555000: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.555097: | result: newref final-key@0x55c83801c850 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.555134: | result: newref final-key@0x55c838026d80 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.555154: | final: delref tmp-key@0x55c83801c850 Jan 13 23:00:51.555178: | prfplus: addref old_t[1]-key@0x55c838026d80 Jan 13 23:00:51.555221: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.555255: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:00:51.555307: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.555358: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.555407: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.555456: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.555550: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.555585: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.555606: | final: delref tmp-key@0x55c838041fd0 Jan 13 23:00:51.555656: | result: newref result-key@0x55c838041fd0 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.555678: | append_symkey_symkey: delref lhs-key@0x55c838026d80 Jan 13 23:00:51.555691: | prfplus: delref old_t[N]-key@0x55c838026d80 Jan 13 23:00:51.555737: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.555769: | prf+N: delref clone-key@0x55c838026d80 Jan 13 23:00:51.555826: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.555868: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.555915: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.555958: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.556052: | result: newref final-key@0x55c8380199c0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.556087: | result: newref final-key@0x55c838026d80 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.556108: | final: delref tmp-key@0x55c8380199c0 Jan 13 23:00:51.556160: | result: newref result-key@0x55c8380199c0 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.556182: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 23:00:51.556200: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 23:00:51.556245: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.556281: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:00:51.556353: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.556401: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.556469: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.556512: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.556662: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.556704: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.556725: | final: delref tmp-key@0x55c838041fd0 Jan 13 23:00:51.556782: | result: newref result-key@0x55c838041fd0 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:00:51.556805: | append_symkey_symkey: delref lhs-key@0x55c8380199c0 Jan 13 23:00:51.556822: | prfplus: delref old_t[N]-key@0x55c838026d80 Jan 13 23:00:51.556886: | prfplus: delref old_t[final]-key@0x55c83801c850 Jan 13 23:00:51.556913: | child_sa_keymat: delref data-key@0x55c838012940 Jan 13 23:00:51.556961: | result: newref initiator to responder key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +125 programs/pluto/ikev2_crypto.c) Jan 13 23:00:51.557008: | initiator to responder keys: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.557054: | initiator to responder keys: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.557092: | ikev2_derive_child_keys: delref ikey-key@0x55c838012940 Jan 13 23:00:51.557143: | result: newref responder to initiator key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +133 programs/pluto/ikev2_crypto.c) Jan 13 23:00:51.557183: | responder to initiator keys:: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:00:51.557233: | responder to initiator keys:: delref slot-key-key@0x55c838003da0 Jan 13 23:00:51.557260: | ikev2_derive_child_keys: delref rkey-key@0x55c838012940 Jan 13 23:00:51.557284: | ikev2_derive_child_keys: delref keymat-key@0x55c838041fd0 Jan 13 23:00:51.557309: | kernel: install_ipsec_sa() for #43: inbound and outbound Jan 13 23:00:51.557334: | kernel: could_route called for MYCONN-ikev2-cp; kind=CK_INSTANCE that.has_client=yes oppo=no this.host_port=500 sec_label= Jan 13 23:00:51.557362: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:00:51.557398: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:00:51.557418: | matches: 1 Jan 13 23:00:51.557446: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:00:51.557476: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:00:51.557512: | kernel: setup_half_ipsec_sa() outbound 0.0.0.0/0-ALL->[161.53.235.3=IPv4=>94.253.210.164]-ALL->192.168.101.10/32 sec_label= Jan 13 23:00:51.557534: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:00:51.557553: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:00:51.557574: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:00:51.557592: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:00:51.557609: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:00:51.557634: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:00:51.557673: | kernel: add_sa() 0 outbound tunnel 0.0.0.0/0-ALL->161.53.235.3=ESP=249f0e74=espinudp=>94.253.210.164-ALL->192.168.101.10/32 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:00:51.557694: | xfrm: enabling tunnel mode Jan 13 23:00:51.557713: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:00:51.557732: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:00:51.557752: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:00:51.557786: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:00:51.557811: | xfrm: sendrecv_xfrm_msg() sending 16 Jan 13 23:00:51.557948: | netlink response for Add SA esp.249f0e74@94.253.210.164 included non-error error Jan 13 23:00:51.557973: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=0 owner=#42 tunnel Jan 13 23:00:51.557984: | kernel: set up outgoing SA Jan 13 23:00:51.558010: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:00:51.558044: | kernel: setup_half_ipsec_sa() inbound 192.168.101.10/32-ALL->[94.253.210.164=IPv4=>161.53.235.3]-ALL->0.0.0.0/0 sec_label= Jan 13 23:00:51.558064: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:00:51.558085: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:00:51.558104: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:00:51.558120: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:00:51.558138: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:00:51.558161: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:00:51.558197: | kernel: add_sa() 0 inbound tunnel 192.168.101.10/32-ALL->94.253.210.164=ESP=3e9fc2e6=espinudp=>161.53.235.3-ALL->0.0.0.0/0 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:00:51.558219: | xfrm: enabling tunnel mode Jan 13 23:00:51.558238: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:00:51.558259: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:00:51.558292: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:00:51.558304: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:00:51.558316: | xfrm: sendrecv_xfrm_msg() sending 26 Jan 13 23:00:51.558405: | netlink response for Add SA esp.3e9fc2e6@161.53.235.3 included non-error error Jan 13 23:00:51.558418: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=1 owner=#42 tunnel Jan 13 23:00:51.558423: | kernel: set up incoming SA Jan 13 23:00:51.558430: | kernel: sr for #43: erouted Jan 13 23:00:51.558445: | kernel: route_and_eroute() for 0.0.0.0/0 --> 192.168.101.10/32; proto 0, and source port 0 dest port 0 sec_label Jan 13 23:00:51.558457: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:00:51.558475: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:00:51.558484: | matches: 1 Jan 13 23:00:51.558495: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:00:51.558505: | kernel: route_and_eroute with c: MYCONN-ikev2-cp (next: none) ero:MYCONN-ikev2-cp esr:{(nil)} ro:MYCONN-ikev2-cp rosr:{(nil)} and state: #43 Jan 13 23:00:51.558514: | kernel: we are replacing an eroute Jan 13 23:00:51.558528: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:00:51.558542: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:00:51.558572: | kernel: raw_policy() REPLACE_OUTBOUND THIS_IS_NOT_INBOUND eroute_connection() sag_eroute() route_and_eroute() replace sag 0.0.0.0/0-ALL-161.53.235.3==94.253.210.164-ALL-192.168.101.10/32 shunt_policy=UNSET encap=tunnel,161.53.235.3=>94.253.210.164,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:00:51.558582: | xfrm_raw_policy() policy=IPv4/3 dir=1 Jan 13 23:00:51.558589: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:00:51.558599: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 23:00:51.558635: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=161.53.235.3 id.daddr=94.253.210.164 Jan 13 23:00:51.558647: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 23:00:51.558682: | kernel: policy: result=success Jan 13 23:00:51.558693: | kernel: route_and_eroute: firewall_notified: true Jan 13 23:00:51.558702: | kernel: route_and_eroute: instance "MYCONN-ikev2-cp"[2] 94.253.210.164, setting eroute_owner {spd=0x55c83803cdc8,sr=0x55c83803cdc8} to #43 (was #42) (newest_ipsec_sa=#42) Jan 13 23:00:51.558713: | ISAKMP_v2_CREATE_CHILD_SA: instance MYCONN-ikev2-cp[2], setting IKEv2 newest_ipsec_sa to #43 (was #42) (spd.eroute=#43) cloned from #41 Jan 13 23:00:51.558752: | opening output PBS CREATE_CHILD_SA message Jan 13 23:00:51.558761: | **emit ISAKMP Message: Jan 13 23:00:51.558770: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:00:51.558781: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:00:51.558791: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:00:51.558799: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:00:51.558808: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:00:51.558817: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:00:51.558827: | Message ID: 2 (00 00 00 02) Jan 13 23:00:51.558836: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:00:51.558846: | ***emit IKEv2 Encryption Payload: Jan 13 23:00:51.558860: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.558871: | flags: none (0x0) Jan 13 23:00:51.558881: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:00:51.558890: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:00:51.558900: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:00:51.558918: | emitting ikev2_proposal ... Jan 13 23:00:51.558928: | ****emit IKEv2 Security Association Payload: Jan 13 23:00:51.558939: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.558948: | flags: none (0x0) Jan 13 23:00:51.558958: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 23:00:51.558966: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:00:51.558977: | *****emit IKEv2 Proposal Substructure Payload: Jan 13 23:00:51.558986: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:00:51.558996: | prop #: 1 (01) Jan 13 23:00:51.559005: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:00:51.559014: | spi size: 4 (04) Jan 13 23:00:51.559024: | # transforms: 3 (03) Jan 13 23:00:51.559032: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 23:00:51.559042: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Jan 13 23:00:51.559052: | our spi: 3e 9f c2 e6 Jan 13 23:00:51.559062: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:00:51.559072: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.559080: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:00:51.559090: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:00:51.559099: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:00:51.559108: | *******emit IKEv2 Attribute Substructure Payload: Jan 13 23:00:51.559118: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:00:51.559128: | length/value: 256 (01 00) Jan 13 23:00:51.559139: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 23:00:51.559148: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:00:51.559157: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.559165: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:00:51.559173: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:00:51.559183: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.559199: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:00:51.559210: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:00:51.559220: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:00:51.559229: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:00:51.559238: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:00:51.559246: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:00:51.559255: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:00:51.559263: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:00:51.559273: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:00:51.559281: | emitting length of IKEv2 Proposal Substructure Payload: 40 Jan 13 23:00:51.559291: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 23:00:51.559299: | emitting length of IKEv2 Security Association Payload: 44 Jan 13 23:00:51.559306: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 23:00:51.559315: | ****emit IKEv2 Nonce Payload: Jan 13 23:00:51.559325: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.559334: | flags: none (0x0) Jan 13 23:00:51.559344: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Jan 13 23:00:51.559353: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:00:51.559363: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Jan 13 23:00:51.559371: | IKEv2 nonce: Jan 13 23:00:51.559378: | c9 c0 b4 ba e7 58 4f 65 48 8c 04 52 6c 11 5a 6d .....XOeH..Rl.Zm Jan 13 23:00:51.559387: | 22 62 df 86 2a 91 f6 7f 1e c4 66 70 85 14 b8 4e "b..*.....fp...N Jan 13 23:00:51.559398: | emitting length of IKEv2 Nonce Payload: 36 Jan 13 23:00:51.559408: | that TSi TS Jan 13 23:00:51.559416: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:00:51.559424: | ipprotoid: 0 Jan 13 23:00:51.559432: | port range: 0-65535 Jan 13 23:00:51.559444: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:00:51.559452: | sec_label: Jan 13 23:00:51.559460: | this TSr TS Jan 13 23:00:51.559469: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:00:51.559478: | ipprotoid: 0 Jan 13 23:00:51.559486: | port range: 0-65535 Jan 13 23:00:51.559497: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:00:51.559506: | sec_label: Jan 13 23:00:51.559516: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:00:51.559525: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.559535: | flags: none (0x0) Jan 13 23:00:51.559544: | number of TS: 1 (01) Jan 13 23:00:51.559553: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Jan 13 23:00:51.559562: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:00:51.559571: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:00:51.559580: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:00:51.559589: | IP Protocol ID: ALL (0x0) Jan 13 23:00:51.559598: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:00:51.559608: | start port: 0 (00 00) Jan 13 23:00:51.559618: | end port: 65535 (ff ff) Jan 13 23:00:51.559628: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:00:51.559646: | IP start: c0 a8 65 0a Jan 13 23:00:51.559657: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:00:51.559667: | IP end: c0 a8 65 0a Jan 13 23:00:51.559675: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:00:51.559684: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Jan 13 23:00:51.559692: | ****emit IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:00:51.559701: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.559711: | flags: none (0x0) Jan 13 23:00:51.559720: | number of TS: 1 (01) Jan 13 23:00:51.559730: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Jan 13 23:00:51.559738: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:00:51.559747: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:00:51.559756: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:00:51.559765: | IP Protocol ID: ALL (0x0) Jan 13 23:00:51.559773: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:00:51.559782: | start port: 0 (00 00) Jan 13 23:00:51.559791: | end port: 65535 (ff ff) Jan 13 23:00:51.559800: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:00:51.559810: | IP start: 00 00 00 00 Jan 13 23:00:51.559820: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:00:51.559831: | IP end: ff ff ff ff Jan 13 23:00:51.559839: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:00:51.559848: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Jan 13 23:00:51.559858: | adding 16 bytes of padding (including 1 byte padding-length) Jan 13 23:00:51.559867: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559877: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559885: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559894: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559904: | emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559912: | emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559921: | emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559931: | emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559940: | emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559949: | emitting 1 0x09 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559958: | emitting 1 0x0a repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559966: | emitting 1 0x0b repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559975: | emitting 1 0x0c repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559984: | emitting 1 0x0d repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.559993: | emitting 1 0x0e repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.560002: | emitting 1 0x0f repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.560010: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:00:51.560019: | emitting length of IKEv2 Encryption Payload: 180 Jan 13 23:00:51.560025: | emitting length of ISAKMP Message: 208 Jan 13 23:00:51.560062: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.560079: | integ: delref clone-key@0x55c838041fd0 Jan 13 23:00:51.560117: | child state #43: REKEY_CHILD_R0(established IKE SA) => ESTABLISHED_CHILD_SA(established CHILD SA) Jan 13 23:00:51.560128: | pstats #43 ikev2.child established Jan 13 23:00:51.560140: | this TS Jan 13 23:00:51.560149: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:00:51.560158: | ipprotoid: 0 Jan 13 23:00:51.560164: | port range: 0-65535 Jan 13 23:00:51.560175: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:00:51.560183: | sec_label: Jan 13 23:00:51.560191: | that TS Jan 13 23:00:51.560200: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:00:51.560209: | ipprotoid: 0 Jan 13 23:00:51.560217: | port range: 0-65535 Jan 13 23:00:51.560229: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:00:51.560236: | sec_label: Jan 13 23:00:51.560254: | NAT-T: NAT Traversal detected - their IKE port is '500' Jan 13 23:00:51.560262: | NAT-T: encaps is 'auto' Jan 13 23:00:51.560274: "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: established Child SA using #41; IPsec tunnel [0.0.0.0-255.255.255.255:0-65535 0] -> [192.168.101.10-192.168.101.10:0-65535 0] {ESPinUDP=>0x249f0e74 <0x3e9fc2e6 xfrm=AES_CBC_256-HMAC_SHA1_96 NATD=94.253.210.164:4500 DPD=active} Jan 13 23:00:51.560285: | #43 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 23:00:51.560297: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c838029e18 timeout in 28800 seconds for #43 Jan 13 23:00:51.560314: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:00:51.560328: | dpd enabled, scheduling ikev2 liveness checks Jan 13 23:00:51.560341: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #43 Jan 13 23:00:51.560353: | newref tt@0x55c838018328(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:00:51.560365: | unpending IKE SA #41 CHILD SA #43 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:00:51.560376: | unpending state #41 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:00:51.560387: | job 54 helper 10 #41 Child Rekey Responder KE and nonce nr (dh): final status STF_OK; cleaning up Jan 13 23:00:51.560397: | delref secret@NULL (cleanup_ke_and_nonce() +83 programs/pluto/crypt_ke.c) Jan 13 23:00:51.560407: | delref logger@0x55c838021e98(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:00:51.560416: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:00:51.560425: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:00:51.560434: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:00:51.560445: | Message ID: updating counters for #41 Jan 13 23:00:51.560466: | Message ID: IKE #41 updating responder received message request 2: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=1 .recv=1->2 .recv_frags=6->0 .recv_wip=2->-1 .last_contact=9594096.911424->9594319.581527 ike.wip.initiator=-1 Jan 13 23:00:51.560480: | Message ID: IKE #41 updating responder sent message response 2: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=1->2 .recv=2 .recv_frags=0 .last_contact=9594319.581527 ike.wip.initiator=-1 Jan 13 23:00:51.560495: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=2 .recv=2 .recv_frags=0 .last_contact=9594319.581527 ike.wip.initiator=-1 Jan 13 23:00:51.560505: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:00:51.560518: | delref tt@0x55c838034f58(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:00:51.560528: | delref state-event@0x55c83804f078(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:00:51.560538: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:00:51.560552: | sending 212 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:00:51.560574: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:00:51.560581: | 82 26 37 8e 2e 20 24 20 00 00 00 02 00 00 00 d0 .&7.. $ ........ Jan 13 23:00:51.560590: | 21 00 00 b4 48 10 d6 5a ef be 4e 57 16 99 b6 ac !...H..Z..NW.... Jan 13 23:00:51.560599: | 61 d4 8c 6f 37 10 87 37 f5 cf 17 c6 16 91 00 97 a..o7..7........ Jan 13 23:00:51.560607: | 4e dd 46 28 b3 45 7c 21 29 13 82 4e 2b eb 87 19 N.F(.E|!)..N+... Jan 13 23:00:51.560616: | d6 e6 94 bf 94 c3 e7 cb 89 a5 6d d3 f7 86 6d b4 ..........m...m. Jan 13 23:00:51.560625: | df 7d 51 db 58 d1 7c 08 03 27 a7 53 cf 1c 0d 29 .}Q.X.|..'.S...) Jan 13 23:00:51.560634: | 27 9f b2 4d 3c bb 63 3b 3d 6e ae 2c 11 5e 39 45 '..M<.c;=n.,.^9E Jan 13 23:00:51.560643: | da 84 3a e7 60 5a c5 2c 8b 3e a9 5e c3 81 2d ee ..:.`Z.,.>.^..-. Jan 13 23:00:51.560652: | ff 32 87 17 e5 44 12 12 eb c4 18 38 04 ea aa 2f .2...D.....8.../ Jan 13 23:00:51.560661: | 8a 79 5d ca 1c 19 93 b7 78 14 91 ec a2 39 04 2c .y].....x....9., Jan 13 23:00:51.560671: | 58 e0 f5 e0 0a 53 ca 5d 16 e2 21 97 04 74 99 e2 X....S.]..!..t.. Jan 13 23:00:51.560680: | 77 0e 46 1f 7b ee c7 37 51 f7 6c e6 28 cf ff 2d w.F.{..7Q.l.(..- Jan 13 23:00:51.560689: | 98 11 c8 12 .... Jan 13 23:00:51.560724: | sent 1 messages Jan 13 23:00:51.560734: | announcing the state transition Jan 13 23:00:51.560742: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: process rekey Child SA request (CREATE_CHILD_SA): established IKE SA Jan 13 23:00:51.560751: | releasing whack Jan 13 23:00:51.560761: | releasing #41's fd@(nil) because ST per transition Jan 13 23:00:51.560770: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:00:51.560779: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:00:51.560789: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:00:51.560799: | delref logger@0x55c838043798(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:00:51.560808: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:00:51.560817: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:00:51.560826: | delref struct iface_endpoint@0x55c83801f058(5->4) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:00:51.560841: | #41 spent 6.46 (6.47) milliseconds in resume sending job back to main thread Jan 13 23:00:51.560853: | delref tt@0x7ff898000b48(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:00:51.570331: | spent 0.00219 (0.00217) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:00:51.570356: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:00:51.570369: | addref struct iface_endpoint@0x55c83801f058(4->5) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:00:51.570380: | newref alloc logger@0x55c838021e98(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:00:51.570394: | *received 80 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:00:51.570405: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:00:51.570414: | 2e 20 25 08 00 00 00 03 00 00 00 50 2a 00 00 34 . %........P*..4 Jan 13 23:00:51.570423: | 3c c1 60 2f 4c a6 a5 b6 88 b1 66 65 5c 66 be 2f <.`/L.....fe\f./ Jan 13 23:00:51.570432: | a1 ed 70 f3 27 be 6e d6 62 15 c5 01 bf ca b5 41 ..p.'.n.b......A Jan 13 23:00:51.570441: | 91 04 a6 ff 7a aa 21 31 15 11 af 8e cd 67 55 44 ....z.!1.....gUD Jan 13 23:00:51.570451: | **parse ISAKMP Message: Jan 13 23:00:51.570463: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:00:51.570474: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:00:51.570483: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:00:51.570491: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:00:51.570509: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:00:51.570520: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:00:51.570531: | Message ID: 3 (00 00 00 03) Jan 13 23:00:51.570542: | length: 80 (00 00 00 50) Jan 13 23:00:51.570552: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jan 13 23:00:51.570561: | I am the IKE SA Original Responder receiving an IKEv2 INFORMATIONAL request Jan 13 23:00:51.570570: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:00:51.570581: | #41 st.st_msgid_lastrecv 2 md.hdr.isa_msgid 00000003 Jan 13 23:00:51.570612: | Message ID: IKE #41 not a duplicate - message request 3 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=2 .recv=2 .recv_frags=0 .last_contact=9594319.581527 ike.wip.initiator=-1 Jan 13 23:00:51.570622: | unpacking clear payload Jan 13 23:00:51.570627: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:00:51.570635: | ***parse IKEv2 Encryption Payload: Jan 13 23:00:51.570644: | next payload type: ISAKMP_NEXT_v2D (0x2a) Jan 13 23:00:51.570653: | flags: none (0x0) Jan 13 23:00:51.570664: | length: 52 (00 34) Jan 13 23:00:51.570673: | processing payload: ISAKMP_NEXT_v2SK (len=48) Jan 13 23:00:51.570684: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK (ignoring secured payloads) Jan 13 23:00:51.570692: | trying: Informational Request (liveness probe) Jan 13 23:00:51.570701: | matching by ignoring secured payloads Jan 13 23:00:51.570727: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.570748: | auth: delref clone-key@0x55c838041fd0 Jan 13 23:00:51.570772: | authenticator matched Jan 13 23:00:51.570794: | stripping 4 octets as pad Jan 13 23:00:51.570806: | #41 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success Jan 13 23:00:51.570818: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:00:51.570827: | Now let's proceed with payload (ISAKMP_NEXT_v2D) Jan 13 23:00:51.570858: | **parse IKEv2 Delete Payload: Jan 13 23:00:51.570869: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.570875: | flags: none (0x0) Jan 13 23:00:51.570885: | length: 12 (00 0c) Jan 13 23:00:51.570894: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:00:51.570903: | SPI size: 4 (04) Jan 13 23:00:51.570913: | number of SPIs: 1 (00 01) Jan 13 23:00:51.570922: | processing payload: ISAKMP_NEXT_v2D (len=4) Jan 13 23:00:51.570932: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK{D} Jan 13 23:00:51.570941: | trying: Informational Request (liveness probe) Jan 13 23:00:51.570948: | secured payloads do not match Jan 13 23:00:51.570957: | trying: Informational Response (liveness probe) Jan 13 23:00:51.570966: | message role does not match response Jan 13 23:00:51.570975: | trying: Informational Request Jan 13 23:00:51.570983: | secured message matched Jan 13 23:00:51.570991: | selected state microcode Informational Request Jan 13 23:00:51.571001: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:00:51.571016: | Message ID: IKE #41 responder starting message request 3: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=2 .recv=2 .recv_frags=0 .recv_wip=3 .last_contact=9594319.581527 ike.wip.initiator=-1 Jan 13 23:00:51.571026: | calling processor Informational Request Jan 13 23:00:51.571038: | an informational request needing a response Jan 13 23:00:51.571053: | opening output PBS information exchange reply packet Jan 13 23:00:51.571062: | **emit ISAKMP Message: Jan 13 23:00:51.571074: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:00:51.571104: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:00:51.571120: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:00:51.571126: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:00:51.571135: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:00:51.571144: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:00:51.571155: | Message ID: 3 (00 00 00 03) Jan 13 23:00:51.571164: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:00:51.571174: | ***emit IKEv2 Encryption Payload: Jan 13 23:00:51.571183: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.571192: | flags: none (0x0) Jan 13 23:00:51.571202: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:00:51.571211: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:00:51.571221: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:00:51.571234: | parsing 4 raw bytes of IKEv2 Delete Payload into SPI Jan 13 23:00:51.571244: | SPI Jan 13 23:00:51.571255: | c9 35 b8 fa .5.. Jan 13 23:00:51.571265: | delete IKEv2_SEC_PROTO_ESP SA(0xc935b8fa) Jan 13 23:00:51.571274: | v2 CHILD SA #42 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:00:51.571284: | State DB: found IKEv2 state #42 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:00:51.571292: | our side SPI that needs to be deleted: IKEv2_SEC_PROTO_ESP SA(0xc935b8fa) Jan 13 23:00:51.571301: | should_send_delete: #42? NO, because Jan 13 23:00:51.571313: | deleting state (STATE_V2_ESTABLISHED_CHILD_SA) aged 222.714439s and NOT sending notification Jan 13 23:00:51.571323: | pstats #42 ikev2.child deleted completed Jan 13 23:00:51.571356: | #42 main thread spent 1.79 (1.77) milliseconds helper thread spent 0 (0) milliseconds in total Jan 13 23:00:51.571369: | kernel: get_sa_info esp.c935b8fa@94.253.210.164 Jan 13 23:00:51.571380: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:00:51.571406: | kernel: get_sa_info esp.191978da@161.53.235.3 Jan 13 23:00:51.571417: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:00:51.571437: "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: ESP traffic information: in=6MB out=178MB Jan 13 23:00:51.571448: | suspend: no MD saved in state #42 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:00:51.571455: | should_send_delete: #42? NO, because Jan 13 23:00:51.571464: | #42 deleting EVENT_v2_LIVENESS Jan 13 23:00:51.571476: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:00:51.571487: | delref state-event@0x55c838034cb8(1->0) (delete_state_tail() +1036 programs/pluto/state.c) Jan 13 23:00:51.571496: | #42 deleting EVENT_SA_EXPIRE Jan 13 23:00:51.571506: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:00:51.571518: | delref state-event@0x55c83804df78(1->0) (delete_state_tail() +1039 programs/pluto/state.c) Jan 13 23:00:51.571527: | #42 STATE_V2_ESTABLISHED_CHILD_SA: retransmits: cleared Jan 13 23:00:51.571542: | kernel: deleting spi 161.53.235.3 -> esp.c935b8fa@94.253.210.164 Jan 13 23:00:51.571552: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:00:51.571562: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:00:51.571609: | netlink response for Del SA esp.c935b8fa@94.253.210.164 included non-error error Jan 13 23:00:51.571623: | kernel: deleting spi 94.253.210.164 -> esp.191978da@161.53.235.3 Jan 13 23:00:51.571633: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:00:51.571642: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:00:51.571661: | netlink response for Del SA esp.191978da@161.53.235.3 included non-error error Jan 13 23:00:51.571671: | skipping revival: not an IKE SA Jan 13 23:00:51.571682: | delref struct iface_endpoint@0x55c83801f058(5->4) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:00:51.571695: | entry state hash_table_entries.serialno@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42 deleted from hash table Jan 13 23:00:51.571716: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $9 deleted from hash table Jan 13 23:00:51.571730: | entry state hash_table_entries.reqid@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: reqid=0 deleted from hash table Jan 13 23:00:51.571745: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: 8d 77 44 17 30 6b 26 bc deleted from hash table Jan 13 23:00:51.571763: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #42: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e deleted from hash table Jan 13 23:00:51.571775: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:00:51.571787: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 Jan 13 23:00:51.571797: | connection instance MYCONN-ikev2-cp in use by #43, skipping delete-unused Jan 13 23:00:51.571807: | child state #42: ESTABLISHED_CHILD_SA(established CHILD SA) => UNDEFINED(ignore) Jan 13 23:00:51.571837: | releasing #42's fd@(nil) because deleting state Jan 13 23:00:51.571847: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:00:51.571857: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:00:51.571868: | delref pkp@NULL (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:00:51.571877: | delref secret@NULL (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:00:51.571888: | delete_state_tail: delref st->st_dh_shared_secret-key@NULL Jan 13 23:00:51.571897: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:00:51.571907: | delete_state_tail: delref st->st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:00:51.571916: | delete_state_tail: delref st->st_skey_ai_nss-key@0x55c838005890 Jan 13 23:00:51.571923: | delete_state_tail: delref st->st_skey_ar_nss-key@0x55c838002520 Jan 13 23:00:51.571932: | delete_state_tail: delref st->st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:00:51.571941: | delete_state_tail: delref st->st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:00:51.571950: | delete_state_tail: delref st->st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:00:51.571958: | delete_state_tail: delref st->st_skey_pr_nss-key@0x55c838013660 Jan 13 23:00:51.571967: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:00:51.571975: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:00:51.571984: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:00:51.571993: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:00:51.572004: | delref logger@0x7ff8a000b5d8(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:00:51.572013: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:00:51.572022: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:00:51.572033: | ****emit IKEv2 Delete Payload: Jan 13 23:00:51.572042: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:00:51.572051: | flags: none (0x0) Jan 13 23:00:51.572059: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:00:51.572089: | SPI size: 4 (04) Jan 13 23:00:51.572099: | number of SPIs: 1 (00 01) Jan 13 23:00:51.572109: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) Jan 13 23:00:51.572118: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:00:51.572128: | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload Jan 13 23:00:51.572138: | local SPIs: 19 19 78 da Jan 13 23:00:51.572147: | emitting length of IKEv2 Delete Payload: 12 Jan 13 23:00:51.572157: | adding 4 bytes of padding (including 1 byte padding-length) Jan 13 23:00:51.572167: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.572176: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.572193: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.572204: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:00:51.572213: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:00:51.572222: | emitting length of IKEv2 Encryption Payload: 52 Jan 13 23:00:51.572230: | emitting length of ISAKMP Message: 80 Jan 13 23:00:51.572264: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:00:51.572281: | integ: delref clone-key@0x55c838041fd0 Jan 13 23:00:51.572348: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:00:51.572368: | Message ID: updating counters for #41 Jan 13 23:00:51.572387: | Message ID: IKE #41 updating responder received message request 3: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=2 .recv=2->3 .recv_frags=0 .recv_wip=3->-1 .last_contact=9594319.581527->9594319.593448 ike.wip.initiator=-1 Jan 13 23:00:51.572409: | Message ID: IKE #41 updating responder sent message response 3: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=2->3 .recv=3 .recv_frags=0 .last_contact=9594319.593448 ike.wip.initiator=-1 Jan 13 23:00:51.572430: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594306.949906 ike.responder .sent=3 .recv=3 .recv_frags=0 .last_contact=9594319.593448 ike.wip.initiator=-1 Jan 13 23:00:51.572446: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:00:51.572471: | sending 84 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:00:51.572486: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:00:51.572500: | 82 26 37 8e 2e 20 25 20 00 00 00 03 00 00 00 50 .&7.. % .......P Jan 13 23:00:51.572513: | 2a 00 00 34 1e bc 28 23 ee ad 44 03 eb c7 d0 a5 *..4..(#..D..... Jan 13 23:00:51.572526: | fc 16 9d 5f 66 bd 13 d1 d7 f2 ac 7f 50 2a 28 1e ..._f.......P*(. Jan 13 23:00:51.572537: | 6d 94 24 b6 e4 3f fb ca a5 44 e1 82 77 1a 6f 16 m.$..?...D..w.o. Jan 13 23:00:51.572548: | d7 ef 95 a7 .... Jan 13 23:00:51.572599: | sent 1 messages Jan 13 23:00:51.572614: | announcing the state transition Jan 13 23:00:51.572626: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: established IKE SA Jan 13 23:00:51.572646: | #41 spent 1.6 (1.6) milliseconds in processing: Informational Request in v2_dispatch() Jan 13 23:00:51.572663: | delref struct msg_digest@0x55c838050b08(2->1) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:00:51.572682: | #41 spent 2.35 (2.35) milliseconds in ikev2_process_packet() Jan 13 23:00:51.572697: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:00:51.572711: | delref logger@0x55c838021e98(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:00:51.572724: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:00:51.572736: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:00:51.572749: | delref struct iface_endpoint@0x55c83801f058(4->3) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:00:51.572767: | spent 2.43 (2.44) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:01:10.093349: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:01:10.093409: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:01:10.093431: | spent 0.0181 (0.0162) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:01:21.564346: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #43 in state ESTABLISHED_CHILD_SA Jan 13 23:01:21.564393: | #43 deleting EVENT_v2_LIVENESS Jan 13 23:01:21.564403: | delref tt@0x55c838018328(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:01:21.564411: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:01:21.564427: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:01:21.564434: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:01:21.564465: | liveness: #43 updating #41 last contact from 9594306.949906 to 9594349.585493 (last IPsec traffic flow) Jan 13 23:01:21.564481: | liveness: #43 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic) Jan 13 23:01:21.564495: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #43 Jan 13 23:01:21.564507: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:01:21.564528: | #43 spent 0.182 (0.181) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:01:30.079106: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:01:30.079164: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:01:30.079185: | spent 0.0174 (0.0155) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:01:50.081234: | processing global timer EVENT_PENDING_DDNS Jan 13 23:01:50.081326: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:01:50.081347: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:01:50.081360: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:01:50.081370: | found "L2TP-PSK-common" Jan 13 23:01:50.081380: | found "L2TP-PSK-noNAT" Jan 13 23:01:50.081389: | found "L2TP-PSK-NAT" Jan 13 23:01:50.081399: | found "MYCONN-ikev2-cp" Jan 13 23:01:50.081408: | matches: 6 Jan 13 23:01:50.081423: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:01:50.081498: | spent 0.164 (0.164) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:01:50.081523: | spent 0.2 (0.197) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:01:50.081543: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:01:50.081563: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:01:50.081586: | spent 0.0194 (0.0189) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:01:51.569190: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #43 in state ESTABLISHED_CHILD_SA Jan 13 23:01:51.569218: | #43 deleting EVENT_v2_LIVENESS Jan 13 23:01:51.569228: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:01:51.569237: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:01:51.569253: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:01:51.569260: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:01:51.569288: | liveness: #43 updating #41 last contact from 9594349.585493 to 9594379.590318 (last IPsec traffic flow) Jan 13 23:01:51.569306: | liveness: #43 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:01:51.569320: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #43 Jan 13 23:01:51.569331: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:01:51.569353: | #43 spent 0.163 (0.163) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:02:08.848344: | processing global timer EVENT_FREE_ROOT_CERTS Jan 13 23:02:08.848390: | delref struct root_certs@0x55c838029ca8(1->0) (free_root_certs() +156 programs/pluto/root_certs.c) Jan 13 23:02:08.848397: | destroying root certificate cache Jan 13 23:02:08.848426: | spent 0.0365 (0.0358) milliseconds in global timer EVENT_FREE_ROOT_CERTS Jan 13 23:02:10.072701: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:02:10.072771: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:02:10.072805: | spent 0.029 (0.0266) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:02:21.576469: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #43 in state ESTABLISHED_CHILD_SA Jan 13 23:02:21.576527: | #43 deleting EVENT_v2_LIVENESS Jan 13 23:02:21.576545: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:02:21.576561: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:02:21.576588: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:02:21.576604: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:02:21.576649: | liveness: #43 updating #41 last contact from 9594379.590318 to 9594409.59765 (last IPsec traffic flow) Jan 13 23:02:21.576668: | liveness: #43 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic) Jan 13 23:02:21.576684: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #43 Jan 13 23:02:21.576700: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:02:21.576726: | #43 spent 0.262 (0.26) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:02:30.080301: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:02:30.080376: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:02:30.080459: | spent 0.0795 (0.0788) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 23:02:30.080481: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:02:30.080494: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:02:30.080509: | spent 0.0132 (0.0131) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:02:50.087590: | processing global timer EVENT_PENDING_PHASE2 Jan 13 23:02:50.087644: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 23:02:50.087656: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:02:50.087663: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 23:02:50.087670: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:02:50.087676: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 23:02:50.087681: | found "L2TP-PSK-common" Jan 13 23:02:50.087686: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 23:02:50.087691: | found "L2TP-PSK-noNAT" Jan 13 23:02:50.087695: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 23:02:50.087700: | found "L2TP-PSK-NAT" Jan 13 23:02:50.087704: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 23:02:50.087709: | found "MYCONN-ikev2-cp" Jan 13 23:02:50.087714: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 23:02:50.087718: | matches: 6 Jan 13 23:02:50.087730: | spent 0.084 (0.0828) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 23:02:50.087737: | processing global timer EVENT_PENDING_DDNS Jan 13 23:02:50.087744: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:02:50.087751: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:02:50.087758: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:02:50.087764: | found "L2TP-PSK-common" Jan 13 23:02:50.087768: | found "L2TP-PSK-noNAT" Jan 13 23:02:50.087773: | found "L2TP-PSK-NAT" Jan 13 23:02:50.087778: | found "MYCONN-ikev2-cp" Jan 13 23:02:50.087782: | matches: 6 Jan 13 23:02:50.087789: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:02:50.087812: | spent 0.0664 (0.0666) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:02:50.087821: | spent 0.0766 (0.0765) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:02:50.087827: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:02:50.087832: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:02:50.087840: | spent 0.00713 (0.00707) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:02:51.580512: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #43 in state ESTABLISHED_CHILD_SA Jan 13 23:02:51.580588: | #43 deleting EVENT_v2_LIVENESS Jan 13 23:02:51.580607: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:02:51.580624: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:02:51.580651: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:02:51.580667: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:02:51.580712: | liveness: #43 updating #41 last contact from 9594409.59765 to 9594439.601713 (last IPsec traffic flow) Jan 13 23:02:51.580734: | liveness: #43 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:02:51.580749: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #43 Jan 13 23:02:51.580765: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:02:51.580789: | #43 spent 0.28 (0.28) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:03:10.076464: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:03:10.076527: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:03:10.076549: | spent 0.0161 (0.0144) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:03:21.592370: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #43 in state ESTABLISHED_CHILD_SA Jan 13 23:03:21.592425: | #43 deleting EVENT_v2_LIVENESS Jan 13 23:03:21.592444: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:03:21.592459: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:03:21.592486: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:03:21.592501: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:21.592547: | liveness: #43 updating #41 last contact from 9594439.601713 to 9594469.613547 (last IPsec traffic flow) Jan 13 23:03:21.592574: | liveness: #43 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:03:21.592590: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #43 Jan 13 23:03:21.592603: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:03:21.592627: | #43 spent 0.262 (0.26) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:03:30.080174: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:03:30.080235: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:03:30.080258: | spent 0.0182 (0.0161) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:03:49.648165: | newref struct fd@0x55c838029ca8(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:49.648222: | fd_accept: new fd@0x55c838029ca8 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:49.648264: | whack: start: showstates (fd@0x55c838029ca8) Jan 13 23:03:49.648280: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:49.648297: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 Jan 13 23:03:49.648330: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:49.648370: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:49.648387: | matches: 3 Jan 13 23:03:49.648399: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:49.648417: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 Jan 13 23:03:49.648445: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:49.648462: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:49.648476: | matches: 3 Jan 13 23:03:49.648537: | 9594499.613659 - 9623119.581366 = -1 Jan 13 23:03:49.648592: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:03:49.648615: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:49.648666: | kernel: get_sa_info esp.249f0e74@94.253.210.164 Jan 13 23:03:49.648685: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:49.648755: | whack: stop: showstates (fd@0x55c838029ca8) Jan 13 23:03:49.648777: | delref struct fd@0x55c838029ca8(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:49.648807: | freeref fd@0x55c838029ca8 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:49.648832: | spent 0.697 (0.695) milliseconds in whack Jan 13 23:03:50.069336: | processing global timer EVENT_PENDING_DDNS Jan 13 23:03:50.069391: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:03:50.069404: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:03:50.069410: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:03:50.069415: | found "L2TP-PSK-common" Jan 13 23:03:50.069420: | found "L2TP-PSK-noNAT" Jan 13 23:03:50.069425: | found "L2TP-PSK-NAT" Jan 13 23:03:50.069429: | found "MYCONN-ikev2-cp" Jan 13 23:03:50.069434: | matches: 6 Jan 13 23:03:50.069439: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:03:50.069465: | spent 0.0823 (0.0824) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:03:50.069474: | spent 0.0978 (0.0963) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:03:50.073551: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:03:50.073574: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:03:50.073597: | spent 0.0208 (0.0201) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:03:50.655064: | newref struct fd@0x55c838029ca8(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:50.655128: | fd_accept: new fd@0x55c838029ca8 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:50.655184: | whack: start: showstates (fd@0x55c838029ca8) Jan 13 23:03:50.655212: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:50.655241: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 Jan 13 23:03:50.655262: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:50.655282: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:50.655298: | matches: 3 Jan 13 23:03:50.655329: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:50.655352: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 Jan 13 23:03:50.655374: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:50.655396: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:50.655414: | matches: 3 Jan 13 23:03:50.655498: | 9594499.613659 - 9623119.581366 = -1 Jan 13 23:03:50.655571: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:03:50.655595: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:50.655654: | kernel: get_sa_info esp.249f0e74@94.253.210.164 Jan 13 23:03:50.655679: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:50.655733: | whack: stop: showstates (fd@0x55c838029ca8) Jan 13 23:03:50.655762: | delref struct fd@0x55c838029ca8(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:50.655798: | freeref fd@0x55c838029ca8 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:50.655832: | spent 0.804 (0.802) milliseconds in whack Jan 13 23:03:51.577601: | spent 0.00416 (0.0041) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:03:51.577646: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:03:51.577662: | addref struct iface_endpoint@0x55c83801f058(3->4) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:03:51.577676: | newref alloc logger@0x55c838040788(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:03:51.577694: | *received 352 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:03:51.577708: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:03:51.577719: | 2e 20 24 08 00 00 00 04 00 00 01 60 29 00 01 44 . $........`)..D Jan 13 23:03:51.577729: | b3 f2 42 94 63 35 bf b7 2c ff d4 5e 9e e6 5f 2c ..B.c5..,..^.._, Jan 13 23:03:51.577739: | 1f 1e 7d 03 bf 33 12 84 af 7a 11 ad 6e ef 83 bf ..}..3...z..n... Jan 13 23:03:51.577764: | f2 66 46 48 5e a8 48 12 ab 34 31 2d e2 d9 de 71 .fFH^.H..41-...q Jan 13 23:03:51.577775: | 6d 07 5a 7b d9 b1 3d 66 16 a9 09 c4 ac 9b 22 ab m.Z{..=f......". Jan 13 23:03:51.577785: | 72 8f c0 fc 26 29 9c ef 48 7e 0f 38 a7 0b 4c 76 r...&)..H~.8..Lv Jan 13 23:03:51.577795: | 19 ba 72 d4 b4 f4 91 36 7c fe 26 0e 24 24 84 be ..r....6|.&.$$.. Jan 13 23:03:51.577805: | 39 5e f2 a5 25 19 15 43 0a 3c cd df 0d 3e 29 6d 9^..%..C.<...>)m Jan 13 23:03:51.577816: | d5 78 38 95 be 4b 1b c2 b6 64 98 f5 04 3e 81 bd .x8..K...d...>.. Jan 13 23:03:51.577826: | f0 8a 1d 38 31 00 83 71 bb 92 c9 57 69 72 22 0f ...81..q...Wir". Jan 13 23:03:51.577836: | 51 b1 9c ac 9f a0 78 1f d0 c4 2c d6 95 cb ee 7a Q.....x...,....z Jan 13 23:03:51.577846: | f1 db 55 8b 22 4a 0b b2 4f 44 6e 11 de e7 e3 8c ..U."J..ODn..... Jan 13 23:03:51.577857: | 38 b3 48 40 45 1b b8 b9 58 21 f7 0d 31 0a 32 69 8.H@E...X!..1.2i Jan 13 23:03:51.577867: | b8 bd 12 33 75 c5 60 ab cc ed b9 00 f4 15 ca be ...3u.`......... Jan 13 23:03:51.577877: | 28 c3 03 02 af 44 ec ed 5e b2 de 98 23 7b 5a 73 (....D..^...#{Zs Jan 13 23:03:51.577887: | 45 c9 7e 66 3e f6 34 b1 6c 7b 82 89 3e 0f ee 63 E.~f>.4.l{..>..c Jan 13 23:03:51.577897: | ce de ad 99 75 a7 c2 b5 0d 05 a0 93 38 c0 14 d9 ....u.......8... Jan 13 23:03:51.577907: | e1 03 9f 90 96 fa 2e a0 24 e2 bc ec f8 cb 0e 23 ........$......# Jan 13 23:03:51.577915: | c3 7e 92 2b b5 7a d1 1f cd 6c 14 df b9 f3 96 3e .~.+.z...l.....> Jan 13 23:03:51.577923: | a2 f9 f0 e7 ac d8 a4 cb a4 49 1b 54 81 0b b3 e2 .........I.T.... Jan 13 23:03:51.577930: | 51 f5 0b 7f ff 7f 83 a4 d6 91 7f 28 fa 17 5d 65 Q..........(..]e Jan 13 23:03:51.577942: | **parse ISAKMP Message: Jan 13 23:03:51.577954: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:03:51.577966: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:03:51.577978: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:03:51.577988: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:03:51.577999: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:03:51.578010: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:03:51.578022: | Message ID: 4 (00 00 00 04) Jan 13 23:03:51.578035: | length: 352 (00 00 01 60) Jan 13 23:03:51.578046: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Jan 13 23:03:51.578058: | I am the IKE SA Original Responder receiving an IKEv2 CREATE_CHILD_SA request Jan 13 23:03:51.578072: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:03:51.578087: | #41 st.st_msgid_lastrecv 3 md.hdr.isa_msgid 00000004 Jan 13 23:03:51.578107: | Message ID: IKE #41 not a duplicate - message request 4 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=3 .recv=3 .recv_frags=0 .last_contact=9594319.593448 ike.wip.initiator=-1 Jan 13 23:03:51.578118: | unpacking clear payload Jan 13 23:03:51.578129: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:03:51.578140: | ***parse IKEv2 Encryption Payload: Jan 13 23:03:51.578151: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:03:51.578161: | flags: none (0x0) Jan 13 23:03:51.578173: | length: 324 (01 44) Jan 13 23:03:51.578184: | processing payload: ISAKMP_NEXT_v2SK (len=320) Jan 13 23:03:51.578197: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK (ignoring secured payloads) Jan 13 23:03:51.578207: | trying: Informational Request (liveness probe) Jan 13 23:03:51.578215: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578225: | trying: Informational Response (liveness probe) Jan 13 23:03:51.578234: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578245: | trying: Informational Request Jan 13 23:03:51.578254: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578274: | trying: Informational Response Jan 13 23:03:51.578285: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578295: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:03:51.578303: | matching by ignoring secured payloads Jan 13 23:03:51.578346: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.578381: | auth: delref clone-key@0x55c838041fd0 Jan 13 23:03:51.578419: | authenticator matched Jan 13 23:03:51.578454: | stripping 16 octets as pad Jan 13 23:03:51.578469: | #41 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success Jan 13 23:03:51.578481: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:03:51.578489: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:03:51.578497: | **parse IKEv2 Notify Payload: Jan 13 23:03:51.578506: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:03:51.578514: | flags: none (0x0) Jan 13 23:03:51.578523: | length: 12 (00 0c) Jan 13 23:03:51.578533: | Protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:03:51.578544: | SPI size: 4 (04) Jan 13 23:03:51.578555: | Notify Message Type: v2N_REKEY_SA (0x4009) Jan 13 23:03:51.578565: | processing payload: ISAKMP_NEXT_v2N (len=4) Jan 13 23:03:51.578576: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:03:51.578586: | **parse IKEv2 Security Association Payload: Jan 13 23:03:51.578597: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 23:03:51.578607: | flags: none (0x0) Jan 13 23:03:51.578618: | length: 80 (00 50) Jan 13 23:03:51.578628: | processing payload: ISAKMP_NEXT_v2SA (len=76) Jan 13 23:03:51.578638: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 23:03:51.578649: | **parse IKEv2 Nonce Payload: Jan 13 23:03:51.578659: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Jan 13 23:03:51.578669: | flags: none (0x0) Jan 13 23:03:51.578680: | length: 52 (00 34) Jan 13 23:03:51.578691: | processing payload: ISAKMP_NEXT_v2Ni (len=48) Jan 13 23:03:51.578700: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Jan 13 23:03:51.578712: | **parse IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:03:51.578722: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Jan 13 23:03:51.578732: | flags: none (0x0) Jan 13 23:03:51.578743: | length: 64 (00 40) Jan 13 23:03:51.578754: | number of TS: 2 (02) Jan 13 23:03:51.578764: | processing payload: ISAKMP_NEXT_v2TSi (len=56) Jan 13 23:03:51.578774: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Jan 13 23:03:51.578785: | **parse IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:03:51.578795: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.578805: | flags: none (0x0) Jan 13 23:03:51.578816: | length: 64 (00 40) Jan 13 23:03:51.578826: | number of TS: 2 (02) Jan 13 23:03:51.578836: | processing payload: ISAKMP_NEXT_v2TSr (len=56) Jan 13 23:03:51.578850: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK{N,SA,Ni,TSi,TSr} Jan 13 23:03:51.578861: | trying: Informational Request (liveness probe) Jan 13 23:03:51.578871: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578880: | trying: Informational Response (liveness probe) Jan 13 23:03:51.578888: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578897: | trying: Informational Request Jan 13 23:03:51.578908: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578918: | trying: Informational Response Jan 13 23:03:51.578926: | exchange type does not match INFORMATIONAL Jan 13 23:03:51.578935: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:03:51.578943: | secured payloads do not match Jan 13 23:03:51.578953: | trying: process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:03:51.578963: | secured message matched Jan 13 23:03:51.578972: | selected state microcode process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:03:51.578998: | #41 updating local interface from 161.53.235.3:4500 to 161.53.235.3:4500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:03:51.579011: | delref struct iface_endpoint@0x55c83801f058(4->3) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:03:51.579023: | addref struct iface_endpoint@0x55c83801f058(3->4) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:03:51.579036: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:03:51.579054: | Message ID: IKE #41 responder starting message request 4: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=3 .recv=3 .recv_frags=0 .recv_wip=4 .last_contact=9594319.593448 ike.wip.initiator=-1 Jan 13 23:03:51.579063: | calling processor process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:03:51.579075: | #41 spent 1.49 (1.49) milliseconds Jan 13 23:03:51.579084: | CREATE_CHILD_SA IPsec SA rekey Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:03:51.579094: | parsing 4 raw bytes of IKEv2 Notify Payload into SPI Jan 13 23:03:51.579100: | SPI Jan 13 23:03:51.579109: | 24 9f 0e 74 $..t Jan 13 23:03:51.579120: | CREATE_CHILD_S to rekey IPsec SA(0x249f0e74) Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:03:51.579131: | v2 CHILD SA #43 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:03:51.579143: | State DB: found IKEv2 state #43 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:03:51.579157: | #41 hasa a rekey request for "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 TSi TSr Jan 13 23:03:51.579173: | newref alloc logger@0x55c838019ae8(0->1) (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:03:51.579185: | addref fd@NULL (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:03:51.579200: | entry state hash_table_entries.serialno@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 initialized Jan 13 23:03:51.579213: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $9 initialized Jan 13 23:03:51.579226: | entry state hash_table_entries.reqid@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: reqid=0 initialized Jan 13 23:03:51.579243: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: 00 00 00 00 00 00 00 00 initialized Jan 13 23:03:51.579263: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:03:51.579275: | creating state object #44 at 0x55c83801fab8 Jan 13 23:03:51.579289: | entry state hash_table_entries.serialno@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 added to hash table bucket 0x55c83658ad20 Jan 13 23:03:51.579301: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:03:51.579314: | entry state hash_table_entries.reqid@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:03:51.579331: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: 8d 77 44 17 30 6b 26 bc added to hash table bucket 0x55c83657eca0 Jan 13 23:03:51.579352: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e added to hash table bucket 0x55c83657b6e0 Jan 13 23:03:51.579364: | pstats #44 ikev2.child started Jan 13 23:03:51.579377: | duplicating state object #41 "MYCONN-ikev2-cp"[2] 94.253.210.164 as #44 for IPSEC SA Jan 13 23:03:51.579391: | #44 setting local endpoint to 161.53.235.3:4500 from #41.st_localport (duplicate_state() +1567 programs/pluto/state.c) Jan 13 23:03:51.579403: | addref struct iface_endpoint@0x55c83801f058(4->5) (duplicate_state() +1569 programs/pluto/state.c) Jan 13 23:03:51.579413: | duplicate_state: addref st_skeyid_nss-key@NULL Jan 13 23:03:51.579433: | duplicate_state: addref st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:03:51.579445: | duplicate_state: addref st_skey_ai_nss-key@0x55c838005890 Jan 13 23:03:51.579455: | duplicate_state: addref st_skey_ar_nss-key@0x55c838002520 Jan 13 23:03:51.579465: | duplicate_state: addref st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:03:51.579475: | duplicate_state: addref st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:03:51.579486: | duplicate_state: addref st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:03:51.579496: | duplicate_state: addref st_skey_pr_nss-key@0x55c838013660 Jan 13 23:03:51.579506: | duplicate_state: addref st_enc_key_nss-key@NULL Jan 13 23:03:51.579524: | Message ID: CHILD #41.#44 initializing (CHILD SA): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=3 .recv=3 .recv_frags=0 .recv_wip=4 .last_contact=9594319.593448 child.wip.initiator=0->-1 Jan 13 23:03:51.579539: | child state #44: UNDEFINED(ignore) => REKEY_CHILD_R0(established IKE SA) Jan 13 23:03:51.579552: | #44.st_v2_transition NULL -> NULL (new_v2_child_state() +1645 programs/pluto/state.c) Jan 13 23:03:51.579573: | rekeying Child SA with PFS1:ESP=AES_CBC_256-HMAC_SHA1_96-MODP2048-DISABLED 2:ESP=AES_CBC_256-HMAC_SHA1_96-NONE-DISABLED Jan 13 23:03:51.579586: | TSi: parsing 2 traffic selectors Jan 13 23:03:51.579598: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:03:51.579608: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:03:51.579617: | IP Protocol ID: ALL (0x0) Jan 13 23:03:51.579629: | length: 16 (00 10) Jan 13 23:03:51.579639: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:03:51.579647: | start port: 0 (00 00) Jan 13 23:03:51.579656: | end port: 65535 (ff ff) Jan 13 23:03:51.579665: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:03:51.579674: | TS IP start Jan 13 23:03:51.579681: | 00 00 00 00 .... Jan 13 23:03:51.579691: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:03:51.579701: | TS IP end Jan 13 23:03:51.579711: | ff ff ff ff .... Jan 13 23:03:51.579726: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:03:51.579737: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:03:51.579748: | IP Protocol ID: ALL (0x0) Jan 13 23:03:51.579759: | length: 40 (00 28) Jan 13 23:03:51.579769: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:03:51.579780: | start port: 0 (00 00) Jan 13 23:03:51.579791: | end port: 65535 (ff ff) Jan 13 23:03:51.579801: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:03:51.579811: | TS IP start Jan 13 23:03:51.579822: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:03:51.579832: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:03:51.579841: | TS IP end Jan 13 23:03:51.579852: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:03:51.579864: | TSi: parsed 2 traffic selectors Jan 13 23:03:51.579875: | TSr: parsing 2 traffic selectors Jan 13 23:03:51.579885: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:03:51.579895: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:03:51.579905: | IP Protocol ID: ALL (0x0) Jan 13 23:03:51.579916: | length: 16 (00 10) Jan 13 23:03:51.579926: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:03:51.579936: | start port: 0 (00 00) Jan 13 23:03:51.579947: | end port: 65535 (ff ff) Jan 13 23:03:51.579957: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:03:51.579967: | TS IP start Jan 13 23:03:51.579977: | 00 00 00 00 .... Jan 13 23:03:51.579987: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:03:51.579997: | TS IP end Jan 13 23:03:51.580007: | ff ff ff ff .... Jan 13 23:03:51.580019: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:03:51.580040: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:03:51.580051: | IP Protocol ID: ALL (0x0) Jan 13 23:03:51.580063: | length: 40 (00 28) Jan 13 23:03:51.580073: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:03:51.580084: | start port: 0 (00 00) Jan 13 23:03:51.580094: | end port: 65535 (ff ff) Jan 13 23:03:51.580105: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:03:51.580115: | TS IP start Jan 13 23:03:51.580125: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:03:51.580136: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:03:51.580146: | TS IP end Jan 13 23:03:51.580156: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:03:51.580168: | TSr: parsed 2 traffic selectors Jan 13 23:03:51.580188: | evaluating local "MYCONN-ikev2-cp"[2] 94.253.210.164 $9 I=192.168.101.10/32:0/0 R=0.0.0.0/0:0/0 fit <= to remote: Jan 13 23:03:51.580204: | TSi[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:03:51.580221: | match address end->client=192.168.101.10/32 <= TSi[0]net=0.0.0.0-255.255.255.255: YES fitness 64 Jan 13 23:03:51.580231: | narrow port end=0..65535 <= TSi[0]=0..65535: 0 Jan 13 23:03:51.580240: | TSi[0] port match: YES fitness 65536 Jan 13 23:03:51.580247: | narrow protocol end=*0 <= TSi[0]=*0: 0 Jan 13 23:03:51.580256: | match end->client.ipproto=*0 <= TSi[0].ipprotoid=*0: YES fitness 255 Jan 13 23:03:51.580267: | TSr[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:03:51.580284: | match address end->client=0.0.0.0/0 <= TSr[0]net=0.0.0.0-255.255.255.255: YES fitness 32 Jan 13 23:03:51.580295: | narrow port end=0..65535 <= TSr[0]=0..65535: 0 Jan 13 23:03:51.580315: | TSr[0] port match: YES fitness 65536 Jan 13 23:03:51.580329: | narrow protocol end=*0 <= TSr[0]=*0: 0 Jan 13 23:03:51.580340: | match end->client.ipproto=*0 <= TSr[0].ipprotoid=*0: YES fitness 255 Jan 13 23:03:51.580350: | best fit so far: TSi[0] TSr[0] Jan 13 23:03:51.580364: | TSr[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:03:51.580383: | match address end->client=0.0.0.0/0 <= TSr[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:03:51.580398: | TSi[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:03:51.580415: | match address end->client=192.168.101.10/32 <= TSi[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:03:51.580429: | comparing remote proposals against CREATE_CHILD_SA request 2 local proposals Jan 13 23:03:51.580443: | local proposal 1 type ENCR has 1 transforms Jan 13 23:03:51.580455: | local proposal 1 type PRF has 0 transforms Jan 13 23:03:51.580466: | local proposal 1 type INTEG has 1 transforms Jan 13 23:03:51.580476: | local proposal 1 type DH has 1 transforms Jan 13 23:03:51.580486: | local proposal 1 type ESN has 1 transforms Jan 13 23:03:51.580497: | local proposal 1 transforms: required: ENCR+INTEG+DH+ESN; optional: none Jan 13 23:03:51.580508: | local proposal 2 type ENCR has 1 transforms Jan 13 23:03:51.580518: | local proposal 2 type PRF has 0 transforms Jan 13 23:03:51.580528: | local proposal 2 type INTEG has 1 transforms Jan 13 23:03:51.580538: | local proposal 2 type DH has 1 transforms Jan 13 23:03:51.580548: | local proposal 2 type ESN has 1 transforms Jan 13 23:03:51.580559: | local proposal 2 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:03:51.580571: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:03:51.580582: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:03:51.580593: | length: 40 (00 28) Jan 13 23:03:51.580604: | prop #: 1 (01) Jan 13 23:03:51.580614: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:03:51.580625: | spi size: 4 (04) Jan 13 23:03:51.580635: | # transforms: 3 (03) Jan 13 23:03:51.580657: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:03:51.580669: | remote SPI Jan 13 23:03:51.580679: | 03 06 fb 0c .... Jan 13 23:03:51.580689: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..2] of 2 local proposals Jan 13 23:03:51.580700: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:03:51.580712: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.580723: | length: 12 (00 0c) Jan 13 23:03:51.580734: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:03:51.580744: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:03:51.580754: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:03:51.580765: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:03:51.580776: | length/value: 256 (01 00) Jan 13 23:03:51.580790: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:03:51.580802: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:03:51.580812: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:03:51.580819: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.580828: | length: 8 (00 08) Jan 13 23:03:51.580837: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:03:51.580844: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:03:51.580854: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:03:51.580864: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 2 type 3 (INTEG) transform 0 Jan 13 23:03:51.580875: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:03:51.580885: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:03:51.580897: | length: 8 (00 08) Jan 13 23:03:51.580907: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:03:51.580917: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:03:51.580929: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:03:51.580940: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 0 Jan 13 23:03:51.580953: | remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none Jan 13 23:03:51.580966: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+INTEG+DH+ESN; optional: none; matched: ENCR+INTEG+ESN Jan 13 23:03:51.580978: | remote proposal 1 does not match local proposal 1; unmatched transforms: none; missing transforms: DH Jan 13 23:03:51.580991: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 2; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN Jan 13 23:03:51.581002: | remote proposal 1 matches local proposal 2 Jan 13 23:03:51.581013: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:03:51.581023: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:03:51.581034: | length: 36 (00 24) Jan 13 23:03:51.581045: | prop #: 2 (02) Jan 13 23:03:51.581055: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:03:51.581065: | spi size: 4 (04) Jan 13 23:03:51.581076: | # transforms: 3 (03) Jan 13 23:03:51.581087: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:03:51.581097: | remote SPI Jan 13 23:03:51.581108: | 03 06 fb 0c .... Jan 13 23:03:51.581119: | Comparing remote proposal 2 containing 3 transforms against local proposal [1..1] of 2 local proposals Jan 13 23:03:51.581130: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:03:51.581140: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.581152: | length: 8 (00 08) Jan 13 23:03:51.581162: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:03:51.581172: | IKEv2 transform ID: 3DES (0x3) Jan 13 23:03:51.581194: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:03:51.581206: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.581217: | length: 8 (00 08) Jan 13 23:03:51.581226: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:03:51.581237: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:03:51.581250: | remote proposal 2 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:03:51.581260: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:03:51.581271: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:03:51.581282: | length: 8 (00 08) Jan 13 23:03:51.581293: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:03:51.581304: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:03:51.581316: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:03:51.581328: | remote proposal 2 proposed transforms: ENCR+INTEG+ESN; matched: INTEG+ESN; unmatched: ENCR Jan 13 23:03:51.581339: | remote proposal 2 does not match; unmatched remote transforms: ENCR Jan 13 23:03:51.581359: "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: proposal 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=0306fb0c chosen from remote proposals 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;ESN=DISABLED[first-match] 2:ESP:ENCR=3DES;INTEG=HMAC_SHA1_96;ESN=DISABLED Jan 13 23:03:51.581376: | CREATE_CHILD_SA request ikev2_proposal: 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=0306fb0c Jan 13 23:03:51.581387: | converting proposal to internal trans attrs Jan 13 23:03:51.581408: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:03:51.581418: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:03:51.581426: | newref clone logger@0x55c838017ee8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:03:51.581435: | job 55 helper 0 #41 Child Rekey Responder KE and nonce nr (dh): added to pending queue Jan 13 23:03:51.581445: | #41 STATE_V2_ESTABLISHED_IKE_SA: retransmits: cleared Jan 13 23:03:51.581460: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c8380134e8 timeout in 60 seconds for #41 Jan 13 23:03:51.581473: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:03:51.581494: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 23:03:51.581511: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:03:51.581515: | job 55 helper 11 #41 Child Rekey Responder KE and nonce nr (dh): started Jan 13 23:03:51.581525: | addref struct msg_digest@0x55c838050b08(2->3) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:03:51.581565: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 23:03:51.581566: | job 55 helper 11 #41 Child Rekey Responder KE and nonce nr (dh): finished Jan 13 23:03:51.581586: | #41 spent 2.49 (2.51) milliseconds in processing: process rekey Child SA request (CREATE_CHILD_SA) in v2_dispatch() Jan 13 23:03:51.581602: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.0803 (0.0862) milliseconds in job 55 helper 11 #41 Child Rekey Responder KE and nonce nr (dh) Jan 13 23:03:51.581614: | delref struct msg_digest@0x55c838050b08(3->2) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:03:51.581629: | scheduling resume sending job back to main thread for #41 Jan 13 23:03:51.581647: | #41 spent 4.03 (4.06) milliseconds in ikev2_process_packet() Jan 13 23:03:51.581710: | newref tt@0x7ff89c0031a8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:03:51.581718: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:03:51.581733: | helper 11: waiting for work Jan 13 23:03:51.581747: | spent 4.09 (4.16) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:03:51.581784: | processing resume sending job back to main thread for #41 Jan 13 23:03:51.581800: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:03:51.581823: | job 55 helper 11 #41 Child Rekey Responder KE and nonce nr (dh): calling state's callback function Jan 13 23:03:51.581835: | process_v2_CREATE_CHILD_SA_request_continue_1() for #44 STATE_V2_REKEY_CHILD_R0 Jan 13 23:03:51.581851: | xfrm: sendrecv_xfrm_msg() sending 22 Jan 13 23:03:51.581886: | kernel: netlink_get_spi: allocated 0x2ca41e1 for esp.0@161.53.235.3 Jan 13 23:03:51.581904: | kernel: allocated incoming spi 94.253.210.164 -> esp.2ca41e1@161.53.235.3 in tunnel-mode Jan 13 23:03:51.581916: | integ=HMAC_SHA1_96: .key_size=20 encrypt=AES_CBC: .key_size=32 .salt_size=0 keymat_len=52 Jan 13 23:03:51.581967: | result: newref data=Ni-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.581993: | result: newref data=Ni-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582004: | data=Ni: delref tmp-key@0x55c838012940 Jan 13 23:03:51.582031: | result: newref data+=Nr-key@0x55c838012940 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582045: | append_symkey_bytes: delref lhs-key@0x55c838041fd0 Jan 13 23:03:51.582071: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.582094: | prf+0: delref clone-key@0x55c838041fd0 Jan 13 23:03:51.582122: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.582155: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.582213: | result: newref final-key@0x55c83801c850 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582243: | result: newref final-key@0x55c838041fd0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582256: | final: delref tmp-key@0x55c83801c850 Jan 13 23:03:51.582271: | prfplus: addref old_t[1]-key@0x55c838041fd0 Jan 13 23:03:51.582296: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.582324: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:03:51.582353: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.582381: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.582411: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.582440: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.582499: | result: newref final-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582528: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582541: | final: delref tmp-key@0x55c838026d80 Jan 13 23:03:51.582565: | result: newref result-key@0x55c838026d80 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582574: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 23:03:51.582585: | prfplus: delref old_t[N]-key@0x55c838041fd0 Jan 13 23:03:51.582608: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.582630: | prf+N: delref clone-key@0x55c838041fd0 Jan 13 23:03:51.582657: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.582685: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.582714: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.582742: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.582809: | result: newref final-key@0x55c8380199c0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582839: | result: newref final-key@0x55c838041fd0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582852: | final: delref tmp-key@0x55c8380199c0 Jan 13 23:03:51.582881: | result: newref result-key@0x55c8380199c0 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.582896: | append_symkey_symkey: delref lhs-key@0x55c838026d80 Jan 13 23:03:51.582910: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 23:03:51.582936: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.582960: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:03:51.582987: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.583018: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.583048: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.583076: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.583131: | result: newref final-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.583155: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.583166: | final: delref tmp-key@0x55c838026d80 Jan 13 23:03:51.583194: | result: newref result-key@0x55c838026d80 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:03:51.583209: | append_symkey_symkey: delref lhs-key@0x55c8380199c0 Jan 13 23:03:51.583223: | prfplus: delref old_t[N]-key@0x55c838041fd0 Jan 13 23:03:51.583236: | prfplus: delref old_t[final]-key@0x55c83801c850 Jan 13 23:03:51.583249: | child_sa_keymat: delref data-key@0x55c838012940 Jan 13 23:03:51.583275: | result: newref initiator to responder key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +125 programs/pluto/ikev2_crypto.c) Jan 13 23:03:51.583301: | initiator to responder keys: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.583329: | initiator to responder keys: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.583346: | ikev2_derive_child_keys: delref ikey-key@0x55c838012940 Jan 13 23:03:51.583371: | result: newref responder to initiator key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +133 programs/pluto/ikev2_crypto.c) Jan 13 23:03:51.583397: | responder to initiator keys:: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:03:51.583424: | responder to initiator keys:: delref slot-key-key@0x55c838003da0 Jan 13 23:03:51.583441: | ikev2_derive_child_keys: delref rkey-key@0x55c838012940 Jan 13 23:03:51.583456: | ikev2_derive_child_keys: delref keymat-key@0x55c838026d80 Jan 13 23:03:51.583470: | kernel: install_ipsec_sa() for #44: inbound and outbound Jan 13 23:03:51.583484: | kernel: could_route called for MYCONN-ikev2-cp; kind=CK_INSTANCE that.has_client=yes oppo=no this.host_port=500 sec_label= Jan 13 23:03:51.583499: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:03:51.583519: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:03:51.583530: | matches: 1 Jan 13 23:03:51.583542: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:03:51.583560: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:03:51.583580: | kernel: setup_half_ipsec_sa() outbound 0.0.0.0/0-ALL->[161.53.235.3=IPv4=>94.253.210.164]-ALL->192.168.101.10/32 sec_label= Jan 13 23:03:51.583593: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:03:51.583616: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:03:51.583627: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:03:51.583635: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:03:51.583643: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:03:51.583655: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:03:51.583677: | kernel: add_sa() 0 outbound tunnel 0.0.0.0/0-ALL->161.53.235.3=ESP=0306fb0c=espinudp=>94.253.210.164-ALL->192.168.101.10/32 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:03:51.583690: | xfrm: enabling tunnel mode Jan 13 23:03:51.583699: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:03:51.583706: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:03:51.583714: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:03:51.583721: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:03:51.583728: | xfrm: sendrecv_xfrm_msg() sending 16 Jan 13 23:03:51.583818: | netlink response for Add SA esp.306fb0c@94.253.210.164 included non-error error Jan 13 23:03:51.583836: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=0 owner=#43 tunnel Jan 13 23:03:51.583845: | kernel: set up outgoing SA Jan 13 23:03:51.583858: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:03:51.583876: | kernel: setup_half_ipsec_sa() inbound 192.168.101.10/32-ALL->[94.253.210.164=IPv4=>161.53.235.3]-ALL->0.0.0.0/0 sec_label= Jan 13 23:03:51.583888: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:03:51.583897: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:03:51.583906: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:03:51.583914: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:03:51.583924: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:03:51.583935: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:03:51.583955: | kernel: add_sa() 0 inbound tunnel 192.168.101.10/32-ALL->94.253.210.164=ESP=02ca41e1=espinudp=>161.53.235.3-ALL->0.0.0.0/0 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:03:51.583967: | xfrm: enabling tunnel mode Jan 13 23:03:51.583977: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:03:51.583985: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:03:51.583996: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:03:51.584005: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:03:51.584014: | xfrm: sendrecv_xfrm_msg() sending 26 Jan 13 23:03:51.584088: | netlink response for Add SA esp.2ca41e1@161.53.235.3 included non-error error Jan 13 23:03:51.584105: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=1 owner=#43 tunnel Jan 13 23:03:51.584116: | kernel: set up incoming SA Jan 13 23:03:51.584127: | kernel: sr for #44: erouted Jan 13 23:03:51.584141: | kernel: route_and_eroute() for 0.0.0.0/0 --> 192.168.101.10/32; proto 0, and source port 0 dest port 0 sec_label Jan 13 23:03:51.584155: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:03:51.584172: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:03:51.584184: | matches: 1 Jan 13 23:03:51.584197: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:03:51.584209: | kernel: route_and_eroute with c: MYCONN-ikev2-cp (next: none) ero:MYCONN-ikev2-cp esr:{(nil)} ro:MYCONN-ikev2-cp rosr:{(nil)} and state: #44 Jan 13 23:03:51.584219: | kernel: we are replacing an eroute Jan 13 23:03:51.584234: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:03:51.584259: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:03:51.584291: | kernel: raw_policy() REPLACE_OUTBOUND THIS_IS_NOT_INBOUND eroute_connection() sag_eroute() route_and_eroute() replace sag 0.0.0.0/0-ALL-161.53.235.3==94.253.210.164-ALL-192.168.101.10/32 shunt_policy=UNSET encap=tunnel,161.53.235.3=>94.253.210.164,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:03:51.584303: | xfrm_raw_policy() policy=IPv4/3 dir=1 Jan 13 23:03:51.584326: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:03:51.584337: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 23:03:51.584352: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=161.53.235.3 id.daddr=94.253.210.164 Jan 13 23:03:51.584364: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 23:03:51.584395: | kernel: policy: result=success Jan 13 23:03:51.584409: | kernel: route_and_eroute: firewall_notified: true Jan 13 23:03:51.584423: | kernel: route_and_eroute: instance "MYCONN-ikev2-cp"[2] 94.253.210.164, setting eroute_owner {spd=0x55c83803cdc8,sr=0x55c83803cdc8} to #44 (was #43) (newest_ipsec_sa=#43) Jan 13 23:03:51.584436: | ISAKMP_v2_CREATE_CHILD_SA: instance MYCONN-ikev2-cp[2], setting IKEv2 newest_ipsec_sa to #44 (was #43) (spd.eroute=#44) cloned from #41 Jan 13 23:03:51.584453: | opening output PBS CREATE_CHILD_SA message Jan 13 23:03:51.584466: | **emit ISAKMP Message: Jan 13 23:03:51.584477: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:03:51.584490: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:03:51.584499: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:03:51.584510: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:03:51.584520: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:03:51.584531: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:03:51.584543: | Message ID: 4 (00 00 00 04) Jan 13 23:03:51.584553: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:03:51.584565: | ***emit IKEv2 Encryption Payload: Jan 13 23:03:51.584575: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.584586: | flags: none (0x0) Jan 13 23:03:51.584597: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:03:51.584607: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:03:51.584618: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:03:51.584637: | emitting ikev2_proposal ... Jan 13 23:03:51.584651: | ****emit IKEv2 Security Association Payload: Jan 13 23:03:51.584662: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.584672: | flags: none (0x0) Jan 13 23:03:51.584683: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 23:03:51.584693: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:03:51.584706: | *****emit IKEv2 Proposal Substructure Payload: Jan 13 23:03:51.584717: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:03:51.584728: | prop #: 1 (01) Jan 13 23:03:51.584739: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:03:51.584750: | spi size: 4 (04) Jan 13 23:03:51.584761: | # transforms: 3 (03) Jan 13 23:03:51.584771: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 23:03:51.584783: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Jan 13 23:03:51.584795: | our spi: 02 ca 41 e1 Jan 13 23:03:51.584806: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:03:51.584827: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.584838: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:03:51.584848: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:03:51.584858: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:03:51.584866: | *******emit IKEv2 Attribute Substructure Payload: Jan 13 23:03:51.584874: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:03:51.584883: | length/value: 256 (01 00) Jan 13 23:03:51.584891: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 23:03:51.584899: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:03:51.584908: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.584918: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:03:51.584928: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:03:51.584939: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.584950: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:03:51.584959: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:03:51.584969: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:03:51.584980: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:03:51.584990: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:03:51.585000: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:03:51.585011: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:03:51.585021: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:03:51.585032: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:03:51.585042: | emitting length of IKEv2 Proposal Substructure Payload: 40 Jan 13 23:03:51.585053: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 23:03:51.585062: | emitting length of IKEv2 Security Association Payload: 44 Jan 13 23:03:51.585071: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 23:03:51.585081: | ****emit IKEv2 Nonce Payload: Jan 13 23:03:51.585091: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.585102: | flags: none (0x0) Jan 13 23:03:51.585111: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Jan 13 23:03:51.585121: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:03:51.585132: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Jan 13 23:03:51.585142: | IKEv2 nonce: Jan 13 23:03:51.585153: | 1a 7a 1d 58 a3 95 3a a1 96 59 4f 8d 26 4d 92 de .z.X..:..YO.&M.. Jan 13 23:03:51.585162: | c6 db 68 16 69 0a 89 9d ba 4a d4 66 35 a5 6a 95 ..h.i....J.f5.j. Jan 13 23:03:51.585172: | emitting length of IKEv2 Nonce Payload: 36 Jan 13 23:03:51.585183: | that TSi TS Jan 13 23:03:51.585193: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:03:51.585203: | ipprotoid: 0 Jan 13 23:03:51.585212: | port range: 0-65535 Jan 13 23:03:51.585223: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:03:51.585233: | sec_label: Jan 13 23:03:51.585244: | this TSr TS Jan 13 23:03:51.585253: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:03:51.585263: | ipprotoid: 0 Jan 13 23:03:51.585272: | port range: 0-65535 Jan 13 23:03:51.585286: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:03:51.585306: | sec_label: Jan 13 23:03:51.585318: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:03:51.585328: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.585339: | flags: none (0x0) Jan 13 23:03:51.585352: | number of TS: 1 (01) Jan 13 23:03:51.585363: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Jan 13 23:03:51.585373: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:03:51.585384: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:03:51.585394: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:03:51.585404: | IP Protocol ID: ALL (0x0) Jan 13 23:03:51.585414: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:03:51.585425: | start port: 0 (00 00) Jan 13 23:03:51.585436: | end port: 65535 (ff ff) Jan 13 23:03:51.585446: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:03:51.585457: | IP start: c0 a8 65 0a Jan 13 23:03:51.585465: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:03:51.585473: | IP end: c0 a8 65 0a Jan 13 23:03:51.585481: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:03:51.585488: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Jan 13 23:03:51.585497: | ****emit IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:03:51.585508: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.585517: | flags: none (0x0) Jan 13 23:03:51.585528: | number of TS: 1 (01) Jan 13 23:03:51.585539: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Jan 13 23:03:51.585549: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:03:51.585560: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:03:51.585570: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:03:51.585579: | IP Protocol ID: ALL (0x0) Jan 13 23:03:51.585589: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:03:51.585601: | start port: 0 (00 00) Jan 13 23:03:51.585612: | end port: 65535 (ff ff) Jan 13 23:03:51.585623: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:03:51.585635: | IP start: 00 00 00 00 Jan 13 23:03:51.585645: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:03:51.585657: | IP end: ff ff ff ff Jan 13 23:03:51.585667: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:03:51.585676: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Jan 13 23:03:51.585687: | adding 16 bytes of padding (including 1 byte padding-length) Jan 13 23:03:51.585698: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585708: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585719: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585730: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585741: | emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585752: | emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585762: | emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585773: | emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585784: | emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585795: | emitting 1 0x09 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585805: | emitting 1 0x0a repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585826: | emitting 1 0x0b repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585837: | emitting 1 0x0c repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585848: | emitting 1 0x0d repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585858: | emitting 1 0x0e repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585868: | emitting 1 0x0f repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.585880: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:03:51.585890: | emitting length of IKEv2 Encryption Payload: 180 Jan 13 23:03:51.585900: | emitting length of ISAKMP Message: 208 Jan 13 23:03:51.585940: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.585967: | integ: delref clone-key@0x55c838026d80 Jan 13 23:03:51.585999: | child state #44: REKEY_CHILD_R0(established IKE SA) => ESTABLISHED_CHILD_SA(established CHILD SA) Jan 13 23:03:51.586014: | pstats #44 ikev2.child established Jan 13 23:03:51.586030: | this TS Jan 13 23:03:51.586038: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:03:51.586045: | ipprotoid: 0 Jan 13 23:03:51.586053: | port range: 0-65535 Jan 13 23:03:51.586063: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:03:51.586070: | sec_label: Jan 13 23:03:51.586079: | that TS Jan 13 23:03:51.586088: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:03:51.586097: | ipprotoid: 0 Jan 13 23:03:51.586107: | port range: 0-65535 Jan 13 23:03:51.586120: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:03:51.586129: | sec_label: Jan 13 23:03:51.586145: | NAT-T: NAT Traversal detected - their IKE port is '500' Jan 13 23:03:51.586155: | NAT-T: encaps is 'auto' Jan 13 23:03:51.586169: "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: established Child SA using #41; IPsec tunnel [0.0.0.0-255.255.255.255:0-65535 0] -> [192.168.101.10-192.168.101.10:0-65535 0] {ESPinUDP=>0x0306fb0c <0x02ca41e1 xfrm=AES_CBC_256-HMAC_SHA1_96 NATD=94.253.210.164:4500 DPD=active} Jan 13 23:03:51.586181: | #44 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 23:03:51.586196: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c83804df78 timeout in 28800 seconds for #44 Jan 13 23:03:51.586209: | newref tt@0x55c838018328(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:03:51.586221: | dpd enabled, scheduling ikev2 liveness checks Jan 13 23:03:51.586235: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380170d8 timeout in 30 seconds for #44 Jan 13 23:03:51.586247: | newref tt@0x55c838048ba8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:03:51.586261: | unpending IKE SA #41 CHILD SA #44 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:03:51.586275: | unpending state #41 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:03:51.586287: | job 55 helper 11 #41 Child Rekey Responder KE and nonce nr (dh): final status STF_OK; cleaning up Jan 13 23:03:51.586298: | delref secret@NULL (cleanup_ke_and_nonce() +83 programs/pluto/crypt_ke.c) Jan 13 23:03:51.586310: | delref logger@0x55c838017ee8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:03:51.586320: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:03:51.586330: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:03:51.586343: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:03:51.586357: | Message ID: updating counters for #41 Jan 13 23:03:51.586379: | Message ID: IKE #41 updating responder received message request 4: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=3 .recv=3->4 .recv_frags=0 .recv_wip=4->-1 .last_contact=9594319.593448->9594499.60744 ike.wip.initiator=-1 Jan 13 23:03:51.586397: | Message ID: IKE #41 updating responder sent message response 4: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=3->4 .recv=4 .recv_frags=0 .last_contact=9594499.60744 ike.wip.initiator=-1 Jan 13 23:03:51.586430: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=4 .recv=4 .recv_frags=0 .last_contact=9594499.60744 ike.wip.initiator=-1 Jan 13 23:03:51.586443: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:03:51.586457: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:03:51.586470: | delref state-event@0x55c8380134e8(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:03:51.586481: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:03:51.586498: | sending 212 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:03:51.586510: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:03:51.586521: | 82 26 37 8e 2e 20 24 20 00 00 00 04 00 00 00 d0 .&7.. $ ........ Jan 13 23:03:51.586532: | 21 00 00 b4 e3 4d 51 98 81 5d 26 35 82 86 f2 bb !....MQ..]&5.... Jan 13 23:03:51.586541: | 78 e6 ab e6 1c 92 a0 3f 59 7f b2 38 66 4c bb 8e x......?Y..8fL.. Jan 13 23:03:51.586551: | 1f ee c6 09 94 61 db e5 78 7b 62 32 23 bd 7f ea .....a..x{b2#... Jan 13 23:03:51.586561: | 8c 34 37 88 8a 15 b7 e1 b0 84 ac 27 6d b9 cc 4a .47........'m..J Jan 13 23:03:51.586571: | 4d 24 2b fe 07 2b c7 50 2e ed f3 47 8c 2c 69 b3 M$+..+.P...G.,i. Jan 13 23:03:51.586581: | 3a c9 ca 3b a9 b3 07 b0 85 77 5b 33 b8 d0 20 02 :..;.....w[3.. . Jan 13 23:03:51.586591: | 59 97 8d 25 4d a0 09 b5 cb 9d 7a da 2c 33 81 88 Y..%M.....z.,3.. Jan 13 23:03:51.586601: | 4a f2 9b 51 d3 6b 0a b0 fb b8 c4 44 3d 3f f6 99 J..Q.k.....D=?.. Jan 13 23:03:51.586610: | fb f5 2d 36 ea 43 54 b6 9e f7 a9 34 94 f7 6a a0 ..-6.CT....4..j. Jan 13 23:03:51.586617: | d4 4e 8d 47 30 5b fd 8b ea df 77 50 23 9b 1d bf .N.G0[....wP#... Jan 13 23:03:51.586625: | 36 7f 68 08 f2 1f 7e 29 70 f2 69 12 1e ec b6 1b 6.h...~)p.i..... Jan 13 23:03:51.586632: | e9 59 ab 13 .Y.. Jan 13 23:03:51.586667: | sent 1 messages Jan 13 23:03:51.586682: | announcing the state transition Jan 13 23:03:51.586697: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: process rekey Child SA request (CREATE_CHILD_SA): established IKE SA Jan 13 23:03:51.586707: | releasing whack Jan 13 23:03:51.586716: | releasing #41's fd@(nil) because ST per transition Jan 13 23:03:51.586725: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:03:51.586735: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:03:51.586746: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:03:51.586758: | delref logger@0x55c838040788(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:03:51.586768: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:03:51.586779: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:03:51.586790: | delref struct iface_endpoint@0x55c83801f058(5->4) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:03:51.586808: | #41 spent 4.99 (5.01) milliseconds in resume sending job back to main thread Jan 13 23:03:51.586821: | delref tt@0x7ff89c0031a8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:03:51.599904: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #43 in state ESTABLISHED_CHILD_SA Jan 13 23:03:51.599927: | #43 deleting EVENT_v2_LIVENESS Jan 13 23:03:51.599940: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:03:51.599952: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:03:51.599982: | liveness: #43 was replaced by #44 so not needed Jan 13 23:03:51.600002: | #43 spent 0.0968 (0.0963) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:03:51.600028: | spent 0.00294 (0.00303) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:03:51.600051: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:03:51.600066: | addref struct iface_endpoint@0x55c83801f058(4->5) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:03:51.600077: | newref alloc logger@0x55c838017ee8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:03:51.600093: | *received 80 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:03:51.600104: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:03:51.600115: | 2e 20 25 08 00 00 00 05 00 00 00 50 2a 00 00 34 . %........P*..4 Jan 13 23:03:51.600126: | 3f 15 e9 c9 c0 e3 42 84 10 0a 25 b5 0e 85 ed 1d ?.....B...%..... Jan 13 23:03:51.600135: | 05 3b 56 96 50 fe ba 52 30 6b 28 c2 08 64 e3 04 .;V.P..R0k(..d.. Jan 13 23:03:51.600144: | ce 10 ce 1e bf 09 49 2b 4f 58 cf f8 04 f1 4a 72 ......I+OX....Jr Jan 13 23:03:51.600156: | **parse ISAKMP Message: Jan 13 23:03:51.600169: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:03:51.600182: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:03:51.600193: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:03:51.600204: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:03:51.600215: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:03:51.600225: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:03:51.600238: | Message ID: 5 (00 00 00 05) Jan 13 23:03:51.600251: | length: 80 (00 00 00 50) Jan 13 23:03:51.600262: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jan 13 23:03:51.600273: | I am the IKE SA Original Responder receiving an IKEv2 INFORMATIONAL request Jan 13 23:03:51.600285: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:03:51.600299: | #41 st.st_msgid_lastrecv 4 md.hdr.isa_msgid 00000005 Jan 13 23:03:51.600337: | Message ID: IKE #41 not a duplicate - message request 5 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=4 .recv=4 .recv_frags=0 .last_contact=9594499.60744 ike.wip.initiator=-1 Jan 13 23:03:51.600352: | unpacking clear payload Jan 13 23:03:51.600361: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:03:51.600371: | ***parse IKEv2 Encryption Payload: Jan 13 23:03:51.600381: | next payload type: ISAKMP_NEXT_v2D (0x2a) Jan 13 23:03:51.600391: | flags: none (0x0) Jan 13 23:03:51.600402: | length: 52 (00 34) Jan 13 23:03:51.600410: | processing payload: ISAKMP_NEXT_v2SK (len=48) Jan 13 23:03:51.600419: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK (ignoring secured payloads) Jan 13 23:03:51.600427: | trying: Informational Request (liveness probe) Jan 13 23:03:51.600433: | matching by ignoring secured payloads Jan 13 23:03:51.600459: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.600484: | auth: delref clone-key@0x55c838026d80 Jan 13 23:03:51.600512: | authenticator matched Jan 13 23:03:51.600536: | stripping 4 octets as pad Jan 13 23:03:51.600550: | #41 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success Jan 13 23:03:51.600563: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:03:51.600574: | Now let's proceed with payload (ISAKMP_NEXT_v2D) Jan 13 23:03:51.600585: | **parse IKEv2 Delete Payload: Jan 13 23:03:51.600595: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.600605: | flags: none (0x0) Jan 13 23:03:51.600617: | length: 12 (00 0c) Jan 13 23:03:51.600627: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:03:51.600648: | SPI size: 4 (04) Jan 13 23:03:51.600660: | number of SPIs: 1 (00 01) Jan 13 23:03:51.600670: | processing payload: ISAKMP_NEXT_v2D (len=4) Jan 13 23:03:51.600682: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK{D} Jan 13 23:03:51.600693: | trying: Informational Request (liveness probe) Jan 13 23:03:51.600703: | secured payloads do not match Jan 13 23:03:51.600714: | trying: Informational Response (liveness probe) Jan 13 23:03:51.600724: | message role does not match response Jan 13 23:03:51.600734: | trying: Informational Request Jan 13 23:03:51.600744: | secured message matched Jan 13 23:03:51.600753: | selected state microcode Informational Request Jan 13 23:03:51.600765: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:03:51.600782: | Message ID: IKE #41 responder starting message request 5: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=4 .recv=4 .recv_frags=0 .recv_wip=5 .last_contact=9594499.60744 ike.wip.initiator=-1 Jan 13 23:03:51.600793: | calling processor Informational Request Jan 13 23:03:51.600806: | an informational request needing a response Jan 13 23:03:51.600820: | opening output PBS information exchange reply packet Jan 13 23:03:51.600832: | **emit ISAKMP Message: Jan 13 23:03:51.600845: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:03:51.600857: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:03:51.600868: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:03:51.600882: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:03:51.600892: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:03:51.600901: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:03:51.600912: | Message ID: 5 (00 00 00 05) Jan 13 23:03:51.600920: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:03:51.600930: | ***emit IKEv2 Encryption Payload: Jan 13 23:03:51.600942: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.600951: | flags: none (0x0) Jan 13 23:03:51.600961: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:03:51.600970: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:03:51.600981: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:03:51.600994: | parsing 4 raw bytes of IKEv2 Delete Payload into SPI Jan 13 23:03:51.601002: | SPI Jan 13 23:03:51.601009: | 24 9f 0e 74 $..t Jan 13 23:03:51.601016: | delete IKEv2_SEC_PROTO_ESP SA(0x249f0e74) Jan 13 23:03:51.601027: | v2 CHILD SA #43 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:03:51.601036: | State DB: found IKEv2 state #43 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:03:51.601046: | our side SPI that needs to be deleted: IKEv2_SEC_PROTO_ESP SA(0x249f0e74) Jan 13 23:03:51.601055: | should_send_delete: #43? NO, because Jan 13 23:03:51.601068: | deleting state (STATE_V2_ESTABLISHED_CHILD_SA) aged 180.051057s and NOT sending notification Jan 13 23:03:51.601078: | pstats #43 ikev2.child deleted completed Jan 13 23:03:51.601090: | #43 main thread spent 1.25 (1.24) milliseconds helper thread spent 0 (0) milliseconds in total Jan 13 23:03:51.601105: | kernel: get_sa_info esp.249f0e74@94.253.210.164 Jan 13 23:03:51.601116: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:51.601143: | kernel: get_sa_info esp.3e9fc2e6@161.53.235.3 Jan 13 23:03:51.601157: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:51.601186: "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: ESP traffic information: in=3MB out=119MB Jan 13 23:03:51.601201: | suspend: no MD saved in state #43 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:03:51.601222: | should_send_delete: #43? NO, because Jan 13 23:03:51.601234: | #43 deleting EVENT_SA_EXPIRE Jan 13 23:03:51.601245: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:03:51.601257: | delref state-event@0x55c838029e18(1->0) (delete_state_tail() +1039 programs/pluto/state.c) Jan 13 23:03:51.601269: | #43 STATE_V2_ESTABLISHED_CHILD_SA: retransmits: cleared Jan 13 23:03:51.601284: | kernel: deleting spi 161.53.235.3 -> esp.249f0e74@94.253.210.164 Jan 13 23:03:51.601296: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:03:51.601306: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:03:51.601339: | netlink response for Del SA esp.249f0e74@94.253.210.164 included non-error error Jan 13 23:03:51.601358: | kernel: deleting spi 94.253.210.164 -> esp.3e9fc2e6@161.53.235.3 Jan 13 23:03:51.601371: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:03:51.601382: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:03:51.601420: | netlink response for Del SA esp.3e9fc2e6@161.53.235.3 included non-error error Jan 13 23:03:51.601435: | skipping revival: not an IKE SA Jan 13 23:03:51.601447: | delref struct iface_endpoint@0x55c83801f058(5->4) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:03:51.601476: | entry state hash_table_entries.serialno@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43 deleted from hash table Jan 13 23:03:51.601491: | entry state hash_table_entries.connection_serialno@0x55c838020928 $9 deleted from hash table Jan 13 23:03:51.601504: | entry state hash_table_entries.reqid@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: reqid=0 deleted from hash table Jan 13 23:03:51.601521: | entry state hash_table_entries.ike_initiator_spi@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: 8d 77 44 17 30 6b 26 bc deleted from hash table Jan 13 23:03:51.601541: | entry state hash_table_entries.ike_spis@0x55c838020928 "MYCONN-ikev2-cp"[2] 94.253.210.164 #43: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e deleted from hash table Jan 13 23:03:51.601554: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:03:51.601566: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:51.601574: | connection instance MYCONN-ikev2-cp in use by #44, skipping delete-unused Jan 13 23:03:51.601583: | child state #43: ESTABLISHED_CHILD_SA(established CHILD SA) => UNDEFINED(ignore) Jan 13 23:03:51.601591: | releasing #43's fd@(nil) because deleting state Jan 13 23:03:51.601599: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:03:51.601606: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:03:51.601614: | delref pkp@NULL (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:03:51.601627: | delref secret@NULL (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:03:51.601639: | delete_state_tail: delref st->st_dh_shared_secret-key@NULL Jan 13 23:03:51.601650: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:03:51.601659: | delete_state_tail: delref st->st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:03:51.601669: | delete_state_tail: delref st->st_skey_ai_nss-key@0x55c838005890 Jan 13 23:03:51.601677: | delete_state_tail: delref st->st_skey_ar_nss-key@0x55c838002520 Jan 13 23:03:51.601687: | delete_state_tail: delref st->st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:03:51.601695: | delete_state_tail: delref st->st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:03:51.601704: | delete_state_tail: delref st->st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:03:51.601712: | delete_state_tail: delref st->st_skey_pr_nss-key@0x55c838013660 Jan 13 23:03:51.601722: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:03:51.601730: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:03:51.601739: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:03:51.601748: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:03:51.601760: | delref logger@0x55c83801a228(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:03:51.601781: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:03:51.601792: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:03:51.601802: | ****emit IKEv2 Delete Payload: Jan 13 23:03:51.601813: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:03:51.601824: | flags: none (0x0) Jan 13 23:03:51.601833: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:03:51.601843: | SPI size: 4 (04) Jan 13 23:03:51.601855: | number of SPIs: 1 (00 01) Jan 13 23:03:51.601867: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) Jan 13 23:03:51.601877: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:03:51.601889: | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload Jan 13 23:03:51.601901: | local SPIs: 3e 9f c2 e6 Jan 13 23:03:51.601911: | emitting length of IKEv2 Delete Payload: 12 Jan 13 23:03:51.601921: | adding 4 bytes of padding (including 1 byte padding-length) Jan 13 23:03:51.601932: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.601944: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.601954: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.601965: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:03:51.601975: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:03:51.601986: | emitting length of IKEv2 Encryption Payload: 52 Jan 13 23:03:51.601997: | emitting length of ISAKMP Message: 80 Jan 13 23:03:51.602035: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:03:51.602062: | integ: delref clone-key@0x55c838026d80 Jan 13 23:03:51.602095: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:03:51.602112: | Message ID: updating counters for #41 Jan 13 23:03:51.602132: | Message ID: IKE #41 updating responder received message request 5: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=4 .recv=4->5 .recv_frags=0 .recv_wip=5->-1 .last_contact=9594499.60744->9594499.623195 ike.wip.initiator=-1 Jan 13 23:03:51.602150: | Message ID: IKE #41 updating responder sent message response 5: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=4->5 .recv=5 .recv_frags=0 .last_contact=9594499.623195 ike.wip.initiator=-1 Jan 13 23:03:51.602164: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594469.613547 ike.responder .sent=5 .recv=5 .recv_frags=0 .last_contact=9594499.623195 ike.wip.initiator=-1 Jan 13 23:03:51.602173: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:03:51.602186: | sending 84 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:03:51.602196: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:03:51.602206: | 82 26 37 8e 2e 20 25 20 00 00 00 05 00 00 00 50 .&7.. % .......P Jan 13 23:03:51.602217: | 2a 00 00 34 20 b3 f6 cc 90 38 9c 13 8a 29 90 4d *..4 ....8...).M Jan 13 23:03:51.602227: | 65 53 cb 77 36 84 45 36 78 d5 b9 72 b1 b2 7e 89 eS.w6.E6x..r..~. Jan 13 23:03:51.602237: | 25 87 47 9a 80 1c df a9 17 32 ab 87 51 e4 b9 23 %.G......2..Q..# Jan 13 23:03:51.602246: | ce c9 1d 37 ...7 Jan 13 23:03:51.602279: | sent 1 messages Jan 13 23:03:51.602294: | announcing the state transition Jan 13 23:03:51.602308: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: established IKE SA Jan 13 23:03:51.602336: | #41 spent 1.49 (1.53) milliseconds in processing: Informational Request in v2_dispatch() Jan 13 23:03:51.602350: | delref struct msg_digest@0x55c838050b08(2->1) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:03:51.602365: | #41 spent 2.3 (2.34) milliseconds in ikev2_process_packet() Jan 13 23:03:51.602377: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:03:51.602389: | delref logger@0x55c838017ee8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:03:51.602399: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:03:51.602409: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:03:51.602421: | delref struct iface_endpoint@0x55c83801f058(4->3) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:03:51.602437: | spent 2.37 (2.41) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:03:51.660012: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:51.660036: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:51.660065: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:51.660078: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:51.660089: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:51.660100: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:51.660111: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:51.660121: | matches: 3 Jan 13 23:03:51.660131: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:51.660142: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:51.660155: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:51.660168: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:51.660179: | matches: 3 Jan 13 23:03:51.660223: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:51.660264: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:51.660279: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:51.660315: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:51.660335: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:51.660367: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:51.660384: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:51.660404: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:51.660422: | spent 0.423 (0.423) milliseconds in whack Jan 13 23:03:52.663934: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:52.663976: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:52.664005: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:52.664019: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:52.664034: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:52.664048: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:52.664063: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:52.664075: | matches: 3 Jan 13 23:03:52.664085: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:52.664098: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:52.664111: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:52.664123: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:52.664134: | matches: 3 Jan 13 23:03:52.664184: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:52.664228: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:52.664245: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:52.664279: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:52.664294: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:52.664340: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:52.664371: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:52.664392: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:52.664409: | spent 0.494 (0.493) milliseconds in whack Jan 13 23:03:53.667877: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:53.667908: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:53.667949: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:53.667964: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:53.667978: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:53.667993: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:53.668007: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:53.668018: | matches: 3 Jan 13 23:03:53.668028: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:53.668041: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:53.668054: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:53.668068: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:53.668079: | matches: 3 Jan 13 23:03:53.668127: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:53.668171: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:53.668187: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:53.668224: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:53.668239: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:53.668273: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:53.668289: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:53.668328: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:53.668349: | spent 0.481 (0.489) milliseconds in whack Jan 13 23:03:54.671767: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:54.671795: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:54.671837: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:54.671851: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:54.671866: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:54.671881: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:54.671895: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:54.671904: | matches: 3 Jan 13 23:03:54.671912: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:54.671922: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:54.671931: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:54.671942: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:54.671952: | matches: 3 Jan 13 23:03:54.672001: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:54.672043: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:54.672059: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:54.672092: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:54.672106: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:54.672137: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:54.672154: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:54.672176: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:54.672194: | spent 0.445 (0.444) milliseconds in whack Jan 13 23:03:55.677638: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:55.677682: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:55.677719: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:55.677750: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:55.677787: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:55.677798: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:55.677808: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:55.677817: | matches: 3 Jan 13 23:03:55.677827: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:55.677836: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:55.677847: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:55.677856: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:55.677865: | matches: 3 Jan 13 23:03:55.677921: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:55.677975: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:55.677992: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:55.678028: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:55.678040: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:55.678070: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:55.678093: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:55.678116: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:55.678144: | spent 0.528 (0.527) milliseconds in whack Jan 13 23:03:56.684325: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:56.684381: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:56.684422: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:56.684435: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:56.684453: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:56.684468: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:56.684480: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:56.684492: | matches: 3 Jan 13 23:03:56.684503: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:56.684517: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:56.684529: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:56.684543: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:56.684552: | matches: 3 Jan 13 23:03:56.684615: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:56.684658: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:56.684673: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:56.684715: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:56.684730: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:56.684761: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:56.684778: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:56.684803: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:56.684825: | spent 0.553 (0.551) milliseconds in whack Jan 13 23:03:57.692168: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:57.692216: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:57.692254: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:57.692267: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:57.692284: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:57.692297: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:57.692332: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:57.692354: | matches: 3 Jan 13 23:03:57.692367: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:57.692379: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:57.692393: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:57.692404: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:57.692413: | matches: 3 Jan 13 23:03:57.692476: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:57.692519: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:57.692557: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:57.692599: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:57.692614: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:57.692648: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:57.692665: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:57.692691: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:57.692713: | spent 0.576 (0.574) milliseconds in whack Jan 13 23:03:58.699473: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:58.699523: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:58.699562: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:58.699576: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:58.699593: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:58.699606: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:58.699618: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:58.699627: | matches: 3 Jan 13 23:03:58.699638: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:58.699650: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:58.699666: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:58.699677: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:58.699686: | matches: 3 Jan 13 23:03:58.699745: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:58.699794: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:58.699808: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:58.699851: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:58.699866: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:58.699900: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:58.699917: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:58.699941: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:58.699963: | spent 0.524 (0.522) milliseconds in whack Jan 13 23:03:59.706450: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:59.706497: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:03:59.706535: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:03:59.706548: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:59.706564: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:59.706579: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:59.706591: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:59.706602: | matches: 3 Jan 13 23:03:59.706612: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:03:59.706624: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:03:59.706637: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:03:59.706648: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:03:59.706659: | matches: 3 Jan 13 23:03:59.706715: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:03:59.706758: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:03:59.706773: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:59.706810: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:03:59.706825: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:03:59.706858: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:03:59.706875: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:59.706900: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:03:59.706922: | spent 0.5 (0.498) milliseconds in whack Jan 13 23:04:00.713321: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:00.713386: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:00.713423: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:00.713435: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:00.713450: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:00.713463: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:00.713474: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:00.713489: | matches: 3 Jan 13 23:04:00.713499: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:00.713511: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:00.713526: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:00.713537: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:00.713548: | matches: 3 Jan 13 23:04:00.713601: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:00.713645: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:00.713660: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:00.713696: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:00.713710: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:00.713743: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:00.713760: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:00.713783: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:00.713804: | spent 0.509 (0.508) milliseconds in whack Jan 13 23:04:01.720240: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:01.720285: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:01.720344: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:01.720367: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:01.720382: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:01.720402: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:01.720414: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:01.720427: | matches: 3 Jan 13 23:04:01.720438: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:01.720452: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:01.720463: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:01.720475: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:01.720486: | matches: 3 Jan 13 23:04:01.720547: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:01.720613: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:01.720634: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:01.720668: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:01.720682: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:01.720716: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:01.720743: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:01.720773: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:01.720806: | spent 0.581 (0.581) milliseconds in whack Jan 13 23:04:02.727331: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:02.727379: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:02.727418: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:02.727432: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:02.727450: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:02.727463: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:02.727474: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:02.727483: | matches: 3 Jan 13 23:04:02.727494: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:02.727505: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:02.727542: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:02.727554: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:02.727563: | matches: 3 Jan 13 23:04:02.727626: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:02.727672: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:02.727687: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:02.727726: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:02.727740: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:02.727774: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:02.727791: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:02.727815: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:02.727837: | spent 0.538 (0.536) milliseconds in whack Jan 13 23:04:03.735044: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:03.735091: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:03.735127: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:03.735140: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:03.735156: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:03.735169: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:03.735181: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:03.735197: | matches: 3 Jan 13 23:04:03.735208: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:03.735219: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:03.735231: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:03.735245: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:03.735254: | matches: 3 Jan 13 23:04:03.735313: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:03.735360: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:03.735373: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:03.735410: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:03.735424: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:03.735457: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:03.735474: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:03.735497: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:03.735518: | spent 0.501 (0.499) milliseconds in whack Jan 13 23:04:04.741976: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:04.742021: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:04.742057: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:04.742069: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:04.742085: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:04.742098: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:04.742109: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:04.742118: | matches: 3 Jan 13 23:04:04.742129: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:04.742147: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:04.742159: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:04.742179: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:04.742199: | matches: 3 Jan 13 23:04:04.742277: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:04.742324: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:04.742339: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:04.742380: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:04.742403: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:04.742448: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:04.742475: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:04.742531: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:04.742563: | spent 0.612 (0.61) milliseconds in whack Jan 13 23:04:05.749158: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:05.749211: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:05.749251: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:05.749264: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:05.749282: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:05.749294: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:05.749306: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:05.749315: | matches: 3 Jan 13 23:04:05.749326: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:05.749345: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:05.749356: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:05.749367: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:05.749380: | matches: 3 Jan 13 23:04:05.749440: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:05.749485: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:05.749501: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:05.749543: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:05.749558: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:05.749591: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:05.749609: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:05.749634: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:05.749656: | spent 0.532 (0.53) milliseconds in whack Jan 13 23:04:06.755824: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:06.755868: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:06.755903: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:06.755914: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:06.755929: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:06.755940: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:06.755951: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:06.755959: | matches: 3 Jan 13 23:04:06.755968: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:06.755986: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:06.755995: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:06.756008: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:06.756016: | matches: 3 Jan 13 23:04:06.756071: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:06.756111: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:06.756124: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:06.756168: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:06.756180: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:06.756211: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:06.756228: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:06.756249: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:06.756268: | spent 0.472 (0.471) milliseconds in whack Jan 13 23:04:07.762674: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:07.762716: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:07.762755: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:07.762772: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:07.762788: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:07.762801: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:07.762836: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:07.762846: | matches: 3 Jan 13 23:04:07.762857: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:07.762869: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:07.762884: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:07.762895: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:07.762904: | matches: 3 Jan 13 23:04:07.762969: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:07.763038: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:07.763058: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:07.763097: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:07.763111: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:07.763147: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:07.763173: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:07.763204: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:07.763239: | spent 0.582 (0.581) milliseconds in whack Jan 13 23:04:08.769987: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:08.770046: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:08.770085: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:08.770099: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:08.770117: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:08.770129: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:08.770142: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:08.770151: | matches: 3 Jan 13 23:04:08.770161: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:08.770173: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:08.770190: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:08.770201: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:08.770214: | matches: 3 Jan 13 23:04:08.770275: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:08.770320: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:08.770335: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:08.770379: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:08.770393: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:08.770426: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:08.770443: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:08.770470: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:08.770492: | spent 0.54 (0.538) milliseconds in whack Jan 13 23:04:09.776844: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:09.776888: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:09.776939: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:09.776968: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:09.776999: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:09.777023: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:09.777051: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:09.777068: | matches: 3 Jan 13 23:04:09.777085: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:09.777098: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:09.777110: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:09.777123: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:09.777142: | matches: 3 Jan 13 23:04:09.777221: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:09.777272: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:09.777286: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:09.777322: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:09.777355: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:09.777402: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:09.777433: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:09.777476: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:09.777512: | spent 0.688 (0.687) milliseconds in whack Jan 13 23:04:10.073878: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:04:10.073927: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:04:10.074010: | spent 0.0775 (0.0766) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 23:04:10.074043: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:04:10.074068: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:04:10.074093: | spent 0.022 (0.0216) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:04:10.784135: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:10.784184: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:10.784223: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:10.784237: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:10.784254: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:10.784266: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:10.784278: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:10.784287: | matches: 3 Jan 13 23:04:10.784297: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:10.784329: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:10.784349: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:10.784361: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:10.784370: | matches: 3 Jan 13 23:04:10.784429: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:10.784474: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:10.784490: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:10.784530: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:10.784545: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:10.784579: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:10.784597: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:10.784621: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:10.784643: | spent 0.539 (0.537) milliseconds in whack Jan 13 23:04:11.791018: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:11.791068: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:11.791104: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:11.791286: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:11.791305: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:11.791329: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:11.791335: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:11.791347: | matches: 3 Jan 13 23:04:11.791352: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:11.791358: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:11.791365: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:11.791371: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:11.791375: | matches: 3 Jan 13 23:04:11.791403: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:11.791424: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:11.791431: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:11.791450: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:11.791457: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:11.791474: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:11.791482: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:11.791507: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:11.791518: | spent 0.379 (0.528) milliseconds in whack Jan 13 23:04:12.797197: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:12.797245: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:12.797283: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:12.797296: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:12.797313: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:12.797326: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:12.797337: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:12.797353: | matches: 3 Jan 13 23:04:12.797364: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:12.797376: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:12.797387: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:12.797401: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:12.797410: | matches: 3 Jan 13 23:04:12.797468: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:12.797513: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:12.797529: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:12.797569: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:12.797583: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:12.797616: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:12.797634: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:12.797658: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:12.797684: | spent 0.519 (0.517) milliseconds in whack Jan 13 23:04:13.804108: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:13.804156: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:13.804194: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:13.804207: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:13.804224: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:13.804237: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:13.804248: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:13.804258: | matches: 3 Jan 13 23:04:13.804268: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:13.804280: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:13.804297: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:13.804329: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:13.804350: | matches: 3 Jan 13 23:04:13.804414: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:13.804457: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:13.804473: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:13.804513: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:13.804528: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:13.804562: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:13.804579: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:13.804604: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:13.804627: | spent 0.55 (0.548) milliseconds in whack Jan 13 23:04:14.811121: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:14.811169: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:14.811205: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:14.811219: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:14.811235: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:14.811274: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:14.811291: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:14.811301: | matches: 3 Jan 13 23:04:14.811312: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:14.811334: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:14.811358: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:14.811382: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:14.811398: | matches: 3 Jan 13 23:04:14.811467: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:14.811515: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:14.811530: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:14.811572: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:14.811593: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:14.811643: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:14.811669: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:14.811700: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:14.811732: | spent 0.638 (0.637) milliseconds in whack Jan 13 23:04:15.819019: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:15.819069: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:15.819107: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:15.819120: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:15.819137: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:15.819155: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:15.819178: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:15.819196: | matches: 3 Jan 13 23:04:15.819209: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:15.819222: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:15.819234: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:15.819247: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:15.819256: | matches: 3 Jan 13 23:04:15.819325: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:15.819379: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:15.819395: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:15.819436: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:15.819450: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:15.819484: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:15.819501: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:15.819526: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:15.819555: | spent 0.564 (0.563) milliseconds in whack Jan 13 23:04:16.825871: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:16.825920: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:16.825956: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:16.826159: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:16.826177: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:16.826200: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:16.826212: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:16.826224: | matches: 3 Jan 13 23:04:16.826236: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:16.826247: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:16.826261: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:16.826273: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:16.826283: | matches: 3 Jan 13 23:04:16.826336: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:16.826379: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:16.826394: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:16.826452: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:16.826468: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:16.826502: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:16.826519: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:16.826544: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:16.826565: | spent 0.543 (0.718) milliseconds in whack Jan 13 23:04:17.833022: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:17.833069: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:17.833108: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:17.833121: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:17.833138: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:17.833150: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:17.833162: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:17.833171: | matches: 3 Jan 13 23:04:17.833181: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:17.833200: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:17.833211: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:17.833223: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:17.833234: | matches: 3 Jan 13 23:04:17.833301: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:17.833352: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:17.833377: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:17.833426: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:17.833445: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:17.833487: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:17.833508: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:17.833535: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:17.833565: | spent 0.572 (0.57) milliseconds in whack Jan 13 23:04:18.839964: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:18.840012: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:18.840049: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:18.840063: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:18.840078: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:18.840093: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:18.840104: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:18.840113: | matches: 3 Jan 13 23:04:18.840124: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:18.840138: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:18.840149: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:18.840162: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:18.840177: | matches: 3 Jan 13 23:04:18.840249: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:18.840298: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:18.840340: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:18.840394: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:18.840415: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:18.840459: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:18.840483: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:18.840510: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:18.840542: | spent 0.604 (0.604) milliseconds in whack Jan 13 23:04:19.502161: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:19.502215: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:19.502279: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:19.502294: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:19.502312: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:19.502327: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:19.502340: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:19.502351: | matches: 3 Jan 13 23:04:19.502362: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:19.502374: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:19.502385: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:19.502398: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:19.502408: | matches: 3 Jan 13 23:04:19.502468: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:19.502542: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:19.502568: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:19.502633: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:19.502655: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:19.502707: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:19.502734: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:19.502772: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:19.502803: | spent 0.673 (0.671) milliseconds in whack Jan 13 23:04:20.508294: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:20.508367: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:20.508409: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:20.508425: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:20.508440: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:20.508454: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:20.508467: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:20.508479: | matches: 3 Jan 13 23:04:20.508490: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:20.508504: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:20.508516: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:20.508530: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:20.508539: | matches: 3 Jan 13 23:04:20.508592: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:20.508643: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:20.508670: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:20.508723: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:20.508745: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:20.508794: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:20.508820: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:20.508855: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:20.508886: | spent 0.614 (0.613) milliseconds in whack Jan 13 23:04:21.514438: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:21.514484: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:21.514523: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:21.514537: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:21.514553: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:21.514569: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:21.514581: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:21.514593: | matches: 3 Jan 13 23:04:21.514603: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:21.514615: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:21.514626: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:21.514658: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:21.514667: | matches: 3 Jan 13 23:04:21.514727: | 9594529.607304 - 9623299.607265 = -1 Jan 13 23:04:21.514780: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:21.514809: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:21.514867: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:21.514890: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:21.514942: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:21.514967: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:21.515003: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:21.515033: | spent 0.623 (0.622) milliseconds in whack Jan 13 23:04:21.585269: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c8380170d8 for CHILD SA #44 in state ESTABLISHED_CHILD_SA Jan 13 23:04:21.585312: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:04:21.585329: | delref tt@0x55c838048ba8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:04:21.585344: | delref state-event@0x55c8380170d8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:04:21.585366: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:21.585379: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:21.585418: | liveness: #44 updating #41 last contact from 9594469.613547 to 9594529.535876 (last IPsec traffic flow) Jan 13 23:04:21.585440: | liveness: #44 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.070555 seconds ago) Jan 13 23:04:21.585459: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #44 Jan 13 23:04:21.585474: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:04:21.585497: | #44 spent 0.23 (0.229) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:04:22.520808: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:22.520854: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:22.520888: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:22.520901: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:22.520917: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:22.520928: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:22.520939: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:22.520947: | matches: 3 Jan 13 23:04:22.520963: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:22.520974: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:22.520987: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:22.520997: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:22.521007: | matches: 3 Jan 13 23:04:22.521059: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:22.521120: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:22.521145: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:22.521198: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:22.521217: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:22.521261: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:22.521284: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:22.521316: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:22.521342: | spent 0.562 (0.561) milliseconds in whack Jan 13 23:04:23.526962: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:23.527010: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:23.527049: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:23.527063: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:23.527080: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:23.527119: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:23.527133: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:23.527142: | matches: 3 Jan 13 23:04:23.527153: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:23.527166: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:23.527178: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:23.527189: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:23.527201: | matches: 3 Jan 13 23:04:23.527262: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:23.527317: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:23.527345: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:23.527404: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:23.527426: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:23.527477: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:23.527503: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:23.527539: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:23.527570: | spent 0.636 (0.634) milliseconds in whack Jan 13 23:04:24.533026: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:24.533070: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:24.533108: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:24.533124: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:24.533140: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:24.533154: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:24.533167: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:24.533178: | matches: 3 Jan 13 23:04:24.533188: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:24.533203: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:24.533214: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:24.533227: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:24.533237: | matches: 3 Jan 13 23:04:24.533290: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:24.533340: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:24.533367: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:24.533421: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:24.533444: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:24.533494: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:24.533520: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:24.533555: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:24.533586: | spent 0.584 (0.583) milliseconds in whack Jan 13 23:04:25.539032: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:25.539076: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:25.539112: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:25.539125: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:25.539140: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:25.539152: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:25.539163: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:25.539172: | matches: 3 Jan 13 23:04:25.539183: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:25.539194: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:25.539211: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:25.539222: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:25.539232: | matches: 3 Jan 13 23:04:25.539289: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:25.539340: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:25.539388: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:25.539445: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:25.539469: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:25.539522: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:25.539553: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:25.539591: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:25.539620: | spent 0.611 (0.61) milliseconds in whack Jan 13 23:04:26.545138: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:26.545182: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:26.545218: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:26.545230: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:26.545245: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:26.545258: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:26.545270: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:26.545279: | matches: 3 Jan 13 23:04:26.545290: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:26.545307: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:26.545319: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:26.545330: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:26.545342: | matches: 3 Jan 13 23:04:26.545394: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:26.545459: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:26.545486: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:26.545541: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:26.545563: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:26.545612: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:26.545637: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:26.545672: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:26.545703: | spent 0.588 (0.587) milliseconds in whack Jan 13 23:04:27.551123: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:27.551170: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:27.551206: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:27.551220: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:27.551235: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:27.551247: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:27.551259: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:27.551274: | matches: 3 Jan 13 23:04:27.551285: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:27.551296: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:27.551308: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:27.551319: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:27.551327: | matches: 3 Jan 13 23:04:27.551383: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:27.551424: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:27.551438: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:27.551475: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:27.551489: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:27.551521: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:27.551538: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:27.551562: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:27.551584: | spent 0.486 (0.485) milliseconds in whack Jan 13 23:04:28.557259: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:28.557305: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:28.557365: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:28.557380: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:28.557396: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:28.557411: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:28.557422: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:28.557433: | matches: 3 Jan 13 23:04:28.557443: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:28.557453: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:28.557464: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:28.557489: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:28.557497: | matches: 3 Jan 13 23:04:28.557542: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:28.557577: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:28.557589: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:28.557621: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:28.557631: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:28.557657: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:28.557670: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:28.557689: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:28.557706: | spent 0.48 (0.478) milliseconds in whack Jan 13 23:04:29.561065: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:29.561091: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:29.561112: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:29.561119: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:29.561129: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:29.561136: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:29.561142: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:29.561147: | matches: 3 Jan 13 23:04:29.561152: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:29.561158: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:29.561164: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:29.561170: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:29.561174: | matches: 3 Jan 13 23:04:29.561208: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:29.561231: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:29.561240: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:29.561265: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:29.561272: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:29.561290: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:29.561299: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:29.561311: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:29.561321: | spent 0.275 (0.274) milliseconds in whack Jan 13 23:04:30.073878: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:04:30.073907: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:04:30.073920: | spent 0.00893 (0.00783) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:04:30.564337: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:30.564360: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:30.564383: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:30.564392: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:30.564402: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:30.564408: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:30.564415: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:30.564432: | matches: 3 Jan 13 23:04:30.564439: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:30.564445: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:30.564451: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:30.564456: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:30.564461: | matches: 3 Jan 13 23:04:30.564499: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:30.564535: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:30.564546: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:30.564571: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:30.564578: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:30.564597: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:30.564610: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:30.564626: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:30.564643: | spent 0.322 (0.322) milliseconds in whack Jan 13 23:04:31.567611: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:31.567635: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:31.567656: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:31.567665: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:31.567674: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:31.567694: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:31.567700: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:31.567705: | matches: 3 Jan 13 23:04:31.567710: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:31.567716: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:31.567722: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:31.567727: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:31.567731: | matches: 3 Jan 13 23:04:31.567769: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:31.567804: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:31.567814: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:31.567839: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:31.567847: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:31.567865: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:31.567879: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:31.567895: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:31.567913: | spent 0.316 (0.315) milliseconds in whack Jan 13 23:04:32.570859: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:32.570888: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:32.570909: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:32.570916: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:32.570926: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:32.570932: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:32.570938: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:32.570943: | matches: 3 Jan 13 23:04:32.570948: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:32.570954: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:32.570960: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:32.570965: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:32.570970: | matches: 3 Jan 13 23:04:32.571002: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:32.571026: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:32.571034: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:32.571058: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:32.571065: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:32.571096: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:32.571106: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:32.571118: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:32.571129: | spent 0.289 (0.288) milliseconds in whack Jan 13 23:04:33.576431: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:33.576475: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:33.576513: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:33.576542: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:33.576557: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:33.576566: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:33.576576: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:33.576583: | matches: 3 Jan 13 23:04:33.576597: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:33.576606: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:33.576615: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:33.576625: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:33.576632: | matches: 3 Jan 13 23:04:33.576686: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:33.576738: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:33.576753: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:33.576787: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:33.576798: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:33.576825: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:33.576845: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:33.576869: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:33.576895: | spent 0.489 (0.487) milliseconds in whack Jan 13 23:04:34.582098: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:34.582137: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:34.582174: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:34.582190: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:34.582206: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:34.582218: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:34.582230: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:34.582239: | matches: 3 Jan 13 23:04:34.582251: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:34.582269: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:34.582280: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:34.582292: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:34.582303: | matches: 3 Jan 13 23:04:34.582363: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:34.582429: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:34.582449: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:34.582485: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:34.582499: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:34.582534: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:34.582560: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:34.582589: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:34.582622: | spent 0.54 (0.539) milliseconds in whack Jan 13 23:04:35.588040: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:35.588082: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:35.588120: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:35.588137: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:35.588177: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:35.588190: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:35.588202: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:35.588214: | matches: 3 Jan 13 23:04:35.588226: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:35.588240: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:35.588252: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:35.588265: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:35.588274: | matches: 3 Jan 13 23:04:35.588358: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:35.588431: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:35.588452: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:35.588490: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:35.588505: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:35.588541: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:35.588569: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:35.588599: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:35.588633: | spent 0.611 (0.61) milliseconds in whack Jan 13 23:04:36.594061: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:36.594105: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:36.594141: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:36.594153: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:36.594169: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:36.594181: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:36.594192: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:36.594208: | matches: 3 Jan 13 23:04:36.594219: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:36.594230: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:36.594242: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:36.594256: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:36.594265: | matches: 3 Jan 13 23:04:36.594320: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:36.594361: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:36.594376: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:36.594409: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:36.594423: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:36.594455: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:36.594471: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:36.594496: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:36.594517: | spent 0.481 (0.479) milliseconds in whack Jan 13 23:04:37.599944: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:37.599985: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:37.600022: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:37.600039: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:37.600055: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:37.600067: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:37.600078: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:37.600095: | matches: 3 Jan 13 23:04:37.600106: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:37.600118: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:37.600129: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:37.600143: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:37.600151: | matches: 3 Jan 13 23:04:37.600212: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:37.600296: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:37.600338: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:37.600381: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:37.600396: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:37.600434: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:37.600462: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:37.600493: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:37.600526: | spent 0.598 (0.598) milliseconds in whack Jan 13 23:04:38.605877: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:38.605917: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:38.605955: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:38.605972: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:38.605988: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:38.606001: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:38.606012: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:38.606021: | matches: 3 Jan 13 23:04:38.606032: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:38.606044: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:38.606063: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:38.606075: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:38.606084: | matches: 3 Jan 13 23:04:38.606148: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:38.606215: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:38.606235: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:38.606271: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:38.606285: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:38.606321: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:38.606349: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:38.606379: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:38.606414: | spent 0.552 (0.551) milliseconds in whack Jan 13 23:04:39.612110: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:39.612156: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:39.612196: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:39.612214: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:39.612233: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:39.612245: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:39.612265: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:39.612274: | matches: 3 Jan 13 23:04:39.612285: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:39.612297: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:39.612336: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:39.612354: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:39.612364: | matches: 3 Jan 13 23:04:39.612433: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:39.612501: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:39.612521: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:39.612564: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:39.612579: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:39.612615: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:39.612642: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:39.612673: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:39.612707: | spent 0.62 (0.619) milliseconds in whack Jan 13 23:04:40.618224: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:40.618290: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:40.618328: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:40.618341: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:40.618356: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:40.618372: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:40.618383: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:40.618395: | matches: 3 Jan 13 23:04:40.618405: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:40.618417: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:40.618429: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:40.618440: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:40.618449: | matches: 3 Jan 13 23:04:40.618504: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:40.618545: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:40.618559: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:40.618595: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:40.618609: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:40.618643: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:40.618676: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:40.618700: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:40.618720: | spent 0.521 (0.519) milliseconds in whack Jan 13 23:04:41.624281: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:41.624343: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:41.624381: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:41.624395: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:41.624411: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:41.624425: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:41.624438: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:41.624447: | matches: 3 Jan 13 23:04:41.624458: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:41.624470: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:41.624481: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:41.624492: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:41.624501: | matches: 3 Jan 13 23:04:41.624557: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:41.624598: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:41.624612: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:41.624648: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:41.624662: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:41.624694: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:41.624710: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:41.624735: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:41.624756: | spent 0.501 (0.499) milliseconds in whack Jan 13 23:04:42.630472: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:42.630525: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:42.630564: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:42.630578: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:42.630595: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:42.630608: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:42.630620: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:42.630629: | matches: 3 Jan 13 23:04:42.630640: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:42.630675: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:42.630687: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:42.630699: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:42.630707: | matches: 3 Jan 13 23:04:42.630766: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:42.630810: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:42.630825: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:42.630866: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:42.630880: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:42.630913: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:42.630930: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:42.630955: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:42.630976: | spent 0.537 (0.535) milliseconds in whack Jan 13 23:04:43.636428: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:43.636468: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:43.636505: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:43.636522: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:43.636537: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:43.636552: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:43.636564: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:43.636576: | matches: 3 Jan 13 23:04:43.636587: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:43.636599: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:43.636610: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:43.636622: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:43.636631: | matches: 3 Jan 13 23:04:43.636691: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:43.636757: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:43.636777: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:43.636813: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:43.636827: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:43.636863: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:43.636890: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:43.636917: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:43.636950: | spent 0.536 (0.536) milliseconds in whack Jan 13 23:04:44.642476: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:44.642523: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:44.642559: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:44.642572: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:44.642588: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:44.642601: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:44.642613: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:44.642622: | matches: 3 Jan 13 23:04:44.642632: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:44.642644: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:44.642660: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:44.642672: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:44.642681: | matches: 3 Jan 13 23:04:44.642737: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:44.642781: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:44.642796: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:44.642833: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:44.642847: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:44.642880: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:44.642897: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:44.642944: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:44.642967: | spent 0.518 (0.517) milliseconds in whack Jan 13 23:04:45.648640: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:45.648683: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:45.648727: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:45.648742: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:45.648757: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:45.648769: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:45.648780: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:45.648795: | matches: 3 Jan 13 23:04:45.648806: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:45.648817: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:45.648829: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:45.648840: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:45.648849: | matches: 3 Jan 13 23:04:45.648904: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:45.648951: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:45.648970: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:45.649007: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:45.649029: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:45.649063: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:45.649079: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:45.649103: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:45.649122: | spent 0.505 (0.504) milliseconds in whack Jan 13 23:04:46.654713: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:46.654759: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:46.654796: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:46.654809: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:46.654825: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:46.654840: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:46.654851: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:46.654862: | matches: 3 Jan 13 23:04:46.654873: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:46.654890: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:46.654901: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:46.654912: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:46.654922: | matches: 3 Jan 13 23:04:46.654980: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:46.655022: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:46.655037: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:46.655075: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:46.655089: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:46.655122: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:46.655140: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:46.655164: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:46.655185: | spent 0.501 (0.499) milliseconds in whack Jan 13 23:04:47.660777: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:47.660828: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:47.660868: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:47.660887: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:47.660903: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:47.660938: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:47.660951: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:47.660962: | matches: 3 Jan 13 23:04:47.660973: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:47.660984: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:47.660995: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:47.661006: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:47.661015: | matches: 3 Jan 13 23:04:47.661071: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:47.661113: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:47.661126: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:47.661163: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:47.661177: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:47.661213: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:47.661231: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:47.661255: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:47.661277: | spent 0.529 (0.528) milliseconds in whack Jan 13 23:04:48.666834: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:48.666880: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:48.666917: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:48.666930: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:48.666946: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:48.666961: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:48.666973: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:48.666985: | matches: 3 Jan 13 23:04:48.666996: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:48.667010: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:48.667022: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:48.667035: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:48.667044: | matches: 3 Jan 13 23:04:48.667104: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:48.667146: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:48.667161: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:48.667199: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:48.667213: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:48.667246: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:48.667263: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:48.667288: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:48.667309: | spent 0.503 (0.502) milliseconds in whack Jan 13 23:04:49.670988: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:49.671017: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:49.671040: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:49.671048: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:49.671058: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:49.671065: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:49.671072: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:49.671077: | matches: 3 Jan 13 23:04:49.671083: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:49.671093: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:49.671100: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:49.671106: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:49.671112: | matches: 3 Jan 13 23:04:49.671147: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:49.671172: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:49.671181: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:49.671225: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:49.671233: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:49.671253: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:49.671263: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:49.671276: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:49.671288: | spent 0.321 (0.32) milliseconds in whack Jan 13 23:04:50.063723: | processing global timer EVENT_PENDING_PHASE2 Jan 13 23:04:50.063767: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 23:04:50.063780: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:04:50.063787: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 23:04:50.063792: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:04:50.063798: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 23:04:50.063803: | found "L2TP-PSK-common" Jan 13 23:04:50.063808: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 23:04:50.063812: | found "L2TP-PSK-noNAT" Jan 13 23:04:50.063817: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 23:04:50.063821: | found "L2TP-PSK-NAT" Jan 13 23:04:50.063826: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 23:04:50.063830: | found "MYCONN-ikev2-cp" Jan 13 23:04:50.063835: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 23:04:50.063839: | matches: 6 Jan 13 23:04:50.063850: | spent 0.0918 (0.0905) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 23:04:50.063857: | processing global timer EVENT_PENDING_DDNS Jan 13 23:04:50.063863: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:04:50.063870: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:04:50.063876: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:04:50.063882: | found "L2TP-PSK-common" Jan 13 23:04:50.063886: | found "L2TP-PSK-noNAT" Jan 13 23:04:50.063891: | found "L2TP-PSK-NAT" Jan 13 23:04:50.063896: | found "MYCONN-ikev2-cp" Jan 13 23:04:50.063900: | matches: 6 Jan 13 23:04:50.063905: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:04:50.063928: | spent 0.0627 (0.0629) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:04:50.063936: | spent 0.0724 (0.0724) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:04:50.072019: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:04:50.072042: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:04:50.072065: | spent 0.0214 (0.0207) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:04:50.674352: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:50.674376: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:50.674411: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:50.674421: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:50.674431: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:50.674437: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:50.674444: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:50.674448: | matches: 3 Jan 13 23:04:50.674454: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:50.674462: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:50.674468: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:50.674474: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:50.674479: | matches: 3 Jan 13 23:04:50.674517: | 9594559.606528 - 9623299.607265 = -1 Jan 13 23:04:50.674553: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:50.674563: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:50.674588: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:50.674610: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:50.674630: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:50.674643: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:50.674665: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:50.674683: | spent 0.345 (0.344) milliseconds in whack Jan 13 23:04:51.584651: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #44 in state ESTABLISHED_CHILD_SA Jan 13 23:04:51.584680: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:04:51.584702: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:04:51.584710: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:04:51.584726: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:51.584733: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:51.584761: | liveness: #44 updating #41 last contact from 9594529.535876 to 9594559.605791 (last IPsec traffic flow) Jan 13 23:04:51.584772: | liveness: #44 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:04:51.584782: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #44 Jan 13 23:04:51.584790: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:04:51.584806: | #44 spent 0.157 (0.156) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:04:51.677708: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:51.677729: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:51.677750: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:51.677757: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:51.677765: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:51.677771: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:51.677778: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:51.677782: | matches: 3 Jan 13 23:04:51.677788: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:51.677797: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:51.677803: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:51.677808: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:51.677814: | matches: 3 Jan 13 23:04:51.677845: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:51.677866: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:51.677874: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:51.677891: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:51.677899: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:51.677916: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:51.677925: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:51.677938: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:51.677949: | spent 0.257 (0.256) milliseconds in whack Jan 13 23:04:52.681066: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:52.681099: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:52.681274: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:52.681283: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:52.681297: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:52.681304: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:52.681311: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:52.681316: | matches: 3 Jan 13 23:04:52.681322: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:52.681328: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:52.681345: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:52.681351: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:52.681356: | matches: 3 Jan 13 23:04:52.681390: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:52.681414: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:52.681422: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:52.681448: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:52.681455: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:52.681472: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:52.681481: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:52.681495: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:52.681506: | spent 0.316 (0.459) milliseconds in whack Jan 13 23:04:53.684606: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:53.684646: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:53.684668: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:53.684676: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:53.684686: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:53.684692: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:53.684699: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:53.684703: | matches: 3 Jan 13 23:04:53.684709: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:53.684719: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:53.684725: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:53.684732: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:53.684737: | matches: 3 Jan 13 23:04:53.684771: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:53.684795: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:53.684803: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:53.684829: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:53.684836: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:53.684853: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:53.684862: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:53.684877: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:53.684888: | spent 0.303 (0.301) milliseconds in whack Jan 13 23:04:54.690270: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:54.690320: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:54.690360: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:54.690374: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:54.690392: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:54.690405: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:54.690418: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:54.690427: | matches: 3 Jan 13 23:04:54.690439: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:54.690457: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:54.690469: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:54.690484: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:54.690494: | matches: 3 Jan 13 23:04:54.690566: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:54.690608: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:54.690623: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:54.690663: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:54.690677: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:54.690708: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:54.690724: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:54.690788: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:54.690811: | spent 0.568 (0.573) milliseconds in whack Jan 13 23:04:55.696457: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:55.696501: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:55.696536: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:55.696549: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:55.696565: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:55.696581: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:55.696593: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:55.696603: | matches: 3 Jan 13 23:04:55.696613: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:55.696624: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:55.696634: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:55.696644: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:55.696653: | matches: 3 Jan 13 23:04:55.696708: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:55.696751: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:55.696764: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:55.696801: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:55.696812: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:55.696843: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:55.696858: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:55.696881: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:55.696899: | spent 0.471 (0.469) milliseconds in whack Jan 13 23:04:56.702424: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:56.702472: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:56.702509: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:56.702522: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:56.702538: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:56.702551: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:56.702562: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:56.702578: | matches: 3 Jan 13 23:04:56.702589: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:56.702600: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:56.702612: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:56.702626: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:56.702635: | matches: 3 Jan 13 23:04:56.702705: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:56.702756: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:56.702779: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:56.702826: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:56.702845: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:56.702882: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:56.702908: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:56.702934: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:56.702964: | spent 0.569 (0.567) milliseconds in whack Jan 13 23:04:57.708654: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:57.708702: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:57.708913: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:57.708921: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:57.708935: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:57.708942: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:57.708975: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:57.708988: | matches: 3 Jan 13 23:04:57.708999: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:57.709010: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:57.709021: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:57.709041: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:57.709046: | matches: 3 Jan 13 23:04:57.709083: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:57.709110: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:57.709122: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:57.709147: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:57.709156: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:57.709176: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:57.709189: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:57.709202: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:57.709219: | spent 0.439 (0.593) milliseconds in whack Jan 13 23:04:58.714412: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:58.714460: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:58.714497: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:58.714511: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:58.714527: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:58.714542: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:58.714555: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:58.714567: | matches: 3 Jan 13 23:04:58.714578: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:58.714591: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:58.714602: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:58.714614: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:58.714622: | matches: 3 Jan 13 23:04:58.714693: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:58.714744: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:58.714768: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:58.714817: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:58.714835: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:58.714875: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:58.714898: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:58.714924: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:58.714954: | spent 0.569 (0.568) milliseconds in whack Jan 13 23:04:59.720368: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:59.720413: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:04:59.720449: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:04:59.720461: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:59.720476: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:59.720490: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:59.720503: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:59.720515: | matches: 3 Jan 13 23:04:59.720533: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:04:59.720558: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:04:59.720578: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:04:59.720600: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:04:59.720616: | matches: 3 Jan 13 23:04:59.720681: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:04:59.720728: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:04:59.720751: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:59.720837: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:04:59.720861: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:04:59.720901: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:04:59.720926: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:59.720952: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:04:59.720981: | spent 0.631 (0.637) milliseconds in whack Jan 13 23:05:00.726417: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:00.726463: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:00.726499: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:00.726512: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:00.726528: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:00.726540: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:00.726559: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:00.726569: | matches: 3 Jan 13 23:05:00.726579: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:00.726590: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:00.726602: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:00.726613: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:00.726622: | matches: 3 Jan 13 23:05:00.726678: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:00.726718: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:00.726734: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:00.726768: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:00.726781: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:00.726813: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:00.726833: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:00.726857: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:00.726877: | spent 0.486 (0.485) milliseconds in whack Jan 13 23:05:01.732470: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:01.732514: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:01.732551: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:01.732567: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:01.732584: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:01.732595: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:01.732606: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:01.732615: | matches: 3 Jan 13 23:05:01.732625: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:01.732635: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:01.732646: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:01.732657: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:01.732665: | matches: 3 Jan 13 23:05:01.732735: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:01.732782: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:01.732804: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:01.732851: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:01.732867: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:01.732904: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:01.732924: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:01.732946: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:01.732974: | spent 0.527 (0.526) milliseconds in whack Jan 13 23:05:02.738105: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:02.738159: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:02.738372: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:02.738401: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:02.738429: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:02.738455: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:02.738481: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:02.738501: | matches: 3 Jan 13 23:05:02.738519: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:02.738542: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:02.738565: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:02.738588: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:02.738603: | matches: 3 Jan 13 23:05:02.738660: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:02.738720: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:02.738748: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:02.738808: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:02.738831: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:02.738885: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:02.738912: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:02.738948: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:02.738980: | spent 0.79 (0.903) milliseconds in whack Jan 13 23:05:03.742573: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:03.742604: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:03.742625: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:03.742632: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:03.742641: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:03.742648: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:03.742654: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:03.742659: | matches: 3 Jan 13 23:05:03.742664: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:03.742670: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:03.742680: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:03.742686: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:03.742690: | matches: 3 Jan 13 23:05:03.742724: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:03.742747: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:03.742755: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:03.742779: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:03.742786: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:03.742805: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:03.742816: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:03.742836: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:03.742853: | spent 0.299 (0.298) milliseconds in whack Jan 13 23:05:04.745931: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:04.745961: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:04.745989: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:04.746003: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:04.746018: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:04.746030: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:04.746043: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:04.746053: | matches: 3 Jan 13 23:05:04.746062: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:04.746074: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:04.746084: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:04.746094: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:04.746116: | matches: 3 Jan 13 23:05:04.746159: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:04.746200: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:04.746212: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:04.746244: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:04.746255: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:04.746282: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:04.746295: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:04.746314: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:04.746331: | spent 0.418 (0.417) milliseconds in whack Jan 13 23:05:05.749422: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:05.749451: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:05.749473: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:05.749480: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:05.749489: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:05.749497: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:05.749503: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:05.749509: | matches: 3 Jan 13 23:05:05.749515: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:05.749520: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:05.749526: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:05.749533: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:05.749537: | matches: 3 Jan 13 23:05:05.749572: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:05.749611: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:05.749626: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:05.749661: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:05.749672: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:05.749698: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:05.749712: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:05.749734: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:05.749750: | spent 0.347 (0.346) milliseconds in whack Jan 13 23:05:06.752785: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:06.752815: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:06.752836: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:06.752843: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:06.752853: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:06.752859: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:06.752866: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:06.752870: | matches: 3 Jan 13 23:05:06.752875: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:06.752881: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:06.752887: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:06.752895: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:06.752900: | matches: 3 Jan 13 23:05:06.752936: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:06.752972: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:06.752987: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:06.753020: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:06.753031: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:06.753056: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:06.753069: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:06.753089: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:06.753117: | spent 0.35 (0.349) milliseconds in whack Jan 13 23:05:07.756608: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:07.756645: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:07.756672: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:07.756681: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:07.756693: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:07.756701: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:07.756710: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:07.756716: | matches: 3 Jan 13 23:05:07.756723: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:07.756730: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:07.756738: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:07.756746: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:07.756752: | matches: 3 Jan 13 23:05:07.756792: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:07.756840: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:07.756858: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:07.756900: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:07.756914: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:07.756948: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:07.756965: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:07.756988: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:07.757009: | spent 0.436 (0.435) milliseconds in whack Jan 13 23:05:08.762291: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:08.762333: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:08.762372: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:08.762390: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:08.762407: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:08.762419: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:08.762432: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:08.762441: | matches: 3 Jan 13 23:05:08.762452: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:08.762463: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:08.762474: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:08.762486: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:08.762495: | matches: 3 Jan 13 23:05:08.762563: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:08.762631: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:08.762651: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:08.762692: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:08.762707: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:08.762742: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:08.762770: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:08.762798: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:08.762834: | spent 0.561 (0.56) milliseconds in whack Jan 13 23:05:09.770465: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:09.770522: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:09.770567: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:09.770576: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:09.770587: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:09.770594: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:09.770601: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:09.770606: | matches: 3 Jan 13 23:05:09.770627: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:09.770634: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:09.770641: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:09.770648: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:09.770653: | matches: 3 Jan 13 23:05:09.770689: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:09.770715: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:09.770725: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:09.770749: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:09.770757: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:09.770776: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:09.770786: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:09.770800: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:09.770813: | spent 0.37 (0.369) milliseconds in whack Jan 13 23:05:10.071185: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:05:10.071229: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:05:10.071248: | spent 0.0153 (0.014) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:05:10.774097: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:10.774125: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:10.774146: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:10.774154: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:10.774163: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:10.774172: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:10.774178: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:10.774183: | matches: 3 Jan 13 23:05:10.774189: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:10.774195: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:10.774200: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:10.774207: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:10.774211: | matches: 3 Jan 13 23:05:10.774247: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:10.774282: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:10.774296: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:10.774331: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:10.774343: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:10.774369: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:10.774384: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:10.774401: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:10.774418: | spent 0.339 (0.337) milliseconds in whack Jan 13 23:05:11.777489: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:11.777516: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:11.777537: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:11.777544: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:11.777554: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:11.777560: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:11.777567: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:11.777571: | matches: 3 Jan 13 23:05:11.777577: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:11.777582: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:11.777588: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:11.777594: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:11.777599: | matches: 3 Jan 13 23:05:11.777634: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:11.777668: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:11.777700: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:11.777733: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:11.777745: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:11.777770: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:11.777783: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:11.777801: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:11.777817: | spent 0.346 (0.345) milliseconds in whack Jan 13 23:05:12.780876: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:12.780907: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:12.780933: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:12.780941: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:12.780951: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:12.780958: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:12.780965: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:12.780973: | matches: 3 Jan 13 23:05:12.780983: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:12.780996: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:12.781005: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:12.781016: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:12.781024: | matches: 3 Jan 13 23:05:12.781072: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:12.781114: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:12.781127: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:12.781162: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:12.781176: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:12.781202: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:12.781214: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:12.781232: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:12.781248: | spent 0.39 (0.389) milliseconds in whack Jan 13 23:05:13.784318: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:13.784348: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:13.784372: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:13.784380: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:13.784398: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:13.784407: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:13.784413: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:13.784420: | matches: 3 Jan 13 23:05:13.784426: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:13.784431: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:13.784439: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:13.784445: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:13.784452: | matches: 3 Jan 13 23:05:13.784486: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:13.784527: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:13.784540: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:13.784574: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:13.784585: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:13.784611: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:13.784624: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:13.784646: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:13.784663: | spent 0.376 (0.375) milliseconds in whack Jan 13 23:05:14.787725: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:14.787768: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:14.787791: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:14.787802: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:14.787812: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:14.787819: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:14.787826: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:14.787832: | matches: 3 Jan 13 23:05:14.787837: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:14.787843: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:14.787850: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:14.787855: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:14.787861: | matches: 3 Jan 13 23:05:14.787894: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:14.787926: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:14.787940: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:14.787972: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:14.787984: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:14.788010: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:14.788023: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:14.788042: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:14.788058: | spent 0.35 (0.349) milliseconds in whack Jan 13 23:05:15.791167: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:15.791196: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:15.791217: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:15.791225: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:15.791235: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:15.791244: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:15.791250: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:15.791255: | matches: 3 Jan 13 23:05:15.791261: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:15.791266: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:15.791272: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:15.791277: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:15.791282: | matches: 3 Jan 13 23:05:15.791317: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:15.791352: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:15.791367: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:15.791401: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:15.791412: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:15.791438: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:15.791452: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:15.791472: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:15.791488: | spent 0.341 (0.34) milliseconds in whack Jan 13 23:05:16.796894: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:16.796955: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:16.797013: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:16.797046: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:16.797081: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:16.797110: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:16.797136: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:16.797157: | matches: 3 Jan 13 23:05:16.797181: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:16.797208: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:16.797264: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:16.797292: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:16.797313: | matches: 3 Jan 13 23:05:16.797406: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:16.797489: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:16.797522: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:16.797591: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:16.797620: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:16.797686: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:16.797714: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:16.797749: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:16.797780: | spent 0.919 (0.917) milliseconds in whack Jan 13 23:05:17.801287: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:17.801327: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:17.801492: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:17.801512: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:17.801531: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:17.801546: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:17.801558: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:17.801569: | matches: 3 Jan 13 23:05:17.801582: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:17.801596: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:17.801608: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:17.801621: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:17.801632: | matches: 3 Jan 13 23:05:17.801682: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:17.801726: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:17.801741: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:17.801772: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:17.801786: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:17.801820: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:17.801836: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:17.801856: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:17.801876: | spent 0.489 (0.606) milliseconds in whack Jan 13 23:05:18.804911: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:18.804942: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:18.804984: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:18.804998: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:18.805013: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:18.805027: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:18.805041: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:18.805051: | matches: 3 Jan 13 23:05:18.805063: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:18.805077: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:18.805090: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:18.805103: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:18.805113: | matches: 3 Jan 13 23:05:18.805163: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:18.805209: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:18.805226: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:18.805262: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:18.805277: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:18.805306: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:18.805319: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:18.805355: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:18.805375: | spent 0.484 (0.482) milliseconds in whack Jan 13 23:05:19.808391: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:19.808422: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:19.808453: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:19.808469: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:19.808487: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:19.808501: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:19.808515: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:19.808525: | matches: 3 Jan 13 23:05:19.808538: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:19.808551: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:19.808565: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:19.808578: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:19.808589: | matches: 3 Jan 13 23:05:19.808639: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:19.808681: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:19.808697: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:19.808733: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:19.808748: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:19.808782: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:19.808798: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:19.808817: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:19.808832: | spent 0.46 (0.459) milliseconds in whack Jan 13 23:05:20.811894: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:20.811925: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:20.811955: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:20.811970: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:20.811985: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:20.812000: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:20.812016: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:20.812026: | matches: 3 Jan 13 23:05:20.812038: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:20.812051: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:20.812064: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:20.812077: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:20.812088: | matches: 3 Jan 13 23:05:20.812138: | 9594589.605852 - 9623299.607265 = -1 Jan 13 23:05:20.812181: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:20.812198: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:20.812229: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:20.812240: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:20.812267: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:20.812284: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:20.812315: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:20.812338: | spent 0.463 (0.462) milliseconds in whack Jan 13 23:05:21.590201: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #44 in state ESTABLISHED_CHILD_SA Jan 13 23:05:21.590249: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:05:21.590264: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:05:21.590277: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:05:21.590301: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:21.590313: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:21.590383: | liveness: #44 updating #41 last contact from 9594559.605791 to 9594589.611364 (last IPsec traffic flow) Jan 13 23:05:21.590402: | liveness: #44 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic) Jan 13 23:05:21.590416: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #44 Jan 13 23:05:21.590429: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:05:21.590452: | #44 spent 0.254 (0.252) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:05:21.817777: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:21.817818: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:21.817857: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:21.817874: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:21.817891: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:21.817904: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:21.817922: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:21.817932: | matches: 3 Jan 13 23:05:21.817943: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:21.817958: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:21.817969: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:21.817981: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:21.817992: | matches: 3 Jan 13 23:05:21.818058: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:21.818123: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:21.818142: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:21.818178: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:21.818192: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:21.818229: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:21.818256: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:21.818286: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:21.818319: | spent 0.559 (0.558) milliseconds in whack Jan 13 23:05:22.824106: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:22.824161: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:22.824401: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:22.824423: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:22.824440: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:22.824455: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:22.824467: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:22.824476: | matches: 3 Jan 13 23:05:22.824486: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:22.824498: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:22.824513: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:22.824524: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:22.824533: | matches: 3 Jan 13 23:05:22.824595: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:22.824638: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:22.824653: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:22.824695: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:22.824709: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:22.824743: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:22.824760: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:22.824784: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:22.824805: | spent 0.544 (0.729) milliseconds in whack Jan 13 23:05:23.830434: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:23.830501: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:23.830540: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:23.830554: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:23.830570: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:23.830582: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:23.830594: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:23.830603: | matches: 3 Jan 13 23:05:23.830613: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:23.830625: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:23.830643: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:23.830654: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:23.830663: | matches: 3 Jan 13 23:05:23.830720: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:23.830765: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:23.830780: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:23.830818: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:23.830833: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:23.830866: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:23.830883: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:23.830907: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:23.830929: | spent 0.524 (0.523) milliseconds in whack Jan 13 23:05:24.836595: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:24.836641: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:24.836676: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:24.836689: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:24.836703: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:24.836715: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:24.836726: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:24.836735: | matches: 3 Jan 13 23:05:24.836746: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:24.836757: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:24.836768: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:24.836780: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:24.836801: | matches: 3 Jan 13 23:05:24.836856: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:24.836896: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:24.836911: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:24.836945: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:24.836960: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:24.836992: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:24.837009: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:24.837033: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:24.837054: | spent 0.484 (0.482) milliseconds in whack Jan 13 23:05:25.842488: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:25.842534: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:25.842571: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:25.842587: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:25.842603: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:25.842617: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:25.842630: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:25.842642: | matches: 3 Jan 13 23:05:25.842653: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:25.842667: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:25.842698: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:25.842710: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:25.842722: | matches: 3 Jan 13 23:05:25.842774: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:25.842813: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:25.842828: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:25.842865: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:25.842879: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:25.842913: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:25.842930: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:25.842952: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:25.842973: | spent 0.511 (0.509) milliseconds in whack Jan 13 23:05:26.848571: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:26.848618: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:26.848654: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:26.848667: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:26.848683: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:26.848695: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:26.848706: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:26.848714: | matches: 3 Jan 13 23:05:26.848724: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:26.848734: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:26.848751: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:26.848761: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:26.848771: | matches: 3 Jan 13 23:05:26.848840: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:26.848880: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:26.848893: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:26.848928: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:26.848940: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:26.848968: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:26.848983: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:26.849005: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:26.849024: | spent 0.483 (0.482) milliseconds in whack Jan 13 23:05:27.852364: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:27.852393: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:27.852421: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:27.852431: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:27.852441: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:27.852448: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:27.852455: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:27.852460: | matches: 3 Jan 13 23:05:27.852466: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:27.852471: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:27.852478: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:27.852483: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:27.852488: | matches: 3 Jan 13 23:05:27.852522: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:27.852567: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:27.852577: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:27.852601: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:27.852608: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:27.852653: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:27.852664: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:27.852691: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:27.852703: | spent 0.344 (0.358) milliseconds in whack Jan 13 23:05:28.855691: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:28.855715: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:28.855749: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:28.855758: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:28.855768: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:28.855775: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:28.855781: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:28.855788: | matches: 3 Jan 13 23:05:28.855794: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:28.855800: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:28.855806: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:28.855812: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:28.855818: | matches: 3 Jan 13 23:05:28.855854: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:28.855889: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:28.855899: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:28.855923: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:28.855930: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:28.855949: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:28.855962: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:28.855977: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:28.855995: | spent 0.317 (0.316) milliseconds in whack Jan 13 23:05:29.859045: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:29.859075: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:29.859096: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:29.859104: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:29.859113: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:29.859120: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:29.859126: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:29.859131: | matches: 3 Jan 13 23:05:29.859136: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:29.859145: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:29.859151: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:29.859156: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:29.859162: | matches: 3 Jan 13 23:05:29.859195: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:29.859220: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:29.859229: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:29.859254: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:29.859262: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:29.859279: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:29.859288: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:29.859301: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:29.859312: | spent 0.288 (0.286) milliseconds in whack Jan 13 23:05:30.072549: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:05:30.072585: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:05:30.072596: | spent 0.0217 (0.021) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:05:30.864728: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:30.864779: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:30.864818: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:30.864874: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:30.864893: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:30.864904: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:30.864919: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:30.864928: | matches: 3 Jan 13 23:05:30.864938: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:30.864950: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:30.864961: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:30.864980: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:30.864997: | matches: 3 Jan 13 23:05:30.865069: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:30.865114: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:30.865164: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:30.865216: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:30.865282: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:30.865325: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:30.865345: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:30.865373: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:30.865400: | spent 0.68 (0.703) milliseconds in whack Jan 13 23:05:31.870951: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:31.870996: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:31.871032: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:31.871045: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:31.871061: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:31.871073: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:31.871085: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:31.871102: | matches: 3 Jan 13 23:05:31.871119: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:31.871143: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:31.871161: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:31.871187: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:31.871206: | matches: 3 Jan 13 23:05:31.871275: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:31.871322: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:31.871342: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:31.871383: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:31.871401: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:31.871440: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:31.871461: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:31.871488: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:31.871518: | spent 0.607 (0.606) milliseconds in whack Jan 13 23:05:32.877268: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:32.877323: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:32.877561: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:32.877572: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:32.877584: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:32.877622: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:32.877633: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:32.877643: | matches: 3 Jan 13 23:05:32.877655: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:32.877667: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:32.877678: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:32.877689: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:32.877697: | matches: 3 Jan 13 23:05:32.877751: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:32.877780: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:32.877790: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:32.877816: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:32.877825: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:32.877846: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:32.877856: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:32.877870: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:32.877886: | spent 0.476 (0.651) milliseconds in whack Jan 13 23:05:33.883156: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:33.883201: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:33.883237: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:33.883249: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:33.883264: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:33.883277: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:33.883288: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:33.883297: | matches: 3 Jan 13 23:05:33.883308: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:33.883319: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:33.883337: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:33.883349: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:33.883361: | matches: 3 Jan 13 23:05:33.883416: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:33.883459: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:33.883474: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:33.883510: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:33.883524: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:33.883556: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:33.883574: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:33.883598: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:33.883619: | spent 0.487 (0.486) milliseconds in whack Jan 13 23:05:34.889250: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:34.889297: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:34.889336: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:34.889349: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:34.889365: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:34.889378: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:34.889389: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:34.889405: | matches: 3 Jan 13 23:05:34.889415: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:34.889426: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:34.889438: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:34.889451: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:34.889460: | matches: 3 Jan 13 23:05:34.889538: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:34.889588: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:34.889609: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:34.889654: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:34.889672: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:34.889711: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:34.889733: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:34.889759: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:34.889787: | spent 0.567 (0.565) milliseconds in whack Jan 13 23:05:35.895328: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:35.895370: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:35.895409: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:35.895427: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:35.895443: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:35.895455: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:35.895467: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:35.895485: | matches: 3 Jan 13 23:05:35.895496: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:35.895508: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:35.895519: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:35.895534: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:35.895543: | matches: 3 Jan 13 23:05:35.895608: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:35.895674: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:35.895721: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:35.895762: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:35.895777: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:35.895862: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:35.895893: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:35.895921: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:35.895955: | spent 0.617 (0.643) milliseconds in whack Jan 13 23:05:36.901507: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:36.901552: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:36.901588: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:36.901601: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:36.901616: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:36.901628: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:36.901640: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:36.901654: | matches: 3 Jan 13 23:05:36.901665: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:36.901677: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:36.901688: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:36.901699: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:36.901708: | matches: 3 Jan 13 23:05:36.901761: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:36.901803: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:36.901817: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:36.901853: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:36.901867: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:36.901899: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:36.901916: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:36.901942: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:36.901963: | spent 0.483 (0.481) milliseconds in whack Jan 13 23:05:37.907444: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:37.907493: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:37.907707: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:37.907727: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:37.907776: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:37.907786: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:37.907793: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:37.907797: | matches: 3 Jan 13 23:05:37.907803: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:37.907821: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:37.907827: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:37.907833: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:37.907838: | matches: 3 Jan 13 23:05:37.907866: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:37.907887: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:37.907894: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:37.907913: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:37.907920: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:37.907937: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:37.907945: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:37.907958: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:37.907968: | spent 0.396 (0.552) milliseconds in whack Jan 13 23:05:38.913247: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:38.913297: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:38.913336: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:38.913350: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:38.913367: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:38.913380: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:38.913392: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:38.913409: | matches: 3 Jan 13 23:05:38.913420: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:38.913431: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:38.913442: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:38.913455: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:38.913464: | matches: 3 Jan 13 23:05:38.913522: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:38.913591: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:38.913617: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:38.913673: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:38.913695: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:38.913745: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:38.913771: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:38.913807: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:38.913838: | spent 0.619 (0.617) milliseconds in whack Jan 13 23:05:39.919471: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:39.919569: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:39.919614: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:39.919631: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:39.919646: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:39.919661: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:39.919673: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:39.919682: | matches: 3 Jan 13 23:05:39.919694: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:39.919707: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:39.919719: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:39.919731: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:39.919742: | matches: 3 Jan 13 23:05:39.919848: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:39.919928: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:39.919954: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:39.920106: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:39.920137: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:39.920197: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:39.920247: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:39.920427: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:39.920450: | spent 1 (1) milliseconds in whack Jan 13 23:05:40.926168: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:40.926217: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:40.926256: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:40.926270: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:40.926287: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:40.926300: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:40.926311: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:40.926327: | matches: 3 Jan 13 23:05:40.926338: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:40.926349: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:40.926363: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:40.926378: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:40.926399: | matches: 3 Jan 13 23:05:40.926474: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:40.926538: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:40.926558: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:40.926610: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:40.926628: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:40.926669: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:40.926691: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:40.926719: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:40.926749: | spent 0.613 (0.612) milliseconds in whack Jan 13 23:05:41.931576: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:41.931619: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:41.931655: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:41.931668: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:41.931683: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:41.931695: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:41.931706: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:41.931715: | matches: 3 Jan 13 23:05:41.931725: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:41.931741: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:41.931751: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:41.931761: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:41.931771: | matches: 3 Jan 13 23:05:41.931834: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:41.931886: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:41.931905: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:41.931953: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:41.931969: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:41.932006: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:41.932041: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:41.932070: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:41.932113: | spent 0.568 (0.567) milliseconds in whack Jan 13 23:05:42.937472: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:42.937524: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:42.937560: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:42.937759: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:42.937777: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:42.937815: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:42.937828: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:42.937840: | matches: 3 Jan 13 23:05:42.937851: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:42.937865: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:42.937877: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:42.937890: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:42.937900: | matches: 3 Jan 13 23:05:42.937954: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:42.937998: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:42.938013: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:42.938050: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:42.938064: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:42.938097: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:42.938113: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:42.938139: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:42.938160: | spent 0.543 (0.713) milliseconds in whack Jan 13 23:05:43.943633: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:43.943678: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:43.943715: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:43.943728: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:43.943743: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:43.943756: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:43.943767: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:43.943777: | matches: 3 Jan 13 23:05:43.943794: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:43.943806: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:43.943818: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:43.943832: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:43.943852: | matches: 3 Jan 13 23:05:43.943922: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:43.943970: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:43.943991: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:43.944035: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:43.944053: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:43.944093: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:43.944119: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:43.944147: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:43.944180: | spent 0.572 (0.571) milliseconds in whack Jan 13 23:05:44.949600: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:44.949646: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:44.949682: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:44.949695: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:44.949711: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:44.949726: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:44.949738: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:44.949751: | matches: 3 Jan 13 23:05:44.949772: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:44.949796: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:44.949819: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:44.949846: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:44.949862: | matches: 3 Jan 13 23:05:44.949930: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:44.949975: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:44.950018: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:44.950065: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:44.950084: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:44.950120: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:44.950138: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:44.950163: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:44.950184: | spent 0.609 (0.608) milliseconds in whack Jan 13 23:05:45.955671: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:45.955718: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:45.955754: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:45.955768: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:45.955783: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:45.955796: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:45.955808: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:45.955817: | matches: 3 Jan 13 23:05:45.955828: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:45.955845: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:45.955857: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:45.955868: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:45.955879: | matches: 3 Jan 13 23:05:45.955960: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:45.956032: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:45.956060: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:45.956113: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:45.956134: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:45.956183: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:45.956205: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:45.956229: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:45.956251: | spent 0.607 (0.605) milliseconds in whack Jan 13 23:05:46.961912: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:46.961957: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:46.961993: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:46.962006: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:46.962021: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:46.962033: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:46.962044: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:46.962054: | matches: 3 Jan 13 23:05:46.962065: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:46.962085: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:46.962096: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:46.962107: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:46.962116: | matches: 3 Jan 13 23:05:46.962170: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:46.962212: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:46.962227: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:46.962264: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:46.962278: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:46.962311: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:46.962327: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:46.962352: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:46.962373: | spent 0.49 (0.488) milliseconds in whack Jan 13 23:05:47.967821: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:47.967869: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:47.968116: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:47.968135: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:47.968150: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:47.968162: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:47.968174: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:47.968184: | matches: 3 Jan 13 23:05:47.968193: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:47.968205: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:47.968216: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:47.968227: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:47.968236: | matches: 3 Jan 13 23:05:47.968288: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:47.968354: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:47.968373: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:47.968407: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:47.968422: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:47.968453: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:47.968470: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:47.968494: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:47.968515: | spent 0.553 (0.717) milliseconds in whack Jan 13 23:05:48.973913: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:48.973960: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:48.973997: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:48.974009: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:48.974024: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:48.974037: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:48.974057: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:48.974075: | matches: 3 Jan 13 23:05:48.974092: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:48.974115: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:48.974132: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:48.974153: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:48.974169: | matches: 3 Jan 13 23:05:48.974248: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:48.974306: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:48.974329: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:48.974383: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:48.974407: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:48.974455: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:48.974481: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:48.974516: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:48.974547: | spent 0.659 (0.658) milliseconds in whack Jan 13 23:05:49.979903: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:49.979947: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:49.979983: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:49.979996: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:49.980011: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:49.980026: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:49.980051: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:49.980070: | matches: 3 Jan 13 23:05:49.980088: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:49.980111: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:49.980135: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:49.980197: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:49.980215: | matches: 3 Jan 13 23:05:49.980295: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:49.980365: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:49.980392: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:49.980449: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:49.980473: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:49.980521: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:49.980548: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:49.980584: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:49.980615: | spent 0.736 (0.735) milliseconds in whack Jan 13 23:05:50.065765: | processing global timer EVENT_PENDING_DDNS Jan 13 23:05:50.065816: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:05:50.065833: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:05:50.065845: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:05:50.065855: | found "L2TP-PSK-common" Jan 13 23:05:50.065865: | found "L2TP-PSK-noNAT" Jan 13 23:05:50.065875: | found "L2TP-PSK-NAT" Jan 13 23:05:50.065884: | found "MYCONN-ikev2-cp" Jan 13 23:05:50.065897: | matches: 6 Jan 13 23:05:50.065913: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:05:50.065978: | spent 0.155 (0.156) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:05:50.066006: | spent 0.19 (0.189) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:05:50.073293: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:05:50.073342: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:05:50.073426: | spent 0.0778 (0.077) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 23:05:50.073456: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:05:50.073478: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:05:50.073501: | spent 0.0188 (0.0186) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:05:50.986147: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:50.986194: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:50.986232: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:50.986247: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:50.986276: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:50.986302: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:50.986325: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:50.986341: | matches: 3 Jan 13 23:05:50.986360: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:50.986384: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:50.986401: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:50.986413: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:50.986426: | matches: 3 Jan 13 23:05:50.986499: | 9594619.611486 - 9623299.607265 = -1 Jan 13 23:05:50.986573: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:50.986598: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:50.986650: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:50.986671: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:50.986716: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:50.986742: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:50.986777: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:50.986810: | spent 0.689 (0.688) milliseconds in whack Jan 13 23:05:51.592375: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #44 in state ESTABLISHED_CHILD_SA Jan 13 23:05:51.592422: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:05:51.592439: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:05:51.592472: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:05:51.592498: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:51.592515: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:51.592574: | liveness: #44 updating #41 last contact from 9594589.611364 to 9594619.613561 (last IPsec traffic flow) Jan 13 23:05:51.592605: | liveness: #44 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:05:51.592630: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #44 Jan 13 23:05:51.592653: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:05:51.592691: | #44 spent 0.316 (0.314) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:05:51.992486: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:51.992528: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:51.992568: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:51.992592: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:51.992622: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:51.992647: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:51.992671: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:51.992693: | matches: 3 Jan 13 23:05:51.992714: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:51.992737: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:51.992759: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:51.992782: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:51.992799: | matches: 3 Jan 13 23:05:51.992888: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:51.992974: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:51.993003: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:51.993059: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:51.993083: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:51.993148: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:51.993178: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:51.993218: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:51.993252: | spent 0.786 (0.785) milliseconds in whack Jan 13 23:05:52.998814: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:52.998865: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:52.998902: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:52.999119: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:52.999144: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:52.999170: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:52.999195: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:52.999210: | matches: 3 Jan 13 23:05:52.999229: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:52.999253: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:52.999274: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:52.999297: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:52.999312: | matches: 3 Jan 13 23:05:52.999390: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:52.999442: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:52.999465: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:52.999521: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:52.999545: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:52.999595: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:52.999621: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:52.999678: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:52.999712: | spent 0.733 (0.921) milliseconds in whack Jan 13 23:05:54.005183: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:54.005227: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:54.005263: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:54.005276: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:54.005291: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:54.005304: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:54.005323: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:54.005342: | matches: 3 Jan 13 23:05:54.005361: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:54.005383: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:54.005406: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:54.005430: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:54.005448: | matches: 3 Jan 13 23:05:54.005526: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:54.005586: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:54.005610: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:54.005659: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:54.005684: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:54.005740: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:54.005767: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:54.005801: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:54.005834: | spent 0.672 (0.672) milliseconds in whack Jan 13 23:05:55.011365: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:55.011423: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:55.011474: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:55.011489: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:55.011515: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:55.011535: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:55.011556: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:55.011571: | matches: 3 Jan 13 23:05:55.011586: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:55.011603: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:55.011620: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:55.011638: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:55.011653: | matches: 3 Jan 13 23:05:55.011722: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:55.011770: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:55.011789: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:55.011842: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:55.011860: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:55.011915: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:55.011940: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:55.011974: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:55.012004: | spent 0.671 (0.669) milliseconds in whack Jan 13 23:05:56.017437: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:56.017484: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:56.017522: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:56.017535: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:56.017551: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:56.017599: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:56.017625: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:56.017643: | matches: 3 Jan 13 23:05:56.017661: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:56.017682: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:56.017706: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:56.017724: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:56.017734: | matches: 3 Jan 13 23:05:56.017791: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:56.017840: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:56.017859: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:56.017911: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:56.017930: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:56.017984: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:56.018009: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:56.018048: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:56.018082: | spent 0.668 (0.666) milliseconds in whack Jan 13 23:05:57.023594: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:57.023641: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:57.023677: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:57.023691: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:57.023706: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:57.023718: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:57.023737: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:57.023757: | matches: 3 Jan 13 23:05:57.023776: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:57.023798: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:57.023822: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:57.023845: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:57.023863: | matches: 3 Jan 13 23:05:57.023936: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:57.023994: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:57.024018: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:57.024067: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:57.024091: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:57.024149: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:57.024175: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:57.024207: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:57.024238: | spent 0.668 (0.667) milliseconds in whack Jan 13 23:05:58.029657: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:58.029716: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:58.029780: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:58.029805: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:58.029846: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:58.029873: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:58.029900: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:58.029917: | matches: 3 Jan 13 23:05:58.029940: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:58.029969: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:58.029994: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:58.030019: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:58.030039: | matches: 3 Jan 13 23:05:58.030104: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:58.030150: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:58.030165: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:58.030243: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:58.030273: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:58.030327: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:58.030350: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:58.030374: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:58.030395: | spent 0.759 (0.758) milliseconds in whack Jan 13 23:05:59.035988: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:59.036032: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:05:59.036069: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:05:59.036082: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:59.036098: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:59.036110: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:59.036121: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:59.036136: | matches: 3 Jan 13 23:05:59.036147: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:05:59.036159: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:05:59.036173: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:05:59.036184: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:05:59.036196: | matches: 3 Jan 13 23:05:59.036248: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:05:59.036291: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:05:59.036327: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:59.036383: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:05:59.036399: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:05:59.036434: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:05:59.036452: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:59.036476: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:05:59.036497: | spent 0.535 (0.534) milliseconds in whack Jan 13 23:06:00.041954: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:00.041999: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:00.042036: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:00.042050: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:00.042065: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:00.042080: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:00.042092: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:00.042104: | matches: 3 Jan 13 23:06:00.042115: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:00.042127: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:00.042140: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:00.042153: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:00.042162: | matches: 3 Jan 13 23:06:00.042215: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:00.042257: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:00.042272: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:00.042307: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:00.042321: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:00.042353: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:00.042370: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:00.042394: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:00.042416: | spent 0.488 (0.486) milliseconds in whack Jan 13 23:06:01.047862: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:01.047906: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:01.047965: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:01.047980: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:01.047994: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:01.048009: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:01.048021: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:01.048032: | matches: 3 Jan 13 23:06:01.048042: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:01.048059: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:01.048071: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:01.048082: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:01.048091: | matches: 3 Jan 13 23:06:01.048147: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:01.048187: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:01.048202: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:01.048237: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:01.048252: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:01.048286: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:01.048321: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:01.048354: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:01.048386: | spent 0.549 (0.548) milliseconds in whack Jan 13 23:06:02.054142: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:02.054193: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:02.054232: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:02.054247: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:02.054264: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:02.054276: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:02.054288: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:02.054298: | matches: 3 Jan 13 23:06:02.054308: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:02.054320: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:02.054339: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:02.054351: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:02.054363: | matches: 3 Jan 13 23:06:02.054422: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:02.054467: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:02.054482: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:02.054525: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:02.054540: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:02.054572: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:02.054589: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:02.054614: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:02.054636: | spent 0.529 (0.527) milliseconds in whack Jan 13 23:06:03.059852: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:03.059913: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:03.059949: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:03.060125: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:03.060145: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:03.060161: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:03.060173: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:03.060183: | matches: 3 Jan 13 23:06:03.060194: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:03.060219: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:03.060230: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:03.060264: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:03.060273: | matches: 3 Jan 13 23:06:03.060367: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:03.060408: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:03.060420: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:03.060454: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:03.060465: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:03.060490: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:03.060504: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:03.060524: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:03.060540: | spent 0.574 (0.72) milliseconds in whack Jan 13 23:06:04.064022: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:04.064046: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:04.064067: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:04.064077: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:04.064086: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:04.064093: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:04.064099: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:04.064103: | matches: 3 Jan 13 23:06:04.064109: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:04.064115: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:04.064127: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:04.064140: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:04.064150: | matches: 3 Jan 13 23:06:04.064197: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:04.064235: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:04.064246: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:04.064267: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:04.064275: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:04.064293: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:04.064315: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:04.064332: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:04.064350: | spent 0.341 (0.34) milliseconds in whack Jan 13 23:06:05.067287: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:05.067315: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:05.067336: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:05.067343: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:05.067353: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:05.067359: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:05.067366: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:05.067370: | matches: 3 Jan 13 23:06:05.067375: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:05.067381: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:05.067389: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:05.067395: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:05.067400: | matches: 3 Jan 13 23:06:05.067433: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:05.067456: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:05.067464: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:05.067488: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:05.067495: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:05.067513: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:05.067522: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:05.067534: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:05.067560: | spent 0.291 (0.29) milliseconds in whack Jan 13 23:06:06.070500: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:06.070524: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:06.070557: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:06.070567: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:06.070577: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:06.070584: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:06.070590: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:06.070599: | matches: 3 Jan 13 23:06:06.070604: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:06.070610: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:06.070616: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:06.070622: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:06.070627: | matches: 3 Jan 13 23:06:06.070667: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:06.070702: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:06.070715: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:06.070738: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:06.070746: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:06.070766: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:06.070781: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:06.070803: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:06.070818: | spent 0.335 (0.334) milliseconds in whack Jan 13 23:06:07.073820: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:07.073846: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:07.073866: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:07.073873: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:07.073882: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:07.073888: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:07.073894: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:07.073899: | matches: 3 Jan 13 23:06:07.073905: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:07.073910: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:07.073919: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:07.073925: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:07.073930: | matches: 3 Jan 13 23:06:07.073961: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:07.073984: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:07.073992: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:07.074015: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:07.074023: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:07.074039: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:07.074048: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:07.074060: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:07.074072: | spent 0.27 (0.269) milliseconds in whack Jan 13 23:06:08.079338: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:08.079392: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:08.079432: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:08.079624: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:08.079646: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:08.079658: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:08.079691: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:08.079722: | matches: 3 Jan 13 23:06:08.079734: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:08.079747: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:08.079763: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:08.079775: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:08.079784: | matches: 3 Jan 13 23:06:08.079847: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:08.079893: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:08.079909: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:08.079949: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:08.079963: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:08.079996: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:08.080014: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:08.080039: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:08.080061: | spent 0.591 (0.754) milliseconds in whack Jan 13 23:06:09.085553: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:09.085599: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:09.085635: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:09.085647: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:09.085663: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:09.085675: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:09.085686: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:09.085696: | matches: 3 Jan 13 23:06:09.085707: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:09.085725: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:09.085737: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:09.085749: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:09.085760: | matches: 3 Jan 13 23:06:09.085813: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:09.085855: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:09.085870: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:09.085904: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:09.085918: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:09.085949: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:09.085966: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:09.085990: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:09.086012: | spent 0.484 (0.483) milliseconds in whack Jan 13 23:06:10.073114: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:06:10.073173: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:06:10.073207: | spent 0.0274 (0.0266) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:06:10.091511: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:10.091554: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:10.091608: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:10.091636: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:10.091658: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:10.091674: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:10.091686: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:10.091696: | matches: 3 Jan 13 23:06:10.091709: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:10.091732: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:10.091754: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:10.091778: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:10.091800: | matches: 3 Jan 13 23:06:10.091870: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:10.091938: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:10.091956: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:10.092010: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:10.092037: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:10.092080: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:10.092098: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:10.092122: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:10.092143: | spent 0.657 (0.656) milliseconds in whack Jan 13 23:06:11.097685: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:11.097733: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:11.097770: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:11.097783: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:11.097800: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:11.097812: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:11.097824: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:11.097840: | matches: 3 Jan 13 23:06:11.097851: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:11.097862: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:11.097874: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:11.097887: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:11.097896: | matches: 3 Jan 13 23:06:11.097970: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:11.098033: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:11.098052: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:11.098099: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:11.098126: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:11.098178: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:11.098203: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:11.098234: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:11.098257: | spent 0.599 (0.597) milliseconds in whack Jan 13 23:06:12.103889: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:12.103937: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:12.103975: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:12.103988: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:12.104005: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:12.104017: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:12.104029: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:12.104038: | matches: 3 Jan 13 23:06:12.104048: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:12.104059: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:12.104070: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:12.104087: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:12.104096: | matches: 3 Jan 13 23:06:12.104152: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:12.104196: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:12.104210: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:12.104249: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:12.104263: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:12.104295: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:12.104329: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:12.104361: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:12.104383: | spent 0.526 (0.524) milliseconds in whack Jan 13 23:06:13.109900: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:13.110139: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:13.110181: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:13.110195: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:13.110212: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:13.110224: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:13.110236: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:13.110251: | matches: 3 Jan 13 23:06:13.110263: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:13.110274: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:13.110286: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:13.110297: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:13.110307: | matches: 3 Jan 13 23:06:13.110362: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:13.110406: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:13.110420: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:13.110458: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:13.110472: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:13.110506: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:13.110523: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:13.110547: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:13.110569: | spent 0.556 (0.696) milliseconds in whack Jan 13 23:06:14.116053: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:14.116100: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:14.116139: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:14.116154: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:14.116170: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:14.116185: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:14.116197: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:14.116209: | matches: 3 Jan 13 23:06:14.116220: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:14.116231: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:14.116245: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:14.116256: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:14.116266: | matches: 3 Jan 13 23:06:14.116348: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:14.116396: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:14.116412: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:14.116449: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:14.116463: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:14.116499: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:14.116518: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:14.116550: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:14.116572: | spent 0.546 (0.545) milliseconds in whack Jan 13 23:06:15.122161: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:15.122212: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:15.122254: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:15.122273: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:15.122291: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:15.122306: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:15.122318: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:15.122329: | matches: 3 Jan 13 23:06:15.122340: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:15.122352: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:15.122388: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:15.122401: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:15.122410: | matches: 3 Jan 13 23:06:15.122470: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:15.122513: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:15.122529: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:15.122572: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:15.122586: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:15.122619: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:15.122637: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:15.122662: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:15.122684: | spent 0.556 (0.554) milliseconds in whack Jan 13 23:06:16.128273: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:16.128334: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:16.128374: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:16.128389: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:16.128405: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:16.128421: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:16.128434: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:16.128452: | matches: 3 Jan 13 23:06:16.128469: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:16.128493: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:16.128516: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:16.128540: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:16.128560: | matches: 3 Jan 13 23:06:16.128628: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:16.128701: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:16.128725: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:16.128772: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:16.128796: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:16.128837: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:16.128855: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:16.128879: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:16.128901: | spent 0.652 (0.651) milliseconds in whack Jan 13 23:06:17.134475: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:17.134522: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:17.134561: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:17.134577: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:17.134593: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:17.134607: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:17.134618: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:17.134629: | matches: 3 Jan 13 23:06:17.134640: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:17.134652: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:17.134666: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:17.134677: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:17.134686: | matches: 3 Jan 13 23:06:17.134742: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:17.134782: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:17.134797: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:17.134834: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:17.134848: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:17.134882: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:17.134899: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:17.134961: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:17.134985: | spent 0.529 (0.536) milliseconds in whack Jan 13 23:06:18.140387: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:18.140437: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:18.140651: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:18.140670: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:18.140685: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:18.140699: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:18.140711: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:18.140720: | matches: 3 Jan 13 23:06:18.140732: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:18.140743: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:18.140755: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:18.140766: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:18.140775: | matches: 3 Jan 13 23:06:18.140829: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:18.140870: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:18.140885: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:18.140921: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:18.140935: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:18.140967: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:18.140985: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:18.141009: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:18.141030: | spent 0.507 (0.667) milliseconds in whack Jan 13 23:06:19.146462: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:19.146508: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:19.146544: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:19.146557: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:19.146573: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:19.146584: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:19.146596: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:19.146604: | matches: 3 Jan 13 23:06:19.146629: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:19.146641: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:19.146651: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:19.146662: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:19.146669: | matches: 3 Jan 13 23:06:19.146731: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:19.146773: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:19.146786: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:19.146821: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:19.146833: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:19.146862: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:19.146877: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:19.146898: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:19.146917: | spent 0.486 (0.484) milliseconds in whack Jan 13 23:06:20.152555: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:20.152606: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:20.152646: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:20.152660: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:20.152677: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:20.152692: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:20.152728: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:20.152738: | matches: 3 Jan 13 23:06:20.152749: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:20.152761: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:20.152772: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:20.152783: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:20.152792: | matches: 3 Jan 13 23:06:20.152854: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:20.152897: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:20.152913: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:20.152956: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:20.152970: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:20.153004: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:20.153022: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:20.153046: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:20.153068: | spent 0.547 (0.545) milliseconds in whack Jan 13 23:06:21.158536: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:21.158580: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:21.158616: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:21.158629: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:21.158644: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:21.158657: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:21.158668: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:21.158677: | matches: 3 Jan 13 23:06:21.158696: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:21.158707: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:21.158718: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:21.158732: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:21.158742: | matches: 3 Jan 13 23:06:21.158817: | 9594649.613697 - 9623299.607265 = -1 Jan 13 23:06:21.158883: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:21.158904: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:21.158949: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:21.158974: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:21.159029: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:21.159052: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:21.159087: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:21.159112: | spent 0.602 (0.601) milliseconds in whack Jan 13 23:06:21.596619: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #44 in state ESTABLISHED_CHILD_SA Jan 13 23:06:21.596663: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:06:21.596680: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:06:21.596694: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:06:21.596716: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:21.596728: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:21.596769: | liveness: #44 updating #41 last contact from 9594619.613561 to 9594649.179958 (last IPsec traffic flow) Jan 13 23:06:21.596790: | liveness: #44 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.437823 seconds ago) Jan 13 23:06:21.596805: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #44 Jan 13 23:06:21.596820: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:06:21.596842: | #44 spent 0.226 (0.225) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:06:22.164959: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:22.165022: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:22.165058: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:22.165074: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:22.165100: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:22.165123: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:22.165149: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:22.165171: | matches: 3 Jan 13 23:06:22.165193: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:22.165218: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:22.165244: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:22.165263: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:22.165278: | matches: 3 Jan 13 23:06:22.165349: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:22.165416: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:22.165436: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:22.165477: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:22.165491: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:22.165527: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:22.165545: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:22.165571: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:22.165606: | spent 0.672 (0.67) milliseconds in whack Jan 13 23:06:23.171443: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:23.171496: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:23.171535: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:23.171755: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:23.171775: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:23.171800: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:23.171813: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:23.171827: | matches: 3 Jan 13 23:06:23.171838: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:23.171850: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:23.171861: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:23.171873: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:23.171882: | matches: 3 Jan 13 23:06:23.171941: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:23.171984: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:23.172000: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:23.172041: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:23.172056: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:23.172089: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:23.172108: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:23.172133: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:23.172156: | spent 0.554 (0.744) milliseconds in whack Jan 13 23:06:24.177713: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:24.177757: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:24.177793: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:24.177806: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:24.177821: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:24.177833: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:24.177844: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:24.177861: | matches: 3 Jan 13 23:06:24.177872: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:24.177883: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:24.177918: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:24.177930: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:24.177939: | matches: 3 Jan 13 23:06:24.177992: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:24.178033: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:24.178047: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:24.178081: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:24.178095: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:24.178127: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:24.178145: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:24.178169: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:24.178190: | spent 0.503 (0.501) milliseconds in whack Jan 13 23:06:25.183702: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:25.183751: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:25.183793: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:25.183810: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:25.183828: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:25.183842: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:25.183854: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:25.183866: | matches: 3 Jan 13 23:06:25.183877: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:25.183890: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:25.183902: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:25.183916: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:25.183925: | matches: 3 Jan 13 23:06:25.183984: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:25.184026: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:25.184042: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:25.184082: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:25.184096: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:25.184129: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:25.184146: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:25.184171: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:25.184193: | spent 0.523 (0.521) milliseconds in whack Jan 13 23:06:26.189750: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:26.189800: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:26.189838: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:26.189851: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:26.189869: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:26.189882: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:26.189894: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:26.189911: | matches: 3 Jan 13 23:06:26.189922: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:26.189934: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:26.189948: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:26.189960: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:26.189969: | matches: 3 Jan 13 23:06:26.190048: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:26.190111: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:26.190131: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:26.190176: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:26.190203: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:26.190260: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:26.190284: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:26.190343: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:26.190367: | spent 0.644 (0.643) milliseconds in whack Jan 13 23:06:27.195882: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:27.195927: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:27.195963: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:27.195976: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:27.195991: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:27.196003: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:27.196016: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:27.196025: | matches: 3 Jan 13 23:06:27.196035: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:27.196053: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:27.196064: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:27.196076: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:27.196085: | matches: 3 Jan 13 23:06:27.196141: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:27.196182: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:27.196196: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:27.196232: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:27.196246: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:27.196279: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:27.196296: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:27.196336: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:27.196358: | spent 0.503 (0.501) milliseconds in whack Jan 13 23:06:28.201980: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:28.202037: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:28.202277: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:28.202296: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:28.202313: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:28.202327: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:28.202339: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:28.202348: | matches: 3 Jan 13 23:06:28.202360: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:28.202371: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:28.202383: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:28.202394: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:28.202403: | matches: 3 Jan 13 23:06:28.202461: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:28.202503: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:28.202518: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:28.202557: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:28.202572: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:28.202608: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:28.202626: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:28.202648: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:28.202670: | spent 0.537 (0.719) milliseconds in whack Jan 13 23:06:29.208322: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:29.208370: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:29.208408: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:29.208422: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:29.208439: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:29.208453: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:29.208488: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:29.208498: | matches: 3 Jan 13 23:06:29.208509: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:29.208520: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:29.208532: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:29.208543: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:29.208552: | matches: 3 Jan 13 23:06:29.208612: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:29.208655: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:29.208671: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:29.208710: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:29.208725: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:29.208758: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:29.208775: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:29.208799: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:29.208821: | spent 0.546 (0.544) milliseconds in whack Jan 13 23:06:30.074755: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:06:30.074804: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:06:30.074825: | spent 0.0169 (0.0153) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:06:30.214388: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:30.214433: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:30.214470: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:30.214483: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:30.214500: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:30.214512: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:30.214524: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:30.214539: | matches: 3 Jan 13 23:06:30.214549: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:30.214561: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:30.214572: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:30.214587: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:30.214596: | matches: 3 Jan 13 23:06:30.214653: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:30.214696: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:30.214711: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:30.214747: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:30.214761: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:30.214794: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:30.214811: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:30.214835: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:30.214856: | spent 0.494 (0.493) milliseconds in whack Jan 13 23:06:31.220330: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:31.220379: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:31.220415: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:31.220429: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:31.220444: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:31.220456: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:31.220468: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:31.220477: | matches: 3 Jan 13 23:06:31.220493: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:31.220516: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:31.220536: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:31.220557: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:31.220600: | matches: 3 Jan 13 23:06:31.220667: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:31.220709: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:31.220720: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:31.220740: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:31.220751: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:31.220773: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:31.220784: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:31.220796: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:31.220811: | spent 0.529 (0.527) milliseconds in whack Jan 13 23:06:32.223825: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:32.223856: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:32.223886: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:32.223900: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:32.223916: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:32.223930: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:32.223944: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:32.223955: | matches: 3 Jan 13 23:06:32.223968: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:32.223981: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:32.223994: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:32.224007: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:32.224015: | matches: 3 Jan 13 23:06:32.224064: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:32.224107: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:32.224124: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:32.224160: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:32.224175: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:32.224205: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:32.224218: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:32.224234: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:32.224251: | spent 0.445 (0.444) milliseconds in whack Jan 13 23:06:33.227313: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:33.227358: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:33.227517: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:33.227535: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:33.227551: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:33.227562: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:33.227572: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:33.227586: | matches: 3 Jan 13 23:06:33.227596: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:33.227610: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:33.227623: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:33.227633: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:33.227643: | matches: 3 Jan 13 23:06:33.227693: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:33.227737: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:33.227753: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:33.227791: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:33.227806: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:33.227839: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:33.227855: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:33.227879: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:33.227898: | spent 0.492 (0.605) milliseconds in whack Jan 13 23:06:34.230924: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:34.230954: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:34.230985: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:34.231001: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:34.231019: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:34.231032: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:34.231047: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:34.231057: | matches: 3 Jan 13 23:06:34.231067: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:34.231080: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:34.231094: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:34.231106: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:34.231116: | matches: 3 Jan 13 23:06:34.231167: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:34.231212: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:34.231230: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:34.231267: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:34.231282: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:34.231316: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:34.231332: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:34.231353: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:34.231372: | spent 0.467 (0.465) milliseconds in whack Jan 13 23:06:35.234398: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:35.234432: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:35.234462: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:35.234476: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:35.234491: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:35.234506: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:35.234520: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:35.234531: | matches: 3 Jan 13 23:06:35.234542: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:35.234555: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:35.234568: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:35.234581: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:35.234593: | matches: 3 Jan 13 23:06:35.234643: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:35.234687: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:35.234705: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:35.234741: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:35.234755: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:35.234784: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:35.234797: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:35.234817: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:35.234835: | spent 0.456 (0.455) milliseconds in whack Jan 13 23:06:36.237754: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:36.237784: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:36.237816: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:36.237829: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:36.237845: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:36.237860: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:36.237874: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:36.237884: | matches: 3 Jan 13 23:06:36.237908: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:36.237919: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:36.237930: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:36.237941: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:36.237951: | matches: 3 Jan 13 23:06:36.238000: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:36.238042: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:36.238059: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:36.238096: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:36.238110: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:36.238142: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:36.238159: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:36.238180: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:36.238199: | spent 0.463 (0.462) milliseconds in whack Jan 13 23:06:37.241166: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:37.241193: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:37.241214: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:37.241221: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:37.241231: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:37.241237: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:37.241243: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:37.241248: | matches: 3 Jan 13 23:06:37.241253: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:37.241259: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:37.241268: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:37.241273: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:37.241278: | matches: 3 Jan 13 23:06:37.241312: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:37.241335: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:37.241344: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:37.241366: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:37.241373: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:37.241390: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:37.241399: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:37.241411: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:37.241422: | spent 0.276 (0.275) milliseconds in whack Jan 13 23:06:38.244484: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:38.244514: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:38.244678: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:38.244688: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:38.244697: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:38.244705: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:38.244711: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:38.244716: | matches: 3 Jan 13 23:06:38.244722: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:38.244728: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:38.244742: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:38.244748: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:38.244753: | matches: 3 Jan 13 23:06:38.244785: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:38.244807: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:38.244815: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:38.244838: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:38.244845: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:38.244862: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:38.244883: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:38.244896: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:38.244908: | spent 0.308 (0.442) milliseconds in whack Jan 13 23:06:39.250353: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:39.250402: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:39.250441: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:39.250455: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:39.250473: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:39.250486: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:39.250498: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:39.250506: | matches: 3 Jan 13 23:06:39.250517: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:39.250528: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:39.250539: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:39.250550: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:39.250565: | matches: 3 Jan 13 23:06:39.250624: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:39.250669: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:39.250684: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:39.250727: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:39.250741: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:39.250775: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:39.250792: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:39.250817: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:39.250839: | spent 0.52 (0.518) milliseconds in whack Jan 13 23:06:40.256583: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:40.256625: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:40.256664: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:40.256681: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:40.256698: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:40.256710: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:40.256722: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:40.256737: | matches: 3 Jan 13 23:06:40.256747: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:40.256759: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:40.256773: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:40.256785: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:40.256794: | matches: 3 Jan 13 23:06:40.256858: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:40.256924: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:40.256944: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:40.256981: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:40.256995: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:40.257031: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:40.257058: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:40.257086: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:40.257119: | spent 0.553 (0.552) milliseconds in whack Jan 13 23:06:41.261717: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:41.261765: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:41.261796: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:41.261806: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:41.261847: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:41.261858: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:41.261867: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:41.261873: | matches: 3 Jan 13 23:06:41.261881: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:41.261890: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:41.261899: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:41.261910: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:41.261917: | matches: 3 Jan 13 23:06:41.261963: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:41.261999: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:41.262029: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:41.262068: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:41.262080: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:41.262108: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:41.262137: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:41.262152: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:41.262163: | spent 0.476 (0.474) milliseconds in whack Jan 13 23:06:42.265226: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:42.265257: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:42.265280: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:42.265290: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:42.265300: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:42.265307: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:42.265314: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:42.265319: | matches: 3 Jan 13 23:06:42.265325: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:42.265331: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:42.265337: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:42.265343: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:42.265349: | matches: 3 Jan 13 23:06:42.265382: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:42.265405: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:42.265413: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:42.265438: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:42.265446: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:42.265463: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:42.265473: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:42.265486: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:42.265497: | spent 0.291 (0.289) milliseconds in whack Jan 13 23:06:43.268535: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:43.268568: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:43.268594: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:43.268602: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:43.268611: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:43.268619: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:43.268625: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:43.268630: | matches: 3 Jan 13 23:06:43.268636: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:43.268642: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:43.268649: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:43.268655: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:43.268660: | matches: 3 Jan 13 23:06:43.268694: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:43.268719: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:43.268738: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:43.268764: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:43.268771: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:43.268789: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:43.268798: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:43.268811: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:43.268823: | spent 0.307 (0.306) milliseconds in whack Jan 13 23:06:44.271797: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:44.271823: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:44.271857: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:44.271866: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:44.271876: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:44.271883: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:44.271889: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:44.271897: | matches: 3 Jan 13 23:06:44.271903: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:44.271909: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:44.271914: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:44.271921: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:44.271926: | matches: 3 Jan 13 23:06:44.271963: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:44.271997: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:44.272007: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:44.272032: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:44.272039: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:44.272057: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:44.272070: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:44.272086: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:44.272103: | spent 0.319 (0.318) milliseconds in whack Jan 13 23:06:45.275109: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:45.275138: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:45.275160: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:45.275171: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:45.275181: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:45.275188: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:45.275195: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:45.275200: | matches: 3 Jan 13 23:06:45.275206: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:45.275211: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:45.275218: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:45.275224: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:45.275230: | matches: 3 Jan 13 23:06:45.275262: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:45.275285: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:45.275293: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:45.275317: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:45.275323: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:45.275340: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:45.275349: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:45.275362: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:45.275373: | spent 0.284 (0.283) milliseconds in whack Jan 13 23:06:46.280725: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:46.280793: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:46.280833: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:46.280847: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:46.280865: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:46.280878: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:46.280890: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:46.280904: | matches: 3 Jan 13 23:06:46.280915: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:46.280926: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:46.280937: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:46.280951: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:46.280960: | matches: 3 Jan 13 23:06:46.281018: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:46.281086: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:46.281114: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:46.281164: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:46.281175: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:46.281200: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:46.281213: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:46.281231: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:46.281247: | spent 0.557 (0.555) milliseconds in whack Jan 13 23:06:47.286275: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:47.286319: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:47.286355: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:47.286368: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:47.286385: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:47.286397: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:47.286409: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:47.286425: | matches: 3 Jan 13 23:06:47.286436: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:47.286448: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:47.286459: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:47.286473: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:47.286482: | matches: 3 Jan 13 23:06:47.286538: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:47.286588: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:47.286615: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:47.286669: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:47.286691: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:47.286739: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:47.286766: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:47.286800: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:47.286831: | spent 0.579 (0.578) milliseconds in whack Jan 13 23:06:48.292257: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:48.292323: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:48.292538: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:48.292555: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:48.292570: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:48.292584: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:48.292596: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:48.292605: | matches: 3 Jan 13 23:06:48.292616: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:48.292628: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:48.292661: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:48.292674: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:48.292685: | matches: 3 Jan 13 23:06:48.292738: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:48.292791: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:48.292818: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:48.292873: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:48.292895: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:48.292944: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:48.292971: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:48.293006: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:48.293036: | spent 0.646 (0.802) milliseconds in whack Jan 13 23:06:49.298484: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:49.298531: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:49.298569: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:49.298582: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:49.298598: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:49.298610: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:49.298621: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:49.298630: | matches: 3 Jan 13 23:06:49.298641: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:49.298660: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:49.298671: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:49.298685: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:49.298694: | matches: 3 Jan 13 23:06:49.298750: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:49.298817: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:49.298844: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:49.298898: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:49.298921: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:49.298969: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:49.298995: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:49.299031: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:49.299062: | spent 0.604 (0.603) milliseconds in whack Jan 13 23:06:50.065905: | processing global timer EVENT_PENDING_PHASE2 Jan 13 23:06:50.065956: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 23:06:50.065973: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:06:50.065986: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 23:06:50.065997: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:06:50.066008: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 23:06:50.066018: | found "L2TP-PSK-common" Jan 13 23:06:50.066027: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 23:06:50.066036: | found "L2TP-PSK-noNAT" Jan 13 23:06:50.066045: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 23:06:50.066054: | found "L2TP-PSK-NAT" Jan 13 23:06:50.066064: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 23:06:50.066073: | found "MYCONN-ikev2-cp" Jan 13 23:06:50.066082: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 23:06:50.066090: | matches: 6 Jan 13 23:06:50.066107: | spent 0.15 (0.148) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 23:06:50.066121: | processing global timer EVENT_PENDING_DDNS Jan 13 23:06:50.066134: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:06:50.066148: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:06:50.066160: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:06:50.066190: | found "L2TP-PSK-common" Jan 13 23:06:50.066200: | found "L2TP-PSK-noNAT" Jan 13 23:06:50.066209: | found "L2TP-PSK-NAT" Jan 13 23:06:50.066217: | found "MYCONN-ikev2-cp" Jan 13 23:06:50.066226: | matches: 6 Jan 13 23:06:50.066236: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:06:50.066280: | spent 0.143 (0.144) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:06:50.066296: | spent 0.162 (0.162) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:06:50.072394: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:06:50.072441: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:06:50.072460: | spent 0.016 (0.0146) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:06:50.304530: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:50.304578: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:50.304614: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:50.304627: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:50.304645: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:50.304657: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:50.304668: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:50.304683: | matches: 3 Jan 13 23:06:50.304693: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:50.304704: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:50.304726: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:50.304748: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:50.304760: | matches: 3 Jan 13 23:06:50.304836: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:50.304886: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:50.304907: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:50.304950: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:50.304967: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:50.305006: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:50.305029: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:50.305056: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:50.305087: | spent 0.585 (0.583) milliseconds in whack Jan 13 23:06:51.310634: | newref struct fd@0x55c83803e858(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:51.310680: | fd_accept: new fd@0x55c83803e858 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:51.310718: | whack: start: showstates (fd@0x55c83803e858) Jan 13 23:06:51.310731: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:51.310747: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:51.310759: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:51.310771: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:51.310780: | matches: 3 Jan 13 23:06:51.310798: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:51.310810: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 Jan 13 23:06:51.310821: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:51.310841: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:51.310860: | matches: 3 Jan 13 23:06:51.310930: | 9594679.617874 - 9623299.607265 = -1 Jan 13 23:06:51.310976: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:51.310999: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:51.311039: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:51.311049: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:51.311085: | whack: stop: showstates (fd@0x55c83803e858) Jan 13 23:06:51.311109: | delref struct fd@0x55c83803e858(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:51.311146: | freeref fd@0x55c83803e858 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:51.311173: | spent 0.57 (0.568) milliseconds in whack Jan 13 23:06:51.600374: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838013358 for CHILD SA #44 in state ESTABLISHED_CHILD_SA Jan 13 23:06:51.600418: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:06:51.600436: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:06:51.600450: | delref state-event@0x55c838013358(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:06:51.600472: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:51.600485: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:51.600525: | liveness: #44 updating #41 last contact from 9594649.179958 to 9594674.302178 (last IPsec traffic flow) Jan 13 23:06:51.600547: | liveness: #44 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 5.319359 seconds ago) Jan 13 23:06:51.600562: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838013358 timeout in 30 seconds for #44 Jan 13 23:06:51.600583: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:06:51.600621: | #44 spent 0.246 (0.244) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:06:52.180569: | spent 0.00594 (0.00596) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:06:52.180638: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:06:52.180654: | addref struct iface_endpoint@0x55c83801f058(3->4) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:06:52.180666: | newref alloc logger@0x55c838017c78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:06:52.180683: | *received 352 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:06:52.180694: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:06:52.180704: | 2e 20 24 08 00 00 00 06 00 00 01 60 29 00 01 44 . $........`)..D Jan 13 23:06:52.180713: | 8b ab 16 cf 43 b5 ca 96 29 4b cb 53 5d f1 ad ff ....C...)K.S]... Jan 13 23:06:52.180722: | e1 7a fa e7 29 96 a6 54 6b b6 0c 34 5e 10 55 ef .z..)..Tk..4^.U. Jan 13 23:06:52.180731: | 8f e7 b7 f7 e1 c8 9c e4 b3 85 b7 85 40 28 ac 7d ............@(.} Jan 13 23:06:52.180740: | cb 65 99 b2 6e 4d 49 ce d3 96 73 e0 5f 5a 89 0a .e..nMI...s._Z.. Jan 13 23:06:52.180763: | 62 6d 05 85 33 a8 e7 2b 71 eb c0 89 52 5d 16 9c bm..3..+q...R].. Jan 13 23:06:52.180781: | 0f fb 71 c3 46 c7 5f 83 5c f1 b6 62 e0 c7 01 94 ..q.F._.\..b.... Jan 13 23:06:52.180794: | b8 f9 32 fa b5 f7 40 c9 c8 cd 94 4b 04 1f cd b8 ..2...@....K.... Jan 13 23:06:52.180807: | 89 c6 69 60 6f 4d 33 9f 7b ec 42 2a 9f c6 fc 87 ..i`oM3.{.B*.... Jan 13 23:06:52.180827: | 39 71 a5 5b 6c 06 84 5a 90 bb 5b d8 26 82 db 7a 9q.[l..Z..[.&..z Jan 13 23:06:52.180842: | e4 3b 62 70 1c bb e7 57 7a 9e 5d 67 d4 aa 2d 18 .;bp...Wz.]g..-. Jan 13 23:06:52.180862: | 07 3f 93 16 d8 45 16 75 12 7e 8f 02 b8 8e c7 81 .?...E.u.~...... Jan 13 23:06:52.180874: | a3 3d 09 69 ba ca 71 b2 6e b4 5f f5 34 33 f2 2f .=.i..q.n._.43./ Jan 13 23:06:52.180883: | 10 d2 e5 51 13 b6 53 de 2c a9 59 a4 3b 02 43 61 ...Q..S.,.Y.;.Ca Jan 13 23:06:52.180896: | 0f d8 33 9d c9 df 86 b6 6d e6 78 f4 62 aa 22 96 ..3.....m.x.b.". Jan 13 23:06:52.180916: | f5 7e 43 7c b7 2e 83 c1 de 0b f8 cb 87 ed 4d a8 .~C|..........M. Jan 13 23:06:52.180929: | fe b0 0e 2d 69 3b 0b 4b b9 0d dd c8 5a b3 13 b7 ...-i;.K....Z... Jan 13 23:06:52.180938: | 29 65 b8 ba 10 ef b5 7f d3 7f 9f c1 db 4c 97 e6 )e...........L.. Jan 13 23:06:52.180952: | 30 8f a9 6a 29 53 36 ed 1c 34 22 70 74 7c d0 d6 0..j)S6..4"pt|.. Jan 13 23:06:52.180970: | 15 b1 44 4a dc 60 46 c7 de bd 99 04 75 ea c3 46 ..DJ.`F.....u..F Jan 13 23:06:52.180982: | 06 fa 54 9a d9 63 76 f1 53 9b f1 15 8f 1a 5f ee ..T..cv.S....._. Jan 13 23:06:52.180998: | **parse ISAKMP Message: Jan 13 23:06:52.181041: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:06:52.181056: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:06:52.181074: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:06:52.181093: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:06:52.181112: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:06:52.181131: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:06:52.181155: | Message ID: 6 (00 00 00 06) Jan 13 23:06:52.181174: | length: 352 (00 00 01 60) Jan 13 23:06:52.181193: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Jan 13 23:06:52.181214: | I am the IKE SA Original Responder receiving an IKEv2 CREATE_CHILD_SA request Jan 13 23:06:52.181239: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:06:52.181260: | #41 st.st_msgid_lastrecv 5 md.hdr.isa_msgid 00000006 Jan 13 23:06:52.181291: | Message ID: IKE #41 not a duplicate - message request 6 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=5 .recv=5 .recv_frags=0 .last_contact=9594499.623195 ike.wip.initiator=-1 Jan 13 23:06:52.181310: | unpacking clear payload Jan 13 23:06:52.181323: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:06:52.181334: | ***parse IKEv2 Encryption Payload: Jan 13 23:06:52.181353: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:06:52.181371: | flags: none (0x0) Jan 13 23:06:52.181390: | length: 324 (01 44) Jan 13 23:06:52.181410: | processing payload: ISAKMP_NEXT_v2SK (len=320) Jan 13 23:06:52.181433: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK (ignoring secured payloads) Jan 13 23:06:52.181454: | trying: Informational Request (liveness probe) Jan 13 23:06:52.181466: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.181476: | trying: Informational Response (liveness probe) Jan 13 23:06:52.181492: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.181505: | trying: Informational Request Jan 13 23:06:52.181514: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.181523: | trying: Informational Response Jan 13 23:06:52.181532: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.181542: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:06:52.181558: | matching by ignoring secured payloads Jan 13 23:06:52.181624: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.181669: | auth: delref clone-key@0x55c838026d80 Jan 13 23:06:52.181720: | authenticator matched Jan 13 23:06:52.181770: | stripping 16 octets as pad Jan 13 23:06:52.181795: | #41 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success Jan 13 23:06:52.181810: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:06:52.181820: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:06:52.181839: | **parse IKEv2 Notify Payload: Jan 13 23:06:52.181861: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:06:52.181873: | flags: none (0x0) Jan 13 23:06:52.181885: | length: 12 (00 0c) Jan 13 23:06:52.181905: | Protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:06:52.181921: | SPI size: 4 (04) Jan 13 23:06:52.181932: | Notify Message Type: v2N_REKEY_SA (0x4009) Jan 13 23:06:52.181948: | processing payload: ISAKMP_NEXT_v2N (len=4) Jan 13 23:06:52.181969: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:06:52.181982: | **parse IKEv2 Security Association Payload: Jan 13 23:06:52.181992: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 23:06:52.182008: | flags: none (0x0) Jan 13 23:06:52.182029: | length: 80 (00 50) Jan 13 23:06:52.182047: | processing payload: ISAKMP_NEXT_v2SA (len=76) Jan 13 23:06:52.182064: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 23:06:52.182083: | **parse IKEv2 Nonce Payload: Jan 13 23:06:52.182118: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Jan 13 23:06:52.182130: | flags: none (0x0) Jan 13 23:06:52.182141: | length: 52 (00 34) Jan 13 23:06:52.182159: | processing payload: ISAKMP_NEXT_v2Ni (len=48) Jan 13 23:06:52.182173: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Jan 13 23:06:52.182192: | **parse IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:06:52.182211: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Jan 13 23:06:52.182230: | flags: none (0x0) Jan 13 23:06:52.182246: | length: 64 (00 40) Jan 13 23:06:52.182266: | number of TS: 2 (02) Jan 13 23:06:52.182283: | processing payload: ISAKMP_NEXT_v2TSi (len=56) Jan 13 23:06:52.182298: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Jan 13 23:06:52.182318: | **parse IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:06:52.182336: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.182354: | flags: none (0x0) Jan 13 23:06:52.182373: | length: 64 (00 40) Jan 13 23:06:52.182393: | number of TS: 2 (02) Jan 13 23:06:52.182411: | processing payload: ISAKMP_NEXT_v2TSr (len=56) Jan 13 23:06:52.182435: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK{N,SA,Ni,TSi,TSr} Jan 13 23:06:52.182452: | trying: Informational Request (liveness probe) Jan 13 23:06:52.182467: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.182477: | trying: Informational Response (liveness probe) Jan 13 23:06:52.182492: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.182511: | trying: Informational Request Jan 13 23:06:52.182632: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.182648: | trying: Informational Response Jan 13 23:06:52.182658: | exchange type does not match INFORMATIONAL Jan 13 23:06:52.182676: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:06:52.182694: | secured payloads do not match Jan 13 23:06:52.182711: | trying: process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:06:52.182729: | secured message matched Jan 13 23:06:52.182747: | selected state microcode process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:06:52.182778: | #41 updating local interface from 161.53.235.3:4500 to 161.53.235.3:4500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:06:52.182800: | delref struct iface_endpoint@0x55c83801f058(4->3) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:06:52.182821: | addref struct iface_endpoint@0x55c83801f058(3->4) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:06:52.182839: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:06:52.182865: | Message ID: IKE #41 responder starting message request 6: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=5 .recv=5 .recv_frags=0 .recv_wip=6 .last_contact=9594499.623195 ike.wip.initiator=-1 Jan 13 23:06:52.182882: | calling processor process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:06:52.182908: | #41 spent 2.35 (2.35) milliseconds Jan 13 23:06:52.182932: | CREATE_CHILD_SA IPsec SA rekey Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:06:52.182948: | parsing 4 raw bytes of IKEv2 Notify Payload into SPI Jan 13 23:06:52.182964: | SPI Jan 13 23:06:52.182984: | 03 06 fb 0c .... Jan 13 23:06:52.183003: | CREATE_CHILD_S to rekey IPsec SA(0x0306fb0c) Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:06:52.183023: | v2 CHILD SA #44 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:06:52.183043: | State DB: found IKEv2 state #44 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:06:52.183067: | #41 hasa a rekey request for "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 TSi TSr Jan 13 23:06:52.183096: | newref alloc logger@0x55c838043798(0->1) (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:06:52.183113: | addref fd@NULL (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:06:52.183154: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 initialized Jan 13 23:06:52.183175: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 initialized Jan 13 23:06:52.183197: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: reqid=0 initialized Jan 13 23:06:52.183225: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: 00 00 00 00 00 00 00 00 initialized Jan 13 23:06:52.183254: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:06:52.183273: | creating state object #45 at 0x55c8380206c8 Jan 13 23:06:52.183300: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 added to hash table bucket 0x55c836589760 Jan 13 23:06:52.183323: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:06:52.183338: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:06:52.183364: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: 8d 77 44 17 30 6b 26 bc added to hash table bucket 0x55c83657eca0 Jan 13 23:06:52.183395: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e added to hash table bucket 0x55c83657b6e0 Jan 13 23:06:52.183413: | pstats #45 ikev2.child started Jan 13 23:06:52.183434: | duplicating state object #41 "MYCONN-ikev2-cp"[2] 94.253.210.164 as #45 for IPSEC SA Jan 13 23:06:52.183456: | #45 setting local endpoint to 161.53.235.3:4500 from #41.st_localport (duplicate_state() +1567 programs/pluto/state.c) Jan 13 23:06:52.183476: | addref struct iface_endpoint@0x55c83801f058(4->5) (duplicate_state() +1569 programs/pluto/state.c) Jan 13 23:06:52.183494: | duplicate_state: addref st_skeyid_nss-key@NULL Jan 13 23:06:52.183514: | duplicate_state: addref st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:06:52.183533: | duplicate_state: addref st_skey_ai_nss-key@0x55c838005890 Jan 13 23:06:52.183551: | duplicate_state: addref st_skey_ar_nss-key@0x55c838002520 Jan 13 23:06:52.183570: | duplicate_state: addref st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:06:52.183590: | duplicate_state: addref st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:06:52.183607: | duplicate_state: addref st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:06:52.183621: | duplicate_state: addref st_skey_pr_nss-key@0x55c838013660 Jan 13 23:06:52.183637: | duplicate_state: addref st_enc_key_nss-key@NULL Jan 13 23:06:52.183666: | Message ID: CHILD #41.#45 initializing (CHILD SA): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=5 .recv=5 .recv_frags=0 .recv_wip=6 .last_contact=9594499.623195 child.wip.initiator=0->-1 Jan 13 23:06:52.183688: | child state #45: UNDEFINED(ignore) => REKEY_CHILD_R0(established IKE SA) Jan 13 23:06:52.183702: | #45.st_v2_transition NULL -> NULL (new_v2_child_state() +1645 programs/pluto/state.c) Jan 13 23:06:52.183734: | rekeying Child SA with PFS1:ESP=AES_CBC_256-HMAC_SHA1_96-MODP2048-DISABLED 2:ESP=AES_CBC_256-HMAC_SHA1_96-NONE-DISABLED Jan 13 23:06:52.183754: | TSi: parsing 2 traffic selectors Jan 13 23:06:52.183767: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:06:52.183782: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:06:52.183797: | IP Protocol ID: ALL (0x0) Jan 13 23:06:52.183816: | length: 16 (00 10) Jan 13 23:06:52.183836: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:06:52.183856: | start port: 0 (00 00) Jan 13 23:06:52.183875: | end port: 65535 (ff ff) Jan 13 23:06:52.183894: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:06:52.183927: | TS IP start Jan 13 23:06:52.183940: | 00 00 00 00 .... Jan 13 23:06:52.183951: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:06:52.183968: | TS IP end Jan 13 23:06:52.183983: | ff ff ff ff .... Jan 13 23:06:52.184006: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:06:52.184025: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:06:52.184039: | IP Protocol ID: ALL (0x0) Jan 13 23:06:52.184058: | length: 40 (00 28) Jan 13 23:06:52.184076: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:06:52.184097: | start port: 0 (00 00) Jan 13 23:06:52.184117: | end port: 65535 (ff ff) Jan 13 23:06:52.184134: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:06:52.184151: | TS IP start Jan 13 23:06:52.184167: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:06:52.184185: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:06:52.184202: | TS IP end Jan 13 23:06:52.184221: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:06:52.184243: | TSi: parsed 2 traffic selectors Jan 13 23:06:52.184261: | TSr: parsing 2 traffic selectors Jan 13 23:06:52.184280: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:06:52.184300: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:06:52.184368: | IP Protocol ID: ALL (0x0) Jan 13 23:06:52.184382: | length: 16 (00 10) Jan 13 23:06:52.184393: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:06:52.184408: | start port: 0 (00 00) Jan 13 23:06:52.184430: | end port: 65535 (ff ff) Jan 13 23:06:52.184447: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:06:52.184465: | TS IP start Jan 13 23:06:52.184480: | 00 00 00 00 .... Jan 13 23:06:52.184497: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:06:52.184515: | TS IP end Jan 13 23:06:52.184531: | ff ff ff ff .... Jan 13 23:06:52.184552: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:06:52.184570: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:06:52.184588: | IP Protocol ID: ALL (0x0) Jan 13 23:06:52.184608: | length: 40 (00 28) Jan 13 23:06:52.184626: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:06:52.184647: | start port: 0 (00 00) Jan 13 23:06:52.184666: | end port: 65535 (ff ff) Jan 13 23:06:52.184684: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:06:52.184699: | TS IP start Jan 13 23:06:52.184715: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:06:52.184725: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:06:52.184734: | TS IP end Jan 13 23:06:52.184742: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:06:52.184753: | TSr: parsed 2 traffic selectors Jan 13 23:06:52.184772: | evaluating local "MYCONN-ikev2-cp"[2] 94.253.210.164 $9 I=192.168.101.10/32:0/0 R=0.0.0.0/0:0/0 fit <= to remote: Jan 13 23:06:52.184790: | TSi[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:06:52.184807: | match address end->client=192.168.101.10/32 <= TSi[0]net=0.0.0.0-255.255.255.255: YES fitness 64 Jan 13 23:06:52.184820: | narrow port end=0..65535 <= TSi[0]=0..65535: 0 Jan 13 23:06:52.184829: | TSi[0] port match: YES fitness 65536 Jan 13 23:06:52.184839: | narrow protocol end=*0 <= TSi[0]=*0: 0 Jan 13 23:06:52.184849: | match end->client.ipproto=*0 <= TSi[0].ipprotoid=*0: YES fitness 255 Jan 13 23:06:52.184864: | TSr[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:06:52.184880: | match address end->client=0.0.0.0/0 <= TSr[0]net=0.0.0.0-255.255.255.255: YES fitness 32 Jan 13 23:06:52.184892: | narrow port end=0..65535 <= TSr[0]=0..65535: 0 Jan 13 23:06:52.184917: | TSr[0] port match: YES fitness 65536 Jan 13 23:06:52.184928: | narrow protocol end=*0 <= TSr[0]=*0: 0 Jan 13 23:06:52.184938: | match end->client.ipproto=*0 <= TSr[0].ipprotoid=*0: YES fitness 255 Jan 13 23:06:52.184951: | best fit so far: TSi[0] TSr[0] Jan 13 23:06:52.184965: | TSr[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:06:52.184983: | match address end->client=0.0.0.0/0 <= TSr[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:06:52.184999: | TSi[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:06:52.185018: | match address end->client=192.168.101.10/32 <= TSi[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:06:52.185034: | comparing remote proposals against CREATE_CHILD_SA request 2 local proposals Jan 13 23:06:52.185048: | local proposal 1 type ENCR has 1 transforms Jan 13 23:06:52.185061: | local proposal 1 type PRF has 0 transforms Jan 13 23:06:52.185070: | local proposal 1 type INTEG has 1 transforms Jan 13 23:06:52.185080: | local proposal 1 type DH has 1 transforms Jan 13 23:06:52.185089: | local proposal 1 type ESN has 1 transforms Jan 13 23:06:52.185100: | local proposal 1 transforms: required: ENCR+INTEG+DH+ESN; optional: none Jan 13 23:06:52.185111: | local proposal 2 type ENCR has 1 transforms Jan 13 23:06:52.185120: | local proposal 2 type PRF has 0 transforms Jan 13 23:06:52.185129: | local proposal 2 type INTEG has 1 transforms Jan 13 23:06:52.185138: | local proposal 2 type DH has 1 transforms Jan 13 23:06:52.185148: | local proposal 2 type ESN has 1 transforms Jan 13 23:06:52.185157: | local proposal 2 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:06:52.185168: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:06:52.185180: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:06:52.185190: | length: 40 (00 28) Jan 13 23:06:52.185201: | prop #: 1 (01) Jan 13 23:06:52.185212: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:06:52.185222: | spi size: 4 (04) Jan 13 23:06:52.185235: | # transforms: 3 (03) Jan 13 23:06:52.185246: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:06:52.185255: | remote SPI Jan 13 23:06:52.185264: | fe c0 76 dc ..v. Jan 13 23:06:52.185274: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..2] of 2 local proposals Jan 13 23:06:52.185283: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:06:52.185292: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.185302: | length: 12 (00 0c) Jan 13 23:06:52.185312: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:06:52.185325: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:06:52.185334: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:06:52.185344: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:06:52.185357: | length/value: 256 (01 00) Jan 13 23:06:52.185371: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:06:52.185384: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:06:52.185394: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:06:52.185403: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.185413: | length: 8 (00 08) Jan 13 23:06:52.185425: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:06:52.185434: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:06:52.185446: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:06:52.185456: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 2 type 3 (INTEG) transform 0 Jan 13 23:06:52.185468: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:06:52.185477: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:06:52.185510: | length: 8 (00 08) Jan 13 23:06:52.185528: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:06:52.185541: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:06:52.185563: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:06:52.185578: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 0 Jan 13 23:06:52.185595: | remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none Jan 13 23:06:52.185617: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+INTEG+DH+ESN; optional: none; matched: ENCR+INTEG+ESN Jan 13 23:06:52.185632: | remote proposal 1 does not match local proposal 1; unmatched transforms: none; missing transforms: DH Jan 13 23:06:52.185650: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 2; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN Jan 13 23:06:52.185667: | remote proposal 1 matches local proposal 2 Jan 13 23:06:52.185682: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:06:52.185696: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:06:52.185719: | length: 36 (00 24) Jan 13 23:06:52.185735: | prop #: 2 (02) Jan 13 23:06:52.185752: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:06:52.185772: | spi size: 4 (04) Jan 13 23:06:52.185789: | # transforms: 3 (03) Jan 13 23:06:52.185809: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:06:52.185825: | remote SPI Jan 13 23:06:52.185845: | fe c0 76 dc ..v. Jan 13 23:06:52.185863: | Comparing remote proposal 2 containing 3 transforms against local proposal [1..1] of 2 local proposals Jan 13 23:06:52.185882: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:06:52.185898: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.185917: | length: 8 (00 08) Jan 13 23:06:52.185935: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:06:52.185951: | IKEv2 transform ID: 3DES (0x3) Jan 13 23:06:52.185970: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:06:52.185990: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.186007: | length: 8 (00 08) Jan 13 23:06:52.186026: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:06:52.186043: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:06:52.186066: | remote proposal 2 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:06:52.186082: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:06:52.186097: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:06:52.186116: | length: 8 (00 08) Jan 13 23:06:52.186137: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:06:52.186150: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:06:52.186168: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:06:52.186190: | remote proposal 2 proposed transforms: ENCR+INTEG+ESN; matched: INTEG+ESN; unmatched: ENCR Jan 13 23:06:52.186207: | remote proposal 2 does not match; unmatched remote transforms: ENCR Jan 13 23:06:52.186241: "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: proposal 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=fec076dc chosen from remote proposals 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;ESN=DISABLED[first-match] 2:ESP:ENCR=3DES;INTEG=HMAC_SHA1_96;ESN=DISABLED Jan 13 23:06:52.186266: | CREATE_CHILD_SA request ikev2_proposal: 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=fec076dc Jan 13 23:06:52.186280: | converting proposal to internal trans attrs Jan 13 23:06:52.186311: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:06:52.186327: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:06:52.186338: | newref clone logger@0x55c838017ee8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:06:52.186370: | job 56 helper 0 #41 Child Rekey Responder KE and nonce nr (dh): added to pending queue Jan 13 23:06:52.186390: | #41 STATE_V2_ESTABLISHED_IKE_SA: retransmits: cleared Jan 13 23:06:52.186415: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c8380134e8 timeout in 60 seconds for #41 Jan 13 23:06:52.186439: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:06:52.186466: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 23:06:52.186493: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:06:52.186506: | addref struct msg_digest@0x55c838050b08(2->3) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:06:52.186521: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 23:06:52.186501: | job 56 helper 1 #41 Child Rekey Responder KE and nonce nr (dh): started Jan 13 23:06:52.186551: | #41 spent 3.63 (3.64) milliseconds in processing: process rekey Child SA request (CREATE_CHILD_SA) in v2_dispatch() Jan 13 23:06:52.186602: | delref struct msg_digest@0x55c838050b08(3->2) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:06:52.186620: | job 56 helper 1 #41 Child Rekey Responder KE and nonce nr (dh): finished Jan 13 23:06:52.186629: | #41 spent 6.04 (6.07) milliseconds in ikev2_process_packet() Jan 13 23:06:52.186661: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.145 (0.161) milliseconds in job 56 helper 1 #41 Child Rekey Responder KE and nonce nr (dh) Jan 13 23:06:52.186677: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:06:52.186705: | scheduling resume sending job back to main thread for #41 Jan 13 23:06:52.186728: | spent 6.11 (6.17) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:06:52.186776: | newref tt@0x7ff8c0006b18(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:06:52.186814: | helper 1: waiting for work Jan 13 23:06:52.186828: | processing resume sending job back to main thread for #41 Jan 13 23:06:52.186854: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:06:52.186870: | job 56 helper 1 #41 Child Rekey Responder KE and nonce nr (dh): calling state's callback function Jan 13 23:06:52.186890: | process_v2_CREATE_CHILD_SA_request_continue_1() for #45 STATE_V2_REKEY_CHILD_R0 Jan 13 23:06:52.186917: | xfrm: sendrecv_xfrm_msg() sending 22 Jan 13 23:06:52.186967: | kernel: netlink_get_spi: allocated 0x5f5d0309 for esp.0@161.53.235.3 Jan 13 23:06:52.186992: | kernel: allocated incoming spi 94.253.210.164 -> esp.5f5d0309@161.53.235.3 in tunnel-mode Jan 13 23:06:52.187009: | integ=HMAC_SHA1_96: .key_size=20 encrypt=AES_CBC: .key_size=32 .salt_size=0 keymat_len=52 Jan 13 23:06:52.187091: | result: newref data=Ni-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187127: | result: newref data=Ni-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187144: | data=Ni: delref tmp-key@0x55c838012940 Jan 13 23:06:52.187193: | result: newref data+=Nr-key@0x55c838012940 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187210: | append_symkey_bytes: delref lhs-key@0x55c838026d80 Jan 13 23:06:52.187242: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.187275: | prf+0: delref clone-key@0x55c838026d80 Jan 13 23:06:52.187313: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.187356: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.187423: | result: newref final-key@0x55c83801c850 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187466: | result: newref final-key@0x55c838026d80 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187480: | final: delref tmp-key@0x55c83801c850 Jan 13 23:06:52.187494: | prfplus: addref old_t[1]-key@0x55c838026d80 Jan 13 23:06:52.187520: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.187542: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:06:52.187571: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.187598: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.187626: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.187658: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.187738: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187772: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187786: | final: delref tmp-key@0x55c838041fd0 Jan 13 23:06:52.187834: | result: newref result-key@0x55c838041fd0 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.187850: | append_symkey_symkey: delref lhs-key@0x55c838026d80 Jan 13 23:06:52.187859: | prfplus: delref old_t[N]-key@0x55c838026d80 Jan 13 23:06:52.187892: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.187923: | prf+N: delref clone-key@0x55c838026d80 Jan 13 23:06:52.187960: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.187996: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.188034: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.188071: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.188145: | result: newref final-key@0x55c8380199c0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.188179: | result: newref final-key@0x55c838026d80 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.188193: | final: delref tmp-key@0x55c8380199c0 Jan 13 23:06:52.188240: | result: newref result-key@0x55c8380199c0 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.188257: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 23:06:52.188270: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 23:06:52.188322: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.188358: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:06:52.188398: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.188433: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.188469: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.188504: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.188579: | result: newref final-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.188613: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.188628: | final: delref tmp-key@0x55c838041fd0 Jan 13 23:06:52.188676: | result: newref result-key@0x55c838041fd0 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:06:52.188692: | append_symkey_symkey: delref lhs-key@0x55c8380199c0 Jan 13 23:06:52.188721: | prfplus: delref old_t[N]-key@0x55c838026d80 Jan 13 23:06:52.188736: | prfplus: delref old_t[final]-key@0x55c83801c850 Jan 13 23:06:52.188759: | child_sa_keymat: delref data-key@0x55c838012940 Jan 13 23:06:52.188797: | result: newref initiator to responder key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +125 programs/pluto/ikev2_crypto.c) Jan 13 23:06:52.188832: | initiator to responder keys: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.188869: | initiator to responder keys: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.188895: | ikev2_derive_child_keys: delref ikey-key@0x55c838012940 Jan 13 23:06:52.188934: | result: newref responder to initiator key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +133 programs/pluto/ikev2_crypto.c) Jan 13 23:06:52.188967: | responder to initiator keys:: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:06:52.189008: | responder to initiator keys:: delref slot-key-key@0x55c838003da0 Jan 13 23:06:52.189033: | ikev2_derive_child_keys: delref rkey-key@0x55c838012940 Jan 13 23:06:52.189051: | ikev2_derive_child_keys: delref keymat-key@0x55c838041fd0 Jan 13 23:06:52.189077: | kernel: install_ipsec_sa() for #45: inbound and outbound Jan 13 23:06:52.189098: | kernel: could_route called for MYCONN-ikev2-cp; kind=CK_INSTANCE that.has_client=yes oppo=no this.host_port=500 sec_label= Jan 13 23:06:52.189122: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:06:52.189153: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:06:52.189171: | matches: 1 Jan 13 23:06:52.189189: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:06:52.189217: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:06:52.189246: | kernel: setup_half_ipsec_sa() outbound 0.0.0.0/0-ALL->[161.53.235.3=IPv4=>94.253.210.164]-ALL->192.168.101.10/32 sec_label= Jan 13 23:06:52.189266: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:06:52.189282: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:06:52.189303: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:06:52.189320: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:06:52.189341: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:06:52.189366: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:06:52.189400: | kernel: add_sa() 0 outbound tunnel 0.0.0.0/0-ALL->161.53.235.3=ESP=fec076dc=espinudp=>94.253.210.164-ALL->192.168.101.10/32 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:06:52.189419: | xfrm: enabling tunnel mode Jan 13 23:06:52.189436: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:06:52.189450: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:06:52.189473: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:06:52.189487: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:06:52.189502: | xfrm: sendrecv_xfrm_msg() sending 16 Jan 13 23:06:52.189633: | netlink response for Add SA esp.fec076dc@94.253.210.164 included non-error error Jan 13 23:06:52.189656: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=0 owner=#44 tunnel Jan 13 23:06:52.189666: | kernel: set up outgoing SA Jan 13 23:06:52.189684: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:06:52.189713: | kernel: setup_half_ipsec_sa() inbound 192.168.101.10/32-ALL->[94.253.210.164=IPv4=>161.53.235.3]-ALL->0.0.0.0/0 sec_label= Jan 13 23:06:52.189732: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:06:52.189749: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:06:52.189784: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:06:52.189801: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:06:52.189819: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:06:52.189843: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:06:52.189876: | kernel: add_sa() 0 inbound tunnel 192.168.101.10/32-ALL->94.253.210.164=ESP=5f5d0309=espinudp=>161.53.235.3-ALL->0.0.0.0/0 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:06:52.189895: | xfrm: enabling tunnel mode Jan 13 23:06:52.189907: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:06:52.189918: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:06:52.189937: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:06:52.189950: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:06:52.189966: | xfrm: sendrecv_xfrm_msg() sending 26 Jan 13 23:06:52.190074: | netlink response for Add SA esp.5f5d0309@161.53.235.3 included non-error error Jan 13 23:06:52.190097: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=1 owner=#44 tunnel Jan 13 23:06:52.190107: | kernel: set up incoming SA Jan 13 23:06:52.190117: | kernel: sr for #45: erouted Jan 13 23:06:52.190140: | kernel: route_and_eroute() for 0.0.0.0/0 --> 192.168.101.10/32; proto 0, and source port 0 dest port 0 sec_label Jan 13 23:06:52.190165: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:06:52.190195: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:06:52.190212: | matches: 1 Jan 13 23:06:52.190230: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:06:52.190249: | kernel: route_and_eroute with c: MYCONN-ikev2-cp (next: none) ero:MYCONN-ikev2-cp esr:{(nil)} ro:MYCONN-ikev2-cp rosr:{(nil)} and state: #45 Jan 13 23:06:52.190266: | kernel: we are replacing an eroute Jan 13 23:06:52.190290: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:06:52.190316: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:06:52.190361: | kernel: raw_policy() REPLACE_OUTBOUND THIS_IS_NOT_INBOUND eroute_connection() sag_eroute() route_and_eroute() replace sag 0.0.0.0/0-ALL-161.53.235.3==94.253.210.164-ALL-192.168.101.10/32 shunt_policy=UNSET encap=tunnel,161.53.235.3=>94.253.210.164,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:06:52.190380: | xfrm_raw_policy() policy=IPv4/3 dir=1 Jan 13 23:06:52.190392: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:06:52.190403: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 23:06:52.190429: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=161.53.235.3 id.daddr=94.253.210.164 Jan 13 23:06:52.190447: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 23:06:52.190491: | kernel: policy: result=success Jan 13 23:06:52.190509: | kernel: route_and_eroute: firewall_notified: true Jan 13 23:06:52.190523: | kernel: route_and_eroute: instance "MYCONN-ikev2-cp"[2] 94.253.210.164, setting eroute_owner {spd=0x55c83803cdc8,sr=0x55c83803cdc8} to #45 (was #44) (newest_ipsec_sa=#44) Jan 13 23:06:52.190542: | ISAKMP_v2_CREATE_CHILD_SA: instance MYCONN-ikev2-cp[2], setting IKEv2 newest_ipsec_sa to #45 (was #44) (spd.eroute=#45) cloned from #41 Jan 13 23:06:52.190572: | opening output PBS CREATE_CHILD_SA message Jan 13 23:06:52.190593: | **emit ISAKMP Message: Jan 13 23:06:52.190608: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:06:52.190631: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:06:52.190649: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:06:52.190682: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:06:52.190699: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:06:52.190717: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:06:52.190742: | Message ID: 6 (00 00 00 06) Jan 13 23:06:52.190758: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:06:52.190780: | ***emit IKEv2 Encryption Payload: Jan 13 23:06:52.190799: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.190817: | flags: none (0x0) Jan 13 23:06:52.190839: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:06:52.190858: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:06:52.190875: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:06:52.190907: | emitting ikev2_proposal ... Jan 13 23:06:52.190928: | ****emit IKEv2 Security Association Payload: Jan 13 23:06:52.190941: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.190951: | flags: none (0x0) Jan 13 23:06:52.190971: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 23:06:52.190987: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:06:52.191005: | *****emit IKEv2 Proposal Substructure Payload: Jan 13 23:06:52.191023: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:06:52.191037: | prop #: 1 (01) Jan 13 23:06:52.191051: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:06:52.191073: | spi size: 4 (04) Jan 13 23:06:52.191090: | # transforms: 3 (03) Jan 13 23:06:52.191108: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 23:06:52.191125: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Jan 13 23:06:52.191143: | our spi: 5f 5d 03 09 Jan 13 23:06:52.191163: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:06:52.191192: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.191201: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:06:52.191210: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:06:52.191219: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:06:52.191228: | *******emit IKEv2 Attribute Substructure Payload: Jan 13 23:06:52.191237: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:06:52.191246: | length/value: 256 (01 00) Jan 13 23:06:52.191256: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 23:06:52.191266: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:06:52.191275: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.191285: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:06:52.191293: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:06:52.191302: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.191312: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:06:52.191320: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:06:52.191328: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:06:52.191339: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:06:52.191347: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:06:52.191354: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:06:52.191364: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:06:52.191377: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:06:52.191385: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:06:52.191392: | emitting length of IKEv2 Proposal Substructure Payload: 40 Jan 13 23:06:52.191402: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 23:06:52.191411: | emitting length of IKEv2 Security Association Payload: 44 Jan 13 23:06:52.191419: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 23:06:52.191426: | ****emit IKEv2 Nonce Payload: Jan 13 23:06:52.191431: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.191435: | flags: none (0x0) Jan 13 23:06:52.191440: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Jan 13 23:06:52.191445: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:06:52.191450: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Jan 13 23:06:52.191454: | IKEv2 nonce: Jan 13 23:06:52.191459: | ce da f2 93 ca 58 92 81 8c 27 a4 be 7b ae f2 4c .....X...'..{..L Jan 13 23:06:52.191464: | da 6b 5e 47 d8 77 0b 20 90 e4 f2 8b ca 5f 51 f8 .k^G.w. ....._Q. Jan 13 23:06:52.191469: | emitting length of IKEv2 Nonce Payload: 36 Jan 13 23:06:52.191473: | that TSi TS Jan 13 23:06:52.191478: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:06:52.191486: | ipprotoid: 0 Jan 13 23:06:52.191497: | port range: 0-65535 Jan 13 23:06:52.191509: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:06:52.191518: | sec_label: Jan 13 23:06:52.191525: | this TSr TS Jan 13 23:06:52.191533: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:06:52.191543: | ipprotoid: 0 Jan 13 23:06:52.191552: | port range: 0-65535 Jan 13 23:06:52.191564: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:06:52.191574: | sec_label: Jan 13 23:06:52.191581: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:06:52.191589: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.191599: | flags: none (0x0) Jan 13 23:06:52.191608: | number of TS: 1 (01) Jan 13 23:06:52.191619: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Jan 13 23:06:52.191627: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:06:52.191635: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:06:52.191643: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:06:52.191650: | IP Protocol ID: ALL (0x0) Jan 13 23:06:52.191658: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:06:52.191670: | start port: 0 (00 00) Jan 13 23:06:52.191680: | end port: 65535 (ff ff) Jan 13 23:06:52.191690: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:06:52.191700: | IP start: c0 a8 65 0a Jan 13 23:06:52.191709: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:06:52.191718: | IP end: c0 a8 65 0a Jan 13 23:06:52.191726: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:06:52.191731: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Jan 13 23:06:52.191736: | ****emit IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:06:52.191740: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.191745: | flags: none (0x0) Jan 13 23:06:52.191750: | number of TS: 1 (01) Jan 13 23:06:52.191755: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Jan 13 23:06:52.191771: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:06:52.191776: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:06:52.191783: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:06:52.191787: | IP Protocol ID: ALL (0x0) Jan 13 23:06:52.191792: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:06:52.191797: | start port: 0 (00 00) Jan 13 23:06:52.191802: | end port: 65535 (ff ff) Jan 13 23:06:52.191808: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:06:52.191814: | IP start: 00 00 00 00 Jan 13 23:06:52.191819: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:06:52.191824: | IP end: ff ff ff ff Jan 13 23:06:52.191828: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:06:52.191833: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Jan 13 23:06:52.191838: | adding 16 bytes of padding (including 1 byte padding-length) Jan 13 23:06:52.191845: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191850: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191855: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191860: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191864: | emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191869: | emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191874: | emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191879: | emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191885: | emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191890: | emitting 1 0x09 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191895: | emitting 1 0x0a repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191899: | emitting 1 0x0b repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191904: | emitting 1 0x0c repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191909: | emitting 1 0x0d repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191913: | emitting 1 0x0e repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191918: | emitting 1 0x0f repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.191923: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:06:52.191929: | emitting length of IKEv2 Encryption Payload: 180 Jan 13 23:06:52.191933: | emitting length of ISAKMP Message: 208 Jan 13 23:06:52.191958: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.191972: | integ: delref clone-key@0x55c838041fd0 Jan 13 23:06:52.191989: | child state #45: REKEY_CHILD_R0(established IKE SA) => ESTABLISHED_CHILD_SA(established CHILD SA) Jan 13 23:06:52.191997: | pstats #45 ikev2.child established Jan 13 23:06:52.192006: | this TS Jan 13 23:06:52.192012: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:06:52.192016: | ipprotoid: 0 Jan 13 23:06:52.192021: | port range: 0-65535 Jan 13 23:06:52.192027: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:06:52.192032: | sec_label: Jan 13 23:06:52.192037: | that TS Jan 13 23:06:52.192041: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:06:52.192047: | ipprotoid: 0 Jan 13 23:06:52.192052: | port range: 0-65535 Jan 13 23:06:52.192057: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:06:52.192063: | sec_label: Jan 13 23:06:52.192071: | NAT-T: NAT Traversal detected - their IKE port is '500' Jan 13 23:06:52.192082: | NAT-T: encaps is 'auto' Jan 13 23:06:52.192090: "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: established Child SA using #41; IPsec tunnel [0.0.0.0-255.255.255.255:0-65535 0] -> [192.168.101.10-192.168.101.10:0-65535 0] {ESPinUDP=>0xfec076dc <0x5f5d0309 xfrm=AES_CBC_256-HMAC_SHA1_96 NATD=94.253.210.164:4500 DPD=active} Jan 13 23:06:52.192097: | #45 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 23:06:52.192105: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c8380255f8 timeout in 28800 seconds for #45 Jan 13 23:06:52.192111: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:06:52.192118: | dpd enabled, scheduling ikev2 liveness checks Jan 13 23:06:52.192126: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c83804f078 timeout in 30 seconds for #45 Jan 13 23:06:52.192134: | newref tt@0x55c838012e58(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:06:52.192141: | unpending IKE SA #41 CHILD SA #45 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:06:52.192148: | unpending state #41 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:06:52.192154: | job 56 helper 1 #41 Child Rekey Responder KE and nonce nr (dh): final status STF_OK; cleaning up Jan 13 23:06:52.192160: | delref secret@NULL (cleanup_ke_and_nonce() +83 programs/pluto/crypt_ke.c) Jan 13 23:06:52.192166: | delref logger@0x55c838017ee8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:06:52.192171: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:06:52.192175: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:06:52.192181: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:06:52.192189: | Message ID: updating counters for #41 Jan 13 23:06:52.192201: | Message ID: IKE #41 updating responder received message request 6: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=5 .recv=5->6 .recv_frags=0 .recv_wip=6->-1 .last_contact=9594499.623195->9594680.213267 ike.wip.initiator=-1 Jan 13 23:06:52.192211: | Message ID: IKE #41 updating responder sent message response 6: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=5->6 .recv=6 .recv_frags=0 .last_contact=9594680.213267 ike.wip.initiator=-1 Jan 13 23:06:52.192220: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=6 .recv=6 .recv_frags=0 .last_contact=9594680.213267 ike.wip.initiator=-1 Jan 13 23:06:52.192227: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:06:52.192233: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:06:52.192240: | delref state-event@0x55c8380134e8(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:06:52.192245: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:06:52.192254: | sending 212 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:06:52.192260: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:06:52.192265: | 82 26 37 8e 2e 20 24 20 00 00 00 06 00 00 00 d0 .&7.. $ ........ Jan 13 23:06:52.192269: | 21 00 00 b4 63 11 62 a1 bb 7f f9 60 e3 c1 4d 30 !...c.b....`..M0 Jan 13 23:06:52.192274: | 4c a1 33 1b ba 9b 3e 5a 46 28 c2 8a 8c 57 b0 ed L.3...>ZF(...W.. Jan 13 23:06:52.192278: | 73 a4 3b e1 a2 07 8d 55 d5 4d 51 18 79 5c 3d d3 s.;....U.MQ.y\=. Jan 13 23:06:52.192283: | d0 d1 ec 00 0c 93 b9 f9 d5 e9 49 df 9e 09 e2 3f ..........I....? Jan 13 23:06:52.192289: | a3 eb de 5c 52 e6 37 4f 38 07 2c 9e 2b e1 db 3f ...\R.7O8.,.+..? Jan 13 23:06:52.192293: | 0b c6 5d e6 50 6b 23 da ee 93 6b 16 cd 88 f1 c6 ..].Pk#...k..... Jan 13 23:06:52.192298: | 7e 1b 54 36 e9 f4 7e 4d bd 8d cd b5 e3 aa 1f 23 ~.T6..~M.......# Jan 13 23:06:52.192316: | 8d c4 35 4a 04 2d 61 5a a3 2b 5d fb 1e 91 eb ab ..5J.-aZ.+]..... Jan 13 23:06:52.192325: | 59 de bf 20 26 40 a2 b8 6a 7e 98 49 c7 90 76 71 Y.. &@..j~.I..vq Jan 13 23:06:52.192330: | ec af 0a 71 77 ef 19 7a 98 fc 41 01 41 3d 61 90 ...qw..z..A.A=a. Jan 13 23:06:52.192335: | 91 93 76 76 b2 b7 b6 f6 4a 2c db de 24 ef 47 2b ..vv....J,..$.G+ Jan 13 23:06:52.192339: | 16 1f 65 dd ..e. Jan 13 23:06:52.192367: | sent 1 messages Jan 13 23:06:52.192375: | announcing the state transition Jan 13 23:06:52.192382: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: process rekey Child SA request (CREATE_CHILD_SA): established IKE SA Jan 13 23:06:52.192388: | releasing whack Jan 13 23:06:52.192393: | releasing #41's fd@(nil) because ST per transition Jan 13 23:06:52.192398: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:06:52.192403: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:06:52.192408: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:06:52.192415: | delref logger@0x55c838017c78(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:06:52.192419: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:06:52.192424: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:06:52.192430: | delref struct iface_endpoint@0x55c83801f058(5->4) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:06:52.192445: | #41 spent 5.57 (5.59) milliseconds in resume sending job back to main thread Jan 13 23:06:52.192456: | delref tt@0x7ff8c0006b18(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:06:52.208726: | spent 0.00342 (0.00341) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:06:52.208767: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:06:52.208779: | addref struct iface_endpoint@0x55c83801f058(4->5) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:06:52.208791: | newref alloc logger@0x55c838017ee8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:06:52.208812: | *received 80 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:06:52.208825: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:06:52.208835: | 2e 20 25 08 00 00 00 07 00 00 00 50 2a 00 00 34 . %........P*..4 Jan 13 23:06:52.208846: | 46 14 c2 4f bf 64 24 c9 7c 28 b1 83 95 1b 8c 83 F..O.d$.|(...... Jan 13 23:06:52.208859: | 24 33 f0 ef 70 4b 88 3f 76 a3 51 1a 6c 6b 10 c4 $3..pK.?v.Q.lk.. Jan 13 23:06:52.208872: | 47 62 32 5d b9 f5 7a 60 e7 63 41 e6 59 a9 b5 5a Gb2]..z`.cA.Y..Z Jan 13 23:06:52.208886: | **parse ISAKMP Message: Jan 13 23:06:52.208900: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:06:52.208916: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:06:52.208928: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:06:52.208940: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:06:52.208952: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:06:52.208966: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:06:52.208981: | Message ID: 7 (00 00 00 07) Jan 13 23:06:52.208995: | length: 80 (00 00 00 50) Jan 13 23:06:52.209009: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jan 13 23:06:52.209022: | I am the IKE SA Original Responder receiving an IKEv2 INFORMATIONAL request Jan 13 23:06:52.209035: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:06:52.209050: | #41 st.st_msgid_lastrecv 6 md.hdr.isa_msgid 00000007 Jan 13 23:06:52.209070: | Message ID: IKE #41 not a duplicate - message request 7 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=6 .recv=6 .recv_frags=0 .last_contact=9594680.213267 ike.wip.initiator=-1 Jan 13 23:06:52.209094: | unpacking clear payload Jan 13 23:06:52.209102: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:06:52.209109: | ***parse IKEv2 Encryption Payload: Jan 13 23:06:52.209120: | next payload type: ISAKMP_NEXT_v2D (0x2a) Jan 13 23:06:52.209131: | flags: none (0x0) Jan 13 23:06:52.209145: | length: 52 (00 34) Jan 13 23:06:52.209156: | processing payload: ISAKMP_NEXT_v2SK (len=48) Jan 13 23:06:52.209171: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK (ignoring secured payloads) Jan 13 23:06:52.209183: | trying: Informational Request (liveness probe) Jan 13 23:06:52.209194: | matching by ignoring secured payloads Jan 13 23:06:52.209227: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.209250: | auth: delref clone-key@0x55c838041fd0 Jan 13 23:06:52.209279: | authenticator matched Jan 13 23:06:52.209303: | stripping 4 octets as pad Jan 13 23:06:52.209317: | #41 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success Jan 13 23:06:52.209328: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:06:52.209339: | Now let's proceed with payload (ISAKMP_NEXT_v2D) Jan 13 23:06:52.209352: | **parse IKEv2 Delete Payload: Jan 13 23:06:52.209364: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.209377: | flags: none (0x0) Jan 13 23:06:52.209388: | length: 12 (00 0c) Jan 13 23:06:52.209401: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:06:52.209409: | SPI size: 4 (04) Jan 13 23:06:52.209416: | number of SPIs: 1 (00 01) Jan 13 23:06:52.209429: | processing payload: ISAKMP_NEXT_v2D (len=4) Jan 13 23:06:52.209443: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK{D} Jan 13 23:06:52.209455: | trying: Informational Request (liveness probe) Jan 13 23:06:52.209466: | secured payloads do not match Jan 13 23:06:52.209477: | trying: Informational Response (liveness probe) Jan 13 23:06:52.209490: | message role does not match response Jan 13 23:06:52.209503: | trying: Informational Request Jan 13 23:06:52.209515: | secured message matched Jan 13 23:06:52.209528: | selected state microcode Informational Request Jan 13 23:06:52.209543: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:06:52.209563: | Message ID: IKE #41 responder starting message request 7: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=6 .recv=6 .recv_frags=0 .recv_wip=7 .last_contact=9594680.213267 ike.wip.initiator=-1 Jan 13 23:06:52.209574: | calling processor Informational Request Jan 13 23:06:52.209589: | an informational request needing a response Jan 13 23:06:52.209607: | opening output PBS information exchange reply packet Jan 13 23:06:52.209619: | **emit ISAKMP Message: Jan 13 23:06:52.209634: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:06:52.209649: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:06:52.209659: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:06:52.209669: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:06:52.209680: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:06:52.209693: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:06:52.209707: | Message ID: 7 (00 00 00 07) Jan 13 23:06:52.209716: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:06:52.209724: | ***emit IKEv2 Encryption Payload: Jan 13 23:06:52.209730: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.209736: | flags: none (0x0) Jan 13 23:06:52.209743: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:06:52.209751: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:06:52.209769: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:06:52.209781: | parsing 4 raw bytes of IKEv2 Delete Payload into SPI Jan 13 23:06:52.209789: | SPI Jan 13 23:06:52.209796: | 03 06 fb 0c .... Jan 13 23:06:52.209802: | delete IKEv2_SEC_PROTO_ESP SA(0x0306fb0c) Jan 13 23:06:52.209809: | v2 CHILD SA #44 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:06:52.209816: | State DB: found IKEv2 state #44 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:06:52.209823: | our side SPI that needs to be deleted: IKEv2_SEC_PROTO_ESP SA(0x0306fb0c) Jan 13 23:06:52.209831: | should_send_delete: #44? NO, because Jan 13 23:06:52.209840: | deleting state (STATE_V2_ESTABLISHED_CHILD_SA) aged 180.630563s and NOT sending notification Jan 13 23:06:52.209849: | pstats #44 ikev2.child deleted completed Jan 13 23:06:52.209858: | #44 main thread spent 1.43 (1.42) milliseconds helper thread spent 0 (0) milliseconds in total Jan 13 23:06:52.209869: | kernel: get_sa_info esp.306fb0c@94.253.210.164 Jan 13 23:06:52.209877: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:52.209905: | kernel: get_sa_info esp.2ca41e1@161.53.235.3 Jan 13 23:06:52.209915: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:52.209934: "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: ESP traffic information: in=3MB out=119MB Jan 13 23:06:52.209944: | suspend: no MD saved in state #44 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:06:52.209950: | should_send_delete: #44? NO, because Jan 13 23:06:52.209957: | #44 deleting EVENT_v2_LIVENESS Jan 13 23:06:52.209966: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:06:52.209975: | delref state-event@0x55c838013358(1->0) (delete_state_tail() +1036 programs/pluto/state.c) Jan 13 23:06:52.209982: | #44 deleting EVENT_SA_EXPIRE Jan 13 23:06:52.209989: | delref tt@0x55c838018328(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:06:52.209998: | delref state-event@0x55c83804df78(1->0) (delete_state_tail() +1039 programs/pluto/state.c) Jan 13 23:06:52.210005: | #44 STATE_V2_ESTABLISHED_CHILD_SA: retransmits: cleared Jan 13 23:06:52.210016: | kernel: deleting spi 161.53.235.3 -> esp.306fb0c@94.253.210.164 Jan 13 23:06:52.210025: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:06:52.210031: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:06:52.210047: | netlink response for Del SA esp.306fb0c@94.253.210.164 included non-error error Jan 13 23:06:52.210060: | kernel: deleting spi 94.253.210.164 -> esp.2ca41e1@161.53.235.3 Jan 13 23:06:52.210066: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:06:52.210072: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:06:52.210104: | netlink response for Del SA esp.2ca41e1@161.53.235.3 included non-error error Jan 13 23:06:52.210116: | skipping revival: not an IKE SA Jan 13 23:06:52.210123: | delref struct iface_endpoint@0x55c83801f058(5->4) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:06:52.210134: | entry state hash_table_entries.serialno@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44 deleted from hash table Jan 13 23:06:52.210160: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $9 deleted from hash table Jan 13 23:06:52.210169: | entry state hash_table_entries.reqid@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: reqid=0 deleted from hash table Jan 13 23:06:52.210181: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: 8d 77 44 17 30 6b 26 bc deleted from hash table Jan 13 23:06:52.210195: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #44: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e deleted from hash table Jan 13 23:06:52.210204: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:06:52.210222: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:52.210231: | connection instance MYCONN-ikev2-cp in use by #45, skipping delete-unused Jan 13 23:06:52.210239: | child state #44: ESTABLISHED_CHILD_SA(established CHILD SA) => UNDEFINED(ignore) Jan 13 23:06:52.210246: | releasing #44's fd@(nil) because deleting state Jan 13 23:06:52.210252: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:06:52.210260: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:06:52.210267: | delref pkp@NULL (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:06:52.210275: | delref secret@NULL (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:06:52.210284: | delete_state_tail: delref st->st_dh_shared_secret-key@NULL Jan 13 23:06:52.210291: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:06:52.210297: | delete_state_tail: delref st->st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:06:52.210303: | delete_state_tail: delref st->st_skey_ai_nss-key@0x55c838005890 Jan 13 23:06:52.210311: | delete_state_tail: delref st->st_skey_ar_nss-key@0x55c838002520 Jan 13 23:06:52.210317: | delete_state_tail: delref st->st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:06:52.210323: | delete_state_tail: delref st->st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:06:52.210329: | delete_state_tail: delref st->st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:06:52.210335: | delete_state_tail: delref st->st_skey_pr_nss-key@0x55c838013660 Jan 13 23:06:52.210341: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:06:52.210346: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:06:52.210352: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:06:52.210357: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:06:52.210365: | delref logger@0x55c838019ae8(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:06:52.210372: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:06:52.210378: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:06:52.210386: | ****emit IKEv2 Delete Payload: Jan 13 23:06:52.210394: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:06:52.210401: | flags: none (0x0) Jan 13 23:06:52.210407: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:06:52.210414: | SPI size: 4 (04) Jan 13 23:06:52.210421: | number of SPIs: 1 (00 01) Jan 13 23:06:52.210428: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) Jan 13 23:06:52.210436: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:06:52.210443: | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload Jan 13 23:06:52.210450: | local SPIs: 02 ca 41 e1 Jan 13 23:06:52.210458: | emitting length of IKEv2 Delete Payload: 12 Jan 13 23:06:52.210465: | adding 4 bytes of padding (including 1 byte padding-length) Jan 13 23:06:52.210472: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.210478: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.210485: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.210493: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:06:52.210500: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:06:52.210506: | emitting length of IKEv2 Encryption Payload: 52 Jan 13 23:06:52.210512: | emitting length of ISAKMP Message: 80 Jan 13 23:06:52.210543: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:06:52.210562: | integ: delref clone-key@0x55c838041fd0 Jan 13 23:06:52.210587: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:06:52.210608: | Message ID: updating counters for #41 Jan 13 23:06:52.210622: | Message ID: IKE #41 updating responder received message request 7: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=6 .recv=6->7 .recv_frags=0 .recv_wip=7->-1 .last_contact=9594680.213267->9594680.231687 ike.wip.initiator=-1 Jan 13 23:06:52.210635: | Message ID: IKE #41 updating responder sent message response 7: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=6->7 .recv=7 .recv_frags=0 .last_contact=9594680.231687 ike.wip.initiator=-1 Jan 13 23:06:52.210647: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594674.302178 ike.responder .sent=7 .recv=7 .recv_frags=0 .last_contact=9594680.231687 ike.wip.initiator=-1 Jan 13 23:06:52.210656: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:06:52.210667: | sending 84 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:06:52.210675: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:06:52.210681: | 82 26 37 8e 2e 20 25 20 00 00 00 07 00 00 00 50 .&7.. % .......P Jan 13 23:06:52.210687: | 2a 00 00 34 f7 63 41 3c 14 ae 16 41 6d c7 ff b8 *..4.cA<...Am... Jan 13 23:06:52.210693: | c8 5f ef 57 35 b5 85 f9 3c d8 d7 b0 31 a8 e7 ec ._.W5...<...1... Jan 13 23:06:52.210699: | 45 d3 c4 00 d7 05 f0 0d 59 8a fa 9d 2f 54 3a 22 E.......Y.../T:" Jan 13 23:06:52.210705: | 2e 94 b8 1e .... Jan 13 23:06:52.210739: | sent 1 messages Jan 13 23:06:52.210751: | announcing the state transition Jan 13 23:06:52.210760: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: established IKE SA Jan 13 23:06:52.210773: | #41 spent 1.15 (1.18) milliseconds in processing: Informational Request in v2_dispatch() Jan 13 23:06:52.210782: | delref struct msg_digest@0x55c838050b08(2->1) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:06:52.210792: | #41 spent 2.05 (2.08) milliseconds in ikev2_process_packet() Jan 13 23:06:52.210800: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:06:52.210807: | delref logger@0x55c838017ee8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:06:52.210814: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:06:52.210819: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:06:52.210827: | delref struct iface_endpoint@0x55c83801f058(4->3) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:06:52.210836: | spent 2.09 (2.12) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:06:52.315553: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:52.315585: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:52.315613: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:52.315623: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:52.315633: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:52.315642: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:52.315651: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:52.315661: | matches: 3 Jan 13 23:06:52.315668: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:52.315676: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:52.315684: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:52.315694: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:52.315704: | matches: 3 Jan 13 23:06:52.315758: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:52.315790: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:52.315804: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:52.315858: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:52.315873: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:52.315902: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:52.315919: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:52.315940: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:52.315963: | spent 0.428 (0.428) milliseconds in whack Jan 13 23:06:53.321398: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:53.321451: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:53.321488: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:53.321682: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:53.321708: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:53.321736: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:53.321751: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:53.321771: | matches: 3 Jan 13 23:06:53.321795: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:53.321819: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:53.321834: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:53.321849: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:53.321859: | matches: 3 Jan 13 23:06:53.321916: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:53.321957: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:53.321971: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:53.322010: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:53.322025: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:53.322058: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:53.322076: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:53.322101: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:53.322122: | spent 0.592 (0.752) milliseconds in whack Jan 13 23:06:54.327809: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:54.327859: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:54.327901: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:54.327918: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:54.327935: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:54.327950: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:54.327962: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:54.327973: | matches: 3 Jan 13 23:06:54.327984: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:54.327997: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:54.328008: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:54.328023: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:54.328033: | matches: 3 Jan 13 23:06:54.328091: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:54.328134: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:54.328149: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:54.328188: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:54.328202: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:54.328235: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:54.328253: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:54.328279: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:54.328301: | spent 0.524 (0.522) milliseconds in whack Jan 13 23:06:55.331817: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:55.331855: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:55.331915: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:55.331931: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:55.331947: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:55.331961: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:55.331975: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:55.331984: | matches: 3 Jan 13 23:06:55.331994: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:55.332007: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:55.332019: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:55.332029: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:55.332038: | matches: 3 Jan 13 23:06:55.332085: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:55.332124: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:55.332138: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:55.332175: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:55.332189: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:55.332218: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:55.332233: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:55.332255: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:55.332274: | spent 0.477 (0.476) milliseconds in whack Jan 13 23:06:56.335283: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:56.335326: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:56.335358: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:56.335373: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:56.335391: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:56.335406: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:56.335419: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:56.335431: | matches: 3 Jan 13 23:06:56.335441: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:56.335453: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:56.335464: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:56.335475: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:56.335485: | matches: 3 Jan 13 23:06:56.335533: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:56.335575: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:56.335592: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:56.335630: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:56.335645: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:56.335679: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:56.335696: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:56.335716: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:56.335735: | spent 0.471 (0.47) milliseconds in whack Jan 13 23:06:57.338730: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:57.338761: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:57.338792: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:57.338821: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:57.338838: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:57.338852: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:57.338866: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:57.338876: | matches: 3 Jan 13 23:06:57.338888: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:57.338902: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:57.338914: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:57.338942: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:57.338954: | matches: 3 Jan 13 23:06:57.339004: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:57.339048: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:57.339065: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:57.339101: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:57.339117: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:57.339150: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:57.339167: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:57.339188: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:57.339207: | spent 0.496 (0.495) milliseconds in whack Jan 13 23:06:58.342377: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:58.342423: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:58.342461: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:58.342479: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:58.342497: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:58.342511: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:58.342525: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:58.342536: | matches: 3 Jan 13 23:06:58.342549: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:58.342561: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:58.342573: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:58.342585: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:58.342596: | matches: 3 Jan 13 23:06:58.342645: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:58.342687: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:58.342704: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:58.342740: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:58.342755: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:58.342789: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:58.342806: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:58.342828: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:58.342846: | spent 0.489 (0.488) milliseconds in whack Jan 13 23:06:59.345793: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:59.345821: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:06:59.345862: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:06:59.345877: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:59.345894: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:59.345909: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:59.345924: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:59.345934: | matches: 3 Jan 13 23:06:59.345944: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:06:59.345956: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:06:59.345969: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:06:59.345982: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:06:59.345992: | matches: 3 Jan 13 23:06:59.346041: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:06:59.346085: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:06:59.346102: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:59.346137: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:06:59.346153: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:06:59.346187: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:06:59.346204: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:59.346227: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:06:59.346260: | spent 0.481 (0.481) milliseconds in whack Jan 13 23:07:00.349265: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:00.349297: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:00.349325: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:00.349339: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:00.349353: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:00.349368: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:00.349382: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:00.349392: | matches: 3 Jan 13 23:07:00.349405: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:00.349418: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:00.349431: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:00.349443: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:00.349453: | matches: 3 Jan 13 23:07:00.349503: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:00.349544: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:00.349560: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:00.349594: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:00.349608: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:00.349639: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:00.349654: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:00.349672: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:00.349687: | spent 0.44 (0.439) milliseconds in whack Jan 13 23:07:01.355028: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:01.355083: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:01.355123: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:01.355137: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:01.355155: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:01.355168: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:01.355181: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:01.355197: | matches: 3 Jan 13 23:07:01.355208: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:01.355220: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:01.355241: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:01.355265: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:01.355286: | matches: 3 Jan 13 23:07:01.355376: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:01.355449: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:01.355462: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:01.355493: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:01.355504: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:01.355523: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:01.355532: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:01.355546: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:01.355557: | spent 0.567 (0.565) milliseconds in whack Jan 13 23:07:02.360681: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:02.360734: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:02.360778: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:02.360795: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:02.360813: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:02.360828: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:02.360841: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:02.360875: | matches: 3 Jan 13 23:07:02.360887: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:02.360902: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:02.360914: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:02.360925: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:02.360936: | matches: 3 Jan 13 23:07:02.361001: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:02.361050: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:02.361066: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:02.361105: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:02.361120: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:02.361152: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:02.361170: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:02.361196: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:02.361218: | spent 0.568 (0.566) milliseconds in whack Jan 13 23:07:02.537918: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:02.537962: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:02.537998: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:02.538010: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:02.538025: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:02.538037: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:02.538049: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:02.538064: | matches: 3 Jan 13 23:07:02.538075: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:02.538087: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:02.538101: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:02.538113: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:02.538124: | matches: 3 Jan 13 23:07:02.538176: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:02.538220: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:02.538234: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:02.538269: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:02.538282: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:02.538315: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:02.538332: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:02.538357: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:02.538378: | spent 0.485 (0.484) milliseconds in whack Jan 13 23:07:03.545573: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:03.545621: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:03.545657: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:03.545853: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:03.545881: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:03.545903: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:03.545916: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:03.545930: | matches: 3 Jan 13 23:07:03.545953: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:03.545978: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:03.545997: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:03.546009: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:03.546020: | matches: 3 Jan 13 23:07:03.546073: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:03.546114: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:03.546129: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:03.546167: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:03.546181: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:03.546238: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:03.546256: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:03.546281: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:03.546302: | spent 0.592 (0.754) milliseconds in whack Jan 13 23:07:04.553176: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:04.553223: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:04.553260: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:04.553273: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:04.553289: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:04.553301: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:04.553314: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:04.553329: | matches: 3 Jan 13 23:07:04.553339: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:04.553351: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:04.553365: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:04.553377: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:04.553388: | matches: 3 Jan 13 23:07:04.553446: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:04.553493: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:04.553512: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:04.553550: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:04.553564: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:04.553597: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:04.553614: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:04.553640: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:04.553661: | spent 0.514 (0.513) milliseconds in whack Jan 13 23:07:05.560441: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:05.560488: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:05.560526: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:05.560541: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:05.560556: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:05.560571: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:05.560583: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:05.560592: | matches: 3 Jan 13 23:07:05.560603: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:05.560615: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:05.560626: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:05.560637: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:05.560646: | matches: 3 Jan 13 23:07:05.560704: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:05.560746: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:05.560761: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:05.560798: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:05.560812: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:05.560845: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:05.560862: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:05.560886: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:05.560907: | spent 0.494 (0.492) milliseconds in whack Jan 13 23:07:06.567749: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:06.567796: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:06.567832: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:06.567883: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:06.567901: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:06.567916: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:06.567928: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:06.567940: | matches: 3 Jan 13 23:07:06.567952: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:06.567966: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:06.567977: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:06.567988: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:06.568000: | matches: 3 Jan 13 23:07:06.568055: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:06.568101: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:06.568119: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:06.568172: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:06.568190: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:06.568234: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:06.568264: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:06.568296: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:06.568350: | spent 0.617 (0.623) milliseconds in whack Jan 13 23:07:07.575396: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:07.575445: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:07.575485: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:07.575499: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:07.575517: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:07.575530: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:07.575541: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:07.575550: | matches: 3 Jan 13 23:07:07.575561: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:07.575579: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:07.575590: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:07.575602: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:07.575616: | matches: 3 Jan 13 23:07:07.575697: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:07.575752: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:07.575773: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:07.575820: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:07.575837: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:07.575876: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:07.575898: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:07.575926: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:07.575957: | spent 0.594 (0.592) milliseconds in whack Jan 13 23:07:08.582885: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:08.582933: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:08.582970: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:08.583121: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:08.583157: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:08.583181: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:08.583205: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:08.583225: | matches: 3 Jan 13 23:07:08.583245: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:08.583271: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:08.583296: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:08.583318: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:08.583336: | matches: 3 Jan 13 23:07:08.583439: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:08.583487: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:08.583509: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:08.583561: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:08.583583: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:08.583624: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:08.583649: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:08.583681: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:08.583713: | spent 0.732 (0.852) milliseconds in whack Jan 13 23:07:09.590597: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:09.590644: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:09.590682: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:09.590696: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:09.590713: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:09.590725: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:09.590737: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:09.590746: | matches: 3 Jan 13 23:07:09.590757: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:09.590781: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:09.590806: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:09.590828: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:09.590844: | matches: 3 Jan 13 23:07:09.590925: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:09.590999: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:09.591026: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:09.591084: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:09.591106: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:09.591155: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:09.591180: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:09.591215: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:09.591245: | spent 0.676 (0.674) milliseconds in whack Jan 13 23:07:10.073808: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:07:10.073854: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:07:10.073873: | spent 0.0151 (0.0136) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:07:10.598154: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:10.598198: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:10.598235: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:10.598248: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:10.598265: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:10.598277: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:10.598289: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:10.598304: | matches: 3 Jan 13 23:07:10.598315: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:10.598326: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:10.598337: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:10.598351: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:10.598360: | matches: 3 Jan 13 23:07:10.598415: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:10.598478: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:10.598504: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:10.598557: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:10.598578: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:10.598629: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:10.598654: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:10.598712: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:10.598743: | spent 0.614 (0.613) milliseconds in whack Jan 13 23:07:11.605646: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:11.605690: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:11.605726: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:11.605739: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:11.605754: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:11.605767: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:11.605778: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:11.605788: | matches: 3 Jan 13 23:07:11.605798: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:11.605810: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:11.605821: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:11.605832: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:11.605842: | matches: 3 Jan 13 23:07:11.605898: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:11.605949: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:11.605976: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:11.606015: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:11.606031: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:11.606084: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:11.606114: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:11.606144: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:11.606165: | spent 0.545 (0.544) milliseconds in whack Jan 13 23:07:12.613185: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:12.613234: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:12.613272: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:12.613285: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:12.613303: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:12.613315: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:12.613327: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:12.613336: | matches: 3 Jan 13 23:07:12.613346: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:12.613358: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:12.613374: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:12.613386: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:12.613395: | matches: 3 Jan 13 23:07:12.613454: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:12.613525: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:12.613552: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:12.613608: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:12.613631: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:12.613678: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:12.613705: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:12.613740: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:12.613770: | spent 0.614 (0.613) milliseconds in whack Jan 13 23:07:13.620723: | newref struct fd@0x55c838025548(0->1) (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:13.620777: | fd_accept: new fd@0x55c838025548 (whack_handle_cb() +1007 programs/pluto/rcv_whack.c) Jan 13 23:07:13.620816: | whack: start: showstates (fd@0x55c838025548) Jan 13 23:07:13.620829: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:13.620847: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:13.620888: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:13.620900: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:13.620913: | matches: 3 Jan 13 23:07:13.620924: | FOR_EACH_STATE_... in (show_states() +2401 programs/pluto/state.c) Jan 13 23:07:13.620938: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 Jan 13 23:07:13.620950: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #41 Jan 13 23:07:13.620961: | found "L2TP-PSK-NAT"[1] 94.253.210.164 #38 Jan 13 23:07:13.620970: | matches: 3 Jan 13 23:07:13.621030: | 9594710.213197 - 9623480.213175 = -1 Jan 13 23:07:13.621101: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:13.621128: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:13.621188: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:07:13.621210: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:13.621261: | whack: stop: showstates (fd@0x55c838025548) Jan 13 23:07:13.621287: | delref struct fd@0x55c838025548(1->0) (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:13.621325: | freeref fd@0x55c838025548 (whack_handle_cb() +1020 programs/pluto/rcv_whack.c) Jan 13 23:07:13.621356: | spent 0.664 (0.662) milliseconds in whack Jan 13 23:07:22.194981: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c83804f078 for CHILD SA #45 in state ESTABLISHED_CHILD_SA Jan 13 23:07:22.195014: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:07:22.195023: | delref tt@0x55c838012e58(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:07:22.195032: | delref state-event@0x55c83804f078(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:07:22.195048: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:22.195055: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:22.195083: | liveness: #45 updating #41 last contact from 9594674.302178 to 9594710.216113 (last IPsec traffic flow) Jan 13 23:07:22.195095: | liveness: #45 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:07:22.195104: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380134e8 timeout in 30 seconds for #45 Jan 13 23:07:22.195113: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:07:22.195127: | #45 spent 0.15 (0.148) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:07:30.081052: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:07:30.081099: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:07:30.081147: | spent 0.0583 (0.057) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 23:07:30.081157: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:07:30.081164: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:07:30.081172: | spent 0.00763 (0.00754) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:07:50.083223: | processing global timer EVENT_PENDING_DDNS Jan 13 23:07:50.083288: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:07:50.083309: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:07:50.083322: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:07:50.083332: | found "L2TP-PSK-common" Jan 13 23:07:50.083342: | found "L2TP-PSK-noNAT" Jan 13 23:07:50.083353: | found "L2TP-PSK-NAT" Jan 13 23:07:50.083363: | found "MYCONN-ikev2-cp" Jan 13 23:07:50.083372: | matches: 6 Jan 13 23:07:50.083382: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:07:50.083436: | spent 0.144 (0.144) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:07:50.083454: | spent 0.17 (0.168) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:07:50.083466: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:07:50.083485: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:07:50.083500: | spent 0.0127 (0.0127) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:07:52.198693: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c8380134e8 for CHILD SA #45 in state ESTABLISHED_CHILD_SA Jan 13 23:07:52.198772: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:07:52.198791: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:07:52.198805: | delref state-event@0x55c8380134e8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:07:52.198832: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:07:52.198845: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:07:52.198894: | liveness: #45 updating #41 last contact from 9594710.216113 to 9594740.219893 (last IPsec traffic flow) Jan 13 23:07:52.198916: | liveness: #45 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:07:52.198935: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380134e8 timeout in 30 seconds for #45 Jan 13 23:07:52.198950: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:07:52.198976: | #45 spent 0.29 (0.287) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:08:10.080342: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:08:10.080379: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:08:10.080393: | spent 0.00967 (0.00838) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:08:22.209551: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c8380134e8 for CHILD SA #45 in state ESTABLISHED_CHILD_SA Jan 13 23:08:22.209582: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:08:22.209592: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:08:22.209600: | delref state-event@0x55c8380134e8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:08:22.209615: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:08:22.209622: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:08:22.209649: | liveness: #45 updating #41 last contact from 9594740.219893 to 9594770.23068 (last IPsec traffic flow) Jan 13 23:08:22.209661: | liveness: #45 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:08:22.209671: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380134e8 timeout in 30 seconds for #45 Jan 13 23:08:22.209679: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:08:22.209691: | #45 spent 0.145 (0.143) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:08:30.080631: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:08:30.080693: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:08:30.080716: | spent 0.019 (0.0167) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:08:50.083779: | processing global timer EVENT_PENDING_PHASE2 Jan 13 23:08:50.083839: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 23:08:50.083860: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:08:50.083873: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 23:08:50.083885: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:08:50.083897: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 23:08:50.083907: | found "L2TP-PSK-common" Jan 13 23:08:50.083916: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 23:08:50.083925: | found "L2TP-PSK-noNAT" Jan 13 23:08:50.083935: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 23:08:50.083945: | found "L2TP-PSK-NAT" Jan 13 23:08:50.083962: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 23:08:50.083972: | found "MYCONN-ikev2-cp" Jan 13 23:08:50.083981: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 23:08:50.083994: | matches: 6 Jan 13 23:08:50.084012: | spent 0.172 (0.17) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 23:08:50.084027: | processing global timer EVENT_PENDING_DDNS Jan 13 23:08:50.084040: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:08:50.084079: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:08:50.084091: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:08:50.084101: | found "L2TP-PSK-common" Jan 13 23:08:50.084110: | found "L2TP-PSK-noNAT" Jan 13 23:08:50.084120: | found "L2TP-PSK-NAT" Jan 13 23:08:50.084128: | found "MYCONN-ikev2-cp" Jan 13 23:08:50.084137: | matches: 6 Jan 13 23:08:50.084147: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:08:50.084189: | spent 0.146 (0.147) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:08:50.084205: | spent 0.165 (0.165) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:08:50.084217: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:08:50.084228: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:08:50.084244: | spent 0.0138 (0.0137) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:08:52.212502: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c8380134e8 for CHILD SA #45 in state ESTABLISHED_CHILD_SA Jan 13 23:08:52.212552: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:08:52.212571: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:08:52.212586: | delref state-event@0x55c8380134e8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:08:52.212612: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:08:52.212625: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:08:52.212671: | liveness: #45 updating #41 last contact from 9594770.23068 to 9594800.233673 (last IPsec traffic flow) Jan 13 23:08:52.212694: | liveness: #45 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:08:52.212709: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380134e8 timeout in 30 seconds for #45 Jan 13 23:08:52.212726: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:08:52.212765: | #45 spent 0.264 (0.264) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:09:10.089703: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:09:10.089772: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:09:10.089857: | spent 0.0822 (0.0804) milliseconds in global timer EVENT_SD_WATCHDOG Jan 13 23:09:10.089879: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:09:10.089892: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:09:10.089909: | spent 0.0154 (0.0152) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:09:22.227108: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c8380134e8 for CHILD SA #45 in state ESTABLISHED_CHILD_SA Jan 13 23:09:22.227163: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:09:22.227182: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:09:22.227197: | delref state-event@0x55c8380134e8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:09:22.227223: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:09:22.227236: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:09:22.227284: | liveness: #45 updating #41 last contact from 9594800.233673 to 9594830.248284 (last IPsec traffic flow) Jan 13 23:09:22.227306: | liveness: #45 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:09:22.227339: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380134e8 timeout in 30 seconds for #45 Jan 13 23:09:22.227360: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:09:22.227386: | #45 spent 0.285 (0.283) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:09:30.082306: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:09:30.082364: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:09:30.082386: | spent 0.018 (0.0159) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:09:30.325755: | spent 0.00573 (0.00571) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:30.325840: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:30.325857: | addref struct iface_endpoint@0x55c83801ef68(8->9) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:30.325869: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:30.325888: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:30.325899: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:30.325908: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:30.325917: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:30.325926: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:30.325935: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:30.325944: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:30.325953: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:30.325962: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:30.325971: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:30.325980: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:30.325988: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:30.325997: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:30.326007: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:30.326017: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:30.326026: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:30.326034: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:30.326043: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:30.326052: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:30.326061: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:30.326070: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:30.326079: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:30.326088: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:30.326097: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:30.326106: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:30.326115: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:30.326124: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:30.326132: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:30.326141: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:30.326149: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:30.326158: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:30.326167: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:30.326175: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:30.326184: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:30.326200: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:30.326209: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:30.326219: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:30.326228: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:30.326248: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:30.326258: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:30.326267: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:30.326276: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:30.326285: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:30.326293: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:30.326302: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:30.326311: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:30.326320: | 77 57 01 00 wW.. Jan 13 23:09:30.326334: | **parse ISAKMP Message: Jan 13 23:09:30.326350: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:30.326363: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:30.326376: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:30.326386: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:30.326395: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:30.326405: | flags: none (0x0) Jan 13 23:09:30.326420: | Message ID: 0 (00 00 00 00) Jan 13 23:09:30.326431: | length: 724 (00 00 02 d4) Jan 13 23:09:30.326442: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:30.326454: | State DB: IKEv1 state not found (find_state_ikev1_init) Jan 13 23:09:30.326466: | #null state always idle Jan 13 23:09:30.326477: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Jan 13 23:09:30.326487: | ***parse ISAKMP Security Association Payload: Jan 13 23:09:30.326497: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 13 23:09:30.326507: | length: 572 (02 3c) Jan 13 23:09:30.326518: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 13 23:09:30.326528: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Jan 13 23:09:30.326537: | ***parse ISAKMP Vendor ID Payload: Jan 13 23:09:30.326546: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 13 23:09:30.326556: | length: 20 (00 14) Jan 13 23:09:30.326568: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Jan 13 23:09:30.326577: | ***parse ISAKMP Vendor ID Payload: Jan 13 23:09:30.326587: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 13 23:09:30.326596: | length: 20 (00 14) Jan 13 23:09:30.326606: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Jan 13 23:09:30.326614: | ***parse ISAKMP Vendor ID Payload: Jan 13 23:09:30.326623: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 13 23:09:30.326633: | length: 20 (00 14) Jan 13 23:09:30.326642: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Jan 13 23:09:30.326651: | ***parse ISAKMP Vendor ID Payload: Jan 13 23:09:30.326660: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 13 23:09:30.326669: | length: 20 (00 14) Jan 13 23:09:30.326681: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Jan 13 23:09:30.326690: | ***parse ISAKMP Vendor ID Payload: Jan 13 23:09:30.326700: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 13 23:09:30.326709: | length: 24 (00 18) Jan 13 23:09:30.326719: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Jan 13 23:09:30.326728: | ***parse ISAKMP Vendor ID Payload: Jan 13 23:09:30.326737: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.326747: | length: 20 (00 14) Jan 13 23:09:30.326756: | message 'main_inI1_outR1' HASH payload not checked early Jan 13 23:09:30.326773: | quirks.qnat_traversal_vid set to=117 [RFC 3947] Jan 13 23:09:30.326784: | received Vendor ID payload [RFC 3947] Jan 13 23:09:30.326796: | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] Jan 13 23:09:30.326807: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] Jan 13 23:09:30.326817: | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] Jan 13 23:09:30.326838: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] Jan 13 23:09:30.326849: | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] Jan 13 23:09:30.326869: | received Vendor ID payload [FRAGMENTATION 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00] Jan 13 23:09:30.326883: | received Vendor ID payload [Dead Peer Detection] Jan 13 23:09:30.326893: | in statetime_start() with no state Jan 13 23:09:30.326908: | find_v1_host_connection() 94.253.210.164->161.53.235.3 policy= but ignoring ports Jan 13 23:09:30.326923: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (find_v1_host_connection() +170 programs/pluto/ikev1_host_pair.c) Jan 13 23:09:30.326942: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:09:30.326956: | skipping "MYCONN-ikev2-cp"[2] 94.253.210.164, wrong IKE version Jan 13 23:09:30.327025: | newref alloc logger@0x55c83801a228(0->1) (new_v1_rstate() +490 programs/pluto/state.c) Jan 13 23:09:30.327042: | addref fd@NULL (new_v1_rstate() +490 programs/pluto/state.c) Jan 13 23:09:30.327059: | entry state hash_table_entries.serialno@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46 initialized Jan 13 23:09:30.327072: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $6 initialized Jan 13 23:09:30.327084: | entry state hash_table_entries.reqid@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46: reqid=0 initialized Jan 13 23:09:30.327103: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46: 00 00 00 00 00 00 00 00 initialized Jan 13 23:09:30.327124: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:09:30.327136: | creating state object #46 at 0x55c83801fab8 Jan 13 23:09:30.327150: | entry state hash_table_entries.serialno@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46 added to hash table bucket 0x55c836587ac0 Jan 13 23:09:30.327163: | entry state hash_table_entries.connection_serialno@0x55c83801fab8 $6 added to hash table bucket 0x55c8365848a0 Jan 13 23:09:30.327178: | entry state hash_table_entries.reqid@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:09:30.327197: | entry state hash_table_entries.ike_initiator_spi@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46: ae 10 32 79 22 ca e7 f0 added to hash table bucket 0x55c83657cd80 Jan 13 23:09:30.327223: | entry state hash_table_entries.ike_spis@0x55c83801fab8 "L2TP-PSK-NAT"[1] 94.253.210.164 #46: ae 10 32 79 22 ca e7 f0 a0 49 cb ae c4 b0 93 97 added to hash table bucket 0x55c836577e80 Jan 13 23:09:30.327237: | pstats #46 ikev1.isakmp started Jan 13 23:09:30.327250: | #46 updating local interface from to 161.53.235.3:500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:09:30.327263: | delref ifp@NULL (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:09:30.327274: | addref struct iface_endpoint@0x55c83801ef68(9->10) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:09:30.327286: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Jan 13 23:09:30.327299: | sender checking NAT-T: enabled; VID 117 Jan 13 23:09:30.327308: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Jan 13 23:09:30.327317: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Jan 13 23:09:30.327326: | ICOOKIE-DUMP: Jan 13 23:09:30.327336: | ae 10 32 79 22 ca e7 f0 ..2y"... Jan 13 23:09:30.327351: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: responding to Main Mode from unknown peer 94.253.210.164:500 Jan 13 23:09:30.327373: | opening output PBS reply packet Jan 13 23:09:30.327386: | **emit ISAKMP Message: Jan 13 23:09:30.327398: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:30.327409: | responder SPI: a0 49 cb ae c4 b0 93 97 Jan 13 23:09:30.327431: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.327441: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:30.327450: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:30.327460: | flags: none (0x0) Jan 13 23:09:30.327471: | Message ID: 0 (00 00 00 00) Jan 13 23:09:30.327481: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:09:30.327494: | ***emit ISAKMP Security Association Payload: Jan 13 23:09:30.327504: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.327513: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 13 23:09:30.327524: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Jan 13 23:09:30.327533: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Jan 13 23:09:30.327544: | ****parse IPsec DOI SIT: Jan 13 23:09:30.327557: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Jan 13 23:09:30.327567: | ****parse ISAKMP Proposal Payload: Jan 13 23:09:30.327577: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.327587: | length: 560 (02 30) Jan 13 23:09:30.327598: | proposal number: 1 (01) Jan 13 23:09:30.327608: | protocol ID: PROTO_ISAKMP (0x1) Jan 13 23:09:30.327621: | SPI size: 0 (00) Jan 13 23:09:30.327631: | number of transforms: 16 (10) Jan 13 23:09:30.327641: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.327651: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.327660: | length: 36 (00 24) Jan 13 23:09:30.327670: | ISAKMP transform number: 1 (01) Jan 13 23:09:30.327682: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.327692: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.327702: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.327712: | length/value: 1 (00 01) Jan 13 23:09:30.327724: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.327734: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.327744: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.327757: | length/value: 28800 (70 80) Jan 13 23:09:30.327767: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.327777: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.327790: | length/value: 7 (00 07) Jan 13 23:09:30.327800: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.327812: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.327824: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.327834: | length/value: 256 (01 00) Jan 13 23:09:30.327843: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.327853: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.327862: | length/value: 1 (00 01) Jan 13 23:09:30.327874: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.327892: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.327906: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.327918: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.327932: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.327944: | line 1: match=002 Jan 13 23:09:30.327953: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.327963: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.327973: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.327985: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.327995: | length/value: 5 (00 05) Jan 13 23:09:30.328005: | [5 is OAKLEY_SHA2_384] Jan 13 23:09:30.328019: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328028: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.328038: | length/value: 2 (00 02) Jan 13 23:09:30.328050: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.328065: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.328086: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.328096: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.328106: | length: 36 (00 24) Jan 13 23:09:30.328116: | ISAKMP transform number: 2 (02) Jan 13 23:09:30.328125: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.328134: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328143: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.328153: | length/value: 1 (00 01) Jan 13 23:09:30.328162: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.328171: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328184: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.328194: | length/value: 28800 (70 80) Jan 13 23:09:30.328203: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328213: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.328223: | length/value: 7 (00 07) Jan 13 23:09:30.328232: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.328242: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328251: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.328261: | length/value: 256 (01 00) Jan 13 23:09:30.328272: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328282: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.328291: | length/value: 1 (00 01) Jan 13 23:09:30.328300: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.328341: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.328368: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.328382: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.328396: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.328406: | line 1: match=002 Jan 13 23:09:30.328415: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.328425: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.328435: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328444: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.328455: | length/value: 4 (00 04) Jan 13 23:09:30.328464: | [4 is OAKLEY_SHA2_256] Jan 13 23:09:30.328474: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328483: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.328493: | length/value: 2 (00 02) Jan 13 23:09:30.328502: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.328516: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.328526: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.328535: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.328545: | length: 36 (00 24) Jan 13 23:09:30.328555: | ISAKMP transform number: 3 (03) Jan 13 23:09:30.328563: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.328572: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328581: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.328591: | length/value: 1 (00 01) Jan 13 23:09:30.328600: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.328608: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328617: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.328627: | length/value: 28800 (70 80) Jan 13 23:09:30.328636: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328645: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.328655: | length/value: 7 (00 07) Jan 13 23:09:30.328664: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.328673: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328683: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.328693: | length/value: 256 (01 00) Jan 13 23:09:30.328702: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328711: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.328721: | length/value: 1 (00 01) Jan 13 23:09:30.328730: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.328743: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.328768: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.328780: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.328793: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.328802: | line 1: match=002 Jan 13 23:09:30.328812: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.328821: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.328831: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328840: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.328850: | length/value: 6 (00 06) Jan 13 23:09:30.328860: | [6 is OAKLEY_SHA2_512] Jan 13 23:09:30.328870: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328879: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.328889: | length/value: 2 (00 02) Jan 13 23:09:30.328903: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.328915: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.328925: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.328934: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.328944: | length: 36 (00 24) Jan 13 23:09:30.328953: | ISAKMP transform number: 4 (04) Jan 13 23:09:30.328963: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.328972: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.328981: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.328991: | length/value: 1 (00 01) Jan 13 23:09:30.329000: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.329008: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329017: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.329027: | length/value: 28800 (70 80) Jan 13 23:09:30.329036: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329046: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.329056: | length/value: 7 (00 07) Jan 13 23:09:30.329065: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.329075: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329085: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.329095: | length/value: 256 (01 00) Jan 13 23:09:30.329104: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329114: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.329124: | length/value: 1 (00 01) Jan 13 23:09:30.329133: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.329146: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.329162: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.329173: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.329186: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.329197: | line 1: match=002 Jan 13 23:09:30.329207: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.329216: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.329226: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329235: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.329245: | length/value: 2 (00 02) Jan 13 23:09:30.329254: | [2 is OAKLEY_SHA1] Jan 13 23:09:30.329263: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329272: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.329282: | length/value: 2 (00 02) Jan 13 23:09:30.329291: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.329304: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.329316: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.329325: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.329335: | length: 36 (00 24) Jan 13 23:09:30.329347: | ISAKMP transform number: 5 (05) Jan 13 23:09:30.329356: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.329374: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329384: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.329394: | length/value: 1 (00 01) Jan 13 23:09:30.329403: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.329412: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329421: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.329431: | length/value: 28800 (70 80) Jan 13 23:09:30.329440: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329449: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.329459: | length/value: 7 (00 07) Jan 13 23:09:30.329468: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.329477: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329492: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.329502: | length/value: 256 (01 00) Jan 13 23:09:30.329511: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329520: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.329530: | length/value: 1 (00 01) Jan 13 23:09:30.329539: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.329552: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.329565: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.329576: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.329589: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.329599: | line 1: match=002 Jan 13 23:09:30.329609: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.329618: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.329627: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329636: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.329646: | length/value: 1 (00 01) Jan 13 23:09:30.329655: | [1 is OAKLEY_MD5] Jan 13 23:09:30.329664: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329674: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.329684: | length/value: 2 (00 02) Jan 13 23:09:30.329695: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.329708: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.329717: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.329726: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.329736: | length: 36 (00 24) Jan 13 23:09:30.329746: | ISAKMP transform number: 6 (06) Jan 13 23:09:30.329758: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.329768: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329777: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.329787: | length/value: 1 (00 01) Jan 13 23:09:30.329796: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.329804: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329814: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.329823: | length/value: 28800 (70 80) Jan 13 23:09:30.329832: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329842: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.329851: | length/value: 7 (00 07) Jan 13 23:09:30.329860: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.329870: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329882: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.329892: | length/value: 128 (00 80) Jan 13 23:09:30.329902: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.329911: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.329921: | length/value: 1 (00 01) Jan 13 23:09:30.329929: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.329942: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.329955: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.329966: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.329979: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.329998: | line 1: match=002 Jan 13 23:09:30.330008: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.330017: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.330027: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330036: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.330046: | length/value: 6 (00 06) Jan 13 23:09:30.330055: | [6 is OAKLEY_SHA2_512] Jan 13 23:09:30.330065: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330074: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.330084: | length/value: 2 (00 02) Jan 13 23:09:30.330093: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.330105: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.330117: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.330126: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.330136: | length: 36 (00 24) Jan 13 23:09:30.330146: | ISAKMP transform number: 7 (07) Jan 13 23:09:30.330155: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.330164: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330173: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.330183: | length/value: 1 (00 01) Jan 13 23:09:30.330192: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.330201: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330210: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.330221: | length/value: 28800 (70 80) Jan 13 23:09:30.330230: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330239: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.330248: | length/value: 7 (00 07) Jan 13 23:09:30.330257: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.330266: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330275: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.330286: | length/value: 128 (00 80) Jan 13 23:09:30.330295: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330304: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.330314: | length/value: 1 (00 01) Jan 13 23:09:30.330323: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.330335: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.330346: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.330357: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.330370: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.330379: | line 1: match=002 Jan 13 23:09:30.330388: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.330397: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.330406: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330415: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.330425: | length/value: 5 (00 05) Jan 13 23:09:30.330434: | [5 is OAKLEY_SHA2_384] Jan 13 23:09:30.330443: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330452: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.330462: | length/value: 2 (00 02) Jan 13 23:09:30.330471: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.330483: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.330492: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.330501: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.330511: | length: 36 (00 24) Jan 13 23:09:30.330521: | ISAKMP transform number: 8 (08) Jan 13 23:09:30.330529: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.330538: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330547: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.330557: | length/value: 1 (00 01) Jan 13 23:09:30.330566: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.330588: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330599: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.330609: | length/value: 28800 (70 80) Jan 13 23:09:30.330619: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330628: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.330638: | length/value: 7 (00 07) Jan 13 23:09:30.330647: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.330657: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330666: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.330676: | length/value: 128 (00 80) Jan 13 23:09:30.330685: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330695: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.330705: | length/value: 1 (00 01) Jan 13 23:09:30.330714: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.330727: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.330741: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.330752: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.330765: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.330774: | line 1: match=002 Jan 13 23:09:30.330783: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.330793: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.330802: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330811: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.330821: | length/value: 4 (00 04) Jan 13 23:09:30.330830: | [4 is OAKLEY_SHA2_256] Jan 13 23:09:30.330840: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330849: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.330858: | length/value: 2 (00 02) Jan 13 23:09:30.330867: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.330880: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.330889: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.330898: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.330909: | length: 36 (00 24) Jan 13 23:09:30.330918: | ISAKMP transform number: 9 (09) Jan 13 23:09:30.330927: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.330936: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330945: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.330955: | length/value: 1 (00 01) Jan 13 23:09:30.330964: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.330973: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.330982: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.330992: | length/value: 28800 (70 80) Jan 13 23:09:30.331001: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331010: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.331020: | length/value: 7 (00 07) Jan 13 23:09:30.331029: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.331039: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331048: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.331058: | length/value: 128 (00 80) Jan 13 23:09:30.331067: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331076: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.331085: | length/value: 1 (00 01) Jan 13 23:09:30.331094: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.331107: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.331118: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.331129: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.331142: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.331151: | line 1: match=002 Jan 13 23:09:30.331160: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.331169: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.331192: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331202: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.331212: | length/value: 2 (00 02) Jan 13 23:09:30.331222: | [2 is OAKLEY_SHA1] Jan 13 23:09:30.331231: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331241: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.331251: | length/value: 2 (00 02) Jan 13 23:09:30.331263: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.331276: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.331287: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.331297: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.331307: | length: 36 (00 24) Jan 13 23:09:30.331316: | ISAKMP transform number: 10 (0a) Jan 13 23:09:30.331326: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.331335: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331347: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.331357: | length/value: 1 (00 01) Jan 13 23:09:30.331366: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.331375: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331384: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.331394: | length/value: 28800 (70 80) Jan 13 23:09:30.331402: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331411: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.331421: | length/value: 7 (00 07) Jan 13 23:09:30.331430: | [7 is OAKLEY_AES_CBC] Jan 13 23:09:30.331439: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331448: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Jan 13 23:09:30.331458: | length/value: 128 (00 80) Jan 13 23:09:30.331467: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331476: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.331486: | length/value: 1 (00 01) Jan 13 23:09:30.331495: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.331507: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.331523: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.331534: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.331547: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.331556: | line 1: match=002 Jan 13 23:09:30.331565: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.331574: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.331584: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331594: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.331604: | length/value: 1 (00 01) Jan 13 23:09:30.331613: | [1 is OAKLEY_MD5] Jan 13 23:09:30.331622: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331632: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.331642: | length/value: 2 (00 02) Jan 13 23:09:30.331650: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.331662: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.331674: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.331684: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.331694: | length: 32 (00 20) Jan 13 23:09:30.331703: | ISAKMP transform number: 11 (0b) Jan 13 23:09:30.331715: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.331724: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331734: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.331744: | length/value: 1 (00 01) Jan 13 23:09:30.331753: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.331762: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331771: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.331781: | length/value: 28800 (70 80) Jan 13 23:09:30.331790: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331799: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.331821: | length/value: 5 (00 05) Jan 13 23:09:30.331831: | [5 is OAKLEY_3DES_CBC] Jan 13 23:09:30.331842: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331851: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.331861: | length/value: 1 (00 01) Jan 13 23:09:30.331872: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.331885: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.331898: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.331909: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.331924: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.331937: | line 1: match=002 Jan 13 23:09:30.331946: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.331955: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.331964: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.331974: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.331987: | length/value: 4 (00 04) Jan 13 23:09:30.331996: | [4 is OAKLEY_SHA2_256] Jan 13 23:09:30.332006: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332018: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.332028: | length/value: 2 (00 02) Jan 13 23:09:30.332039: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.332052: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.332064: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.332073: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.332083: | length: 32 (00 20) Jan 13 23:09:30.332092: | ISAKMP transform number: 12 (0c) Jan 13 23:09:30.332104: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.332113: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332122: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.332132: | length/value: 1 (00 01) Jan 13 23:09:30.332144: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.332153: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332162: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.332172: | length/value: 28800 (70 80) Jan 13 23:09:30.332184: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332193: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.332204: | length/value: 5 (00 05) Jan 13 23:09:30.332215: | [5 is OAKLEY_3DES_CBC] Jan 13 23:09:30.332225: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332237: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.332248: | length/value: 1 (00 01) Jan 13 23:09:30.332259: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.332272: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.332285: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.332297: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.332328: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.332352: | line 1: match=002 Jan 13 23:09:30.332363: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.332372: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.332386: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332396: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.332407: | length/value: 2 (00 02) Jan 13 23:09:30.332418: | [2 is OAKLEY_SHA1] Jan 13 23:09:30.332428: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332439: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.332449: | length/value: 2 (00 02) Jan 13 23:09:30.332458: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.332471: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.332483: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.332506: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.332517: | length: 32 (00 20) Jan 13 23:09:30.332526: | ISAKMP transform number: 13 (0d) Jan 13 23:09:30.332535: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.332545: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332554: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.332564: | length/value: 1 (00 01) Jan 13 23:09:30.332577: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.332586: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332595: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.332605: | length/value: 28800 (70 80) Jan 13 23:09:30.332615: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332628: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.332638: | length/value: 5 (00 05) Jan 13 23:09:30.332647: | [5 is OAKLEY_3DES_CBC] Jan 13 23:09:30.332656: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332668: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 13 23:09:30.332679: | length/value: 1 (00 01) Jan 13 23:09:30.332690: | [1 is OAKLEY_PRESHARED_KEY] Jan 13 23:09:30.332704: | lsw_get_secret() using IDs for 161.53.235.3->94.253.210.164 of kind PKK_PSK Jan 13 23:09:30.332717: | line 0: key type PKK_PSK(161.53.235.3) to type PKK_RSA Jan 13 23:09:30.332728: | line 1: key type PKK_PSK(161.53.235.3) to type PKK_PSK Jan 13 23:09:30.332743: | 1: compared key %any to 161.53.235.3 / 94.253.210.164 -> 002 Jan 13 23:09:30.332755: | line 1: match=002 Jan 13 23:09:30.332765: | match 002 beats previous best_match 000 match=0x55c83801c6f8 (line=1) Jan 13 23:09:30.332774: | concluding with best_match=002 best=0x55c83801c6f8 (lineno=1) Jan 13 23:09:30.332783: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332795: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Jan 13 23:09:30.332806: | length/value: 1 (00 01) Jan 13 23:09:30.332817: | [1 is OAKLEY_MD5] Jan 13 23:09:30.332826: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332836: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 13 23:09:30.332846: | length/value: 2 (00 02) Jan 13 23:09:30.332858: | [2 is OAKLEY_GROUP_MODP1024] Jan 13 23:09:30.332870: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_GROUP 2 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 13 23:09:30.332880: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.332889: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.332899: | length: 32 (00 20) Jan 13 23:09:30.332909: | ISAKMP transform number: 14 (0e) Jan 13 23:09:30.332918: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.332927: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332936: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.332946: | length/value: 1 (00 01) Jan 13 23:09:30.332954: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.332963: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.332972: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.332982: | length/value: 28800 (70 80) Jan 13 23:09:30.332991: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333000: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.333010: | length/value: 1 (00 01) Jan 13 23:09:30.333018: | [1 is OAKLEY_DES_CBC(UNUSED)] Jan 13 23:09:30.333031: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Jan 13 23:09:30.333043: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.333052: | next payload type: ISAKMP_NEXT_T (0x3) Jan 13 23:09:30.333062: | length: 32 (00 20) Jan 13 23:09:30.333072: | ISAKMP transform number: 15 (0f) Jan 13 23:09:30.333081: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.333090: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333103: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.333113: | length/value: 1 (00 01) Jan 13 23:09:30.333125: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.333149: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333159: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.333169: | length/value: 28800 (70 80) Jan 13 23:09:30.333181: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333190: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.333200: | length/value: 1 (00 01) Jan 13 23:09:30.333211: | [1 is OAKLEY_DES_CBC(UNUSED)] Jan 13 23:09:30.333224: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Jan 13 23:09:30.333236: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 13 23:09:30.333245: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.333255: | length: 32 (00 20) Jan 13 23:09:30.333265: | ISAKMP transform number: 16 (10) Jan 13 23:09:30.333274: | ISAKMP transform ID: KEY_IKE (0x1) Jan 13 23:09:30.333286: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333296: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Jan 13 23:09:30.333306: | length/value: 1 (00 01) Jan 13 23:09:30.333317: | [1 is OAKLEY_LIFE_SECONDS] Jan 13 23:09:30.333326: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333335: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Jan 13 23:09:30.333349: | length/value: 28800 (70 80) Jan 13 23:09:30.333358: | ******parse ISAKMP Oakley attribute: Jan 13 23:09:30.333367: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 13 23:09:30.333377: | length/value: 1 (00 01) Jan 13 23:09:30.333389: | [1 is OAKLEY_DES_CBC(UNUSED)] Jan 13 23:09:30.333401: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Jan 13 23:09:30.333416: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: no acceptable Oakley Transform Jan 13 23:09:30.333427: | complete v1 state transition with NO_PROPOSAL_CHOSEN Jan 13 23:09:30.333444: | #46 is idle Jan 13 23:09:30.333464: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: sending notification NO_PROPOSAL_CHOSEN to 94.253.210.164:500 Jan 13 23:09:30.333477: | opening output PBS notification msg Jan 13 23:09:30.333486: | **emit ISAKMP Message: Jan 13 23:09:30.333498: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:30.333513: | responder SPI: a0 49 cb ae c4 b0 93 97 Jan 13 23:09:30.333523: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.333532: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:30.333541: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 13 23:09:30.333551: | flags: none (0x0) Jan 13 23:09:30.333565: | Message ID: 0 (00 00 00 00) Jan 13 23:09:30.333575: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:09:30.333588: | ***emit ISAKMP Notification Payload: Jan 13 23:09:30.333598: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:30.333611: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 13 23:09:30.333621: | protocol ID: 1 (01) Jan 13 23:09:30.333634: | SPI size: 0 (00) Jan 13 23:09:30.333643: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Jan 13 23:09:30.333653: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Jan 13 23:09:30.333666: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Jan 13 23:09:30.333676: | emitting length of ISAKMP Notification Payload: 12 Jan 13 23:09:30.333686: | emitting length of ISAKMP Message: 40 Jan 13 23:09:30.333702: | sending 40 bytes for notification packet through eth0 from 161.53.235.3:500 to 94.253.210.164:500 using UDP (for #46) Jan 13 23:09:30.333715: | ae 10 32 79 22 ca e7 f0 a0 49 cb ae c4 b0 93 97 ..2y"....I...... Jan 13 23:09:30.333724: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c ...........(.... Jan 13 23:09:30.333733: | 00 00 00 01 01 00 00 0e ........ Jan 13 23:09:30.333786: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Jan 13 23:09:30.333830: | IKEv1 packet dropped Jan 13 23:09:30.333848: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:30.333864: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:30.333874: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:30.333886: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:30.333899: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:30.333920: | spent 8.18 (8.18) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:33.350454: | spent 0.00597 (0.00596) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:33.350523: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:33.350539: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:33.350552: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:33.350568: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:33.350580: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:33.350589: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:33.350598: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:33.350607: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:33.350616: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:33.350624: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:33.350633: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:33.350641: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:33.350650: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:33.350658: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:33.350667: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:33.350675: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:33.350684: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:33.350692: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:33.350702: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:33.350711: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:33.350719: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:33.350728: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:33.350737: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:33.350746: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:33.350755: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:33.350764: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:33.350772: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:33.350781: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:33.350789: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:33.350798: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:33.350806: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:33.350815: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:33.350848: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:33.350859: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:33.350868: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:33.350877: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:33.350886: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:33.350895: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:33.350904: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:33.350913: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:33.350921: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:33.350930: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:33.350939: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:33.350947: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:33.350956: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:33.350965: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:33.350973: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:33.350982: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:33.350991: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:33.351001: | 77 57 01 00 wW.. Jan 13 23:09:33.351015: | **parse ISAKMP Message: Jan 13 23:09:33.351031: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:33.351045: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:33.351056: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:33.351068: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:33.351078: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:33.351088: | flags: none (0x0) Jan 13 23:09:33.351099: | Message ID: 0 (00 00 00 00) Jan 13 23:09:33.351111: | length: 724 (00 00 02 d4) Jan 13 23:09:33.351123: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:33.351137: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:33.351156: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:33.351168: | IKEv1 packet dropped Jan 13 23:09:33.351180: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:33.351191: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:33.351201: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:33.351213: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:33.351226: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:33.351242: | spent 0.808 (0.806) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:36.365097: | spent 0.00632 (0.0063) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:36.365163: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:36.365179: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:36.365191: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:36.365208: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:36.365220: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:36.365229: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:36.365265: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:36.365276: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:36.365286: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:36.365295: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:36.365304: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:36.365313: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:36.365323: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:36.365332: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:36.365340: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:36.365349: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:36.365358: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:36.365366: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:36.365375: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:36.365384: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:36.365392: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:36.365401: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:36.365410: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:36.365419: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:36.365428: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:36.365437: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:36.365445: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:36.365454: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:36.365462: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:36.365471: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:36.365479: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:36.365489: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:36.365497: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:36.365506: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:36.365515: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:36.365523: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:36.365532: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:36.365541: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:36.365550: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:36.365558: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:36.365567: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:36.365576: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:36.365585: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:36.365593: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:36.365602: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:36.365611: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:36.365619: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:36.365628: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:36.365649: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:36.365660: | 77 57 01 00 wW.. Jan 13 23:09:36.365674: | **parse ISAKMP Message: Jan 13 23:09:36.365690: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:36.365703: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:36.365716: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:36.365727: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:36.365736: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:36.365745: | flags: none (0x0) Jan 13 23:09:36.365757: | Message ID: 0 (00 00 00 00) Jan 13 23:09:36.365771: | length: 724 (00 00 02 d4) Jan 13 23:09:36.365782: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:36.365796: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:36.365814: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:36.365827: | IKEv1 packet dropped Jan 13 23:09:36.365838: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:36.365851: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:36.365861: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:36.365870: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:36.365882: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:36.365901: | spent 0.825 (0.823) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:39.372487: | spent 0.00527 (0.00528) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:39.372551: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:39.372567: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:39.372578: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:39.372595: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:39.372606: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:39.372616: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:39.372624: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:39.372633: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:39.372642: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:39.372651: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:39.372660: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:39.372668: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:39.372677: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:39.372686: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:39.372694: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:39.372703: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:39.372712: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:39.372720: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:39.372729: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:39.372737: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:39.372746: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:39.372778: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:39.372788: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:39.372798: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:39.372811: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:39.372820: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:39.372829: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:39.372837: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:39.372846: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:39.372855: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:39.372863: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:39.372872: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:39.372881: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:39.372893: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:39.372902: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:39.372911: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:39.372919: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:39.372928: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:39.372938: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:39.372947: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:39.372955: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:39.372964: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:39.372973: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:39.372982: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:39.372991: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:39.373000: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:39.373009: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:39.373017: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:39.373026: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:39.373035: | 77 57 01 00 wW.. Jan 13 23:09:39.373049: | **parse ISAKMP Message: Jan 13 23:09:39.373064: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:39.373077: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:39.373090: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:39.373101: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:39.373110: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:39.373123: | flags: none (0x0) Jan 13 23:09:39.373135: | Message ID: 0 (00 00 00 00) Jan 13 23:09:39.373147: | length: 724 (00 00 02 d4) Jan 13 23:09:39.373159: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:39.373171: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:39.373187: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:39.373198: | IKEv1 packet dropped Jan 13 23:09:39.373209: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:39.373221: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:39.373231: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:39.373240: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:39.373284: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:39.373308: | spent 0.828 (0.834) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:42.373133: | spent 0.00581 (0.00584) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:42.373207: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:42.373223: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:42.373236: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:42.373253: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:42.373265: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:42.373274: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:42.373283: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:42.373291: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:42.373301: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:42.373310: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:42.373333: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:42.373350: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:42.373357: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:42.373364: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:42.373375: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:42.373382: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:42.373389: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:42.373396: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:42.373403: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:42.373410: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:42.373417: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:42.373424: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:42.373431: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:42.373438: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:42.373445: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:42.373452: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:42.373458: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:42.373466: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:42.373475: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:42.373482: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:42.373489: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:42.373496: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:42.373503: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:42.373511: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:42.373517: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:42.373525: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:42.373532: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:42.373557: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:42.373566: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:42.373576: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:42.373583: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:42.373590: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:42.373598: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:42.373605: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:42.373612: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:42.373620: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:42.373627: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:42.373634: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:42.373641: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:42.373649: | 77 57 01 00 wW.. Jan 13 23:09:42.373660: | **parse ISAKMP Message: Jan 13 23:09:42.373673: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:42.373684: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:42.373692: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:42.373702: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:42.373709: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:42.373717: | flags: none (0x0) Jan 13 23:09:42.373726: | Message ID: 0 (00 00 00 00) Jan 13 23:09:42.373738: | length: 724 (00 00 02 d4) Jan 13 23:09:42.373746: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:42.373757: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:42.373772: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:42.373783: | IKEv1 packet dropped Jan 13 23:09:42.373793: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:42.373803: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:42.373811: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:42.373819: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:42.373829: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:42.373844: | spent 0.73 (0.728) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:45.386833: | spent 0.00676 (0.00678) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:45.386899: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:45.386916: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:45.386928: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:45.386946: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:45.386957: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:45.386967: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:45.386977: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:45.386986: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:45.386995: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:45.387004: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:45.387042: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:45.387053: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:45.387062: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:45.387071: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:45.387080: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:45.387089: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:45.387098: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:45.387110: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:45.387119: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:45.387128: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:45.387137: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:45.387146: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:45.387155: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:45.387163: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:45.387172: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:45.387181: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:45.387189: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:45.387198: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:45.387208: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:45.387216: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:45.387225: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:45.387234: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:45.387242: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:45.387251: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:45.387260: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:45.387269: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:45.387278: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:45.387287: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:45.387295: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:45.387304: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:45.387312: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:45.387322: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:45.387331: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:45.387340: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:45.387349: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:45.387358: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:45.387367: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:45.387376: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:45.387385: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:45.387394: | 77 57 01 00 wW.. Jan 13 23:09:45.387407: | **parse ISAKMP Message: Jan 13 23:09:45.387422: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:45.387436: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:45.387459: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:45.387469: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:45.387479: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:45.387488: | flags: none (0x0) Jan 13 23:09:45.387500: | Message ID: 0 (00 00 00 00) Jan 13 23:09:45.387511: | length: 724 (00 00 02 d4) Jan 13 23:09:45.387524: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:45.387536: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:45.387551: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:45.387563: | IKEv1 packet dropped Jan 13 23:09:45.387574: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:45.387585: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:45.387595: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:45.387604: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:45.387616: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:45.387634: | spent 0.823 (0.821) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:48.394498: | spent 0.00602 (0.00606) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:48.394565: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:48.394581: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:48.394593: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:48.394611: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:48.394622: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:48.394632: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:48.394641: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:48.394650: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:48.394659: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:48.394668: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:48.394676: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:48.394685: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:48.394693: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:48.394702: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:48.394711: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:48.394720: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:48.394728: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:48.394737: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:48.394745: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:48.394754: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:48.394762: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:48.394771: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:48.394780: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:48.394789: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:48.394797: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:48.394806: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:48.394838: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:48.394848: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:48.394857: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:48.394867: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:48.394876: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:48.394885: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:48.394897: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:48.394907: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:48.394916: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:48.394924: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:48.394933: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:48.394942: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:48.394950: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:48.394959: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:48.394967: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:48.394976: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:48.394985: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:48.394994: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:48.395003: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:48.395012: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:48.395020: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:48.395029: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:48.395038: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:48.395047: | 77 57 01 00 wW.. Jan 13 23:09:48.395061: | **parse ISAKMP Message: Jan 13 23:09:48.395077: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:48.395089: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:48.395100: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:48.395112: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:48.395122: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:48.395131: | flags: none (0x0) Jan 13 23:09:48.395148: | Message ID: 0 (00 00 00 00) Jan 13 23:09:48.395160: | length: 724 (00 00 02 d4) Jan 13 23:09:48.395173: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:48.395187: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:48.395205: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:48.395217: | IKEv1 packet dropped Jan 13 23:09:48.395229: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:48.395242: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:48.395252: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:48.395261: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:48.395273: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:48.395292: | spent 0.813 (0.812) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:50.064030: | processing global timer EVENT_PENDING_DDNS Jan 13 23:09:50.064082: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:09:50.064130: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:09:50.064146: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:09:50.064156: | found "L2TP-PSK-common" Jan 13 23:09:50.064165: | found "L2TP-PSK-noNAT" Jan 13 23:09:50.064174: | found "L2TP-PSK-NAT" Jan 13 23:09:50.064183: | found "MYCONN-ikev2-cp" Jan 13 23:09:50.064192: | matches: 6 Jan 13 23:09:50.064202: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:09:50.064248: | spent 0.162 (0.162) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:09:50.064265: | spent 0.187 (0.185) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:09:50.071380: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:09:50.071427: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:09:50.071448: | spent 0.017 (0.0156) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:09:51.402127: | spent 0.00529 (0.00523) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:51.402187: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:51.402202: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:51.402213: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:51.402230: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:51.402241: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:51.402251: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:51.402260: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:51.402269: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:51.402296: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:51.402306: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:51.402315: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:51.402324: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:51.402333: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:51.402342: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:51.402351: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:51.402359: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:51.402368: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:51.402377: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:51.402386: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:51.402395: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:51.402404: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:51.402413: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:51.402422: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:51.402431: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:51.402439: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:51.402448: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:51.402458: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:51.402467: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:51.402475: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:51.402484: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:51.402515: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:51.402525: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:51.402534: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:51.402543: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:51.402552: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:51.402561: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:51.402570: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:51.402582: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:51.402592: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:51.402601: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:51.402610: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:51.402618: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:51.402627: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:51.402636: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:51.402645: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:51.402653: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:51.402663: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:51.402672: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:51.402681: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:51.402691: | 77 57 01 00 wW.. Jan 13 23:09:51.402703: | **parse ISAKMP Message: Jan 13 23:09:51.402719: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:51.402731: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:51.402743: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:51.402753: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:51.402762: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:51.402772: | flags: none (0x0) Jan 13 23:09:51.402783: | Message ID: 0 (00 00 00 00) Jan 13 23:09:51.402795: | length: 724 (00 00 02 d4) Jan 13 23:09:51.402807: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:51.402819: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:51.402836: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:51.402846: | IKEv1 packet dropped Jan 13 23:09:51.402857: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:51.402870: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:51.402880: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:51.402889: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:51.402901: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:51.402919: | spent 0.807 (0.806) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:52.229111: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c8380134e8 for CHILD SA #45 in state ESTABLISHED_CHILD_SA Jan 13 23:09:52.229162: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:09:52.229179: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:09:52.229194: | delref state-event@0x55c8380134e8(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:09:52.229219: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:09:52.229232: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:09:52.229308: | liveness: #45 updating #41 last contact from 9594830.248284 to 9594860.250281 (last IPsec traffic flow) Jan 13 23:09:52.229330: | liveness: #45 scheduling next check for 94.253.210.164:4500 in 30 seconds (recent IPsec traffic was 0.000001 seconds ago) Jan 13 23:09:52.229347: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c8380134e8 timeout in 30 seconds for #45 Jan 13 23:09:52.229362: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:09:52.229385: | #45 spent 0.279 (0.278) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:09:54.410080: | spent 0.00579 (0.00578) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:54.410143: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:54.410158: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:54.410170: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:54.410187: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:54.410199: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:54.410208: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:54.410217: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:54.410226: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:54.410234: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:54.410243: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:54.410253: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:54.410262: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:54.410270: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:54.410279: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:54.410288: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:54.410297: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:54.410305: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:54.410314: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:54.410323: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:54.410331: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:54.410340: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:54.410349: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:54.410357: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:54.410366: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:54.410374: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:54.410383: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:54.410392: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:54.410400: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:54.410409: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:54.410418: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:54.410428: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:54.410437: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:54.410446: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:54.410454: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:54.410485: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:54.410496: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:54.410505: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:54.410518: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:54.410527: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:54.410536: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:54.410545: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:54.410554: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:54.410563: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:54.410572: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:54.410581: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:54.410591: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:54.410600: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:54.410609: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:54.410618: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:54.410628: | 77 57 01 00 wW.. Jan 13 23:09:54.410642: | **parse ISAKMP Message: Jan 13 23:09:54.410657: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:54.410670: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:54.410683: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:54.410693: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:54.410702: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:54.410712: | flags: none (0x0) Jan 13 23:09:54.410723: | Message ID: 0 (00 00 00 00) Jan 13 23:09:54.410737: | length: 724 (00 00 02 d4) Jan 13 23:09:54.410748: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:54.410761: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:54.410778: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:54.410791: | IKEv1 packet dropped Jan 13 23:09:54.410802: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:54.410813: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:54.410825: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:54.410835: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:54.410847: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:54.410866: | spent 0.803 (0.802) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:57.414996: | spent 0.00374 (0.00375) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:57.415051: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:57.415060: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:57.415066: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:57.415076: | *received 724 bytes from 94.253.210.164:500 on eth0 161.53.235.3:500 using UDP Jan 13 23:09:57.415082: | ae 10 32 79 22 ca e7 f0 00 00 00 00 00 00 00 00 ..2y"........... Jan 13 23:09:57.415086: | 01 10 02 00 00 00 00 00 00 00 02 d4 0d 00 02 3c ...............< Jan 13 23:09:57.415091: | 00 00 00 01 00 00 00 01 00 00 02 30 01 01 00 10 ...........0.... Jan 13 23:09:57.415113: | 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:57.415119: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 05 ................ Jan 13 23:09:57.415123: | 80 04 00 02 03 00 00 24 02 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:57.415128: | 80 0c 70 80 80 01 00 07 80 0e 01 00 80 03 00 01 ..p............. Jan 13 23:09:57.415132: | 80 02 00 04 80 04 00 02 03 00 00 24 03 01 00 00 ...........$.... Jan 13 23:09:57.415136: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 01 00 ......p......... Jan 13 23:09:57.415141: | 80 03 00 01 80 02 00 06 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:57.415145: | 04 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:57.415150: | 80 0e 01 00 80 03 00 01 80 02 00 02 80 04 00 02 ................ Jan 13 23:09:57.415154: | 03 00 00 24 05 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:57.415159: | 80 01 00 07 80 0e 01 00 80 03 00 01 80 02 00 01 ................ Jan 13 23:09:57.415163: | 80 04 00 02 03 00 00 24 06 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:57.415168: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:57.415173: | 80 02 00 06 80 04 00 02 03 00 00 24 07 01 00 00 ...........$.... Jan 13 23:09:57.415177: | 80 0b 00 01 80 0c 70 80 80 01 00 07 80 0e 00 80 ......p......... Jan 13 23:09:57.415182: | 80 03 00 01 80 02 00 05 80 04 00 02 03 00 00 24 ...............$ Jan 13 23:09:57.415186: | 08 01 00 00 80 0b 00 01 80 0c 70 80 80 01 00 07 ..........p..... Jan 13 23:09:57.415191: | 80 0e 00 80 80 03 00 01 80 02 00 04 80 04 00 02 ................ Jan 13 23:09:57.415195: | 03 00 00 24 09 01 00 00 80 0b 00 01 80 0c 70 80 ...$..........p. Jan 13 23:09:57.415202: | 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02 ................ Jan 13 23:09:57.415207: | 80 04 00 02 03 00 00 24 0a 01 00 00 80 0b 00 01 .......$........ Jan 13 23:09:57.415211: | 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01 ..p............. Jan 13 23:09:57.415216: | 80 02 00 01 80 04 00 02 03 00 00 20 0b 01 00 00 ........... .... Jan 13 23:09:57.415220: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:57.415224: | 80 02 00 04 80 04 00 02 03 00 00 20 0c 01 00 00 ........... .... Jan 13 23:09:57.415229: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:57.415233: | 80 02 00 02 80 04 00 02 03 00 00 20 0d 01 00 00 ........... .... Jan 13 23:09:57.415237: | 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01 ......p......... Jan 13 23:09:57.415242: | 80 02 00 01 80 04 00 02 03 00 00 20 0e 01 00 00 ........... .... Jan 13 23:09:57.415246: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:57.415251: | 80 02 00 04 80 04 00 02 03 00 00 20 0f 01 00 00 ........... .... Jan 13 23:09:57.415255: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:57.415260: | 80 02 00 02 80 04 00 02 00 00 00 20 10 01 00 00 ........... .... Jan 13 23:09:57.415264: | 80 0b 00 01 80 0c 70 80 80 01 00 01 80 03 00 01 ......p......... Jan 13 23:09:57.415269: | 80 02 00 01 80 04 00 02 0d 00 00 14 4a 13 1c 81 ............J... Jan 13 23:09:57.415273: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 ..XE\W(...E/.... Jan 13 23:09:57.415277: | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 .`FC5.!.|...h..H Jan 13 23:09:57.415282: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ........>.in.c.. Jan 13 23:09:57.415286: | ec 42 7b 1f 0d 00 00 14 44 85 15 2d 18 b6 bb cd .B{.....D..-.... Jan 13 23:09:57.415291: | 0b e8 a8 46 95 79 dd cc 0d 00 00 18 40 48 b7 d5 ...F.y......@H.. Jan 13 23:09:57.415295: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 80 00 00 00 n...%........... Jan 13 23:09:57.415299: | 00 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc ........h...k... Jan 13 23:09:57.415310: | 77 57 01 00 wW.. Jan 13 23:09:57.415319: | **parse ISAKMP Message: Jan 13 23:09:57.415327: | initiator SPI: ae 10 32 79 22 ca e7 f0 Jan 13 23:09:57.415334: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:09:57.415340: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 13 23:09:57.415346: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 13 23:09:57.415351: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 13 23:09:57.415356: | flags: none (0x0) Jan 13 23:09:57.415363: | Message ID: 0 (00 00 00 00) Jan 13 23:09:57.415369: | length: 724 (00 00 02 d4) Jan 13 23:09:57.415375: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 13 23:09:57.415383: | State DB: found IKEv1 state #46 in MAIN_R0 (find_state_ikev1_init) Jan 13 23:09:57.415394: "L2TP-PSK-NAT"[1] 94.253.210.164 #46: discarding initial packet; already STATE_MAIN_R0 Jan 13 23:09:57.415400: | IKEv1 packet dropped Jan 13 23:09:57.415406: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:57.415413: | delref logger@0x55c83803ae78(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:57.415418: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:57.415423: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:57.415431: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:57.415440: | spent 0.458 (0.457) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:58.411921: | spent 0.00452 (0.00456) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:58.411964: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:58.411972: | addref struct iface_endpoint@0x55c83801f058(3->4) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:58.411979: | newref alloc logger@0x55c83803ae78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:58.411988: | *received 352 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:09:58.412002: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:09:58.412007: | 2e 20 24 08 00 00 00 08 00 00 01 60 29 00 01 44 . $........`)..D Jan 13 23:09:58.412012: | 57 32 59 64 a0 90 d4 7c d6 5a 80 9c 2e 86 ed 1a W2Yd...|.Z...... Jan 13 23:09:58.412016: | 70 48 1a f8 9c 1f 82 94 e4 d9 37 31 b3 2b 3d 82 pH........71.+=. Jan 13 23:09:58.412021: | f1 f3 12 80 31 1f 39 da 81 82 99 35 1d 35 da f9 ....1.9....5.5.. Jan 13 23:09:58.412025: | 80 84 3a 80 41 8b 9f 0f 11 c2 14 27 89 58 a9 5a ..:.A......'.X.Z Jan 13 23:09:58.412030: | f9 c3 60 4a 72 d9 4c fc a2 32 08 84 8e 6a cd 44 ..`Jr.L..2...j.D Jan 13 23:09:58.412035: | 42 3a ab 73 ce 3a 9b 51 b5 f0 b0 53 7b 9d b9 cf B:.s.:.Q...S{... Jan 13 23:09:58.412039: | 66 42 6e 5b da e1 6f 80 c4 bb 28 ad 1b 78 fa 56 fBn[..o...(..x.V Jan 13 23:09:58.412044: | 8f 96 bb 44 0a 5e 3e 32 dd 2e 33 41 f3 0d ed 6c ...D.^>2..3A...l Jan 13 23:09:58.412048: | 25 30 ea 42 f3 b0 e7 b6 c8 2e f5 b7 c4 fb df 62 %0.B...........b Jan 13 23:09:58.412053: | 57 22 3c 6b 97 21 3a 6c 24 13 f1 5a 3f 74 25 2d W"e...o..e.^ Jan 13 23:09:58.412075: | d3 10 7a 17 67 0c 4f 98 95 1c 1e a6 65 45 86 47 ..z.g.O.....eE.G Jan 13 23:09:58.412079: | 56 d5 05 92 5c 50 7a a5 37 70 c3 cc 97 88 da 98 V...\Pz.7p...... Jan 13 23:09:58.412084: | 03 14 45 58 79 cc 29 ad e1 61 0f 0a 47 78 f2 65 ..EXy.)..a..Gx.e Jan 13 23:09:58.412109: | 40 0d 82 ad 24 8a de 49 7e 84 66 fe 29 aa d5 2a @...$..I~.f.)..* Jan 13 23:09:58.412117: | 57 f6 f6 43 e4 ea c4 6b 51 76 f3 89 26 32 fa 00 W..C...kQv..&2.. Jan 13 23:09:58.412122: | 7b 78 27 99 15 5e 13 b0 32 09 1e 8f 46 71 29 47 {x'..^..2...Fq)G Jan 13 23:09:58.412131: | **parse ISAKMP Message: Jan 13 23:09:58.412139: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:09:58.412146: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:09:58.412153: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:09:58.412158: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:09:58.412162: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:09:58.412167: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:09:58.412173: | Message ID: 8 (00 00 00 08) Jan 13 23:09:58.412179: | length: 352 (00 00 01 60) Jan 13 23:09:58.412184: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36) Jan 13 23:09:58.412190: | I am the IKE SA Original Responder receiving an IKEv2 CREATE_CHILD_SA request Jan 13 23:09:58.412197: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:09:58.412204: | #41 st.st_msgid_lastrecv 7 md.hdr.isa_msgid 00000008 Jan 13 23:09:58.412215: | Message ID: IKE #41 not a duplicate - message request 8 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=7 .recv=7 .recv_frags=0 .last_contact=9594680.231687 ike.wip.initiator=-1 Jan 13 23:09:58.412219: | unpacking clear payload Jan 13 23:09:58.412224: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:09:58.412229: | ***parse IKEv2 Encryption Payload: Jan 13 23:09:58.412234: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:09:58.412239: | flags: none (0x0) Jan 13 23:09:58.412244: | length: 324 (01 44) Jan 13 23:09:58.412251: | processing payload: ISAKMP_NEXT_v2SK (len=320) Jan 13 23:09:58.412258: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK (ignoring secured payloads) Jan 13 23:09:58.412263: | trying: Informational Request (liveness probe) Jan 13 23:09:58.412268: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412272: | trying: Informational Response (liveness probe) Jan 13 23:09:58.412277: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412281: | trying: Informational Request Jan 13 23:09:58.412286: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412290: | trying: Informational Response Jan 13 23:09:58.412294: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412298: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:09:58.412303: | matching by ignoring secured payloads Jan 13 23:09:58.412352: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.412377: | auth: delref clone-key@0x55c838041fd0 Jan 13 23:09:58.412400: | authenticator matched Jan 13 23:09:58.412421: | stripping 16 octets as pad Jan 13 23:09:58.412428: | #41 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success Jan 13 23:09:58.412435: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:09:58.412439: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:09:58.412445: | **parse IKEv2 Notify Payload: Jan 13 23:09:58.412450: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:09:58.412454: | flags: none (0x0) Jan 13 23:09:58.412460: | length: 12 (00 0c) Jan 13 23:09:58.412464: | Protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:09:58.412469: | SPI size: 4 (04) Jan 13 23:09:58.412474: | Notify Message Type: v2N_REKEY_SA (0x4009) Jan 13 23:09:58.412479: | processing payload: ISAKMP_NEXT_v2N (len=4) Jan 13 23:09:58.412484: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:09:58.412512: | **parse IKEv2 Security Association Payload: Jan 13 23:09:58.412518: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 23:09:58.412523: | flags: none (0x0) Jan 13 23:09:58.412528: | length: 80 (00 50) Jan 13 23:09:58.412533: | processing payload: ISAKMP_NEXT_v2SA (len=76) Jan 13 23:09:58.412538: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 23:09:58.412542: | **parse IKEv2 Nonce Payload: Jan 13 23:09:58.412547: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Jan 13 23:09:58.412552: | flags: none (0x0) Jan 13 23:09:58.412557: | length: 52 (00 34) Jan 13 23:09:58.412561: | processing payload: ISAKMP_NEXT_v2Ni (len=48) Jan 13 23:09:58.412566: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Jan 13 23:09:58.412570: | **parse IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:09:58.412575: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Jan 13 23:09:58.412579: | flags: none (0x0) Jan 13 23:09:58.412584: | length: 64 (00 40) Jan 13 23:09:58.412592: | number of TS: 2 (02) Jan 13 23:09:58.412602: | processing payload: ISAKMP_NEXT_v2TSi (len=56) Jan 13 23:09:58.412607: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Jan 13 23:09:58.412612: | **parse IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:09:58.412616: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.412621: | flags: none (0x0) Jan 13 23:09:58.412626: | length: 64 (00 40) Jan 13 23:09:58.412631: | number of TS: 2 (02) Jan 13 23:09:58.412635: | processing payload: ISAKMP_NEXT_v2TSr (len=56) Jan 13 23:09:58.412642: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK{N,SA,Ni,TSi,TSr} Jan 13 23:09:58.412647: | trying: Informational Request (liveness probe) Jan 13 23:09:58.412651: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412656: | trying: Informational Response (liveness probe) Jan 13 23:09:58.412660: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412664: | trying: Informational Request Jan 13 23:09:58.412669: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412673: | trying: Informational Response Jan 13 23:09:58.412677: | exchange type does not match INFORMATIONAL Jan 13 23:09:58.412681: | trying: process rekey IKE SA request (CREATE_CHILD_SA) Jan 13 23:09:58.412685: | secured payloads do not match Jan 13 23:09:58.412689: | trying: process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:09:58.412693: | secured message matched Jan 13 23:09:58.412697: | selected state microcode process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:09:58.412705: | #41 updating local interface from 161.53.235.3:4500 to 161.53.235.3:4500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:09:58.412711: | delref struct iface_endpoint@0x55c83801f058(4->3) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:09:58.412716: | addref struct iface_endpoint@0x55c83801f058(3->4) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:09:58.412722: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:09:58.412731: | Message ID: IKE #41 responder starting message request 8: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=7 .recv=7 .recv_frags=0 .recv_wip=8 .last_contact=9594680.231687 ike.wip.initiator=-1 Jan 13 23:09:58.412736: | calling processor process rekey Child SA request (CREATE_CHILD_SA) Jan 13 23:09:58.412742: | CREATE_CHILD_SA IPsec SA rekey Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:09:58.412749: | parsing 4 raw bytes of IKEv2 Notify Payload into SPI Jan 13 23:09:58.412753: | SPI Jan 13 23:09:58.412758: | fe c0 76 dc ..v. Jan 13 23:09:58.412763: | CREATE_CHILD_S to rekey IPsec SA(0xfec076dc) Protocol IKEv2_SEC_PROTO_ESP Jan 13 23:09:58.412770: | v2 CHILD SA #45 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:09:58.412783: | State DB: found IKEv2 state #45 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:09:58.412791: | #41 hasa a rekey request for "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 TSi TSr Jan 13 23:09:58.412801: | newref alloc logger@0x55c838040788(0->1) (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:09:58.412808: | addref fd@NULL (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:09:58.412816: | entry state hash_table_entries.serialno@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47 initialized Jan 13 23:09:58.412822: | entry state hash_table_entries.connection_serialno@0x55c8380212d8 $9 initialized Jan 13 23:09:58.412829: | entry state hash_table_entries.reqid@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: reqid=0 initialized Jan 13 23:09:58.412837: | entry state hash_table_entries.ike_initiator_spi@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: 00 00 00 00 00 00 00 00 initialized Jan 13 23:09:58.412847: | entry state hash_table_entries.ike_spis@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:09:58.412853: | creating state object #47 at 0x55c8380212d8 Jan 13 23:09:58.412860: | entry state hash_table_entries.serialno@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47 added to hash table bucket 0x55c83658a360 Jan 13 23:09:58.412866: | entry state hash_table_entries.connection_serialno@0x55c8380212d8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:09:58.412873: | entry state hash_table_entries.reqid@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:09:58.412881: | entry state hash_table_entries.ike_initiator_spi@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: 8d 77 44 17 30 6b 26 bc added to hash table bucket 0x55c83657eca0 Jan 13 23:09:58.412891: | entry state hash_table_entries.ike_spis@0x55c8380212d8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e added to hash table bucket 0x55c83657b6e0 Jan 13 23:09:58.412897: | pstats #47 ikev2.child started Jan 13 23:09:58.412904: | duplicating state object #41 "MYCONN-ikev2-cp"[2] 94.253.210.164 as #47 for IPSEC SA Jan 13 23:09:58.412911: | #47 setting local endpoint to 161.53.235.3:4500 from #41.st_localport (duplicate_state() +1567 programs/pluto/state.c) Jan 13 23:09:58.412916: | addref struct iface_endpoint@0x55c83801f058(4->5) (duplicate_state() +1569 programs/pluto/state.c) Jan 13 23:09:58.412921: | duplicate_state: addref st_skeyid_nss-key@NULL Jan 13 23:09:58.412926: | duplicate_state: addref st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:09:58.412930: | duplicate_state: addref st_skey_ai_nss-key@0x55c838005890 Jan 13 23:09:58.412934: | duplicate_state: addref st_skey_ar_nss-key@0x55c838002520 Jan 13 23:09:58.412939: | duplicate_state: addref st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:09:58.412943: | duplicate_state: addref st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:09:58.412947: | duplicate_state: addref st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:09:58.412952: | duplicate_state: addref st_skey_pr_nss-key@0x55c838013660 Jan 13 23:09:58.412956: | duplicate_state: addref st_enc_key_nss-key@NULL Jan 13 23:09:58.412965: | Message ID: CHILD #41.#47 initializing (CHILD SA): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=7 .recv=7 .recv_frags=0 .recv_wip=8 .last_contact=9594680.231687 child.wip.initiator=0->-1 Jan 13 23:09:58.412972: | child state #47: UNDEFINED(ignore) => REKEY_CHILD_R0(established IKE SA) Jan 13 23:09:58.412978: | #47.st_v2_transition NULL -> NULL (new_v2_child_state() +1645 programs/pluto/state.c) Jan 13 23:09:58.412991: | rekeying Child SA with PFS1:ESP=AES_CBC_256-HMAC_SHA1_96-MODP2048-DISABLED 2:ESP=AES_CBC_256-HMAC_SHA1_96-NONE-DISABLED Jan 13 23:09:58.412998: | TSi: parsing 2 traffic selectors Jan 13 23:09:58.413003: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:09:58.413009: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:09:58.413020: | IP Protocol ID: ALL (0x0) Jan 13 23:09:58.413026: | length: 16 (00 10) Jan 13 23:09:58.413032: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:09:58.413037: | start port: 0 (00 00) Jan 13 23:09:58.413042: | end port: 65535 (ff ff) Jan 13 23:09:58.413048: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:09:58.413053: | TS IP start Jan 13 23:09:58.413058: | 00 00 00 00 .... Jan 13 23:09:58.413063: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:09:58.413067: | TS IP end Jan 13 23:09:58.413071: | ff ff ff ff .... Jan 13 23:09:58.413078: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:09:58.413084: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:09:58.413089: | IP Protocol ID: ALL (0x0) Jan 13 23:09:58.413094: | length: 40 (00 28) Jan 13 23:09:58.413098: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:09:58.413103: | start port: 0 (00 00) Jan 13 23:09:58.413108: | end port: 65535 (ff ff) Jan 13 23:09:58.413114: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:09:58.413119: | TS IP start Jan 13 23:09:58.413123: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:09:58.413128: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:09:58.413132: | TS IP end Jan 13 23:09:58.413136: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:09:58.413141: | TSi: parsed 2 traffic selectors Jan 13 23:09:58.413146: | TSr: parsing 2 traffic selectors Jan 13 23:09:58.413151: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:09:58.413155: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:09:58.413160: | IP Protocol ID: ALL (0x0) Jan 13 23:09:58.413165: | length: 16 (00 10) Jan 13 23:09:58.413169: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:09:58.413174: | start port: 0 (00 00) Jan 13 23:09:58.413178: | end port: 65535 (ff ff) Jan 13 23:09:58.413183: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:09:58.413187: | TS IP start Jan 13 23:09:58.413191: | 00 00 00 00 .... Jan 13 23:09:58.413195: | parsing 4 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:09:58.413199: | TS IP end Jan 13 23:09:58.413204: | ff ff ff ff .... Jan 13 23:09:58.413208: | ***parse IKEv2 Traffic Selector Header: Jan 13 23:09:58.413213: | TS type: IKEv2_TS_IPV6_ADDR_RANGE (0x8) Jan 13 23:09:58.413217: | IP Protocol ID: ALL (0x0) Jan 13 23:09:58.413222: | length: 40 (00 28) Jan 13 23:09:58.413226: | ****parse IKEv2 IP Traffic Selector port range: Jan 13 23:09:58.413231: | start port: 0 (00 00) Jan 13 23:09:58.413236: | end port: 65535 (ff ff) Jan 13 23:09:58.413244: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP start Jan 13 23:09:58.413248: | TS IP start Jan 13 23:09:58.413253: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Jan 13 23:09:58.413257: | parsing 16 raw bytes of IKEv2 Traffic Selector Header into TS IP end Jan 13 23:09:58.413262: | TS IP end Jan 13 23:09:58.413266: | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ Jan 13 23:09:58.413271: | TSr: parsed 2 traffic selectors Jan 13 23:09:58.413281: | evaluating local "MYCONN-ikev2-cp"[2] 94.253.210.164 $9 I=192.168.101.10/32:0/0 R=0.0.0.0/0:0/0 fit <= to remote: Jan 13 23:09:58.413289: | TSi[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:09:58.413298: | match address end->client=192.168.101.10/32 <= TSi[0]net=0.0.0.0-255.255.255.255: YES fitness 64 Jan 13 23:09:58.413305: | narrow port end=0..65535 <= TSi[0]=0..65535: 0 Jan 13 23:09:58.413309: | TSi[0] port match: YES fitness 65536 Jan 13 23:09:58.413314: | narrow protocol end=*0 <= TSi[0]=*0: 0 Jan 13 23:09:58.413326: | match end->client.ipproto=*0 <= TSi[0].ipprotoid=*0: YES fitness 255 Jan 13 23:09:58.413333: | TSr[0] net=0.0.0.0-255.255.255.255 iporotoid=0 {start,end}port=0..65535 Jan 13 23:09:58.413342: | match address end->client=0.0.0.0/0 <= TSr[0]net=0.0.0.0-255.255.255.255: YES fitness 32 Jan 13 23:09:58.413348: | narrow port end=0..65535 <= TSr[0]=0..65535: 0 Jan 13 23:09:58.413353: | TSr[0] port match: YES fitness 65536 Jan 13 23:09:58.413357: | narrow protocol end=*0 <= TSr[0]=*0: 0 Jan 13 23:09:58.413362: | match end->client.ipproto=*0 <= TSr[0].ipprotoid=*0: YES fitness 255 Jan 13 23:09:58.413367: | best fit so far: TSi[0] TSr[0] Jan 13 23:09:58.413374: | TSr[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:09:58.413383: | match address end->client=0.0.0.0/0 <= TSr[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:09:58.413389: | TSi[1] net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff iporotoid=0 {start,end}port=0..65535 Jan 13 23:09:58.413397: | match address end->client=192.168.101.10/32 <= TSi[1]net=::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff: NO Jan 13 23:09:58.413404: | comparing remote proposals against CREATE_CHILD_SA request 2 local proposals Jan 13 23:09:58.413410: | local proposal 1 type ENCR has 1 transforms Jan 13 23:09:58.413415: | local proposal 1 type PRF has 0 transforms Jan 13 23:09:58.413420: | local proposal 1 type INTEG has 1 transforms Jan 13 23:09:58.413424: | local proposal 1 type DH has 1 transforms Jan 13 23:09:58.413429: | local proposal 1 type ESN has 1 transforms Jan 13 23:09:58.413434: | local proposal 1 transforms: required: ENCR+INTEG+DH+ESN; optional: none Jan 13 23:09:58.413439: | local proposal 2 type ENCR has 1 transforms Jan 13 23:09:58.413443: | local proposal 2 type PRF has 0 transforms Jan 13 23:09:58.413447: | local proposal 2 type INTEG has 1 transforms Jan 13 23:09:58.413452: | local proposal 2 type DH has 1 transforms Jan 13 23:09:58.413456: | local proposal 2 type ESN has 1 transforms Jan 13 23:09:58.413461: | local proposal 2 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:09:58.413466: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:09:58.413471: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:09:58.413476: | length: 40 (00 28) Jan 13 23:09:58.413482: | prop #: 1 (01) Jan 13 23:09:58.413486: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:09:58.413491: | spi size: 4 (04) Jan 13 23:09:58.413496: | # transforms: 3 (03) Jan 13 23:09:58.413501: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:09:58.413506: | remote SPI Jan 13 23:09:58.413510: | 3a ad fc 14 :... Jan 13 23:09:58.413515: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..2] of 2 local proposals Jan 13 23:09:58.413520: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:09:58.413525: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.413530: | length: 12 (00 0c) Jan 13 23:09:58.413534: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:09:58.413539: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:09:58.413544: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:09:58.413549: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:09:58.413554: | length/value: 256 (01 00) Jan 13 23:09:58.413560: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:09:58.413566: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:09:58.413571: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:09:58.413575: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.413580: | length: 8 (00 08) Jan 13 23:09:58.413585: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:09:58.413590: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:09:58.413605: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:09:58.413611: | remote proposal 1 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 2 type 3 (INTEG) transform 0 Jan 13 23:09:58.413616: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:09:58.413621: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:09:58.413626: | length: 8 (00 08) Jan 13 23:09:58.413630: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:09:58.413635: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:09:58.413640: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:09:58.413646: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 0 Jan 13 23:09:58.413652: | remote proposal 1 proposed transforms: ENCR+INTEG+ESN; matched: ENCR+INTEG+ESN; unmatched: none Jan 13 23:09:58.413658: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 1; required: ENCR+INTEG+DH+ESN; optional: none; matched: ENCR+INTEG+ESN Jan 13 23:09:58.413663: | remote proposal 1 does not match local proposal 1; unmatched transforms: none; missing transforms: DH Jan 13 23:09:58.413669: | comparing remote proposal 1 containing ENCR+INTEG+ESN transforms to local proposal 2; required: ENCR+INTEG+ESN; optional: DH; matched: ENCR+INTEG+ESN Jan 13 23:09:58.413674: | remote proposal 1 matches local proposal 2 Jan 13 23:09:58.413679: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:09:58.413683: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:09:58.413688: | length: 36 (00 24) Jan 13 23:09:58.413692: | prop #: 2 (02) Jan 13 23:09:58.413697: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:09:58.413701: | spi size: 4 (04) Jan 13 23:09:58.413706: | # transforms: 3 (03) Jan 13 23:09:58.413711: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:09:58.413716: | remote SPI Jan 13 23:09:58.413720: | 3a ad fc 14 :... Jan 13 23:09:58.413725: | Comparing remote proposal 2 containing 3 transforms against local proposal [1..1] of 2 local proposals Jan 13 23:09:58.413732: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:09:58.413736: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.413741: | length: 8 (00 08) Jan 13 23:09:58.413746: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:09:58.413751: | IKEv2 transform ID: 3DES (0x3) Jan 13 23:09:58.413755: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:09:58.413761: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.413766: | length: 8 (00 08) Jan 13 23:09:58.413771: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:09:58.413775: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:09:58.413781: | remote proposal 2 transform 1 (INTEG=HMAC_SHA1_96) matches local proposal 1 type 3 (INTEG) transform 0 Jan 13 23:09:58.413787: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:09:58.413791: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:09:58.413796: | length: 8 (00 08) Jan 13 23:09:58.413801: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:09:58.413806: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:09:58.413811: | remote proposal 2 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 0 Jan 13 23:09:58.413817: | remote proposal 2 proposed transforms: ENCR+INTEG+ESN; matched: INTEG+ESN; unmatched: ENCR Jan 13 23:09:58.413822: | remote proposal 2 does not match; unmatched remote transforms: ENCR Jan 13 23:09:58.413832: "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: proposal 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=3aadfc14 chosen from remote proposals 1:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA1_96;ESN=DISABLED[first-match] 2:ESP:ENCR=3DES;INTEG=HMAC_SHA1_96;ESN=DISABLED Jan 13 23:09:58.413840: | CREATE_CHILD_SA request ikev2_proposal: 1:ESP=AES_CBC_256-HMAC_SHA1_96-DISABLED SPI=3aadfc14 Jan 13 23:09:58.413851: | converting proposal to internal trans attrs Jan 13 23:09:58.413864: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:09:58.413870: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:09:58.413876: | newref clone logger@0x55c838017ee8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:09:58.413881: | job 57 helper 0 #41 Child Rekey Responder KE and nonce nr (dh): added to pending queue Jan 13 23:09:58.413886: | #41 STATE_V2_ESTABLISHED_IKE_SA: retransmits: cleared Jan 13 23:09:58.413895: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c8380170d8 timeout in 60 seconds for #41 Jan 13 23:09:58.413901: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:09:58.413915: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 23:09:58.413924: | suspend: saving MD@0x55c838050b08 in state #41 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:09:58.413930: | addref struct msg_digest@0x55c838050b08(2->3) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:09:58.413933: | job 57 helper 2 #41 Child Rekey Responder KE and nonce nr (dh): started Jan 13 23:09:58.413935: | #41 is busy; has suspended MD 0x55c838050b08 Jan 13 23:09:58.413984: | job 57 helper 2 #41 Child Rekey Responder KE and nonce nr (dh): finished Jan 13 23:09:58.413985: | #41 spent 1.22 (1.24) milliseconds in processing: process rekey Child SA request (CREATE_CHILD_SA) in v2_dispatch() Jan 13 23:09:58.414000: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: spent 0.0685 (0.0677) milliseconds in job 57 helper 2 #41 Child Rekey Responder KE and nonce nr (dh) Jan 13 23:09:58.414008: | delref struct msg_digest@0x55c838050b08(3->2) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:09:58.414017: | scheduling resume sending job back to main thread for #41 Jan 13 23:09:58.414031: | #41 spent 2.09 (2.13) milliseconds in ikev2_process_packet() Jan 13 23:09:58.414039: | newref tt@0x7ff8b8002e88(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:09:58.414046: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:58.414060: | helper 2: waiting for work Jan 13 23:09:58.414067: | spent 2.12 (2.16) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:09:58.414091: | processing resume sending job back to main thread for #41 Jan 13 23:09:58.414100: | suspend: restoring MD@0x55c838050b08 from state #41 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:09:58.414106: | job 57 helper 2 #41 Child Rekey Responder KE and nonce nr (dh): calling state's callback function Jan 13 23:09:58.414113: | process_v2_CREATE_CHILD_SA_request_continue_1() for #47 STATE_V2_REKEY_CHILD_R0 Jan 13 23:09:58.414122: | xfrm: sendrecv_xfrm_msg() sending 22 Jan 13 23:09:58.414148: | kernel: netlink_get_spi: allocated 0xc55cbabc for esp.0@161.53.235.3 Jan 13 23:09:58.414157: | kernel: allocated incoming spi 94.253.210.164 -> esp.c55cbabc@161.53.235.3 in tunnel-mode Jan 13 23:09:58.414164: | integ=HMAC_SHA1_96: .key_size=20 encrypt=AES_CBC: .key_size=32 .salt_size=0 keymat_len=52 Jan 13 23:09:58.414197: | result: newref data=Ni-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414222: | result: newref data=Ni-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414234: | data=Ni: delref tmp-key@0x55c838012940 Jan 13 23:09:58.414259: | result: newref data+=Nr-key@0x55c838012940 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414271: | append_symkey_bytes: delref lhs-key@0x55c838041fd0 Jan 13 23:09:58.414293: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.414318: | prf+0: delref clone-key@0x55c838041fd0 Jan 13 23:09:58.414349: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414375: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414413: | result: newref final-key@0x55c83801c850 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414430: | result: newref final-key@0x55c838041fd0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414435: | final: delref tmp-key@0x55c83801c850 Jan 13 23:09:58.414442: | prfplus: addref old_t[1]-key@0x55c838041fd0 Jan 13 23:09:58.414459: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.414481: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:09:58.414508: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414535: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414564: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414582: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414614: | result: newref final-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414629: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414635: | final: delref tmp-key@0x55c838026d80 Jan 13 23:09:58.414649: | result: newref result-key@0x55c838026d80 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414654: | append_symkey_symkey: delref lhs-key@0x55c838041fd0 Jan 13 23:09:58.414659: | prfplus: delref old_t[N]-key@0x55c838041fd0 Jan 13 23:09:58.414671: | result: newref clone-key@0x55c838041fd0 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.414683: | prf+N: delref clone-key@0x55c838041fd0 Jan 13 23:09:58.414702: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414728: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414755: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414782: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414828: | result: newref final-key@0x55c8380199c0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414846: | result: newref final-key@0x55c838041fd0 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414853: | final: delref tmp-key@0x55c8380199c0 Jan 13 23:09:58.414867: | result: newref result-key@0x55c8380199c0 (96-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.414874: | append_symkey_symkey: delref lhs-key@0x55c838026d80 Jan 13 23:09:58.414880: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 23:09:58.414892: | result: newref clone-key@0x55c83801c850 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.414903: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:09:58.414916: | nss hmac digest hack: newref slot-key@0x55c838003da0 (32-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414928: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414943: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.414960: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.414989: | result: newref final-key@0x55c838026d80 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.415004: | result: newref final-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.415017: | final: delref tmp-key@0x55c838026d80 Jan 13 23:09:58.415032: | result: newref result-key@0x55c838026d80 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:09:58.415038: | append_symkey_symkey: delref lhs-key@0x55c8380199c0 Jan 13 23:09:58.415044: | prfplus: delref old_t[N]-key@0x55c838041fd0 Jan 13 23:09:58.415052: | prfplus: delref old_t[final]-key@0x55c83801c850 Jan 13 23:09:58.415058: | child_sa_keymat: delref data-key@0x55c838012940 Jan 13 23:09:58.415071: | result: newref initiator to responder key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +125 programs/pluto/ikev2_crypto.c) Jan 13 23:09:58.415083: | initiator to responder keys: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.415097: | initiator to responder keys: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.415105: | ikev2_derive_child_keys: delref ikey-key@0x55c838012940 Jan 13 23:09:58.415118: | result: newref responder to initiator key-key@0x55c838012940 (52-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +133 programs/pluto/ikev2_crypto.c) Jan 13 23:09:58.415129: | responder to initiator keys:: newref slot-key@0x55c838003da0 (52-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:09:58.415140: | responder to initiator keys:: delref slot-key-key@0x55c838003da0 Jan 13 23:09:58.415147: | ikev2_derive_child_keys: delref rkey-key@0x55c838012940 Jan 13 23:09:58.415153: | ikev2_derive_child_keys: delref keymat-key@0x55c838026d80 Jan 13 23:09:58.415159: | kernel: install_ipsec_sa() for #47: inbound and outbound Jan 13 23:09:58.415167: | kernel: could_route called for MYCONN-ikev2-cp; kind=CK_INSTANCE that.has_client=yes oppo=no this.host_port=500 sec_label= Jan 13 23:09:58.415175: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:09:58.415189: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:09:58.415198: | matches: 1 Jan 13 23:09:58.415206: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:09:58.415215: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:09:58.415226: | kernel: setup_half_ipsec_sa() outbound 0.0.0.0/0-ALL->[161.53.235.3=IPv4=>94.253.210.164]-ALL->192.168.101.10/32 sec_label= Jan 13 23:09:58.415233: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:09:58.415238: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:09:58.415243: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:09:58.415249: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:09:58.415254: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:09:58.415261: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:09:58.415273: | kernel: add_sa() 0 outbound tunnel 0.0.0.0/0-ALL->161.53.235.3=ESP=3aadfc14=espinudp=>94.253.210.164-ALL->192.168.101.10/32 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:09:58.415280: | xfrm: enabling tunnel mode Jan 13 23:09:58.415285: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:09:58.415290: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:09:58.415297: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:09:58.415302: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:09:58.415307: | xfrm: sendrecv_xfrm_msg() sending 16 Jan 13 23:09:58.415379: | netlink response for Add SA esp.3aadfc14@94.253.210.164 included non-error error Jan 13 23:09:58.415389: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=0 owner=#45 tunnel Jan 13 23:09:58.415394: | kernel: set up outgoing SA Jan 13 23:09:58.415401: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:09:58.415416: | kernel: setup_half_ipsec_sa() inbound 192.168.101.10/32-ALL->[94.253.210.164=IPv4=>161.53.235.3]-ALL->0.0.0.0/0 sec_label= Jan 13 23:09:58.415421: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:09:58.415428: | kernel: looking for alg with encrypt: AES_CBC keylen: 256 integ: HMAC_SHA1_96 Jan 13 23:09:58.415437: | encrypt AES_CBC keylen=256 transid=12, key_size=32, encryptalg=12 Jan 13 23:09:58.415445: | kernel: st->st_esp.keymat_len=52 is encrypt_keymat_size=32 + integ_keymat_size=20 Jan 13 23:09:58.415450: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:09:58.415456: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:09:58.415467: | kernel: add_sa() 0 inbound tunnel 192.168.101.10/32-ALL->94.253.210.164=ESP=c55cbabc=espinudp=>161.53.235.3-ALL->0.0.0.0/0 HMAC_SHA1_96:20 AES_CBC:32 Jan 13 23:09:58.415473: | xfrm: enabling tunnel mode Jan 13 23:09:58.415478: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:09:58.415483: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:09:58.415488: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=4500 Jan 13 23:09:58.415492: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:09:58.415497: | xfrm: sendrecv_xfrm_msg() sending 26 Jan 13 23:09:58.415544: | netlink response for Add SA esp.c55cbabc@161.53.235.3 included non-error error Jan 13 23:09:58.415554: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=1 owner=#45 tunnel Jan 13 23:09:58.415558: | kernel: set up incoming SA Jan 13 23:09:58.415564: | kernel: sr for #47: erouted Jan 13 23:09:58.415571: | kernel: route_and_eroute() for 0.0.0.0/0 --> 192.168.101.10/32; proto 0, and source port 0 dest port 0 sec_label Jan 13 23:09:58.415580: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:09:58.415589: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:09:58.415595: | matches: 1 Jan 13 23:09:58.415602: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:09:58.415607: | kernel: route_and_eroute with c: MYCONN-ikev2-cp (next: none) ero:MYCONN-ikev2-cp esr:{(nil)} ro:MYCONN-ikev2-cp rosr:{(nil)} and state: #47 Jan 13 23:09:58.415612: | kernel: we are replacing an eroute Jan 13 23:09:58.415618: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:09:58.415626: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:09:58.415641: | kernel: raw_policy() REPLACE_OUTBOUND THIS_IS_NOT_INBOUND eroute_connection() sag_eroute() route_and_eroute() replace sag 0.0.0.0/0-ALL-161.53.235.3==94.253.210.164-ALL-192.168.101.10/32 shunt_policy=UNSET encap=tunnel,161.53.235.3=>94.253.210.164,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:09:58.415647: | xfrm_raw_policy() policy=IPv4/3 dir=1 Jan 13 23:09:58.415652: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:09:58.415658: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 23:09:58.415665: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=161.53.235.3 id.daddr=94.253.210.164 Jan 13 23:09:58.415670: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 23:09:58.415692: | kernel: policy: result=success Jan 13 23:09:58.415701: | kernel: route_and_eroute: firewall_notified: true Jan 13 23:09:58.415708: | kernel: route_and_eroute: instance "MYCONN-ikev2-cp"[2] 94.253.210.164, setting eroute_owner {spd=0x55c83803cdc8,sr=0x55c83803cdc8} to #47 (was #45) (newest_ipsec_sa=#45) Jan 13 23:09:58.415715: | ISAKMP_v2_CREATE_CHILD_SA: instance MYCONN-ikev2-cp[2], setting IKEv2 newest_ipsec_sa to #47 (was #45) (spd.eroute=#47) cloned from #41 Jan 13 23:09:58.415733: | opening output PBS CREATE_CHILD_SA message Jan 13 23:09:58.415741: | **emit ISAKMP Message: Jan 13 23:09:58.415747: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:09:58.415754: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:09:58.415759: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:58.415764: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:09:58.415771: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24) Jan 13 23:09:58.415776: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:09:58.415781: | Message ID: 8 (00 00 00 08) Jan 13 23:09:58.415788: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:09:58.415794: | ***emit IKEv2 Encryption Payload: Jan 13 23:09:58.415799: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.415804: | flags: none (0x0) Jan 13 23:09:58.415809: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:09:58.415816: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:09:58.415822: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:09:58.415834: | emitting ikev2_proposal ... Jan 13 23:09:58.415841: | ****emit IKEv2 Security Association Payload: Jan 13 23:09:58.415846: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.415851: | flags: none (0x0) Jan 13 23:09:58.415856: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 23:09:58.415860: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:09:58.415867: | *****emit IKEv2 Proposal Substructure Payload: Jan 13 23:09:58.415872: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:09:58.415876: | prop #: 1 (01) Jan 13 23:09:58.415881: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:09:58.415885: | spi size: 4 (04) Jan 13 23:09:58.415890: | # transforms: 3 (03) Jan 13 23:09:58.415895: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 23:09:58.415900: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Jan 13 23:09:58.415905: | our spi: c5 5c ba bc Jan 13 23:09:58.415910: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:09:58.415920: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.415929: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:09:58.415934: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:09:58.415939: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:09:58.415946: | *******emit IKEv2 Attribute Substructure Payload: Jan 13 23:09:58.415951: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:09:58.415956: | length/value: 256 (01 00) Jan 13 23:09:58.415962: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 23:09:58.415967: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:09:58.415972: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.415978: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:09:58.415983: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:09:58.415988: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.415994: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:09:58.415999: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:09:58.416004: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:09:58.416016: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:09:58.416021: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:09:58.416026: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:09:58.416031: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:09:58.416035: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:09:58.416040: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:09:58.416045: | emitting length of IKEv2 Proposal Substructure Payload: 40 Jan 13 23:09:58.416049: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 23:09:58.416054: | emitting length of IKEv2 Security Association Payload: 44 Jan 13 23:09:58.416058: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 23:09:58.416063: | ****emit IKEv2 Nonce Payload: Jan 13 23:09:58.416070: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.416074: | flags: none (0x0) Jan 13 23:09:58.416079: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Jan 13 23:09:58.416084: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:09:58.416089: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Jan 13 23:09:58.416094: | IKEv2 nonce: Jan 13 23:09:58.416140: | f0 94 c1 5d 29 f9 de 92 fe 00 81 c1 a4 df de 99 ...])........... Jan 13 23:09:58.416144: | e2 4f c8 dc 0b 5c 9b ec 5d 0b c4 ec 18 b6 7f 85 .O...\..]....... Jan 13 23:09:58.416149: | emitting length of IKEv2 Nonce Payload: 36 Jan 13 23:09:58.416155: | that TSi TS Jan 13 23:09:58.416160: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:09:58.416169: | ipprotoid: 0 Jan 13 23:09:58.416175: | port range: 0-65535 Jan 13 23:09:58.416181: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:09:58.416188: | sec_label: Jan 13 23:09:58.416193: | this TSr TS Jan 13 23:09:58.416197: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:09:58.416201: | ipprotoid: 0 Jan 13 23:09:58.416206: | port range: 0-65535 Jan 13 23:09:58.416211: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:09:58.416215: | sec_label: Jan 13 23:09:58.416221: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:09:58.416225: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.416230: | flags: none (0x0) Jan 13 23:09:58.416235: | number of TS: 1 (01) Jan 13 23:09:58.416240: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Jan 13 23:09:58.416244: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:09:58.416249: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:09:58.416254: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:09:58.416258: | IP Protocol ID: ALL (0x0) Jan 13 23:09:58.416263: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:09:58.416268: | start port: 0 (00 00) Jan 13 23:09:58.416273: | end port: 65535 (ff ff) Jan 13 23:09:58.416278: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:09:58.416284: | IP start: c0 a8 65 0a Jan 13 23:09:58.416289: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:09:58.416294: | IP end: c0 a8 65 0a Jan 13 23:09:58.416298: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:09:58.416303: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Jan 13 23:09:58.416322: | ****emit IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:09:58.416336: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.416342: | flags: none (0x0) Jan 13 23:09:58.416347: | number of TS: 1 (01) Jan 13 23:09:58.416352: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Jan 13 23:09:58.416356: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'CREATE_CHILD_SA message' Jan 13 23:09:58.416361: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:09:58.416365: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:09:58.416369: | IP Protocol ID: ALL (0x0) Jan 13 23:09:58.416374: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:09:58.416379: | start port: 0 (00 00) Jan 13 23:09:58.416384: | end port: 65535 (ff ff) Jan 13 23:09:58.416389: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:09:58.416394: | IP start: 00 00 00 00 Jan 13 23:09:58.416399: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:09:58.416404: | IP end: ff ff ff ff Jan 13 23:09:58.416414: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:09:58.416424: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Jan 13 23:09:58.416434: | adding 16 bytes of padding (including 1 byte padding-length) Jan 13 23:09:58.416447: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416459: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416471: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416482: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416494: | emitting 1 0x04 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416506: | emitting 1 0x05 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416517: | emitting 1 0x06 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416528: | emitting 1 0x07 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416539: | emitting 1 0x08 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416551: | emitting 1 0x09 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416563: | emitting 1 0x0a repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416574: | emitting 1 0x0b repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416585: | emitting 1 0x0c repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416595: | emitting 1 0x0d repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416606: | emitting 1 0x0e repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416618: | emitting 1 0x0f repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.416629: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:09:58.416640: | emitting length of IKEv2 Encryption Payload: 180 Jan 13 23:09:58.416651: | emitting length of ISAKMP Message: 208 Jan 13 23:09:58.416691: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.416715: | integ: delref clone-key@0x55c838026d80 Jan 13 23:09:58.416747: | child state #47: REKEY_CHILD_R0(established IKE SA) => ESTABLISHED_CHILD_SA(established CHILD SA) Jan 13 23:09:58.416760: | pstats #47 ikev2.child established Jan 13 23:09:58.416777: | this TS Jan 13 23:09:58.416788: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:09:58.416793: | ipprotoid: 0 Jan 13 23:09:58.416797: | port range: 0-65535 Jan 13 23:09:58.416803: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:09:58.416816: | sec_label: Jan 13 23:09:58.416821: | that TS Jan 13 23:09:58.416825: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:09:58.416830: | ipprotoid: 0 Jan 13 23:09:58.416834: | port range: 0-65535 Jan 13 23:09:58.416840: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:09:58.416844: | sec_label: Jan 13 23:09:58.416853: | NAT-T: NAT Traversal detected - their IKE port is '500' Jan 13 23:09:58.416857: | NAT-T: encaps is 'auto' Jan 13 23:09:58.416865: "MYCONN-ikev2-cp"[2] 94.253.210.164 #47: established Child SA using #41; IPsec tunnel [0.0.0.0-255.255.255.255:0-65535 0] -> [192.168.101.10-192.168.101.10:0-65535 0] {ESPinUDP=>0x3aadfc14 <0xc55cbabc xfrm=AES_CBC_256-HMAC_SHA1_96 NATD=94.253.210.164:4500 DPD=active} Jan 13 23:09:58.416871: | #47 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 23:09:58.416878: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c838012ed8 timeout in 28800 seconds for #47 Jan 13 23:09:58.416884: | newref tt@0x55c838018328(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:09:58.416890: | dpd enabled, scheduling ikev2 liveness checks Jan 13 23:09:58.416897: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838012e58 timeout in 30 seconds for #47 Jan 13 23:09:58.416907: | newref tt@0x55c838048ba8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:09:58.416915: | unpending IKE SA #41 CHILD SA #47 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:09:58.416922: | unpending state #41 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:09:58.416927: | job 57 helper 2 #41 Child Rekey Responder KE and nonce nr (dh): final status STF_OK; cleaning up Jan 13 23:09:58.416933: | delref secret@NULL (cleanup_ke_and_nonce() +83 programs/pluto/crypt_ke.c) Jan 13 23:09:58.416939: | delref logger@0x55c838017ee8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:09:58.416943: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:09:58.416948: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:09:58.416954: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:09:58.416963: | Message ID: updating counters for #41 Jan 13 23:09:58.416975: | Message ID: IKE #41 updating responder received message request 8: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=7 .recv=7->8 .recv_frags=0 .recv_wip=8->-1 .last_contact=9594680.231687->9594866.43804 ike.wip.initiator=-1 Jan 13 23:09:58.416985: | Message ID: IKE #41 updating responder sent message response 8: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=7->8 .recv=8 .recv_frags=0 .last_contact=9594866.43804 ike.wip.initiator=-1 Jan 13 23:09:58.416993: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=8 .recv=8 .recv_frags=0 .last_contact=9594866.43804 ike.wip.initiator=-1 Jan 13 23:09:58.417000: | #41 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:09:58.417007: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:09:58.417013: | delref state-event@0x55c8380170d8(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:09:58.417019: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:09:58.417027: | sending 212 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:09:58.417034: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:09:58.417038: | 82 26 37 8e 2e 20 24 20 00 00 00 08 00 00 00 d0 .&7.. $ ........ Jan 13 23:09:58.417043: | 21 00 00 b4 89 8a 32 0a ae ce 09 d4 9d 5d 2d 49 !.....2......]-I Jan 13 23:09:58.417047: | bb c0 d7 f1 0f bf 2a a9 e5 b0 8e 1a ba 26 4f a1 ......*......&O. Jan 13 23:09:58.417052: | 6a bf 0b 60 16 b1 4c e2 da 78 f5 10 85 f8 21 61 j..`..L..x....!a Jan 13 23:09:58.417063: | af 8c ab d5 1e 93 2a 5c 7d 16 36 a7 e8 91 78 8d ......*\}.6...x. Jan 13 23:09:58.417069: | 9f f2 44 57 9c a3 77 c8 45 f5 af 74 89 f7 d0 d8 ..DW..w.E..t.... Jan 13 23:09:58.417073: | 39 3a f9 d1 8b cb 05 07 cd 7e 49 fe 62 5d 1a 39 9:.......~I.b].9 Jan 13 23:09:58.417078: | 02 3f 10 8e 77 78 f0 b3 0f 15 59 98 2d d6 9f 53 .?..wx....Y.-..S Jan 13 23:09:58.417082: | a1 6e 93 17 af 95 cb ad d4 d5 79 df 4e 0f bf 46 .n........y.N..F Jan 13 23:09:58.417086: | 10 f1 25 2a 80 93 7a b8 d9 9a 25 e4 5e f4 70 df ..%*..z...%.^.p. Jan 13 23:09:58.417091: | 9e cb 73 cd 43 e9 7a a2 d7 a9 a6 3e 33 a0 9f 22 ..s.C.z....>3.." Jan 13 23:09:58.417095: | db ac 1d 5f bb 6a 5b d6 90 66 c2 6b 86 f5 4d c6 ..._.j[..f.k..M. Jan 13 23:09:58.417099: | 8c ea 9f 63 ...c Jan 13 23:09:58.417120: | sent 1 messages Jan 13 23:09:58.417127: | announcing the state transition Jan 13 23:09:58.417134: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: process rekey Child SA request (CREATE_CHILD_SA): established IKE SA Jan 13 23:09:58.417141: | releasing whack Jan 13 23:09:58.417152: | releasing #41's fd@(nil) because ST per transition Jan 13 23:09:58.417160: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:09:58.417164: | delref fd@NULL (success_v2_state_transition() +2525 programs/pluto/ikev2.c) Jan 13 23:09:58.417170: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:09:58.417175: | delref logger@0x55c83803ae78(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:09:58.417182: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:09:58.417186: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:09:58.417192: | delref struct iface_endpoint@0x55c83801f058(5->4) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:09:58.417202: | #41 spent 3.09 (3.1) milliseconds in resume sending job back to main thread Jan 13 23:09:58.417210: | delref tt@0x7ff8b8002e88(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:09:58.442195: | spent 0.0033 (0.00334) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:09:58.442232: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:58.442248: | addref struct iface_endpoint@0x55c83801f058(4->5) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:58.442257: | newref alloc logger@0x55c838017ee8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:09:58.442266: | *received 80 bytes from 94.253.210.164:4500 on eth0 161.53.235.3:4500 using UDP Jan 13 23:09:58.442272: | 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e .wD.0k&.1y.E.&7. Jan 13 23:09:58.442277: | 2e 20 25 08 00 00 00 09 00 00 00 50 2a 00 00 34 . %........P*..4 Jan 13 23:09:58.442282: | 23 32 3f 8a ef f6 45 82 7e 6c ff f0 1d 21 23 0f #2?...E.~l...!#. Jan 13 23:09:58.442286: | c7 f3 01 3a de 32 c2 78 f4 d8 5b fa 9b e6 e4 ac ...:.2.x..[..... Jan 13 23:09:58.442291: | 02 f2 c6 44 64 1b 82 f5 cf 0d 9d 75 50 2f bb 07 ...Dd......uP/.. Jan 13 23:09:58.442297: | **parse ISAKMP Message: Jan 13 23:09:58.442305: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:09:58.442311: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:09:58.442316: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:09:58.442321: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:09:58.442325: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:09:58.442330: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:09:58.442336: | Message ID: 9 (00 00 00 09) Jan 13 23:09:58.442341: | length: 80 (00 00 00 50) Jan 13 23:09:58.442346: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jan 13 23:09:58.442352: | I am the IKE SA Original Responder receiving an IKEv2 INFORMATIONAL request Jan 13 23:09:58.442357: | State DB: found IKEv2 state #41 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:09:58.442374: | #41 st.st_msgid_lastrecv 8 md.hdr.isa_msgid 00000009 Jan 13 23:09:58.442385: | Message ID: IKE #41 not a duplicate - message request 9 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=8 .recv=8 .recv_frags=0 .last_contact=9594866.43804 ike.wip.initiator=-1 Jan 13 23:09:58.442391: | unpacking clear payload Jan 13 23:09:58.442395: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:09:58.442401: | ***parse IKEv2 Encryption Payload: Jan 13 23:09:58.442408: | next payload type: ISAKMP_NEXT_v2D (0x2a) Jan 13 23:09:58.442418: | flags: none (0x0) Jan 13 23:09:58.442425: | length: 52 (00 34) Jan 13 23:09:58.442430: | processing payload: ISAKMP_NEXT_v2SK (len=48) Jan 13 23:09:58.442436: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK (ignoring secured payloads) Jan 13 23:09:58.442441: | trying: Informational Request (liveness probe) Jan 13 23:09:58.442445: | matching by ignoring secured payloads Jan 13 23:09:58.442464: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.442479: | auth: delref clone-key@0x55c838026d80 Jan 13 23:09:58.442496: | authenticator matched Jan 13 23:09:58.442510: | stripping 4 octets as pad Jan 13 23:09:58.442517: | #41 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success Jan 13 23:09:58.442523: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:09:58.442529: | Now let's proceed with payload (ISAKMP_NEXT_v2D) Jan 13 23:09:58.442535: | **parse IKEv2 Delete Payload: Jan 13 23:09:58.442540: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.442544: | flags: none (0x0) Jan 13 23:09:58.442551: | length: 12 (00 0c) Jan 13 23:09:58.442556: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:09:58.442561: | SPI size: 4 (04) Jan 13 23:09:58.442566: | number of SPIs: 1 (00 01) Jan 13 23:09:58.442570: | processing payload: ISAKMP_NEXT_v2D (len=4) Jan 13 23:09:58.442576: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK{D} Jan 13 23:09:58.442581: | trying: Informational Request (liveness probe) Jan 13 23:09:58.442585: | secured payloads do not match Jan 13 23:09:58.442589: | trying: Informational Response (liveness probe) Jan 13 23:09:58.442593: | message role does not match response Jan 13 23:09:58.442597: | trying: Informational Request Jan 13 23:09:58.442601: | secured message matched Jan 13 23:09:58.442606: | selected state microcode Informational Request Jan 13 23:09:58.442611: | #41.st_v2_transition ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:09:58.442620: | Message ID: IKE #41 responder starting message request 9: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=8 .recv=8 .recv_frags=0 .recv_wip=9 .last_contact=9594866.43804 ike.wip.initiator=-1 Jan 13 23:09:58.442626: | calling processor Informational Request Jan 13 23:09:58.442632: | an informational request needing a response Jan 13 23:09:58.442640: | opening output PBS information exchange reply packet Jan 13 23:09:58.442646: | **emit ISAKMP Message: Jan 13 23:09:58.442656: | initiator SPI: 8d 77 44 17 30 6b 26 bc Jan 13 23:09:58.442666: | responder SPI: 31 79 0d 45 82 26 37 8e Jan 13 23:09:58.442674: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:09:58.442679: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:09:58.442683: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:09:58.442688: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:09:58.442695: | Message ID: 9 (00 00 00 09) Jan 13 23:09:58.442700: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:09:58.442707: | ***emit IKEv2 Encryption Payload: Jan 13 23:09:58.442718: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.442724: | flags: none (0x0) Jan 13 23:09:58.442729: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:09:58.442735: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:09:58.442741: | emitting 16 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:09:58.442749: | parsing 4 raw bytes of IKEv2 Delete Payload into SPI Jan 13 23:09:58.442755: | SPI Jan 13 23:09:58.442760: | fe c0 76 dc ..v. Jan 13 23:09:58.442765: | delete IKEv2_SEC_PROTO_ESP SA(0xfec076dc) Jan 13 23:09:58.442770: | v2 CHILD SA #45 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA Jan 13 23:09:58.442777: | State DB: found IKEv2 state #45 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi) Jan 13 23:09:58.442782: | our side SPI that needs to be deleted: IKEv2_SEC_PROTO_ESP SA(0xfec076dc) Jan 13 23:09:58.442787: | should_send_delete: #45? NO, because Jan 13 23:09:58.442793: | deleting state (STATE_V2_ESTABLISHED_CHILD_SA) aged 186.259521s and NOT sending notification Jan 13 23:09:58.442799: | pstats #45 ikev2.child deleted completed Jan 13 23:09:58.442850: | #45 main thread spent 1.41 (1.4) milliseconds helper thread spent 0 (0) milliseconds in total Jan 13 23:09:58.442858: | kernel: get_sa_info esp.fec076dc@94.253.210.164 Jan 13 23:09:58.442864: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:09:58.442882: | kernel: get_sa_info esp.5f5d0309@161.53.235.3 Jan 13 23:09:58.442890: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:09:58.442908: "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: ESP traffic information: in=3MB out=119MB Jan 13 23:09:58.442918: | suspend: no MD saved in state #45 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:09:58.442922: | should_send_delete: #45? NO, because Jan 13 23:09:58.442928: | #45 deleting EVENT_v2_LIVENESS Jan 13 23:09:58.442935: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:09:58.442941: | delref state-event@0x55c8380134e8(1->0) (delete_state_tail() +1036 programs/pluto/state.c) Jan 13 23:09:58.442946: | #45 deleting EVENT_SA_EXPIRE Jan 13 23:09:58.442951: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:09:58.442956: | delref state-event@0x55c8380255f8(1->0) (delete_state_tail() +1039 programs/pluto/state.c) Jan 13 23:09:58.442961: | #45 STATE_V2_ESTABLISHED_CHILD_SA: retransmits: cleared Jan 13 23:09:58.442972: | kernel: deleting spi 161.53.235.3 -> esp.fec076dc@94.253.210.164 Jan 13 23:09:58.442978: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:09:58.442983: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:09:58.442995: | netlink response for Del SA esp.fec076dc@94.253.210.164 included non-error error Jan 13 23:09:58.443004: | kernel: deleting spi 94.253.210.164 -> esp.5f5d0309@161.53.235.3 Jan 13 23:09:58.443010: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:09:58.443014: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:09:58.443035: | netlink response for Del SA esp.5f5d0309@161.53.235.3 included non-error error Jan 13 23:09:58.443043: | skipping revival: not an IKE SA Jan 13 23:09:58.443049: | delref struct iface_endpoint@0x55c83801f058(5->4) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:09:58.443056: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45 deleted from hash table Jan 13 23:09:58.443061: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 deleted from hash table Jan 13 23:09:58.443068: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: reqid=0 deleted from hash table Jan 13 23:09:58.443075: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: 8d 77 44 17 30 6b 26 bc deleted from hash table Jan 13 23:09:58.443091: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #45: 8d 77 44 17 30 6b 26 bc 31 79 0d 45 82 26 37 8e deleted from hash table Jan 13 23:09:58.443098: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:09:58.443103: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #47 Jan 13 23:09:58.443108: | connection instance MYCONN-ikev2-cp in use by #47, skipping delete-unused Jan 13 23:09:58.443114: | child state #45: ESTABLISHED_CHILD_SA(established CHILD SA) => UNDEFINED(ignore) Jan 13 23:09:58.443119: | releasing #45's fd@(nil) because deleting state Jan 13 23:09:58.443126: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:09:58.443131: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:09:58.443136: | delref pkp@NULL (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:09:58.443147: | delref secret@NULL (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:09:58.443160: | delete_state_tail: delref st->st_dh_shared_secret-key@NULL Jan 13 23:09:58.443171: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:09:58.443182: | delete_state_tail: delref st->st_skey_d_nss-key@0x55c837ffbd90 Jan 13 23:09:58.443193: | delete_state_tail: delref st->st_skey_ai_nss-key@0x55c838005890 Jan 13 23:09:58.443204: | delete_state_tail: delref st->st_skey_ar_nss-key@0x55c838002520 Jan 13 23:09:58.443214: | delete_state_tail: delref st->st_skey_ei_nss-key@0x55c8380405b0 Jan 13 23:09:58.443225: | delete_state_tail: delref st->st_skey_er_nss-key@0x55c838029cd0 Jan 13 23:09:58.443236: | delete_state_tail: delref st->st_skey_pi_nss-key@0x55c838000ab0 Jan 13 23:09:58.443247: | delete_state_tail: delref st->st_skey_pr_nss-key@0x55c838013660 Jan 13 23:09:58.443258: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:09:58.443269: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:09:58.443279: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:09:58.443290: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:09:58.443301: | delref logger@0x55c838043798(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:09:58.443310: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:09:58.443318: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:09:58.443328: | ****emit IKEv2 Delete Payload: Jan 13 23:09:58.443339: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:09:58.443347: | flags: none (0x0) Jan 13 23:09:58.443352: | protocol ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:09:58.443357: | SPI size: 4 (04) Jan 13 23:09:58.443363: | number of SPIs: 1 (00 01) Jan 13 23:09:58.443369: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Delete Payload (42:ISAKMP_NEXT_v2D) Jan 13 23:09:58.443375: | next payload chain: saving location 'IKEv2 Delete Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:09:58.443381: | emitting 4 raw bytes of local SPIs into IKEv2 Delete Payload Jan 13 23:09:58.443389: | local SPIs: 5f 5d 03 09 Jan 13 23:09:58.443398: | emitting length of IKEv2 Delete Payload: 12 Jan 13 23:09:58.443403: | adding 4 bytes of padding (including 1 byte padding-length) Jan 13 23:09:58.443408: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.443415: | emitting 1 0x01 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.443420: | emitting 1 0x02 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.443425: | emitting 1 0x03 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:09:58.443431: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:09:58.443436: | emitting length of IKEv2 Encryption Payload: 52 Jan 13 23:09:58.443448: | emitting length of ISAKMP Message: 80 Jan 13 23:09:58.443474: | result: newref clone-key@0x55c838026d80 (32-bytes, SHA256_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:09:58.443488: | integ: delref clone-key@0x55c838026d80 Jan 13 23:09:58.443507: | #41 complete_v2_state_transition() ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:09:58.443517: | Message ID: updating counters for #41 Jan 13 23:09:58.443528: | Message ID: IKE #41 updating responder received message request 9: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=8 .recv=8->9 .recv_frags=0 .recv_wip=9->-1 .last_contact=9594866.43804->9594866.464594 ike.wip.initiator=-1 Jan 13 23:09:58.443538: | Message ID: IKE #41 updating responder sent message response 9: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=8->9 .recv=9 .recv_frags=0 .last_contact=9594866.464594 ike.wip.initiator=-1 Jan 13 23:09:58.443546: | Message ID: IKE #41 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594860.250281 ike.responder .sent=9 .recv=9 .recv_frags=0 .last_contact=9594866.464594 ike.wip.initiator=-1 Jan 13 23:09:58.443552: | #41 is retaining EVENT_SA_EXPIRE with is previously set timeout Jan 13 23:09:58.443560: | sending 84 bytes for STATE_V2_ESTABLISHED_IKE_SA through eth0 from 161.53.235.3:4500 to 94.253.210.164:4500 using UDP (for #41) Jan 13 23:09:58.443565: | 00 00 00 00 8d 77 44 17 30 6b 26 bc 31 79 0d 45 .....wD.0k&.1y.E Jan 13 23:09:58.443569: | 82 26 37 8e 2e 20 25 20 00 00 00 09 00 00 00 50 .&7.. % .......P Jan 13 23:09:58.443574: | 2a 00 00 34 41 f3 bb 4a 4e 0a 10 8f 2d 89 5b 6b *..4A..JN...-.[k Jan 13 23:09:58.443578: | 32 9f 58 29 4d 7c 44 f4 a7 7e e5 e1 6f 47 59 09 2.X)M|D..~..oGY. Jan 13 23:09:58.443582: | 81 58 84 7d 9a a4 3a 58 02 d3 e2 3b 56 26 f0 7b .X.}..:X...;V&.{ Jan 13 23:09:58.443587: | f5 56 e1 c0 .V.. Jan 13 23:09:58.443606: | sent 1 messages Jan 13 23:09:58.443614: | announcing the state transition Jan 13 23:09:58.443621: "MYCONN-ikev2-cp"[2] 94.253.210.164 #41: established IKE SA Jan 13 23:09:58.443633: | #41 spent 0.99 (0.997) milliseconds in processing: Informational Request in v2_dispatch() Jan 13 23:09:58.443646: | delref struct msg_digest@0x55c838050b08(2->1) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:09:58.443655: | #41 spent 1.46 (1.47) milliseconds in ikev2_process_packet() Jan 13 23:09:58.443660: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:58.443665: | delref logger@0x55c838017ee8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:58.443670: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:58.443675: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:58.443681: | delref struct iface_endpoint@0x55c83801f058(4->3) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:09:58.443688: | spent 1.5 (1.5) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:10:10.087382: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:10:10.087441: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:10:10.087464: | spent 0.0175 (0.0155) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:10:15.584003: | spent 0.00628 (0.00629) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:10:15.584084: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.584103: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.584115: | newref alloc logger@0x55c837ff8198(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.584133: | *received 658 bytes from 94.253.210.164:56414 on eth0 161.53.235.3:500 using UDP Jan 13 23:10:15.584174: | 20 75 86 d9 f2 5e 32 f6 00 00 00 00 00 00 00 00 u...^2......... Jan 13 23:10:15.584185: | 21 20 22 08 00 00 00 00 00 00 02 92 22 00 00 f4 ! "........."... Jan 13 23:10:15.584194: | 02 00 00 88 01 01 00 0f 03 00 00 0c 01 00 00 0c ................ Jan 13 23:10:15.584203: | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 ................ Jan 13 23:10:15.584212: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0d ................ Jan 13 23:10:15.584221: | 03 00 00 08 03 00 00 0c 03 00 00 08 03 00 00 02 ................ Jan 13 23:10:15.584230: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 06 ................ Jan 13 23:10:15.584239: | 03 00 00 08 02 00 00 05 03 00 00 08 02 00 00 02 ................ Jan 13 23:10:15.584247: | 03 00 00 08 04 00 00 18 03 00 00 08 04 00 00 14 ................ Jan 13 23:10:15.584256: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 0e ................ Jan 13 23:10:15.584266: | 00 00 00 08 04 00 00 05 00 00 00 68 02 01 00 0b ...........h.... Jan 13 23:10:15.584276: | 03 00 00 0c 01 00 00 14 80 0e 01 00 03 00 00 0c ................ Jan 13 23:10:15.584284: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 ................ Jan 13 23:10:15.584293: | 03 00 00 08 02 00 00 06 03 00 00 08 02 00 00 05 ................ Jan 13 23:10:15.584302: | 03 00 00 08 02 00 00 02 03 00 00 08 04 00 00 18 ................ Jan 13 23:10:15.584345: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 13 ................ Jan 13 23:10:15.584365: | 03 00 00 08 04 00 00 0e 00 00 00 08 04 00 00 05 ................ Jan 13 23:10:15.584375: | 28 00 01 08 00 18 00 00 15 fd 4b 90 89 e3 69 61 (.........K...ia Jan 13 23:10:15.584384: | a0 e7 35 e2 ee 4c 05 92 29 46 58 63 6f e1 14 c5 ..5..L..)FXco... Jan 13 23:10:15.584394: | 41 76 33 12 cd db c9 8d 96 a4 e2 0e 0d d9 94 ef Av3............. Jan 13 23:10:15.584402: | 20 27 fa c3 2f 3b f5 51 43 a8 c1 e4 3b 85 9b 81 '../;.QC...;... Jan 13 23:10:15.584411: | e5 7a a7 de 36 9e 66 8f cc ad 89 9b 46 f6 73 3b .z..6.f.....F.s; Jan 13 23:10:15.584420: | 1a d5 8b d6 1b aa 12 23 ce 71 0f 96 c4 a9 8d 88 .......#.q...... Jan 13 23:10:15.584429: | 6c f6 06 ce c4 b9 06 d5 bd 84 ed f6 18 fb 67 df l.............g. Jan 13 23:10:15.584438: | 05 65 50 af be 6d 46 e9 be 1b 81 fa 9e d0 a4 94 .eP..mF......... Jan 13 23:10:15.584447: | d2 ad 3e 72 57 ab 3e 9b 18 da 00 46 f8 0a eb ff ..>rW.>....F.... Jan 13 23:10:15.584456: | 6d ef 3b f6 bc 9d 9e b5 d8 5b 55 73 66 9a 4d 91 m.;......[Usf.M. Jan 13 23:10:15.584466: | 56 fc 99 0f 1f 3e dd cb 0e b0 9c d7 cb 2c 49 9d V....>.......,I. Jan 13 23:10:15.584487: | 47 03 c8 67 5c 0a 66 f2 ca b5 28 e3 56 6e 4b 37 G..g\.f...(.VnK7 Jan 13 23:10:15.584494: | 68 4e c7 c3 0b 4a fb ac 77 e5 06 72 fc fe da 75 hN...J..w..r...u Jan 13 23:10:15.584506: | 1d 14 69 37 59 2c ad 58 f9 ee 38 f2 79 ce 76 5a ..i7Y,.X..8.y.vZ Jan 13 23:10:15.584511: | e1 ab 8b 7e e1 f7 2c 78 3e 5c 97 3c 48 18 37 b3 ...~..,x>\.u$S@...... Jan 13 23:10:15.584532: | fe 1d ee d4 64 2b 35 cf 2c 58 dc 45 29 00 00 1c ....d+5.,X.E)... Jan 13 23:10:15.584552: | 00 00 40 04 3e 98 0f f1 72 b6 95 29 16 59 8c 31 ..@.>...r..).Y.1 Jan 13 23:10:15.584562: | ec 38 d1 42 bd 4e 72 b1 29 00 00 1c 00 00 40 05 .8.B.Nr.).....@. Jan 13 23:10:15.584571: | 97 e2 19 31 11 37 d6 0e 2c a3 18 85 8a 96 63 ef ...1.7..,.....c. Jan 13 23:10:15.584580: | f1 7a 39 b2 29 00 00 08 00 00 40 2e 29 00 00 0e .z9.).....@.)... Jan 13 23:10:15.584589: | 00 00 40 2f 00 02 00 03 00 04 00 00 00 08 00 00 ..@/............ Jan 13 23:10:15.584611: | 40 16 @. Jan 13 23:10:15.584629: | **parse ISAKMP Message: Jan 13 23:10:15.584638: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:15.584645: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:10:15.584653: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:10:15.584659: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:15.584682: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Jan 13 23:10:15.584695: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:10:15.584708: | Message ID: 0 (00 00 00 00) Jan 13 23:10:15.584722: | length: 658 (00 00 02 92) Jan 13 23:10:15.584733: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Jan 13 23:10:15.584748: | I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request Jan 13 23:10:15.584760: | State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi) Jan 13 23:10:15.584771: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:10:15.584784: | ***parse IKEv2 Security Association Payload: Jan 13 23:10:15.584794: | next payload type: ISAKMP_NEXT_v2KE (0x22) Jan 13 23:10:15.584804: | flags: none (0x0) Jan 13 23:10:15.584814: | length: 244 (00 f4) Jan 13 23:10:15.584826: | processing payload: ISAKMP_NEXT_v2SA (len=240) Jan 13 23:10:15.584836: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Jan 13 23:10:15.584846: | ***parse IKEv2 Key Exchange Payload: Jan 13 23:10:15.584855: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 23:10:15.584864: | flags: none (0x0) Jan 13 23:10:15.584873: | length: 264 (01 08) Jan 13 23:10:15.584886: | DH group: OAKLEY_GROUP_DH24 (0x18) Jan 13 23:10:15.584895: | processing payload: ISAKMP_NEXT_v2KE (len=256) Jan 13 23:10:15.584904: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 23:10:15.584913: | ***parse IKEv2 Nonce Payload: Jan 13 23:10:15.584923: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.584932: | flags: none (0x0) Jan 13 23:10:15.584942: | length: 36 (00 24) Jan 13 23:10:15.584951: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Jan 13 23:10:15.584960: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.584969: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.584978: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.584987: | flags: none (0x0) Jan 13 23:10:15.584997: | length: 28 (00 1c) Jan 13 23:10:15.585006: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.585016: | SPI size: 0 (00) Jan 13 23:10:15.585026: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Jan 13 23:10:15.585035: | processing payload: ISAKMP_NEXT_v2N (len=20) Jan 13 23:10:15.585045: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.585054: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.585063: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.585072: | flags: none (0x0) Jan 13 23:10:15.585082: | length: 28 (00 1c) Jan 13 23:10:15.585091: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.585100: | SPI size: 0 (00) Jan 13 23:10:15.585109: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Jan 13 23:10:15.585118: | processing payload: ISAKMP_NEXT_v2N (len=20) Jan 13 23:10:15.585126: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.585135: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.585144: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.585153: | flags: none (0x0) Jan 13 23:10:15.585173: | length: 8 (00 08) Jan 13 23:10:15.585178: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.585183: | SPI size: 0 (00) Jan 13 23:10:15.585187: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Jan 13 23:10:15.585192: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:15.585196: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.585200: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.585205: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.585209: | flags: none (0x0) Jan 13 23:10:15.585221: | length: 14 (00 0e) Jan 13 23:10:15.585226: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.585230: | SPI size: 0 (00) Jan 13 23:10:15.585235: | Notify Message Type: v2N_SIGNATURE_HASH_ALGORITHMS (0x402f) Jan 13 23:10:15.585240: | processing payload: ISAKMP_NEXT_v2N (len=6) Jan 13 23:10:15.585244: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.585248: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.585253: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.585258: | flags: none (0x0) Jan 13 23:10:15.585263: | length: 8 (00 08) Jan 13 23:10:15.585267: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.585272: | SPI size: 0 (00) Jan 13 23:10:15.585276: | Notify Message Type: v2N_REDIRECT_SUPPORTED (0x4016) Jan 13 23:10:15.585280: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:15.585285: | DDOS disabled and no cookie sent, continuing Jan 13 23:10:15.585293: | looking for transition from PARENT_R0 matching IKE_SA_INIT request: SA,KE,Ni,N,N,N,N,N Jan 13 23:10:15.585299: | trying: Respond to IKE_SA_INIT Jan 13 23:10:15.585304: | unsecured message matched Jan 13 23:10:15.585313: | ikev2_find_host_connection() 94.253.210.164->161.53.235.3 policy=ECDSA Jan 13 23:10:15.585321: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (ikev2_find_host_connection() +115 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.585330: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:15.585338: | skipping "MYCONN-ikev2-cp"[2] 94.253.210.164, missing policy Jan 13 23:10:15.585344: | skipping "L2TP-PSK-NAT"[1] 94.253.210.164, not IKEv2 Jan 13 23:10:15.585350: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (ikev2_find_host_connection() +170 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.585357: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 23:10:15.585363: | skipping "MYCONN-ikev2-cp", missing policy Jan 13 23:10:15.585368: | skipping "L2TP-PSK-NAT", not IKEv2 Jan 13 23:10:15.585372: | skipping "L2TP-PSK-noNAT", not IKEv2 Jan 13 23:10:15.585377: | skipping "L2TP-PSK-common", not IKEv2 Jan 13 23:10:15.585383: | ISAKMP_v2_IKE_SA_INIT message received on 161.53.235.3:500 but no connection has been authorized with policy ECDSA Jan 13 23:10:15.585390: | ikev2_find_host_connection() 94.253.210.164->161.53.235.3 policy=RSASIG Jan 13 23:10:15.585397: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (ikev2_find_host_connection() +115 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.585405: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:15.585413: | found connection: "MYCONN-ikev2-cp"[2] 94.253.210.164 with policy RSASIG Jan 13 23:10:15.585419: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (find_v2_host_pair_connection() +343 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.585426: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 23:10:15.585464: | newref alloc logger@0x55c838019ae8(0->1) (new_v2_ike_state() +505 programs/pluto/state.c) Jan 13 23:10:15.585473: | addref fd@NULL (new_v2_ike_state() +505 programs/pluto/state.c) Jan 13 23:10:15.585482: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48 initialized Jan 13 23:10:15.585488: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 initialized Jan 13 23:10:15.585495: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: reqid=0 initialized Jan 13 23:10:15.585504: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: 00 00 00 00 00 00 00 00 initialized Jan 13 23:10:15.585514: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:10:15.585520: | creating state object #48 at 0x55c8380206c8 Jan 13 23:10:15.585532: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48 added to hash table bucket 0x55c8365886c0 Jan 13 23:10:15.585539: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:10:15.585545: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:10:15.585554: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: 20 75 86 d9 f2 5e 32 f6 added to hash table bucket 0x55c83657e760 Jan 13 23:10:15.585570: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: 20 75 86 d9 f2 5e 32 f6 e6 4a 9f 7a c7 32 4d 6b added to hash table bucket 0x55c83657a860 Jan 13 23:10:15.585577: | pstats #48 ikev2.ike started Jan 13 23:10:15.585583: | parent state #48: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA) Jan 13 23:10:15.585589: | #48.st_v2_transition NULL -> PARENT_R0->PARENT_R1 (new_v2_ike_state() +510 programs/pluto/state.c) Jan 13 23:10:15.585603: | Message ID: IKE #48 initializing (IKE SA): ike.initiator .sent=0->-1 .recv=0->-1 .recv_frags=0 .recv_wip=0->-1 .last_contact=0->9594883.606667 ike.responder .sent=0->-1 .recv=0->-1 .recv_frags=0 .recv_wip=0->-1 .last_contact=0->9594883.606667 ike.wip.initiator=0->-1 Jan 13 23:10:15.585626: | delref struct iface_endpoint@0x55c83801ef68(10->9) (initialize_new_state() +224 programs/pluto/ipsec_doi.c) Jan 13 23:10:15.585644: | orienting "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:15.585661: | left(THIS) host-address=161.53.235.3 host-port=500 ikeport=0 encap=no Jan 13 23:10:15.585673: | right(THAT) host-address=94.253.210.164 host-port=500 ikeport=0 encap=no Jan 13 23:10:15.585689: | interface endpoint [::1]:500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.585705: | interface endpoint 127.0.0.1:4500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.585717: | interface endpoint 127.0.0.1:500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.585730: | interface endpoint 161.53.235.3:4500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.585742: | interface endpoint 161.53.235.3:500 matches left(THIS); orienting Jan 13 23:10:15.585756: | interface endpoint 192.168.100.1:4500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.585768: | interface endpoint 192.168.100.1:500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.585781: | addref struct iface_endpoint@0x55c83801ef68(9->10) (orient() +299 programs/pluto/orient.c) Jan 13 23:10:15.585792: | addref struct iface_endpoint@0x55c83801ef68(10->11) (initialize_new_state() +227 programs/pluto/ipsec_doi.c) Jan 13 23:10:15.585806: | in initialize_new_state with remote endpoint set to 94.253.210.164:500 Jan 13 23:10:15.585822: | event_schedule_where: newref EVENT_SA_DISCARD-pe@0x55c838048c78 timeout in 200 seconds for #48 Jan 13 23:10:15.585836: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.585857: | #48 spent 1.87 (1.87) milliseconds Jan 13 23:10:15.585872: | #48.st_v2_transition PARENT_R0->PARENT_R1 -> PARENT_R0->PARENT_R1 (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:10:15.585889: | Message ID: IKE #48 responder starting message request 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.606667 ike.responder .sent=-1 .recv=-1 .recv_frags=0 .recv_wip=0 .last_contact=9594883.606667 ike.wip.initiator=-1 Jan 13 23:10:15.585901: | calling processor Respond to IKE_SA_INIT Jan 13 23:10:15.585913: | #48 spent 1.93 (1.93) milliseconds Jan 13 23:10:15.585931: | #48 updating local interface from 161.53.235.3:500 to 161.53.235.3:500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:10:15.585944: | delref struct iface_endpoint@0x55c83801ef68(11->10) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:10:15.585987: | addref struct iface_endpoint@0x55c83801ef68(10->11) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:10:15.585999: | comparing remote proposals against IKE responder 4 local proposals Jan 13 23:10:15.586015: | local proposal 1 type ENCR has 1 transforms Jan 13 23:10:15.586028: | local proposal 1 type PRF has 2 transforms Jan 13 23:10:15.586038: | local proposal 1 type INTEG has 1 transforms Jan 13 23:10:15.586048: | local proposal 1 type DH has 8 transforms Jan 13 23:10:15.586060: | local proposal 1 type ESN has 0 transforms Jan 13 23:10:15.586071: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Jan 13 23:10:15.586082: | local proposal 2 type ENCR has 1 transforms Jan 13 23:10:15.586092: | local proposal 2 type PRF has 2 transforms Jan 13 23:10:15.586101: | local proposal 2 type INTEG has 1 transforms Jan 13 23:10:15.586111: | local proposal 2 type DH has 8 transforms Jan 13 23:10:15.586120: | local proposal 2 type ESN has 0 transforms Jan 13 23:10:15.586130: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Jan 13 23:10:15.586139: | local proposal 3 type ENCR has 1 transforms Jan 13 23:10:15.586148: | local proposal 3 type PRF has 2 transforms Jan 13 23:10:15.586157: | local proposal 3 type INTEG has 2 transforms Jan 13 23:10:15.586166: | local proposal 3 type DH has 8 transforms Jan 13 23:10:15.586179: | local proposal 3 type ESN has 0 transforms Jan 13 23:10:15.586190: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Jan 13 23:10:15.586199: | local proposal 4 type ENCR has 1 transforms Jan 13 23:10:15.586208: | local proposal 4 type PRF has 2 transforms Jan 13 23:10:15.586216: | local proposal 4 type INTEG has 2 transforms Jan 13 23:10:15.586225: | local proposal 4 type DH has 8 transforms Jan 13 23:10:15.586234: | local proposal 4 type ESN has 0 transforms Jan 13 23:10:15.586244: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Jan 13 23:10:15.586254: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 23:10:15.586264: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:10:15.586275: | length: 136 (00 88) Jan 13 23:10:15.586284: | prop #: 1 (01) Jan 13 23:10:15.586294: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 23:10:15.586304: | spi size: 0 (00) Jan 13 23:10:15.586314: | # transforms: 15 (0f) Jan 13 23:10:15.586325: | Comparing remote proposal 1 containing 15 transforms against local proposal [1..4] of 4 local proposals Jan 13 23:10:15.586335: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586345: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586355: | length: 12 (00 0c) Jan 13 23:10:15.586364: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.586373: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:10:15.586383: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.586393: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.586403: | length/value: 256 (01 00) Jan 13 23:10:15.586425: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 3 type 1 (ENCR) transform 0 Jan 13 23:10:15.586430: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586434: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586439: | length: 12 (00 0c) Jan 13 23:10:15.586444: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.586448: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:10:15.586453: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.586457: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.586462: | length/value: 128 (00 80) Jan 13 23:10:15.586468: | remote proposal 1 transform 1 (ENCR=AES_CBC_128) matches local proposal 4 type 1 (ENCR) transform 0 Jan 13 23:10:15.586473: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586477: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586482: | length: 8 (00 08) Jan 13 23:10:15.586487: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.586500: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Jan 13 23:10:15.586506: | remote proposal 1 transform 2 (INTEG=HMAC_SHA2_512_256) matches local proposal 3 type 3 (INTEG) transform 0 Jan 13 23:10:15.586512: | remote proposal 1 transform 2 (INTEG=HMAC_SHA2_512_256) matches local proposal 4 type 3 (INTEG) transform 0 Jan 13 23:10:15.586516: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586521: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586526: | length: 8 (00 08) Jan 13 23:10:15.586530: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.586535: | IKEv2 transform ID: AUTH_HMAC_SHA2_384_192 (0xd) Jan 13 23:10:15.586540: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586544: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586549: | length: 8 (00 08) Jan 13 23:10:15.586554: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.586558: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Jan 13 23:10:15.586563: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586568: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586573: | length: 8 (00 08) Jan 13 23:10:15.586577: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.586581: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:10:15.586586: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586593: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586598: | length: 8 (00 08) Jan 13 23:10:15.586603: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.586607: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Jan 13 23:10:15.586613: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Jan 13 23:10:15.586619: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Jan 13 23:10:15.586625: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 3 type 2 (PRF) transform 0 Jan 13 23:10:15.586630: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 4 type 2 (PRF) transform 0 Jan 13 23:10:15.586636: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586641: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586646: | length: 8 (00 08) Jan 13 23:10:15.586652: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.586656: | IKEv2 transform ID: PRF_HMAC_SHA2_384 (0x6) Jan 13 23:10:15.586661: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586666: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586671: | length: 8 (00 08) Jan 13 23:10:15.586676: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.586681: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Jan 13 23:10:15.586686: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586690: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586695: | length: 8 (00 08) Jan 13 23:10:15.586699: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.586704: | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) Jan 13 23:10:15.586708: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586715: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586720: | length: 8 (00 08) Jan 13 23:10:15.586724: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.586729: | IKEv2 transform ID: OAKLEY_GROUP_DH24 (0x18) Jan 13 23:10:15.586734: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586740: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586745: | length: 8 (00 08) Jan 13 23:10:15.586749: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.586753: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Jan 13 23:10:15.586759: | remote proposal 1 transform 11 (DH=ECP_384) matches local proposal 1 type 4 (DH) transform 5 Jan 13 23:10:15.586765: | remote proposal 1 transform 11 (DH=ECP_384) matches local proposal 2 type 4 (DH) transform 5 Jan 13 23:10:15.586783: | remote proposal 1 transform 11 (DH=ECP_384) matches local proposal 3 type 4 (DH) transform 5 Jan 13 23:10:15.586789: | remote proposal 1 transform 11 (DH=ECP_384) matches local proposal 4 type 4 (DH) transform 5 Jan 13 23:10:15.586795: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586800: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586805: | length: 8 (00 08) Jan 13 23:10:15.586811: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.586816: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Jan 13 23:10:15.586821: | remote proposal 1 transform 12 (DH=ECP_256) matches local proposal 1 type 4 (DH) transform 4 Jan 13 23:10:15.586828: | remote proposal 1 transform 12 (DH=ECP_256) matches local proposal 2 type 4 (DH) transform 4 Jan 13 23:10:15.586833: | remote proposal 1 transform 12 (DH=ECP_256) matches local proposal 3 type 4 (DH) transform 4 Jan 13 23:10:15.586838: | remote proposal 1 transform 12 (DH=ECP_256) matches local proposal 4 type 4 (DH) transform 4 Jan 13 23:10:15.586844: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586848: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.586853: | length: 8 (00 08) Jan 13 23:10:15.586859: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.586864: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.586869: | remote proposal 1 transform 13 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 23:10:15.586876: | remote proposal 1 transform 13 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 23:10:15.586881: | remote proposal 1 transform 13 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Jan 13 23:10:15.586888: | remote proposal 1 transform 13 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Jan 13 23:10:15.586892: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.586897: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:15.586902: | length: 8 (00 08) Jan 13 23:10:15.586908: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.586912: | IKEv2 transform ID: OAKLEY_GROUP_MODP1536 (0x5) Jan 13 23:10:15.586919: | remote proposal 1 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+PRF+INTEG+DH; unmatched: none Jan 13 23:10:15.586926: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: PRF+DH Jan 13 23:10:15.586932: | remote proposal 1 does not match local proposal 1; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 23:10:15.586939: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 2; required: ENCR+PRF+DH; optional: INTEG; matched: PRF+DH Jan 13 23:10:15.586944: | remote proposal 1 does not match local proposal 2; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 23:10:15.586952: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 3; required: ENCR+PRF+INTEG+DH; optional: none; matched: ENCR+PRF+INTEG+DH Jan 13 23:10:15.586957: | remote proposal 1 matches local proposal 3 Jan 13 23:10:15.586962: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 23:10:15.586969: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:10:15.586974: | length: 104 (00 68) Jan 13 23:10:15.586979: | prop #: 2 (02) Jan 13 23:10:15.586985: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 23:10:15.586990: | spi size: 0 (00) Jan 13 23:10:15.586995: | # transforms: 11 (0b) Jan 13 23:10:15.587002: | Comparing remote proposal 2 containing 11 transforms against local proposal [1..2] of 4 local proposals Jan 13 23:10:15.587007: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587011: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587016: | length: 12 (00 0c) Jan 13 23:10:15.587022: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.587027: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:15.587037: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.587043: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.587048: | length/value: 256 (01 00) Jan 13 23:10:15.587055: | remote proposal 2 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:10:15.587060: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587065: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587070: | length: 12 (00 0c) Jan 13 23:10:15.587076: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.587081: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:15.587085: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.587090: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.587095: | length/value: 128 (00 80) Jan 13 23:10:15.587100: | remote proposal 2 transform 1 (ENCR=AES_GCM_C_128) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:10:15.587106: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587111: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587130: | length: 8 (00 08) Jan 13 23:10:15.587143: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.587152: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Jan 13 23:10:15.587162: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Jan 13 23:10:15.587174: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Jan 13 23:10:15.587183: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587191: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587200: | length: 8 (00 08) Jan 13 23:10:15.587211: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.587219: | IKEv2 transform ID: PRF_HMAC_SHA2_384 (0x6) Jan 13 23:10:15.587228: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587236: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587245: | length: 8 (00 08) Jan 13 23:10:15.587253: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.587262: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Jan 13 23:10:15.587270: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587281: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587291: | length: 8 (00 08) Jan 13 23:10:15.587302: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.587310: | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) Jan 13 23:10:15.587319: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587327: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587336: | length: 8 (00 08) Jan 13 23:10:15.587344: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.587352: | IKEv2 transform ID: OAKLEY_GROUP_DH24 (0x18) Jan 13 23:10:15.587362: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587370: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587379: | length: 8 (00 08) Jan 13 23:10:15.587387: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.587395: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Jan 13 23:10:15.587405: | remote proposal 2 transform 7 (DH=ECP_384) matches local proposal 1 type 4 (DH) transform 5 Jan 13 23:10:15.587415: | remote proposal 2 transform 7 (DH=ECP_384) matches local proposal 2 type 4 (DH) transform 5 Jan 13 23:10:15.587423: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587431: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587440: | length: 8 (00 08) Jan 13 23:10:15.587449: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.587469: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Jan 13 23:10:15.587475: | remote proposal 2 transform 8 (DH=ECP_256) matches local proposal 1 type 4 (DH) transform 4 Jan 13 23:10:15.587481: | remote proposal 2 transform 8 (DH=ECP_256) matches local proposal 2 type 4 (DH) transform 4 Jan 13 23:10:15.587493: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587498: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.587503: | length: 8 (00 08) Jan 13 23:10:15.587508: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.587512: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.587518: | remote proposal 2 transform 9 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 23:10:15.587523: | remote proposal 2 transform 9 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 23:10:15.587528: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.587532: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:15.587537: | length: 8 (00 08) Jan 13 23:10:15.587542: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.587546: | IKEv2 transform ID: OAKLEY_GROUP_MODP1536 (0x5) Jan 13 23:10:15.587552: | remote proposal 2 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Jan 13 23:10:15.587558: | comparing remote proposal 2 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Jan 13 23:10:15.587562: | remote proposal 2 matches local proposal 1 Jan 13 23:10:15.587572: "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: proposal 2:IKE=AES_GCM_C_256-HMAC_SHA2_512-MODP2048 chosen from remote proposals 1:IKE:ENCR=AES_CBC_256;ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_384_192;INTEG=HMAC_SHA2_256_128;INTEG=HMAC_SHA1_96;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_384;PRF=HMAC_SHA2_256;PRF=HMAC_SHA1;DH=DH24;DH=ECP_384;DH=ECP_256;DH=MODP2048;DH=MODP1536[first-match] 2:IKE:ENCR=AES_GCM_C_256;ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_384;PRF=HMAC_SHA2_256;PRF=HMAC_SHA1;DH=DH24;DH=ECP_384;DH=ECP_256;DH=MODP2048;DH=MODP1536[better-match] Jan 13 23:10:15.587581: | accepted IKE proposal ikev2_proposal: 2:IKE=AES_GCM_C_256-HMAC_SHA2_512-MODP2048 Jan 13 23:10:15.587586: | converting proposal to internal trans attrs Jan 13 23:10:15.587596: "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: initiator guessed wrong keying material group (DH24); responding with INVALID_KE_PAYLOAD requesting MODP2048 Jan 13 23:10:15.587602: | opening output PBS v2N response Jan 13 23:10:15.587608: | **emit ISAKMP Message: Jan 13 23:10:15.587615: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:15.587621: | responder SPI: e6 4a 9f 7a c7 32 4d 6b Jan 13 23:10:15.587627: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:15.587631: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:15.587636: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Jan 13 23:10:15.587641: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:15.587646: | Message ID: 0 (00 00 00 00) Jan 13 23:10:15.587653: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:15.587662: "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: responding to IKE_SA_INIT message (ID 0) from 94.253.210.164:56414 with unencrypted notification INVALID_KE_PAYLOAD Jan 13 23:10:15.587668: | adding a v2N Payload Jan 13 23:10:15.587674: | ***emit IKEv2 Notify Payload: Jan 13 23:10:15.587678: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.587683: | flags: none (0x0) Jan 13 23:10:15.587687: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.587692: | SPI size: 0 (00) Jan 13 23:10:15.587698: | Notify Message Type: v2N_INVALID_KE_PAYLOAD (0x11) Jan 13 23:10:15.587703: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 23:10:15.587709: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'v2N response' Jan 13 23:10:15.587715: | emitting 2 raw bytes of Notify data into IKEv2 Notify Payload Jan 13 23:10:15.587721: | Notify data: 00 0e Jan 13 23:10:15.587726: | emitting length of IKEv2 Notify Payload: 10 Jan 13 23:10:15.587730: | emitting length of ISAKMP Message: 38 Jan 13 23:10:15.587744: | #48 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_FAIL Jan 13 23:10:15.587755: "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: state transition 'Respond to IKE_SA_INIT' failed Jan 13 23:10:15.587761: | Message ID: responding with recorded error Jan 13 23:10:15.587771: | Message ID: IKE #48 updating responder received message request 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.606667 ike.responder .sent=-1 .recv=-1->0 .recv_frags=0 .recv_wip=0->-1 .last_contact=9594883.606667->9594883.608837 ike.wip.initiator=-1 Jan 13 23:10:15.587781: | Message ID: IKE #48 updating responder sent message response 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.606667 ike.responder .sent=-1->0 .recv=0 .recv_frags=0 .last_contact=9594883.608837 ike.wip.initiator=-1 Jan 13 23:10:15.587791: | sending 38 bytes for STF_FAIL through eth0 from 161.53.235.3:500 to 94.253.210.164:56414 using UDP (for #48) Jan 13 23:10:15.587797: | 20 75 86 d9 f2 5e 32 f6 e6 4a 9f 7a c7 32 4d 6b u...^2..J.z.2Mk Jan 13 23:10:15.587802: | 29 20 22 20 00 00 00 00 00 00 00 26 00 00 00 0a ) " .......&.... Jan 13 23:10:15.587807: | 00 00 00 11 00 0e ...... Jan 13 23:10:15.587833: | sent 1 messages Jan 13 23:10:15.587842: | release_pending_whacks: state #48 has no whack fd Jan 13 23:10:15.587848: | should_send_delete: #48? no, IKEv2 SA in state STATE_V2_PARENT_R0 is not established Jan 13 23:10:15.587856: "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: deleting state (STATE_V2_PARENT_R0) aged 0.002332s and NOT sending notification Jan 13 23:10:15.587862: | pstats #48 ikev2.ike deleted other Jan 13 23:10:15.587869: | #48 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Jan 13 23:10:15.587876: | suspend: no MD saved in state #48 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:10:15.587881: | should_send_delete: #48? no, IKEv2 SA in state STATE_V2_PARENT_R0 is not established Jan 13 23:10:15.587886: | #48 deleting EVENT_SA_DISCARD Jan 13 23:10:15.587893: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:15.587900: | delref state-event@0x55c838048c78(1->0) (delete_state_tail() +1032 programs/pluto/state.c) Jan 13 23:10:15.587906: | #48 STATE_V2_PARENT_R0: retransmits: cleared Jan 13 23:10:15.587929: | State DB: IKEv2 state not found (flush_incomplete_children) Jan 13 23:10:15.587943: | skipping revival: POLICY_UP disabled Jan 13 23:10:15.587953: | delref struct iface_endpoint@0x55c83801ef68(11->10) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:10:15.587969: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48 deleted from hash table Jan 13 23:10:15.587981: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 deleted from hash table Jan 13 23:10:15.587993: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: reqid=0 deleted from hash table Jan 13 23:10:15.588009: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: 20 75 86 d9 f2 5e 32 f6 deleted from hash table Jan 13 23:10:15.588027: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #48: 20 75 86 d9 f2 5e 32 f6 e6 4a 9f 7a c7 32 4d 6b deleted from hash table Jan 13 23:10:15.588040: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:10:15.588051: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #47 Jan 13 23:10:15.588062: | connection instance MYCONN-ikev2-cp in use by #47, skipping delete-unused Jan 13 23:10:15.588072: | parent state #48: PARENT_R0(half-open IKE SA) => UNDEFINED(ignore) Jan 13 23:10:15.588083: | releasing #48's fd@(nil) because deleting state Jan 13 23:10:15.588092: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:10:15.588100: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:10:15.588124: | delref pkp@NULL (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:10:15.588136: | delref secret@NULL (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:10:15.588146: | delete_state_tail: delref st->st_dh_shared_secret-key@NULL Jan 13 23:10:15.588154: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:10:15.588162: | delete_state_tail: delref st->st_skey_d_nss-key@NULL Jan 13 23:10:15.588170: | delete_state_tail: delref st->st_skey_ai_nss-key@NULL Jan 13 23:10:15.588178: | delete_state_tail: delref st->st_skey_ar_nss-key@NULL Jan 13 23:10:15.588187: | delete_state_tail: delref st->st_skey_ei_nss-key@NULL Jan 13 23:10:15.588195: | delete_state_tail: delref st->st_skey_er_nss-key@NULL Jan 13 23:10:15.588202: | delete_state_tail: delref st->st_skey_pi_nss-key@NULL Jan 13 23:10:15.588210: | delete_state_tail: delref st->st_skey_pr_nss-key@NULL Jan 13 23:10:15.588218: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:10:15.588226: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:10:15.588234: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:10:15.588242: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:10:15.588252: | delref logger@0x55c838019ae8(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:15.588260: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:15.588268: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:15.588278: | in statetime_stop() and could not find #48 Jan 13 23:10:15.588287: | in statetime_stop() and could not find #48 Jan 13 23:10:15.588296: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.588319: | delref logger@0x55c837ff8198(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.588332: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.588341: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.588351: | delref struct iface_endpoint@0x55c83801ef68(10->9) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.588366: | spent 4.37 (4.38) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:10:15.653598: | spent 0.00495 (0.00494) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:10:15.653660: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.653677: | addref struct iface_endpoint@0x55c83801ef68(9->10) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.653689: | newref alloc logger@0x55c837ff8198(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.653706: | *received 658 bytes from 94.253.210.164:56414 on eth0 161.53.235.3:500 using UDP Jan 13 23:10:15.653717: | 20 75 86 d9 f2 5e 32 f6 00 00 00 00 00 00 00 00 u...^2......... Jan 13 23:10:15.653726: | 21 20 22 08 00 00 00 00 00 00 02 92 22 00 00 f4 ! "........."... Jan 13 23:10:15.653736: | 02 00 00 88 01 01 00 0f 03 00 00 0c 01 00 00 0c ................ Jan 13 23:10:15.653745: | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 ................ Jan 13 23:10:15.653754: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0d ................ Jan 13 23:10:15.653764: | 03 00 00 08 03 00 00 0c 03 00 00 08 03 00 00 02 ................ Jan 13 23:10:15.653773: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 06 ................ Jan 13 23:10:15.653790: | 03 00 00 08 02 00 00 05 03 00 00 08 02 00 00 02 ................ Jan 13 23:10:15.653800: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 18 ................ Jan 13 23:10:15.653809: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 13 ................ Jan 13 23:10:15.653821: | 00 00 00 08 04 00 00 05 00 00 00 68 02 01 00 0b ...........h.... Jan 13 23:10:15.653831: | 03 00 00 0c 01 00 00 14 80 0e 01 00 03 00 00 0c ................ Jan 13 23:10:15.653860: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 ................ Jan 13 23:10:15.653870: | 03 00 00 08 02 00 00 06 03 00 00 08 02 00 00 05 ................ Jan 13 23:10:15.653894: | 03 00 00 08 02 00 00 02 03 00 00 08 04 00 00 0e ................ Jan 13 23:10:15.653902: | 03 00 00 08 04 00 00 18 03 00 00 08 04 00 00 14 ................ Jan 13 23:10:15.653909: | 03 00 00 08 04 00 00 13 00 00 00 08 04 00 00 05 ................ Jan 13 23:10:15.653916: | 28 00 01 08 00 0e 00 00 b3 d8 7f bd d9 9f 39 d3 (.............9. Jan 13 23:10:15.653924: | 46 a6 49 2a 6b 31 1d 43 9a 93 52 d0 46 07 4d e4 F.I*k1.C..R.F.M. Jan 13 23:10:15.653932: | ae 75 d7 8f 11 d2 9a 50 b9 33 24 ac 4f fe 1a fe .u.....P.3$.O... Jan 13 23:10:15.653940: | 68 91 db 4d f5 e6 62 4a 86 15 1f c1 a5 ee 6c 49 h..M..bJ......lI Jan 13 23:10:15.653948: | 64 bc 7a 5f 65 7a e2 d8 dd c9 a4 7f 4a 92 93 71 d.z_ez......J..q Jan 13 23:10:15.653956: | 9a ee db 2d d0 14 68 e8 4a 16 af 3a df 56 06 2e ...-..h.J..:.V.. Jan 13 23:10:15.653963: | 2c 0c 76 86 8b 9e 89 9b 6e 6a 3c 17 58 41 d9 04 ,.v.....nj<.XA.. Jan 13 23:10:15.653971: | 2f 7d 43 2b dc a9 bd bd 51 98 53 93 d8 04 c3 ed /}C+....Q.S..... Jan 13 23:10:15.653978: | 2e 95 c8 1b 1b e2 fa 0f f2 90 a2 6d 0a d6 6c 32 ...........m..l2 Jan 13 23:10:15.653986: | 58 64 c6 29 cb e3 4b ae e4 f6 3a 60 03 35 2d 7f Xd.)..K...:`.5-. Jan 13 23:10:15.653993: | 96 e7 b4 e5 08 49 53 cf c7 25 85 29 ca b5 66 b7 .....IS..%.)..f. Jan 13 23:10:15.654000: | 6d 6c 79 85 33 0f c0 79 fa c2 a3 2f 57 9a 5e cc mly.3..y.../W.^. Jan 13 23:10:15.654008: | 39 4d 44 69 c5 de 95 79 56 0e 6f 44 7d d2 e5 89 9MDi...yV.oD}... Jan 13 23:10:15.654015: | aa fc 7e ee 2f 28 6b 7b 0e 11 bc 9d e4 df 6d 7a ..~./(k{......mz Jan 13 23:10:15.654023: | a4 d3 22 3f 29 e4 ff 76 bb 32 08 a4 e0 3c c6 26 .."?)..v.2...<.& Jan 13 23:10:15.654030: | 46 d6 55 75 65 4b 82 44 83 1d eb 25 bd 28 ed 20 F.UueK.D...%.(. Jan 13 23:10:15.654037: | f2 73 94 eb 72 77 d3 c3 29 00 00 24 fb b1 76 1c .s..rw..)..$..v. Jan 13 23:10:15.654045: | 8e c7 3b 4f e7 3e 75 24 53 40 dd 80 1e f3 ed db ..;O.>u$S@...... Jan 13 23:10:15.654052: | fe 1d ee d4 64 2b 35 cf 2c 58 dc 45 29 00 00 1c ....d+5.,X.E)... Jan 13 23:10:15.654060: | 00 00 40 04 3e 98 0f f1 72 b6 95 29 16 59 8c 31 ..@.>...r..).Y.1 Jan 13 23:10:15.654067: | ec 38 d1 42 bd 4e 72 b1 29 00 00 1c 00 00 40 05 .8.B.Nr.).....@. Jan 13 23:10:15.654075: | 97 e2 19 31 11 37 d6 0e 2c a3 18 85 8a 96 63 ef ...1.7..,.....c. Jan 13 23:10:15.654082: | f1 7a 39 b2 29 00 00 08 00 00 40 2e 29 00 00 0e .z9.).....@.)... Jan 13 23:10:15.654090: | 00 00 40 2f 00 02 00 03 00 04 00 00 00 08 00 00 ..@/............ Jan 13 23:10:15.654097: | 40 16 @. Jan 13 23:10:15.654108: | **parse ISAKMP Message: Jan 13 23:10:15.654121: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:15.654132: | responder SPI: 00 00 00 00 00 00 00 00 Jan 13 23:10:15.654142: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:10:15.654150: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:15.654158: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Jan 13 23:10:15.654167: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:10:15.654180: | Message ID: 0 (00 00 00 00) Jan 13 23:10:15.654189: | length: 658 (00 00 02 92) Jan 13 23:10:15.654201: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Jan 13 23:10:15.654210: | I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request Jan 13 23:10:15.654222: | State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi) Jan 13 23:10:15.654231: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:10:15.654240: | ***parse IKEv2 Security Association Payload: Jan 13 23:10:15.654250: | next payload type: ISAKMP_NEXT_v2KE (0x22) Jan 13 23:10:15.654270: | flags: none (0x0) Jan 13 23:10:15.654280: | length: 244 (00 f4) Jan 13 23:10:15.654288: | processing payload: ISAKMP_NEXT_v2SA (len=240) Jan 13 23:10:15.654298: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Jan 13 23:10:15.654307: | ***parse IKEv2 Key Exchange Payload: Jan 13 23:10:15.654315: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Jan 13 23:10:15.654322: | flags: none (0x0) Jan 13 23:10:15.654331: | length: 264 (01 08) Jan 13 23:10:15.654341: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.654350: | processing payload: ISAKMP_NEXT_v2KE (len=256) Jan 13 23:10:15.654357: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Jan 13 23:10:15.654365: | ***parse IKEv2 Nonce Payload: Jan 13 23:10:15.654373: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.654381: | flags: none (0x0) Jan 13 23:10:15.654390: | length: 36 (00 24) Jan 13 23:10:15.654397: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Jan 13 23:10:15.654405: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.654413: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.654420: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.654428: | flags: none (0x0) Jan 13 23:10:15.654436: | length: 28 (00 1c) Jan 13 23:10:15.654447: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.654455: | SPI size: 0 (00) Jan 13 23:10:15.654463: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Jan 13 23:10:15.654471: | processing payload: ISAKMP_NEXT_v2N (len=20) Jan 13 23:10:15.654479: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.654487: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.654494: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.654502: | flags: none (0x0) Jan 13 23:10:15.654510: | length: 28 (00 1c) Jan 13 23:10:15.654518: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.654526: | SPI size: 0 (00) Jan 13 23:10:15.654534: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Jan 13 23:10:15.654542: | processing payload: ISAKMP_NEXT_v2N (len=20) Jan 13 23:10:15.654550: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.654557: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.654565: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.654573: | flags: none (0x0) Jan 13 23:10:15.654581: | length: 8 (00 08) Jan 13 23:10:15.654589: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.654597: | SPI size: 0 (00) Jan 13 23:10:15.654604: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Jan 13 23:10:15.654612: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:15.654619: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.654627: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.654634: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:15.654641: | flags: none (0x0) Jan 13 23:10:15.654650: | length: 14 (00 0e) Jan 13 23:10:15.654657: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.654665: | SPI size: 0 (00) Jan 13 23:10:15.654673: | Notify Message Type: v2N_SIGNATURE_HASH_ALGORITHMS (0x402f) Jan 13 23:10:15.654681: | processing payload: ISAKMP_NEXT_v2N (len=6) Jan 13 23:10:15.654689: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:15.654696: | ***parse IKEv2 Notify Payload: Jan 13 23:10:15.654704: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.654712: | flags: none (0x0) Jan 13 23:10:15.654720: | length: 8 (00 08) Jan 13 23:10:15.654728: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.654736: | SPI size: 0 (00) Jan 13 23:10:15.654743: | Notify Message Type: v2N_REDIRECT_SUPPORTED (0x4016) Jan 13 23:10:15.654751: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:15.654759: | DDOS disabled and no cookie sent, continuing Jan 13 23:10:15.654770: | looking for transition from PARENT_R0 matching IKE_SA_INIT request: SA,KE,Ni,N,N,N,N,N Jan 13 23:10:15.654781: | trying: Respond to IKE_SA_INIT Jan 13 23:10:15.654799: | unsecured message matched Jan 13 23:10:15.654813: | ikev2_find_host_connection() 94.253.210.164->161.53.235.3 policy=ECDSA Jan 13 23:10:15.654826: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (ikev2_find_host_connection() +115 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.654841: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:15.654852: | skipping "MYCONN-ikev2-cp"[2] 94.253.210.164, missing policy Jan 13 23:10:15.654862: | skipping "L2TP-PSK-NAT"[1] 94.253.210.164, not IKEv2 Jan 13 23:10:15.654874: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (ikev2_find_host_connection() +170 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.654884: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 23:10:15.654892: | skipping "MYCONN-ikev2-cp", missing policy Jan 13 23:10:15.654900: | skipping "L2TP-PSK-NAT", not IKEv2 Jan 13 23:10:15.654907: | skipping "L2TP-PSK-noNAT", not IKEv2 Jan 13 23:10:15.654915: | skipping "L2TP-PSK-common", not IKEv2 Jan 13 23:10:15.654925: | ISAKMP_v2_IKE_SA_INIT message received on 161.53.235.3:500 but no connection has been authorized with policy ECDSA Jan 13 23:10:15.654938: | ikev2_find_host_connection() 94.253.210.164->161.53.235.3 policy=RSASIG Jan 13 23:10:15.654948: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (ikev2_find_host_connection() +115 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.654963: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:15.654976: | found connection: "MYCONN-ikev2-cp"[2] 94.253.210.164 with policy RSASIG Jan 13 23:10:15.654985: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (find_v2_host_pair_connection() +343 programs/pluto/ikev2_host_pair.c) Jan 13 23:10:15.654998: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 23:10:15.655034: | newref alloc logger@0x55c838019ae8(0->1) (new_v2_ike_state() +505 programs/pluto/state.c) Jan 13 23:10:15.655048: | addref fd@NULL (new_v2_ike_state() +505 programs/pluto/state.c) Jan 13 23:10:15.655061: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49 initialized Jan 13 23:10:15.655071: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 initialized Jan 13 23:10:15.655082: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: reqid=0 initialized Jan 13 23:10:15.655098: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: 00 00 00 00 00 00 00 00 initialized Jan 13 23:10:15.655115: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:10:15.655126: | creating state object #49 at 0x55c8380206c8 Jan 13 23:10:15.655137: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49 added to hash table bucket 0x55c83658af60 Jan 13 23:10:15.655148: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:10:15.655159: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:10:15.655172: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: 20 75 86 d9 f2 5e 32 f6 added to hash table bucket 0x55c83657e760 Jan 13 23:10:15.655190: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f added to hash table bucket 0x55c83657abe0 Jan 13 23:10:15.655200: | pstats #49 ikev2.ike started Jan 13 23:10:15.655209: | parent state #49: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA) Jan 13 23:10:15.655219: | #49.st_v2_transition NULL -> PARENT_R0->PARENT_R1 (new_v2_ike_state() +510 programs/pluto/state.c) Jan 13 23:10:15.655249: | Message ID: IKE #49 initializing (IKE SA): ike.initiator .sent=0->-1 .recv=0->-1 .recv_frags=0 .recv_wip=0->-1 .last_contact=0->9594883.676309 ike.responder .sent=0->-1 .recv=0->-1 .recv_frags=0 .recv_wip=0->-1 .last_contact=0->9594883.676309 ike.wip.initiator=0->-1 Jan 13 23:10:15.655261: | delref struct iface_endpoint@0x55c83801ef68(10->9) (initialize_new_state() +224 programs/pluto/ipsec_doi.c) Jan 13 23:10:15.655272: | orienting "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:15.655282: | left(THIS) host-address=161.53.235.3 host-port=500 ikeport=0 encap=no Jan 13 23:10:15.655294: | right(THAT) host-address=94.253.210.164 host-port=500 ikeport=0 encap=no Jan 13 23:10:15.655305: | interface endpoint [::1]:500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.655317: | interface endpoint 127.0.0.1:4500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.655327: | interface endpoint 127.0.0.1:500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.655337: | interface endpoint 161.53.235.3:4500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.655349: | interface endpoint 161.53.235.3:500 matches left(THIS); orienting Jan 13 23:10:15.655359: | interface endpoint 192.168.100.1:4500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.655371: | interface endpoint 192.168.100.1:500 does not match left(THIS) or right(THAT) Jan 13 23:10:15.655380: | addref struct iface_endpoint@0x55c83801ef68(9->10) (orient() +299 programs/pluto/orient.c) Jan 13 23:10:15.655391: | addref struct iface_endpoint@0x55c83801ef68(10->11) (initialize_new_state() +227 programs/pluto/ipsec_doi.c) Jan 13 23:10:15.655401: | in initialize_new_state with remote endpoint set to 94.253.210.164:500 Jan 13 23:10:15.655415: | event_schedule_where: newref EVENT_SA_DISCARD-pe@0x55c838013358 timeout in 200 seconds for #49 Jan 13 23:10:15.655428: | newref tt@0x55c837ff80c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.655444: | #49 spent 1.86 (1.86) milliseconds Jan 13 23:10:15.655456: | #49.st_v2_transition PARENT_R0->PARENT_R1 -> PARENT_R0->PARENT_R1 (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:10:15.655471: | Message ID: IKE #49 responder starting message request 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=-1 .recv=-1 .recv_frags=0 .recv_wip=0 .last_contact=9594883.676309 ike.wip.initiator=-1 Jan 13 23:10:15.655481: | calling processor Respond to IKE_SA_INIT Jan 13 23:10:15.655492: | #49 spent 1.91 (1.91) milliseconds Jan 13 23:10:15.655506: | #49 updating local interface from 161.53.235.3:500 to 161.53.235.3:500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:10:15.655516: | delref struct iface_endpoint@0x55c83801ef68(11->10) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:10:15.655525: | addref struct iface_endpoint@0x55c83801ef68(10->11) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:10:15.655535: | comparing remote proposals against IKE responder 4 local proposals Jan 13 23:10:15.655547: | local proposal 1 type ENCR has 1 transforms Jan 13 23:10:15.655556: | local proposal 1 type PRF has 2 transforms Jan 13 23:10:15.655564: | local proposal 1 type INTEG has 1 transforms Jan 13 23:10:15.655573: | local proposal 1 type DH has 8 transforms Jan 13 23:10:15.655581: | local proposal 1 type ESN has 0 transforms Jan 13 23:10:15.655590: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Jan 13 23:10:15.655601: | local proposal 2 type ENCR has 1 transforms Jan 13 23:10:15.655608: | local proposal 2 type PRF has 2 transforms Jan 13 23:10:15.655616: | local proposal 2 type INTEG has 1 transforms Jan 13 23:10:15.655624: | local proposal 2 type DH has 8 transforms Jan 13 23:10:15.655632: | local proposal 2 type ESN has 0 transforms Jan 13 23:10:15.655640: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Jan 13 23:10:15.655648: | local proposal 3 type ENCR has 1 transforms Jan 13 23:10:15.655668: | local proposal 3 type PRF has 2 transforms Jan 13 23:10:15.655677: | local proposal 3 type INTEG has 2 transforms Jan 13 23:10:15.655685: | local proposal 3 type DH has 8 transforms Jan 13 23:10:15.655693: | local proposal 3 type ESN has 0 transforms Jan 13 23:10:15.655702: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Jan 13 23:10:15.655712: | local proposal 4 type ENCR has 1 transforms Jan 13 23:10:15.655721: | local proposal 4 type PRF has 2 transforms Jan 13 23:10:15.655728: | local proposal 4 type INTEG has 2 transforms Jan 13 23:10:15.655736: | local proposal 4 type DH has 8 transforms Jan 13 23:10:15.655743: | local proposal 4 type ESN has 0 transforms Jan 13 23:10:15.655752: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Jan 13 23:10:15.655760: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 23:10:15.655769: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:10:15.655781: | length: 136 (00 88) Jan 13 23:10:15.655790: | prop #: 1 (01) Jan 13 23:10:15.655798: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 23:10:15.655806: | spi size: 0 (00) Jan 13 23:10:15.655815: | # transforms: 15 (0f) Jan 13 23:10:15.655824: | Comparing remote proposal 1 containing 15 transforms against local proposal [1..4] of 4 local proposals Jan 13 23:10:15.655835: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.655843: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.655851: | length: 12 (00 0c) Jan 13 23:10:15.655859: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.655867: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:10:15.655875: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.655883: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.655892: | length/value: 256 (01 00) Jan 13 23:10:15.655902: | remote proposal 1 transform 0 (ENCR=AES_CBC_256) matches local proposal 3 type 1 (ENCR) transform 0 Jan 13 23:10:15.655913: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.655920: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.655929: | length: 12 (00 0c) Jan 13 23:10:15.655937: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.655945: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:10:15.655952: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.655960: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.655968: | length/value: 128 (00 80) Jan 13 23:10:15.655978: | remote proposal 1 transform 1 (ENCR=AES_CBC_128) matches local proposal 4 type 1 (ENCR) transform 0 Jan 13 23:10:15.655986: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.655994: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656002: | length: 8 (00 08) Jan 13 23:10:15.656010: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.656018: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Jan 13 23:10:15.656028: | remote proposal 1 transform 2 (INTEG=HMAC_SHA2_512_256) matches local proposal 3 type 3 (INTEG) transform 0 Jan 13 23:10:15.656042: | remote proposal 1 transform 2 (INTEG=HMAC_SHA2_512_256) matches local proposal 4 type 3 (INTEG) transform 0 Jan 13 23:10:15.656050: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656058: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656066: | length: 8 (00 08) Jan 13 23:10:15.656074: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.656082: | IKEv2 transform ID: AUTH_HMAC_SHA2_384_192 (0xd) Jan 13 23:10:15.656090: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656098: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656106: | length: 8 (00 08) Jan 13 23:10:15.656114: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.656121: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Jan 13 23:10:15.656129: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656137: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656153: | length: 8 (00 08) Jan 13 23:10:15.656162: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:15.656169: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:10:15.656178: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656185: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656194: | length: 8 (00 08) Jan 13 23:10:15.656201: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.656209: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Jan 13 23:10:15.656219: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Jan 13 23:10:15.656227: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Jan 13 23:10:15.656236: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 3 type 2 (PRF) transform 0 Jan 13 23:10:15.656245: | remote proposal 1 transform 6 (PRF=HMAC_SHA2_512) matches local proposal 4 type 2 (PRF) transform 0 Jan 13 23:10:15.656253: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656261: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656269: | length: 8 (00 08) Jan 13 23:10:15.656277: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.656284: | IKEv2 transform ID: PRF_HMAC_SHA2_384 (0x6) Jan 13 23:10:15.656293: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656300: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656332: | length: 8 (00 08) Jan 13 23:10:15.656353: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.656361: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Jan 13 23:10:15.656370: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656378: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656387: | length: 8 (00 08) Jan 13 23:10:15.656394: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.656402: | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) Jan 13 23:10:15.656410: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656418: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656427: | length: 8 (00 08) Jan 13 23:10:15.656434: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.656442: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.656452: | remote proposal 1 transform 10 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 23:10:15.656465: | remote proposal 1 transform 10 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 23:10:15.656474: | remote proposal 1 transform 10 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Jan 13 23:10:15.656485: | remote proposal 1 transform 10 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Jan 13 23:10:15.656493: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656501: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656509: | length: 8 (00 08) Jan 13 23:10:15.656520: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.656528: | IKEv2 transform ID: OAKLEY_GROUP_DH24 (0x18) Jan 13 23:10:15.656536: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656544: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656552: | length: 8 (00 08) Jan 13 23:10:15.656562: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.656570: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Jan 13 23:10:15.656578: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656586: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656594: | length: 8 (00 08) Jan 13 23:10:15.656604: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.656612: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Jan 13 23:10:15.656621: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656631: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:15.656651: | length: 8 (00 08) Jan 13 23:10:15.656660: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.656668: | IKEv2 transform ID: OAKLEY_GROUP_MODP1536 (0x5) Jan 13 23:10:15.656678: | remote proposal 1 proposed transforms: ENCR+PRF+INTEG+DH; matched: ENCR+PRF+INTEG+DH; unmatched: none Jan 13 23:10:15.656691: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: PRF+DH Jan 13 23:10:15.656700: | remote proposal 1 does not match local proposal 1; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 23:10:15.656713: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 2; required: ENCR+PRF+DH; optional: INTEG; matched: PRF+DH Jan 13 23:10:15.656722: | remote proposal 1 does not match local proposal 2; unmatched transforms: ENCR+INTEG; missing transforms: ENCR Jan 13 23:10:15.656732: | comparing remote proposal 1 containing ENCR+PRF+INTEG+DH transforms to local proposal 3; required: ENCR+PRF+INTEG+DH; optional: none; matched: ENCR+PRF+INTEG+DH Jan 13 23:10:15.656742: | remote proposal 1 matches local proposal 3 Jan 13 23:10:15.656751: | ****parse IKEv2 Proposal Substructure Payload: Jan 13 23:10:15.656759: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:10:15.656768: | length: 104 (00 68) Jan 13 23:10:15.656776: | prop #: 2 (02) Jan 13 23:10:15.656784: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 23:10:15.656792: | spi size: 0 (00) Jan 13 23:10:15.656800: | # transforms: 11 (0b) Jan 13 23:10:15.656809: | Comparing remote proposal 2 containing 11 transforms against local proposal [1..2] of 4 local proposals Jan 13 23:10:15.656820: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656828: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656836: | length: 12 (00 0c) Jan 13 23:10:15.656844: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.656851: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:15.656859: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.656867: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.656875: | length/value: 256 (01 00) Jan 13 23:10:15.656888: | remote proposal 2 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:10:15.656900: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656908: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656916: | length: 12 (00 0c) Jan 13 23:10:15.656926: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.656934: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:15.656942: | ******parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.656950: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.656958: | length/value: 128 (00 80) Jan 13 23:10:15.656968: | remote proposal 2 transform 1 (ENCR=AES_GCM_C_128) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:10:15.656977: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.656985: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.656994: | length: 8 (00 08) Jan 13 23:10:15.657002: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.657009: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Jan 13 23:10:15.657019: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Jan 13 23:10:15.657030: | remote proposal 2 transform 2 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Jan 13 23:10:15.657038: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657045: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657054: | length: 8 (00 08) Jan 13 23:10:15.657061: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.657069: | IKEv2 transform ID: PRF_HMAC_SHA2_384 (0x6) Jan 13 23:10:15.657077: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657087: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657121: | length: 8 (00 08) Jan 13 23:10:15.657131: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.657138: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Jan 13 23:10:15.657147: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657155: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657163: | length: 8 (00 08) Jan 13 23:10:15.657171: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.657179: | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) Jan 13 23:10:15.657187: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657195: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657204: | length: 8 (00 08) Jan 13 23:10:15.657211: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.657219: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.657229: | remote proposal 2 transform 6 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Jan 13 23:10:15.657238: | remote proposal 2 transform 6 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Jan 13 23:10:15.657246: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657253: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657261: | length: 8 (00 08) Jan 13 23:10:15.657269: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.657277: | IKEv2 transform ID: OAKLEY_GROUP_DH24 (0x18) Jan 13 23:10:15.657285: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657293: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657301: | length: 8 (00 08) Jan 13 23:10:15.657308: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.657316: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Jan 13 23:10:15.657324: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657332: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.657340: | length: 8 (00 08) Jan 13 23:10:15.657348: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.657355: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Jan 13 23:10:15.657364: | *****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:15.657371: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:15.657380: | length: 8 (00 08) Jan 13 23:10:15.657387: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.657395: | IKEv2 transform ID: OAKLEY_GROUP_MODP1536 (0x5) Jan 13 23:10:15.657404: | remote proposal 2 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Jan 13 23:10:15.657415: | comparing remote proposal 2 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Jan 13 23:10:15.657423: | remote proposal 2 matches local proposal 1 Jan 13 23:10:15.657439: "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: proposal 2:IKE=AES_GCM_C_256-HMAC_SHA2_512-MODP2048 chosen from remote proposals 1:IKE:ENCR=AES_CBC_256;ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_384_192;INTEG=HMAC_SHA2_256_128;INTEG=HMAC_SHA1_96;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_384;PRF=HMAC_SHA2_256;PRF=HMAC_SHA1;DH=MODP2048;DH=DH24;DH=ECP_384;DH=ECP_256;DH=MODP1536[first-match] 2:IKE:ENCR=AES_GCM_C_256;ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_384;PRF=HMAC_SHA2_256;PRF=HMAC_SHA1;DH=MODP2048;DH=DH24;DH=ECP_384;DH=ECP_256;DH=MODP1536[better-match] Jan 13 23:10:15.657453: | accepted IKE proposal ikev2_proposal: 2:IKE=AES_GCM_C_256-HMAC_SHA2_512-MODP2048 Jan 13 23:10:15.657462: | converting proposal to internal trans attrs Jan 13 23:10:15.657473: | nat: IKE.SPIr is zero Jan 13 23:10:15.657504: | natd_hash: hasher=0x55c83656d160(20) Jan 13 23:10:15.657516: | natd_hash: icookie= Jan 13 23:10:15.657525: | 20 75 86 d9 f2 5e 32 f6 u...^2. Jan 13 23:10:15.657533: | natd_hash: rcookie= Jan 13 23:10:15.657541: | 00 00 00 00 00 00 00 00 ........ Jan 13 23:10:15.657548: | natd_hash: ip= Jan 13 23:10:15.657556: | a1 35 eb 03 .5.. Jan 13 23:10:15.657586: | natd_hash: port= Jan 13 23:10:15.657595: | 01 f4 .. Jan 13 23:10:15.657603: | natd_hash: hash= Jan 13 23:10:15.657610: | 97 e2 19 31 11 37 d6 0e 2c a3 18 85 8a 96 63 ef ...1.7..,.....c. Jan 13 23:10:15.657619: | f1 7a 39 b2 .z9. Jan 13 23:10:15.657629: | nat: IKE.SPIr is zero Jan 13 23:10:15.657649: | natd_hash: hasher=0x55c83656d160(20) Jan 13 23:10:15.657660: | natd_hash: icookie= Jan 13 23:10:15.657669: | 20 75 86 d9 f2 5e 32 f6 u...^2. Jan 13 23:10:15.657676: | natd_hash: rcookie= Jan 13 23:10:15.657684: | 00 00 00 00 00 00 00 00 ........ Jan 13 23:10:15.657692: | natd_hash: ip= Jan 13 23:10:15.657699: | 5e fd d2 a4 ^... Jan 13 23:10:15.657707: | natd_hash: port= Jan 13 23:10:15.657715: | dc 5e .^ Jan 13 23:10:15.657722: | natd_hash: hash= Jan 13 23:10:15.657730: | 27 7f 3a c7 e2 95 85 75 a7 9b 95 91 ab 96 cc f5 '.:....u........ Jan 13 23:10:15.657738: | 69 01 8b 70 i..p Jan 13 23:10:15.657749: | NAT_TRAVERSAL encaps using auto-detect Jan 13 23:10:15.657758: | NAT_TRAVERSAL this end is NOT behind NAT Jan 13 23:10:15.657767: | NAT_TRAVERSAL that end is behind NAT 94.253.210.164:56414 Jan 13 23:10:15.657779: | NAT_TRAVERSAL nat-keepalive enabled 94.253.210.164:56414 Jan 13 23:10:15.657786: | NAT: responder so initiator gets to switch ports Jan 13 23:10:15.657795: | parsing 2 raw bytes of IKEv2 Notify Payload into hash algorithm identifier (network ordered) Jan 13 23:10:15.657802: | hash algorithm identifier (network ordered) Jan 13 23:10:15.657810: | 00 02 .. Jan 13 23:10:15.657818: | parsing 2 raw bytes of IKEv2 Notify Payload into hash algorithm identifier (network ordered) Jan 13 23:10:15.657826: | hash algorithm identifier (network ordered) Jan 13 23:10:15.657833: | 00 03 .. Jan 13 23:10:15.657841: | parsing 2 raw bytes of IKEv2 Notify Payload into hash algorithm identifier (network ordered) Jan 13 23:10:15.657848: | hash algorithm identifier (network ordered) Jan 13 23:10:15.657855: | 00 04 .. Jan 13 23:10:15.657870: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:15.657880: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:15.657890: | newref clone logger@0x55c838017ee8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:15.657898: | job 58 helper 0 #49 process_v2_IKE_SA_INIT_request_continue (dh): added to pending queue Jan 13 23:10:15.657908: | #49 deleting EVENT_SA_DISCARD Jan 13 23:10:15.657920: | delref tt@0x55c837ff80c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:15.657931: | delref state-event@0x55c838013358(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:10:15.657940: | #49 STATE_V2_PARENT_R0: retransmits: cleared Jan 13 23:10:15.657953: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c838013358 timeout in 60 seconds for #49 Jan 13 23:10:15.657965: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.657984: | #49 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_SUSPEND Jan 13 23:10:15.658008: | suspend: saving MD@0x55c838050b08 in state #49 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:10:15.658010: | job 58 helper 3 #49 process_v2_IKE_SA_INIT_request_continue (dh): started Jan 13 23:10:15.658030: | addref struct msg_digest@0x55c838050b08(1->2) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:10:15.658081: | #49 is busy; has suspended MD 0x55c838050b08 Jan 13 23:10:15.658106: | #49 spent 2.58 (2.61) milliseconds in processing: Respond to IKE_SA_INIT in v2_dispatch() Jan 13 23:10:15.658147: | #49 spent 4.53 (4.56) milliseconds in process_v2_IKE_SA_INIT() Jan 13 23:10:15.658168: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.658190: | spent 4.57 (4.61) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:10:15.659836: | newref struct dh_local_secret@0x7ff8bc00c8e8(0->1) (calc_dh_local_secret() +93 programs/pluto/crypt_dh.c) Jan 13 23:10:15.659871: | job 58 helper 3 #49 process_v2_IKE_SA_INIT_request_continue (dh): finished Jan 13 23:10:15.659888: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 1.87 (1.88) milliseconds in job 58 helper 3 #49 process_v2_IKE_SA_INIT_request_continue (dh) Jan 13 23:10:15.659899: | scheduling resume sending job back to main thread for #49 Jan 13 23:10:15.659910: | newref tt@0x7ff8bc001378(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.659931: | helper 3: waiting for work Jan 13 23:10:15.659950: | processing resume sending job back to main thread for #49 Jan 13 23:10:15.659975: | suspend: restoring MD@0x55c838050b08 from state #49 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:10:15.659986: | job 58 helper 3 #49 process_v2_IKE_SA_INIT_request_continue (dh): calling state's callback function Jan 13 23:10:15.659999: | process_v2_IKE_SA_INIT_request_continue() for #49 STATE_V2_PARENT_R0: calculated ke+nonce, sending R1 Jan 13 23:10:15.660017: | opening output PBS reply packet Jan 13 23:10:15.660028: | **emit ISAKMP Message: Jan 13 23:10:15.660039: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:15.660051: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:15.660061: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:15.660071: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:15.660080: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Jan 13 23:10:15.660089: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:15.660101: | Message ID: 0 (00 00 00 00) Jan 13 23:10:15.660110: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:15.660122: | emitting ikev2_proposal ... Jan 13 23:10:15.660130: | ***emit IKEv2 Security Association Payload: Jan 13 23:10:15.660139: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.660150: | flags: none (0x0) Jan 13 23:10:15.660159: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 23:10:15.660169: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.660181: | ****emit IKEv2 Proposal Substructure Payload: Jan 13 23:10:15.660191: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:10:15.660200: | prop #: 2 (02) Jan 13 23:10:15.660208: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 23:10:15.660217: | spi size: 0 (00) Jan 13 23:10:15.660228: | # transforms: 3 (03) Jan 13 23:10:15.660237: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 23:10:15.660248: | *****emit IKEv2 Transform Substructure Payload: Jan 13 23:10:15.660257: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.660268: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:15.660276: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:15.660285: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:10:15.660296: | ******emit IKEv2 Attribute Substructure Payload: Jan 13 23:10:15.660317: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:15.660337: | length/value: 256 (01 00) Jan 13 23:10:15.660347: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 23:10:15.660358: | *****emit IKEv2 Transform Substructure Payload: Jan 13 23:10:15.660366: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.660374: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Jan 13 23:10:15.660395: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Jan 13 23:10:15.660405: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.660415: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:10:15.660424: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:10:15.660433: | *****emit IKEv2 Transform Substructure Payload: Jan 13 23:10:15.660441: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:15.660451: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Jan 13 23:10:15.660459: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.660468: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:15.660477: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:10:15.660485: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:10:15.660494: | emitting length of IKEv2 Proposal Substructure Payload: 36 Jan 13 23:10:15.660501: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 23:10:15.660509: | emitting length of IKEv2 Security Association Payload: 40 Jan 13 23:10:15.660516: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 23:10:15.660532: | addref struct dh_local_secret@0x7ff8bc00c8e8(1->2) (unpack_KE_from_helper() +152 programs/pluto/crypt_ke.c) Jan 13 23:10:15.660543: | ***emit IKEv2 Key Exchange Payload: Jan 13 23:10:15.660551: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.660559: | flags: none (0x0) Jan 13 23:10:15.660567: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Jan 13 23:10:15.660576: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Jan 13 23:10:15.660584: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.660594: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Jan 13 23:10:15.660602: | ikev2 g^x: Jan 13 23:10:15.660610: | d3 8c 25 77 61 f6 cc d8 60 bf de 50 c1 25 02 f3 ..%wa...`..P.%.. Jan 13 23:10:15.660618: | 97 92 70 60 05 4d 3e d4 da 12 2b ca be b4 81 d0 ..p`.M>...+..... Jan 13 23:10:15.660626: | c7 11 b9 06 11 af 08 17 fa 89 e6 e8 f7 24 e5 95 .............$.. Jan 13 23:10:15.660634: | 66 44 81 77 81 1c d3 28 0e 17 f9 44 5f a2 a8 46 fD.w...(...D_..F Jan 13 23:10:15.660641: | 1f 85 57 41 ed da c1 8d 61 dc 49 5f 87 44 d1 d9 ..WA....a.I_.D.. Jan 13 23:10:15.660648: | 89 ce 71 fa 78 7a c5 05 b5 d5 bd 1e 4b 3a be f1 ..q.xz......K:.. Jan 13 23:10:15.660656: | 89 85 92 18 6d 00 66 b0 55 a7 73 bd 68 53 c7 4d ....m.f.U.s.hS.M Jan 13 23:10:15.660664: | 1e 84 49 c2 3c 2b a0 57 54 5c fb 19 9c 3e 20 38 ..I.<+.WT\...> 8 Jan 13 23:10:15.660671: | dc 9d a3 e1 f1 3e 14 7b c4 67 d3 0c 2d 08 db f5 .....>.{.g..-... Jan 13 23:10:15.660679: | 39 9c 91 6a 5f 80 5a 12 e2 ef a2 1e 68 cf a6 20 9..j_.Z.....h.. Jan 13 23:10:15.660686: | 51 8b 51 eb cb 0d bc d1 7b bd 7d 57 24 f0 ee 0a Q.Q.....{.}W$... Jan 13 23:10:15.660694: | 94 41 2a f9 3d bc cb c2 a2 ba a1 3a 40 9b 9f 6d .A*.=......:@..m Jan 13 23:10:15.660702: | e6 8a b9 50 a2 cf 00 b2 a6 f5 63 53 e8 78 cd ad ...P......cS.x.. Jan 13 23:10:15.660710: | 75 40 f5 4b ff 7c 6a 15 7f d4 44 42 10 f3 e9 44 u@.K.|j...DB...D Jan 13 23:10:15.660717: | e9 40 0b 9e 61 6c 47 9e b8 52 84 35 43 02 7e c4 .@..alG..R.5C.~. Jan 13 23:10:15.660725: | 94 b5 87 e1 b3 5c b5 44 28 13 3e 3f 53 9e 59 eb .....\.D(.>?S.Y. Jan 13 23:10:15.660755: | emitting length of IKEv2 Key Exchange Payload: 264 Jan 13 23:10:15.660765: | ***emit IKEv2 Nonce Payload: Jan 13 23:10:15.660773: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.660782: | flags: none (0x0) Jan 13 23:10:15.660790: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Jan 13 23:10:15.660798: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.660807: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Jan 13 23:10:15.660815: | IKEv2 nonce: Jan 13 23:10:15.660823: | b9 53 8e 50 db 90 a4 93 02 42 51 94 0f d1 64 d0 .S.P.....BQ...d. Jan 13 23:10:15.660831: | 44 ab 08 e4 f7 4a f7 a0 0a 87 4d fd f6 f8 6b 00 D....J....M...k. Jan 13 23:10:15.660838: | emitting length of IKEv2 Nonce Payload: 36 Jan 13 23:10:15.660846: | adding a v2N Payload Jan 13 23:10:15.660854: | ***emit IKEv2 Notify Payload: Jan 13 23:10:15.660862: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.660870: | flags: none (0x0) Jan 13 23:10:15.660877: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.660886: | SPI size: 0 (00) Jan 13 23:10:15.660894: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Jan 13 23:10:15.660902: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 23:10:15.660913: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.660922: | emitting length of IKEv2 Notify Payload: 8 Jan 13 23:10:15.660932: | NAT-Traversal support [enabled] add v2N payloads. Jan 13 23:10:15.660960: | natd_hash: hasher=0x55c83656d160(20) Jan 13 23:10:15.660974: | natd_hash: icookie= Jan 13 23:10:15.660982: | 20 75 86 d9 f2 5e 32 f6 u...^2. Jan 13 23:10:15.660990: | natd_hash: rcookie= Jan 13 23:10:15.660998: | 20 7f d4 c8 51 2c ca 7f ...Q,.. Jan 13 23:10:15.661005: | natd_hash: ip= Jan 13 23:10:15.661013: | a1 35 eb 03 .5.. Jan 13 23:10:15.661021: | natd_hash: port= Jan 13 23:10:15.661029: | 01 f4 .. Jan 13 23:10:15.661036: | natd_hash: hash= Jan 13 23:10:15.661044: | db 77 4d 0b 8a e9 2e 6b 65 0a 52 a6 65 37 22 a5 .wM....ke.R.e7". Jan 13 23:10:15.661052: | 78 ce d6 01 x... Jan 13 23:10:15.661059: | adding a v2N Payload Jan 13 23:10:15.661067: | ***emit IKEv2 Notify Payload: Jan 13 23:10:15.661075: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.661086: | flags: none (0x0) Jan 13 23:10:15.661094: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.661103: | SPI size: 0 (00) Jan 13 23:10:15.661110: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Jan 13 23:10:15.661119: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 23:10:15.661129: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.661138: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Jan 13 23:10:15.661148: | Notify data: Jan 13 23:10:15.661156: | db 77 4d 0b 8a e9 2e 6b 65 0a 52 a6 65 37 22 a5 .wM....ke.R.e7". Jan 13 23:10:15.661164: | 78 ce d6 01 x... Jan 13 23:10:15.661171: | emitting length of IKEv2 Notify Payload: 28 Jan 13 23:10:15.661190: | natd_hash: hasher=0x55c83656d160(20) Jan 13 23:10:15.661201: | natd_hash: icookie= Jan 13 23:10:15.661209: | 20 75 86 d9 f2 5e 32 f6 u...^2. Jan 13 23:10:15.661217: | natd_hash: rcookie= Jan 13 23:10:15.661225: | 20 7f d4 c8 51 2c ca 7f ...Q,.. Jan 13 23:10:15.661246: | natd_hash: ip= Jan 13 23:10:15.661255: | 5e fd d2 a4 ^... Jan 13 23:10:15.661263: | natd_hash: port= Jan 13 23:10:15.661270: | dc 5e .^ Jan 13 23:10:15.661278: | natd_hash: hash= Jan 13 23:10:15.661285: | f4 ec bf 0f 90 e0 35 74 cd 6f 0e b2 25 e7 1b ac ......5t.o..%... Jan 13 23:10:15.661293: | 54 03 6d 9f T.m. Jan 13 23:10:15.661301: | adding a v2N Payload Jan 13 23:10:15.661308: | ***emit IKEv2 Notify Payload: Jan 13 23:10:15.661316: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.661324: | flags: none (0x0) Jan 13 23:10:15.661332: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:15.661341: | SPI size: 0 (00) Jan 13 23:10:15.661348: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Jan 13 23:10:15.661357: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Jan 13 23:10:15.661365: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.661374: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Jan 13 23:10:15.661383: | Notify data: Jan 13 23:10:15.661392: | f4 ec bf 0f 90 e0 35 74 cd 6f 0e b2 25 e7 1b ac ......5t.o..%... Jan 13 23:10:15.661400: | 54 03 6d 9f T.m. Jan 13 23:10:15.661407: | emitting length of IKEv2 Notify Payload: 28 Jan 13 23:10:15.661415: | going to send a certreq Jan 13 23:10:15.661423: | connection->kind is not CK_PERMANENT (instance), so collect CAs Jan 13 23:10:15.661434: | FOR_EACH_HOST_PAIR_CONNECTION(->161.53.235.3) in (collect_rw_ca_candidates() +288 programs/pluto/x509.c) Jan 13 23:10:15.661447: | host_pair: ->161.53.235.3 matches "MYCONN-ikev2-cp" Jan 13 23:10:15.661457: | connection is RW, lookup CA candidates Jan 13 23:10:15.661467: | ***emit IKEv2 Certificate Request Payload: Jan 13 23:10:15.661475: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.661483: | flags: none (0x0) Jan 13 23:10:15.661490: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 23:10:15.661498: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Certificate Request Payload (38:ISAKMP_NEXT_v2CERTREQ) Jan 13 23:10:15.661506: | next payload chain: saving location 'IKEv2 Certificate Request Payload'.'next payload type' in 'reply packet' Jan 13 23:10:15.661966: | located CA cert O=ALU-UNIZG,CN=ALU-UNIZG CA for CERTREQ Jan 13 23:10:15.662008: | emitting 20 raw bytes of CA cert public key hash into IKEv2 Certificate Request Payload Jan 13 23:10:15.662023: | CA cert public key hash: Jan 13 23:10:15.662032: | d8 18 a0 99 8b 0d 79 d4 5c 2e 82 10 43 4e e2 99 ......y.\...CN.. Jan 13 23:10:15.662040: | 45 05 57 ff E.W. Jan 13 23:10:15.662050: | emitting length of IKEv2 Certificate Request Payload: 25 Jan 13 23:10:15.662061: | emitting length of ISAKMP Message: 457 Jan 13 23:10:15.662074: | job 58 helper 3 #49 process_v2_IKE_SA_INIT_request_continue (dh): final status STF_OK; cleaning up Jan 13 23:10:15.662086: | delref struct dh_local_secret@0x7ff8bc00c8e8(2->1) (cleanup_ke_and_nonce() +83 programs/pluto/crypt_ke.c) Jan 13 23:10:15.662096: | delref logger@0x55c838017ee8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:15.662108: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:15.662116: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:15.662127: | #49 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_OK Jan 13 23:10:15.662141: | transitioning from state STATE_V2_PARENT_R0 to state STATE_V2_PARENT_R1 Jan 13 23:10:15.662152: | Message ID: updating counters for #49 Jan 13 23:10:15.662171: | Message ID: IKE #49 updating responder received message request 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=-1 .recv=-1->0 .recv_frags=0 .recv_wip=0->-1 .last_contact=9594883.676309->9594883.683232 ike.wip.initiator=-1 Jan 13 23:10:15.662200: | Message ID: IKE #49 updating responder sent message response 0: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=-1->0 .recv=0 .recv_frags=0 .last_contact=9594883.683232 ike.wip.initiator=-1 Jan 13 23:10:15.662212: | parent state #49: PARENT_R0(half-open IKE SA) => PARENT_R1(half-open IKE SA) Jan 13 23:10:15.662226: | Message ID: IKE #49 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594883.683232 ike.wip.initiator=-1 Jan 13 23:10:15.662237: | #49 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:10:15.662248: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:15.662260: | delref state-event@0x55c838013358(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:10:15.662271: | event_schedule_where: newref EVENT_SA_DISCARD-pe@0x55c838013358 timeout in 200 seconds for #49 Jan 13 23:10:15.662283: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.662299: | sending 457 bytes for STATE_V2_PARENT_R0 through eth0 from 161.53.235.3:500 to 94.253.210.164:56414 using UDP (for #49) Jan 13 23:10:15.662310: | 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f u...^2. ...Q,.. Jan 13 23:10:15.662318: | 21 20 22 20 00 00 00 00 00 00 01 c9 22 00 00 28 ! " ........"..( Jan 13 23:10:15.662326: | 00 00 00 24 02 01 00 03 03 00 00 0c 01 00 00 14 ...$............ Jan 13 23:10:15.662333: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 ................ Jan 13 23:10:15.662342: | 04 00 00 0e 28 00 01 08 00 0e 00 00 d3 8c 25 77 ....(.........%w Jan 13 23:10:15.662349: | 61 f6 cc d8 60 bf de 50 c1 25 02 f3 97 92 70 60 a...`..P.%....p` Jan 13 23:10:15.662357: | 05 4d 3e d4 da 12 2b ca be b4 81 d0 c7 11 b9 06 .M>...+......... Jan 13 23:10:15.662364: | 11 af 08 17 fa 89 e6 e8 f7 24 e5 95 66 44 81 77 .........$..fD.w Jan 13 23:10:15.662371: | 81 1c d3 28 0e 17 f9 44 5f a2 a8 46 1f 85 57 41 ...(...D_..F..WA Jan 13 23:10:15.662379: | ed da c1 8d 61 dc 49 5f 87 44 d1 d9 89 ce 71 fa ....a.I_.D....q. Jan 13 23:10:15.662386: | 78 7a c5 05 b5 d5 bd 1e 4b 3a be f1 89 85 92 18 xz......K:...... Jan 13 23:10:15.662393: | 6d 00 66 b0 55 a7 73 bd 68 53 c7 4d 1e 84 49 c2 m.f.U.s.hS.M..I. Jan 13 23:10:15.662401: | 3c 2b a0 57 54 5c fb 19 9c 3e 20 38 dc 9d a3 e1 <+.WT\...> 8.... Jan 13 23:10:15.662408: | f1 3e 14 7b c4 67 d3 0c 2d 08 db f5 39 9c 91 6a .>.{.g..-...9..j Jan 13 23:10:15.662416: | 5f 80 5a 12 e2 ef a2 1e 68 cf a6 20 51 8b 51 eb _.Z.....h.. Q.Q. Jan 13 23:10:15.662423: | cb 0d bc d1 7b bd 7d 57 24 f0 ee 0a 94 41 2a f9 ....{.}W$....A*. Jan 13 23:10:15.662430: | 3d bc cb c2 a2 ba a1 3a 40 9b 9f 6d e6 8a b9 50 =......:@..m...P Jan 13 23:10:15.662438: | a2 cf 00 b2 a6 f5 63 53 e8 78 cd ad 75 40 f5 4b ......cS.x..u@.K Jan 13 23:10:15.662445: | ff 7c 6a 15 7f d4 44 42 10 f3 e9 44 e9 40 0b 9e .|j...DB...D.@.. Jan 13 23:10:15.662452: | 61 6c 47 9e b8 52 84 35 43 02 7e c4 94 b5 87 e1 alG..R.5C.~..... Jan 13 23:10:15.662460: | b3 5c b5 44 28 13 3e 3f 53 9e 59 eb 29 00 00 24 .\.D(.>?S.Y.)..$ Jan 13 23:10:15.662467: | b9 53 8e 50 db 90 a4 93 02 42 51 94 0f d1 64 d0 .S.P.....BQ...d. Jan 13 23:10:15.662475: | 44 ab 08 e4 f7 4a f7 a0 0a 87 4d fd f6 f8 6b 00 D....J....M...k. Jan 13 23:10:15.662482: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 ).....@.).....@. Jan 13 23:10:15.662489: | db 77 4d 0b 8a e9 2e 6b 65 0a 52 a6 65 37 22 a5 .wM....ke.R.e7". Jan 13 23:10:15.662497: | 78 ce d6 01 26 00 00 1c 00 00 40 05 f4 ec bf 0f x...&.....@..... Jan 13 23:10:15.662504: | 90 e0 35 74 cd 6f 0e b2 25 e7 1b ac 54 03 6d 9f ..5t.o..%...T.m. Jan 13 23:10:15.662537: | 00 00 00 19 04 d8 18 a0 99 8b 0d 79 d4 5c 2e 82 ...........y.\.. Jan 13 23:10:15.662547: | 10 43 4e e2 99 45 05 57 ff .CN..E.W. Jan 13 23:10:15.662594: | sent 1 messages Jan 13 23:10:15.662609: | announcing the state transition Jan 13 23:10:15.662624: "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: sent IKE_SA_INIT reply {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Jan 13 23:10:15.662636: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:15.662646: | delref logger@0x55c837ff8198(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:15.662656: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:15.662664: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:15.662675: | delref struct iface_endpoint@0x55c83801ef68(11->10) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:15.662692: | #49 spent 2.7 (2.72) milliseconds in resume sending job back to main thread Jan 13 23:10:15.662705: | delref tt@0x7ff8bc001378(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:15.996458: | spent 0.00694 (0.00635) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:10:15.996527: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.996542: | addref struct iface_endpoint@0x55c83801f058(3->4) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.996566: | newref alloc logger@0x55c83804df78(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.996581: | *received 1248 bytes from 94.253.210.164:51417 on eth0 161.53.235.3:4500 using UDP Jan 13 23:10:15.996590: | 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f u...^2. ...Q,.. Jan 13 23:10:15.996596: | 35 20 23 08 00 00 00 01 00 00 04 e0 23 00 04 c4 5 #.........#... Jan 13 23:10:15.996602: | 00 01 00 02 ce 2d f6 b6 99 3b 33 b1 75 5a bf 20 .....-...;3.uZ. Jan 13 23:10:15.996609: | 3f 6d 10 e8 fe 0e 82 16 ce 3e 77 28 3b 0e 4d 0b ?m.......>w(;.M. Jan 13 23:10:15.996615: | 40 84 8f 10 6d 1f c5 e6 6b ac bd 53 01 38 02 a3 @...m...k..S.8.. Jan 13 23:10:15.996621: | 38 bc 2e 45 63 5a e3 ba c8 37 d7 a7 7d d0 f4 ec 8..EcZ...7..}... Jan 13 23:10:15.996627: | 3c 3f ab 54 b9 2d dd 7c ac 4b d8 76 40 de bf 5d ..0.......' Jan 13 23:10:15.996646: | 56 41 0e 1e c8 fb 67 cf 57 4e 37 62 b6 f9 5a 36 VA....g.WN7b..Z6 Jan 13 23:10:15.996652: | e7 7d 56 36 5c 14 af cd 3e cd d4 b4 04 19 2e 65 .}V6\...>......e Jan 13 23:10:15.996659: | 92 1d 99 57 a6 de f3 1f 2e 95 11 29 d2 eb 7a 52 ...W.......)..zR Jan 13 23:10:15.996665: | 44 24 0b 7d 80 1e 8b 34 0e d4 e3 f9 64 65 fe b0 D$.}...4....de.. Jan 13 23:10:15.996671: | 1b 61 ba 89 bf 7a 35 69 5a 2d 3a 9c 6c 8f f8 b3 .a...z5iZ-:.l... Jan 13 23:10:15.996677: | e5 aa 7b fd 8d 79 a8 d0 ad 81 32 d7 87 99 f2 3b ..{..y....2....; Jan 13 23:10:15.996683: | ee 96 72 47 e9 63 3e f2 1c f3 35 d4 ef 4e 0f 17 ..rG.c>...5..N.. Jan 13 23:10:15.996690: | 9a f1 c3 be 0e ca 56 6c 7f 53 70 46 7d 12 18 09 ......Vl.SpF}... Jan 13 23:10:15.996696: | 73 50 e8 9d 99 37 33 a2 f8 3b 45 97 3b e9 7e 88 sP...73..;E.;.~. Jan 13 23:10:15.996702: | c6 c1 87 fb b4 af 6e 90 c8 b6 74 77 63 93 71 f4 ......n...twc.q. Jan 13 23:10:15.996708: | 0f b2 7c 88 a3 a1 1f 35 fa 42 7c ec 61 a4 97 83 ..|....5.B|.a... Jan 13 23:10:15.996715: | c8 01 82 45 4d 8a 7c 84 d5 48 46 91 60 94 b5 cf ...EM.|..HF.`... Jan 13 23:10:15.996721: | d0 bd 0a 70 9d 50 90 30 d6 fa 75 83 8f 48 89 b5 ...p.P.0..u..H.. Jan 13 23:10:15.996727: | ea 1c e2 84 b0 aa d2 ce 42 fc e1 16 8f c4 5c 43 ........B.....\C Jan 13 23:10:15.996733: | d1 61 7a 38 61 60 1c 2b ec 6f 69 5c f2 e6 95 e3 .az8a`.+.oi\.... Jan 13 23:10:15.996754: | 42 4e 1b 26 87 ca f5 f7 9c ad be 6e 4e 9b dd 88 BN.&.......nN... Jan 13 23:10:15.996761: | 24 2f 41 05 9e 39 1f 52 84 56 ef 05 16 22 ad 7c $/A..9.R.V...".| Jan 13 23:10:15.996767: | b9 aa 82 63 9c 4a c6 79 99 08 f0 47 45 64 47 82 ...c.J.y...GEdG. Jan 13 23:10:15.996774: | e0 e9 7e 2c cb 08 bc f0 c8 cc 42 f0 85 57 59 64 ..~,......B..WYd Jan 13 23:10:15.996780: | 06 42 13 0a d6 cb 30 ab d2 da c7 5c 0c 11 5f bd .B....0....\.._. Jan 13 23:10:15.996787: | a8 8d f1 38 61 91 30 07 7a 1a 86 01 12 74 68 d9 ...8a.0.z....th. Jan 13 23:10:15.996793: | 66 a1 8f 81 b9 3e 60 65 9f 7b de 6e b3 99 2e 67 f....>`e.{.n...g Jan 13 23:10:15.996799: | dd 78 65 b3 89 db fa f4 15 38 aa ec b6 52 7c 6e .xe......8...R|n Jan 13 23:10:15.996812: | b7 8a 3a 30 77 50 4b 82 06 99 bf 9c 6c 7c 3e 44 ..:0wPK.....l|>D Jan 13 23:10:15.996819: | 3e 4e 73 e7 66 bc 32 64 86 91 a6 f8 b8 43 d6 9b >Ns.f.2d.....C.. Jan 13 23:10:15.996825: | 6c 90 7a ab fa f3 83 b8 44 8e 8f e6 d4 f6 8b de l.z.....D....... Jan 13 23:10:15.996834: | 66 8a cf af 66 19 ae ec 9c 7b 33 2c 0b 6a 6a ae f...f....{3,.jj. Jan 13 23:10:15.996840: | 15 cd 21 e2 fb 35 7c db 03 37 66 71 60 3d 44 c8 ..!..5|..7fq`=D. Jan 13 23:10:15.996847: | 19 b5 d3 b3 9b 92 b1 ce c4 e3 28 bf 31 59 3e 62 ..........(.1Y>b Jan 13 23:10:15.996853: | 63 5f 14 dd b8 57 a3 2d b3 74 95 1f a9 44 5f 40 c_...W.-.t...D_@ Jan 13 23:10:15.996859: | 00 5e aa 5c 70 b9 d5 0a 84 e0 d8 93 d1 3e a4 8e .^.\p........>.. Jan 13 23:10:15.996865: | 52 53 db df 70 2e 8b dd 75 55 cd 7b f9 ae 3e fc RS..p...uU.{..>. Jan 13 23:10:15.996871: | 49 7f 6c 8d 53 c8 23 19 3b 65 af ef a5 e6 c4 1e I.l.S.#.;e...... Jan 13 23:10:15.996877: | 24 88 25 16 11 8e a0 d4 7d 14 0b 98 3c 5c 34 3b $.%.....}...<\4; Jan 13 23:10:15.996883: | 6a 73 92 fb 10 48 e5 5f e0 18 5f 2b f3 71 90 78 js...H._.._+.q.x Jan 13 23:10:15.996889: | 6c 0f 63 4a 78 b6 49 25 59 cc 79 c8 87 da 0f 96 l.cJx.I%Y.y..... Jan 13 23:10:15.996896: | 08 fa 4d d4 c9 b0 27 96 83 ce 7b d6 30 fc a5 a2 ..M...'...{.0... Jan 13 23:10:15.996902: | 69 2e 9d 93 b3 e5 c3 65 0c ba a6 13 6f 2f 03 8b i......e....o/.. Jan 13 23:10:15.996908: | 14 95 ee 3e 61 0d 7a bc 85 ee 8e d8 53 37 bb ab ...>a.z.....S7.. Jan 13 23:10:15.996914: | 1d 03 f6 62 d8 7f db e9 bb a5 31 ae e0 41 5f bc ...b......1..A_. Jan 13 23:10:15.996920: | 68 4f 08 07 6f c3 04 1f 3e 68 8f 76 29 10 70 ef hO..o...>h.v).p. Jan 13 23:10:15.996926: | e9 d1 e4 e5 09 aa b5 7c f8 ec b8 87 58 39 26 da .......|....X9&. Jan 13 23:10:15.996933: | ef 10 36 f0 6b 9a 73 37 40 f1 53 31 54 00 80 85 ..6.k.s7@.S1T... Jan 13 23:10:15.996939: | 58 e4 f6 06 07 e9 81 71 0d 76 9e c7 76 ac 78 ee X......q.v..v.x. Jan 13 23:10:15.996946: | d6 5d 46 55 8d 3d 60 e0 91 e4 c5 b1 0c b9 7b b2 .]FU.=`.......{. Jan 13 23:10:15.996952: | aa cf 53 19 e8 ae 91 25 07 38 54 c9 39 40 63 a5 ..S....%.8T.9@c. Jan 13 23:10:15.996959: | 61 70 b5 5b 36 07 df 22 8b 4c fd 4b df bb b4 73 ap.[6..".L.K...s Jan 13 23:10:15.996965: | 86 48 d7 1c a5 58 b8 6f 29 76 e0 12 53 3e b2 b7 .H...X.o)v..S>.. Jan 13 23:10:15.996972: | 3f 49 77 fc 75 66 d2 05 a5 88 6c 52 59 01 17 a1 ?Iw.uf....lRY... Jan 13 23:10:15.996978: | bf 59 96 3d 5a a7 7f f2 ad dd 92 a0 74 25 cb b1 .Y.=Z.......t%.. Jan 13 23:10:15.996985: | f8 5a d5 05 fc 4f b6 82 17 6f db 2b b1 43 ce 5e .Z...O...o.+.C.^ Jan 13 23:10:15.996991: | 11 53 66 60 0d 0f 0c 06 e1 3b e1 bc 5e 5c 6f a7 .Sf`.....;..^\o. Jan 13 23:10:15.996997: | e7 f1 55 b5 d9 3c 0a bf 1c aa 3d ea 73 d9 1f 3f ..U..<....=.s..? Jan 13 23:10:15.997003: | bc 7f 28 84 4a d4 ea 8b 7f a4 b3 a1 23 71 2b 5b ..(.J.......#q+[ Jan 13 23:10:15.997009: | 5d 55 93 8d 26 8f c8 21 00 ef 16 a3 15 9c e1 42 ]U..&..!.......B Jan 13 23:10:15.997015: | 40 5e cd d9 5f 07 dd dc 94 1e 42 9a ef c7 51 ca @^.._.....B...Q. Jan 13 23:10:15.997031: | fd 38 56 46 d4 9c 94 f4 7a 1b f2 f5 1d 29 b1 cf .8VF....z....).. Jan 13 23:10:15.997038: | 2a 8d a5 44 0b a7 e6 8a 20 45 e2 ac b2 c9 40 c7 *..D.... E....@. Jan 13 23:10:15.997044: | b7 0c 75 f1 d2 e4 55 cc e0 2f ab 8b 4f b6 90 40 ..u...U../..O..@ Jan 13 23:10:15.997051: | b5 b9 de ef 5f 4b 6d fe de cc 58 cc ac a4 50 05 ...._Km...X...P. Jan 13 23:10:15.997057: | 92 1e 6e 3e e1 ae dd 64 15 29 aa 5e e8 23 99 5c ..n>...d.).^.#.\ Jan 13 23:10:15.997064: | d7 2b 6d 75 65 9f 6d ad 79 b0 d4 2c 60 eb 21 e2 .+mue.m.y..,`.!. Jan 13 23:10:15.997070: | f5 9e 06 c3 10 85 0f e4 d6 b8 97 e2 80 c2 c5 07 ................ Jan 13 23:10:15.997076: | ce b1 de d2 a1 98 d7 1a 6c 41 9a 57 4e 96 fa a5 ........lA.WN... Jan 13 23:10:15.997082: | 55 f4 8b 11 19 54 1c 61 b7 46 1d 4e 7a c2 de 8f U....T.a.F.Nz... Jan 13 23:10:15.997089: | b3 da ab cd 19 95 15 80 c2 cf d8 0f a2 86 3b c8 ..............;. Jan 13 23:10:15.997095: | c8 cd 15 79 12 a7 fe a4 56 d9 28 eb 20 b5 31 ea ...y....V.(. .1. Jan 13 23:10:15.997101: | 67 ce 2e 23 4a 8f 43 a4 6a 01 6b 61 d4 2b b1 fd g..#J.C.j.ka.+.. Jan 13 23:10:15.997108: | cb f8 bb 20 0e b4 16 7a fa 76 d3 ec a6 cc d9 65 ... ...z.v.....e Jan 13 23:10:15.997119: | **parse ISAKMP Message: Jan 13 23:10:15.997130: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:15.997139: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:15.997148: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Jan 13 23:10:15.997155: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:15.997161: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:15.997169: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:10:15.997179: | Message ID: 1 (00 00 00 01) Jan 13 23:10:15.997187: | length: 1248 (00 00 04 e0) Jan 13 23:10:15.997197: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Jan 13 23:10:15.997205: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Jan 13 23:10:15.997215: | State DB: found IKEv2 state #49 in PARENT_R1 (find_v2_ike_sa) Jan 13 23:10:15.997226: | #49 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Jan 13 23:10:15.997241: | Message ID: IKE #49 not a duplicate - message request 1 is new (SKEYSEED still needs to be computed): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594883.683232 ike.wip.initiator=-1 Jan 13 23:10:15.997249: | unpacking clear payload Jan 13 23:10:15.997256: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Jan 13 23:10:15.997264: | ***parse IKEv2 Encrypted Fragment: Jan 13 23:10:15.997272: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Jan 13 23:10:15.997279: | flags: none (0x0) Jan 13 23:10:15.997286: | length: 1220 (04 c4) Jan 13 23:10:15.997295: | fragment number: 1 (00 01) Jan 13 23:10:15.997303: | total fragments: 2 (00 02) Jan 13 23:10:15.997310: | processing payload: ISAKMP_NEXT_v2SKF (len=1212) Jan 13 23:10:15.997321: | looking for transition from PARENT_R1 matching IKE_AUTH request: SKF (ignoring secured payloads) Jan 13 23:10:15.997329: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 23:10:15.997336: | exchange type does not match IKE_INTERMEDIATE Jan 13 23:10:15.997342: | trying: Responder: process IKE_AUTH request Jan 13 23:10:15.997348: | matching by ignoring secured payloads Jan 13 23:10:15.997357: | received IKE encrypted fragment number '1', total number '2', next payload '35' Jan 13 23:10:15.997369: | addref struct msg_digest@0x55c838050b08(1->2) (collect_v2_incoming_fragment() +1032 programs/pluto/ikev2_message.c) Jan 13 23:10:15.997379: | delref struct msg_digest@0x55c838050b08(2->1) (collect_v2_incoming_fragment() +1084 programs/pluto/ikev2_message.c) Jan 13 23:10:15.997387: | addref struct msg_digest@0x55c838050b08(1->2) (collect_v2_incoming_fragment() +1085 programs/pluto/ikev2_message.c) Jan 13 23:10:15.997397: | submitting DH shared secret for #49/#49 (process_v2_request_no_skeyseed() +1544 programs/pluto/ikev2_ike_sa_init.c) Jan 13 23:10:15.997418: | addref struct dh_local_secret@0x7ff8bc00c8e8(1->2) (submit_dh_shared_secret() +215 programs/pluto/crypt_dh.c) Jan 13 23:10:15.997434: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:15.997442: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:15.997450: | newref clone logger@0x55c838048c78(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:15.997457: | job 59 helper 0 #49 DH shared secret (dh): added to pending queue Jan 13 23:10:15.997465: | #49 deleting EVENT_SA_DISCARD Jan 13 23:10:15.997476: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:15.997484: | delref state-event@0x55c838013358(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:10:15.997492: | #49 STATE_V2_PARENT_R1: retransmits: cleared Jan 13 23:10:15.997502: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c838013358 timeout in 60 seconds for #49 Jan 13 23:10:15.997510: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.997533: | #49 spent 1.1 (1.09) milliseconds in ikev2_process_packet() Jan 13 23:10:15.997550: | delref struct msg_digest@0x55c838050b08(2->1) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.997555: | job 59 helper 4 #49 DH shared secret (dh): started Jan 13 23:10:15.997571: | spent 1.14 (1.13) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:10:15.998108: | spent 0.00345 (0.00347) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:10:15.998152: | newref struct msg_digest@0x55c838053b58(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.998169: | addref struct iface_endpoint@0x55c83801f058(4->5) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.998184: | newref alloc logger@0x55c838031f28(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:15.998204: | *received 1024 bytes from 94.253.210.164:51417 on eth0 161.53.235.3:4500 using UDP Jan 13 23:10:15.998219: | 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f u...^2. ...Q,.. Jan 13 23:10:15.998232: | 35 20 23 08 00 00 00 01 00 00 04 00 00 00 03 e4 5 #............. Jan 13 23:10:15.998244: | 00 02 00 02 ce 2d f6 b6 99 3b 33 b2 51 f1 56 64 .....-...;3.Q.Vd Jan 13 23:10:15.998259: | 83 d1 2a 12 a8 70 79 fe 43 20 2e cb 10 e0 d1 f5 ..*..py.C ...... Jan 13 23:10:15.998270: | a5 c9 88 49 f3 27 10 cd d9 81 11 fc 85 2a b1 94 ...I.'.......*.. Jan 13 23:10:15.998280: | 95 30 60 a0 a4 34 a9 60 38 2d bb dc 48 74 0d 6b .0`..4.`8-..Ht.k Jan 13 23:10:15.998291: | 9b 16 cf dd 6d 0c ae a7 52 6a 3d c2 68 2d f5 eb ....m...Rj=.h-.. Jan 13 23:10:15.998302: | 62 72 f2 b0 bc 20 a3 50 d7 99 8b 85 5c 82 b5 59 br... .P....\..Y Jan 13 23:10:15.998312: | d4 5d 11 38 07 0f 28 aa b8 fb ad 34 04 c9 8f f1 .].8..(....4.... Jan 13 23:10:15.998323: | 51 c4 6b ae 2a ff 8a 93 14 d5 6c 55 a4 4b 8a 0e Q.k.*.....lU.K.. Jan 13 23:10:15.998337: | c7 b4 49 8b 45 f5 2d d7 5d 7d 4e ed 56 e0 40 c2 ..I.E.-.]}N.V.@. Jan 13 23:10:15.998347: | e0 c9 33 3b 48 ea 20 37 25 a1 00 d2 85 10 f5 a0 ..3;H. 7%....... Jan 13 23:10:15.998358: | 2b b0 4b 2f 14 61 c2 8f 4e 5d 33 e1 9c 7b 19 6f +.K/.a..N]3..{.o Jan 13 23:10:15.998368: | 4c a9 58 8a 2c 23 90 c7 61 13 18 7c 11 83 dd 1b L.X.,#..a..|.... Jan 13 23:10:15.998378: | 37 5a f0 18 4b 94 5f 0e 18 05 72 1f c7 bb 4c 63 7Z..K._...r...Lc Jan 13 23:10:15.998388: | 9b b5 ef 8c f7 f0 8c 85 de 42 d4 78 c4 61 f0 83 .........B.x.a.. Jan 13 23:10:15.998399: | 62 ad 5b 2c 06 df 39 72 cd aa e5 07 f6 18 57 6b b.[,..9r......Wk Jan 13 23:10:15.998413: | 3e 76 a1 5a 52 2f 15 4c 09 bb d7 02 24 51 72 a7 >v.ZR/.L....$Qr. Jan 13 23:10:15.998424: | 94 f8 14 c6 db 06 6b 16 87 7e 1a 1d bb 65 1c 25 ......k..~...e.% Jan 13 23:10:15.998434: | 82 16 54 05 c9 ce f3 4b b7 8d e5 89 4a f1 cc 18 ..T....K....J... Jan 13 23:10:15.998459: | f1 5c ba 63 b1 88 cd ac 33 5f db 8a eb 2d a1 56 .\.c....3_...-.V Jan 13 23:10:15.998470: | cf 3e 39 63 bd da c0 a3 8f 44 df 30 f4 21 9a a9 .>9c.....D.0.!.. Jan 13 23:10:15.998481: | 23 29 3f 4f c3 fc 6a 8d 73 b1 9e e9 69 08 2a f5 #)?O..j.s...i.*. Jan 13 23:10:15.998491: | 11 fb 20 42 dd 78 cb 5a 64 24 d5 94 56 3b 0a 66 .. B.x.Zd$..V;.f Jan 13 23:10:15.998501: | 2c 57 e2 29 d8 82 54 81 f3 78 98 56 55 32 0e 73 ,W.)..T..x.VU2.s Jan 13 23:10:15.998512: | bf d7 b2 9b 6f b4 07 67 3e 3a f7 89 aa 8f cf d1 ....o..g>:...... Jan 13 23:10:15.998525: | cf ed 8e d1 4d 2d a4 3b 02 3c f1 37 44 91 8e 01 ....M-.;.<.7D... Jan 13 23:10:15.998536: | 3f 74 24 6f ef 78 29 47 13 69 ef f9 69 a1 d0 7a ?t$o.x)G.i..i..z Jan 13 23:10:15.998545: | 23 a9 56 a7 a6 97 01 74 2e 0a b3 25 68 b2 aa 34 #.V....t...%h..4 Jan 13 23:10:15.998556: | 1e af ab 2b b1 8b e5 3a 06 b8 ea 79 a2 46 49 86 ...+...:...y.FI. Jan 13 23:10:15.998567: | 57 f5 12 40 1d 19 a8 5a eb 08 b8 6a ee 77 d4 1c W..@...Z...j.w.. Jan 13 23:10:15.998577: | 15 71 a1 b4 23 2f 71 2b 7b 66 b9 ea 08 dc 26 62 .q..#/q+{f....&b Jan 13 23:10:15.998587: | 9c c2 d8 f3 95 26 24 63 35 1c dd 6f 3b a1 1c de .....&$c5..o;... Jan 13 23:10:15.998597: | 3f 63 c5 c8 2d e9 e1 49 0f 71 80 2d 8b b9 b9 96 ?c..-..I.q.-.... Jan 13 23:10:15.998611: | d2 d6 d3 65 16 84 23 e6 4b 4d 14 63 b1 32 6c ff ...e..#.KM.c.2l. Jan 13 23:10:15.998621: | 1c f2 90 e3 3a b1 37 27 a8 ff ca da bf 2f ae 22 ....:.7'...../." Jan 13 23:10:15.998631: | be 18 b9 82 bc 23 42 0c 8d 56 8f 08 5f 5f c5 eb .....#B..V..__.. Jan 13 23:10:15.998643: | 75 54 cc 2d 6c d9 10 5f 1c 99 6d 88 ae c7 a9 0c uT.-l.._..m..... Jan 13 23:10:15.998656: | b9 99 c5 79 4b f9 86 5a 55 ac b8 4d ad ef 90 fe ...yK..ZU..M.... Jan 13 23:10:15.998669: | af 08 99 5d ee fa f3 ac 33 37 3d 5c 97 24 ea 64 ...]....37=\.$.d Jan 13 23:10:15.998680: | f7 5f e4 6e dc 65 3d 7a ed 4b 42 fd e5 45 ab f8 ._.n.e=z.KB..E.. Jan 13 23:10:15.998692: | 21 5a cb 53 9a bd b1 d6 3c f5 d3 90 5d 1a 96 b3 !Z.S....<...]... Jan 13 23:10:15.998705: | c4 6a 54 6a 4b 51 a1 b9 7a 5b 13 43 47 ac c7 ea .jTjKQ..z[.CG... Jan 13 23:10:15.998718: | 5e 89 fa 1b 2d 6f b2 93 9a c2 42 43 68 44 7e ab ^...-o....BChD~. Jan 13 23:10:15.998730: | c6 b4 52 11 bd a2 b4 7b 54 ea e7 b4 dc 5f c8 3a ..R....{T...._.: Jan 13 23:10:15.998741: | 1f 99 e0 ab 4d 22 9f be 03 e9 7b 57 d7 92 60 b4 ....M"....{W..`. Jan 13 23:10:15.998753: | c0 b5 79 8f 6d df d3 00 4c bd 4c 97 4a 94 8f a3 ..y.m...L.L.J... Jan 13 23:10:15.998765: | 59 10 8e 86 98 aa 1d 0d d7 b7 6c 16 be 80 80 fb Y.........l..... Jan 13 23:10:15.998776: | dc 18 e8 9b c4 a5 b5 df e0 4e 42 45 e1 94 16 41 .........NBE...A Jan 13 23:10:15.998788: | 42 2c 34 ba 5d ab 27 7e f8 e7 35 ee f3 b3 d9 d1 B,4.].'~..5..... Jan 13 23:10:15.998801: | 2c 59 8a 01 46 f4 f3 3a 98 58 ca 1b 34 07 ed e2 ,Y..F..:.X..4... Jan 13 23:10:15.998813: | 3d 13 0d da e7 3c b3 89 48 b7 f2 2f ca 56 50 1e =....<..H../.VP. Jan 13 23:10:15.998825: | a4 32 74 a8 62 b4 e8 5a 06 2b ca 36 f3 7a 38 54 .2t.b..Z.+.6.z8T Jan 13 23:10:15.998837: | a7 85 47 1b eb 4e 6d d4 32 bb 2d 82 c4 ec 14 16 ..G..Nm.2.-..... Jan 13 23:10:15.998848: | ad 8a f8 4f 4f 90 76 f7 cb b8 74 77 04 c0 f0 af ...OO.v...tw.... Jan 13 23:10:15.998858: | 02 55 6f 89 13 65 d3 3e e3 39 8c 39 54 a0 3c 5f .Uo..e.>.9.9T.<_ Jan 13 23:10:15.998870: | e0 30 77 42 3b 7f 06 f9 bc e8 a4 b0 30 db c7 bc .0wB;.......0... Jan 13 23:10:15.998883: | 1b cc 92 58 d6 c7 65 2d 6d 5e db d6 a2 b7 c6 e6 ...X..e-m^...... Jan 13 23:10:15.998895: | 26 75 ea 25 3a 22 71 62 bd dc 2c 58 4d f9 1b eb &u.%:"qb..,XM... Jan 13 23:10:15.998906: | 39 6f c1 e6 67 14 e4 70 11 8a c8 ab 8c 16 d7 ee 9o..g..p........ Jan 13 23:10:15.998918: | 00 d7 20 cf d7 8c 57 5d a6 37 10 e6 8d 08 d2 2e .. ...W].7...... Jan 13 23:10:15.998931: | 83 0e c1 33 41 d2 8b 06 47 0a f3 49 8d 67 42 5b ...3A...G..I.gB[ Jan 13 23:10:15.998957: | 5d 57 b1 7a fa 84 f8 2e 15 5f 78 f5 43 4a d5 40 ]W.z....._x.CJ.@ Jan 13 23:10:15.998969: | 06 df e3 eb 94 35 f0 68 bb 7e 67 13 fb e1 7f d0 .....5.h.~g..... Jan 13 23:10:15.998983: | **parse ISAKMP Message: Jan 13 23:10:15.999000: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:15.999015: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:15.999028: | next payload type: ISAKMP_NEXT_v2SKF (0x35) Jan 13 23:10:15.999040: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:15.999053: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:15.999067: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:10:15.999081: | Message ID: 1 (00 00 00 01) Jan 13 23:10:15.999095: | length: 1024 (00 00 04 00) Jan 13 23:10:15.999108: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Jan 13 23:10:15.999119: | I am the IKE SA Original Responder receiving an IKEv2 IKE_AUTH request Jan 13 23:10:15.999133: | State DB: found IKEv2 state #49 in PARENT_R1 (find_v2_ike_sa) Jan 13 23:10:15.999150: | #49 spent 1.05 (1.05) milliseconds Jan 13 23:10:15.999164: | #49 st.st_msgid_lastrecv 0 md.hdr.isa_msgid 00000001 Jan 13 23:10:15.999184: | Message ID: IKE #49 not a duplicate - responder is accumulating encrypted fragments for message with request 1 (SKEYSEED is being computed): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0 .recv=0 .recv_frags=0 .last_contact=9594883.683232 ike.wip.initiator=-1 Jan 13 23:10:15.999196: | unpacking clear payload Jan 13 23:10:15.999207: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) Jan 13 23:10:15.999219: | ***parse IKEv2 Encrypted Fragment: Jan 13 23:10:15.999232: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:15.999245: | flags: none (0x0) Jan 13 23:10:15.999259: | length: 996 (03 e4) Jan 13 23:10:15.999272: | fragment number: 2 (00 02) Jan 13 23:10:15.999285: | total fragments: 2 (00 02) Jan 13 23:10:15.999298: | processing payload: ISAKMP_NEXT_v2SKF (len=988) Jan 13 23:10:15.999312: | looking for transition from PARENT_R1 matching IKE_AUTH request: SKF (ignoring secured payloads) Jan 13 23:10:15.999323: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 23:10:15.999335: | exchange type does not match IKE_INTERMEDIATE Jan 13 23:10:15.999348: | trying: Responder: process IKE_AUTH request Jan 13 23:10:15.999360: | matching by ignoring secured payloads Jan 13 23:10:15.999373: | received IKE encrypted fragment number '2', total number '2', next payload '0' Jan 13 23:10:15.999394: | #49 spent 1.29 (1.29) milliseconds in ikev2_process_packet() Jan 13 23:10:15.999409: | delref struct msg_digest@0x55c838053b58(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.999422: | delref logger@0x55c838031f28(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.999435: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.999448: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.999463: | delref struct iface_endpoint@0x55c83801f058(5->4) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:15.999480: | spent 1.38 (1.38) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:10:15.999712: | newref : g_ir-key@0x55c838026d80 (256-bytes, CONCATENATE_DATA_AND_BASE) Jan 13 23:10:15.999733: | job 59 helper 4 #49 DH shared secret (dh): finished Jan 13 23:10:15.999746: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 2.19 (2.19) milliseconds in job 59 helper 4 #49 DH shared secret (dh) Jan 13 23:10:15.999754: | scheduling resume sending job back to main thread for #49 Jan 13 23:10:15.999764: | newref tt@0x7ff8b00025a8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:15.999779: | helper 4: waiting for work Jan 13 23:10:15.999794: | processing resume sending job back to main thread for #49 Jan 13 23:10:15.999826: | suspend: no MD saved in state #49 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:10:15.999836: | job 59 helper 4 #49 DH shared secret (dh): calling state's callback function Jan 13 23:10:15.999843: | completing DH shared secret for #49/#49 Jan 13 23:10:15.999850: | complete_dh_shared_secret: delref st_dh_shared_secret-key@NULL Jan 13 23:10:15.999858: | process_v2_request_no_skeyseed_continue() for #49 STATE_V2_PARENT_R1: calculating g^{xy}, sending R2 Jan 13 23:10:15.999865: | calculating skeyseed using prf=HMAC_SHA2_512 integ=NONE cipherkey-size=32 salt-size=4 Jan 13 23:10:15.999920: | result: newref Ni | Nr-key@0x55c83801c850 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:15.999944: | result: newref Ni | Nr-key@0x55c838012940 (64-bytes, SHA512_HMAC)(init_bytes() +117 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:15.999953: | Ni | Nr: delref tmp-key@0x55c83801c850 Jan 13 23:10:15.999978: | SKEYSEED = prf(Ni | Nr, g^ir): delref clone-key@0x55c838012940 Jan 13 23:10:16.000002: | nss hmac digest hack: newref slot-key@0x55c838003da0 (256-bytes, CONCATENATE_DATA_AND_BASE) Jan 13 23:10:16.000031: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000081: | result: newref final-key@0x55c83801c850 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000102: | result: newref final-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000111: | final: delref tmp-key@0x55c83801c850 Jan 13 23:10:16.000147: | result: newref data=Ni-key@0x55c838041fd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000167: | result: newref data=Ni-key@0x55c83801c850 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000175: | data=Ni: delref tmp-key@0x55c838041fd0 Jan 13 23:10:16.000194: | result: newref data+=Nr-key@0x55c838041fd0 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000203: | append_symkey_bytes: delref lhs-key@0x55c83801c850 Jan 13 23:10:16.000222: | result: newref data+=SPIi-key@0x55c83801c850 (72-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000230: | append_symkey_bytes: delref lhs-key@0x55c838041fd0 Jan 13 23:10:16.000249: | result: newref data+=SPIr-key@0x55c838041fd0 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000258: | append_symkey_bytes: delref lhs-key@0x55c83801c850 Jan 13 23:10:16.000276: | result: newref clone-key@0x55c83801c850 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.000293: | prf+0: delref clone-key@0x55c83801c850 Jan 13 23:10:16.000327: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.000358: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000405: | result: newref final-key@0x55c8380199c0 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000426: | result: newref final-key@0x55c83801c850 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000436: | final: delref tmp-key@0x55c8380199c0 Jan 13 23:10:16.000445: | prfplus: addref old_t[1]-key@0x55c83801c850 Jan 13 23:10:16.000462: | result: newref clone-key@0x55c8380199c0 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.000478: | prf+N: delref clone-key@0x55c8380199c0 Jan 13 23:10:16.000498: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.000517: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000537: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.000564: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000610: | result: newref final-key@0x55c838026c40 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000631: | result: newref final-key@0x55c8380199c0 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000640: | final: delref tmp-key@0x55c838026c40 Jan 13 23:10:16.000661: | result: newref result-key@0x55c838026c40 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000670: | append_symkey_symkey: delref lhs-key@0x55c83801c850 Jan 13 23:10:16.000676: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 23:10:16.000694: | result: newref clone-key@0x55c83801c850 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.000711: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:10:16.000733: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.000753: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000772: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.000790: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000833: | result: newref final-key@0x55c838029d60 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000854: | result: newref final-key@0x55c83801c850 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000863: | final: delref tmp-key@0x55c838029d60 Jan 13 23:10:16.000883: | result: newref result-key@0x55c838029d60 (192-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.000892: | append_symkey_symkey: delref lhs-key@0x55c838026c40 Jan 13 23:10:16.000900: | prfplus: delref old_t[N]-key@0x55c8380199c0 Jan 13 23:10:16.000917: | result: newref clone-key@0x55c8380199c0 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.000934: | prf+N: delref clone-key@0x55c8380199c0 Jan 13 23:10:16.000952: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.000970: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.000989: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001006: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001048: | result: newref final-key@0x55c838026c40 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.001068: | result: newref final-key@0x55c8380199c0 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.001076: | final: delref tmp-key@0x55c838026c40 Jan 13 23:10:16.001096: | result: newref result-key@0x55c838026c40 (256-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.001105: | append_symkey_symkey: delref lhs-key@0x55c838029d60 Jan 13 23:10:16.001114: | prfplus: delref old_t[N]-key@0x55c83801c850 Jan 13 23:10:16.001131: | result: newref clone-key@0x55c83801c850 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.001150: | prf+N: delref clone-key@0x55c83801c850 Jan 13 23:10:16.001170: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001189: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001208: | nss hmac digest hack: newref slot-key@0x55c838003da0 (80-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001226: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001268: | result: newref final-key@0x55c838029d60 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.001297: | result: newref final-key@0x55c83801c850 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.001306: | final: delref tmp-key@0x55c838029d60 Jan 13 23:10:16.001326: | result: newref result-key@0x55c838029d60 (320-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.001336: | append_symkey_symkey: delref lhs-key@0x55c838026c40 Jan 13 23:10:16.001344: | prfplus: delref old_t[N]-key@0x55c8380199c0 Jan 13 23:10:16.001353: | prfplus: delref old_t[final]-key@0x55c83801c850 Jan 13 23:10:16.001363: | ike_sa_keymat: delref data-key@0x55c838041fd0 Jan 13 23:10:16.001372: | calc_skeyseed_v2: delref skeyseed-key@0x55c838012940 Jan 13 23:10:16.001391: | result: newref SK_d-key@0x55c838012940 (64-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +115 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001410: | result: newref SK_ei-key@0x55c838041fd0 (32-bytes, AES_GCM)(calc_skeyseed_v2() +135 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001427: | result: newref initiator salt-key@0x55c83801c850 (4-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +142 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001445: | initiator salt: newref slot-key@0x55c838003da0 (4-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001469: | initiator salt: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001482: | calc_skeyseed_v2: delref initiator-salt-key-key@0x55c83801c850 Jan 13 23:10:16.001500: | result: newref SK_er_k-key@0x55c83801c850 (32-bytes, AES_GCM)(calc_skeyseed_v2() +156 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001518: | result: newref responder salt-key@0x55c8380199c0 (4-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +163 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001535: | responder salt: newref slot-key@0x55c838003da0 (4-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001553: | responder salt: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001564: | calc_skeyseed_v2: delref responder-salt-key-key@0x55c8380199c0 Jan 13 23:10:16.001582: | result: newref SK_pi-key@0x55c8380199c0 (64-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +172 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001599: | chunk_SK_pi: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001616: | chunk_SK_pi: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001636: | result: newref SK_pr-key@0x55c838026c40 (64-bytes, EXTRACT_KEY_FROM_KEY)(calc_skeyseed_v2() +180 programs/pluto/crypt_dh_v2.c) Jan 13 23:10:16.001654: | chunk_SK_pr: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.001674: | chunk_SK_pr: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.001686: | calc_skeyseed_v2: delref finalkey-key@0x55c838029d60 Jan 13 23:10:16.001710: | stripping 1 octets as pad Jan 13 23:10:16.001720: | saved fragment 1 of 2 decrypted Jan 13 23:10:16.001736: | stripping 1 octets as pad Jan 13 23:10:16.001745: | saved fragment 2 of 2 decrypted Jan 13 23:10:16.001752: | reassembling incoming fragments Jan 13 23:10:16.001760: | addref struct msg_digest@0x55c838050b08(1->2) (reassemble_v2_incoming_fragments() +1150 programs/pluto/ikev2_message.c) Jan 13 23:10:16.001771: | delref struct msg_digest@0x55c838050b08(2->1) (free_v2_incoming_fragments() +554 programs/pluto/ikev2_send.c) Jan 13 23:10:16.001780: | Now let's proceed with payload (ISAKMP_NEXT_v2IDi) Jan 13 23:10:16.001789: | **parse IKEv2 Identification - Initiator - Payload: Jan 13 23:10:16.001798: | next payload type: ISAKMP_NEXT_v2CERT (0x25) Jan 13 23:10:16.001805: | flags: none (0x0) Jan 13 23:10:16.001813: | length: 58 (00 3a) Jan 13 23:10:16.001821: | ID type: ID_DER_ASN1_DN (0x9) Jan 13 23:10:16.001829: | reserved: 00 00 00 Jan 13 23:10:16.001835: | processing payload: ISAKMP_NEXT_v2IDi (len=50) Jan 13 23:10:16.001842: | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) Jan 13 23:10:16.001849: | **parse IKEv2 Certificate Payload: Jan 13 23:10:16.001857: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) Jan 13 23:10:16.001874: | flags: none (0x0) Jan 13 23:10:16.001883: | length: 1327 (05 2f) Jan 13 23:10:16.001889: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 23:10:16.001896: | processing payload: ISAKMP_NEXT_v2CERT (len=1322) Jan 13 23:10:16.001902: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) Jan 13 23:10:16.001909: | **parse IKEv2 Certificate Request Payload: Jan 13 23:10:16.001915: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) Jan 13 23:10:16.001922: | flags: none (0x0) Jan 13 23:10:16.001929: | length: 25 (00 19) Jan 13 23:10:16.001936: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 23:10:16.001944: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=20) Jan 13 23:10:16.001951: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) Jan 13 23:10:16.001958: | **parse IKEv2 Authentication Payload: Jan 13 23:10:16.001966: | next payload type: ISAKMP_NEXT_v2CP (0x2f) Jan 13 23:10:16.001973: | flags: none (0x0) Jan 13 23:10:16.001980: | length: 520 (02 08) Jan 13 23:10:16.001988: | auth method: IKEv2_AUTH_RSA (0x1) Jan 13 23:10:16.001995: | processing payload: ISAKMP_NEXT_v2AUTH (len=512) Jan 13 23:10:16.002004: | Now let's proceed with payload (ISAKMP_NEXT_v2CP) Jan 13 23:10:16.002011: | **parse IKEv2 Configuration Payload: Jan 13 23:10:16.002020: | next payload type: ISAKMP_NEXT_v2SA (0x21) Jan 13 23:10:16.002027: | flags: none (0x0) Jan 13 23:10:16.002034: | length: 16 (00 10) Jan 13 23:10:16.002040: | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) Jan 13 23:10:16.002046: | processing payload: ISAKMP_NEXT_v2CP (len=8) Jan 13 23:10:16.002052: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Jan 13 23:10:16.002059: | **parse IKEv2 Security Association Payload: Jan 13 23:10:16.002068: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) Jan 13 23:10:16.002074: | flags: none (0x0) Jan 13 23:10:16.002081: | length: 124 (00 7c) Jan 13 23:10:16.002090: | processing payload: ISAKMP_NEXT_v2SA (len=120) Jan 13 23:10:16.002096: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) Jan 13 23:10:16.002103: | **parse IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:10:16.002109: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) Jan 13 23:10:16.002115: | flags: none (0x0) Jan 13 23:10:16.002122: | length: 24 (00 18) Jan 13 23:10:16.002130: | number of TS: 1 (01) Jan 13 23:10:16.002136: | processing payload: ISAKMP_NEXT_v2TSi (len=16) Jan 13 23:10:16.002142: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) Jan 13 23:10:16.002149: | **parse IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:10:16.002155: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:16.002162: | flags: none (0x0) Jan 13 23:10:16.002169: | length: 24 (00 18) Jan 13 23:10:16.002175: | number of TS: 1 (01) Jan 13 23:10:16.002182: | processing payload: ISAKMP_NEXT_v2TSr (len=16) Jan 13 23:10:16.002188: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:16.002195: | **parse IKEv2 Notify Payload: Jan 13 23:10:16.002201: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:16.002208: | flags: none (0x0) Jan 13 23:10:16.002215: | length: 8 (00 08) Jan 13 23:10:16.002221: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:16.002228: | SPI size: 0 (00) Jan 13 23:10:16.002235: | Notify Message Type: v2N_MOBIKE_SUPPORTED (0x400c) Jan 13 23:10:16.002241: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:16.002248: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:16.002254: | **parse IKEv2 Notify Payload: Jan 13 23:10:16.002261: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:16.002267: | flags: none (0x0) Jan 13 23:10:16.002275: | length: 8 (00 08) Jan 13 23:10:16.002281: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:16.002288: | SPI size: 0 (00) Jan 13 23:10:16.002295: | Notify Message Type: v2N_NO_ADDITIONAL_ADDRESSES (0x400f) Jan 13 23:10:16.002301: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:16.002307: | status notification v2N_NO_ADDITIONAL_ADDRESSES is not supported Jan 13 23:10:16.002320: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:16.002327: | **parse IKEv2 Notify Payload: Jan 13 23:10:16.002334: | next payload type: ISAKMP_NEXT_v2N (0x29) Jan 13 23:10:16.002340: | flags: none (0x0) Jan 13 23:10:16.002347: | length: 8 (00 08) Jan 13 23:10:16.002356: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:16.002364: | SPI size: 0 (00) Jan 13 23:10:16.002370: | Notify Message Type: v2N_EAP_ONLY_AUTHENTICATION (0x4021) Jan 13 23:10:16.002377: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:16.002383: | status notification v2N_EAP_ONLY_AUTHENTICATION is not supported Jan 13 23:10:16.002392: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Jan 13 23:10:16.002398: | **parse IKEv2 Notify Payload: Jan 13 23:10:16.002405: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.002412: | flags: none (0x0) Jan 13 23:10:16.002419: | length: 8 (00 08) Jan 13 23:10:16.002425: | Protocol ID: IKEv2_SEC_PROTO_NONE (0x0) Jan 13 23:10:16.002432: | SPI size: 0 (00) Jan 13 23:10:16.002441: | Notify Message Type: v2N_IKEV2_MESSAGE_ID_SYNC_SUPPORTED (0x4024) Jan 13 23:10:16.002447: | processing payload: ISAKMP_NEXT_v2N (len=0) Jan 13 23:10:16.002454: | status notification v2N_IKEV2_MESSAGE_ID_SYNC_SUPPORTED is not supported Jan 13 23:10:16.002465: | looking for transition from PARENT_R1 matching IKE_AUTH request: SK{IDi,CERT,CERTREQ,AUTH,CP,SA,TSi,TSr,N,N,N,N} Jan 13 23:10:16.002473: | trying: Responder: process IKE_INTERMEDIATE request Jan 13 23:10:16.002479: | exchange type does not match IKE_INTERMEDIATE Jan 13 23:10:16.002485: | trying: Responder: process IKE_AUTH request Jan 13 23:10:16.002491: | secured message matched Jan 13 23:10:16.002498: | selected state microcode Responder: process IKE_AUTH request Jan 13 23:10:16.002507: | #49.st_v2_transition PARENT_R0->PARENT_R1 -> PARENT_R1->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:10:16.002521: | Message ID: IKE #49 responder starting message request 1: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0 .recv=0 .recv_frags=0 .recv_wip=1 .last_contact=9594883.683232 ike.wip.initiator=-1 Jan 13 23:10:16.002530: | calling processor Responder: process IKE_AUTH request Jan 13 23:10:16.002541: | #49 spent 2.71 (2.71) milliseconds Jan 13 23:10:16.002556: "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: processing decrypted IKE_AUTH request: SK{IDi,CERT,CERTREQ,AUTH,CP,SA,TSi,TSr,N,N,N,N} Jan 13 23:10:16.002567: | addref struct msg_digest@0x55c838050b08(1->2) (submit_cert_decode() +81 programs/pluto/cert_decode_helper.c) Jan 13 23:10:16.002576: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds Jan 13 23:10:16.002585: | loading root certificate cache Jan 13 23:10:16.002594: | newref struct root_certs@0x55c838025548(0->1) (submit_cert_decode() +80 programs/pluto/cert_decode_helper.c) Jan 13 23:10:16.002603: | addref struct root_certs@0x55c838025548(1->2) (submit_cert_decode() +80 programs/pluto/cert_decode_helper.c) Jan 13 23:10:16.003097: | spent 0.476 (0.476) milliseconds in root_certs_addref() calling PK11_ListCertsInSlot() Jan 13 23:10:16.003125: | adding the CA+root cert O=ALU-UNIZG,CN=ALU-UNIZG CA Jan 13 23:10:16.003135: | discarding non-CA cert O=ALU-UNIZG,CN=vpn.alu.hr Jan 13 23:10:16.003147: | spent 0.0269 (0.0269) milliseconds in root_certs_addref() filtering CAs Jan 13 23:10:16.003164: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:16.003171: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:16.003179: | newref clone logger@0x55c8380523a8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:16.003186: | job 60 helper 0 #49 responder decoding certificates (decode certificate payload): added to pending queue Jan 13 23:10:16.003194: | #49 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:10:16.003203: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:16.003222: | delref state-event@0x55c838013358(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:10:16.003230: | #49 STATE_V2_PARENT_R1: retransmits: cleared Jan 13 23:10:16.003240: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c838013358 timeout in 60 seconds for #49 Jan 13 23:10:16.003251: | newref tt@0x55c83803c7c8(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.003263: | process_v2_IKE_AUTH_request_continue_tail returned STF_SUSPEND Jan 13 23:10:16.003275: | #49 complete_v2_state_transition() PARENT_R1->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 23:10:16.003288: | suspend: saving MD@0x55c838050b08 in state #49 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:10:16.003290: | job 60 helper 5 #49 responder decoding certificates (decode certificate payload): started Jan 13 23:10:16.003297: | addref struct msg_digest@0x55c838050b08(2->3) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:10:16.003326: | checking for known CERT payloads Jan 13 23:10:16.003341: | #49 is busy; has suspended MD 0x55c838050b08 Jan 13 23:10:16.003357: | saving certificate of type 'X509_SIGNATURE' Jan 13 23:10:16.003375: | #49 spent 0.802 (0.833) milliseconds in processing: Responder: process IKE_AUTH request in v2_dispatch() Jan 13 23:10:16.003395: | delref struct msg_digest@0x55c838050b08(3->2) (process_v2_request_no_skeyseed_continue() +1602 programs/pluto/ikev2_ike_sa_init.c) Jan 13 23:10:16.003404: | job 59 helper 4 #49 DH shared secret (dh): final status STF_SKIP_COMPLETE_STATE_TRANSITION; cleaning up Jan 13 23:10:16.003413: | delref struct dh_local_secret@0x7ff8bc00c8e8(2->1) (cleanup_dh_shared_secret() +173 programs/pluto/crypt_dh.c) Jan 13 23:10:16.003420: | DH: delref secret-key@NULL Jan 13 23:10:16.003428: | delref logger@0x55c838048c78(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.003435: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.003442: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.003450: | resume sending job back to main thread for #49 suppresed complete_v2_state_transition() Jan 13 23:10:16.003458: | delref mdp@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.003469: | #49 spent 3.61 (3.64) milliseconds in resume sending job back to main thread Jan 13 23:10:16.003479: | delref tt@0x7ff8b00025a8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:16.003494: | decoded cert: O=ALU-UNIZG,CN=win7client.alu.hr Jan 13 23:10:16.003528: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 0.178 (0.195) milliseconds in find_and_verify_certs() calling decode_cert_payloads() Jan 13 23:10:16.003550: | cert_issuer_has_current_crl: looking for a CRL issued by O=ALU-UNIZG,CN=ALU-UNIZG CA Jan 13 23:10:16.003738: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 0.181 (0.181) milliseconds in find_and_verify_certs() calling crl_update_check() Jan 13 23:10:16.003762: | missing or expired CRL Jan 13 23:10:16.003780: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 Jan 13 23:10:16.003794: | verify_end_cert verifying O=ALU-UNIZG,CN=win7client.alu.hr using: Jan 13 23:10:16.003808: | trusted CA: O=ALU-UNIZG,CN=ALU-UNIZG CA Jan 13 23:10:16.003821: | verify_end_cert trying profile IPsec Jan 13 23:10:16.004982: | certificate is valid (profile IPsec) Jan 13 23:10:16.005020: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 1.24 (1.24) milliseconds in find_and_verify_certs() calling verify_end_cert() Jan 13 23:10:16.005206: | newref struct pubkey@0x7ff8b4005328(0->1) (create_pubkey_from_cert_1() +1717 lib/libswan/secrets.c) Jan 13 23:10:16.005246: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x7ff8b40012a8 Jan 13 23:10:16.005262: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x7ff8b4001a88 Jan 13 23:10:16.005420: | newref struct pubkey@0x7ff8b4003338(0->1) (create_pubkey_from_cert_1() +1717 lib/libswan/secrets.c) Jan 13 23:10:16.005597: | newref struct pubkey@0x7ff8b400afa8(0->1) (create_pubkey_from_cert_1() +1717 lib/libswan/secrets.c) Jan 13 23:10:16.005645: | delref struct pubkey@0x7ff8b4005328(1->0) (free_public_keyentry() +1346 lib/libswan/secrets.c) Jan 13 23:10:16.005676: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 0.633 (0.634) milliseconds in find_and_verify_certs() calling add_pubkey_from_nss_cert() Jan 13 23:10:16.005695: | job 60 helper 5 #49 responder decoding certificates (decode certificate payload): finished Jan 13 23:10:16.005712: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 2.41 (2.42) milliseconds in job 60 helper 5 #49 responder decoding certificates (decode certificate payload) Jan 13 23:10:16.005726: | scheduling resume sending job back to main thread for #49 Jan 13 23:10:16.005741: | newref tt@0x7ff8b4010868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.005763: | helper 5: waiting for work Jan 13 23:10:16.005804: | processing resume sending job back to main thread for #49 Jan 13 23:10:16.005839: | suspend: restoring MD@0x55c838050b08 from state #49 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:10:16.005849: | job 60 helper 5 #49 responder decoding certificates (decode certificate payload): calling state's callback function Jan 13 23:10:16.005857: | certificate verified OK: O=ALU-UNIZG,CN=win7client.alu.hr Jan 13 23:10:16.005869: | #49 updating local interface from 161.53.235.3:500 to 161.53.235.3:4500 using md->iface (update_ike_endpoints() +2545 programs/pluto/state.c) Jan 13 23:10:16.005877: | delref struct iface_endpoint@0x55c83801ef68(10->9) (update_ike_endpoints() +2546 programs/pluto/state.c) Jan 13 23:10:16.005885: | addref struct iface_endpoint@0x55c83801f058(4->5) (update_ike_endpoints() +2547 programs/pluto/state.c) Jan 13 23:10:16.005894: | DER ASN1 DN: Jan 13 23:10:16.005901: | 30 30 31 1a 30 18 06 03 55 04 03 13 11 77 69 6e 001.0...U....win Jan 13 23:10:16.005908: | 37 63 6c 69 65 6e 74 2e 61 6c 75 2e 68 72 31 12 7client.alu.hr1. Jan 13 23:10:16.005914: | 30 10 06 03 55 04 0a 13 09 41 4c 55 2d 55 4e 49 0...U....ALU-UNI Jan 13 23:10:16.005921: | 5a 47 ZG Jan 13 23:10:16.005934: | initiator ID is ID_DER_ASN1_DN: 'CN=win7client.alu.hr, O=ALU-UNIZG' Jan 13 23:10:16.005943: | CR Jan 13 23:10:16.005950: | d8 18 a0 99 8b 0d 79 d4 5c 2e 82 10 43 4e e2 99 ......y.\...CN.. Jan 13 23:10:16.005956: | 45 05 57 ff E.W. Jan 13 23:10:16.005962: | cert blob content is not binary ASN.1 Jan 13 23:10:16.005973: "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: ignoring CERTREQ payload that is not ASN1 Jan 13 23:10:16.005984: | rhc: looking for an IKEv2 connection more refined than "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.005995: | rhc: trying connections matching 161.53.235.3->94.253.210.164 Jan 13 23:10:16.006007: | FOR_EACH_HOST_PAIR_CONNECTION(94.253.210.164->161.53.235.3) in (refine_host_connection_on_responder() +234 programs/pluto/peer_id.c) Jan 13 23:10:16.006021: | host_pair: 94.253.210.164->161.53.235.3 matches "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.006032: | rhc: checking "MYCONN-ikev2-cp"[2] 94.253.210.164 against existing "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.006042: | rhc: no IDr payload received from peer Jan 13 23:10:16.006054: | get_connection_private_key() using certificate vpn.alu.hr to find private key for @vpn.alu.hr->O=ALU-UNIZG, CN=win7client.alu.hr of kind RSA Jan 13 23:10:16.006209: | trying secret PKK_RSA:AwEAAaDIW Jan 13 23:10:16.006227: | matched Jan 13 23:10:16.006234: | secrets entry for certificate already exists: vpn.alu.hr Jan 13 23:10:16.006245: | connection MYCONN-ikev2-cp's RSA private key found in NSS DB using cert Jan 13 23:10:16.006257: | rhc: match_dn_any_order_wild: not an exact match, now checking any RDN order with 0 wildcards Jan 13 23:10:16.006270: | rhc: matching unordered DNs A: 'CN=win7client.alu.hr, O=ALU-UNIZG' B: 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 23:10:16.006297: | rhc: match_dn_unordered matched: 2, rdn_num: 2, wc 0 Jan 13 23:10:16.006321: | rhc: match_id a=CN=win7client.alu.hr, O=ALU-UNIZG Jan 13 23:10:16.006330: | rhc: b=O=ALU-UNIZG, CN=win7client.alu.hr Jan 13 23:10:16.006337: | rhc: results matched wildcards=0 Jan 13 23:10:16.006347: | trusted_ca_nss: trustee A = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.006357: | trusted_ca_nss: trustor B = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.006366: | rhc: matching_peer_ca=yes(0)/matching_request_ca=yes(0)) Jan 13 23:10:16.006376: | rhc: returning "MYCONN-ikev2-cp"[2] 94.253.210.164 because exact peer id match Jan 13 23:10:16.006385: | rhc: returning TRUE as "MYCONN-ikev2-cp"[2] 94.253.210.164 is most refined Jan 13 23:10:16.006394: | rhc: most refined is "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.006401: | rhc: comparing certificate: O=ALU-UNIZG,CN=win7client.alu.hr Jan 13 23:10:16.006415: | comparing ID_DER_ASN1_DN 'O=ALU-UNIZG, CN=win7client.alu.hr' to certificate derSubject='CN=win7client.alu.hr, O=ALU-UNIZG' (subjectName='O=ALU-UNIZG,CN=win7client.alu.hr') Jan 13 23:10:16.006425: | match_dn_any_order_wild: not an exact match, now checking any RDN order with 0 wildcards Jan 13 23:10:16.006436: | matching unordered DNs A: 'CN=win7client.alu.hr, O=ALU-UNIZG' B: 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 23:10:16.006456: | match_dn_unordered matched: 2, rdn_num: 2, wc 0 Jan 13 23:10:16.006467: | ID_DER_ASN1_DN 'O=ALU-UNIZG,CN=win7client.alu.hr' matched our ID 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 23:10:16.006474: | X509: CERT and ID matches current connection Jan 13 23:10:16.006483: | received v2N_MOBIKE_SUPPORTED while it did not sent Jan 13 23:10:16.006509: | result: newref clone-key@0x55c838029d60 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.006531: | IDi verify hash: delref clone-key@0x55c838029d60 Jan 13 23:10:16.006555: | responder verifying AUTH payload Jan 13 23:10:16.006589: | required RSA CA is 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.006603: | trying all 'peer's for RSA key that matches ID: O=ALU-UNIZG, CN=win7client.alu.hr Jan 13 23:10:16.006611: | match_dn_any_order_wild: not an exact match, now checking any RDN order with 0 wildcards Jan 13 23:10:16.006626: | matching unordered DNs A: 'CN=win7client.alu.hr, O=ALU-UNIZG' B: 'O=ALU-UNIZG, CN=win7client.alu.hr' Jan 13 23:10:16.006646: | match_dn_unordered matched: 2, rdn_num: 2, wc 0 Jan 13 23:10:16.006657: | match_id a=CN=win7client.alu.hr, O=ALU-UNIZG Jan 13 23:10:16.006666: | b=O=ALU-UNIZG, CN=win7client.alu.hr Jan 13 23:10:16.006672: | results matched wildcards=0 Jan 13 23:10:16.006681: | trusted_ca_nss: trustee A = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.006692: | trusted_ca_nss: trustor B = 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.006702: | trying 'CN=win7client.alu.hr, O=ALU-UNIZG' aka *AwEAAbxfe issued by CA 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.006713: | NSS RSA: verifying that decrypted signature matches hash: Jan 13 23:10:16.006722: | 86 d9 30 38 a7 47 17 ad 98 85 41 73 c5 6f 8f b9 ..08.G....As.o.. Jan 13 23:10:16.006731: | e2 a3 86 7d ...} Jan 13 23:10:16.007158: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 0.435 (0.435) milliseconds in try_all_keys() trying a pubkey Jan 13 23:10:16.007177: | 'AwEAAbxfe' passed Jan 13 23:10:16.007194: "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: established IKE SA; authenticated using RSA with SHA1 and peer certificate 'CN=win7client.alu.hr, O=ALU-UNIZG' issued by CA 'CN=ALU-UNIZG CA, O=ALU-UNIZG' Jan 13 23:10:16.007204: | delref pkp@NULL (authsig_and_log_using_pubkey() +562 programs/pluto/keys.c) Jan 13 23:10:16.007213: | addref struct pubkey@0x7ff8b400afa8(1->2) (authsig_and_log_using_pubkey() +563 programs/pluto/keys.c) Jan 13 23:10:16.007226: | #49 spent 0.656 (0.655) milliseconds in v2_authsig_and_log_using_RSA_pubkey() Jan 13 23:10:16.007252: | result: newref clone-key@0x55c838029d60 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.007284: | IDr: delref clone-key@0x55c838029d60 Jan 13 23:10:16.007326: | get_connection_private_key() using certificate vpn.alu.hr to find private key for @vpn.alu.hr->O=ALU-UNIZG, CN=win7client.alu.hr of kind RSA Jan 13 23:10:16.007455: | trying secret PKK_RSA:AwEAAaDIW Jan 13 23:10:16.007472: | matched Jan 13 23:10:16.007479: | secrets entry for certificate already exists: vpn.alu.hr Jan 13 23:10:16.007489: | connection MYCONN-ikev2-cp's RSA private key found in NSS DB using cert Jan 13 23:10:16.007505: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:16.007514: | addref fd@NULL (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:16.007522: | newref clone logger@0x55c838017ee8(0->1) (submit_task() +347 programs/pluto/server_pool.c) Jan 13 23:10:16.007531: | job 61 helper 0 #49 computing responder signature (signature): added to pending queue Jan 13 23:10:16.007539: | #49 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:10:16.007549: | delref tt@0x55c83803c7c8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:16.007558: | delref state-event@0x55c838013358(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:10:16.007566: | #49 STATE_V2_PARENT_R1: retransmits: cleared Jan 13 23:10:16.007578: | event_schedule_where: newref EVENT_CRYPTO_TIMEOUT-pe@0x55c838013358 timeout in 60 seconds for #49 Jan 13 23:10:16.007588: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.007604: | job 60 helper 5 #49 responder decoding certificates (decode certificate payload): final status STF_SUSPEND; cleaning up Jan 13 23:10:16.007621: | delref struct msg_digest@0x55c838050b08(2->1) (cert_decode_cleanup() +193 programs/pluto/cert_decode_helper.c) Jan 13 23:10:16.007628: | job 61 helper 6 #49 computing responder signature (signature): started Jan 13 23:10:16.007661: | hash to sign Jan 13 23:10:16.007641: | delref struct root_certs@0x55c838025548(2->1) (cert_decode_cleanup() +194 programs/pluto/cert_decode_helper.c) Jan 13 23:10:16.007693: | 30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 83 0!0...+......... Jan 13 23:10:16.007709: | delref logger@0x55c8380523a8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.007722: | 15 1f a5 27 0b 99 6d 0f 1d 95 2e 82 db 50 8b 13 ...'..m......P.. Jan 13 23:10:16.007736: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.007750: | b6 1b 29 ..) Jan 13 23:10:16.007764: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.007778: | RSA_sign_hash: Started using NSS Jan 13 23:10:16.007794: | #49 complete_v2_state_transition() PARENT_R1->ESTABLISHED_IKE_SA with status STF_SUSPEND Jan 13 23:10:16.007821: | suspend: saving MD@0x55c838050b08 in state #49 (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:10:16.007834: | addref struct msg_digest@0x55c838050b08(1->2) (complete_v2_state_transition() +2651 programs/pluto/ikev2.c) Jan 13 23:10:16.007843: | #49 is busy; has suspended MD 0x55c838050b08 Jan 13 23:10:16.007852: | delref struct msg_digest@0x55c838050b08(2->1) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.007867: | #49 spent 1.97 (2.03) milliseconds in resume sending job back to main thread Jan 13 23:10:16.007879: | delref tt@0x7ff8b4010868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:16.024831: | RSA_sign_hash: Ended using NSS Jan 13 23:10:16.024862: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 17.1 (17.1) milliseconds in v2_auth_signature() calling sign_hash() Jan 13 23:10:16.024871: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 17.2 (17.2) milliseconds in v2_auth_signature() Jan 13 23:10:16.024877: | job 61 helper 6 #49 computing responder signature (signature): finished Jan 13 23:10:16.024884: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: spent 17.2 (17.3) milliseconds in job 61 helper 6 #49 computing responder signature (signature) Jan 13 23:10:16.024901: | scheduling resume sending job back to main thread for #49 Jan 13 23:10:16.024909: | newref tt@0x7ff8a8007018(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.024919: | helper 6: waiting for work Jan 13 23:10:16.024931: | processing resume sending job back to main thread for #49 Jan 13 23:10:16.024947: | suspend: restoring MD@0x55c838050b08 from state #49 (resume_handler() +651 programs/pluto/server.c) Jan 13 23:10:16.024955: | job 61 helper 6 #49 computing responder signature (signature): calling state's callback function Jan 13 23:10:16.024961: | wipe_old_v2_connections() contemplating releasing older self Jan 13 23:10:16.024971: | FOR_EACH_CONNECTION[that_id_eq=O=ALU-UNIZG, CN=win7client.alu.hr].... in (wipe_old_v2_connections() +702 programs/pluto/ikev2_parent.c) Jan 13 23:10:16.024979: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.024985: | matches: 1 Jan 13 23:10:16.024996: | opening output PBS reply packet Jan 13 23:10:16.025002: | **emit ISAKMP Message: Jan 13 23:10:16.025009: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:16.025015: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:16.025022: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:16.025027: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:16.025032: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:16.025037: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:16.025044: | Message ID: 1 (00 00 00 01) Jan 13 23:10:16.025050: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:16.025057: | IKEv2 CERT: send a certificate? Jan 13 23:10:16.025062: | IKEv2 CERT: OK to send a certificate (always) Jan 13 23:10:16.025067: | ***emit IKEv2 Encryption Payload: Jan 13 23:10:16.025073: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.025078: | flags: none (0x0) Jan 13 23:10:16.025084: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:10:16.025090: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.025096: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:10:16.025112: | ****emit IKEv2 Identification - Responder - Payload: Jan 13 23:10:16.025119: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.025124: | flags: none (0x0) Jan 13 23:10:16.025128: | ID type: ID_FQDN (0x2) Jan 13 23:10:16.025134: | reserved: 00 00 00 Jan 13 23:10:16.025139: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Responder - Payload (36:ISAKMP_NEXT_v2IDr) Jan 13 23:10:16.025145: | next payload chain: saving location 'IKEv2 Identification - Responder - Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.025151: | emitting 10 raw bytes of my identity into IKEv2 Identification - Responder - Payload Jan 13 23:10:16.025159: | my identity: 76 70 6e 2e 61 6c 75 2e 68 72 Jan 13 23:10:16.025164: | emitting length of IKEv2 Identification - Responder - Payload: 18 Jan 13 23:10:16.025169: | added IDr payload to packet Jan 13 23:10:16.025174: | sending [CERT] of certificate: vpn.alu.hr Jan 13 23:10:16.025178: | ****emit IKEv2 Certificate Payload: Jan 13 23:10:16.025183: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.025188: | flags: none (0x0) Jan 13 23:10:16.025192: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Jan 13 23:10:16.025199: | next payload chain: setting previous 'IKEv2 Identification - Responder - Payload'.'next payload type' to current IKEv2 Certificate Payload (37:ISAKMP_NEXT_v2CERT) Jan 13 23:10:16.025204: | next payload chain: saving location 'IKEv2 Certificate Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.025210: | emitting 1308 raw bytes of CERT into IKEv2 Certificate Payload Jan 13 23:10:16.025216: | CERT: Jan 13 23:10:16.025221: | 30 82 05 18 30 82 03 00 a0 03 02 01 02 02 05 00 0...0........... Jan 13 23:10:16.025233: | ba 98 ea 76 30 0d 06 09 2a 86 48 86 f7 0d 01 01 ...v0...*.H..... Jan 13 23:10:16.025238: | 0b 05 00 30 2b 31 15 30 13 06 03 55 04 03 13 0c ...0+1.0...U.... Jan 13 23:10:16.025243: | 41 4c 55 2d 55 4e 49 5a 47 20 43 41 31 12 30 10 ALU-UNIZG CA1.0. Jan 13 23:10:16.025247: | 06 03 55 04 0a 13 09 41 4c 55 2d 55 4e 49 5a 47 ..U....ALU-UNIZG Jan 13 23:10:16.025252: | 30 1e 17 0d 32 32 30 31 30 34 32 30 31 37 35 39 0...220104201759 Jan 13 23:10:16.025256: | 5a 17 0d 32 33 30 31 30 34 32 30 31 37 35 39 5a Z..230104201759Z Jan 13 23:10:16.025260: | 30 29 31 13 30 11 06 03 55 04 03 13 0a 76 70 6e 0)1.0...U....vpn Jan 13 23:10:16.025265: | 2e 61 6c 75 2e 68 72 31 12 30 10 06 03 55 04 0a .alu.hr1.0...U.. Jan 13 23:10:16.025270: | 13 09 41 4c 55 2d 55 4e 49 5a 47 30 82 02 22 30 ..ALU-UNIZG0.."0 Jan 13 23:10:16.025274: | 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 ...*.H.......... Jan 13 23:10:16.025278: | 02 0f 00 30 82 02 0a 02 82 02 01 00 a0 c8 59 55 ...0..........YU Jan 13 23:10:16.025283: | 92 89 aa 4b 8a 33 c0 38 71 7a e9 c6 c3 90 02 a2 ...K.3.8qz...... Jan 13 23:10:16.025287: | e7 3b 94 5d 17 08 f8 ee 60 63 3d 93 fa 0c c4 7a .;.]....`c=....z Jan 13 23:10:16.025292: | 42 7d 0c 09 c2 0b ba b7 e7 ab 06 94 1b 33 85 0b B}...........3.. Jan 13 23:10:16.025296: | 67 bb 36 65 01 38 ab 4f 00 fa 52 f1 ed f5 eb 2c g.6e.8.O..R...., Jan 13 23:10:16.025301: | 14 98 88 70 74 6e 3f 19 ef cb 51 0e b6 22 54 b7 ...ptn?...Q.."T. Jan 13 23:10:16.025305: | 65 6d cb e6 99 4d fb 20 07 f3 1e 99 2a 1d 8c dd em...M. ....*... Jan 13 23:10:16.025310: | 89 0e e9 37 80 f5 a9 c3 86 04 dc e2 1e e9 4e 5a ...7..........NZ Jan 13 23:10:16.025314: | b2 f3 c6 c5 9d 92 da 0d c2 f2 ea 60 6b b9 56 3e ...........`k.V> Jan 13 23:10:16.025319: | 0c 70 6f e9 57 bf eb d9 aa 51 7d 65 a4 21 10 4b .po.W....Q}e.!.K Jan 13 23:10:16.025324: | d9 d9 28 1e 28 88 64 a5 26 32 4f e6 f7 b0 64 fe ..(.(.d.&2O...d. Jan 13 23:10:16.025328: | d5 96 fb c3 01 e3 f8 60 d0 3f 1d ea a2 fd 4b 3a .......`.?....K: Jan 13 23:10:16.025333: | 53 7b 75 de 7b b7 86 ca ec b3 1e 59 32 12 4e ea S{u.{......Y2.N. Jan 13 23:10:16.025337: | 40 26 89 ba 15 5c de 56 4c bc 0d 0e 5e 83 3a fa @&...\.VL...^.:. Jan 13 23:10:16.025342: | a5 ab a4 cf 31 af f0 ee 18 5b 6e 3e a7 6f 6d 6b ....1....[n>.omk Jan 13 23:10:16.025346: | 00 c0 3a 07 f1 c4 06 85 04 bb c2 3f 8d f9 e2 b2 ..:........?.... Jan 13 23:10:16.025351: | ed f8 0c df 23 94 52 69 ea 8b 4d f5 bb 0b fb 24 ....#.Ri..M....$ Jan 13 23:10:16.025355: | 74 8b 30 95 36 e0 0d 99 e2 3c e4 5f 5d a9 4d 08 t.0.6....<._].M. Jan 13 23:10:16.025360: | 96 b2 be 4d a0 9b 3f 69 2a 51 9c 8a 8d ed 30 bb ...M..?i*Q....0. Jan 13 23:10:16.025364: | f0 1d 51 0f 2f 14 69 12 40 f2 57 07 6a 8a 5f 24 ..Q./.i.@.W.j._$ Jan 13 23:10:16.025368: | 64 4f 21 37 0e c4 17 87 1d 0b 37 cd 45 c1 0b a2 dO!7......7.E... Jan 13 23:10:16.025373: | 6e d7 03 1c d5 a9 e3 80 c1 3d d5 54 52 4e bf 8d n........=.TRN.. Jan 13 23:10:16.025377: | 05 6c 72 a8 e2 56 3c bb 9c f2 06 85 98 9d a9 04 .lr..V<......... Jan 13 23:10:16.025382: | c8 75 dd d6 7a 4a 93 f0 b5 e8 60 43 c4 8d f9 08 .u..zJ....`C.... Jan 13 23:10:16.025387: | 31 98 21 de 16 4d 24 49 7a 6d 5d a3 41 cc e2 ac 1.!..M$Izm].A... Jan 13 23:10:16.025391: | 77 d8 c1 fa ee e5 4b 23 51 8a 28 26 75 c8 bc 9a w.....K#Q.(&u... Jan 13 23:10:16.025396: | 51 0d 94 c1 f2 62 ee 5d 7e 8f 1b 32 84 3d d2 d8 Q....b.]~..2.=.. Jan 13 23:10:16.025400: | 52 af 53 20 f4 60 29 d6 c7 52 7f 60 05 37 20 77 R.S .`)..R.`.7 w Jan 13 23:10:16.025405: | 8e b7 08 c5 9e d4 05 8d 25 33 61 03 74 89 37 90 ........%3a.t.7. Jan 13 23:10:16.025409: | 09 53 35 db 3c a9 58 b1 5b d8 11 da c6 c8 18 2e .S5.<.X.[....... Jan 13 23:10:16.025414: | 5c fb 0a cd 6b 29 a6 7c 6b f3 17 0c 9d 3a 79 d2 \...k).|k....:y. Jan 13 23:10:16.025418: | a0 45 cb a0 b2 8f 45 ba 50 21 a4 b9 aa e2 6b 18 .E....E.P!....k. Jan 13 23:10:16.025426: | 91 a9 d0 6e 41 6c bf 5d ba 8b 55 39 02 03 01 00 ...nAl.]..U9.... Jan 13 23:10:16.025431: | 01 a3 45 30 43 30 15 06 03 55 1d 11 04 0e 30 0c ..E0C0...U....0. Jan 13 23:10:16.025436: | 82 0a 76 70 6e 2e 61 6c 75 2e 68 72 30 1d 06 03 ..vpn.alu.hr0... Jan 13 23:10:16.025440: | 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 U.%..0...+...... Jan 13 23:10:16.025445: | 01 06 08 2b 06 01 05 05 07 03 02 30 0b 06 03 55 ...+.......0...U Jan 13 23:10:16.025449: | 1d 0f 04 04 03 02 05 a0 30 0d 06 09 2a 86 48 86 ........0...*.H. Jan 13 23:10:16.025454: | f7 0d 01 01 0b 05 00 03 82 02 01 00 08 06 54 5f ..............T_ Jan 13 23:10:16.025458: | c6 9d 4c 1b 16 04 f4 35 07 86 97 04 a9 4a 7e c4 ..L....5.....J~. Jan 13 23:10:16.025462: | 0f fd e7 15 df f7 33 e9 38 6c 89 fb e5 01 d6 71 ......3.8l.....q Jan 13 23:10:16.025467: | 97 7d 29 72 bb 4f b6 a2 25 8e c9 4e c2 df b3 91 .})r.O..%..N.... Jan 13 23:10:16.025471: | bb 35 76 10 9b 8a ca ac 30 20 ff 80 55 63 a6 48 .5v.....0 ..Uc.H Jan 13 23:10:16.025476: | 59 d8 c7 ab 5e cb ac c9 77 0b 93 7d 6e 11 81 ae Y...^...w..}n... Jan 13 23:10:16.025480: | a6 75 2f 1d c2 86 54 5b a9 33 40 03 e3 28 f2 f4 .u/...T[.3@..(.. Jan 13 23:10:16.025485: | 6e 3e e4 47 89 e5 07 02 85 84 c2 b9 3c 86 21 85 n>.G........<.!. Jan 13 23:10:16.025489: | fc 7a 40 74 0e ce d1 df 70 e5 82 48 09 6d 8c ee .z@t....p..H.m.. Jan 13 23:10:16.025493: | 95 20 5b d7 c8 6e 55 76 44 6d 53 ef b0 ae fe 63 . [..nUvDmS....c Jan 13 23:10:16.025498: | 15 97 28 61 d3 64 af ca 1f 82 83 06 a8 0a 64 85 ..(a.d........d. Jan 13 23:10:16.025502: | 6f 58 7a 24 d5 cb 80 e1 d3 25 27 6b f3 93 a1 b7 oXz$.....%'k.... Jan 13 23:10:16.025507: | b0 be 59 d0 eb 2f 24 61 84 a1 23 e5 e5 5a c2 86 ..Y../$a..#..Z.. Jan 13 23:10:16.025511: | d9 af 95 a5 ef aa ee 63 be 36 7c ec b5 db 67 69 .......c.6|...gi Jan 13 23:10:16.025516: | d8 bc 80 80 08 26 c6 c3 e2 96 34 5e 16 a5 23 88 .....&....4^..#. Jan 13 23:10:16.025520: | 51 49 f6 50 07 3b 6f 59 65 4c 1b 2a 4b ba bd f0 QI.P.;oYeL.*K... Jan 13 23:10:16.025524: | 42 51 e7 73 cd 27 19 94 5a 84 48 bc 98 56 9b 41 BQ.s.'..Z.H..V.A Jan 13 23:10:16.025529: | 34 0a 89 86 5a 35 4f 20 19 25 d0 75 27 ae e0 f6 4...Z5O .%.u'... Jan 13 23:10:16.025533: | 22 04 b1 46 fa ac 18 3a fc 0d b0 a3 ff 7d cc a8 "..F...:.....}.. Jan 13 23:10:16.025538: | 87 8e 5c fd dc 71 a9 47 2b 5e 4e 5c 76 a3 29 b8 ..\..q.G+^N\v.). Jan 13 23:10:16.025542: | 91 a6 67 43 2d 16 40 fe 6d d5 f5 40 a2 79 2c 91 ..gC-.@.m..@.y,. Jan 13 23:10:16.025546: | 1d 43 b1 1d 59 3a c6 58 b6 71 f6 43 9f e7 f3 36 .C..Y:.X.q.C...6 Jan 13 23:10:16.025551: | a3 21 90 aa 78 85 eb 5a 29 ff bc 90 8e 67 f9 e5 .!..x..Z)....g.. Jan 13 23:10:16.025555: | fa d2 c9 e6 3d 4f ed 90 b4 1c 53 53 92 c6 91 c2 ....=O....SS.... Jan 13 23:10:16.025560: | 72 19 c4 ad d6 68 4f d7 b4 1a 6e bb c0 f6 bf 43 r....hO...n....C Jan 13 23:10:16.025564: | 79 87 f0 19 0f a9 6f c6 69 1f 04 6f ed fc 2b c3 y.....o.i..o..+. Jan 13 23:10:16.025569: | 9f 7f d6 34 3e 80 ce b1 e5 c8 5b be e3 8b 13 f2 ...4>.....[..... Jan 13 23:10:16.025573: | af 66 d4 07 9c 4e ca c6 0a a0 ee 14 09 c0 5e e4 .f...N........^. Jan 13 23:10:16.025577: | fd 6f 5c 6d 1f ba 8d ae 93 5b ee f7 17 2f f8 3d .o\m.....[.../.= Jan 13 23:10:16.025582: | f7 3f 8a a0 eb b2 bd 68 18 99 0e 86 a7 11 af e5 .?.....h........ Jan 13 23:10:16.025586: | c1 8d 83 68 f7 aa 3c 59 b3 15 3b e0 c4 42 e2 23 ...h..i.(....P.9 Jan 13 23:10:16.025720: | d9 64 35 7e a0 63 26 38 ef 39 e6 59 85 59 94 22 .d5~.c&8.9.Y.Y." Jan 13 23:10:16.025725: | 58 e2 11 98 29 b2 06 72 1f ae 60 23 e5 6a 3e b5 X...)..r..`#.j>. Jan 13 23:10:16.025729: | 23 a5 df 66 8a 88 b9 c1 2a d0 d1 15 a1 1d a8 10 #..f....*....... Jan 13 23:10:16.025734: | 86 1e d4 ae 56 12 be a3 9f 28 2d 0a 3f c2 6f 49 ....V....(-.?.oI Jan 13 23:10:16.025739: | 23 ad 71 b1 5c 8a 4c 6e ca 3c 88 de 6a dc 0a 69 #.q.\.Ln.<..j..i Jan 13 23:10:16.025743: | d0 99 f2 14 a1 b9 b1 26 ea ab 42 42 9c d0 c5 0c .......&..BB.... Jan 13 23:10:16.025747: | 74 9c ed 4e 9c 77 4f 3c e1 9f b1 60 2f 1f b9 24 t..N.wO<...`/..$ Jan 13 23:10:16.025752: | 7a ba a7 9c 36 f9 b4 f2 3e f7 ee 37 a3 a8 70 93 z...6...>..7..p. Jan 13 23:10:16.025756: | bb 21 50 2d b3 87 83 b1 b2 13 6e 46 53 bf 6e 7f .!P-......nFS.n. Jan 13 23:10:16.025761: | 34 01 91 25 56 d0 1b 1b 9b 94 ad 3b e6 6a 3c 5c 4..%V......;.j<\ Jan 13 23:10:16.025765: | 9d 03 0d ca 5f 92 9e 85 1f 65 90 bf 8b 79 06 fb ...._....e...y.. Jan 13 23:10:16.025770: | bf db 42 a3 d1 97 7e ec 66 80 e8 28 1e 35 84 95 ..B...~.f..(.5.. Jan 13 23:10:16.025774: | f8 d1 4d 7b 6a d8 4f 07 21 14 d8 d8 4e 93 c8 1a ..M{j.O.!...N... Jan 13 23:10:16.025778: | 99 fc d0 20 55 77 1b 07 a9 63 28 9a c8 d9 7b 80 ... Uw...c(...{. Jan 13 23:10:16.025783: | e0 09 77 19 cc 9f 26 c3 9a 31 69 98 57 c1 df f7 ..w...&..1i.W... Jan 13 23:10:16.025787: | 48 dc c9 f1 e1 63 59 e4 90 66 50 ac fe e6 cd 00 H....cY..fP..... Jan 13 23:10:16.025792: | d3 ea b3 fb ee 1d 6c ec 61 4c b7 03 2d 1f f7 3f ......l.aL..-..? Jan 13 23:10:16.025797: | emitting length of IKEv2 Authentication Payload: 520 Jan 13 23:10:16.025805: | newref alloc logger@0x55c8380523a8(0->1) (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:10:16.025812: | addref fd@NULL (duplicate_state() +1549 programs/pluto/state.c) Jan 13 23:10:16.025819: | entry state hash_table_entries.serialno@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50 initialized Jan 13 23:10:16.025830: | entry state hash_table_entries.connection_serialno@0x55c8380543f8 $9 initialized Jan 13 23:10:16.025837: | entry state hash_table_entries.reqid@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: reqid=0 initialized Jan 13 23:10:16.025846: | entry state hash_table_entries.ike_initiator_spi@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: 00 00 00 00 00 00 00 00 initialized Jan 13 23:10:16.025857: | entry state hash_table_entries.ike_spis@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized Jan 13 23:10:16.025863: | creating state object #50 at 0x55c8380543f8 Jan 13 23:10:16.025870: | entry state hash_table_entries.serialno@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50 added to hash table bucket 0x55c8365892c0 Jan 13 23:10:16.025876: | entry state hash_table_entries.connection_serialno@0x55c8380543f8 $9 added to hash table bucket 0x55c8365870e0 Jan 13 23:10:16.025883: | entry state hash_table_entries.reqid@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: reqid=0 added to hash table bucket 0x55c83657f820 Jan 13 23:10:16.025891: | entry state hash_table_entries.ike_initiator_spi@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: 20 75 86 d9 f2 5e 32 f6 added to hash table bucket 0x55c83657e760 Jan 13 23:10:16.025901: | entry state hash_table_entries.ike_spis@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f added to hash table bucket 0x55c83657abe0 Jan 13 23:10:16.025908: | pstats #50 ikev2.child started Jan 13 23:10:16.025914: | duplicating state object #49 "MYCONN-ikev2-cp"[2] 94.253.210.164 as #50 for IPSEC SA Jan 13 23:10:16.025921: | #50 setting local endpoint to 161.53.235.3:4500 from #49.st_localport (duplicate_state() +1567 programs/pluto/state.c) Jan 13 23:10:16.025927: | addref struct iface_endpoint@0x55c83801f058(5->6) (duplicate_state() +1569 programs/pluto/state.c) Jan 13 23:10:16.025933: | duplicate_state: addref st_skeyid_nss-key@NULL Jan 13 23:10:16.025938: | duplicate_state: addref st_skey_d_nss-key@0x55c838012940 Jan 13 23:10:16.025942: | duplicate_state: addref st_skey_ai_nss-key@NULL Jan 13 23:10:16.025947: | duplicate_state: addref st_skey_ar_nss-key@NULL Jan 13 23:10:16.025951: | duplicate_state: addref st_skey_ei_nss-key@0x55c838041fd0 Jan 13 23:10:16.025955: | duplicate_state: addref st_skey_er_nss-key@0x55c83801c850 Jan 13 23:10:16.025960: | duplicate_state: addref st_skey_pi_nss-key@0x55c8380199c0 Jan 13 23:10:16.025964: | duplicate_state: addref st_skey_pr_nss-key@0x55c838026c40 Jan 13 23:10:16.025968: | duplicate_state: addref st_enc_key_nss-key@NULL Jan 13 23:10:16.025978: | Message ID: CHILD #49.#50 initializing (CHILD SA): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0 .recv=0 .recv_frags=0 .recv_wip=1 .last_contact=9594883.683232 child.wip.initiator=0->-1 Jan 13 23:10:16.025985: | child state #50: UNDEFINED(ignore) => IKE_AUTH_CHILD_R0(ignore) Jan 13 23:10:16.025991: | #50.st_v2_transition NULL -> NULL (new_v2_child_state() +1645 programs/pluto/state.c) Jan 13 23:10:16.025999: | connection both thinks it has, and really has a lease Jan 13 23:10:16.026006: | comparing remote proposals against IKE_AUTH responder matching remote ESP/AH proposals 6 local proposals Jan 13 23:10:16.026013: | local proposal 1 type ENCR has 1 transforms Jan 13 23:10:16.026018: | local proposal 1 type PRF has 0 transforms Jan 13 23:10:16.026023: | local proposal 1 type INTEG has 1 transforms Jan 13 23:10:16.026028: | local proposal 1 type DH has 1 transforms Jan 13 23:10:16.026033: | local proposal 1 type ESN has 2 transforms Jan 13 23:10:16.026038: | local proposal 1 transforms: required: ENCR+ESN; optional: INTEG+DH Jan 13 23:10:16.026044: | local proposal 2 type ENCR has 1 transforms Jan 13 23:10:16.026049: | local proposal 2 type PRF has 0 transforms Jan 13 23:10:16.026053: | local proposal 2 type INTEG has 1 transforms Jan 13 23:10:16.026058: | local proposal 2 type DH has 1 transforms Jan 13 23:10:16.026070: | local proposal 2 type ESN has 2 transforms Jan 13 23:10:16.026076: | local proposal 2 transforms: required: ENCR+ESN; optional: INTEG+DH Jan 13 23:10:16.026081: | local proposal 3 type ENCR has 1 transforms Jan 13 23:10:16.026086: | local proposal 3 type PRF has 0 transforms Jan 13 23:10:16.026091: | local proposal 3 type INTEG has 1 transforms Jan 13 23:10:16.026097: | local proposal 3 type DH has 1 transforms Jan 13 23:10:16.026101: | local proposal 3 type ESN has 2 transforms Jan 13 23:10:16.026106: | local proposal 3 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:10:16.026113: | local proposal 4 type ENCR has 1 transforms Jan 13 23:10:16.026117: | local proposal 4 type PRF has 0 transforms Jan 13 23:10:16.026122: | local proposal 4 type INTEG has 1 transforms Jan 13 23:10:16.026127: | local proposal 4 type DH has 1 transforms Jan 13 23:10:16.026131: | local proposal 4 type ESN has 2 transforms Jan 13 23:10:16.026136: | local proposal 4 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:10:16.026142: | local proposal 5 type ENCR has 1 transforms Jan 13 23:10:16.026147: | local proposal 5 type PRF has 0 transforms Jan 13 23:10:16.026151: | local proposal 5 type INTEG has 1 transforms Jan 13 23:10:16.026158: | local proposal 5 type DH has 1 transforms Jan 13 23:10:16.026163: | local proposal 5 type ESN has 2 transforms Jan 13 23:10:16.026168: | local proposal 5 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:10:16.026174: | local proposal 6 type ENCR has 1 transforms Jan 13 23:10:16.026179: | local proposal 6 type PRF has 0 transforms Jan 13 23:10:16.026183: | local proposal 6 type INTEG has 1 transforms Jan 13 23:10:16.026188: | local proposal 6 type DH has 1 transforms Jan 13 23:10:16.026193: | local proposal 6 type ESN has 2 transforms Jan 13 23:10:16.026198: | local proposal 6 transforms: required: ENCR+INTEG+ESN; optional: DH Jan 13 23:10:16.026204: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:10:16.026209: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Jan 13 23:10:16.026215: | length: 44 (00 2c) Jan 13 23:10:16.026220: | prop #: 1 (01) Jan 13 23:10:16.026225: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:10:16.026230: | spi size: 4 (04) Jan 13 23:10:16.026234: | # transforms: 3 (03) Jan 13 23:10:16.026240: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:10:16.026245: | remote SPI Jan 13 23:10:16.026250: | ce ab 7a ef ..z. Jan 13 23:10:16.026255: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..6] of 6 local proposals Jan 13 23:10:16.026261: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026265: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026270: | length: 12 (00 0c) Jan 13 23:10:16.026275: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:16.026280: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:16.026285: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:16.026289: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:16.026295: | length/value: 256 (01 00) Jan 13 23:10:16.026301: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Jan 13 23:10:16.026306: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026311: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026316: | length: 12 (00 0c) Jan 13 23:10:16.026320: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:16.026325: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:16.026330: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:16.026334: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:16.026339: | length/value: 128 (00 80) Jan 13 23:10:16.026345: | remote proposal 1 transform 1 (ENCR=AES_GCM_C_128) matches local proposal 2 type 1 (ENCR) transform 0 Jan 13 23:10:16.026350: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026355: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:16.026369: | length: 8 (00 08) Jan 13 23:10:16.026374: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:10:16.026379: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:10:16.026385: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 1 type 5 (ESN) transform 1 Jan 13 23:10:16.026390: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 2 type 5 (ESN) transform 1 Jan 13 23:10:16.026395: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 3 type 5 (ESN) transform 1 Jan 13 23:10:16.026401: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 4 type 5 (ESN) transform 1 Jan 13 23:10:16.026406: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 5 type 5 (ESN) transform 1 Jan 13 23:10:16.026411: | remote proposal 1 transform 2 (ESN=DISABLED) matches local proposal 6 type 5 (ESN) transform 1 Jan 13 23:10:16.026416: | remote proposal 1 proposed transforms: ENCR+ESN; matched: ENCR+ESN; unmatched: none Jan 13 23:10:16.026424: | comparing remote proposal 1 containing ENCR+ESN transforms to local proposal 1; required: ENCR+ESN; optional: INTEG+DH; matched: ENCR+ESN Jan 13 23:10:16.026429: | remote proposal 1 matches local proposal 1 Jan 13 23:10:16.026434: | ***parse IKEv2 Proposal Substructure Payload: Jan 13 23:10:16.026440: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:10:16.026446: | length: 76 (00 4c) Jan 13 23:10:16.026450: | prop #: 2 (02) Jan 13 23:10:16.026455: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:10:16.026460: | spi size: 4 (04) Jan 13 23:10:16.026466: | # transforms: 7 (07) Jan 13 23:10:16.026471: | parsing 4 raw bytes of IKEv2 Proposal Substructure Payload into remote SPI Jan 13 23:10:16.026477: | remote SPI Jan 13 23:10:16.026482: | ce ab 7a ef ..z. Jan 13 23:10:16.026487: | Comparing remote proposal 2 containing 7 transforms against local proposal [1..0] of 6 local proposals Jan 13 23:10:16.026493: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026498: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026503: | length: 12 (00 0c) Jan 13 23:10:16.026509: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:16.026514: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:10:16.026519: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:16.026524: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:16.026529: | length/value: 256 (01 00) Jan 13 23:10:16.026534: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026540: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026545: | length: 12 (00 0c) Jan 13 23:10:16.026551: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:16.026556: | IKEv2 transform ID: AES_CBC (0xc) Jan 13 23:10:16.026561: | *****parse IKEv2 Attribute Substructure Payload: Jan 13 23:10:16.026565: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:16.026570: | length/value: 128 (00 80) Jan 13 23:10:16.026575: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026581: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026586: | length: 8 (00 08) Jan 13 23:10:16.026592: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:16.026597: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Jan 13 23:10:16.026602: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026608: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026613: | length: 8 (00 08) Jan 13 23:10:16.026619: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:16.026624: | IKEv2 transform ID: AUTH_HMAC_SHA2_384_192 (0xd) Jan 13 23:10:16.026629: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026635: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026640: | length: 8 (00 08) Jan 13 23:10:16.026646: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:16.026651: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Jan 13 23:10:16.026662: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026667: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.026672: | length: 8 (00 08) Jan 13 23:10:16.026677: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Jan 13 23:10:16.026682: | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) Jan 13 23:10:16.026687: | ****parse IKEv2 Transform Substructure Payload: Jan 13 23:10:16.026692: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:16.026697: | length: 8 (00 08) Jan 13 23:10:16.026703: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:10:16.026707: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:10:16.026714: | remote proposal 2 proposed transforms: ENCR+INTEG+ESN; matched: none; unmatched: ENCR+INTEG+ESN Jan 13 23:10:16.026720: | remote proposal 2 does not match; unmatched remote transforms: ENCR+INTEG+ESN Jan 13 23:10:16.026730: "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: proposal 1:ESP=AES_GCM_C_256-DISABLED SPI=ceab7aef chosen from remote proposals 1:ESP:ENCR=AES_GCM_C_256;ENCR=AES_GCM_C_128;ESN=DISABLED[first-match] 2:ESP:ENCR=AES_CBC_256;ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_384_192;INTEG=HMAC_SHA2_256_128;INTEG=HMAC_SHA1_96;ESN=DISABLED Jan 13 23:10:16.026738: | IKE_AUTH responder matching remote ESP/AH proposals ikev2_proposal: 1:ESP=AES_GCM_C_256-DISABLED SPI=ceab7aef Jan 13 23:10:16.026743: | converting proposal to internal trans attrs Jan 13 23:10:16.026752: | process_v2_childs_sa_payload returned v2N_RESERVED Jan 13 23:10:16.026762: | xfrm: sendrecv_xfrm_msg() sending 22 Jan 13 23:10:16.026786: | kernel: netlink_get_spi: allocated 0xc7ccc155 for esp.0@161.53.235.3 Jan 13 23:10:16.026795: | kernel: allocated incoming spi 94.253.210.164 -> esp.c7ccc155@161.53.235.3 in tunnel-mode Jan 13 23:10:16.026803: | integ=NONE: .key_size=0 encrypt=AES_GCM_16: .key_size=32 .salt_size=4 keymat_len=36 Jan 13 23:10:16.026836: | result: newref data=Ni-key@0x55c838005bd0 (48-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.026852: | result: newref data=Ni-key@0x55c838029d60 (32-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.026858: | data=Ni: delref tmp-key@0x55c838005bd0 Jan 13 23:10:16.026872: | result: newref data+=Nr-key@0x55c838005bd0 (64-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.026879: | append_symkey_bytes: delref lhs-key@0x55c838029d60 Jan 13 23:10:16.026892: | result: newref clone-key@0x55c838029d60 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.026906: | prf+0: delref clone-key@0x55c838029d60 Jan 13 23:10:16.026922: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.026938: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.026971: | result: newref final-key@0x55c838012f30 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.026986: | result: newref final-key@0x55c838029d60 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.026994: | final: delref tmp-key@0x55c838012f30 Jan 13 23:10:16.027001: | prfplus: addref old_t[1]-key@0x55c838029d60 Jan 13 23:10:16.027013: | result: newref clone-key@0x55c838012f30 (64-bytes, SHA512_HMAC)(init_symkey() +99 lib/libswan/ike_alg_prf_mac_nss_ops.c) Jan 13 23:10:16.027025: | prf+N: delref clone-key@0x55c838012f30 Jan 13 23:10:16.027042: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.027056: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.027070: | nss hmac digest hack: newref slot-key@0x55c838003da0 (64-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.027083: | nss hmac digest hack: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.027114: | result: newref final-key@0x55c837ffd570 (80-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_bytes() +224 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.027135: | result: newref final-key@0x55c838012f30 (64-bytes, EXTRACT_KEY_FROM_KEY)(symkey_from_bytes() +400 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.027142: | final: delref tmp-key@0x55c837ffd570 Jan 13 23:10:16.027157: | result: newref result-key@0x55c837ffd570 (128-bytes, EXTRACT_KEY_FROM_KEY)(merge_symkey_symkey() +251 lib/libswan/crypt_symkey.c) Jan 13 23:10:16.027164: | append_symkey_symkey: delref lhs-key@0x55c838029d60 Jan 13 23:10:16.027168: | prfplus: delref old_t[N]-key@0x55c838029d60 Jan 13 23:10:16.027175: | prfplus: delref old_t[final]-key@0x55c838012f30 Jan 13 23:10:16.027181: | child_sa_keymat: delref data-key@0x55c838005bd0 Jan 13 23:10:16.027194: | result: newref initiator to responder key-key@0x55c838005bd0 (36-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +125 programs/pluto/ikev2_crypto.c) Jan 13 23:10:16.027207: | initiator to responder keys: newref slot-key@0x55c838003da0 (36-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.027221: | initiator to responder keys: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.027229: | ikev2_derive_child_keys: delref ikey-key@0x55c838005bd0 Jan 13 23:10:16.027242: | result: newref responder to initiator key-key@0x55c838005bd0 (36-bytes, EXTRACT_KEY_FROM_KEY)(ikev2_derive_child_keys() +133 programs/pluto/ikev2_crypto.c) Jan 13 23:10:16.027254: | responder to initiator keys:: newref slot-key@0x55c838003da0 (36-bytes, EXTRACT_KEY_FROM_KEY) Jan 13 23:10:16.027267: | responder to initiator keys:: delref slot-key-key@0x55c838003da0 Jan 13 23:10:16.027275: | ikev2_derive_child_keys: delref rkey-key@0x55c838005bd0 Jan 13 23:10:16.027281: | ikev2_derive_child_keys: delref keymat-key@0x55c837ffd570 Jan 13 23:10:16.027289: | kernel: install_ipsec_sa() for #50: inbound and outbound Jan 13 23:10:16.027298: | kernel: could_route called for MYCONN-ikev2-cp; kind=CK_INSTANCE that.has_client=yes oppo=no this.host_port=500 sec_label= Jan 13 23:10:16.027308: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:10:16.027319: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:10:16.027325: | matches: 1 Jan 13 23:10:16.027332: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:10:16.027341: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:10:16.027352: | kernel: setup_half_ipsec_sa() outbound 0.0.0.0/0-ALL->[161.53.235.3=IPv4=>94.253.210.164]-ALL->192.168.101.10/32 sec_label= Jan 13 23:10:16.027359: | kernel: natt/tcp sa encap_type=2(espinudp) sport=4500 dport=51417 Jan 13 23:10:16.027364: | kernel: looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Jan 13 23:10:16.027369: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Jan 13 23:10:16.027375: | kernel: AES_GCM_16 requires 4 salt bytes Jan 13 23:10:16.027380: | kernel: st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Jan 13 23:10:16.027384: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:10:16.027391: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:10:16.027403: | kernel: add_sa() 0 outbound tunnel 0.0.0.0/0-ALL->161.53.235.3=ESP=ceab7aef=espinudp=>94.253.210.164-ALL->192.168.101.10/32 NONE:0 AES_GCM_16:36 Jan 13 23:10:16.027410: | xfrm: enabling tunnel mode Jan 13 23:10:16.027415: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:10:16.027420: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:10:16.027426: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=4500 dport=51417 Jan 13 23:10:16.027432: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:10:16.027437: | xfrm: sendrecv_xfrm_msg() sending 16 Jan 13 23:10:16.027510: | netlink response for Add SA esp.ceab7aef@94.253.210.164 included non-error error Jan 13 23:10:16.027525: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=0 owner=#47 tunnel Jan 13 23:10:16.027530: | kernel: set up outgoing SA Jan 13 23:10:16.027538: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:10:16.027547: | kernel: setup_half_ipsec_sa() inbound 192.168.101.10/32-ALL->[94.253.210.164=IPv4=>161.53.235.3]-ALL->0.0.0.0/0 sec_label= Jan 13 23:10:16.027553: | kernel: natt/tcp sa encap_type=2(espinudp) sport=51417 dport=4500 Jan 13 23:10:16.027558: | kernel: looking for alg with encrypt: AES_GCM_16 keylen: 256 integ: NONE Jan 13 23:10:16.027563: | encrypt AES_GCM_16 keylen=256 transid=20, key_size=32, encryptalg=20 Jan 13 23:10:16.027567: | kernel: AES_GCM_16 requires 4 salt bytes Jan 13 23:10:16.027572: | kernel: st->st_esp.keymat_len=36 is encrypt_keymat_size=36 + integ_keymat_size=0 Jan 13 23:10:16.027577: | kernel: setting IPsec SA replay-window to 128 Jan 13 23:10:16.027583: | kernel: NIC esp-hw-offload not for connection 'MYCONN-ikev2-cp' not available on interface eth0 Jan 13 23:10:16.027593: | kernel: add_sa() 0 inbound tunnel 192.168.101.10/32-ALL->94.253.210.164=ESP=c7ccc155=espinudp=>161.53.235.3-ALL->0.0.0.0/0 NONE:0 AES_GCM_16:36 Jan 13 23:10:16.027600: | xfrm: enabling tunnel mode Jan 13 23:10:16.027605: | netlink_add_sa() adding IPsec SA with reqid 16421 Jan 13 23:10:16.027609: | xfrm: setting IPsec SA replay-window to 128 using xfrm_replay_state_esn Jan 13 23:10:16.027614: | adding xfrm-encap-tmpl when adding sa encap_type=2(espinudp) sport=51417 dport=4500 Jan 13 23:10:16.027619: | xfrm: esp-hw-offload not set for IPsec SA Jan 13 23:10:16.027624: | xfrm: sendrecv_xfrm_msg() sending 26 Jan 13 23:10:16.027670: | netlink response for Add SA esp.c7ccc155@161.53.235.3 included non-error error Jan 13 23:10:16.027680: | kernel: setup_half_ipsec_sa() is thinking about installing inbound eroute? inbound=1 owner=#47 tunnel Jan 13 23:10:16.027684: | kernel: set up incoming SA Jan 13 23:10:16.027689: | kernel: sr for #50: erouted Jan 13 23:10:16.027697: | kernel: route_and_eroute() for 0.0.0.0/0 --> 192.168.101.10/32; proto 0, and source port 0 dest port 0 sec_label Jan 13 23:10:16.027704: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:10:16.027713: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:10:16.027719: | matches: 1 Jan 13 23:10:16.027725: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 erouted: self; eroute owner: self Jan 13 23:10:16.027732: | kernel: route_and_eroute with c: MYCONN-ikev2-cp (next: none) ero:MYCONN-ikev2-cp esr:{(nil)} ro:MYCONN-ikev2-cp rosr:{(nil)} and state: #50 Jan 13 23:10:16.027736: | kernel: we are replacing an eroute Jan 13 23:10:16.027743: | kernel_route_from_spd() changing remote selector 192.168.101.10/32 to 192.168.101.10/32 Jan 13 23:10:16.027751: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:10:16.027769: | kernel: raw_policy() REPLACE_OUTBOUND THIS_IS_NOT_INBOUND eroute_connection() sag_eroute() route_and_eroute() replace sag 0.0.0.0/0-ALL-161.53.235.3==94.253.210.164-ALL-192.168.101.10/32 shunt_policy=UNSET encap=tunnel,161.53.235.3=>94.253.210.164,inner=IPv4{ESP,16421} lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:10:16.027777: | xfrm_raw_policy() policy=IPv4/3 dir=1 Jan 13 23:10:16.027782: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:10:16.027788: | xfrm_raw_policy() IPsec SA SPD priority set to 1769664 Jan 13 23:10:16.027797: | xfrm_raw_policy() adding xfrm_user_tmpl reqid=16421 id.proto=50 optional=0 family=2 mode=1 saddr=161.53.235.3 id.daddr=94.253.210.164 Jan 13 23:10:16.027803: | xfrm: sendrecv_xfrm_msg() sending 25 Jan 13 23:10:16.027823: | kernel: policy: result=success Jan 13 23:10:16.027830: | kernel: route_and_eroute: firewall_notified: true Jan 13 23:10:16.027845: | kernel: route_and_eroute: instance "MYCONN-ikev2-cp"[2] 94.253.210.164, setting eroute_owner {spd=0x55c83803cdc8,sr=0x55c83803cdc8} to #50 (was #47) (newest_ipsec_sa=#47) Jan 13 23:10:16.027852: | ISAKMP_v2_IKE_AUTH: instance MYCONN-ikev2-cp[2], setting IKEv2 newest_ipsec_sa to #50 (was #47) (spd.eroute=#50) cloned from #49 Jan 13 23:10:16.027857: | Send Configuration Payload reply Jan 13 23:10:16.027862: | ****emit IKEv2 Configuration Payload: Jan 13 23:10:16.027869: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.027874: | flags: none (0x0) Jan 13 23:10:16.027880: | ikev2_cfg_type: IKEv2_CP_CFG_REPLY (0x2) Jan 13 23:10:16.027886: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Configuration Payload (47:ISAKMP_NEXT_v2CP) Jan 13 23:10:16.027891: | next payload chain: saving location 'IKEv2 Configuration Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.027897: | *****emit IKEv2 Configuration Payload Attribute: Jan 13 23:10:16.027903: | Attribute Type: IKEv2_INTERNAL_IP4_ADDRESS (0x1) Jan 13 23:10:16.027909: | emitting 4 raw bytes of Internal IP Address into IKEv2 Configuration Payload Attribute Jan 13 23:10:16.027916: | Internal IP Address: c0 a8 65 0a Jan 13 23:10:16.027921: | emitting length of IKEv2 Configuration Payload Attribute: 4 Jan 13 23:10:16.027928: | *****emit IKEv2 Configuration Payload Attribute: Jan 13 23:10:16.027933: | Attribute Type: IKEv2_INTERNAL_IP4_DNS (0x3) Jan 13 23:10:16.027939: | emitting 4 raw bytes of IP4_DNS into IKEv2 Configuration Payload Attribute Jan 13 23:10:16.027944: | IP4_DNS: 08 08 08 08 Jan 13 23:10:16.027950: | emitting length of IKEv2 Configuration Payload Attribute: 4 Jan 13 23:10:16.027954: | emitting length of IKEv2 Configuration Payload: 24 Jan 13 23:10:16.027959: | emitting ikev2_proposal ... Jan 13 23:10:16.027964: | ****emit IKEv2 Security Association Payload: Jan 13 23:10:16.027968: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.027973: | flags: none (0x0) Jan 13 23:10:16.027978: | next payload chain: setting previous 'IKEv2 Configuration Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Jan 13 23:10:16.027984: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.027991: | *****emit IKEv2 Proposal Substructure Payload: Jan 13 23:10:16.027996: | last proposal: v2_PROPOSAL_LAST (0x0) Jan 13 23:10:16.028002: | prop #: 1 (01) Jan 13 23:10:16.028006: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Jan 13 23:10:16.028011: | spi size: 4 (04) Jan 13 23:10:16.028017: | # transforms: 2 (02) Jan 13 23:10:16.028022: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Jan 13 23:10:16.028028: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Jan 13 23:10:16.028034: | our spi: c7 cc c1 55 Jan 13 23:10:16.028039: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:10:16.028044: | last transform: v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.028050: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Jan 13 23:10:16.028055: | IKEv2 transform ID: AES_GCM_C (0x14) Jan 13 23:10:16.028060: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:10:16.028065: | *******emit IKEv2 Attribute Substructure Payload: Jan 13 23:10:16.028071: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Jan 13 23:10:16.028077: | length/value: 256 (01 00) Jan 13 23:10:16.028082: | emitting length of IKEv2 Transform Substructure Payload: 12 Jan 13 23:10:16.028087: | ******emit IKEv2 Transform Substructure Payload: Jan 13 23:10:16.028091: | last transform: v2_TRANSFORM_LAST (0x0) Jan 13 23:10:16.028096: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Jan 13 23:10:16.028101: | IKEv2 transform ID: ESN_DISABLED (0x0) Jan 13 23:10:16.028106: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' containing v2_TRANSFORM_NON_LAST (0x3) is v2_TRANSFORM_NON_LAST (0x3) Jan 13 23:10:16.028122: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Jan 13 23:10:16.028127: | emitting length of IKEv2 Transform Substructure Payload: 8 Jan 13 23:10:16.028132: | emitting length of IKEv2 Proposal Substructure Payload: 32 Jan 13 23:10:16.028136: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Jan 13 23:10:16.028141: | emitting length of IKEv2 Security Association Payload: 36 Jan 13 23:10:16.028146: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Jan 13 23:10:16.028151: | that TSi TS Jan 13 23:10:16.028156: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:10:16.028161: | ipprotoid: 0 Jan 13 23:10:16.028165: | port range: 0-65535 Jan 13 23:10:16.028172: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:10:16.028176: | sec_label: Jan 13 23:10:16.028181: | this TSr TS Jan 13 23:10:16.028185: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:10:16.028189: | ipprotoid: 0 Jan 13 23:10:16.028193: | port range: 0-65535 Jan 13 23:10:16.028199: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:10:16.028204: | sec_label: Jan 13 23:10:16.028208: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Jan 13 23:10:16.028213: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.028217: | flags: none (0x0) Jan 13 23:10:16.028222: | number of TS: 1 (01) Jan 13 23:10:16.028228: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Jan 13 23:10:16.028233: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.028237: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:10:16.028242: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:10:16.028247: | IP Protocol ID: ALL (0x0) Jan 13 23:10:16.028251: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:10:16.028257: | start port: 0 (00 00) Jan 13 23:10:16.028262: | end port: 65535 (ff ff) Jan 13 23:10:16.028270: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:10:16.028275: | IP start: c0 a8 65 0a Jan 13 23:10:16.028282: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:10:16.028287: | IP end: c0 a8 65 0a Jan 13 23:10:16.028294: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:10:16.028298: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Jan 13 23:10:16.028303: | ****emit IKEv2 Traffic Selector - Responder - Payload: Jan 13 23:10:16.028327: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.028335: | flags: none (0x0) Jan 13 23:10:16.028341: | number of TS: 1 (01) Jan 13 23:10:16.028346: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Jan 13 23:10:16.028351: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Jan 13 23:10:16.028356: | *****emit IKEv2 Traffic Selector Header: Jan 13 23:10:16.028361: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Jan 13 23:10:16.028366: | IP Protocol ID: ALL (0x0) Jan 13 23:10:16.028370: | ******emit IKEv2 IP Traffic Selector port range: Jan 13 23:10:16.028376: | start port: 0 (00 00) Jan 13 23:10:16.028381: | end port: 65535 (ff ff) Jan 13 23:10:16.028388: | emitting 4 raw bytes of IP start into IKEv2 Traffic Selector Header Jan 13 23:10:16.028394: | IP start: 00 00 00 00 Jan 13 23:10:16.028400: | emitting 4 raw bytes of IP end into IKEv2 Traffic Selector Header Jan 13 23:10:16.028413: | IP end: ff ff ff ff Jan 13 23:10:16.028418: | emitting length of IKEv2 Traffic Selector Header: 16 Jan 13 23:10:16.028422: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Jan 13 23:10:16.028428: | child state #50: IKE_AUTH_CHILD_R0(ignore) => ESTABLISHED_CHILD_SA(established CHILD SA) Jan 13 23:10:16.028435: | pstats #50 ikev2.child established Jan 13 23:10:16.028443: | this TS Jan 13 23:10:16.028449: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:10:16.028453: | ipprotoid: 0 Jan 13 23:10:16.028458: | port range: 0-65535 Jan 13 23:10:16.028464: | ip range: 0.0.0.0-255.255.255.255 Jan 13 23:10:16.028469: | sec_label: Jan 13 23:10:16.028474: | that TS Jan 13 23:10:16.028479: | ts_type: IKEv2_TS_IPV4_ADDR_RANGE Jan 13 23:10:16.028483: | ipprotoid: 0 Jan 13 23:10:16.028487: | port range: 0-65535 Jan 13 23:10:16.028493: | ip range: 192.168.101.10-192.168.101.10 Jan 13 23:10:16.028499: | sec_label: Jan 13 23:10:16.028508: | NAT-T: NAT Traversal detected - their IKE port is '500' Jan 13 23:10:16.028513: | NAT-T: encaps is 'auto' Jan 13 23:10:16.028521: "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: established Child SA using #49; IPsec tunnel [0.0.0.0-255.255.255.255:0-65535 0] -> [192.168.101.10-192.168.101.10:0-65535 0] {ESPinUDP=>0xceab7aef <0xc7ccc155 xfrm=AES_GCM_16_256-NONE NATD=94.253.210.164:51417 DPD=active} Jan 13 23:10:16.028528: | #50 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 23:10:16.028536: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c83803c818 timeout in 28800 seconds for #50 Jan 13 23:10:16.028543: | newref tt@0x55c83803bf38(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.028549: | dpd enabled, scheduling ikev2 liveness checks Jan 13 23:10:16.028557: | event_schedule_where: newref EVENT_v2_LIVENESS-pe@0x55c838048c78 timeout in 30 seconds for #50 Jan 13 23:10:16.028563: | newref tt@0x55c838047f28(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.028570: | unpending IKE SA #49 CHILD SA #50 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.028578: | unpending state #49 connection "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:16.028585: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 23:10:16.028591: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:10:16.028597: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:10:16.028602: | emitting length of IKEv2 Encryption Payload: 1988 Jan 13 23:10:16.028607: | emitting length of ISAKMP Message: 2016 Jan 13 23:10:16.028614: | **parse ISAKMP Message: Jan 13 23:10:16.028621: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:16.028627: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:16.028633: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:10:16.028637: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:16.028642: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:16.028646: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:16.028652: | Message ID: 1 (00 00 00 01) Jan 13 23:10:16.028658: | length: 2016 (00 00 07 e0) Jan 13 23:10:16.028664: | **parse IKEv2 Encryption Payload: Jan 13 23:10:16.028668: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Jan 13 23:10:16.028673: | flags: none (0x0) Jan 13 23:10:16.028678: | length: 1988 (07 c4) Jan 13 23:10:16.028685: | opening output PBS reply frag packet Jan 13 23:10:16.028689: | **emit ISAKMP Message: Jan 13 23:10:16.028695: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:16.028702: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:16.028707: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:16.028711: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:16.028716: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:16.028721: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:16.028726: | Message ID: 1 (00 00 00 01) Jan 13 23:10:16.028737: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:16.028742: | ***emit IKEv2 Encrypted Fragment: Jan 13 23:10:16.028747: | next payload type: ISAKMP_NEXT_v2IDr (0x24) Jan 13 23:10:16.028752: | flags: none (0x0) Jan 13 23:10:16.028757: | fragment number: 1 (00 01) Jan 13 23:10:16.028762: | total fragments: 5 (00 05) Jan 13 23:10:16.028767: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 36:ISAKMP_NEXT_v2IDr Jan 13 23:10:16.028772: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 23:10:16.028777: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 23:10:16.028782: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 23:10:16.028790: | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 23:10:16.028794: | cleartext fragment: Jan 13 23:10:16.028799: | 25 00 00 12 02 00 00 00 76 70 6e 2e 61 6c 75 2e %.......vpn.alu. Jan 13 23:10:16.028804: | 68 72 27 00 05 21 04 30 82 05 18 30 82 03 00 a0 hr'..!.0...0.... Jan 13 23:10:16.028809: | 03 02 01 02 02 05 00 ba 98 ea 76 30 0d 06 09 2a ..........v0...* Jan 13 23:10:16.028813: | 86 48 86 f7 0d 01 01 0b 05 00 30 2b 31 15 30 13 .H........0+1.0. Jan 13 23:10:16.028818: | 06 03 55 04 03 13 0c 41 4c 55 2d 55 4e 49 5a 47 ..U....ALU-UNIZG Jan 13 23:10:16.028822: | 20 43 41 31 12 30 10 06 03 55 04 0a 13 09 41 4c CA1.0...U....AL Jan 13 23:10:16.028827: | 55 2d 55 4e 49 5a 47 30 1e 17 0d 32 32 30 31 30 U-UNIZG0...22010 Jan 13 23:10:16.028831: | 34 32 30 31 37 35 39 5a 17 0d 32 33 30 31 30 34 4201759Z..230104 Jan 13 23:10:16.028835: | 32 30 31 37 35 39 5a 30 29 31 13 30 11 06 03 55 201759Z0)1.0...U Jan 13 23:10:16.028840: | 04 03 13 0a 76 70 6e 2e 61 6c 75 2e 68 72 31 12 ....vpn.alu.hr1. Jan 13 23:10:16.028844: | 30 10 06 03 55 04 0a 13 09 41 4c 55 2d 55 4e 49 0...U....ALU-UNI Jan 13 23:10:16.028849: | 5a 47 30 82 02 22 30 0d 06 09 2a 86 48 86 f7 0d ZG0.."0...*.H... Jan 13 23:10:16.028853: | 01 01 01 05 00 03 82 02 0f 00 30 82 02 0a 02 82 ..........0..... Jan 13 23:10:16.028858: | 02 01 00 a0 c8 59 55 92 89 aa 4b 8a 33 c0 38 71 .....YU...K.3.8q Jan 13 23:10:16.028862: | 7a e9 c6 c3 90 02 a2 e7 3b 94 5d 17 08 f8 ee 60 z.......;.]....` Jan 13 23:10:16.028866: | 63 3d 93 fa 0c c4 7a 42 7d 0c 09 c2 0b ba b7 e7 c=....zB}....... Jan 13 23:10:16.028871: | ab 06 94 1b 33 85 0b 67 bb 36 65 01 38 ab 4f 00 ....3..g.6e.8.O. Jan 13 23:10:16.028875: | fa 52 f1 ed f5 eb 2c 14 98 88 70 74 6e 3f 19 ef .R....,...ptn?.. Jan 13 23:10:16.028880: | cb 51 0e b6 22 54 b7 65 6d cb e6 99 4d fb 20 07 .Q.."T.em...M. . Jan 13 23:10:16.028884: | f3 1e 99 2a 1d 8c dd 89 0e e9 37 80 f5 a9 c3 86 ...*......7..... Jan 13 23:10:16.028888: | 04 dc e2 1e e9 4e 5a b2 f3 c6 c5 9d 92 da 0d c2 .....NZ......... Jan 13 23:10:16.028893: | f2 ea 60 6b b9 56 3e 0c 70 6f e9 57 bf eb d9 aa ..`k.V>.po.W.... Jan 13 23:10:16.028897: | 51 7d 65 a4 21 10 4b d9 d9 28 1e 28 88 64 a5 26 Q}e.!.K..(.(.d.& Jan 13 23:10:16.028902: | 32 4f e6 f7 b0 64 fe d5 96 fb c3 01 e3 f8 60 d0 2O...d........`. Jan 13 23:10:16.028906: | 3f 1d ea a2 fd 4b 3a 53 7b 75 de 7b b7 86 ca ec ?....K:S{u.{.... Jan 13 23:10:16.028910: | b3 1e 59 32 12 4e ea 40 26 89 ba 15 5c de 56 4c ..Y2.N.@&...\.VL Jan 13 23:10:16.028915: | bc 0d 0e 5e 83 3a fa a5 ab a4 cf 31 af f0 ee 18 ...^.:.....1.... Jan 13 23:10:16.028919: | 5b 6e 3e a7 6f 6d 6b 00 c0 3a 07 f1 c4 06 85 04 [n>.omk..:...... Jan 13 23:10:16.028923: | bb c2 3f 8d f9 e2 b2 ed f8 0c df 23 94 52 69 ea ..?........#.Ri. Jan 13 23:10:16.028928: | 8b 4d f5 bb 0b fb 24 74 8b 30 .M....$t.0 Jan 13 23:10:16.028933: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 23:10:16.028944: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 23:10:16.028950: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 23:10:16.028954: | emitting length of IKEv2 Encrypted Fragment: 507 Jan 13 23:10:16.028959: | emitting length of ISAKMP Message: 535 Jan 13 23:10:16.028974: | recording fragment 1 Jan 13 23:10:16.028982: | opening output PBS reply frag packet Jan 13 23:10:16.028988: | **emit ISAKMP Message: Jan 13 23:10:16.028994: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:16.029001: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:16.029006: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:16.029010: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:16.029015: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:16.029019: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:16.029025: | Message ID: 1 (00 00 00 01) Jan 13 23:10:16.029031: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:16.029036: | ***emit IKEv2 Encrypted Fragment: Jan 13 23:10:16.029041: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.029045: | flags: none (0x0) Jan 13 23:10:16.029051: | fragment number: 2 (00 02) Jan 13 23:10:16.029057: | total fragments: 5 (00 05) Jan 13 23:10:16.029062: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Jan 13 23:10:16.029067: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 23:10:16.029071: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 23:10:16.029077: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 23:10:16.029084: | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 23:10:16.029090: | cleartext fragment: Jan 13 23:10:16.029095: | 95 36 e0 0d 99 e2 3c e4 5f 5d a9 4d 08 96 b2 be .6....<._].M.... Jan 13 23:10:16.029100: | 4d a0 9b 3f 69 2a 51 9c 8a 8d ed 30 bb f0 1d 51 M..?i*Q....0...Q Jan 13 23:10:16.029104: | 0f 2f 14 69 12 40 f2 57 07 6a 8a 5f 24 64 4f 21 ./.i.@.W.j._$dO! Jan 13 23:10:16.029109: | 37 0e c4 17 87 1d 0b 37 cd 45 c1 0b a2 6e d7 03 7......7.E...n.. Jan 13 23:10:16.029113: | 1c d5 a9 e3 80 c1 3d d5 54 52 4e bf 8d 05 6c 72 ......=.TRN...lr Jan 13 23:10:16.029120: | a8 e2 56 3c bb 9c f2 06 85 98 9d a9 04 c8 75 dd ..V<..........u. Jan 13 23:10:16.029124: | d6 7a 4a 93 f0 b5 e8 60 43 c4 8d f9 08 31 98 21 .zJ....`C....1.! Jan 13 23:10:16.029128: | de 16 4d 24 49 7a 6d 5d a3 41 cc e2 ac 77 d8 c1 ..M$Izm].A...w.. Jan 13 23:10:16.029133: | fa ee e5 4b 23 51 8a 28 26 75 c8 bc 9a 51 0d 94 ...K#Q.(&u...Q.. Jan 13 23:10:16.029137: | c1 f2 62 ee 5d 7e 8f 1b 32 84 3d d2 d8 52 af 53 ..b.]~..2.=..R.S Jan 13 23:10:16.029142: | 20 f4 60 29 d6 c7 52 7f 60 05 37 20 77 8e b7 08 .`)..R.`.7 w... Jan 13 23:10:16.029146: | c5 9e d4 05 8d 25 33 61 03 74 89 37 90 09 53 35 .....%3a.t.7..S5 Jan 13 23:10:16.029151: | db 3c a9 58 b1 5b d8 11 da c6 c8 18 2e 5c fb 0a .<.X.[.......\.. Jan 13 23:10:16.029155: | cd 6b 29 a6 7c 6b f3 17 0c 9d 3a 79 d2 a0 45 cb .k).|k....:y..E. Jan 13 23:10:16.029160: | a0 b2 8f 45 ba 50 21 a4 b9 aa e2 6b 18 91 a9 d0 ...E.P!....k.... Jan 13 23:10:16.029165: | 6e 41 6c bf 5d ba 8b 55 39 02 03 01 00 01 a3 45 nAl.]..U9......E Jan 13 23:10:16.029169: | 30 43 30 15 06 03 55 1d 11 04 0e 30 0c 82 0a 76 0C0...U....0...v Jan 13 23:10:16.029173: | 70 6e 2e 61 6c 75 2e 68 72 30 1d 06 03 55 1d 25 pn.alu.hr0...U.% Jan 13 23:10:16.029178: | 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 ..0...+......... Jan 13 23:10:16.029182: | 2b 06 01 05 05 07 03 02 30 0b 06 03 55 1d 0f 04 +.......0...U... Jan 13 23:10:16.029187: | 04 03 02 05 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 .....0...*.H.... Jan 13 23:10:16.029208: | 01 0b 05 00 03 82 02 01 00 08 06 54 5f c6 9d 4c ...........T_..L Jan 13 23:10:16.029214: | 1b 16 04 f4 35 07 86 97 04 a9 4a 7e c4 0f fd e7 ....5.....J~.... Jan 13 23:10:16.029219: | 15 df f7 33 e9 38 6c 89 fb e5 01 d6 71 97 7d 29 ...3.8l.....q.}) Jan 13 23:10:16.029223: | 72 bb 4f b6 a2 25 8e c9 4e c2 df b3 91 bb 35 76 r.O..%..N.....5v Jan 13 23:10:16.029228: | 10 9b 8a ca ac 30 20 ff 80 55 63 a6 48 59 d8 c7 .....0 ..Uc.HY.. Jan 13 23:10:16.029234: | ab 5e cb ac c9 77 0b 93 7d 6e 11 81 ae a6 75 2f .^...w..}n....u/ Jan 13 23:10:16.029239: | 1d c2 86 54 5b a9 33 40 03 e3 28 f2 f4 6e 3e e4 ...T[.3@..(..n>. Jan 13 23:10:16.029244: | 47 89 e5 07 02 85 84 c2 b9 3c 86 21 85 fc 7a 40 G........<.!..z@ Jan 13 23:10:16.029248: | 74 0e ce d1 df 70 e5 82 48 09 t....p..H. Jan 13 23:10:16.029253: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 23:10:16.029259: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 23:10:16.029264: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 23:10:16.029269: | emitting length of IKEv2 Encrypted Fragment: 507 Jan 13 23:10:16.029274: | emitting length of ISAKMP Message: 535 Jan 13 23:10:16.029287: | recording fragment 2 Jan 13 23:10:16.029295: | opening output PBS reply frag packet Jan 13 23:10:16.029300: | **emit ISAKMP Message: Jan 13 23:10:16.029306: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:16.029313: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:16.029317: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:16.029322: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:16.029327: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:16.029332: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:16.029337: | Message ID: 1 (00 00 00 01) Jan 13 23:10:16.029343: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:16.029348: | ***emit IKEv2 Encrypted Fragment: Jan 13 23:10:16.029353: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.029357: | flags: none (0x0) Jan 13 23:10:16.029362: | fragment number: 3 (00 03) Jan 13 23:10:16.029369: | total fragments: 5 (00 05) Jan 13 23:10:16.029374: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Jan 13 23:10:16.029380: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 23:10:16.029385: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 23:10:16.029390: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 23:10:16.029397: | emitting 474 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 23:10:16.029403: | cleartext fragment: Jan 13 23:10:16.029408: | 6d 8c ee 95 20 5b d7 c8 6e 55 76 44 6d 53 ef b0 m... [..nUvDmS.. Jan 13 23:10:16.029413: | ae fe 63 15 97 28 61 d3 64 af ca 1f 82 83 06 a8 ..c..(a.d....... Jan 13 23:10:16.029417: | 0a 64 85 6f 58 7a 24 d5 cb 80 e1 d3 25 27 6b f3 .d.oXz$.....%'k. Jan 13 23:10:16.029421: | 93 a1 b7 b0 be 59 d0 eb 2f 24 61 84 a1 23 e5 e5 .....Y../$a..#.. Jan 13 23:10:16.029426: | 5a c2 86 d9 af 95 a5 ef aa ee 63 be 36 7c ec b5 Z.........c.6|.. Jan 13 23:10:16.029431: | db 67 69 d8 bc 80 80 08 26 c6 c3 e2 96 34 5e 16 .gi.....&....4^. Jan 13 23:10:16.029435: | a5 23 88 51 49 f6 50 07 3b 6f 59 65 4c 1b 2a 4b .#.QI.P.;oYeL.*K Jan 13 23:10:16.029440: | ba bd f0 42 51 e7 73 cd 27 19 94 5a 84 48 bc 98 ...BQ.s.'..Z.H.. Jan 13 23:10:16.029444: | 56 9b 41 34 0a 89 86 5a 35 4f 20 19 25 d0 75 27 V.A4...Z5O .%.u' Jan 13 23:10:16.029448: | ae e0 f6 22 04 b1 46 fa ac 18 3a fc 0d b0 a3 ff ..."..F...:..... Jan 13 23:10:16.029453: | 7d cc a8 87 8e 5c fd dc 71 a9 47 2b 5e 4e 5c 76 }....\..q.G+^N\v Jan 13 23:10:16.029465: | a3 29 b8 91 a6 67 43 2d 16 40 fe 6d d5 f5 40 a2 .)...gC-.@.m..@. Jan 13 23:10:16.029470: | 79 2c 91 1d 43 b1 1d 59 3a c6 58 b6 71 f6 43 9f y,..C..Y:.X.q.C. Jan 13 23:10:16.029475: | e7 f3 36 a3 21 90 aa 78 85 eb 5a 29 ff bc 90 8e ..6.!..x..Z).... Jan 13 23:10:16.029479: | 67 f9 e5 fa d2 c9 e6 3d 4f ed 90 b4 1c 53 53 92 g......=O....SS. Jan 13 23:10:16.029484: | c6 91 c2 72 19 c4 ad d6 68 4f d7 b4 1a 6e bb c0 ...r....hO...n.. Jan 13 23:10:16.029489: | f6 bf 43 79 87 f0 19 0f a9 6f c6 69 1f 04 6f ed ..Cy.....o.i..o. Jan 13 23:10:16.029494: | fc 2b c3 9f 7f d6 34 3e 80 ce b1 e5 c8 5b be e3 .+....4>.....[.. Jan 13 23:10:16.029499: | 8b 13 f2 af 66 d4 07 9c 4e ca c6 0a a0 ee 14 09 ....f...N....... Jan 13 23:10:16.029503: | c0 5e e4 fd 6f 5c 6d 1f ba 8d ae 93 5b ee f7 17 .^..o\m.....[... Jan 13 23:10:16.029508: | 2f f8 3d f7 3f 8a a0 eb b2 bd 68 18 99 0e 86 a7 /.=.?.....h..... Jan 13 23:10:16.029513: | 11 af e5 c1 8d 83 68 f7 aa 3c 59 b3 15 3b e0 c4 ......h..i.(....P.9.d5 Jan 13 23:10:16.029765: | 7e a0 63 26 38 ef 39 e6 59 85 59 94 22 58 e2 11 ~.c&8.9.Y.Y."X.. Jan 13 23:10:16.029770: | 98 29 b2 06 72 1f ae 60 23 e5 6a 3e b5 23 a5 df .)..r..`#.j>.#.. Jan 13 23:10:16.029774: | 66 8a 88 b9 c1 2a d0 d1 15 a1 1d a8 10 86 1e d4 f....*.......... Jan 13 23:10:16.029779: | ae 56 12 be a3 9f 28 2d 0a 3f c2 6f 49 23 ad 71 .V....(-.?.oI#.q Jan 13 23:10:16.029783: | b1 5c 8a 4c 6e ca 3c 88 de 6a dc 0a 69 d0 99 f2 .\.Ln.<..j..i... Jan 13 23:10:16.029789: | 14 a1 b9 b1 26 ea ab 42 42 9c d0 c5 0c 74 9c ed ....&..BB....t.. Jan 13 23:10:16.029794: | 4e 9c 77 4f 3c e1 9f b1 60 2f 1f b9 24 7a ba a7 N.wO<...`/..$z.. Jan 13 23:10:16.029799: | 9c 36 f9 b4 f2 3e f7 ee 37 a3 a8 70 93 bb 21 50 .6...>..7..p..!P Jan 13 23:10:16.029803: | 2d b3 87 83 b1 b2 13 6e 46 53 bf 6e 7f 34 01 91 -......nFS.n.4.. Jan 13 23:10:16.029808: | 25 56 d0 1b 1b 9b 94 ad 3b e6 6a 3c 5c 9d 03 0d %V......;.j<\... Jan 13 23:10:16.029814: | ca 5f 92 9e 85 1f 65 90 bf 8b 79 06 fb bf db 42 ._....e...y....B Jan 13 23:10:16.029819: | a3 d1 97 7e ec 66 80 e8 28 1e 35 84 95 f8 d1 4d ...~.f..(.5....M Jan 13 23:10:16.029823: | 7b 6a d8 4f 07 21 14 d8 d8 4e 93 c8 1a 99 fc d0 {j.O.!...N...... Jan 13 23:10:16.029828: | 20 55 77 1b 07 a9 63 28 9a c8 d9 7b 80 e0 09 77 Uw...c(...{...w Jan 13 23:10:16.029832: | 19 cc 9f 26 c3 9a 31 69 98 57 c1 df f7 48 dc c9 ...&..1i.W...H.. Jan 13 23:10:16.029836: | f1 e1 63 59 e4 90 66 50 ac fe e6 cd 00 d3 ea b3 ..cY..fP........ Jan 13 23:10:16.029843: | fb ee 1d 6c ec 61 4c b7 03 2d 1f f7 3f 21 00 00 ...l.aL..-..?!.. Jan 13 23:10:16.029848: | 18 02 00 00 00 00 01 00 04 c0 a8 65 0a 00 03 00 ...........e.... Jan 13 23:10:16.029852: | 04 08 08 08 08 2c 00 00 24 00 00 00 20 01 03 04 .....,..$... ... Jan 13 23:10:16.029857: | 02 c7 cc c1 55 03 00 00 0c 01 ....U..... Jan 13 23:10:16.029861: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 23:10:16.029866: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 23:10:16.029871: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 23:10:16.029876: | emitting length of IKEv2 Encrypted Fragment: 507 Jan 13 23:10:16.029880: | emitting length of ISAKMP Message: 535 Jan 13 23:10:16.029891: | recording fragment 4 Jan 13 23:10:16.029899: | opening output PBS reply frag packet Jan 13 23:10:16.029904: | **emit ISAKMP Message: Jan 13 23:10:16.029912: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:16.029918: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:16.029924: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:16.029929: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:16.029933: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Jan 13 23:10:16.029938: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:16.029943: | Message ID: 1 (00 00 00 01) Jan 13 23:10:16.029949: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:16.029969: | ***emit IKEv2 Encrypted Fragment: Jan 13 23:10:16.029977: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:16.029982: | flags: none (0x0) Jan 13 23:10:16.029989: | fragment number: 5 (00 05) Jan 13 23:10:16.029995: | total fragments: 5 (00 05) Jan 13 23:10:16.030001: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Jan 13 23:10:16.030006: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Jan 13 23:10:16.030010: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Jan 13 23:10:16.030016: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Jan 13 23:10:16.030024: | emitting 63 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Jan 13 23:10:16.030030: | cleartext fragment: Jan 13 23:10:16.030035: | 00 00 14 80 0e 01 00 00 00 00 08 05 00 00 00 2d ...............- Jan 13 23:10:16.030040: | 00 00 18 01 00 00 00 07 00 00 10 00 00 ff ff c0 ................ Jan 13 23:10:16.030044: | a8 65 0a c0 a8 65 0a 00 00 00 18 01 00 00 00 07 .e...e.......... Jan 13 23:10:16.030049: | 00 00 10 00 00 ff ff 00 00 00 00 ff ff ff ff ............... Jan 13 23:10:16.030054: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 23:10:16.030059: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Jan 13 23:10:16.030064: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Jan 13 23:10:16.030068: | emitting length of IKEv2 Encrypted Fragment: 96 Jan 13 23:10:16.030073: | emitting length of ISAKMP Message: 124 Jan 13 23:10:16.030084: | recording fragment 5 Jan 13 23:10:16.030093: | job 61 helper 6 #49 computing responder signature (signature): final status STF_OK; cleaning up Jan 13 23:10:16.030099: | delref logger@0x55c838017ee8(1->0) (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.030104: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.030108: | delref fd@NULL (free_job() +402 programs/pluto/server_pool.c) Jan 13 23:10:16.030115: | #49 complete_v2_state_transition() PARENT_R1->ESTABLISHED_IKE_SA with status STF_OK Jan 13 23:10:16.030122: | transitioning from state STATE_V2_PARENT_R1 to state STATE_V2_ESTABLISHED_IKE_SA Jan 13 23:10:16.030129: | Message ID: updating counters for #49 Jan 13 23:10:16.030141: | Message ID: IKE #49 updating responder received message request 1: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0 .recv=0->1 .recv_frags=0->2 .recv_wip=1->-1 .last_contact=9594883.683232->9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:16.030151: | Message ID: IKE #49 updating responder sent message response 1: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=0->1 .recv=1 .recv_frags=2 .last_contact=9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:16.030156: | parent state #49: PARENT_R1(half-open IKE SA) => ESTABLISHED_IKE_SA(established IKE SA) Jan 13 23:10:16.030164: | Message ID: IKE #49 no pending message initiators to schedule: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=1 .recv=1 .recv_frags=2 .last_contact=9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:16.030172: | pstats #49 ikev2.ike established Jan 13 23:10:16.030177: | #49 deleting EVENT_CRYPTO_TIMEOUT Jan 13 23:10:16.030183: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:16.030190: | delref state-event@0x55c838013358(1->0) (delete_event() +507 programs/pluto/timer.c) Jan 13 23:10:16.030196: | #49 will expire in 28800 seconds (policy doesn't allow re-key) Jan 13 23:10:16.030202: | event_schedule_where: newref EVENT_SA_EXPIRE-pe@0x55c838013358 timeout in 28800 seconds for #49 Jan 13 23:10:16.030209: | newref tt@0x55c838024868(0->1) (schedule_timeout() +567 programs/pluto/server.c) Jan 13 23:10:16.030226: | sending 539 bytes for STATE_V2_PARENT_R1 through eth0 from 161.53.235.3:4500 to 94.253.210.164:51417 using UDP (for #49) Jan 13 23:10:16.030233: | 00 00 00 00 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 .... u...^2. ... Jan 13 23:10:16.030238: | 51 2c ca 7f 35 20 23 20 00 00 00 01 00 00 02 17 Q,..5 # ........ Jan 13 23:10:16.030242: | 24 00 01 fb 00 01 00 05 bf df 5b 92 67 04 3b 37 $.........[.g.;7 Jan 13 23:10:16.030247: | 5b 80 21 42 20 4b fc 39 12 85 af 9d cb 2c 64 c6 [.!B K.9.....,d. Jan 13 23:10:16.030251: | ad 44 32 8c 2f 82 1e 0a ad 25 2b 8e 58 d0 05 2c .D2./....%+.X.., Jan 13 23:10:16.030256: | 49 1d 1a 16 05 d5 58 85 47 69 0f e0 b9 1d 38 2d I.....X.Gi....8- Jan 13 23:10:16.030260: | 07 6e 16 c2 64 06 cc d0 12 4c 4a 6c ee 72 07 77 .n..d....LJl.r.w Jan 13 23:10:16.030265: | 94 9a a8 17 39 fb 3b c7 84 ae 7c 4e 5c 8f b1 fc ....9.;...|N\... Jan 13 23:10:16.030270: | 72 29 6d 88 97 58 9a 03 12 db 0a 0b d6 99 b2 85 r)m..X.......... Jan 13 23:10:16.030274: | 82 08 9e 22 ed 2a ae 6e 39 a1 2a 7f dc 9b de c3 ...".*.n9.*..... Jan 13 23:10:16.030281: | 1f 52 79 35 bc 56 f9 f3 3b 97 1d 13 cb a2 42 68 .Ry5.V..;.....Bh Jan 13 23:10:16.030285: | d0 64 34 ad 7c c3 54 1e 85 c8 31 97 4a e1 26 61 .d4.|.T...1.J.&a Jan 13 23:10:16.030290: | 73 01 da 7b f9 28 ee 4a 93 a3 7f 6d 95 81 d4 da s..{.(.J...m.... Jan 13 23:10:16.030294: | e0 fd b3 50 52 8f 42 b8 b4 15 f0 8c 33 e2 e0 e6 ...PR.B.....3... Jan 13 23:10:16.030299: | b8 59 63 53 40 57 11 7e 32 51 a1 bf a0 cb de 7e .YcS@W.~2Q.....~ Jan 13 23:10:16.030303: | 54 f5 89 9f f7 66 a1 0a d0 17 e8 9f b5 f5 1d dc T....f.......... Jan 13 23:10:16.030308: | d3 3e 49 c0 ac 85 af 18 d1 7c 11 1b e5 81 66 f9 .>I......|....f. Jan 13 23:10:16.030312: | a8 06 62 b7 69 01 12 29 5a c1 52 02 02 f2 39 2b ..b.i..)Z.R...9+ Jan 13 23:10:16.030317: | 67 5f 33 3d ab e4 f8 b1 1e 2d ea cb bb 5a ef c1 g_3=.....-...Z.. Jan 13 23:10:16.030321: | 7f a5 66 18 d4 7a 00 a4 8f a9 c5 05 fe 07 cb ed ..f..z.......... Jan 13 23:10:16.030325: | f9 16 ba 3e e0 4b 51 88 f0 6d 6c 20 31 62 71 ac ...>.KQ..ml 1bq. Jan 13 23:10:16.030330: | 7b 96 0b f2 95 75 be 89 8f c8 3d 00 8b df f5 24 {....u....=....$ Jan 13 23:10:16.030334: | a1 53 b8 b9 3d 1c 99 85 9f a2 d5 11 e8 5e 4c 1a .S..=........^L. Jan 13 23:10:16.030339: | c1 39 a3 9d 7a 48 05 95 84 72 35 c5 ae 70 07 3f .9..zH...r5..p.? Jan 13 23:10:16.030343: | f7 b7 ca f4 e1 97 1b 14 ae 64 9b 26 07 cd 3f 0e .........d.&..?. Jan 13 23:10:16.030347: | 70 cb 08 8a bb 98 7b 42 f6 11 64 83 dd 5b 75 1b p.....{B..d..[u. Jan 13 23:10:16.030352: | b8 2e d4 9c d8 88 83 7d 79 cc 76 13 44 c0 ca 8d .......}y.v.D... Jan 13 23:10:16.030356: | f2 d0 fa bc 11 2f c3 67 8d 92 6f 3d c2 f6 be 52 ...../.g..o=...R Jan 13 23:10:16.030360: | e4 74 73 f5 b2 fb c4 d3 18 b4 8c 20 b7 3d 29 f6 .ts........ .=). Jan 13 23:10:16.030365: | ee b4 d1 12 62 55 bc 4d af 6a c8 76 52 50 62 7c ....bU.M.j.vRPb| Jan 13 23:10:16.030369: | 2e 46 db 82 3f 78 4a ce 07 2f 83 3c 4f 32 f2 46 .F..?xJ../. Jan 13 23:10:16.030467: | 3d c0 4e 98 fa fe 38 b8 bc 4c 82 4b 94 fb 0a 84 =.N...8..L.K.... Jan 13 23:10:16.030471: | 4b 5a 59 b5 a6 bb 43 e4 f3 bb 86 75 83 cb 7b c4 KZY...C....u..{. Jan 13 23:10:16.030476: | 8e ce fd 2b d3 c9 ab 15 b6 14 f4 73 b9 fa 43 c0 ...+.......s..C. Jan 13 23:10:16.030480: | 8d 2c a4 9d 23 f6 fc f8 02 7a f6 5f f1 23 98 75 .,..#....z._.#.u Jan 13 23:10:16.030487: | 3c d7 68 d7 fe 89 4b 5a fe 6b 85 7f 0e db bb 69 <.h...KZ.k.....i Jan 13 23:10:16.030491: | 98 da 2a 02 a6 73 de 01 c5 2d c7 ac ae bc ff 1e ..*..s...-...... Jan 13 23:10:16.030496: | 32 ce d1 f4 41 31 80 76 f0 45 c3 f9 6c 06 b6 54 2...A1.v.E..l..T Jan 13 23:10:16.030501: | 22 21 64 75 12 77 98 dc 18 e3 ab 02 f1 20 00 f8 "!du.w....... .. Jan 13 23:10:16.030505: | f1 a0 4c ee 49 83 3a e8 5c 74 72 89 8e 37 d5 a3 ..L.I.:.\tr..7.. Jan 13 23:10:16.030510: | 8e 72 2e c6 cf f9 b3 66 25 71 8a 3c 52 0b b2 5b .r.....f%q.4.3v.B..... Jan 13 23:10:16.030551: | 5a e5 1d 99 26 ee 51 e8 3e fc db f4 58 6d e8 22 Z...&.Q.>...Xm." Jan 13 23:10:16.030556: | 9d 12 c3 80 ba c8 24 1d 96 00 4e 42 5f 7f 8c 8e ......$...NB_... Jan 13 23:10:16.030560: | fc 29 78 38 cf e3 ae 86 a9 0b cd 40 c9 bb 53 4a .)x8.......@..SJ Jan 13 23:10:16.030565: | f0 28 45 e8 23 bd d1 25 1d e1 74 8d 7f 6c 11 9a .(E.#..%..t..l.. Jan 13 23:10:16.030569: | 06 d2 b3 df ae ff b2 4f 1f b0 e7 a8 2f 27 48 62 .......O..../'Hb Jan 13 23:10:16.030573: | c7 5a 88 b9 30 ac 62 32 77 ef 7c 9e 3e 6f 44 db .Z..0.b2w.|.>oD. Jan 13 23:10:16.030578: | 50 6a 5f ee 6d 01 ee 25 ab d8 fa a4 c5 34 83 e6 Pj_.m..%.....4.. Jan 13 23:10:16.030582: | 17 f5 3a 97 d6 0f fa 6d 46 0d 19 ..:....mF.. Jan 13 23:10:16.030602: | sending 539 bytes for STATE_V2_PARENT_R1 through eth0 from 161.53.235.3:4500 to 94.253.210.164:51417 using UDP (for #49) Jan 13 23:10:16.030610: | 00 00 00 00 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 .... u...^2. ... Jan 13 23:10:16.030615: | 51 2c ca 7f 35 20 23 20 00 00 00 01 00 00 02 17 Q,..5 # ........ Jan 13 23:10:16.030620: | 00 00 01 fb 00 03 00 05 3d 27 b8 b4 93 23 fa f9 ........='...#.. Jan 13 23:10:16.030624: | 4e e5 52 0c 14 d4 38 2d be 71 b4 75 e1 9e 5c 76 N.R...8-.q.u..\v Jan 13 23:10:16.030629: | f9 21 c9 4f c8 58 87 4f 43 8e 27 4d 21 10 12 fb .!.O.X.OC.'M!... Jan 13 23:10:16.030635: | 3f 0c 2b 16 c6 91 39 de 13 7e 4f 06 9b a1 85 db ?.+...9..~O..... Jan 13 23:10:16.030640: | 41 57 c5 04 08 49 72 9b 09 3b 9f 5f f6 0f 58 60 AW...Ir..;._..X` Jan 13 23:10:16.030645: | 43 6e 94 0e 83 4e ac e9 5d 96 31 e7 ad 16 41 2d Cn...N..].1...A- Jan 13 23:10:16.030649: | 0a 26 c8 9d 0b f8 58 ff 9d c7 e1 12 a6 2c b6 7c .&....X......,.| Jan 13 23:10:16.030654: | 76 2a a9 44 cc 6e 5e a8 a6 2e 72 d9 1e 51 ff 9e v*.D.n^...r..Q.. Jan 13 23:10:16.030658: | 39 d7 fb ba bf ae 31 1e be 4a ea b2 41 8b a2 58 9.....1..J..A..X Jan 13 23:10:16.030668: | c6 01 fb 9e e4 22 24 f4 a5 62 d1 26 2a 44 2e 79 ....."$..b.&*D.y Jan 13 23:10:16.030673: | 2a 0c 5a a5 56 11 bd df a9 91 8d 6a 14 16 ea ff *.Z.V......j.... Jan 13 23:10:16.030678: | 52 04 cf 52 a1 08 28 6e ed 2b 93 14 91 10 49 e2 R..R..(n.+....I. Jan 13 23:10:16.030682: | f3 69 31 30 d3 e3 63 f8 67 f3 88 37 35 dc 3d 14 .i10..c.g..75.=. Jan 13 23:10:16.030687: | d0 cc 9d 94 fb d1 18 22 79 0a 2f d4 76 2d 0a 0d ......."y./.v-.. Jan 13 23:10:16.030692: | 93 ed d4 0f a6 93 4a 24 e8 04 d0 44 c0 90 1f 9c ......J$...D.... Jan 13 23:10:16.030696: | 15 95 77 03 86 b4 4a 12 39 21 ab 59 da 4e 78 b1 ..w...J.9!.Y.Nx. Jan 13 23:10:16.030701: | 6d 7c 40 04 8c a8 97 d7 cf 57 fc 0a 20 3b 0c d0 m|@......W.. ;.. Jan 13 23:10:16.030705: | 5e 52 54 a1 55 38 a5 d7 dd 48 25 8e 78 cd b7 c1 ^RT.U8...H%.x... Jan 13 23:10:16.030710: | 10 4b 79 19 07 08 00 c6 6e 7a 6a 68 b9 f1 e7 a5 .Ky.....nzjh.... Jan 13 23:10:16.030714: | 47 fd 93 ea 40 f8 eb 55 cd c8 9c 7d fc 62 2c df G...@..U...}.b,. Jan 13 23:10:16.030719: | e1 0b f7 73 14 99 43 09 fb 4b 0d 7a 6a 25 09 a3 ...s..C..K.zj%.. Jan 13 23:10:16.030723: | 0f a6 e8 67 c0 6d 9b 72 38 50 38 29 6a c2 5c 01 ...g.m.r8P8)j.\. Jan 13 23:10:16.030728: | e0 90 32 0f 42 e1 e0 05 73 59 3e 98 dd 30 99 72 ..2.B...sY>..0.r Jan 13 23:10:16.030732: | 14 bf 86 8f 06 26 12 66 b4 e4 7a 04 64 21 b0 79 .....&.f..z.d!.y Jan 13 23:10:16.030737: | 37 db c7 7f 8a 8a 8b f4 5c 52 ea f1 dd 5b 24 8a 7.......\R...[$. Jan 13 23:10:16.030741: | 3c 2a bd 1c c1 43 b4 e1 ba d4 b3 f8 61 2b be ba <*...C......a+.. Jan 13 23:10:16.030746: | c3 1a 16 b2 34 0b e9 21 63 8a e8 9b d9 53 02 4f ....4..!c....S.O Jan 13 23:10:16.030750: | a2 82 69 8e 2f 6e ae 5c 4e 69 bb a2 26 aa 0c ca ..i./n.\Ni..&... Jan 13 23:10:16.030754: | 0f 22 15 4d 18 ed f1 bc 90 92 af c0 c6 30 e9 aa .".M.........0.. Jan 13 23:10:16.030759: | 10 3e 45 22 5b 8f b6 a0 a4 b9 50 a1 28 2b 8e 50 .>E"[.....P.(+.P Jan 13 23:10:16.030764: | 57 ad b9 c0 81 51 02 5d 86 5f ae 9e 38 9d 8a 01 W....Q.]._..8... Jan 13 23:10:16.030768: | 9a 4c 16 67 6d 8c da c2 4b 7b e5 .L.gm...K{. Jan 13 23:10:16.030784: | sending 539 bytes for STATE_V2_PARENT_R1 through eth0 from 161.53.235.3:4500 to 94.253.210.164:51417 using UDP (for #49) Jan 13 23:10:16.030791: | 00 00 00 00 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 .... u...^2. ... Jan 13 23:10:16.030796: | 51 2c ca 7f 35 20 23 20 00 00 00 01 00 00 02 17 Q,..5 # ........ Jan 13 23:10:16.030801: | 00 00 01 fb 00 04 00 05 c8 92 43 2c 68 1b 91 4f ..........C,h..O Jan 13 23:10:16.030806: | 20 44 45 df c9 3b d4 ce af 7e 79 99 2b 89 e9 e9 DE..;...~y.+... Jan 13 23:10:16.030811: | 19 53 07 b8 1e 51 23 1f 97 7b b7 25 81 18 27 ad .S...Q#..{.%..'. Jan 13 23:10:16.030815: | 18 82 c4 84 da d2 1d e7 75 2e 34 59 35 aa 01 da ........u.4Y5... Jan 13 23:10:16.030819: | 30 44 c0 e4 d4 f3 72 10 62 24 d4 56 9f 05 7a d6 0D....r.b$.V..z. Jan 13 23:10:16.030824: | e5 03 58 00 76 6e 52 d4 fe 11 f9 17 62 ce b6 e4 ..X.vnR.....b... Jan 13 23:10:16.030828: | 65 14 0e 03 78 41 47 6e e2 43 d3 34 09 3f 6c f4 e...xAGn.C.4.?l. Jan 13 23:10:16.030833: | 78 67 5b 2a e2 f0 77 0e dc 12 e9 44 12 fd 0d 9f xg[*..w....D.... Jan 13 23:10:16.030837: | 98 b2 19 3d f8 d3 a9 4b a0 64 55 fa db 7d 8b 99 ...=...K.dU..}.. Jan 13 23:10:16.030842: | 44 0f 38 9e bb 2f d2 0b 1d 3a 27 46 05 f2 40 a8 D.8../...:'F..@. Jan 13 23:10:16.030846: | a1 ac f9 eb 41 4a 78 e6 ef 98 2d 73 29 1d 25 fc ....AJx...-s).%. Jan 13 23:10:16.030851: | 95 0d de a5 d3 33 31 30 16 7e 1d 35 ce 9d 95 a0 .....310.~.5.... Jan 13 23:10:16.030855: | 66 3d 43 6c 5e a0 fb 11 32 84 61 45 35 b1 31 a4 f=Cl^...2.aE5.1. Jan 13 23:10:16.030860: | 6f e7 3e 5d 37 b4 39 dd 44 62 08 13 f2 16 94 57 o.>]7.9.Db.....W Jan 13 23:10:16.030864: | e4 e5 27 8d 5b a0 3d 4e e6 68 0f 33 1e 80 06 5b ..'.[.=N.h.3...[ Jan 13 23:10:16.030875: | af c6 74 42 0d 9d 7b e5 09 5d a6 34 e4 e3 a1 16 ..tB..{..].4.... Jan 13 23:10:16.030880: | a1 3e e0 88 16 d8 d1 44 36 37 96 6e 12 df 14 33 .>.....D67.n...3 Jan 13 23:10:16.030885: | 6d 66 7b 4e e4 e4 ce f3 a1 42 ec 66 af 3c 72 97 mf{N.....B.f.}Ay...... Jan 13 23:10:16.031028: | sent 5 messages Jan 13 23:10:16.031036: | announcing the state transition Jan 13 23:10:16.031045: | "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: Responder: process IKE_AUTH request: established IKE SA {cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Jan 13 23:10:16.031052: | releasing #49's fd@(nil) because IKEv2 transitions finished Jan 13 23:10:16.031057: | delref fd@NULL (success_v2_state_transition() +2486 programs/pluto/ikev2.c) Jan 13 23:10:16.031063: | delref fd@NULL (success_v2_state_transition() +2486 programs/pluto/ikev2.c) Jan 13 23:10:16.031069: | delref struct msg_digest@0x55c838050b08(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.031076: | delref logger@0x55c83804df78(1->0) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.031081: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.031086: | delref fd@NULL (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.031091: | delref struct iface_endpoint@0x55c83801f058(6->5) (resume_handler() +696 programs/pluto/server.c) Jan 13 23:10:16.031102: | #49 spent 6.14 (6.15) milliseconds in resume sending job back to main thread Jan 13 23:10:16.031110: | delref tt@0x7ff8a8007018(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:23.865986: | spent 0.0062 (0.00619) milliseconds in udp_read_packet() calling check_incoming_msg_errqueue() Jan 13 23:10:23.866061: | newref struct msg_digest@0x55c838050b08(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:23.866097: | addref struct iface_endpoint@0x55c83801f058(5->6) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:23.866110: | newref alloc logger@0x55c83803b6b8(0->1) (udp_read_packet() +386 programs/pluto/iface_udp.c) Jan 13 23:10:23.866128: | *received 65 bytes from 94.253.210.164:51417 on eth0 161.53.235.3:4500 using UDP Jan 13 23:10:23.866139: | 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f u...^2. ...Q,.. Jan 13 23:10:23.866149: | 2e 20 25 08 00 00 00 02 00 00 00 41 2a 00 00 25 . %........A*..% Jan 13 23:10:23.866158: | ce 2d f6 b5 99 3b 33 b0 16 64 29 30 84 c3 86 8c .-...;3..d)0.... Jan 13 23:10:23.866166: | 44 61 22 bc 05 b0 70 f7 e0 e4 27 42 14 08 86 d0 Da"...p...'B.... Jan 13 23:10:23.866176: | 8d . Jan 13 23:10:23.866191: | **parse ISAKMP Message: Jan 13 23:10:23.866215: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:23.866236: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:23.866256: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Jan 13 23:10:23.866274: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:23.866292: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:10:23.866310: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Jan 13 23:10:23.866333: | Message ID: 2 (00 00 00 02) Jan 13 23:10:23.866354: | length: 65 (00 00 00 41) Jan 13 23:10:23.866373: | processing version=2.0 packet with exchange type=ISAKMP_v2_INFORMATIONAL (37) Jan 13 23:10:23.866387: | I am the IKE SA Original Responder receiving an IKEv2 INFORMATIONAL request Jan 13 23:10:23.866414: | State DB: found IKEv2 state #49 in ESTABLISHED_IKE_SA (find_v2_ike_sa) Jan 13 23:10:23.866436: | #49 st.st_msgid_lastrecv 1 md.hdr.isa_msgid 00000002 Jan 13 23:10:23.866468: | Message ID: IKE #49 not a duplicate - message request 2 is new (SKEYSEED is known): ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=1 .recv=1 .recv_frags=2 .last_contact=9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:23.866487: | unpacking clear payload Jan 13 23:10:23.866500: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Jan 13 23:10:23.866512: | ***parse IKEv2 Encryption Payload: Jan 13 23:10:23.866532: | next payload type: ISAKMP_NEXT_v2D (0x2a) Jan 13 23:10:23.866550: | flags: none (0x0) Jan 13 23:10:23.866571: | length: 37 (00 25) Jan 13 23:10:23.866588: | processing payload: ISAKMP_NEXT_v2SK (len=33) Jan 13 23:10:23.866613: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK (ignoring secured payloads) Jan 13 23:10:23.866634: | trying: Informational Request (liveness probe) Jan 13 23:10:23.866649: | matching by ignoring secured payloads Jan 13 23:10:23.866709: | stripping 1 octets as pad Jan 13 23:10:23.866728: | #49 ikev2 ISAKMP_v2_INFORMATIONAL decrypt success Jan 13 23:10:23.866740: | addref struct msg_digest@0x55c838050b08(1->2) (process_packet_with_secured_ike_sa() +1924 programs/pluto/ikev2.c) Jan 13 23:10:23.866750: | Now let's proceed with payload (ISAKMP_NEXT_v2D) Jan 13 23:10:23.866763: | **parse IKEv2 Delete Payload: Jan 13 23:10:23.866785: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:23.866797: | flags: none (0x0) Jan 13 23:10:23.866809: | length: 8 (00 08) Jan 13 23:10:23.866829: | protocol ID: IKEv2_SEC_PROTO_IKE (0x1) Jan 13 23:10:23.866845: | SPI size: 0 (00) Jan 13 23:10:23.866857: | number of SPIs: 0 (00 00) Jan 13 23:10:23.866874: | processing payload: ISAKMP_NEXT_v2D (len=0) Jan 13 23:10:23.866897: | looking for transition from ESTABLISHED_IKE_SA matching INFORMATIONAL request: SK{D} Jan 13 23:10:23.866908: | trying: Informational Request (liveness probe) Jan 13 23:10:23.866919: | secured payloads do not match Jan 13 23:10:23.866939: | trying: Informational Response (liveness probe) Jan 13 23:10:23.866951: | message role does not match response Jan 13 23:10:23.866961: | trying: Informational Request Jan 13 23:10:23.866994: | secured message matched Jan 13 23:10:23.867007: | selected state microcode Informational Request Jan 13 23:10:23.867021: | #49.st_v2_transition PARENT_R1->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2024 programs/pluto/ikev2.c) Jan 13 23:10:23.867052: | Message ID: IKE #49 responder starting message request 2: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=1 .recv=1 .recv_frags=2 .recv_wip=2 .last_contact=9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:23.867069: | calling processor Informational Request Jan 13 23:10:23.867089: | #49 spent 1.12 (1.12) milliseconds Jan 13 23:10:23.867109: | an informational request needing a response Jan 13 23:10:23.867141: | opening output PBS information exchange reply packet Jan 13 23:10:23.867161: | **emit ISAKMP Message: Jan 13 23:10:23.867183: | initiator SPI: 20 75 86 d9 f2 5e 32 f6 Jan 13 23:10:23.867208: | responder SPI: 20 7f d4 c8 51 2c ca 7f Jan 13 23:10:23.867226: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 13 23:10:23.867243: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Jan 13 23:10:23.867261: | exchange type: ISAKMP_v2_INFORMATIONAL (0x25) Jan 13 23:10:23.867283: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Jan 13 23:10:23.867300: | Message ID: 2 (00 00 00 02) Jan 13 23:10:23.867313: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Jan 13 23:10:23.867333: | ***emit IKEv2 Encryption Payload: Jan 13 23:10:23.867351: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Jan 13 23:10:23.867365: | flags: none (0x0) Jan 13 23:10:23.867383: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Jan 13 23:10:23.867405: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'information exchange reply packet' Jan 13 23:10:23.867420: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Jan 13 23:10:23.867451: | adding 1 bytes of padding (including 1 byte padding-length) Jan 13 23:10:23.867472: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Jan 13 23:10:23.867485: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Jan 13 23:10:23.867497: | emitting length of IKEv2 Encryption Payload: 29 Jan 13 23:10:23.867517: | emitting length of ISAKMP Message: 57 Jan 13 23:10:23.867566: | sending 61 bytes for v2_INFORMATIONAL IKE SA Delete response through eth0 from 161.53.235.3:4500 to 94.253.210.164:51417 using UDP (for #49) Jan 13 23:10:23.867585: | 00 00 00 00 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 .... u...^2. ... Jan 13 23:10:23.867595: | 51 2c ca 7f 2e 20 25 20 00 00 00 02 00 00 00 39 Q,... % .......9 Jan 13 23:10:23.867605: | 00 00 00 1d 12 2c 35 47 dd 03 ad 19 19 bb ba 81 .....,5G........ Jan 13 23:10:23.867624: | b4 af a4 b7 af d7 6c d9 77 41 38 91 a6 ......l.wA8.. Jan 13 23:10:23.867690: | sent 1 messages Jan 13 23:10:23.867719: | Message ID: IKE #49 XXX: in process_v2_INFORMATIONAL_request() hacking around record 'n' send as calling delete_ike_family() inline: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=1 .recv=1 .recv_frags=2 .recv_wip=2 .last_contact=9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:23.867744: | Message ID: IKE #49 updating responder sent message response 2: ike.initiator .sent=-1 .recv=-1 .recv_frags=0 .last_contact=9594883.676309 ike.responder .sent=1->2 .recv=1 .recv_frags=2 .recv_wip=2 .last_contact=9594884.051206 ike.wip.initiator=-1 Jan 13 23:10:23.867763: | delete_ike_family() called Jan 13 23:10:23.867782: | pstats #50 ikev2.child deleted completed Jan 13 23:10:23.867797: | #50 main thread spent 0 (0) milliseconds helper thread spent 0 (0) milliseconds in total Jan 13 23:10:23.867819: | kernel: get_sa_info esp.ceab7aef@94.253.210.164 Jan 13 23:10:23.867839: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:10:23.867891: | kernel: get_sa_info esp.c7ccc155@161.53.235.3 Jan 13 23:10:23.867906: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:10:23.867936: "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: ESP traffic information: in=2KB out=4KB Jan 13 23:10:23.867951: | suspend: no MD saved in state #50 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:10:23.867961: | should_send_delete: #50? NO, because Jan 13 23:10:23.867971: | #50 deleting EVENT_v2_LIVENESS Jan 13 23:10:23.867986: | delref tt@0x55c838047f28(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:23.868000: | delref state-event@0x55c838048c78(1->0) (delete_state_tail() +1036 programs/pluto/state.c) Jan 13 23:10:23.868011: | #50 deleting EVENT_SA_EXPIRE Jan 13 23:10:23.868021: | delref tt@0x55c83803bf38(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:23.868035: | delref state-event@0x55c83803c818(1->0) (delete_state_tail() +1039 programs/pluto/state.c) Jan 13 23:10:23.868046: | #50 STATE_V2_ESTABLISHED_CHILD_SA: retransmits: cleared Jan 13 23:10:23.868058: | kernel: running updown command "ipsec _updown" for verb down Jan 13 23:10:23.868073: | kernel: command executing down-client Jan 13 23:10:23.868085: | kernel: get_sa_info esp.ceab7aef@94.253.210.164 Jan 13 23:10:23.868100: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:10:23.868122: | kernel: get_sa_info esp.c7ccc155@161.53.235.3 Jan 13 23:10:23.868136: | xfrm: sendrecv_xfrm_msg() sending 18 Jan 13 23:10:23.868228: | executing down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='1642111816' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PE... Jan 13 23:10:23.868246: | popen cmd is 1240 chars long Jan 13 23:10:23.868257: | cmd( 0):2>&1 PLUTO_VERB='down-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTIO: Jan 13 23:10:23.868266: | cmd( 80):N_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_R: Jan 13 23:10:23.868275: | cmd( 160):OUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vp: Jan 13 23:10:23.868284: | cmd( 240):n.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLI: Jan 13 23:10:23.868293: | cmd( 320):ENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420: Jan 13 23:10:23.868303: | cmd( 400):' PLUTO_SA_TYPE='ESP' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN: Jan 13 23:10:23.868349: | cmd( 480):=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET=: Jan 13 23:10:23.868360: | cmd( 560):'192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PL: Jan 13 23:10:23.868369: | cmd( 640):UTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='1642111: Jan 13 23:10:23.868377: | cmd( 720):816' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKE: Jan 13 23:10:23.868387: | cmd( 800):Y+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KI: Jan 13 23:10:23.868395: | cmd( 880):ND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO: Jan 13 23:10:23.868404: | cmd( 960):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO: Jan 13 23:10:23.868442: | cmd(1040):_CFG_SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' PLUTO_INBYTES='2808: Jan 13 23:10:23.868453: | cmd(1120):' PLUTO_OUTBYTES='4471' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc: Jan 13 23:10:23.868462: | cmd(1200):eab7aef SPI_OUT=0xc7ccc155 ipsec _updown: Jan 13 23:10:23.876804: | kernel: bare_policy_op() DELETE_OUTBOUND EXPECT_NO_INBOUND unrouting connection "MYCONN-ikev2-cp"[2] 94.253.210.164 rt_kind 'unrouted' shunt_policy=NONE 0.0.0.0/0-ALL->192.168.101.10/32 (config)sec_label= Jan 13 23:10:23.876854: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:10:23.876884: | kernel: raw_policy() DELETE_OUTBOUND THIS_IS_NOT_INBOUND bare_policy_op() outbound shunt for unrouting connection 0.0.0.0/0-ALL-ALL-192.168.101.10/32 shunt_policy=NONE encap= lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:10:23.876911: | xfrm_raw_policy() policy=%discard(discard)/1 dir=1 Jan 13 23:10:23.876935: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:10:23.876961: | xfrm_raw_policy() ignoring xfrm_user_tmpl because NULL, policy=1 op=18 Jan 13 23:10:23.876992: | xfrm: sendrecv_xfrm_msg() sending 20 Jan 13 23:10:23.877055: | kernel: policy: result=success Jan 13 23:10:23.877082: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:10:23.877104: | kernel: raw_policy() DELETE_INBOUND EXPECT_NO_INBOUND bare_policy_op() inbound shunt for unrouting connection 192.168.101.10/32-ALL-ALL-0.0.0.0/0 shunt_policy=NONE encap= lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:10:23.877117: | xfrm_raw_policy() policy=%discard(discard)/1 dir=0 Jan 13 23:10:23.877135: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:10:23.877150: | xfrm_raw_policy() ignoring xfrm_user_tmpl because NULL, policy=1 op=10 Jan 13 23:10:23.877160: | xfrm: sendrecv_xfrm_msg() sending 20 Jan 13 23:10:23.877194: "MYCONN-ikev2-cp"[2] 94.253.210.164: kernel: xfrm XFRM_MSG_DELPOLICY for flow %discard(discard)(in) encountered unexpected policy Jan 13 23:10:23.877209: | xfrm: xfrm_raw_policy() deleting policy forward (even when there may not be one) Jan 13 23:10:23.877219: | xfrm: sendrecv_xfrm_msg() sending 20 Jan 13 23:10:23.877240: | kernel: policy: result=success Jan 13 23:10:23.877261: | FOR_EACH_SPD_ROUTE[remote_client_range=192.168.101.10/32]... in (route_owner() +3422 programs/pluto/connections.c) Jan 13 23:10:23.877283: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 0.0.0.0/0 --> 192.168.101.10/32 Jan 13 23:10:23.877294: | matches: 1 Jan 13 23:10:23.877307: | route owner of "MYCONN-ikev2-cp"[2] 94.253.210.164 unrouted: NULL Jan 13 23:10:23.877317: | kernel: running updown command "ipsec _updown" for verb unroute Jan 13 23:10:23.877332: | kernel: command executing unroute-client Jan 13 23:10:23.877430: | executing unroute-client: 2>&1 PLUTO_VERB='unroute-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNECTION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRMI_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID='@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16420' PLUTO_SA_TYPE='none' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG, CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_NET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+IKEV2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND='CK_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER... Jan 13 23:10:23.877467: | popen cmd is 1178 chars long Jan 13 23:10:23.877479: | cmd( 0):2>&1 PLUTO_VERB='unroute-client' PLUTO_CONNECTION='MYCONN-ikev2-cp' PLUTO_CONNEC: Jan 13 23:10:23.877489: | cmd( 80):TION_TYPE='tunnel' PLUTO_VIRT_INTERFACE='NULL' PLUTO_INTERFACE='eth0' PLUTO_XFRM: Jan 13 23:10:23.877498: | cmd( 160):I_ROUTE='' PLUTO_NEXT_HOP='94.253.210.164' PLUTO_ME='161.53.235.3' PLUTO_MY_ID=': Jan 13 23:10:23.877507: | cmd( 240):@vpn.alu.hr' PLUTO_MY_CLIENT='0.0.0.0/0' PLUTO_MY_CLIENT_NET='0.0.0.0' PLUTO_MY_: Jan 13 23:10:23.877517: | cmd( 320):CLIENT_MASK='0.0.0.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16: Jan 13 23:10:23.877536: | cmd( 400):420' PLUTO_SA_TYPE='none' PLUTO_PEER='94.253.210.164' PLUTO_PEER_ID='O=ALU-UNIZG: Jan 13 23:10:23.877552: | cmd( 480):, CN=win7client.alu.hr' PLUTO_PEER_CLIENT='192.168.101.10/32' PLUTO_PEER_CLIENT_: Jan 13 23:10:23.877565: | cmd( 560):NET='192.168.101.10' PLUTO_PEER_CLIENT_MASK='255.255.255.255' PLUTO_PEER_PORT='0: Jan 13 23:10:23.877575: | cmd( 640):' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='xfrm' PLUTO_ADDTIME='0' : Jan 13 23:10:23.877584: | cmd( 720):PLUTO_CONN_POLICY='IKEv2+RSASIG+ENCRYPT+TUNNEL+PFS+MSDH_DOWNGRADE+DONT_REKEY+IKE: Jan 13 23:10:23.877593: | cmd( 800):V2_ALLOW_NARROWING+IKE_FRAG_ALLOW+ESN_NO+ESN_YES+RSASIG_v1_5' PLUTO_CONN_KIND='C: Jan 13 23:10:23.877601: | cmd( 880):K_INSTANCE' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' : Jan 13 23:10:23.877610: | cmd( 960):PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_: Jan 13 23:10:23.877619: | cmd(1040):SERVER='1' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING: Jan 13 23:10:23.877628: | cmd(1120):='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown: Jan 13 23:10:23.892061: | kernel: deleting spi 161.53.235.3 -> esp.ceab7aef@94.253.210.164 Jan 13 23:10:23.892118: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:10:23.892134: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:10:23.892181: | netlink response for Del SA esp.ceab7aef@94.253.210.164 included non-error error Jan 13 23:10:23.892202: | priority calculation of connection "MYCONN-ikev2-cp"[2] 94.253.210.164 is 1769664 (0x1b00c0) base=1 portsw=2 protow=1, srcw=128 dstw=96 instw=0 Jan 13 23:10:23.892230: | kernel: raw_policy() DELETE_INBOUND REPORT_NO_INBOUND teardown_half_ipsec_sa() teardown inbound Child SA 192.168.101.10/32-ALL-ALL-0.0.0.0/0 shunt_policy=UNSET encap= lifetime=0s priority=1769664 sa_marks=o:0/0,i:0/0 xfrm_if_id=0 sec_label= Jan 13 23:10:23.892258: | xfrm_raw_policy() policy=delete(UNUSED)/3 dir=0 Jan 13 23:10:23.892270: | xfrm_raw_policy() using family IPv4 (2) Jan 13 23:10:23.892282: | xfrm_raw_policy() ignoring xfrm_user_tmpl because NULL, policy=3 op=10 Jan 13 23:10:23.892296: | xfrm: sendrecv_xfrm_msg() sending 20 Jan 13 23:10:23.892378: ERROR: "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: kernel: xfrm XFRM_MSG_DELPOLICYdelete(UNUSED) response for flow (in): No such file or directory (errno 2) Jan 13 23:10:23.892396: | xfrm: xfrm_raw_policy() deleting policy forward (even when there may not be one) Jan 13 23:10:23.892404: | xfrm: sendrecv_xfrm_msg() sending 20 Jan 13 23:10:23.892418: | kernel: policy: result=failed Jan 13 23:10:23.892431: "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: raw_policy in teardown_half_ipsec_sa() failed to delete inbound Jan 13 23:10:23.892443: | kernel: deleting spi 94.253.210.164 -> esp.c7ccc155@161.53.235.3 Jan 13 23:10:23.892454: | XFRM: deleting IPsec SA with reqid 0 Jan 13 23:10:23.892461: | xfrm: sendrecv_xfrm_msg() sending 17 Jan 13 23:10:23.892489: | netlink response for Del SA esp.c7ccc155@161.53.235.3 included non-error error Jan 13 23:10:23.892504: | skipping revival: not an IKE SA Jan 13 23:10:23.892517: | delref struct iface_endpoint@0x55c83801f058(6->5) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:10:23.892536: | entry state hash_table_entries.serialno@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50 deleted from hash table Jan 13 23:10:23.892548: | entry state hash_table_entries.connection_serialno@0x55c8380543f8 $9 deleted from hash table Jan 13 23:10:23.892576: | entry state hash_table_entries.reqid@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: reqid=0 deleted from hash table Jan 13 23:10:23.892594: | entry state hash_table_entries.ike_initiator_spi@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: 20 75 86 d9 f2 5e 32 f6 deleted from hash table Jan 13 23:10:23.892625: | entry state hash_table_entries.ike_spis@0x55c8380543f8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #50: 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f deleted from hash table Jan 13 23:10:23.892650: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:10:23.892663: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #49 Jan 13 23:10:23.892673: | connection instance MYCONN-ikev2-cp in use by #49, skipping delete-unused Jan 13 23:10:23.892694: | child state #50: ESTABLISHED_CHILD_SA(established CHILD SA) => UNDEFINED(ignore) Jan 13 23:10:23.892705: | releasing #50's fd@(nil) because deleting state Jan 13 23:10:23.892714: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:10:23.892731: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:10:23.892748: | delref pkp@NULL (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:10:23.892765: | delref secret@NULL (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:10:23.892779: | delete_state_tail: delref st->st_dh_shared_secret-key@NULL Jan 13 23:10:23.892792: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:10:23.892803: | delete_state_tail: delref st->st_skey_d_nss-key@0x55c838012940 Jan 13 23:10:23.892817: | delete_state_tail: delref st->st_skey_ai_nss-key@NULL Jan 13 23:10:23.892832: | delete_state_tail: delref st->st_skey_ar_nss-key@NULL Jan 13 23:10:23.892842: | delete_state_tail: delref st->st_skey_ei_nss-key@0x55c838041fd0 Jan 13 23:10:23.892852: | delete_state_tail: delref st->st_skey_er_nss-key@0x55c83801c850 Jan 13 23:10:23.892869: | delete_state_tail: delref st->st_skey_pi_nss-key@0x55c8380199c0 Jan 13 23:10:23.892883: | delete_state_tail: delref st->st_skey_pr_nss-key@0x55c838026c40 Jan 13 23:10:23.892899: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:10:23.892913: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:10:23.892925: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:10:23.892939: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:10:23.892957: | delref logger@0x55c8380523a8(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:23.892973: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:23.892982: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:23.892997: | State DB: IKEv2 state not found (delete_ike_family) Jan 13 23:10:23.893016: | should_send_delete: #49? NO, because Jan 13 23:10:23.893039: "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: deleting state (STATE_V2_ESTABLISHED_IKE_SA) aged 8.237905s and NOT sending notification Jan 13 23:10:23.893056: | pstats #49 ikev2.ike deleted completed Jan 13 23:10:23.893074: | #49 main thread spent 21.3 (21.5) milliseconds helper thread spent 23.7 (23.8) milliseconds in total Jan 13 23:10:23.893086: | suspend: no MD saved in state #49 (delete_state_tail() +1013 programs/pluto/state.c) Jan 13 23:10:23.893101: | should_send_delete: #49? NO, because Jan 13 23:10:23.893112: | #49 deleting EVENT_SA_EXPIRE Jan 13 23:10:23.893134: | delref tt@0x55c838024868(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:23.893153: | delref state-event@0x55c838013358(1->0) (delete_state_tail() +1039 programs/pluto/state.c) Jan 13 23:10:23.893166: | #49 STATE_V2_ESTABLISHED_IKE_SA: retransmits: cleared Jan 13 23:10:23.893179: | State DB: IKEv2 state not found (flush_incomplete_children) Jan 13 23:10:23.893194: | skipping revival: POLICY_UP disabled Jan 13 23:10:23.893210: | delref struct iface_endpoint@0x55c83801f058(5->4) (delete_state_tail() +1108 programs/pluto/state.c) Jan 13 23:10:23.893241: | entry state hash_table_entries.serialno@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49 deleted from hash table Jan 13 23:10:23.893258: | entry state hash_table_entries.connection_serialno@0x55c8380206c8 $9 deleted from hash table Jan 13 23:10:23.893277: | entry state hash_table_entries.reqid@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: reqid=0 deleted from hash table Jan 13 23:10:23.893299: | entry state hash_table_entries.ike_initiator_spi@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: 20 75 86 d9 f2 5e 32 f6 deleted from hash table Jan 13 23:10:23.893321: | entry state hash_table_entries.ike_spis@0x55c8380206c8 "MYCONN-ikev2-cp"[2] 94.253.210.164 #49: 20 75 86 d9 f2 5e 32 f6 20 7f d4 c8 51 2c ca 7f deleted from hash table Jan 13 23:10:23.893336: | FOR_EACH_STATE[connection_serialno=$9]... in (connection_delete_unused_instance() +3974 programs/pluto/connections.c) Jan 13 23:10:23.893348: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 #47 Jan 13 23:10:23.893361: | connection instance MYCONN-ikev2-cp in use by #47, skipping delete-unused Jan 13 23:10:23.893378: | parent state #49: ESTABLISHED_IKE_SA(established IKE SA) => UNDEFINED(ignore) Jan 13 23:10:23.893393: | releasing #49's fd@(nil) because deleting state Jan 13 23:10:23.893408: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:10:23.893421: | delref fd@NULL (delete_state_tail() +1157 programs/pluto/state.c) Jan 13 23:10:23.893439: | delref struct pubkey@0x7ff8b400afa8(2->1) (delete_state_tail() +1164 programs/pluto/state.c) Jan 13 23:10:23.893466: | delref struct dh_local_secret@0x7ff8bc00c8e8(1->0) (delete_state_tail() +1170 programs/pluto/state.c) Jan 13 23:10:23.893573: | delref struct pubkey@0x7ff8b400afa8(1->0) (free_public_keyentry() +1346 lib/libswan/secrets.c) Jan 13 23:10:23.893607: | delref struct pubkey@0x7ff8b4003338(1->0) (free_public_keyentry() +1346 lib/libswan/secrets.c) Jan 13 23:10:23.893636: | delete_state_tail: delref st->st_dh_shared_secret-key@0x55c838026d80 Jan 13 23:10:23.893668: | delete_state_tail: delref st->st_skeyid_nss-key@NULL Jan 13 23:10:23.893684: | delete_state_tail: delref st->st_skey_d_nss-key@0x55c838012940 Jan 13 23:10:23.893707: | delete_state_tail: delref st->st_skey_ai_nss-key@NULL Jan 13 23:10:23.893720: | delete_state_tail: delref st->st_skey_ar_nss-key@NULL Jan 13 23:10:23.893728: | delete_state_tail: delref st->st_skey_ei_nss-key@0x55c838041fd0 Jan 13 23:10:23.893746: | delete_state_tail: delref st->st_skey_er_nss-key@0x55c83801c850 Jan 13 23:10:23.893769: | delete_state_tail: delref st->st_skey_pi_nss-key@0x55c8380199c0 Jan 13 23:10:23.893793: | delete_state_tail: delref st->st_skey_pr_nss-key@0x55c838026c40 Jan 13 23:10:23.893818: | delete_state_tail: delref st->st_enc_key_nss-key@NULL Jan 13 23:10:23.893831: | delete_state_tail: delref st->st_sk_d_no_ppk-key@NULL Jan 13 23:10:23.893842: | delete_state_tail: delref st->st_sk_pi_no_ppk-key@NULL Jan 13 23:10:23.893849: | delete_state_tail: delref st->st_sk_pr_no_ppk-key@NULL Jan 13 23:10:23.893867: | delref logger@0x55c838019ae8(1->0) (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:23.893880: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:23.893896: | delref fd@NULL (delete_state_tail() +1243 programs/pluto/state.c) Jan 13 23:10:23.893911: | processor 'Informational Request' for #49 suppresed complete st_v2_transition Jan 13 23:10:23.893927: | in statetime_stop() and could not find #49 Jan 13 23:10:23.893943: | delref struct msg_digest@0x55c838050b08(2->1) (process_packet_with_secured_ike_sa() +1934 programs/pluto/ikev2.c) Jan 13 23:10:23.893957: | in statetime_stop() and could not find #49 Jan 13 23:10:23.893975: | delref struct msg_digest@0x55c838050b08(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:23.893990: | delref logger@0x55c83803b6b8(1->0) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:23.894005: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:23.894031: | delref fd@NULL (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:23.894044: | delref struct iface_endpoint@0x55c83801f058(4->3) (process_iface_packet() +306 programs/pluto/demux.c) Jan 13 23:10:23.894071: | spent 7.06 (28.1) milliseconds in process_iface_packet() reading and processing packet Jan 13 23:10:23.894106: | processing signal PLUTO_SIGCHLD Jan 13 23:10:23.894128: | waitpid returned ECHILD (no child processes left) Jan 13 23:10:23.894151: | spent 0.0223 (0.022) milliseconds in signal handler PLUTO_SIGCHLD Jan 13 23:10:23.894167: | processing signal PLUTO_SIGCHLD Jan 13 23:10:23.894182: | waitpid returned ECHILD (no child processes left) Jan 13 23:10:23.894200: | spent 0.0163 (0.0162) milliseconds in signal handler PLUTO_SIGCHLD Jan 13 23:10:28.419813: | timer_event_cb: processing EVENT_v2_LIVENESS-event@0x55c838012e58 for CHILD SA #47 in state ESTABLISHED_CHILD_SA Jan 13 23:10:28.419864: | #47 deleting EVENT_v2_LIVENESS Jan 13 23:10:28.419882: | delref tt@0x55c838048ba8(1->0) (destroy_timeout() +585 programs/pluto/server.c) Jan 13 23:10:28.419896: | delref state-event@0x55c838012e58(1->0) (timer_event_cb() +227 programs/pluto/timer.c) Jan 13 23:10:28.419914: | liveness: #47 was replaced by #0 so not needed Jan 13 23:10:28.419935: | #47 spent 0.125 (0.123) milliseconds in timer_event_cb() EVENT_v2_LIVENESS Jan 13 23:10:30.077661: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:10:30.077712: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:10:30.077733: | spent 0.0171 (0.0157) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:10:50.081790: | processing global timer EVENT_PENDING_PHASE2 Jan 13 23:10:50.081850: | FOR_EACH_CONNECTION_.... in (connection_check_phase2() +1203 programs/pluto/initiate.c) Jan 13 23:10:50.081871: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:50.081884: | pending review: connection "MYCONN-ikev2-cp"[2] 94.253.210.164 was not up, skipped Jan 13 23:10:50.081897: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:10:50.081908: | pending review: connection "L2TP-PSK-NAT"[1] 94.253.210.164 was not up, skipped Jan 13 23:10:50.081919: | found "L2TP-PSK-common" Jan 13 23:10:50.081929: | pending review: connection "L2TP-PSK-common" was not up, skipped Jan 13 23:10:50.081938: | found "L2TP-PSK-noNAT" Jan 13 23:10:50.081948: | pending review: connection "L2TP-PSK-noNAT" was not up, skipped Jan 13 23:10:50.081957: | found "L2TP-PSK-NAT" Jan 13 23:10:50.081967: | pending review: connection "L2TP-PSK-NAT" was not up, skipped Jan 13 23:10:50.081976: | found "MYCONN-ikev2-cp" Jan 13 23:10:50.081985: | pending review: connection "MYCONN-ikev2-cp" was not up, skipped Jan 13 23:10:50.081995: | matches: 6 Jan 13 23:10:50.082020: | spent 0.168 (0.166) milliseconds in global timer EVENT_PENDING_PHASE2 Jan 13 23:10:50.082035: | processing global timer EVENT_PENDING_DDNS Jan 13 23:10:50.082049: | FOR_EACH_CONNECTION_.... in (connection_check_ddns() +1184 programs/pluto/initiate.c) Jan 13 23:10:50.082070: | found "MYCONN-ikev2-cp"[2] 94.253.210.164 Jan 13 23:10:50.082093: | found "L2TP-PSK-NAT"[1] 94.253.210.164 Jan 13 23:10:50.082113: | found "L2TP-PSK-common" Jan 13 23:10:50.082130: | found "L2TP-PSK-noNAT" Jan 13 23:10:50.082149: | found "L2TP-PSK-NAT" Jan 13 23:10:50.082169: | found "MYCONN-ikev2-cp" Jan 13 23:10:50.082190: | matches: 6 Jan 13 23:10:50.082207: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Jan 13 23:10:50.082266: | spent 0.212 (0.213) milliseconds in in connection_check_ddns for hostname lookup Jan 13 23:10:50.082286: | spent 0.237 (0.237) milliseconds in global timer EVENT_PENDING_DDNS Jan 13 23:10:50.082299: | processing global timer EVENT_SHUNT_SCAN Jan 13 23:10:50.082312: | kernel: checking for aged bare shunts from shunt table to expire Jan 13 23:10:50.082341: | spent 0.0233 (0.0235) milliseconds in global timer EVENT_SHUNT_SCAN Jan 13 23:10:50.082362: | processing global timer EVENT_SD_WATCHDOG Jan 13 23:10:50.082384: | pluto_sd: executing action action: watchdog(3), status 0 Jan 13 23:10:50.082496: | spent 0.11 (0.11) milliseconds in global timer EVENT_SD_WATCHDOG