| *received whack message | processing connection marajade--vpsn | empty esp_info, returning empty | creating state object #408 at 0x8223dd8 | processing connection marajade--vpsn | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: 00 00 00 00 00 00 00 00 | peer: d8 bf 8c 26 | state hash entry 21 | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #408 | Queuing pending Quick Mode with 216.191.140.38 "marajade--vpsn" "marajade--vpsn" #408: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | no IKE algorithms for this connection | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID | DOI: ISAKMP_DOI_IPSEC | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY | out_sa pcn: 0 has 1 valid proposals | out_sa pcn: 0 pn: 0<1 valid_count: 1 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE | proposal number: 0 | protocol ID: PROTO_ISAKMP | SPI size: 0 | number of transforms: 4 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T | transform number: 0 | transform ID: KEY_IKE | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 3600 | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 1 | [1 is OAKLEY_MD5] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 3 | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T | transform number: 1 | transform ID: KEY_IKE | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 3600 | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 2 | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 3 | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T | transform number: 2 | transform ID: KEY_IKE | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 3600 | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 2 | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 3 | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 2 | [2 is OAKLEY_GROUP_MODP1024] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE | transform number: 3 | transform ID: KEY_IKE | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 3600 | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 1 | [1 is OAKLEY_MD5] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 3 | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 2 | [2 is OAKLEY_GROUP_MODP1024] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 136 | emitting length of ISAKMP Security Association Payload: 148 | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 12 raw bytes of Vendor ID into ISAKMP Vendor ID Payload | Vendor ID 4f 45 45 46 42 79 7f 64 75 7c 5f 5b | emitting length of ISAKMP Vendor ID Payload: 16 | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat traversal enabled: 1 | nat add vid. port: 1 nonike: 1 | out_vendorid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc | emitting length of ISAKMP Vendor ID Payload: 20 | emitting length of ISAKMP Message: 312 | sending 312 bytes for main_outI1 through eth0:500 to 216.191.140.38:500: | c8 c9 8b 44 19 84 5a 59 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 01 38 0d 00 00 94 | 00 00 00 01 00 00 00 01 00 00 00 88 00 01 00 04 | 03 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 01 80 03 00 03 80 04 00 05 | 03 00 00 20 01 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 03 00 00 20 02 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 02 | 00 00 00 20 03 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 01 80 03 00 03 80 04 00 02 | 0d 00 00 10 4f 45 45 46 42 79 7f 64 75 7c 5f 5b | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc | 77 57 01 00 0d 00 00 14 4a 13 1c 81 07 03 58 45 | 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 7d 94 19 a6 | 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14 | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 44 85 15 2d 18 b6 bb cd | 0b e8 a8 46 95 79 dd cc | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #408 | next event EVENT_RETRANSMIT in 2 seconds for #407 | | *received 136 bytes from 216.191.140.38:500 on eth0 (port=500) | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 01 10 02 00 00 00 00 00 00 00 00 88 0d 00 00 34 | 00 00 00 01 00 00 00 01 00 00 00 28 00 01 00 01 | 00 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 01 80 03 00 03 80 04 00 05 | 0d 00 00 10 4f 45 45 46 42 79 7f 64 75 7c 5f 5b | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc | 77 57 01 00 00 00 00 14 4a 13 1c 81 07 03 58 45 | 5c 57 28 f2 0e 95 45 2f | **parse ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_SA | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | length: 136 | processing packet with exchange type=ISAKMP_XCHG_IDPROT (2) | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | state object not found | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: 00 00 00 00 00 00 00 00 | peer: d8 bf 8c 26 | state hash entry 21 | peer and cookies match on #408, provided msgid 00000000 vs 00000000 | state object #408 found, in STATE_MAIN_I1 | processing connection marajade--vpsn | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID | length: 52 | DOI: ISAKMP_DOI_IPSEC | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID | length: 16 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID | length: 20 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE | length: 20 "marajade--vpsn" #408: received Vendor ID payload [Libreswan (this version) 2.CVSHEAD X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR] "marajade--vpsn" #408: received Vendor ID payload [Dead Peer Detection] "marajade--vpsn" #408: received Vendor ID payload [RFC 3947] method set to=110 | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE | length: 40 | proposal number: 0 | protocol ID: PROTO_ISAKMP | SPI size: 0 | number of transforms: 1 | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE | length: 32 | transform number: 0 | transform ID: KEY_IKE | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_TYPE | length/value: 1 | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_LIFE_DURATION | length/value: 3600 | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_ENCRYPTION_ALGORITHM | length/value: 5 | [5 is OAKLEY_3DES_CBC] | ike_alg_enc_ok(ealg=5,key_len=0): blocksize=8, keyminlen=192, keydeflen=192, keymaxlen=192, ret=1 | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_HASH_ALGORITHM | length/value: 1 | [1 is OAKLEY_MD5] | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_AUTHENTICATION_METHOD | length/value: 3 | [3 is OAKLEY_RSA_SIG] | ******parse ISAKMP Oakley attribute: | af+type: OAKLEY_GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | Oakley Transform 0 accepted | sender checking NAT-t: 1 and 110 "marajade--vpsn" #408: enabling possible NAT-traversal with method 3 | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1 | asking helper 0 to do build_kenonce op on seq: 408 | inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #408 | complete state transition with STF_SUSPEND | next event EVENT_RETRANSMIT in 2 seconds for #407 ! helper -1 doing build_kenonce op id: 408 | helper 0 has work (cnt now 0) | helper 0 replies to sequence 408 | calling callback function 0x8068170 | main inR1_outI2: calculated ke+nonce, sending I2 | processing connection marajade--vpsn | **emit ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_KE | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 53 41 5e 65 f1 c1 1c a9 2e 0c 82 d7 7a e1 4d 24 | 9d 5f c8 aa 68 99 02 0d db 88 e9 59 0b e3 b1 7c | 82 25 c0 c8 bf 63 2e fc 17 78 2c 41 0a d3 d6 f6 | d0 6e b8 71 97 21 22 e4 46 8b 91 93 f9 45 fb 25 | 1b 10 eb 66 db 3d a5 c8 92 48 2e 8e aa b8 4e 6a | 1f 61 4d d9 a1 10 28 3f 1d 71 78 e0 70 fd 02 37 | 29 b0 d5 27 30 ff 1d 82 c5 99 54 3b 2c 07 3b f0 | 6a ed c4 c3 8b 49 53 d4 be 1c 69 88 f5 a0 22 aa | ae eb 32 1b cb aa 73 47 00 0f 0d c7 5e 2c 4f 47 | 37 5d e4 40 84 03 fb 3d 7f bb a3 4b 3e 41 21 fd | cb 6f f8 19 1a c8 b6 0d 4e 16 6c 60 77 c2 0f 8e | dd fc 06 74 41 58 a0 f6 d5 44 bb 19 c6 0d 51 27 | emitting length of ISAKMP Key Exchange Payload: 196 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload | Ni e7 ff 90 49 25 b6 ff 99 59 ae 80 84 63 3e ec 2f | emitting length of ISAKMP Nonce Payload: 20 | sending NATD payloads | _natd_hash: hasher=0x80e91e0(16) | _natd_hash: icookie= | c8 c9 8b 44 19 84 5a 59 | _natd_hash: rcookie= | d0 23 4f 16 d3 3e 23 d4 | _natd_hash: ip= d8 bf 8c 26 | _natd_hash: port=500 | _natd_hash: hash= 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NAT-D | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | emitting length of ISAKMP NAT-D Payload: 20 | _natd_hash: hasher=0x80e91e0(16) | _natd_hash: icookie= | c8 c9 8b 44 19 84 5a 59 | _natd_hash: rcookie= | d0 23 4f 16 d3 3e 23 d4 | _natd_hash: ip= cd 96 c8 f7 | _natd_hash: port=500 | _natd_hash: hash= 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | emitting length of ISAKMP NAT-D Payload: 20 | emitting length of ISAKMP Message: 284 | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: 00 00 00 00 00 00 00 00 | peer: d8 bf 8c 26 | state hash entry 21 | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | complete state transition with STF_OK "marajade--vpsn" #408: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | sending reply packet to 216.191.140.38:500 (from port=500) | sending 284 bytes for STATE_MAIN_I1 through eth0:500 to 216.191.140.38:500: | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 04 10 02 00 00 00 00 00 00 00 01 1c 0a 00 00 c4 | 53 41 5e 65 f1 c1 1c a9 2e 0c 82 d7 7a e1 4d 24 | 9d 5f c8 aa 68 99 02 0d db 88 e9 59 0b e3 b1 7c | 82 25 c0 c8 bf 63 2e fc 17 78 2c 41 0a d3 d6 f6 | d0 6e b8 71 97 21 22 e4 46 8b 91 93 f9 45 fb 25 | 1b 10 eb 66 db 3d a5 c8 92 48 2e 8e aa b8 4e 6a | 1f 61 4d d9 a1 10 28 3f 1d 71 78 e0 70 fd 02 37 | 29 b0 d5 27 30 ff 1d 82 c5 99 54 3b 2c 07 3b f0 | 6a ed c4 c3 8b 49 53 d4 be 1c 69 88 f5 a0 22 aa | ae eb 32 1b cb aa 73 47 00 0f 0d c7 5e 2c 4f 47 | 37 5d e4 40 84 03 fb 3d 7f bb a3 4b 3e 41 21 fd | cb 6f f8 19 1a c8 b6 0d 4e 16 6c 60 77 c2 0f 8e | dd fc 06 74 41 58 a0 f6 d5 44 bb 19 c6 0d 51 27 | 14 00 00 14 e7 ff 90 49 25 b6 ff 99 59 ae 80 84 | 63 3e ec 2f 14 00 00 14 6d e9 ea f1 ea a1 35 fe | b1 5c 57 83 da 33 30 02 00 00 00 14 1e 32 60 d5 | cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #408 "marajade--vpsn" #408: STATE_MAIN_I2: sent MI2, expecting MR2 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 1 to unpend | next event EVENT_RETRANSMIT in 2 seconds for #407 | | *received 284 bytes from 216.191.140.38:500 on eth0 (port=500) | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 04 10 02 00 00 00 00 00 00 00 01 1c 0a 00 00 c4 | f6 80 f2 11 ac b0 24 70 8e 23 14 5d cb 53 fb 60 | f0 65 8f da de e8 16 ec 38 02 53 3a 3d 49 9d 0d | c5 dc e0 23 ab bd 8f 9c b3 e2 2d 33 43 29 5a 65 | 58 ee 3a 59 53 17 ab 94 c5 78 45 15 91 49 df 2a | ab a6 12 d9 bd 01 12 c0 a0 5e 75 d3 56 48 b4 83 | 8c c4 3d 64 a5 b1 9e fc d6 17 36 7f ac f7 a3 08 | 4c 4c 74 23 6d 88 dc d3 4c b1 5f 64 dd dc 20 ad | a5 51 ef 9a e8 ec 6a 00 3e 69 f5 c1 9b 32 84 be | 75 13 d8 2b cb 34 3d cd d6 5b 18 fc cc 5f c5 0c | 96 8e 4c a5 fa 9e 00 d3 1e a9 ce 75 2a 59 33 3d | a3 6f e0 bd c2 2d 53 19 01 bb 8b 7f cd fb 41 b9 | 8b 08 68 66 c8 4b 2c c9 49 3a 22 b5 7b c9 8e 31 | 14 00 00 14 a2 7d e9 af fc 36 0b 6d e8 4c 80 d6 | 87 9e 6d c6 14 00 00 14 1e 32 60 d5 cf 6b ad a2 | 96 70 22 6c 77 6b 4e 24 00 00 00 14 6d e9 ea f1 | ea a1 35 fe b1 5c 57 83 da 33 30 02 | **parse ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_KE | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: none | message ID: 00 00 00 00 | length: 284 | processing packet with exchange type=ISAKMP_XCHG_IDPROT (2) | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | peer and cookies match on #408, provided msgid 00000000 vs 00000000 | state object #408 found, in STATE_MAIN_I2 | processing connection marajade--vpsn | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE | length: 196 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NAT-D | length: 20 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NAT-D | length: 20 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE | length: 20 | **emit ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_ID | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: ISAKMP_FLAG_ENCRYPTION | message ID: 00 00 00 00 | DH public value received: | f6 80 f2 11 ac b0 24 70 8e 23 14 5d cb 53 fb 60 | f0 65 8f da de e8 16 ec 38 02 53 3a 3d 49 9d 0d | c5 dc e0 23 ab bd 8f 9c b3 e2 2d 33 43 29 5a 65 | 58 ee 3a 59 53 17 ab 94 c5 78 45 15 91 49 df 2a | ab a6 12 d9 bd 01 12 c0 a0 5e 75 d3 56 48 b4 83 | 8c c4 3d 64 a5 b1 9e fc d6 17 36 7f ac f7 a3 08 | 4c 4c 74 23 6d 88 dc d3 4c b1 5f 64 dd dc 20 ad | a5 51 ef 9a e8 ec 6a 00 3e 69 f5 c1 9b 32 84 be | 75 13 d8 2b cb 34 3d cd d6 5b 18 fc cc 5f c5 0c | 96 8e 4c a5 fa 9e 00 d3 1e a9 ce 75 2a 59 33 3d | a3 6f e0 bd c2 2d 53 19 01 bb 8b 7f cd fb 41 b9 | 8b 08 68 66 c8 4b 2c c9 49 3a 22 b5 7b c9 8e 31 | thinking about whether to send my certificate: | I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_NONE | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so do not send cert. "marajade--vpsn" #408: I did not send a certificate because I do not have one. | I am not sending a certificate request | started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK | actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK | concluding with best_match=0 best=(nil) (lineno=-1) | calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1536): 16198 usec | DH shared secret: | 0c 6a 00 29 fb dd 1e 78 57 9b 9d 90 58 f6 4e d7 | a7 0d 92 ea 17 87 ae ce 72 50 cc ab 7a c2 02 4d | 0c d9 95 9b 61 61 39 b3 43 d0 ee 31 89 3a 0a d9 | 62 a7 a2 b9 ea 12 36 54 ba 80 ed a3 22 70 4e e8 | b3 09 66 52 5e 4e 32 b5 82 2c 5f 97 88 a3 2b c0 | 22 5d d6 e3 e3 f0 ca bf 99 39 5c 55 f2 2a 81 e9 | ff 6f 30 36 27 fb 15 1f c6 50 a9 fc 1f 5e be 09 | 1d b4 7d e2 1a 7c db f8 7b 94 3f 82 27 54 f6 34 | 32 d4 a3 26 5d 48 e6 a9 f4 12 cb 21 8f 7f 1a 4e | 83 8e 73 4f 7d 28 53 f2 57 96 14 67 ee ee 01 b6 | a0 9e ae 8e f2 f9 ce 3e 1c a0 fd 2a d0 38 b7 68 | 1f d6 dc 5b 1b d0 ff ce 6a 93 ec 6b 4e 7b a1 6c | skeyid inputs (digi+NI+NR+shared) hasher: oakley_md5 | shared: 0c 6a 00 29 fb dd 1e 78 57 9b 9d 90 58 f6 4e d7 | a7 0d 92 ea 17 87 ae ce 72 50 cc ab 7a c2 02 4d | 0c d9 95 9b 61 61 39 b3 43 d0 ee 31 89 3a 0a d9 | 62 a7 a2 b9 ea 12 36 54 ba 80 ed a3 22 70 4e e8 | b3 09 66 52 5e 4e 32 b5 82 2c 5f 97 88 a3 2b c0 | 22 5d d6 e3 e3 f0 ca bf 99 39 5c 55 f2 2a 81 e9 | ff 6f 30 36 27 fb 15 1f c6 50 a9 fc 1f 5e be 09 | 1d b4 7d e2 1a 7c db f8 7b 94 3f 82 27 54 f6 34 | 32 d4 a3 26 5d 48 e6 a9 f4 12 cb 21 8f 7f 1a 4e | 83 8e 73 4f 7d 28 53 f2 57 96 14 67 ee ee 01 b6 | a0 9e ae 8e f2 f9 ce 3e 1c a0 fd 2a d0 38 b7 68 | 1f d6 dc 5b 1b d0 ff ce 6a 93 ec 6b 4e 7b a1 6c | ni: e7 ff 90 49 25 b6 ff 99 59 ae 80 84 63 3e ec 2f | nr: a2 7d e9 af fc 36 0b 6d e8 4c 80 d6 87 9e 6d c6 | keyid: 7c 5d 2a 9b 82 bb 9d 69 28 ad 2f 9d fe 69 4a f8 | DH_i: 53 41 5e 65 f1 c1 1c a9 2e 0c 82 d7 7a e1 4d 24 | 9d 5f c8 aa 68 99 02 0d db 88 e9 59 0b e3 b1 7c | 82 25 c0 c8 bf 63 2e fc 17 78 2c 41 0a d3 d6 f6 | d0 6e b8 71 97 21 22 e4 46 8b 91 93 f9 45 fb 25 | 1b 10 eb 66 db 3d a5 c8 92 48 2e 8e aa b8 4e 6a | 1f 61 4d d9 a1 10 28 3f 1d 71 78 e0 70 fd 02 37 | 29 b0 d5 27 30 ff 1d 82 c5 99 54 3b 2c 07 3b f0 | 6a ed c4 c3 8b 49 53 d4 be 1c 69 88 f5 a0 22 aa | ae eb 32 1b cb aa 73 47 00 0f 0d c7 5e 2c 4f 47 | 37 5d e4 40 84 03 fb 3d 7f bb a3 4b 3e 41 21 fd | cb 6f f8 19 1a c8 b6 0d 4e 16 6c 60 77 c2 0f 8e | dd fc 06 74 41 58 a0 f6 d5 44 bb 19 c6 0d 51 27 | DH_r: f6 80 f2 11 ac b0 24 70 8e 23 14 5d cb 53 fb 60 | f0 65 8f da de e8 16 ec 38 02 53 3a 3d 49 9d 0d | c5 dc e0 23 ab bd 8f 9c b3 e2 2d 33 43 29 5a 65 | 58 ee 3a 59 53 17 ab 94 c5 78 45 15 91 49 df 2a | ab a6 12 d9 bd 01 12 c0 a0 5e 75 d3 56 48 b4 83 | 8c c4 3d 64 a5 b1 9e fc d6 17 36 7f ac f7 a3 08 | 4c 4c 74 23 6d 88 dc d3 4c b1 5f 64 dd dc 20 ad | a5 51 ef 9a e8 ec 6a 00 3e 69 f5 c1 9b 32 84 be | 75 13 d8 2b cb 34 3d cd d6 5b 18 fc cc 5f c5 0c | 96 8e 4c a5 fa 9e 00 d3 1e a9 ce 75 2a 59 33 3d | a3 6f e0 bd c2 2d 53 19 01 bb 8b 7f cd fb 41 b9 | 8b 08 68 66 c8 4b 2c c9 49 3a 22 b5 7b c9 8e 31 | Skeyid: 7c 5d 2a 9b 82 bb 9d 69 28 ad 2f 9d fe 69 4a f8 | Skeyid_d: f0 f5 e2 31 c4 59 0e 25 6d 56 aa dd 51 53 2d 4d | Skeyid_a: 1d 2c 8b 8f 82 47 e5 4c 0e 36 5d 9d 56 b7 ef df | Skeyid_e: 1d 53 2b f6 b8 ad fd 64 bd df cc a8 4d 54 9a 55 | enc key: 0c c4 0b 85 56 b7 d2 ee 69 df db 3e e2 ce b6 96 | eb 9d fe ca 5a a2 92 28 | IV: 4a a9 62 4b 13 f4 59 1a cd 9f ac 99 7e b5 76 81 | _natd_hash: hasher=0x80e91e0(16) | _natd_hash: icookie= | c8 c9 8b 44 19 84 5a 59 | _natd_hash: rcookie= | d0 23 4f 16 d3 3e 23 d4 | _natd_hash: ip= cd 96 c8 f7 | _natd_hash: port=500 | _natd_hash: hash= 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | _natd_hash: hasher=0x80e91e0(16) | _natd_hash: icookie= | c8 c9 8b 44 19 84 5a 59 | _natd_hash: rcookie= | d0 23 4f 16 d3 3e 23 d4 | _natd_hash: ip= d8 bf 8c 26 | _natd_hash: port=500 | _natd_hash: hash= 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | NAT_TRAVERSAL hash=0 (me:0) (him:0) | expected NAT-D(me): 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | expected NAT-D(him): | 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | received NAT-D: 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | NAT_TRAVERSAL hash=1 (me:1) (him:0) | expected NAT-D(me): 1e 32 60 d5 cf 6b ad a2 96 70 22 6c 77 6b 4e 24 | expected NAT-D(him): | 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | received NAT-D: 6d e9 ea f1 ea a1 35 fe b1 5c 57 83 da 33 30 02 | NAT_TRAVERSAL hash=2 (me:1) (him:1) "marajade--vpsn" #408: NAT-Traversal: Result using 3: no NAT detected | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20 seconds | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_SIG | ID type: ID_FQDN | Protocol ID: 0 | port: 0 | emitting 21 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 6d 61 72 61 6a 61 64 65 2e 73 61 6e 64 65 6c 6d | 61 6e 2e 63 61 | emitting length of ISAKMP Identification Payload (IPsec DOI): 29 | hashing 144 bytes of SA | started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_RSA | actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_RSA | best_match 0>1 best=0x81092f8 (line=1) | concluding with best_match=1 best=0x81092f8 (lineno=1) | signing hash with RSA Key *AQO2bOzfW | ***emit ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload | SIG_I 0c a8 40 82 cf 9b 67 77 93 cd 98 53 f2 cb ff e3 | 03 fe ad b9 50 16 0d 69 4b db 84 53 a8 a7 8b 48 | bb f1 5b 72 7a 91 d8 1a 89 75 34 61 ed 0d 0a cf | d1 c4 b4 0d 3b 38 fc e7 30 c6 66 5b ca 09 9e 53 | fa 3c c4 c9 70 e3 9e 09 53 ec 69 d6 02 c4 0f b3 | 37 60 25 d6 28 3f 19 c9 c1 31 74 a5 18 bb f1 0c | cd a3 df 19 c7 14 b0 75 c6 f0 10 53 67 8a 5d eb | a9 a4 82 5f 92 fb aa 0b 63 8e ec 91 18 ce 42 4e | 4c 41 b9 c2 cb 46 ee 21 06 7a 20 e0 b5 96 6a 0d | 56 b0 58 27 14 49 62 1a 34 5f 9f 30 de 25 1f a4 | c4 d7 30 ad ba 73 22 9c a1 fb f5 67 80 5d a0 dd | 27 a0 d9 49 5e c9 08 e0 82 19 8f 50 7d ff 98 bf | 5e e2 f1 8a 50 e0 ae f6 82 c7 84 af 1c a6 aa 2d | e1 ab ab 71 67 ca d0 44 c3 67 da 42 bb 66 e1 ec | e8 cc 3a 7c 01 b4 fa e6 3e 86 f5 ed bf 3c cd 0e | 69 ee 7a 7e cd 4c b1 37 21 92 99 0d 64 b7 51 f7 | 55 ab 97 9b 8f 8b 4e 3c 37 4c 4d b6 0d 25 82 90 | 2d ed | emitting length of ISAKMP Signature Payload: 278 | encrypting: | 09 00 00 1d 02 00 00 00 6d 61 72 61 6a 61 64 65 | 2e 73 61 6e 64 65 6c 6d 61 6e 2e 63 61 00 00 01 | 16 0c a8 40 82 cf 9b 67 77 93 cd 98 53 f2 cb ff | e3 03 fe ad b9 50 16 0d 69 4b db 84 53 a8 a7 8b | 48 bb f1 5b 72 7a 91 d8 1a 89 75 34 61 ed 0d 0a | cf d1 c4 b4 0d 3b 38 fc e7 30 c6 66 5b ca 09 9e | 53 fa 3c c4 c9 70 e3 9e 09 53 ec 69 d6 02 c4 0f | b3 37 60 25 d6 28 3f 19 c9 c1 31 74 a5 18 bb f1 | 0c cd a3 df 19 c7 14 b0 75 c6 f0 10 53 67 8a 5d | eb a9 a4 82 5f 92 fb aa 0b 63 8e ec 91 18 ce 42 | 4e 4c 41 b9 c2 cb 46 ee 21 06 7a 20 e0 b5 96 6a | 0d 56 b0 58 27 14 49 62 1a 34 5f 9f 30 de 25 1f | a4 c4 d7 30 ad ba 73 22 9c a1 fb f5 67 80 5d a0 | dd 27 a0 d9 49 5e c9 08 e0 82 19 8f 50 7d ff 98 | bf 5e e2 f1 8a 50 e0 ae f6 82 c7 84 af 1c a6 aa | 2d e1 ab ab 71 67 ca d0 44 c3 67 da 42 bb 66 e1 | ec e8 cc 3a 7c 01 b4 fa e6 3e 86 f5 ed bf 3c cd | 0e 69 ee 7a 7e cd 4c b1 37 21 92 99 0d 64 b7 51 | f7 55 ab 97 9b 8f 8b 4e 3c 37 4c 4d b6 0d 25 82 | 90 2d ed | IV: | 4a a9 62 4b 13 f4 59 1a cd 9f ac 99 7e b5 76 81 | emitting 5 zero bytes of encryption padding into ISAKMP Message | encrypting using OAKLEY_3DES_CBC | next IV: 3c 13 5f 77 7b 75 24 f9 | emitting length of ISAKMP Message: 340 | complete state transition with STF_OK "marajade--vpsn" #408: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | sending reply packet to 216.191.140.38:500 (from port=500) | sending 340 bytes for STATE_MAIN_I2 through eth0:500 to 216.191.140.38:500: | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 05 10 02 01 00 00 00 00 00 00 01 54 47 7a e8 6a | e5 03 c9 4c b3 ed 80 2b 5f 08 56 14 5b 46 30 7b | d1 00 07 f1 6e 40 e1 b7 51 a4 ff 55 7f 0f d2 74 | 23 e2 54 77 4b 7a ca 80 0c 29 87 ea 64 bd 75 4f | 66 52 6a 58 69 c1 1d e1 bd 53 11 7e 7a 10 87 44 | 94 39 eb cf 92 aa fb 93 78 a5 26 b9 a7 25 07 ef | cd 27 43 7f d3 fc 49 00 90 2c 0b 02 c0 e5 19 2d | 07 eb ee f7 cc b2 ab a8 8f 79 e4 a4 98 0b b2 8d | 02 12 60 d8 af 68 25 fd d6 bf 4b a1 c1 58 1c 93 | ce 32 8b 07 89 fb 34 dc 8b cd 01 e8 72 7d 88 4c | 76 09 21 b1 f7 98 29 93 15 e4 9d 61 bc 15 43 75 | f1 53 21 cb 39 cf 55 a7 7c df c4 cd 6c 55 1f c2 | 55 2b df 5f b0 ff 60 91 a4 13 76 58 0e 0c 45 1a | 43 f8 30 eb a3 3f 02 4b a4 80 f9 11 7e 7a f6 70 | 12 d7 31 39 5a 32 0f 76 ec a7 3a 63 62 a9 f0 91 | ad e3 48 94 69 e3 48 c6 7b c7 13 d1 17 25 a9 7d | 24 4a d9 78 94 e9 12 9d 14 85 a6 3f 4c af b4 9b | 7f c8 12 30 fc 56 0c e2 e1 7c 97 bb 59 9c 11 66 | 43 7a fa 44 a7 21 c9 4b e3 9e d0 83 57 a5 bd eb | b7 f3 77 9f 29 0b 4a 81 97 b3 5c 85 3c 13 5f 77 | 7b 75 24 f9 | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #408 "marajade--vpsn" #408: STATE_MAIN_I3: sent MI3, expecting MR3 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 1 to unpend | next event EVENT_RETRANSMIT in 2 seconds for #407 | | *received 324 bytes from 216.191.140.38:500 on eth0 (port=500) | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 05 10 02 01 00 00 00 00 00 00 01 44 06 33 b3 64 | e3 81 ee 8b 6d c5 6e d7 f2 00 aa db da c0 21 87 | 8c 69 d5 86 59 20 41 e7 2b f0 ae be 5e af 5f 64 | 68 08 cb 1d 74 9a 3c 45 e1 15 08 61 0b 2e de 8e | 86 b4 b8 ae 99 af 84 5a 3c b6 62 1e d6 22 5f e3 | ab 35 3b ff 12 ac 90 61 ca 7c 1a 52 c4 90 20 8b | 99 14 3b ae d9 b0 36 5e 54 82 ef 36 8c bf 59 55 | cb aa 70 e3 62 68 24 b4 40 c6 f7 34 2c 40 78 6f | 34 db fb c4 56 ae 0a 32 e9 1c fd 23 1b f4 4d bf | fd c1 4c c3 fe 05 98 3e 51 99 9f 20 22 c6 df 62 | 1a 29 87 4d 47 18 49 39 a0 bc 11 d2 7d 3c a1 b8 | fa aa 97 67 1c 1f 0f 46 06 44 ae d6 b2 6f 74 8c | 00 83 cd f9 22 12 6a 47 1e 48 c0 36 46 d2 e6 8b | 16 e7 35 e2 5d 12 f8 ad d1 ec 4c 02 a0 23 71 d3 | e1 74 8b 53 0d 17 84 64 1e 8b 11 e7 37 8c 03 a1 | f6 14 5d 36 44 05 58 b0 d0 c7 7f e8 b9 d3 3d ae | c1 41 14 30 e6 52 d4 f9 c4 b3 78 89 73 e0 1c 31 | dd d8 37 c7 53 2b ff ca ec 59 f7 1d 6c 76 88 12 | a8 22 33 c7 df 7a ed 43 35 d3 a5 b5 22 16 25 25 | 1b d4 ee d1 | **parse ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_ID | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_IDPROT | flags: ISAKMP_FLAG_ENCRYPTION | message ID: 00 00 00 00 | length: 324 | processing packet with exchange type=ISAKMP_XCHG_IDPROT (2) | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | peer and cookies match on #408, provided msgid 00000000 vs 00000000 | state object #408 found, in STATE_MAIN_I3 | processing connection marajade--vpsn | received encrypted packet from 216.191.140.38:500 | decrypting 296 bytes using algorithm OAKLEY_3DES_CBC | decrypted: | 09 00 00 0c 01 00 00 00 d8 bf 8c 26 00 00 01 16 | 9f e2 d9 fa 2b 85 7c 7f 58 92 6f 53 52 53 9e 4b | d8 a4 cb a5 5b 01 47 19 0b 0f dc ba 1f f4 96 ee | d6 b3 ab af 20 09 ad e8 8e 9c 1e 0a 17 84 c7 ff | b9 50 43 e5 18 99 bf f3 67 ac d7 5f c1 a8 94 8c | 7e 07 7b 47 6c 14 b7 10 9d a7 a1 2c 54 47 6b 26 | 57 17 3b 3c 19 54 ff a1 e0 3e 15 d9 f5 b8 50 a9 | 62 dc ec 51 47 09 4b 9b db 58 42 20 12 a5 6d 31 | c8 89 0a db 25 66 49 26 e6 ff f1 ed 7e c4 29 6d | 39 37 8e 3d 66 63 a9 6f 87 20 7b ab c2 f6 51 9a | d5 ef 4e 1c 8b a9 0c ee 0b c3 3a 10 bc 36 2c 4e | 36 29 43 91 ee 92 ac 55 ff 6b 4c f5 82 fe 4d 85 | 7e 4b a4 a8 e6 41 0e c2 32 1b 87 18 c0 93 d4 66 | 0b af 32 ca a3 f9 24 8a 9c 96 43 45 71 72 61 66 | bf a4 0e 59 fe 8f 3e bc a6 df 68 0a a1 37 0c b2 | 05 1e aa 52 f0 cf ab 6f 4e d2 9a f1 87 84 fb dd | a0 a7 bd 75 43 6d cb 0e 15 be c7 28 f2 b8 92 b6 | c6 b7 e0 44 b2 54 ae 1a 2e d4 86 f7 4c 08 fc 15 | bc d6 00 00 00 00 00 00 | next IV: 22 16 25 25 1b d4 ee d1 | ***parse ISAKMP Identification Payload: | next payload type: ISAKMP_NEXT_SIG | length: 12 | ID type: ID_IPV4_ADDR | DOI specific A: 0 | DOI specific B: 0 | ***parse ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE | length: 278 | removing 6 bytes of padding "marajade--vpsn" #408: Main mode peer ID is ID_IPV4_ADDR: '216.191.140.38' | hashing 144 bytes of SA | required CA is '%any' | trusted_ca called with a=(empty) b=(empty) | key issuer CA is '%any' | an RSA Sig check passed with *AQOwBZVt6 [preloaded key] | authentication succeeded | complete state transition with STF_OK "marajade--vpsn" #408: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | inserting event EVENT_SA_REPLACE, timeout in 2724 seconds for #408 "marajade--vpsn" #408: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536} | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | peer and cookies match on #408, provided msgid 00000000 vs 00000000 | state object #408 found, in STATE_MAIN_I4 "marajade--vpsn" #408: Dead Peer Detection (RFC 3706): enabled | state: 408 requesting event none to be deleted by dpd.c:160 | inserting event EVENT_DPD, timeout in 30 seconds for #408 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 1 to unpend | unqueuing pending Quick Mode with 216.191.140.38 "marajade--vpsn" | duplicating state object #408 | creating state object #409 at 0x8231348 | processing connection marajade--vpsn | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #409 "marajade--vpsn" #409: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP {using isakmp#408} | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1 | asking helper 0 to do build_kenonce op on seq: 409 | inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #409 | next event EVENT_RETRANSMIT in 2 seconds for #407 ! helper -1 doing build_kenonce op id: 409 | helper 0 has work (cnt now 0) | helper 0 replies to sequence 409 | calling callback function 0x806d7e0 | quick outI1: calculated ke+nonce, sending I1 | processing connection marajade--vpsn | **emit ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_HASH | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_QUICK | flags: ISAKMP_FLAG_ENCRYPTION | message ID: a9 af 6f 93 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA | emitting 16 zero bytes of HASH into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 20 | empty esp_info, returning empty | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE | DOI: ISAKMP_DOI_IPSEC | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY | out_sa pcn: 0 has 1 valid proposals | out_sa pcn: 0 pn: 0<1 valid_count: 1 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE | proposal number: 0 | protocol ID: PROTO_IPSEC_ESP | SPI size: 4 | number of transforms: 4 | generate SPI: 4b 1b 53 9e | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 4b 1b 53 9e | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T | transform number: 0 | transform ID: ESP_AES | ******emit ISAKMP IPsec DOI attribute: | af+type: GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP IPsec DOI attribute: | af+type: ENCAPSULATION_MODE | length/value: 1 | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_TYPE | length/value: 1 | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_DURATION | length/value: 28800 | ******emit ISAKMP IPsec DOI attribute: | af+type: AUTH_ALGORITHM | length/value: 2 | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T | transform number: 1 | transform ID: ESP_AES | ******emit ISAKMP IPsec DOI attribute: | af+type: GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP IPsec DOI attribute: | af+type: ENCAPSULATION_MODE | length/value: 1 | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_TYPE | length/value: 1 | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_DURATION | length/value: 28800 | ******emit ISAKMP IPsec DOI attribute: | af+type: AUTH_ALGORITHM | length/value: 1 | [1 is AUTH_ALGORITHM_HMAC_MD5] | emitting length of ISAKMP Transform Payload (ESP): 28 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T | transform number: 2 | transform ID: ESP_3DES | ******emit ISAKMP IPsec DOI attribute: | af+type: GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP IPsec DOI attribute: | af+type: ENCAPSULATION_MODE | length/value: 1 | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_TYPE | length/value: 1 | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_DURATION | length/value: 28800 | ******emit ISAKMP IPsec DOI attribute: | af+type: AUTH_ALGORITHM | length/value: 2 | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE | transform number: 3 | transform ID: ESP_3DES | ******emit ISAKMP IPsec DOI attribute: | af+type: GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP IPsec DOI attribute: | af+type: ENCAPSULATION_MODE | length/value: 1 | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_TYPE | length/value: 1 | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_DURATION | length/value: 28800 | ******emit ISAKMP IPsec DOI attribute: | af+type: AUTH_ALGORITHM | length/value: 1 | [1 is AUTH_ALGORITHM_HMAC_MD5] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 124 | emitting length of ISAKMP Security Association Payload: 136 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload | Ni 2d 32 d8 38 03 fe 20 f0 65 f4 67 f7 c9 d4 f6 bd | emitting length of ISAKMP Nonce Payload: 20 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID | emitting 192 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 45 17 fc 32 f0 84 c2 ec 1a 68 21 77 57 9d b1 49 | 7f 2e 50 7b 39 15 e0 f7 7c 45 45 e9 1c 86 eb ac | 28 2c 63 64 3c 49 e1 d5 a2 94 66 36 87 10 9c 41 | da 1e 08 b8 f5 7b 7b 59 5c dd 3b 49 f8 34 75 34 | 8b 72 15 eb 9c e3 ce 88 88 98 f9 00 05 e3 3b ce | 75 13 ec 58 2e 98 fe df bc 21 d2 07 ad 26 ae fe | a8 16 3e 21 14 e0 3c 84 c9 2c ca 3b 47 f7 5f b8 | 29 d9 c9 ad 4e 98 58 f6 33 44 a8 17 ae f4 24 39 | a7 17 f8 08 27 7c 43 5b bc 01 87 2f 4b 00 8a 17 | 16 ff 2e 08 c2 0f 63 ee b1 47 92 cc 96 49 c9 2e | 11 fe b9 86 94 1b 53 2d 81 86 cb db f8 fc 29 4c | 61 0b 27 13 cc d5 3a bb 1b 52 a4 c5 f1 ba 6a f2 | emitting length of ISAKMP Key Exchange Payload: 196 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID | ID type: ID_IPV4_ADDR | Protocol ID: 0 | port: 0 | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network cd 96 c8 a3 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE | ID type: ID_IPV4_ADDR_SUBNET | Protocol ID: 0 | port: 0 | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network d1 70 2c 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) computed: | 09 9e 36 5c 0c 30 96 5b b0 6b 92 f9 9d e7 a5 29 | last Phase 1 IV: 22 16 25 25 1b d4 ee d1 | current Phase 1 IV: 22 16 25 25 1b d4 ee d1 | computed Phase 2 IV: | 82 4a 1b c8 df 2c 90 81 2a dd 9e dd b8 3b 1d 4c | encrypting: | 01 00 00 14 09 9e 36 5c 0c 30 96 5b b0 6b 92 f9 | 9d e7 a5 29 0a 00 00 88 00 00 00 01 00 00 00 01 | 00 00 00 7c 00 03 04 04 4b 1b 53 9e 03 00 00 1c | 00 0c 00 00 80 03 00 05 80 04 00 01 80 01 00 01 | 80 02 70 80 80 05 00 02 03 00 00 1c 01 0c 00 00 | 80 03 00 05 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 01 03 00 00 1c 02 03 00 00 80 03 00 05 | 80 04 00 01 80 01 00 01 80 02 70 80 80 05 00 02 | 00 00 00 1c 03 03 00 00 80 03 00 05 80 04 00 01 | 80 01 00 01 80 02 70 80 80 05 00 01 04 00 00 14 | 2d 32 d8 38 03 fe 20 f0 65 f4 67 f7 c9 d4 f6 bd | 05 00 00 c4 45 17 fc 32 f0 84 c2 ec 1a 68 21 77 | 57 9d b1 49 7f 2e 50 7b 39 15 e0 f7 7c 45 45 e9 | 1c 86 eb ac 28 2c 63 64 3c 49 e1 d5 a2 94 66 36 | 87 10 9c 41 da 1e 08 b8 f5 7b 7b 59 5c dd 3b 49 | f8 34 75 34 8b 72 15 eb 9c e3 ce 88 88 98 f9 00 | 05 e3 3b ce 75 13 ec 58 2e 98 fe df bc 21 d2 07 | ad 26 ae fe a8 16 3e 21 14 e0 3c 84 c9 2c ca 3b | 47 f7 5f b8 29 d9 c9 ad 4e 98 58 f6 33 44 a8 17 | ae f4 24 39 a7 17 f8 08 27 7c 43 5b bc 01 87 2f | 4b 00 8a 17 16 ff 2e 08 c2 0f 63 ee b1 47 92 cc | 96 49 c9 2e 11 fe b9 86 94 1b 53 2d 81 86 cb db | f8 fc 29 4c 61 0b 27 13 cc d5 3a bb 1b 52 a4 c5 | f1 ba 6a f2 05 00 00 0c 01 00 00 00 cd 96 c8 a3 | 00 00 00 10 04 00 00 00 d1 70 2c 00 ff ff ff 00 | IV: | 82 4a 1b c8 df 2c 90 81 2a dd 9e dd b8 3b 1d 4c | encrypting using OAKLEY_3DES_CBC | next IV: c0 b6 1c 91 ef 83 ed 54 | emitting length of ISAKMP Message: 428 | sending 428 bytes for quick_outI1 through eth0:500 to 216.191.140.38:500: | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 08 10 20 01 a9 af 6f 93 00 00 01 ac b2 6a 38 0c | d8 ed b5 5a bd a2 f3 59 db 91 5a 67 8e bd 70 07 | e9 54 a6 e9 7b 3f 15 fe 2d b9 db 59 f0 43 c6 eb | c8 8e 42 a1 7c 28 5e 31 33 67 18 93 fd b8 f4 02 | 86 8b a9 c2 35 42 30 30 4c ee 81 c9 c8 e0 12 c8 | 0b 3a e2 37 2e 84 f0 08 fb 68 d0 9a 53 38 62 52 | a2 ca ef a8 1d 0e f4 9d 6f e3 ac 74 49 a2 a1 41 | 51 64 fa 9b 79 07 33 f6 ba 0b 58 a8 2e a0 11 5f | 60 cd f5 89 a3 d7 5a b7 58 c0 52 12 73 70 34 be | 57 8a 12 b9 1e 87 2e d8 91 86 d1 6e 91 6a 3f 89 | 74 0c 27 1d 2a a0 f0 93 59 7f 85 b7 06 4b 9a 94 | c3 3c e2 e5 aa 97 61 62 ec ce 8d 8a b4 7c a8 00 | 56 05 a4 9c a6 c3 ec f2 e8 17 aa ab 13 a1 0f e4 | ee d4 f0 47 cd 0f ab c7 06 9f b9 4d 47 1c fa f2 | 66 8c c5 2a b9 36 2f 02 6b 62 91 c5 64 15 b2 3f | 89 ac 71 7e cc fe d2 0c 67 08 ff 9a 85 89 e4 45 | d0 20 3c 63 6f 23 e9 ea 55 e6 51 3c ea a1 64 f8 | 88 c2 52 d0 a0 39 01 3d 70 86 b6 58 86 dd ac 01 | ba 6d 39 62 ef ce f1 45 7e d6 99 e3 71 52 85 93 | 3b 39 ff 07 4f 08 97 c3 5c bd b2 0b f7 8a 5c 9c | a0 ce 72 e3 3c 31 23 75 2e 77 f0 0b 5a 67 fd 4b | e1 6e bc 82 b2 be 07 6b f7 ce 1b b4 83 19 ec ab | 07 89 e2 50 a2 f9 e3 35 77 95 47 85 f7 9f ae 73 | bb 32 44 f8 bd 45 40 f4 65 fd bc 9e 89 27 48 6e | 58 e6 80 9f 30 9c 8e 6b c8 09 ae d6 a2 b1 ad 82 | e5 97 2c 2c c0 b6 1c 91 ef 83 ed 54 | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #409 | next event EVENT_RETRANSMIT in 2 seconds for #407 | | *received 348 bytes from 216.191.140.38:500 on eth0 (port=500) | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 08 10 20 01 a9 af 6f 93 00 00 01 5c b0 89 1b d4 | 63 c9 8d 0c ae 95 a3 e2 d9 ce 5d d5 37 36 83 2f | e2 1a 21 18 8f 92 b1 93 89 84 25 51 29 a3 af 8f | 1f 79 34 25 0d d9 dc a8 60 50 ea 6e 81 bc f0 77 | 44 2e 44 d0 03 bd 13 18 22 ed 1c 7c 36 e1 46 80 | 25 0c cc d2 30 1e fb d3 63 6f 5e 4a 1a 60 09 8e | e8 03 82 12 8b 26 1f c5 0a a5 db 02 13 d9 80 80 | dc 5b d1 19 be 2c db 7a ae aa 5e a4 5c 2b 54 1a | 0e 70 d6 49 db c6 8a de b5 16 40 37 cf 6f e2 36 | 6e 10 f5 2a 4b 51 5c 03 f7 f1 54 15 70 6c 4b 95 | f0 a3 22 b5 29 2e 4c d3 0c c0 82 6c 70 46 df 32 | 62 22 fb 12 4e 61 c2 8c a6 85 a8 64 2c 42 8d 67 | c9 e8 e8 db 7b 03 3a 8c 84 e1 36 1f ee 09 40 d6 | bc 56 ea e1 93 bb 4e 71 1a 36 91 17 73 1b 37 56 | ce a8 f2 a5 7a 6d 5d 65 b2 7c 1f bd 0d 38 b5 df | 3b 06 8a 20 04 85 d4 9d 2c 4b d1 d5 fd 19 81 dc | 17 8f 20 bc 09 d6 a5 53 7e 5a a5 4a 12 b1 b0 e2 | be 47 ad 53 d9 74 76 d7 0d f3 82 02 1e b3 5a 4a | 5d 48 68 67 b6 c7 be e7 c5 20 58 fd 1a 43 a8 3f | a4 e3 84 bc eb 5b 0c 0c 31 21 a9 58 cd 82 65 3f | ce 9b 48 6d 4a a5 d9 91 14 26 d8 0e | **parse ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_HASH | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_QUICK | flags: ISAKMP_FLAG_ENCRYPTION | message ID: a9 af 6f 93 | length: 348 | processing packet with exchange type=ISAKMP_XCHG_QUICK (32) | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | peer and cookies match on #409, provided msgid a9af6f93 vs a9af6f93 | state object #409 found, in STATE_QUICK_I1 | processing connection marajade--vpsn | received encrypted packet from 216.191.140.38:500 | decrypting 320 bytes using algorithm OAKLEY_3DES_CBC | decrypted: | 01 00 00 14 d6 5e b7 81 73 6d 40 8c 74 33 0f 19 | 4e a1 39 56 0a 00 00 34 00 00 00 01 00 00 00 01 | 00 00 00 28 00 03 04 01 d1 d6 66 c8 00 00 00 1c | 00 0c 00 00 80 03 00 05 80 04 00 01 80 01 00 01 | 80 02 70 80 80 05 00 02 04 00 00 14 a6 b6 24 81 | 6f ab 3f 3c 48 33 b4 32 26 1b 1d 7d 05 00 00 c4 | e5 39 3a 18 77 30 e1 26 85 24 0c 21 d1 40 04 d2 | 5f 7a ad 10 11 5e 54 12 f2 74 13 5b df 66 e5 f7 | 36 bd ef 8f 63 48 f2 f6 16 ff 3c 6e db 9f 68 1a | ee ce 08 29 3d bf 46 b5 cf cf 3d 0b d0 18 73 6f | 93 22 2c 98 36 9e 2e 74 1a 7a 84 6c 00 f1 ba d1 | 40 b3 ea 12 89 7f be f7 d3 91 cc 8f a8 2e 11 1d | b0 e0 12 33 0e ab 1b d7 d2 5e db d1 50 db d2 7b | ac cd 69 c4 a4 26 66 aa 99 8b 0f 22 42 ba 8c 1e | 5e b6 fa 94 a2 9f 82 7a f2 67 2f ed e6 bd b0 28 | 57 24 a5 b3 97 8c 6b e4 b3 b9 ef 15 20 15 23 b2 | da 63 c9 42 12 a7 09 7f 66 bb 37 d6 6e a0 23 42 | 9d 6c 37 6f 00 dc e8 17 e3 af c6 63 2e 37 98 96 | 05 00 00 0c 01 00 00 00 cd 96 c8 a3 00 00 00 10 | 04 00 00 00 d1 70 2c 00 ff ff ff 00 00 00 00 00 | next IV: 4a a5 d9 91 14 26 d8 0e | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA | length: 20 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE | length: 52 | DOI: ISAKMP_DOI_IPSEC | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE | length: 20 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID | length: 196 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID | length: 12 | ID type: ID_IPV4_ADDR | Protocol ID: 0 | port: 0 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE | length: 16 | ID type: ID_IPV4_ADDR_SUBNET | Protocol ID: 0 | port: 0 | removing 4 bytes of padding | **emit ISAKMP Message: | initiator cookie: | c8 c9 8b 44 19 84 5a 59 | responder cookie: | d0 23 4f 16 d3 3e 23 d4 | next payload type: ISAKMP_NEXT_HASH | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_QUICK | flags: ISAKMP_FLAG_ENCRYPTION | message ID: a9 af 6f 93 | HASH(2) computed: | d6 5e b7 81 73 6d 40 8c 74 33 0f 19 4e a1 39 56 | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE | length: 40 | proposal number: 0 | protocol ID: PROTO_IPSEC_ESP | SPI size: 4 | number of transforms: 1 | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI d1 d6 66 c8 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE | length: 28 | transform number: 0 | transform ID: ESP_AES | ******parse ISAKMP IPsec DOI attribute: | af+type: GROUP_DESCRIPTION | length/value: 5 | [5 is OAKLEY_GROUP_MODP1536] | ******parse ISAKMP IPsec DOI attribute: | af+type: ENCAPSULATION_MODE | length/value: 1 | [1 is ENCAPSULATION_MODE_TUNNEL] | ******parse ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_TYPE | length/value: 1 | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: SA_LIFE_DURATION | length/value: 28800 | ******parse ISAKMP IPsec DOI attribute: | af+type: AUTH_ALGORITHM | length/value: 2 | [2 is AUTH_ALGORITHM_HMAC_SHA1] | DH public value received: | e5 39 3a 18 77 30 e1 26 85 24 0c 21 d1 40 04 d2 | 5f 7a ad 10 11 5e 54 12 f2 74 13 5b df 66 e5 f7 | 36 bd ef 8f 63 48 f2 f6 16 ff 3c 6e db 9f 68 1a | ee ce 08 29 3d bf 46 b5 cf cf 3d 0b d0 18 73 6f | 93 22 2c 98 36 9e 2e 74 1a 7a 84 6c 00 f1 ba d1 | 40 b3 ea 12 89 7f be f7 d3 91 cc 8f a8 2e 11 1d | b0 e0 12 33 0e ab 1b d7 d2 5e db d1 50 db d2 7b | ac cd 69 c4 a4 26 66 aa 99 8b 0f 22 42 ba 8c 1e | 5e b6 fa 94 a2 9f 82 7a f2 67 2f ed e6 bd b0 28 | 57 24 a5 b3 97 8c 6b e4 b3 b9 ef 15 20 15 23 b2 | da 63 c9 42 12 a7 09 7f 66 bb 37 d6 6e a0 23 42 | 9d 6c 37 6f 00 dc e8 17 e3 af c6 63 2e 37 98 96 | started looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK | actually looking for secret for @marajade.sandelman.ca->216.191.140.38 of kind PPK_PSK | concluding with best_match=0 best=(nil) (lineno=-1) | calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1536): 15432 usec | DH shared secret: | e0 8f 78 9b 5b 28 c3 82 65 59 22 e1 05 07 8b 8f | 6e 23 07 69 ef 77 4e 31 c9 49 7d dd 30 3d ef fa | 28 7f 00 d1 28 74 06 dd 81 f3 15 cb a6 08 d3 9c | 5c 3d 97 4f 27 b6 76 3e 85 c0 42 c4 14 af 65 db | 3f 66 29 e2 ab 87 c5 58 b5 a1 ee 75 44 45 82 e2 | b8 a3 39 25 fd 40 e9 1d 44 9e ad 11 af 1a b3 de | 11 af 7c fa ed 05 14 83 f9 1f 0d b4 c5 52 6a da | bb 63 17 3c c3 d5 e6 ae 48 5b 91 8c 15 f0 b2 6a | dc 08 3b 4d 8a 97 be 6b b5 2d fd 46 25 43 1a e2 | 3d 47 06 f5 72 e4 d2 27 09 b6 b1 ef a6 05 23 09 | a4 c5 09 df d9 72 89 7a ad f8 14 9c e2 c2 5f d0 | 0d 61 cd f3 f1 32 ca 43 93 d4 2e 2c e4 9d 85 f1 | our client is 205.150.200.163 | our client protocol/port is 0/0 | peer client is subnet 209.112.44.0/24 | peer client protocol/port is 0/0 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE | emitting 16 zero bytes of HASH into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 20 | HASH(3) computed: b7 ec 86 1a 11 90 d7 39 ea 46 8f f3 da 2e f2 cd | compute_proto_keymat:needed_len (after ESP enc)=16 | compute_proto_keymat:needed_len (after ESP auth)=36 | KEYMAT computed: | f2 af 10 f7 9c f3 69 64 f3 af d6 02 31 c4 7c 75 | b8 e0 2e f0 cf 7a 0a 63 b4 7d e7 2a 84 f0 7b 6f | b1 af 50 35 | Peer KEYMAT computed: | 7b 66 f6 6f 76 74 70 a9 6d 69 8b 67 58 c3 d2 d7 | 67 5b 8b 8c 34 94 75 dd 12 cb d7 13 e8 26 97 4f | d8 c3 68 ee | install_ipsec_sa() for #409: inbound and outbound | route owner of "marajade--vpsn" unrouted: NULL; eroute owner: NULL | could_route called for marajade--vpsn (kind=CK_PERMANENT) | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=0000101d replay=0 sa_state=1 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8110a38 allocated 88 bytes, &(extensions[0])=0p0xbfc09f10 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=78001ffb, seen=00000063, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=11, res=0, seq=668, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add). | pfkey_lib_debug:pfkey_msg_parse: remain=9 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=9. | pfkey_lib_debug:pfkey_msg_parse: remain=9 ext_type=1(security-association) ext_len=3 parsing ext 0p0x8110a48 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0000101d replay=0 state=1 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=6. | pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0p0x8110a60 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x8110a78 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, seen=00000063, required=00000063. | finish_pfkey_msg: SADB_ADD message 668 for Add SA tun.101d@216.191.140.38 | 02 03 00 09 0b 00 00 00 9c 02 00 00 ed 0f 00 00 | 03 00 01 00 00 00 10 1d 00 01 00 00 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 05 00 00 00 00 00 | 02 00 00 00 d8 bf 8c 26 00 00 00 00 00 00 00 00 | 03 00 06 00 00 00 00 00 02 00 00 00 cd 96 c8 f7 | 00 00 00 00 00 00 00 00 | pfkey_get: SADB_ADD message 668 | looking for alg with transid: 12 keylen: 0 auth: 2 | checking transid: 11 keylen: 0 auth: 1 | checking transid: 11 keylen: 0 auth: 2 | checking transid: 2 keylen: 8 auth: 0 | checking transid: 2 keylen: 8 auth: 1 | checking transid: 2 keylen: 8 auth: 2 | checking transid: 3 keylen: 24 auth: 0 | checking transid: 3 keylen: 24 auth: 1 | checking transid: 3 keylen: 24 auth: 2 | checking transid: 12 keylen: 16 auth: 0 | checking transid: 12 keylen: 16 auth: 1 | checking transid: 12 keylen: 16 auth: 2 | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=4b1b539e replay=64 sa_state=1 auth=3 encrypt=12 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_key_build: | pfkey_lib_debug:pfkey_key_build: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x817a6c0 allocated 144 bytes, &(extensions[0])=0p0xbfc09f10 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: copying 32 bytes from extensions[8] (type=8) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[9] (type=9) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=78001ffb, seen=00000363, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=18, res=0, seq=669, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add). | pfkey_lib_debug:pfkey_msg_parse: remain=16 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=16. | pfkey_lib_debug:pfkey_msg_parse: remain=16 ext_type=1(security-association) ext_len=3 parsing ext 0p0x817a6d0 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=4b1b539e replay=64 state=1 auth=3 encrypt=12 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=13. | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=5(source-address) ext_len=3 parsing ext 0p0x817a6e8 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=10. | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x817a700 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=8(authentication-key) remain=7. | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=8(authentication-key) ext_len=4 parsing ext 0p0x817a718 with parser pfkey_key_parse. | pfkey_lib_debug:pfkey_key_parse: success, found len=4 exttype=8(authentication-key) bits=160 reserved=0. | pfkey_lib_debug:pfkey_msg_parse: Extension 8(authentication-key) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=9(cipher-key) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=9(cipher-key) ext_len=3 parsing ext 0p0x817a738 with parser pfkey_key_parse. | pfkey_lib_debug:pfkey_key_parse: success, found len=3 exttype=9(cipher-key) bits=128 reserved=0. | pfkey_lib_debug:pfkey_msg_parse: Extension 9(cipher-key) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, seen=00000363, required=00000063. | finish_pfkey_msg: SADB_ADD message 669 for Add SA esp.4b1b539e@205.150.200.247 | 02 03 00 03 12 00 00 00 9d 02 00 00 ed 0f 00 00 | 03 00 01 00 4b 1b 53 9e 40 01 03 0c 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 05 00 00 00 00 00 | 02 00 00 00 d8 bf 8c 26 00 00 00 00 00 00 00 00 | 03 00 06 00 00 00 00 00 02 00 00 00 cd 96 c8 f7 | 00 00 00 00 00 00 00 00 04 00 08 00 a0 00 00 00 | b8 e0 2e f0 cf 7a 0a 63 b4 7d e7 2a 84 f0 7b 6f | b1 af 50 35 00 00 00 00 03 00 09 00 80 00 00 00 | f2 af 10 f7 9c f3 69 64 f3 af d6 02 31 c4 7c 75 | pfkey_get: SADB_ADD message 669 | add inbound eroute 209.112.44.0/24:0 --0-> 205.150.200.163/32:0 => tun.101d@205.150.200.247 (raw_eroute) | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09c70 pfkey_ext=0p0xbfc09da0 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09c70 pfkey_ext=0p0xbfc09da0 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=0000101d replay=0 sa_state=0 auth=0 encrypt=0 flags=8 | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=21 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=209.112.44.0:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=22 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.163:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=23 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=255.255.255.0:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=24 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=255.255.255.255:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x822dea8 allocated 184 bytes, &(extensions[0])=0p0xbfc09da0 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[21] (type=21) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[22] (type=22) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[23] (type=23) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[24] (type=24) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=05e00c63, seen=01e00063, required=01e00043. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=14(x-addflow(eroute)), errno=0, satype=9(IPIP), len=23, res=0, seq=670, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 14(x-addflow(eroute)). | pfkey_lib_debug:pfkey_msg_parse: remain=21 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=05e00c63, required=01e00043. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=21. | pfkey_lib_debug:pfkey_msg_parse: remain=21 ext_type=1(security-association) ext_len=3 parsing ext 0p0x822deb8 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0000101d replay=0 state=0 auth=0 encrypt=0 flags=8 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=18. | pfkey_lib_debug:pfkey_msg_parse: remain=18 ext_type=5(source-address) ext_len=3 parsing ext 0p0x822ded0 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=15. | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x822dee8 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=21(X-source-flow-address) remain=12. | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=21(X-source-flow-address) ext_len=3 parsing ext 0p0x822df00 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=21(X-source-flow-address) family=2(AF_INET) address=209.112.44.0 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 21(X-source-flow-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=22(X-dest-flow-address) remain=9. | pfkey_lib_debug:pfkey_msg_parse: remain=9 ext_type=22(X-dest-flow-address) ext_len=3 parsing ext 0p0x822df18 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=22(X-dest-flow-address) family=2(AF_INET) address=205.150.200.163 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 22(X-dest-flow-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=23(X-source-mask) remain=6. | pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=23(X-source-mask) ext_len=3 parsing ext 0p0x822df30 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=23(X-source-mask) family=2(AF_INET) address=255.255.255.0 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 23(X-source-mask) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=24(X-dest-mask) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=24(X-dest-mask) ext_len=3 parsing ext 0p0x822df48 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=24(X-dest-mask) family=2(AF_INET) address=255.255.255.255 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 24(X-dest-mask) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=05e00c63, seen=01e00063, required=01e00043. | finish_pfkey_msg: SADB_X_ADDFLOW message 670 for flow tun.101d@205.150.200.247 | 02 0e 00 09 17 00 00 00 9e 02 00 00 ed 0f 00 00 | 03 00 01 00 00 00 10 1d 00 00 00 00 08 00 00 00 | ff ff ff ff 00 00 00 00 03 00 05 00 00 00 00 00 | 02 00 00 00 d8 bf 8c 26 00 00 00 00 00 00 00 00 | 03 00 06 00 00 00 00 00 02 00 00 00 cd 96 c8 f7 | 00 00 00 00 00 00 00 00 03 00 15 00 00 00 00 00 | 02 00 00 00 d1 70 2c 00 40 bf fa b7 2d 00 00 00 | 03 00 16 00 00 00 00 00 02 00 00 00 cd 96 c8 a3 | 40 bf fa b7 2d 00 00 00 03 00 17 00 00 00 00 00 | 02 00 00 00 ff ff ff 00 ac 9d c0 bf 04 00 00 00 | 03 00 18 00 00 00 00 00 02 00 00 00 ff ff ff ff | e8 9d c0 bf ac 9d c0 bf | pfkey_get: SADB_X_ADDFLOW message 670 | grouping unk0.4b1b539e@205.150.200.247 and unk0.101d@205.150.200.247 | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09ea0 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09ea0 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=0000101d replay=0 sa_state=0 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_x_satype_build: | pfkey_lib_debug:pfkey_sa_build: spi=4b1b539e replay=0 sa_state=0 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=20 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x81963b8 allocated 120 bytes, &(extensions[0])=0p0xbfc09f10 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: copying 8 bytes from extensions[18] (type=18) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[19] (type=19) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[20] (type=20) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=001c0043, seen=001c0043, required=00000043. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=15, res=0, seq=671, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa). | pfkey_lib_debug:pfkey_msg_parse: remain=13 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=001c0043, required=00000043. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=13. | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0p0x81963c8 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0000101d replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=10. | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x81963e0 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=18(X-satype2) remain=7. | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=18(X-satype2) ext_len=1 parsing ext 0p0x81963f8 with parser pfkey_x_satype_parse. | pfkey_lib_debug:pfkey_x_satype_parse: enter | pfkey_lib_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0. | pfkey_lib_debug:pfkey_msg_parse: Extension 18(X-satype2) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=19(X-security-association) remain=6. | pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=19(X-security-association) ext_len=3 parsing ext 0p0x8196400 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=4b1b539e replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 19(X-security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=20(X-destination-address2) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=20(X-destination-address2) ext_len=3 parsing ext 0p0x8196418 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 20(X-destination-address2) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=001c0043, seen=001c0043, required=00000043. | finish_pfkey_msg: SADB_X_GRPSA message 671 for group unk0.101d@205.150.200.247 | 02 0d 00 09 0f 00 00 00 9f 02 00 00 ed 0f 00 00 | 03 00 01 00 00 00 10 1d 00 00 00 00 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 06 00 00 00 00 00 | 02 00 00 00 cd 96 c8 f7 00 00 00 00 00 00 00 00 | 01 00 12 00 03 00 00 00 03 00 13 00 4b 1b 53 9e | 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 | 03 00 14 00 00 00 00 00 02 00 00 00 cd 96 c8 f7 | 00 00 00 00 00 00 00 00 | pfkey_get: SADB_X_GRPSA message 671 | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=0000101e replay=0 sa_state=1 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x81fd220 allocated 88 bytes, &(extensions[0])=0p0xbfc09f10 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=78001ffb, seen=00000063, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=9(IPIP), len=11, res=0, seq=672, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 3(add). | pfkey_lib_debug:pfkey_msg_parse: remain=9 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=9. | pfkey_lib_debug:pfkey_msg_parse: remain=9 ext_type=1(security-association) ext_len=3 parsing ext 0p0x81fd230 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0000101e replay=0 state=1 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=6. | pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=5(source-address) ext_len=3 parsing ext 0p0x81fd248 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x81fd260 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, seen=00000063, required=00000063. | finish_pfkey_msg: SADB_ADD message 672 for Add SA tun.101e@216.191.140.38 | 02 03 00 09 0b 00 00 00 a0 02 00 00 ed 0f 00 00 | 03 00 01 00 00 00 10 1e 00 01 00 00 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 05 00 00 00 00 00 | 02 00 00 00 cd 96 c8 f7 00 00 00 00 00 00 00 00 | 03 00 06 00 00 00 00 00 02 00 00 00 d8 bf 8c 26 | 00 00 00 00 00 00 00 00 | pfkey_get: SADB_ADD message 672 | looking for alg with transid: 12 keylen: 0 auth: 2 | checking transid: 11 keylen: 0 auth: 1 | checking transid: 11 keylen: 0 auth: 2 | checking transid: 2 keylen: 8 auth: 0 | checking transid: 2 keylen: 8 auth: 1 | checking transid: 2 keylen: 8 auth: 2 | checking transid: 3 keylen: 24 auth: 0 | checking transid: 3 keylen: 24 auth: 1 | checking transid: 3 keylen: 24 auth: 2 | checking transid: 12 keylen: 16 auth: 0 | checking transid: 12 keylen: 16 auth: 1 | checking transid: 12 keylen: 16 auth: 2 | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09e80 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=d1d666c8 replay=64 sa_state=1 auth=3 encrypt=12 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_key_build: | pfkey_lib_debug:pfkey_key_build: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x817a6c0 allocated 144 bytes, &(extensions[0])=0p0xbfc09f10 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: copying 32 bytes from extensions[8] (type=8) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[9] (type=9) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=78001ffb, seen=00000363, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=18, res=0, seq=673, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add). | pfkey_lib_debug:pfkey_msg_parse: remain=16 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, required=00000063. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=16. | pfkey_lib_debug:pfkey_msg_parse: remain=16 ext_type=1(security-association) ext_len=3 parsing ext 0p0x817a6d0 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=d1d666c8 replay=64 state=1 auth=3 encrypt=12 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=13. | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=5(source-address) ext_len=3 parsing ext 0p0x817a6e8 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=10. | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x817a700 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=8(authentication-key) remain=7. | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=8(authentication-key) ext_len=4 parsing ext 0p0x817a718 with parser pfkey_key_parse. | pfkey_lib_debug:pfkey_key_parse: success, found len=4 exttype=8(authentication-key) bits=160 reserved=0. | pfkey_lib_debug:pfkey_msg_parse: Extension 8(authentication-key) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=9(cipher-key) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=9(cipher-key) ext_len=3 parsing ext 0p0x817a738 with parser pfkey_key_parse. | pfkey_lib_debug:pfkey_key_parse: success, found len=3 exttype=9(cipher-key) bits=128 reserved=0. | pfkey_lib_debug:pfkey_msg_parse: Extension 9(cipher-key) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=78001ffb, seen=00000363, required=00000063. | finish_pfkey_msg: SADB_ADD message 673 for Add SA esp.d1d666c8@216.191.140.38 | 02 03 00 03 12 00 00 00 a1 02 00 00 ed 0f 00 00 | 03 00 01 00 d1 d6 66 c8 40 01 03 0c 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 05 00 00 00 00 00 | 02 00 00 00 cd 96 c8 f7 00 00 00 00 00 00 00 00 | 03 00 06 00 00 00 00 00 02 00 00 00 d8 bf 8c 26 | 00 00 00 00 00 00 00 00 04 00 08 00 a0 00 00 00 | 67 5b 8b 8c 34 94 75 dd 12 cb d7 13 e8 26 97 4f | d8 c3 68 ee 00 00 00 00 03 00 09 00 80 00 00 00 | 7b 66 f6 6f 76 74 70 a9 6d 69 8b 67 58 c3 d2 d7 | pfkey_get: SADB_ADD message 673 | grouping unk0.d1d666c8@216.191.140.38 and unk0.101e@216.191.140.38 | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09ea0 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09ea0 pfkey_ext=0p0xbfc09f10 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=0000101e replay=0 sa_state=0 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_x_satype_build: | pfkey_lib_debug:pfkey_sa_build: spi=d1d666c8 replay=0 sa_state=0 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=20 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8222990 allocated 120 bytes, &(extensions[0])=0p0xbfc09f10 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: copying 8 bytes from extensions[18] (type=18) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[19] (type=19) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[20] (type=20) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=001c0043, seen=001c0043, required=00000043. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=13(x-groupsa), errno=0, satype=9(IPIP), len=15, res=0, seq=674, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 13(x-groupsa). | pfkey_lib_debug:pfkey_msg_parse: remain=13 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=001c0043, required=00000043. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=13. | pfkey_lib_debug:pfkey_msg_parse: remain=13 ext_type=1(security-association) ext_len=3 parsing ext 0p0x82229a0 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0000101e replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=10. | pfkey_lib_debug:pfkey_msg_parse: remain=10 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x82229b8 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=18(X-satype2) remain=7. | pfkey_lib_debug:pfkey_msg_parse: remain=7 ext_type=18(X-satype2) ext_len=1 parsing ext 0p0x82229d0 with parser pfkey_x_satype_parse. | pfkey_lib_debug:pfkey_x_satype_parse: enter | pfkey_lib_debug:pfkey_x_satype_parse: len=1 ext=18(X-satype2) satype=3(ESP) res=0,0,0. | pfkey_lib_debug:pfkey_msg_parse: Extension 18(X-satype2) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=19(X-security-association) remain=6. | pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=19(X-security-association) ext_len=3 parsing ext 0p0x82229d8 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=19(X-security-association) spi=d1d666c8 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 19(X-security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=20(X-destination-address2) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=20(X-destination-address2) ext_len=3 parsing ext 0p0x82229f0 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=20(X-destination-address2) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 20(X-destination-address2) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=001c0043, seen=001c0043, required=00000043. | finish_pfkey_msg: SADB_X_GRPSA message 674 for group unk0.101e@216.191.140.38 | 02 0d 00 09 0f 00 00 00 a2 02 00 00 ed 0f 00 00 | 03 00 01 00 00 00 10 1e 00 00 00 00 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 06 00 00 00 00 00 | 02 00 00 00 d8 bf 8c 26 00 00 00 00 00 00 00 00 | 01 00 12 00 03 00 00 00 03 00 13 00 d1 d6 66 c8 | 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 | 03 00 14 00 00 00 00 00 02 00 00 00 d8 bf 8c 26 | 00 00 00 00 00 00 00 00 | pfkey_get: SADB_X_GRPSA message 674 | sr for #409: unrouted | route owner of "marajade--vpsn" unrouted: NULL; eroute owner: NULL | route_and_eroute with c: marajade--vpsn (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: 409 | eroute_connection add eroute 205.150.200.163/32:0 --0-> 209.112.44.0/24:0 => tun.101e@216.191.140.38 (raw_eroute) | pfkey_lib_debug:pfkey_msg_hdr_build: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfc09d50 pfkey_ext=0p0xbfc09e80 *pfkey_ext=0p(nil). | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfc09d50 pfkey_ext=0p0xbfc09e80 *pfkey_ext=0p0x812ab68. | pfkey_lib_debug:pfkey_sa_build: spi=0000101e replay=0 sa_state=0 auth=0 encrypt=0 flags=0 | pfkey_lib_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.247:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=216.191.140.38:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=21 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=205.150.200.163:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=22 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=209.112.44.0:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=23 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=255.255.255.255:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_address_build: exttype=24 proto=0 prefixlen=0 | pfkey_lib_debug:pfkey_address_build: found address family AF_INET. | pfkey_lib_debug:pfkey_address_build: found address=255.255.255.0:0. | pfkey_lib_debug:pfkey_address_build: successful created len: 3. | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x822dea8 allocated 184 bytes, &(extensions[0])=0p0xbfc09e80 | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[21] (type=21) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[22] (type=22) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[23] (type=23) | pfkey_lib_debug:pfkey_msg_build: copying 24 bytes from extensions[24] (type=24) | pfkey_lib_debug:pfkey_msg_build: extensions permitted=05e00c63, seen=01e00063, required=01e00043. | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=14(x-addflow(eroute)), errno=0, satype=9(IPIP), len=23, res=0, seq=675, pid=4077. | pfkey_lib_debug:pfkey_msg_parse: satype 9(IPIP) conversion to proto gives 4 for msg_type 14(x-addflow(eroute)). | pfkey_lib_debug:pfkey_msg_parse: remain=21 | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=05e00c63, required=01e00043. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=21. | pfkey_lib_debug:pfkey_msg_parse: remain=21 ext_type=1(security-association) ext_len=3 parsing ext 0p0x822deb8 with parser pfkey_sa_parse. | pfkey_lib_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0000101e replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1. | pfkey_lib_debug:pfkey_msg_parse: Extension 1(security-association) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=18. | pfkey_lib_debug:pfkey_msg_parse: remain=18 ext_type=5(source-address) ext_len=3 parsing ext 0p0x822ded0 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=205.150.200.247 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 5(source-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=15. | pfkey_lib_debug:pfkey_msg_parse: remain=15 ext_type=6(destination-address) ext_len=3 parsing ext 0p0x822dee8 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=216.191.140.38 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 6(destination-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=21(X-source-flow-address) remain=12. | pfkey_lib_debug:pfkey_msg_parse: remain=12 ext_type=21(X-source-flow-address) ext_len=3 parsing ext 0p0x822df00 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=21(X-source-flow-address) family=2(AF_INET) address=205.150.200.163 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 21(X-source-flow-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=22(X-dest-flow-address) remain=9. | pfkey_lib_debug:pfkey_msg_parse: remain=9 ext_type=22(X-dest-flow-address) ext_len=3 parsing ext 0p0x822df18 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=22(X-dest-flow-address) family=2(AF_INET) address=209.112.44.0 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 22(X-dest-flow-address) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=23(X-source-mask) remain=6. | pfkey_lib_debug:pfkey_msg_parse: remain=6 ext_type=23(X-source-mask) ext_len=3 parsing ext 0p0x822df30 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=23(X-source-mask) family=2(AF_INET) address=255.255.255.255 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 23(X-source-mask) parsed. | pfkey_lib_debug:pfkey_msg_parse: parsing ext type=24(X-dest-mask) remain=3. | pfkey_lib_debug:pfkey_msg_parse: remain=3 ext_type=24(X-dest-mask) ext_len=3 parsing ext 0p0x822df48 with parser pfkey_address_parse. | pfkey_lib_debug:pfkey_address_parse: found exttype=24(X-dest-mask) family=2(AF_INET) address=255.255.255.0 proto=0 port=0. | pfkey_lib_debug:pfkey_address_parse: successful. | pfkey_lib_debug:pfkey_msg_parse: Extension 24(X-dest-mask) parsed. | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=05e00c63, seen=01e00063, required=01e00043. | finish_pfkey_msg: SADB_X_ADDFLOW message 675 for flow tun.101e@216.191.140.38 | 02 0e 00 09 17 00 00 00 a3 02 00 00 ed 0f 00 00 | 03 00 01 00 00 00 10 1e 00 00 00 00 00 00 00 00 | ff ff ff ff 00 00 00 00 03 00 05 00 00 00 00 00 | 02 00 00 00 cd 96 c8 f7 00 00 00 00 00 00 00 00 | 03 00 06 00 00 00 00 00 02 00 00 00 d8 bf 8c 26 | 00 00 00 00 00 00 00 00 03 00 15 00 00 00 00 00 | 02 00 00 00 cd 96 c8 a3 40 bf fa b7 2d 00 00 00 | 03 00 16 00 00 00 00 00 02 00 00 00 d1 70 2c 00 | 40 bf fa b7 2d 00 00 00 03 00 17 00 00 00 00 00 | 02 00 00 00 ff ff ff ff 8b 9e c0 bf 04 00 00 00 | 03 00 18 00 00 00 00 00 02 00 00 00 ff ff ff 00 | c8 9e c0 bf 8b 9e c0 bf | pfkey_get: SADB_X_ADDFLOW message 675 | command executing up-client | trusted_ca called with a=(empty) b=(empty) | executing up-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='up-client' PLUTO_CONNECTION='marajade--vpsn' PLUTO_NEXT_HOP='216.191.140.38' PLUTO_INTERFACE='ipsec0' PLUTO_ME='205.150.200.247' PLUTO_MY_ID='@marajade.sandelman.ca' PLUTO_MY_CLIENT='205.150.200.163/32' PLUTO_MY_CLIENT_NET='205.150.200.163' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='216.191.140.38' PLUTO_PEER_ID='216.191.140.38' PLUTO_PEER_CLIENT='209.112.44.0/24' PLUTO_PEER_CLIENT_NET='209.112.44.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP' PLUTO_MY_SOURCEIP='205.150.200.163' ipsec _updown | route_and_eroute: firewall_notified: true | command executing prepare-client | trusted_ca called with a=(empty) b=(empty) | executing prepare-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='prepare-client' PLUTO_CONNECTION='marajade--vpsn' PLUTO_NEXT_HOP='216.191.140.38' PLUTO_INTERFACE='ipsec0' PLUTO_ME='205.150.200.247' PLUTO_MY_ID='@marajade.sandelman.ca' PLUTO_MY_CLIENT='205.150.200.163/32' PLUTO_MY_CLIENT_NET='205.150.200.163' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='216.191.140.38' PLUTO_PEER_ID='216.191.140.38' PLUTO_PEER_CLIENT='209.112.44.0/24' PLUTO_PEER_CLIENT_NET='209.112.44.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP' PLUTO_MY_SOURCEIP='205.150.200.163' ipsec _updown | command executing route-client | trusted_ca called with a=(empty) b=(empty) | executing route-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='route-client' PLUTO_CONNECTION='marajade--vpsn' PLUTO_NEXT_HOP='216.191.140.38' PLUTO_INTERFACE='ipsec0' PLUTO_ME='205.150.200.247' PLUTO_MY_ID='@marajade.sandelman.ca' PLUTO_MY_CLIENT='205.150.200.163/32' PLUTO_MY_CLIENT_NET='205.150.200.163' PLUTO_MY_CLIENT_MASK='255.255.255.255' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='216.191.140.38' PLUTO_PEER_ID='216.191.140.38' PLUTO_PEER_CLIENT='209.112.44.0/24' PLUTO_PEER_CLIENT_NET='209.112.44.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP' PLUTO_MY_SOURCEIP='205.150.200.163' ipsec _updown | route_and_eroute: instance "marajade--vpsn", setting eroute_owner {spd=0x810781c,sr=0x810781c} to #409 (was #0) (newest_ipsec_sa=#0) | encrypting: | 00 00 00 14 b7 ec 86 1a 11 90 d7 39 ea 46 8f f3 | da 2e f2 cd | IV: | 4a a5 d9 91 14 26 d8 0e | emitting 4 zero bytes of encryption padding into ISAKMP Message | encrypting using OAKLEY_3DES_CBC | next IV: 6d 19 7c e1 27 8a 43 81 | emitting length of ISAKMP Message: 52 | inR1_outI2: instance marajade--vpsn[0], setting newest_ipsec_sa to #409 (was #0) (spd.eroute=#409) | ICOOKIE: c8 c9 8b 44 19 84 5a 59 | RCOOKIE: d0 23 4f 16 d3 3e 23 d4 | peer: d8 bf 8c 26 | state hash entry 3 | peer and cookies match on #409, provided msgid 00000000 vs a9af6f93 | peer and cookies match on #408, provided msgid 00000000 vs 00000000 | state object #408 found, in STATE_MAIN_I4 "marajade--vpsn" #409: Dead Peer Detection (RFC 3706): enabled | state: 409 requesting event none to be deleted by dpd.c:160 | inserting event EVENT_DPD, timeout in 30 seconds for #409 | state: 408 requesting event EVENT_DPD to be deleted by dpd.c:172 | complete state transition with STF_OK "marajade--vpsn" #409: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | sending reply packet to 216.191.140.38:500 (from port=500) | sending 52 bytes for STATE_QUICK_I1 through eth0:500 to 216.191.140.38:500: | c8 c9 8b 44 19 84 5a 59 d0 23 4f 16 d3 3e 23 d4 | 08 10 20 01 a9 af 6f 93 00 00 00 34 46 f5 2a f1 | bc 95 93 65 50 7a 9f 94 23 6d ec b6 6d 19 7c e1 | 27 8a 43 81 | inserting event EVENT_SA_REPLACE, timeout in 27754 seconds for #409 "marajade--vpsn" #409: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0xd1d666c8 <0x4b1b539e xfrm=AES_0-HMAC_SHA1 NATD=none DPD=enabled} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 1 to unpend | next event EVENT_RETRANSMIT in 1 seconds for #407 | | *time to handle event | handling event EVENT_RETRANSMIT | event after this is EVENT_DPD in 7 seconds | processing connection ramsayville--marajade | handling event EVENT_RETRANSMIT for 69.196.173.36 "ramsayville--marajade" #407 | sending 428 bytes for EVENT_RETRANSMIT through eth0:500 to 69.196.173.36:500: | 7f e2 69 10 ab 2e e1 79 99 ba e9 8d 42 52 92 fb | 08 10 20 01 ce 4a cb 29 00 00 01 ac 8c d7 06 75 | 52 0f 9d 0e eb 7d f0 02 64 f9 da 0b be ff e6 e6 | e2 0a 19 57 0c d2 48 fa 62 1d ee 6a ed e1 d4 23 | 8d 2a 8f 37 38 2f 74 3f c3 55 00 3c e0 2c 36 50 | 2b bd 5d 20 5d 9e ab da 1e 93 59 64 e0 fc a6 c4 | 5c b9 34 ae 24 8b 8a 27 26 d0 5e de 9b af 72 77 | 06 13 e3 c1 93 f6 8f 5e f7 ec 05 8a 97 4f b7 3a | 77 b4 26 92 2b d4 cf 37 b2 6e 52 4f d6 ac 6c 11 | 93 3d c0 81 eb 4f 45 8c 24 d7 f6 f3 08 49 05 69 | df e2 d1 df 6e 12 3d ab 1c e0 7e 2b d3 e8 61 17 | 29 87 8c 5e e5 bf 20 36 11 c3 55 05 93 3f 50 4d | 66 97 40 d8 22 ff 5e 15 1c 12 51 a1 ae 14 95 0a | ba e2 06 7e b9 73 db 78 8e cb 4b 68 b7 2e 31 2e | 9d da fb 1c 7d 78 e7 63 25 7b 94 8c bf aa 91 9c | 89 ae 6c 37 d1 9c 12 4a 02 61 c2 ef fd 31 ce a2 | 18 c4 08 55 93 a1 bc 57 57 43 ee e2 a6 92 26 db | d6 c1 80 81 44 fd 85 cd 74 2d 48 23 18 e3 58 46 | 0a 4b 4d 09 6b 33 41 81 1c 58 61 fb 3b 2a e2 d0 | 2f 57 2d 8d 16 dc 84 11 1f 85 2e 5a d2 63 6f c7 | 07 b3 91 fd ad 8a ae 20 9d 77 a7 22 7a f4 39 68 | e3 fb 30 c5 ca 1f bf a7 3c 85 10 67 bf ac 99 df | e7 c9 9a 21 10 ad 8e d2 ec 7e 4f d5 4e d8 da a1 | 25 27 b1 ac a4 50 30 39 88 76 76 02 86 75 1c 05 | 34 a1 b5 0f 3e f4 c6 48 bd 9f 16 ce 9b 11 ba 64 | 31 b0 fe 4b 4d ef b6 f7 45 5b ab 1d a8 71 c7 98 | df c7 c0 64 70 59 b1 0d fd 8b aa f9 | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #407 | next event EVENT_DPD in 7 seconds for #2 | | *received 60 bytes from 69.196.173.36:500 on eth0 (port=500) | 7f e2 69 10 ab 2e e1 79 99 ba e9 8d 42 52 92 fb | 08 10 05 01 23 ed 37 fb 00 00 00 3c 78 47 eb 3c | 05 26 bc fe cf 7f 9a 4f 55 b6 48 8c 8f 10 0b 65 | 5f 12 f6 74 2f b3 ee f3 ae ba 94 ea | **parse ISAKMP Message: | initiator cookie: | 7f e2 69 10 ab 2e e1 79 | responder cookie: | 99 ba e9 8d 42 52 92 fb | next payload type: ISAKMP_NEXT_HASH | ISAKMP version: ISAKMP Version 1.0 | exchange type: ISAKMP_XCHG_INFO | flags: ISAKMP_FLAG_ENCRYPTION | message ID: 23 ed 37 fb | length: 60 | processing packet with exchange type=ISAKMP_XCHG_INFO (5) | ICOOKIE: 7f e2 69 10 ab 2e e1 79 | RCOOKIE: 99 ba e9 8d 42 52 92 fb | peer: 45 c4 ad 24 | state hash entry 13 | peer and cookies match on #407, provided msgid 00000000 vs ce4acb29/00000000 | peer and cookies match on #382, provided msgid 00000000 vs 00000000/00000000 | p15 state object #382 found, in STATE_MAIN_I4 | processing connection ramsayville--marajade | last Phase 1 IV: e8 15 cb 50 94 0e f2 62 | current Phase 1 IV: e8 15 cb 50 94 0e f2 62 | computed Phase 2 IV: | d2 da 2e 8d c3 6c f8 dd c2 90 b7 78 57 21 e1 34 | received encrypted packet from 69.196.173.36:500 | decrypting 32 bytes using algorithm OAKLEY_3DES_CBC | decrypted: | 0b 00 00 14 c0 d0 3e 37 2d b4 eb 06 c5 e1 a0 9a | 4e b5 33 7b 00 00 00 0c 00 00 00 01 01 00 00 09 | next IV: 2f b3 ee f3 ae ba 94 ea | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N | length: 20 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE | length: 12 | DOI: ISAKMP_DOI_IPSEC | protocol ID: 1 | SPI size: 0 | Notify Message Type: INVALID_MESSAGE_ID "ramsayville--marajade" #382: ignoring informational payload, type INVALID_MESSAGE_ID | info: | processing informational INVALID_MESSAGE_ID (9) "ramsayville--marajade" #382: received and ignored informational message | complete state transition with STF_IGNORE | next event EVENT_DPD in 7 seconds for #2