Jan 30 17:00:49.252968: | expiring aged bare shunts from shunt table Jan 30 17:00:49.252974: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x56480e212398 Jan 30 17:00:49.252981: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:00:49.252989: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x56480e20bb98 Jan 30 17:01:00.115639: shutting down Jan 30 17:01:00.115662: | processing: RESET whack log_fd (was 14) (in exit_pluto() at plutomain.c:1784) Jan 30 17:01:00.115669: | pluto_sd: executing action action: stopping(6), status 0 Jan 30 17:01:00.115699: | certs and keys locked by 'free_preshared_secrets' Jan 30 17:01:00.115705: | certs and keys unlocked by 'free_preshard_secrets' Jan 30 17:01:00.115711: | unreference key: 0x56480e210dd8 @east cnt 1-- Jan 30 17:01:00.115719: | unreference key: 0x56480e210998 @west cnt 1-- Jan 30 17:01:00.115728: | crl fetch request list locked by 'free_crl_fetch' Jan 30 17:01:00.115732: | crl fetch request list unlocked by 'free_crl_fetch' Jan 30 17:01:00.115747: shutting down interface eth1/eth1 :4500 Jan 30 17:01:00.115752: shutting down interface eth1/eth1 :500 Jan 30 17:01:00.115773: | free_event_entry: release EVENT_NULL-pe@0x56480e210088 Jan 30 17:01:00.115788: | free_event_entry: release EVENT_NULL-pe@0x56480e2101a8 Jan 30 17:01:00.115955: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x56480e212398 Jan 30 17:01:00.115963: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x56480e1fe1b8 Jan 30 17:01:00.115968: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x56480e212328 Jan 30 17:01:00.115972: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x56480e20b928 Jan 30 17:01:00.115985: | free_event_entry: release EVENT_NULL-pe@0x56480e20fba8 Jan 30 17:01:00.115991: | free_event_entry: release EVENT_NULL-pe@0x56480e20f9e8 Jan 30 17:01:00.115997: | free_event_entry: release EVENT_NULL-pe@0x56480e20f848 Jan 30 17:01:00.116003: | free_event_entry: release EVENT_NULL-pe@0x56480e20eec8 Jan 30 17:01:00.116009: | free_event_entry: release EVENT_NULL-pe@0x56480e20eda8 Jan 30 17:01:00.116016: | free_event_entry: release EVENT_NULL-pe@0x56480e20ba98 Jan 30 17:01:00.116022: | free_event_entry: release EVENT_NULL-pe@0x56480e20b998 Jan 30 17:01:00.116028: | free_event_entry: release EVENT_REINIT_SECRET-pe@0x56480e1fdf68 Jan 30 17:01:00.116088: leak detective found no leaks Jan 30 17:23:20.116871: FIPS Product: NO Jan 30 17:23:20.118400: FIPS Kernel: NO Jan 30 17:23:20.118412: FIPS Mode: NO Jan 30 17:23:20.118418: NSS DB directory: sql:/etc/ipsec.d Jan 30 17:23:20.118598: Initializing NSS Jan 30 17:23:20.118619: Opening NSS database "sql:/etc/ipsec.d" read-only Jan 30 17:23:20.229773: NSS initialized Jan 30 17:23:20.229799: NSS crypto library initialized Jan 30 17:23:20.229804: FIPS HMAC integrity support [enabled] Jan 30 17:23:20.229807: FIPS mode disabled for pluto daemon Jan 30 17:23:20.258792: FIPS HMAC integrity verification self-test passed Jan 30 17:23:20.259484: libcap-ng support [enabled] Jan 30 17:23:20.259497: Linux audit support [enabled] Jan 30 17:23:20.259699: Linux audit activated Jan 30 17:23:20.259707: Starting Pluto (Libreswan Version 3.25 XFRM(netkey) KLIPS FORK PTHREAD_SETSCHEDPRIO GCC_EXCEPTIONS NSS DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:25516 Jan 30 17:23:20.259711: core dump dir: /run/pluto Jan 30 17:23:20.259715: secrets file: /etc/ipsec.secrets Jan 30 17:23:20.259719: leak-detective enabled Jan 30 17:23:20.259722: NSS crypto [enabled] Jan 30 17:23:20.259725: XAUTH PAM support [enabled] Jan 30 17:23:20.259788: | init_nat_traversal() initialized with keep_alive=0s Jan 30 17:23:20.259795: NAT-Traversal support [enabled] Jan 30 17:23:20.259817: Initializing libevent in pthreads mode: headers: 2.0.21-stable (2001500); library: 2.0.21-stable (2001500) Jan 30 17:23:20.260013: | event_schedule: new EVENT_REINIT_SECRET-pe@0x556c11a108c8 Jan 30 17:23:20.260024: | inserting event EVENT_REINIT_SECRET, timeout in 3600.000 seconds Jan 30 17:23:20.260033: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:23:20.260038: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:23:20.260043: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a10b18 Jan 30 17:23:20.260048: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:23:20.260071: Encryption algorithms: Jan 30 17:23:20.260085: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm aes_ccm_c) Jan 30 17:23:20.260090: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_b) Jan 30 17:23:20.260095: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} (aes_ccm_a) Jan 30 17:23:20.260099: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] (3des) Jan 30 17:23:20.260103: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Jan 30 17:23:20.260107: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (camellia) Jan 30 17:23:20.260111: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm aes_gcm_c) Jan 30 17:23:20.260116: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_b) Jan 30 17:23:20.260120: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes_gcm_a) Jan 30 17:23:20.260124: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aesctr) Jan 30 17:23:20.260128: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} (aes) Jan 30 17:23:20.260132: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (serpent) Jan 30 17:23:20.260137: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} (twofish) Jan 30 17:23:20.260141: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} (twofish_cbc_ssh) Jan 30 17:23:20.260145: CAST_CBC IKEv1: ESP IKEv2: ESP {*128} (cast) Jan 30 17:23:20.260149: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP {256,192,*128} (aes_gmac) Jan 30 17:23:20.260152: NULL IKEv1: ESP IKEv2: ESP [] Jan 30 17:23:20.260159: Hash algorithms: Jan 30 17:23:20.260164: MD5 IKEv1: IKE IKEv2: Jan 30 17:23:20.260176: SHA1 IKEv1: IKE IKEv2: FIPS (sha) Jan 30 17:23:20.260181: SHA2_256 IKEv1: IKE IKEv2: FIPS (sha2 sha256) Jan 30 17:23:20.260185: SHA2_384 IKEv1: IKE IKEv2: FIPS (sha384) Jan 30 17:23:20.260188: SHA2_512 IKEv1: IKE IKEv2: FIPS (sha512) Jan 30 17:23:20.260196: PRF algorithms: Jan 30 17:23:20.260201: HMAC_MD5 IKEv1: IKE IKEv2: IKE (md5) Jan 30 17:23:20.260205: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS (sha sha1) Jan 30 17:23:20.260209: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS (sha2 sha256 sha2_256) Jan 30 17:23:20.260212: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS (sha384 sha2_384) Jan 30 17:23:20.260216: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS (sha512 sha2_512) Jan 30 17:23:20.260220: AES_XCBC IKEv1: IKEv2: IKE FIPS (aes128_xcbc) Jan 30 17:23:20.260229: Integrity algorithms: Jan 30 17:23:20.260233: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (md5 hmac_md5) Jan 30 17:23:20.260237: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha sha1 sha1_96 hmac_sha1) Jan 30 17:23:20.260241: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha512 sha2_512 hmac_sha2_512) Jan 30 17:23:20.260245: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha384 sha2_384 hmac_sha2_384) Jan 30 17:23:20.260249: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (sha2 sha256 sha2_256 hmac_sha2_256) Jan 30 17:23:20.260253: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH FIPS (aes_xcbc aes128_xcbc aes128_xcbc_96) Jan 30 17:23:20.260256: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS (aes_cmac) Jan 30 17:23:20.260260: NONE IKEv1: ESP IKEv2: ESP FIPS (null) Jan 30 17:23:20.260269: DH algorithms: Jan 30 17:23:20.260273: NONE IKEv1: IKEv2: IKE ESP AH (null dh0) Jan 30 17:23:20.260277: MODP1024 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh2) Jan 30 17:23:20.260281: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH (dh5) Jan 30 17:23:20.260284: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh14) Jan 30 17:23:20.260288: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh15) Jan 30 17:23:20.260292: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh16) Jan 30 17:23:20.260296: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh17) Jan 30 17:23:20.260300: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS (dh18) Jan 30 17:23:20.260304: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_256) Jan 30 17:23:20.260308: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_384) Jan 30 17:23:20.260311: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS (ecp_521) Jan 30 17:23:20.260315: DH22 IKEv1: IKE ESP AH IKEv2: IKE ESP AH Jan 30 17:23:20.260319: DH23 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS Jan 30 17:23:20.260322: DH24 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS Jan 30 17:23:20.262075: starting up 4 crypto helpers Jan 30 17:23:20.262123: started thread for crypto helper 0 Jan 30 17:23:20.262146: started thread for crypto helper 1 Jan 30 17:23:20.262164: started thread for crypto helper 2 Jan 30 17:23:20.262184: started thread for crypto helper 3 Jan 30 17:23:20.262196: | ignoring microcode for XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0) -> MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_v1_RETRANSMIT Jan 30 17:23:20.262200: | MAIN_R0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262204: | MAIN_I1 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262208: | MAIN_R1 (timeout: EVENT_SO_DISCARD flags: 200) Jan 30 17:23:20.262214: | MAIN_I2 (timeout: EVENT_v1_RETRANSMIT flags: 0) Jan 30 17:23:20.262218: | MAIN_R2 (timeout: EVENT_v1_RETRANSMIT flags: 0) Jan 30 17:23:20.262222: | MAIN_I3 (timeout: EVENT_v1_RETRANSMIT flags: 0) Jan 30 17:23:20.262228: | MAIN_R3 (timeout: EVENT_SA_REPLACE flags: 200) Jan 30 17:23:20.262234: | MAIN_I4 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262240: | AGGR_R0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262245: | AGGR_I1 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262251: | AGGR_R1 (timeout: EVENT_SO_DISCARD flags: 200) Jan 30 17:23:20.262257: | AGGR_I2 (timeout: EVENT_SA_REPLACE flags: 200) Jan 30 17:23:20.262263: | AGGR_R2 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262267: | QUICK_R0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262276: | QUICK_I1 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262279: | QUICK_R1 (timeout: EVENT_v1_RETRANSMIT flags: 0) Jan 30 17:23:20.262283: | QUICK_I2 (timeout: EVENT_SA_REPLACE flags: 200) Jan 30 17:23:20.262287: | QUICK_R2 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262290: | INFO (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262294: | INFO_PROTECTED (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262298: | XAUTH_R0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262301: | XAUTH_R1 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262305: | MODE_CFG_R0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262309: | MODE_CFG_R1 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262312: | MODE_CFG_R2 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262316: | MODE_CFG_I1 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262319: | XAUTH_I0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262323: | XAUTH_I1 (timeout: EVENT_v1_RETRANSMIT flags: 0) Jan 30 17:23:20.262331: | Processing IKEv2 state V2_REKEY_IKE_I0 (microcode Initiate CREATE_CHILD_SA IKE Rekey) Jan 30 17:23:20.262336: | Processing IKEv2 state V2_REKEY_CHILD_I0 (microcode Initiate CREATE_CHILD_SA IPsec Rekey SA) Jan 30 17:23:20.262340: | Processing IKEv2 state V2_CREATE_I0 (microcode Initiate CREATE_CHILD_SA IPsec SA) Jan 30 17:23:20.262344: | Processing IKEv2 state PARENT_I0 (microcode initiate IKE_SA_INIT) Jan 30 17:23:20.262347: | Processing IKEv2 state PARENT_I1 (microcode Initiator: process SA_INIT reply notification) Jan 30 17:23:20.262351: | Processing IKEv2 state PARENT_I2 (microcode Initiator: process INVALID_SYNTAX AUTH notification) Jan 30 17:23:20.262355: | Processing IKEv2 state PARENT_R0 (microcode Respond to IKE_SA_INIT) Jan 30 17:23:20.262359: | Processing IKEv2 state PARENT_R1 (microcode Responder: process AUTH request (no SKEYSEED)) Jan 30 17:23:20.262363: | Processing IKEv2 state V2_REKEY_IKE_R (microcode Respond to CREATE_CHILD_SA IKE Rekey) Jan 30 17:23:20.262367: | Processing IKEv2 state V2_REKEY_IKE_I (microcode Process CREATE_CHILD_SA IKE Rekey Response) Jan 30 17:23:20.262370: | Processing IKEv2 state V2_CREATE_I (microcode Process CREATE_CHILD_SA IPsec SA Response) Jan 30 17:23:20.262374: | Processing IKEv2 state V2_CREATE_R (microcode Respond to CREATE_CHILD_SA IPsec SA Request) Jan 30 17:23:20.262378: | Processing IKEv2 state PARENT_I3 (microcode I3: INFORMATIONAL Request) Jan 30 17:23:20.262382: | Processing IKEv2 state PARENT_R2 (microcode R2: process INFORMATIONAL Request) Jan 30 17:23:20.262386: | Processing IKEv2 state IKESA_DEL (microcode IKE_SA_DEL: process INFORMATIONAL) Jan 30 17:23:20.262391: | ignoring microcode for PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_RETAIN Jan 30 17:23:20.262396: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Jan 30 17:23:20.262400: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Jan 30 17:23:20.262404: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Jan 30 17:23:20.262411: | ignoring microcode for PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) -> PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) with event EVENT_NULL Jan 30 17:23:20.262416: | ignoring microcode for PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) -> PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) with event EVENT_SA_REPLACE Jan 30 17:23:20.262421: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Jan 30 17:23:20.262426: | ignoring microcode for PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Jan 30 17:23:20.262430: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Jan 30 17:23:20.262434: | ignoring microcode for PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) -> PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) with event EVENT_RETAIN Jan 30 17:23:20.262438: | IKEv2_BASE (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262442: | PARENT_I1 (timeout: EVENT_v2_RETRANSMIT flags: 0) Jan 30 17:23:20.262446: | PARENT_I2 (timeout: EVENT_v2_RETRANSMIT flags: 0) Jan 30 17:23:20.262449: | PARENT_I3 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262453: | PARENT_R1 (timeout: EVENT_v2_RESPONDER_TIMEOUT flags: 0) Jan 30 17:23:20.262457: | PARENT_R2 (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262460: | V2_CREATE_I0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262464: | V2_CREATE_I (timeout: EVENT_v2_RETRANSMIT flags: 0) Jan 30 17:23:20.262468: | V2_REKEY_IKE_I0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262471: | V2_REKEY_IKE_I (timeout: EVENT_v2_RETRANSMIT flags: 0) Jan 30 17:23:20.262475: | V2_REKEY_CHILD_I0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262479: | V2_REKEY_CHILD_I (timeout: EVENT_v2_RETRANSMIT flags: 0) Jan 30 17:23:20.262483: | V2_CREATE_R (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262486: | V2_REKEY_IKE_R (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262490: | V2_REKEY_CHILD_R (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262493: | V2_IPSEC_I (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262497: | V2_IPSEC_R (timeout: EVENT_SA_REPLACE flags: 0) Jan 30 17:23:20.262501: | IKESA_DEL (timeout: EVENT_RETAIN flags: 0) Jan 30 17:23:20.262504: | CHILDSA_DEL (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262508: | PARENT_R0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262512: | PARENT_I0 (timeout: EVENT_NULL flags: 0) Jan 30 17:23:20.262607: Using Linux XFRM/NETKEY IPsec interface code on 3.10.0-957.1.3.el7.x86_64 Jan 30 17:23:20.263238: | process 25516 listening for PF_KEY_V2 on file descriptor 14 Jan 30 17:23:20.263249: | kernel_alg_init() Jan 30 17:23:20.263260: | Hard-wiring new AEAD algorithms Jan 30 17:23:20.263267: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=18(ESP_AES_GCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263272: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=19(ESP_AES_GCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263276: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=20(ESP_AES_GCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263280: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=14(ESP_AES_CCM_A), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263285: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=15(ESP_AES_CCM_B), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263289: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=16(ESP_AES_CCM_C), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263294: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=23(ESP_NULL_AUTH_AES_GMAC), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.263300: | Hard-wiring new INTEG algorithms Jan 30 17:23:20.263305: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=250(AH_AES_CMAC_96), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Jan 30 17:23:20.263418: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Jan 30 17:23:20.263435: | finish_pfkey_msg: K_SADB_REGISTER message 1 for AH Jan 30 17:23:20.263440: | 02 07 00 02 02 00 00 00 01 00 00 00 ac 63 00 00 Jan 30 17:23:20.263708: | starting up helper thread 1 Jan 30 17:23:20.263721: | status value returned by setting the priority of this thread (crypto helper 1) 22 Jan 30 17:23:20.263725: | crypto helper 1 waiting (nothing to do) Jan 30 17:23:20.263733: | starting up helper thread 2 Jan 30 17:23:20.263740: | status value returned by setting the priority of this thread (crypto helper 2) 22 Jan 30 17:23:20.263744: | crypto helper 2 waiting (nothing to do) Jan 30 17:23:20.263750: | starting up helper thread 3 Jan 30 17:23:20.263757: | status value returned by setting the priority of this thread (crypto helper 3) 22 Jan 30 17:23:20.263761: | crypto helper 3 waiting (nothing to do) Jan 30 17:23:20.263767: | starting up helper thread 0 Jan 30 17:23:20.263775: | status value returned by setting the priority of this thread (crypto helper 0) 22 Jan 30 17:23:20.263779: | crypto helper 0 waiting (nothing to do) Jan 30 17:23:20.327745: | pfkey_get: K_SADB_REGISTER message 1 Jan 30 17:23:20.327761: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=72 Jan 30 17:23:20.327767: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Jan 30 17:23:20.327772: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Jan 30 17:23:20.327777: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Jan 30 17:23:20.327781: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256 Jan 30 17:23:20.327785: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384 Jan 30 17:23:20.327790: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512 Jan 30 17:23:20.327794: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Jan 30 17:23:20.327798: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Jan 30 17:23:20.327803: | kernel_alg_register_pfkey(): SADB_SATYPE_AH: sadb_msg_len=22 sadb_supported_len=88 Jan 30 17:23:20.327807: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Jan 30 17:23:20.327811: | kernel_alg_add(2,15,11) fails because alg combo is invalid Jan 30 17:23:20.327815: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64 Jan 30 17:23:20.327819: | kernel_alg_add(2,15,2) fails because alg combo is invalid Jan 30 17:23:20.327824: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192 Jan 30 17:23:20.327828: | kernel_alg_add(2,15,3) fails because alg combo is invalid Jan 30 17:23:20.327832: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128 Jan 30 17:23:20.327838: | kernel_alg_add(2,15,6) fails because alg combo is invalid Jan 30 17:23:20.327843: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448 Jan 30 17:23:20.327847: | kernel_alg_add(2,15,7) fails because alg combo is invalid Jan 30 17:23:20.327851: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.327855: | kernel_alg_add(2,15,12) fails because alg combo is invalid Jan 30 17:23:20.327860: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.327863: | kernel_alg_add(2,15,252) fails because alg combo is invalid Jan 30 17:23:20.327868: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.327872: | kernel_alg_add(2,15,22) fails because alg combo is invalid Jan 30 17:23:20.327876: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.327880: | kernel_alg_add(2,15,253) fails because alg combo is invalid Jan 30 17:23:20.327884: | kernel_alg_add(): satype=2(SADB_SATYPE_AH), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288 Jan 30 17:23:20.327888: | kernel_alg_add(2,15,13) fails because alg combo is invalid Jan 30 17:23:20.327891: | AH registered with kernel. Jan 30 17:23:20.327898: | finish_pfkey_msg: K_SADB_REGISTER message 2 for ESP Jan 30 17:23:20.327902: | 02 07 00 03 02 00 00 00 02 00 00 00 ac 63 00 00 Jan 30 17:23:20.332881: | pfkey_get: K_SADB_REGISTER message 2 Jan 30 17:23:20.332893: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=72 Jan 30 17:23:20.332899: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=251(AH_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Jan 30 17:23:20.332903: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=251 Jan 30 17:23:20.332908: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=2(AH_MD5), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Jan 30 17:23:20.332912: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=2 Jan 30 17:23:20.332916: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=3(AH_SHA), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Jan 30 17:23:20.332920: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=3 Jan 30 17:23:20.332924: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=5(AH_SHA2_256), alg_ivlen=0, alg_minbits=256, alg_maxbits=256 Jan 30 17:23:20.332928: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=5 Jan 30 17:23:20.332932: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=6(AH_SHA2_384), alg_ivlen=0, alg_minbits=384, alg_maxbits=384 Jan 30 17:23:20.332936: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=6 Jan 30 17:23:20.332940: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=7(AH_SHA2_512), alg_ivlen=0, alg_minbits=512, alg_maxbits=512 Jan 30 17:23:20.332944: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=7 Jan 30 17:23:20.332948: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=8(AH_RIPEMD), alg_ivlen=0, alg_minbits=160, alg_maxbits=160 Jan 30 17:23:20.332952: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=8 Jan 30 17:23:20.332956: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=14(SADB_EXT_SUPPORTED_AUTH), alg_id=9(AH_AES_XCBC_MAC), alg_ivlen=0, alg_minbits=128, alg_maxbits=128 Jan 30 17:23:20.332963: | kernel_alg_add(): discarding already setup satype=3, exttype=14, alg_id=9 Jan 30 17:23:20.332967: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=22 sadb_supported_len=88 Jan 30 17:23:20.332971: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=11(ESP_NULL), alg_ivlen=0, alg_minbits=0, alg_maxbits=0 Jan 30 17:23:20.332976: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=2(ESP_DES(UNUSED)), alg_ivlen=8, alg_minbits=64, alg_maxbits=64 Jan 30 17:23:20.332980: | kernel_alg_add(): Ignoring alg_id=2(ESP_DES(UNUSED)) - too weak Jan 30 17:23:20.332984: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=3(ESP_3DES), alg_ivlen=8, alg_minbits=192, alg_maxbits=192 Jan 30 17:23:20.332989: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=6(ESP_CAST), alg_ivlen=8, alg_minbits=40, alg_maxbits=128 Jan 30 17:23:20.332993: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=7(ESP_BLOWFISH(UNUSED)), alg_ivlen=8, alg_minbits=40, alg_maxbits=448 Jan 30 17:23:20.332997: | kernel_alg_add(): Ignoring alg_id=7(ESP_BLOWFISH(UNUSED)) - too weak Jan 30 17:23:20.333001: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=12(ESP_AES), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.333006: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=252(ESP_SERPENT), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.333010: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=22(ESP_CAMELLIA), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.333015: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=253(ESP_TWOFISH), alg_ivlen=8, alg_minbits=128, alg_maxbits=256 Jan 30 17:23:20.333019: | kernel_alg_add(): satype=3(SADB_SATYPE_ESP), exttype=15(SADB_EXT_SUPPORTED_ENCRYPT), alg_id=13(ESP_AES_CTR), alg_ivlen=8, alg_minbits=160, alg_maxbits=288 Jan 30 17:23:20.333023: | ESP registered with kernel. Jan 30 17:23:20.333028: | finish_pfkey_msg: K_SADB_REGISTER message 3 for IPCOMP Jan 30 17:23:20.333032: | 02 07 00 09 02 00 00 00 03 00 00 00 ac 63 00 00 Jan 30 17:23:20.338031: | pfkey_get: K_SADB_REGISTER message 3 Jan 30 17:23:20.338042: | IPCOMP registered with kernel. Jan 30 17:23:20.341579: | Registered AH, ESP and IPCOMP Jan 30 17:23:20.341591: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a1ac88 Jan 30 17:23:20.341598: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:23:20.341605: | setup kernel fd callback Jan 30 17:23:20.341814: | selinux support is enabled. Jan 30 17:23:20.342256: systemd watchdog for ipsec service configured with timeout of 200000000 usecs Jan 30 17:23:20.342264: watchdog: sending probes every 100 secs Jan 30 17:23:20.342269: | pluto_sd: executing action action: start(2), status 0 Jan 30 17:23:20.342626: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a288f8 Jan 30 17:23:20.342636: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:23:20.342808: | unbound context created - setting debug level to 5 Jan 30 17:23:20.342921: | /etc/hosts lookups activated Jan 30 17:23:20.343001: | /etc/resolv.conf usage activated Jan 30 17:23:20.343008: | Loading dnssec root key from:/var/lib/unbound/root.key Jan 30 17:23:20.343012: | No additional dnssec trust anchors defined via dnssec-trusted= option Jan 30 17:23:20.343016: | Setting up events, loop start Jan 30 17:23:20.343509: | created addconn helper (pid:25673) using fork+execve Jan 30 17:23:20.343529: | forked child 25673 Jan 30 17:23:20.343545: | pid table: inserting object 0x556c11a2afa8 (addconn pid 25673) entry 0x556c11a2afb0 into list 0x556c10226440 (older 0x556c10226440 newer 0x556c10226440) Jan 30 17:23:20.343566: | pid table: inserted object 0x556c11a2afa8 (addconn pid 25673) entry 0x556c11a2afb0 (older 0x556c10226440 newer 0x556c10226440) Jan 30 17:23:20.343573: | pid table: list entry 0x556c10226440 is HEAD (older 0x556c11a2afb0 newer 0x556c11a2afb0) Jan 30 17:23:20.354370: | pluto_sd: executing action action: reloading(4), status 0 Jan 30 17:23:20.354418: listening for IKE messages Jan 30 17:23:20.354772: | Inspecting interface lo Jan 30 17:23:20.354786: | found lo with address 127.0.0.1 Jan 30 17:23:20.354791: | Inspecting interface eth0 Jan 30 17:23:20.354796: | found eth0 with address Jan 30 17:23:20.354800: | Inspecting interface eth1 Jan 30 17:23:20.354806: | found eth1 with address Jan 30 17:23:20.354816: | Only looking to listen on Jan 30 17:23:20.354863: adding interface eth1/eth1 :500 Jan 30 17:23:20.354962: | NAT-Traversal: Trying sockopt style NAT-T Jan 30 17:23:20.355010: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Jan 30 17:23:20.355017: adding interface eth1/eth1 :4500 Jan 30 17:23:20.355026: skipping interface eth0 with Jan 30 17:23:20.355033: skipping interface lo with 127.0.0.1 Jan 30 17:23:20.355087: | Only looking to listen on Jan 30 17:23:20.355094: | Only looking to listen on Jan 30 17:23:20.355107: | setup callback for interface eth1:4500 fd 17 Jan 30 17:23:20.355113: | setup callback for interface eth1:500 fd 16 Jan 30 17:23:20.355123: | certs and keys locked by 'free_preshared_secrets' Jan 30 17:23:20.355127: | certs and keys unlocked by 'free_preshard_secrets' Jan 30 17:23:20.355847: loading secrets from "/etc/ipsec.secrets" Jan 30 17:23:20.355891: no secrets filename matched "/etc/ipsec.d/*.secrets" Jan 30 17:23:20.355911: | pluto_sd: executing action action: ready(5), status 0 Jan 30 17:23:20.356338: | waitpid returned pid 25673 (exited with status 0) Jan 30 17:23:20.356350: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:20.356355: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:20.356359: | reaped addconn helper child (status 0) Jan 30 17:23:20.356364: | pid table: removing object 0x556c11a2afa8 (addconn pid 25673) entry 0x556c11a2afb0 (older 0x556c10226440 newer 0x556c10226440) Jan 30 17:23:20.356368: | pid table: empty Jan 30 17:23:20.356375: | waitpid returned ECHILD (no child processes left) Jan 30 17:23:32.066682: | Added new connection lagu_tunnel with policy RSASIG+ENCRYPT+PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Jan 30 17:23:32.066703: | counting wild cards for @west is 0 Jan 30 17:23:32.066708: | counting wild cards for @east is 0 Jan 30 17:23:32.066722: | connect_to_host_pair: :500 :500 -> hp:none Jan 30 17:23:32.066727: added connection description "lagu_tunnel" Jan 30 17:23:32.066745: | <>[@west]...<>[@east]:6/8080 Jan 30 17:23:32.066752: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+PFS+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Jan 30 17:23:32.066850: | add keyid @west Jan 30 17:23:32.066861: | add pubkey 03 01 00 01 ab c0 66 ff 90 81 3a 38 5c 5f c0 a9 Jan 30 17:23:32.066865: | add pubkey bf 9d 91 4c b9 0c f3 92 36 f4 b8 ba 8b 19 3b eb Jan 30 17:23:32.066869: | add pubkey 0b 76 f3 ed e1 bc 15 ce 99 5a be e1 c4 b8 b2 dc Jan 30 17:23:32.066873: | add pubkey eb d9 6f 04 5f 45 f9 49 93 d0 e6 26 49 b0 e1 1a Jan 30 17:23:32.066876: | add pubkey f2 48 47 5d 75 ce e4 a4 c4 09 ed 0d 55 81 12 c1 Jan 30 17:23:32.066880: | add pubkey 9d 84 a1 97 7b c9 8c d9 25 50 40 58 df 08 74 5b Jan 30 17:23:32.066884: | add pubkey f9 00 0f 62 ed c1 40 a0 c6 ef a3 fd 64 82 0e 4b Jan 30 17:23:32.066887: | add pubkey 1e b3 8e fa 89 e4 3b 60 0c 33 05 ff b7 19 9c 59 Jan 30 17:23:32.066891: | add pubkey c7 59 de e4 6c 02 60 c9 9d 8b 8b 81 30 eb d3 c4 Jan 30 17:23:32.066899: | add pubkey db c5 53 09 c2 f7 a4 72 29 53 c9 f0 66 f1 01 47 Jan 30 17:23:32.066903: | add pubkey 1e 29 42 a5 b2 12 ab 86 75 9e 91 04 3a bb b6 18 Jan 30 17:23:32.066906: | add pubkey 78 42 f5 0a 6b 1f b2 c2 df 3e d2 fe ff 61 e1 67 Jan 30 17:23:32.066910: | add pubkey e3 58 7f fc b1 be 89 56 00 8c e9 31 c7 c2 d7 2c Jan 30 17:23:32.066913: | add pubkey e8 65 72 be e2 64 58 d3 3f ff d9 54 f7 86 55 82 Jan 30 17:23:32.066917: | add pubkey 85 31 f1 bc 10 66 c5 0d 31 5d 4d 85 42 15 aa ec Jan 30 17:23:32.066921: | add pubkey 15 b9 8c 9e e5 62 6d f7 fa 1a 45 63 54 74 b0 f6 Jan 30 17:23:32.066924: | add pubkey 6c 62 f0 34 15 81 0e 98 c8 63 83 38 2e 27 3f f5 Jan 30 17:23:32.066928: | add pubkey e9 19 ff 6f c7 ef e9 c6 e0 64 47 2d f2 2b 23 33 Jan 30 17:23:32.066931: | add pubkey 0e b9 45 7d 69 27 92 05 a8 9f 15 b9 c5 57 d5 2c Jan 30 17:23:32.066935: | add pubkey 09 6f 0a 67 f2 0d 23 8e 2e 3b 52 51 aa fa 5b ff Jan 30 17:23:32.066939: | add pubkey ad a6 b5 db bd 09 5e ab f2 fb 98 a8 af 58 c3 32 Jan 30 17:23:32.066942: | add pubkey ae 2a 65 50 62 ed 64 e7 e0 7c 93 80 53 3a 38 6c Jan 30 17:23:32.066946: | add pubkey 3b 62 2d ad 6e 3d 90 d7 af 19 0a 46 26 53 ec 94 Jan 30 17:23:32.066949: | add pubkey 28 02 f6 95 2b 38 92 20 75 27 8f f5 52 76 b7 d3 Jan 30 17:23:32.066953: | add pubkey ab cb 06 e7 63 e6 f2 d7 d7 d7 71 89 ee 1e 68 f8 Jan 30 17:23:32.066957: | add pubkey 3b f2 28 29 6b 67 1f 6b 34 c8 f7 f5 e0 4e 7a b7 Jan 30 17:23:32.066960: | add pubkey d7 94 24 1b 3f 98 1c 92 64 3e 86 50 7f fd af d9 Jan 30 17:23:32.066964: | add pubkey 12 5e cc 14 2e 0d f9 88 10 27 61 04 d6 12 d6 31 Jan 30 17:23:32.066967: | add pubkey 10 f2 ee e8 df 98 cd fe 79 b0 a1 32 4d 52 24 dd Jan 30 17:23:32.066971: | add pubkey 7b 8a ab 12 53 4d 1d df a9 69 d5 77 b5 64 7e 1b Jan 30 17:23:32.066975: | add pubkey a4 e7 57 42 db d5 9f 52 2c d0 18 7c 9a 54 69 d2 Jan 30 17:23:32.066978: | add pubkey 65 d7 b3 37 f6 8f a3 a0 ff b1 Jan 30 17:23:32.067027: | computed rsa CKAID 48 9d 25 3f c4 67 cf b6 8e 76 f3 57 07 af 38 7a Jan 30 17:23:32.067033: | computed rsa CKAID ce 5e 2c 6d Jan 30 17:23:32.067103: | add keyid @east Jan 30 17:23:32.067112: | add pubkey 01 03 db 79 bd fb 29 59 2d b8 7b e8 16 c4 f4 00 Jan 30 17:23:32.067115: | add pubkey ae 33 47 18 f2 29 67 0a 86 44 30 09 2c af bb e8 Jan 30 17:23:32.067119: | add pubkey 7f 36 70 7d c8 9c b9 1a 6c 2b d9 08 12 ff 89 eb Jan 30 17:23:32.067123: | add pubkey 2f 8a f1 7a 8a de d4 50 81 53 6f f3 87 fa 54 c9 Jan 30 17:23:32.067126: | add pubkey 7c db 1d d5 d4 57 3e ec 21 a7 da 5a 59 b1 56 c8 Jan 30 17:23:32.067130: | add pubkey d1 2b 0e 9d 46 c8 03 28 e7 20 44 5f 7e 6e 35 b5 Jan 30 17:23:32.067133: | add pubkey d2 16 c4 d8 33 94 62 ca 8a 24 dd 81 88 47 be b6 Jan 30 17:23:32.067137: | add pubkey e5 f4 55 49 56 ce 4b bb f4 c3 43 1e 43 df 84 ce Jan 30 17:23:32.067140: | add pubkey e5 f1 35 15 22 30 0f 60 bd b5 18 02 f0 16 dc 57 Jan 30 17:23:32.067144: | add pubkey 04 66 2f 5d 09 08 4d ea d6 f1 ea 71 72 04 9a 2a Jan 30 17:23:32.067148: | add pubkey aa d7 47 a8 24 79 cc 09 2c 29 21 aa 1e c8 2e 8c Jan 30 17:23:32.067151: | add pubkey 91 50 91 c6 e3 14 a4 36 3d d0 f2 f7 40 ae d2 68 Jan 30 17:23:32.067155: | add pubkey 3f 24 ba d0 bd c7 10 d3 92 0c 63 37 35 68 b0 14 Jan 30 17:23:32.067158: | add pubkey f3 21 79 17 0c b5 59 e8 45 43 6e 14 20 8c e2 d6 Jan 30 17:23:32.067162: | add pubkey f0 bd 8b ba 48 8b 41 86 37 6c 5d 43 66 dd 67 3d Jan 30 17:23:32.067166: | add pubkey 4b bf 46 cc c5 67 65 2e df 44 93 44 2e 6f 13 f5 Jan 30 17:23:32.067169: | add pubkey 47 ea 59 d6 42 35 81 58 c0 95 cb 88 75 e4 a0 63 Jan 30 17:23:32.067173: | add pubkey 69 c6 d5 4f 8b fe ef 4d 7e ba 7a 4d 6c be d0 7a Jan 30 17:23:32.067176: | add pubkey e0 29 7f ac 8b 00 b6 e4 9d c7 e8 f9 f6 b5 a5 b5 Jan 30 17:23:32.067180: | add pubkey ba 03 56 e5 b1 03 b5 f4 28 3c 00 db a6 fe 70 5a Jan 30 17:23:32.067183: | add pubkey 1f 31 f2 3d 18 1d 20 08 d3 df 27 36 36 bf 65 be Jan 30 17:23:32.067190: | add pubkey ac 9c 19 9e c2 d1 de 34 93 de e6 11 de 5e d9 61 Jan 30 17:23:32.067193: | add pubkey 2f 8e 81 3e cd cc 95 19 7d 8a 57 a8 42 5f cc 87 Jan 30 17:23:32.067197: | add pubkey 2e e1 89 8a 06 0a 77 d3 f0 5d c8 47 dd 7c b9 72 Jan 30 17:23:32.067201: | add pubkey 3f 72 63 de ab f2 e8 56 81 c0 6a 54 55 cb db c6 Jan 30 17:23:32.067204: | add pubkey 63 b4 55 4f 7c d1 9e 5a 4d 86 47 39 e7 4b 19 ce Jan 30 17:23:32.067208: | add pubkey 2d 5d 06 80 43 9b d1 60 03 6e 9a 02 a7 14 cb d0 Jan 30 17:23:32.067211: | add pubkey 3d fe 10 ca 38 4d f2 b8 45 bb 28 07 6d 9d e2 28 Jan 30 17:23:32.067215: | add pubkey d4 0e 12 02 9a 19 17 27 f8 15 96 c6 d1 ab 51 fb Jan 30 17:23:32.067219: | add pubkey db fb b8 a5 9a ac 25 57 97 a6 e8 f5 50 b0 37 eb Jan 30 17:23:32.067222: | add pubkey 9b 47 5f 83 ba 47 Jan 30 17:23:32.067235: | computed rsa CKAID 7d 3f 76 c2 b8 97 54 9a 4c 58 da e6 f5 a3 1a 98 Jan 30 17:23:32.067240: | computed rsa CKAID a3 f1 75 3b Jan 30 17:23:40.349043: | timer_event_cb: processing event@0x556c11a1ac88 Jan 30 17:23:40.349084: | handling event EVENT_SHUNT_SCAN Jan 30 17:23:40.349099: | expiring aged bare shunts from shunt table Jan 30 17:23:40.349107: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2be98 Jan 30 17:23:40.349118: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:23:40.349137: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a1ac88 Jan 30 17:23:45.198894: | processing: start connection "lagu_tunnel" (in initiate_a_connection() at initiate.c:187) Jan 30 17:23:45.198918: | empty esp_info, returning defaults Jan 30 17:23:45.198935: | creating state object #1 at 0x556c11a2c518 Jan 30 17:23:45.198941: | parent state #1: new => STATE_UNDEFINED(ignore) Jan 30 17:23:45.198967: | processing: suspend connection "lagu_tunnel" (in initialize_new_state() at ipsec_doi.c:490) Jan 30 17:23:45.198974: | processing: start state #1 connection "lagu_tunnel" :8080 (in initialize_new_state() at ipsec_doi.c:490) Jan 30 17:23:45.198979: | inserting state object #1 Jan 30 17:23:45.198984: | serialno list: inserting object 0x556c11a2c518 (state #1) entry 0x556c11a2ccc0 into list 0x556c1022f0c0 (older 0x556c1022f0c0 newer 0x556c1022f0c0) Jan 30 17:23:45.198989: | serialno list: inserted object 0x556c11a2c518 (state #1) entry 0x556c11a2ccc0 (older 0x556c1022f0c0 newer 0x556c1022f0c0) Jan 30 17:23:45.198993: | serialno list: list entry 0x556c1022f0c0 is HEAD (older 0x556c11a2ccc0 newer 0x556c11a2ccc0) Jan 30 17:23:45.198998: | serialno table: inserting object 0x556c11a2c518 (state #1) entry 0x556c11a2cce0 into list 0x556c10222000 (older 0x556c10222000 newer 0x556c10222000) Jan 30 17:23:45.199004: | serialno table: inserted object 0x556c11a2c518 (state #1) entry 0x556c11a2cce0 (older 0x556c10222000 newer 0x556c10222000) Jan 30 17:23:45.199008: | serialno table: list entry 0x556c10222000 is HEAD (older 0x556c11a2cce0 newer 0x556c11a2cce0) Jan 30 17:23:45.199015: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in initialize_new_state() at ipsec_doi.c:510) Jan 30 17:23:45.199020: | parent state #1: STATE_UNDEFINED(ignore) => STATE_MAIN_I1(half-open-ike) Jan 30 17:23:45.199024: | ignore states: 0 Jan 30 17:23:45.199028: | half-open-ike states: 1 Jan 30 17:23:45.199031: | open-ike states: 0 Jan 30 17:23:45.199035: | established-anonymous-ike states: 0 Jan 30 17:23:45.199039: | established-authenticated-ike states: 0 Jan 30 17:23:45.199042: | anonymous-ipsec states: 0 Jan 30 17:23:45.199046: | authenticated-ipsec states: 0 Jan 30 17:23:45.199049: | informational states: 0 Jan 30 17:23:45.199053: | unknown states: 0 Jan 30 17:23:45.199057: | category states: 1 count states: 1 Jan 30 17:23:45.199067: | Queuing pending IPsec SA negotiating with "lagu_tunnel" IKE SA #1 "lagu_tunnel" Jan 30 17:23:45.199075: "lagu_tunnel" #1: initiating Main Mode Jan 30 17:23:45.199115: | **emit ISAKMP Message: Jan 30 17:23:45.199122: | initiator cookie: Jan 30 17:23:45.199126: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:45.199132: | responder cookie: Jan 30 17:23:45.199136: | 00 00 00 00 00 00 00 00 Jan 30 17:23:45.199140: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 30 17:23:45.199144: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:45.199148: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:45.199155: | flags: none (0x0) Jan 30 17:23:45.199159: | message ID: 00 00 00 00 Jan 30 17:23:45.199163: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:45.199169: | no specific IKE algorithms specified - using defaults Jan 30 17:23:45.199187: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Jan 30 17:23:45.199195: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Jan 30 17:23:45.199202: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 Jan 30 17:23:45.199208: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Jan 30 17:23:45.199215: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Jan 30 17:23:45.199221: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 Jan 30 17:23:45.199227: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Jan 30 17:23:45.199234: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Jan 30 17:23:45.199241: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 Jan 30 17:23:45.199250: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Jan 30 17:23:45.199256: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Jan 30 17:23:45.199263: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 Jan 30 17:23:45.199269: | oakley_alg_makedb() returning 0x556c11a2e968 Jan 30 17:23:45.199273: | ***emit ISAKMP Security Association Payload: Jan 30 17:23:45.199278: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:45.199281: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:45.199286: | ****emit IPsec DOI SIT: Jan 30 17:23:45.199290: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Jan 30 17:23:45.199295: | ikev1_out_sa pcn: 0 has 1 valid proposals Jan 30 17:23:45.199299: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 Jan 30 17:23:45.199303: | ****emit ISAKMP Proposal Payload: Jan 30 17:23:45.199307: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:45.199311: | proposal number: 0 (0x0) Jan 30 17:23:45.199314: | protocol ID: PROTO_ISAKMP (0x1) Jan 30 17:23:45.199318: | SPI size: 0 (0x0) Jan 30 17:23:45.199322: | number of transforms: 18 (0x12) Jan 30 17:23:45.199325: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.199329: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.199333: | ISAKMP transform number: 0 (0x0) Jan 30 17:23:45.199337: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.199342: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199346: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.199350: | length/value: 1 (0x1) Jan 30 17:23:45.199354: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.199358: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199361: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.199365: | length/value: 3600 (0xe10) Jan 30 17:23:45.199369: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199373: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.199377: | length/value: 7 (0x7) Jan 30 17:23:45.199380: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.199384: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199388: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.199391: | length/value: 4 (0x4) Jan 30 17:23:45.199395: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:45.199399: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199403: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.199411: | length/value: 3 (0x3) Jan 30 17:23:45.199418: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.199424: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199430: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.199435: | length/value: 14 (0xe) Jan 30 17:23:45.199441: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.199453: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199462: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.199466: | length/value: 256 (0x100) Jan 30 17:23:45.199470: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.199474: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.199478: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.199482: | ISAKMP transform number: 1 (0x1) Jan 30 17:23:45.199485: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.199489: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199493: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.199497: | length/value: 1 (0x1) Jan 30 17:23:45.199500: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.199504: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199508: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.199511: | length/value: 3600 (0xe10) Jan 30 17:23:45.199515: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199519: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.199522: | length/value: 7 (0x7) Jan 30 17:23:45.199526: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.199529: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199533: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.199537: | length/value: 4 (0x4) Jan 30 17:23:45.199540: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:45.199544: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199548: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.199551: | length/value: 3 (0x3) Jan 30 17:23:45.199555: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.199569: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199574: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.199578: | length/value: 14 (0xe) Jan 30 17:23:45.199581: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.199585: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199589: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.199592: | length/value: 128 (0x80) Jan 30 17:23:45.199596: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.199600: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.199603: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.199607: | ISAKMP transform number: 2 (0x2) Jan 30 17:23:45.199611: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.199614: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199618: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.199622: | length/value: 1 (0x1) Jan 30 17:23:45.199625: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.199629: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199633: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.199636: | length/value: 3600 (0xe10) Jan 30 17:23:45.199640: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199644: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.199647: | length/value: 7 (0x7) Jan 30 17:23:45.199651: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.199654: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199658: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.199662: | length/value: 6 (0x6) Jan 30 17:23:45.199665: | [6 is OAKLEY_SHA2_512] Jan 30 17:23:45.199669: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199672: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.199676: | length/value: 3 (0x3) Jan 30 17:23:45.199680: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.199683: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199687: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.199693: | length/value: 14 (0xe) Jan 30 17:23:45.199697: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.199701: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199704: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.199708: | length/value: 256 (0x100) Jan 30 17:23:45.199712: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.199715: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.199719: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.199723: | ISAKMP transform number: 3 (0x3) Jan 30 17:23:45.199726: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.199730: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199734: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.199737: | length/value: 1 (0x1) Jan 30 17:23:45.199741: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.199744: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199748: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.199752: | length/value: 3600 (0xe10) Jan 30 17:23:45.199755: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199759: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.199762: | length/value: 7 (0x7) Jan 30 17:23:45.199766: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.199770: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199773: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.199777: | length/value: 6 (0x6) Jan 30 17:23:45.199780: | [6 is OAKLEY_SHA2_512] Jan 30 17:23:45.199784: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199788: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.199791: | length/value: 3 (0x3) Jan 30 17:23:45.199795: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.199798: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199802: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.199806: | length/value: 14 (0xe) Jan 30 17:23:45.199809: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.199813: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199816: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.199820: | length/value: 128 (0x80) Jan 30 17:23:45.199824: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.199828: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.199831: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.199835: | ISAKMP transform number: 4 (0x4) Jan 30 17:23:45.199838: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.199842: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199846: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.199849: | length/value: 1 (0x1) Jan 30 17:23:45.199853: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.199856: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199860: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.199864: | length/value: 3600 (0xe10) Jan 30 17:23:45.199867: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199871: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.199875: | length/value: 7 (0x7) Jan 30 17:23:45.199878: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.199882: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199885: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.199889: | length/value: 2 (0x2) Jan 30 17:23:45.199892: | [2 is OAKLEY_SHA1] Jan 30 17:23:45.199896: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199900: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.199903: | length/value: 3 (0x3) Jan 30 17:23:45.199907: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.199910: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199914: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.199918: | length/value: 14 (0xe) Jan 30 17:23:45.199921: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.199925: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199928: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.199932: | length/value: 256 (0x100) Jan 30 17:23:45.199937: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.199941: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.199945: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.199948: | ISAKMP transform number: 5 (0x5) Jan 30 17:23:45.199952: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.199955: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199959: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.199963: | length/value: 1 (0x1) Jan 30 17:23:45.199966: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.199970: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199973: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.199977: | length/value: 3600 (0xe10) Jan 30 17:23:45.199981: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199984: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.199988: | length/value: 7 (0x7) Jan 30 17:23:45.199991: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.199995: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.199999: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200002: | length/value: 2 (0x2) Jan 30 17:23:45.200006: | [2 is OAKLEY_SHA1] Jan 30 17:23:45.200009: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200013: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200017: | length/value: 3 (0x3) Jan 30 17:23:45.200020: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200024: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200027: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200031: | length/value: 14 (0xe) Jan 30 17:23:45.200035: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.200038: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200042: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.200045: | length/value: 128 (0x80) Jan 30 17:23:45.200049: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.200053: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200056: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200060: | ISAKMP transform number: 6 (0x6) Jan 30 17:23:45.200064: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200067: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200071: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200074: | length/value: 1 (0x1) Jan 30 17:23:45.200078: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200082: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200085: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200089: | length/value: 3600 (0xe10) Jan 30 17:23:45.200092: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200096: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200100: | length/value: 5 (0x5) Jan 30 17:23:45.200103: | [5 is OAKLEY_3DES_CBC] Jan 30 17:23:45.200107: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200111: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200115: | length/value: 4 (0x4) Jan 30 17:23:45.200118: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:45.200122: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200125: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200129: | length/value: 3 (0x3) Jan 30 17:23:45.200133: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200136: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200140: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200143: | length/value: 14 (0xe) Jan 30 17:23:45.200147: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.200151: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Jan 30 17:23:45.200154: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200158: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200161: | ISAKMP transform number: 7 (0x7) Jan 30 17:23:45.200165: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200169: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200172: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200178: | length/value: 1 (0x1) Jan 30 17:23:45.200182: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200186: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200190: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200193: | length/value: 3600 (0xe10) Jan 30 17:23:45.200197: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200201: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200204: | length/value: 5 (0x5) Jan 30 17:23:45.200208: | [5 is OAKLEY_3DES_CBC] Jan 30 17:23:45.200211: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200215: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200219: | length/value: 6 (0x6) Jan 30 17:23:45.200222: | [6 is OAKLEY_SHA2_512] Jan 30 17:23:45.200226: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200230: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200233: | length/value: 3 (0x3) Jan 30 17:23:45.200237: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200241: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200244: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200248: | length/value: 14 (0xe) Jan 30 17:23:45.200252: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.200255: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Jan 30 17:23:45.200259: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200263: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200266: | ISAKMP transform number: 8 (0x8) Jan 30 17:23:45.200270: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200274: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200278: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200281: | length/value: 1 (0x1) Jan 30 17:23:45.200285: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200289: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200294: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200298: | length/value: 3600 (0xe10) Jan 30 17:23:45.200302: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200305: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200309: | length/value: 5 (0x5) Jan 30 17:23:45.200313: | [5 is OAKLEY_3DES_CBC] Jan 30 17:23:45.200316: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200320: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200323: | length/value: 2 (0x2) Jan 30 17:23:45.200327: | [2 is OAKLEY_SHA1] Jan 30 17:23:45.200331: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200334: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200338: | length/value: 3 (0x3) Jan 30 17:23:45.200341: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200345: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200349: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200352: | length/value: 14 (0xe) Jan 30 17:23:45.200356: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:45.200359: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Jan 30 17:23:45.200363: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200367: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200370: | ISAKMP transform number: 9 (0x9) Jan 30 17:23:45.200374: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200378: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200381: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200385: | length/value: 1 (0x1) Jan 30 17:23:45.200388: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200392: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200396: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200399: | length/value: 3600 (0xe10) Jan 30 17:23:45.200403: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200407: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200413: | length/value: 7 (0x7) Jan 30 17:23:45.200418: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.200425: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200431: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200434: | length/value: 4 (0x4) Jan 30 17:23:45.200438: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:45.200442: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200445: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200449: | length/value: 3 (0x3) Jan 30 17:23:45.200452: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200456: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200460: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200463: | length/value: 5 (0x5) Jan 30 17:23:45.200467: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.200470: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200474: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.200478: | length/value: 256 (0x100) Jan 30 17:23:45.200481: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.200485: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200489: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200492: | ISAKMP transform number: 10 (0xa) Jan 30 17:23:45.200496: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200500: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200503: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200507: | length/value: 1 (0x1) Jan 30 17:23:45.200511: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200514: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200518: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200521: | length/value: 3600 (0xe10) Jan 30 17:23:45.200525: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200529: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200532: | length/value: 7 (0x7) Jan 30 17:23:45.200536: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.200539: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200543: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200547: | length/value: 4 (0x4) Jan 30 17:23:45.200550: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:45.200554: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200557: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200569: | length/value: 3 (0x3) Jan 30 17:23:45.200572: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200576: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200580: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200583: | length/value: 5 (0x5) Jan 30 17:23:45.200587: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.200591: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200594: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.200598: | length/value: 128 (0x80) Jan 30 17:23:45.200602: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.200605: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200609: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200612: | ISAKMP transform number: 11 (0xb) Jan 30 17:23:45.200616: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200626: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200631: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200634: | length/value: 1 (0x1) Jan 30 17:23:45.200638: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200641: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200645: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200649: | length/value: 3600 (0xe10) Jan 30 17:23:45.200652: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200658: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200662: | length/value: 7 (0x7) Jan 30 17:23:45.200666: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.200670: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200673: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200677: | length/value: 6 (0x6) Jan 30 17:23:45.200680: | [6 is OAKLEY_SHA2_512] Jan 30 17:23:45.200684: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200688: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200693: | length/value: 3 (0x3) Jan 30 17:23:45.200697: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200701: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200704: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200708: | length/value: 5 (0x5) Jan 30 17:23:45.200712: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.200715: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200719: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.200722: | length/value: 256 (0x100) Jan 30 17:23:45.200726: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.200730: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200733: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200737: | ISAKMP transform number: 12 (0xc) Jan 30 17:23:45.200741: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200744: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200748: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200752: | length/value: 1 (0x1) Jan 30 17:23:45.200755: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200759: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200762: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200766: | length/value: 3600 (0xe10) Jan 30 17:23:45.200770: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200773: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200777: | length/value: 7 (0x7) Jan 30 17:23:45.200780: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.200784: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200788: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200791: | length/value: 6 (0x6) Jan 30 17:23:45.200795: | [6 is OAKLEY_SHA2_512] Jan 30 17:23:45.200798: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200802: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200806: | length/value: 3 (0x3) Jan 30 17:23:45.200809: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200813: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200816: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200820: | length/value: 5 (0x5) Jan 30 17:23:45.200824: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.200827: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200831: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.200834: | length/value: 128 (0x80) Jan 30 17:23:45.200838: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.200842: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200845: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200849: | ISAKMP transform number: 13 (0xd) Jan 30 17:23:45.200853: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200856: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200860: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200864: | length/value: 1 (0x1) Jan 30 17:23:45.200867: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200871: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200874: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200878: | length/value: 3600 (0xe10) Jan 30 17:23:45.200882: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200885: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.200889: | length/value: 7 (0x7) Jan 30 17:23:45.200893: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.200896: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200900: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.200903: | length/value: 2 (0x2) Jan 30 17:23:45.200907: | [2 is OAKLEY_SHA1] Jan 30 17:23:45.200910: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200914: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.200918: | length/value: 3 (0x3) Jan 30 17:23:45.200921: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.200925: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200928: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.200933: | length/value: 5 (0x5) Jan 30 17:23:45.200937: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.200941: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200944: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.200948: | length/value: 256 (0x100) Jan 30 17:23:45.200952: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.200955: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.200959: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.200962: | ISAKMP transform number: 14 (0xe) Jan 30 17:23:45.200966: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.200970: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200973: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.200977: | length/value: 1 (0x1) Jan 30 17:23:45.200980: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.200984: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200988: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.200991: | length/value: 3600 (0xe10) Jan 30 17:23:45.200995: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.200999: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.201002: | length/value: 7 (0x7) Jan 30 17:23:45.201006: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:45.201009: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201013: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.201017: | length/value: 2 (0x2) Jan 30 17:23:45.201020: | [2 is OAKLEY_SHA1] Jan 30 17:23:45.201024: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201027: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.201031: | length/value: 3 (0x3) Jan 30 17:23:45.201034: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.201038: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201042: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.201045: | length/value: 5 (0x5) Jan 30 17:23:45.201049: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.201052: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201056: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:45.201060: | length/value: 128 (0x80) Jan 30 17:23:45.201063: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Jan 30 17:23:45.201067: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.201071: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.201074: | ISAKMP transform number: 15 (0xf) Jan 30 17:23:45.201078: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.201082: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201085: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.201089: | length/value: 1 (0x1) Jan 30 17:23:45.201092: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.201096: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201100: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.201103: | length/value: 3600 (0xe10) Jan 30 17:23:45.201107: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201110: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.201114: | length/value: 5 (0x5) Jan 30 17:23:45.201118: | [5 is OAKLEY_3DES_CBC] Jan 30 17:23:45.201121: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201125: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.201129: | length/value: 4 (0x4) Jan 30 17:23:45.201132: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:45.201136: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201139: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.201143: | length/value: 3 (0x3) Jan 30 17:23:45.201147: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.201150: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201154: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.201157: | length/value: 5 (0x5) Jan 30 17:23:45.201161: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.201165: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Jan 30 17:23:45.201168: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.201172: | next payload type: ISAKMP_NEXT_T (0x3) Jan 30 17:23:45.201177: | ISAKMP transform number: 16 (0x10) Jan 30 17:23:45.201181: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.201185: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201188: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.201192: | length/value: 1 (0x1) Jan 30 17:23:45.201195: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.201199: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201203: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.201206: | length/value: 3600 (0xe10) Jan 30 17:23:45.201210: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201213: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.201217: | length/value: 5 (0x5) Jan 30 17:23:45.201221: | [5 is OAKLEY_3DES_CBC] Jan 30 17:23:45.201224: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201228: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.201231: | length/value: 6 (0x6) Jan 30 17:23:45.201235: | [6 is OAKLEY_SHA2_512] Jan 30 17:23:45.201239: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201242: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.201246: | length/value: 3 (0x3) Jan 30 17:23:45.201249: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.201253: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201257: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.201260: | length/value: 5 (0x5) Jan 30 17:23:45.201264: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.201267: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Jan 30 17:23:45.201271: | *****emit ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:45.201275: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:45.201278: | ISAKMP transform number: 17 (0x11) Jan 30 17:23:45.201282: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:45.201286: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201289: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:45.201293: | length/value: 1 (0x1) Jan 30 17:23:45.201296: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:45.201300: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201304: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:45.201307: | length/value: 3600 (0xe10) Jan 30 17:23:45.201311: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201314: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:45.201318: | length/value: 5 (0x5) Jan 30 17:23:45.201322: | [5 is OAKLEY_3DES_CBC] Jan 30 17:23:45.201325: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201329: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:45.201332: | length/value: 2 (0x2) Jan 30 17:23:45.201336: | [2 is OAKLEY_SHA1] Jan 30 17:23:45.201339: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201343: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:45.201347: | length/value: 3 (0x3) Jan 30 17:23:45.201350: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:45.201354: | ******emit ISAKMP Oakley attribute: Jan 30 17:23:45.201357: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:45.201361: | length/value: 5 (0x5) Jan 30 17:23:45.201365: | [5 is OAKLEY_GROUP_MODP1536] Jan 30 17:23:45.201368: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Jan 30 17:23:45.201372: | emitting length of ISAKMP Proposal Payload: 632 Jan 30 17:23:45.201376: | emitting length of ISAKMP Security Association Payload: 644 Jan 30 17:23:45.201383: | out_vid(): sending [Dead Peer Detection] Jan 30 17:23:45.201387: | ***emit ISAKMP Vendor ID Payload: Jan 30 17:23:45.201391: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:45.201395: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Jan 30 17:23:45.201399: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Jan 30 17:23:45.201404: | emitting length of ISAKMP Vendor ID Payload: 20 Jan 30 17:23:45.201410: | out_vid(): sending [FRAGMENTATION] Jan 30 17:23:45.201416: | ***emit ISAKMP Vendor ID Payload: Jan 30 17:23:45.201426: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:45.201430: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Jan 30 17:23:45.201439: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Jan 30 17:23:45.201443: | emitting length of ISAKMP Vendor ID Payload: 20 Jan 30 17:23:45.201447: | nat add vid Jan 30 17:23:45.201451: | sending draft and RFC NATT VIDs Jan 30 17:23:45.201454: | out_vid(): sending [RFC 3947] Jan 30 17:23:45.201458: | ***emit ISAKMP Vendor ID Payload: Jan 30 17:23:45.201461: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:45.201465: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Jan 30 17:23:45.201469: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Jan 30 17:23:45.201473: | emitting length of ISAKMP Vendor ID Payload: 20 Jan 30 17:23:45.201476: | skipping VID_NATT_RFC Jan 30 17:23:45.201480: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] Jan 30 17:23:45.201483: | ***emit ISAKMP Vendor ID Payload: Jan 30 17:23:45.201487: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:45.201491: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Jan 30 17:23:45.201495: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Jan 30 17:23:45.201498: | emitting length of ISAKMP Vendor ID Payload: 20 Jan 30 17:23:45.201502: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] Jan 30 17:23:45.201506: | ***emit ISAKMP Vendor ID Payload: Jan 30 17:23:45.201509: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:45.201513: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Jan 30 17:23:45.201517: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Jan 30 17:23:45.201520: | emitting length of ISAKMP Vendor ID Payload: 20 Jan 30 17:23:45.201524: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] Jan 30 17:23:45.201527: | ***emit ISAKMP Vendor ID Payload: Jan 30 17:23:45.201531: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:45.201535: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Jan 30 17:23:45.201538: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 Jan 30 17:23:45.201542: | emitting length of ISAKMP Vendor ID Payload: 20 Jan 30 17:23:45.201546: | no IKEv1 message padding required Jan 30 17:23:45.201549: | emitting length of ISAKMP Message: 792 Jan 30 17:23:45.201567: | sending 792 bytes for reply packet for main_outI1 through eth1:500 to :500 (using #1) Jan 30 17:23:45.201573: | 7c b4 85 05 b9 af 11 33 00 00 00 00 00 00 00 00 Jan 30 17:23:45.201577: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Jan 30 17:23:45.201581: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Jan 30 17:23:45.201584: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.201588: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Jan 30 17:23:45.201591: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Jan 30 17:23:45.201595: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Jan 30 17:23:45.201598: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Jan 30 17:23:45.201602: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Jan 30 17:23:45.201606: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Jan 30 17:23:45.201609: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:45.201613: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Jan 30 17:23:45.201616: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.201620: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Jan 30 17:23:45.201623: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Jan 30 17:23:45.201627: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Jan 30 17:23:45.201630: | 80 04 00 0e 80 0e 00 80 03 00 00 20 06 01 00 00 Jan 30 17:23:45.201634: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 04 Jan 30 17:23:45.201637: | 80 03 00 03 80 04 00 0e 03 00 00 20 07 01 00 00 Jan 30 17:23:45.201641: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 06 Jan 30 17:23:45.201645: | 80 03 00 03 80 04 00 0e 03 00 00 20 08 01 00 00 Jan 30 17:23:45.201650: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 02 Jan 30 17:23:45.201654: | 80 03 00 03 80 04 00 0e 03 00 00 24 09 01 00 00 Jan 30 17:23:45.201657: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Jan 30 17:23:45.201661: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:45.201664: | 0a 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:45.201668: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:45.201671: | 03 00 00 24 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.201675: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:45.201679: | 80 0e 01 00 03 00 00 24 0c 01 00 00 80 0b 00 01 Jan 30 17:23:45.201682: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Jan 30 17:23:45.201686: | 80 04 00 05 80 0e 00 80 03 00 00 24 0d 01 00 00 Jan 30 17:23:45.201689: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Jan 30 17:23:45.201693: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:45.201696: | 0e 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:45.201700: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:45.201704: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.201707: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Jan 30 17:23:45.201711: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.201714: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:45.201718: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.201722: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Jan 30 17:23:45.201725: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Jan 30 17:23:45.201729: | 77 57 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Jan 30 17:23:45.201732: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 4a 13 1c 81 Jan 30 17:23:45.201736: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Jan 30 17:23:45.201739: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Jan 30 17:23:45.201743: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Jan 30 17:23:45.201746: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Jan 30 17:23:45.201750: | 7c fd b2 fc 68 b6 a4 48 Jan 30 17:23:45.201881: | state #1 requesting to delete non existing event Jan 30 17:23:45.201891: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x556c11a1ac88 Jan 30 17:23:45.201903: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1 Jan 30 17:23:45.201911: | #1 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 1270.322 Jan 30 17:23:45.201926: | processing: stop state #1 connection "lagu_tunnel" :8080 (in main_outI1() at ikev1_main.c:316) Jan 30 17:23:45.201931: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:45.201935: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:45.201940: | processing: resume connection "lagu_tunnel" (in main_outI1() at ikev1_main.c:316) Jan 30 17:23:45.201944: | processing: stop connection "lagu_tunnel" (in initiate_a_connection() at initiate.c:318) Jan 30 17:23:45.702492: | timer_event_cb: processing event@0x556c11a1ac88 Jan 30 17:23:45.702535: | handling event EVENT_v1_RETRANSMIT for parent state #1 Jan 30 17:23:45.702550: | processing: start state #1 connection "lagu_tunnel" :8080 (in timer_event_cb() at timer.c:319) Jan 30 17:23:45.702557: | IKEv1 retransmit event Jan 30 17:23:45.702574: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in retransmit_v1_msg() at retry.c:60) Jan 30 17:23:45.702582: | handling event EVENT_v1_RETRANSMIT for "lagu_tunnel" #1 keying attempt 1 of 0; retransmit 1 Jan 30 17:23:45.702595: | retransmits: current time 1270.823; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5 exceeds limit? NO Jan 30 17:23:45.702604: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x556c11a2d588 Jan 30 17:23:45.702621: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1 Jan 30 17:23:45.702632: "lagu_tunnel" #1: STATE_MAIN_I1: retransmission; will wait 0.5 seconds for response Jan 30 17:23:45.702667: | sending 792 bytes for EVENT_v1_RETRANSMIT through eth1:500 to :500 (using #1) Jan 30 17:23:45.702674: | 7c b4 85 05 b9 af 11 33 00 00 00 00 00 00 00 00 Jan 30 17:23:45.702679: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Jan 30 17:23:45.702684: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Jan 30 17:23:45.702689: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.702694: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Jan 30 17:23:45.702699: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Jan 30 17:23:45.702706: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Jan 30 17:23:45.702711: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Jan 30 17:23:45.702716: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Jan 30 17:23:45.702721: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Jan 30 17:23:45.702726: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:45.702731: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Jan 30 17:23:45.702736: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.702741: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Jan 30 17:23:45.702746: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Jan 30 17:23:45.702751: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Jan 30 17:23:45.702756: | 80 04 00 0e 80 0e 00 80 03 00 00 20 06 01 00 00 Jan 30 17:23:45.702761: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 04 Jan 30 17:23:45.702766: | 80 03 00 03 80 04 00 0e 03 00 00 20 07 01 00 00 Jan 30 17:23:45.702771: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 06 Jan 30 17:23:45.702776: | 80 03 00 03 80 04 00 0e 03 00 00 20 08 01 00 00 Jan 30 17:23:45.702781: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 02 Jan 30 17:23:45.702785: | 80 03 00 03 80 04 00 0e 03 00 00 24 09 01 00 00 Jan 30 17:23:45.702790: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Jan 30 17:23:45.702795: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:45.702800: | 0a 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:45.702820: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:45.702825: | 03 00 00 24 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.702830: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:45.702835: | 80 0e 01 00 03 00 00 24 0c 01 00 00 80 0b 00 01 Jan 30 17:23:45.702840: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Jan 30 17:23:45.702845: | 80 04 00 05 80 0e 00 80 03 00 00 24 0d 01 00 00 Jan 30 17:23:45.702850: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Jan 30 17:23:45.702855: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:45.702860: | 0e 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:45.702865: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:45.702870: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.702875: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Jan 30 17:23:45.702880: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.702885: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:45.702890: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:45.702895: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Jan 30 17:23:45.702900: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Jan 30 17:23:45.702905: | 77 57 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Jan 30 17:23:45.702910: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 4a 13 1c 81 Jan 30 17:23:45.702915: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Jan 30 17:23:45.702920: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Jan 30 17:23:45.702925: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Jan 30 17:23:45.702933: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Jan 30 17:23:45.702938: | 7c fd b2 fc 68 b6 a4 48 Jan 30 17:23:45.702986: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x556c11a1ac88 Jan 30 17:23:45.703003: | processing: stop state #1 connection "lagu_tunnel" :8080 (in timer_event_cb() at timer.c:664) Jan 30 17:23:45.703010: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:45.703015: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:46.203573: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:23:46.203604: | handling event EVENT_v1_RETRANSMIT for parent state #1 Jan 30 17:23:46.203614: | processing: start state #1 connection "lagu_tunnel" :8080 (in timer_event_cb() at timer.c:319) Jan 30 17:23:46.203619: | IKEv1 retransmit event Jan 30 17:23:46.203624: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in retransmit_v1_msg() at retry.c:60) Jan 30 17:23:46.203629: | handling event EVENT_v1_RETRANSMIT for "lagu_tunnel" #1 keying attempt 1 of 0; retransmit 2 Jan 30 17:23:46.203639: | retransmits: current time 1271.324; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001 exceeds limit? NO Jan 30 17:23:46.203645: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x556c11a1ac88 Jan 30 17:23:46.203651: | inserting event EVENT_v1_RETRANSMIT, timeout in 1.000 seconds for #1 Jan 30 17:23:46.203658: "lagu_tunnel" #1: STATE_MAIN_I1: retransmission; will wait 1 seconds for response Jan 30 17:23:46.203680: | sending 792 bytes for EVENT_v1_RETRANSMIT through eth1:500 to :500 (using #1) Jan 30 17:23:46.203686: | 7c b4 85 05 b9 af 11 33 00 00 00 00 00 00 00 00 Jan 30 17:23:46.203689: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Jan 30 17:23:46.203693: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Jan 30 17:23:46.203697: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:46.203700: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Jan 30 17:23:46.203704: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Jan 30 17:23:46.203708: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Jan 30 17:23:46.203711: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Jan 30 17:23:46.203715: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Jan 30 17:23:46.203718: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Jan 30 17:23:46.203722: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:46.203726: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Jan 30 17:23:46.203729: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:46.203733: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Jan 30 17:23:46.203736: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Jan 30 17:23:46.203740: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Jan 30 17:23:46.203743: | 80 04 00 0e 80 0e 00 80 03 00 00 20 06 01 00 00 Jan 30 17:23:46.203747: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 04 Jan 30 17:23:46.203751: | 80 03 00 03 80 04 00 0e 03 00 00 20 07 01 00 00 Jan 30 17:23:46.203754: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 06 Jan 30 17:23:46.203758: | 80 03 00 03 80 04 00 0e 03 00 00 20 08 01 00 00 Jan 30 17:23:46.203761: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 02 Jan 30 17:23:46.203765: | 80 03 00 03 80 04 00 0e 03 00 00 24 09 01 00 00 Jan 30 17:23:46.203768: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Jan 30 17:23:46.203772: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:46.203776: | 0a 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:46.203779: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:46.203783: | 03 00 00 24 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:46.203786: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:46.203790: | 80 0e 01 00 03 00 00 24 0c 01 00 00 80 0b 00 01 Jan 30 17:23:46.203793: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Jan 30 17:23:46.203813: | 80 04 00 05 80 0e 00 80 03 00 00 24 0d 01 00 00 Jan 30 17:23:46.203818: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Jan 30 17:23:46.203824: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:46.203830: | 0e 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:46.203834: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:46.203838: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:46.203842: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Jan 30 17:23:46.203845: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:46.203849: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:46.203852: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:46.203856: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Jan 30 17:23:46.203859: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Jan 30 17:23:46.203863: | 77 57 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Jan 30 17:23:46.203867: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 4a 13 1c 81 Jan 30 17:23:46.203870: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Jan 30 17:23:46.203874: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Jan 30 17:23:46.203877: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Jan 30 17:23:46.203881: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Jan 30 17:23:46.203884: | 7c fd b2 fc 68 b6 a4 48 Jan 30 17:23:46.203920: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x556c11a2d588 Jan 30 17:23:46.203928: | processing: stop state #1 connection "lagu_tunnel" :8080 (in timer_event_cb() at timer.c:664) Jan 30 17:23:46.203933: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:46.203944: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.204987: | timer_event_cb: processing event@0x556c11a1ac88 Jan 30 17:23:47.205016: | handling event EVENT_v1_RETRANSMIT for parent state #1 Jan 30 17:23:47.205027: | processing: start state #1 connection "lagu_tunnel" :8080 (in timer_event_cb() at timer.c:319) Jan 30 17:23:47.205032: | IKEv1 retransmit event Jan 30 17:23:47.205037: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in retransmit_v1_msg() at retry.c:60) Jan 30 17:23:47.205042: | handling event EVENT_v1_RETRANSMIT for "lagu_tunnel" #1 keying attempt 1 of 0; retransmit 3 Jan 30 17:23:47.205052: | retransmits: current time 1272.325; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003 exceeds limit? NO Jan 30 17:23:47.205057: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x556c11a2d588 Jan 30 17:23:47.205063: | inserting event EVENT_v1_RETRANSMIT, timeout in 2.000 seconds for #1 Jan 30 17:23:47.205071: "lagu_tunnel" #1: STATE_MAIN_I1: retransmission; will wait 2 seconds for response Jan 30 17:23:47.205088: | sending 792 bytes for EVENT_v1_RETRANSMIT through eth1:500 to :500 (using #1) Jan 30 17:23:47.205093: | 7c b4 85 05 b9 af 11 33 00 00 00 00 00 00 00 00 Jan 30 17:23:47.205097: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Jan 30 17:23:47.205100: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Jan 30 17:23:47.205104: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.205108: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Jan 30 17:23:47.205111: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Jan 30 17:23:47.205115: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Jan 30 17:23:47.205119: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Jan 30 17:23:47.205122: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Jan 30 17:23:47.205126: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Jan 30 17:23:47.205129: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:47.205133: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Jan 30 17:23:47.205137: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.205151: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Jan 30 17:23:47.205155: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Jan 30 17:23:47.205158: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Jan 30 17:23:47.205162: | 80 04 00 0e 80 0e 00 80 03 00 00 20 06 01 00 00 Jan 30 17:23:47.205166: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 04 Jan 30 17:23:47.205169: | 80 03 00 03 80 04 00 0e 03 00 00 20 07 01 00 00 Jan 30 17:23:47.205173: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 06 Jan 30 17:23:47.205176: | 80 03 00 03 80 04 00 0e 03 00 00 20 08 01 00 00 Jan 30 17:23:47.205180: | 80 0b 00 01 80 0c 0e 10 80 01 00 05 80 02 00 02 Jan 30 17:23:47.205184: | 80 03 00 03 80 04 00 0e 03 00 00 24 09 01 00 00 Jan 30 17:23:47.205187: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Jan 30 17:23:47.205191: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:47.205194: | 0a 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:47.205198: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:47.205202: | 03 00 00 24 0b 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.205205: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:47.205209: | 80 0e 01 00 03 00 00 24 0c 01 00 00 80 0b 00 01 Jan 30 17:23:47.205212: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Jan 30 17:23:47.205216: | 80 04 00 05 80 0e 00 80 03 00 00 24 0d 01 00 00 Jan 30 17:23:47.205219: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Jan 30 17:23:47.205223: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Jan 30 17:23:47.205227: | 0e 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Jan 30 17:23:47.205230: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Jan 30 17:23:47.205234: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.205237: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Jan 30 17:23:47.205241: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.205245: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Jan 30 17:23:47.205249: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.205253: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Jan 30 17:23:47.205256: | 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc Jan 30 17:23:47.205260: | 77 57 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Jan 30 17:23:47.205263: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 4a 13 1c 81 Jan 30 17:23:47.205267: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Jan 30 17:23:47.205270: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Jan 30 17:23:47.205274: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Jan 30 17:23:47.205278: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Jan 30 17:23:47.205281: | 7c fd b2 fc 68 b6 a4 48 Jan 30 17:23:47.205322: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x556c11a1ac88 Jan 30 17:23:47.205330: | processing: stop state #1 connection "lagu_tunnel" :8080 (in timer_event_cb() at timer.c:664) Jan 30 17:23:47.205335: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.205339: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.208940: | *received 144 bytes from :500 on eth1 (port=500) Jan 30 17:23:47.208957: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.208964: | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 Jan 30 17:23:47.208970: | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 Jan 30 17:23:47.208976: | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Jan 30 17:23:47.208981: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Jan 30 17:23:47.208986: | 80 0e 01 00 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Jan 30 17:23:47.208991: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 40 48 b7 d5 Jan 30 17:23:47.208996: | 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 00 00 00 14 Jan 30 17:23:47.209001: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Jan 30 17:23:47.209013: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:47.209021: | **parse ISAKMP Message: Jan 30 17:23:47.209026: | initiator cookie: Jan 30 17:23:47.209031: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.209036: | responder cookie: Jan 30 17:23:47.209041: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.209047: | next payload type: ISAKMP_NEXT_SA (0x1) Jan 30 17:23:47.209052: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.209058: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:47.209064: | flags: none (0x0) Jan 30 17:23:47.209069: | message ID: 00 00 00 00 Jan 30 17:23:47.209079: | length: 144 (0x90) Jan 30 17:23:47.209085: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:47.209101: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:47.209106: | v1 state object not found Jan 30 17:23:47.209114: | icookie table: hash icookie 7c b4 85 05 b9 af 11 33 to 7827976554759889620 slot 0x556c10221fc0 Jan 30 17:23:47.209120: | v1 peer and icookie match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:47.209125: | v1 state object #1 found, in STATE_MAIN_I1 Jan 30 17:23:47.209133: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:47.209147: | #1 is idle Jan 30 17:23:47.209153: | #1 idle Jan 30 17:23:47.209161: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2opt: 0x2080 Jan 30 17:23:47.209167: | ***parse ISAKMP Security Association Payload: Jan 30 17:23:47.209172: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:47.209177: | length: 56 (0x38) Jan 30 17:23:47.209182: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:47.209188: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Jan 30 17:23:47.209193: | ***parse ISAKMP Vendor ID Payload: Jan 30 17:23:47.209198: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:47.209203: | length: 20 (0x14) Jan 30 17:23:47.209209: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Jan 30 17:23:47.209214: | ***parse ISAKMP Vendor ID Payload: Jan 30 17:23:47.209219: | next payload type: ISAKMP_NEXT_VID (0xd) Jan 30 17:23:47.209224: | length: 20 (0x14) Jan 30 17:23:47.209229: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0opt: 0x2080 Jan 30 17:23:47.209234: | ***parse ISAKMP Vendor ID Payload: Jan 30 17:23:47.209239: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.209244: | length: 20 (0x14) Jan 30 17:23:47.209252: | received Vendor ID payload [Dead Peer Detection] Jan 30 17:23:47.209258: | received Vendor ID payload [FRAGMENTATION] Jan 30 17:23:47.209264: | quirks.qnat_traversal_vid set to=90 Jan 30 17:23:47.209269: | received Vendor ID payload [RFC 3947] Jan 30 17:23:47.209278: | ****parse IPsec DOI SIT: Jan 30 17:23:47.209284: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Jan 30 17:23:47.209289: | ****parse ISAKMP Proposal Payload: Jan 30 17:23:47.209294: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.209299: | length: 44 (0x2c) Jan 30 17:23:47.209304: | proposal number: 0 (0x0) Jan 30 17:23:47.209309: | protocol ID: PROTO_ISAKMP (0x1) Jan 30 17:23:47.209314: | SPI size: 0 (0x0) Jan 30 17:23:47.209319: | number of transforms: 1 (0x1) Jan 30 17:23:47.209325: | *****parse ISAKMP Transform Payload (ISAKMP): Jan 30 17:23:47.209330: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.209335: | length: 36 (0x24) Jan 30 17:23:47.209340: | ISAKMP transform number: 0 (0x0) Jan 30 17:23:47.209345: | ISAKMP transform ID: KEY_IKE (0x1) Jan 30 17:23:47.209350: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209355: | af+type: OAKLEY_LIFE_TYPE (0x800b) Jan 30 17:23:47.209360: | length/value: 1 (0x1) Jan 30 17:23:47.209366: | [1 is OAKLEY_LIFE_SECONDS] Jan 30 17:23:47.209371: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209376: | af+type: OAKLEY_LIFE_DURATION (0x800c) Jan 30 17:23:47.209385: | length/value: 3600 (0xe10) Jan 30 17:23:47.209390: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209396: | af+type: OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Jan 30 17:23:47.209400: | length/value: 7 (0x7) Jan 30 17:23:47.209406: | [7 is OAKLEY_AES_CBC] Jan 30 17:23:47.209412: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209417: | af+type: OAKLEY_HASH_ALGORITHM (0x8002) Jan 30 17:23:47.209422: | length/value: 4 (0x4) Jan 30 17:23:47.209427: | [4 is OAKLEY_SHA2_256] Jan 30 17:23:47.209433: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209438: | af+type: OAKLEY_AUTHENTICATION_METHOD (0x8003) Jan 30 17:23:47.209443: | length/value: 3 (0x3) Jan 30 17:23:47.209448: | [3 is OAKLEY_RSA_SIG] Jan 30 17:23:47.209454: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209460: | af+type: OAKLEY_GROUP_DESCRIPTION (0x8004) Jan 30 17:23:47.209465: | length/value: 14 (0xe) Jan 30 17:23:47.209470: | [14 is OAKLEY_GROUP_MODP2048] Jan 30 17:23:47.209475: | ******parse ISAKMP Oakley attribute: Jan 30 17:23:47.209480: | af+type: OAKLEY_KEY_LENGTH (0x800e) Jan 30 17:23:47.209485: | length/value: 256 (0x100) Jan 30 17:23:47.209492: | OAKLEY proposal verified unconditionally; no alg_info to check against Jan 30 17:23:47.209498: | Oakley Transform 0 accepted Jan 30 17:23:47.209504: | sender checking NAT-T: enabled and 90 Jan 30 17:23:47.209509: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Jan 30 17:23:47.209514: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Jan 30 17:23:47.209522: | adding outI2 KE work-order 1 for state #1 Jan 30 17:23:47.209528: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted Jan 30 17:23:47.209534: | #1 STATE_MAIN_I1: retransmits: cleared Jan 30 17:23:47.209540: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x556c11a2d588 Jan 30 17:23:47.209547: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:47.209555: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:47.209575: | backlog: inserting object 0x556c11a2e7b8 (work-order 1 state #1) entry 0x556c11a2e7c0 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.209583: | backlog: inserted object 0x556c11a2e7b8 (work-order 1 state #1) entry 0x556c11a2e7c0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.209589: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2e7c0 newer 0x556c11a2e7c0) Jan 30 17:23:47.209601: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:47.209609: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:47.209616: | suspending state #1 and saving MD Jan 30 17:23:47.209621: | #1 is busy; has a suspended MD Jan 30 17:23:47.209627: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:47.209634: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:47.209639: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.209645: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.209650: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:47.209672: | crypto helper 1 resuming Jan 30 17:23:47.209684: | backlog: removing object 0x556c11a2e7b8 (work-order 1 state #1) entry 0x556c11a2e7c0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.209689: | backlog: empty Jan 30 17:23:47.209696: | crypto helper 1 starting work-order 1 for state #1 Jan 30 17:23:47.209702: | crypto helper 1 doing build KE and nonce; request ID 1 Jan 30 17:23:47.210951: | crypto helper 1 finished build KE and nonce; request ID 1 time elapsed 1247 usec Jan 30 17:23:47.210964: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Jan 30 17:23:47.210971: | scheduling now-event sending helper answer for #1 Jan 30 17:23:47.210988: | crypto helper 1 waiting (nothing to do) Jan 30 17:23:47.211006: | executing now-event sending helper answer for 1 Jan 30 17:23:47.211012: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:47.211017: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:47.211025: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:47.211031: | crypto helper 1 replies to request ID 1 Jan 30 17:23:47.211036: | calling continuation function 0x556c0ff2f120 Jan 30 17:23:47.211044: | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 Jan 30 17:23:47.211057: | **emit ISAKMP Message: Jan 30 17:23:47.211064: | initiator cookie: Jan 30 17:23:47.211069: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.211074: | responder cookie: Jan 30 17:23:47.211079: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.211084: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:47.211089: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.211094: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:47.211100: | flags: none (0x0) Jan 30 17:23:47.211105: | message ID: 00 00 00 00 Jan 30 17:23:47.211111: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:47.211117: | ***emit ISAKMP Key Exchange Payload: Jan 30 17:23:47.211123: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:47.211128: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Jan 30 17:23:47.211134: | keyex value bf eb ce ca 26 62 1f 32 f5 d3 ed 33 8e 5b 16 e8 Jan 30 17:23:47.211139: | keyex value 0f 9f 09 d5 2a 44 aa 5d 75 a2 83 72 61 66 dc ef Jan 30 17:23:47.211144: | keyex value 85 5f 22 cc 28 c9 1e a5 df 84 77 23 ec 7d 82 45 Jan 30 17:23:47.211149: | keyex value 5f e3 c0 3a 1d 1e 5b c8 3b 70 cb 81 04 e0 3b fe Jan 30 17:23:47.211154: | keyex value 77 5d e5 17 98 94 25 5d 59 70 2e 4a 51 57 33 55 Jan 30 17:23:47.211159: | keyex value 42 5d 22 0c 0f 9a 63 18 76 52 80 85 6e 5c 08 d8 Jan 30 17:23:47.211164: | keyex value e1 5c 13 7a c6 06 29 4a 62 cf 13 9e 92 cc 52 e7 Jan 30 17:23:47.211169: | keyex value 0c 04 db 8c dd d3 99 32 fe 24 cc 4b 60 f7 8f 68 Jan 30 17:23:47.211174: | keyex value 1d 0d 3d 7c 45 77 4f f4 c2 e2 60 a1 35 2d 08 fd Jan 30 17:23:47.211179: | keyex value 9e 68 81 f9 e9 b0 70 07 cc 8a 23 52 28 28 db 06 Jan 30 17:23:47.211184: | keyex value 0f 91 26 7b a4 bb 97 16 28 2b 12 c4 9b bc 14 90 Jan 30 17:23:47.211189: | keyex value 22 b6 67 e5 4e 4e 35 d2 02 dc fd c4 6a 91 95 bf Jan 30 17:23:47.211194: | keyex value 85 9d 9d 6c 2c 3c 33 77 73 bb 44 4f 14 b2 ce 03 Jan 30 17:23:47.211199: | keyex value 94 b6 d6 91 99 cd 1d 69 37 72 8a 32 54 e7 d3 f5 Jan 30 17:23:47.211204: | keyex value 30 f1 6a 64 3d 60 32 33 a5 b3 fa 4d 0b 04 73 bd Jan 30 17:23:47.211209: | keyex value f1 93 4d d2 ea 0c 90 74 9a 82 9f 74 fb f6 08 6b Jan 30 17:23:47.211215: | emitting length of ISAKMP Key Exchange Payload: 260 Jan 30 17:23:47.211220: | ***emit ISAKMP Nonce Payload: Jan 30 17:23:47.211225: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.211231: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Jan 30 17:23:47.211236: | Ni 96 98 19 cf 8f d2 29 c4 53 9a ee c1 42 e5 5a be Jan 30 17:23:47.211241: | Ni 73 73 91 97 db f3 8f 08 df 4b 5d d8 4f 1f 1c 43 Jan 30 17:23:47.211246: | emitting length of ISAKMP Nonce Payload: 36 Jan 30 17:23:47.211251: | NAT-T checking st_nat_traversal Jan 30 17:23:47.211256: | NAT-T found (implies NAT_T_WITH_NATD) Jan 30 17:23:47.211261: | sending NAT-D payloads Jan 30 17:23:47.211277: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:47.211283: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.211288: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.211293: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:47.211298: | natd_hash: port=500 Jan 30 17:23:47.211303: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.211312: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.211317: | ***emit ISAKMP NAT-D Payload: Jan 30 17:23:47.211322: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:47.211328: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Jan 30 17:23:47.211333: | NAT-D a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.211338: | NAT-D 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.211343: | emitting length of ISAKMP NAT-D Payload: 36 Jan 30 17:23:47.211355: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:47.211361: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.211366: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.211371: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:47.211376: | natd_hash: port=500 Jan 30 17:23:47.211381: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.211386: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.211391: | ***emit ISAKMP NAT-D Payload: Jan 30 17:23:47.211396: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.211401: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Jan 30 17:23:47.211406: | NAT-D d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.211411: | NAT-D 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.211416: | emitting length of ISAKMP NAT-D Payload: 36 Jan 30 17:23:47.211422: | no IKEv1 message padding required Jan 30 17:23:47.211426: | emitting length of ISAKMP Message: 396 Jan 30 17:23:47.211432: | rehashing state object #1 Jan 30 17:23:47.211437: | icookie table: cookies table: re-hashing state #1 cookies Jan 30 17:23:47.211443: | complete v1 state transition with STF_OK Jan 30 17:23:47.211450: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:47.211456: | #1 is idle Jan 30 17:23:47.211461: | doing_xauth:no, t_xauth_client_done:no Jan 30 17:23:47.211466: | peer supports fragmentation Jan 30 17:23:47.211471: | peer supports dpd Jan 30 17:23:47.211476: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Jan 30 17:23:47.211482: | parent state #1: STATE_MAIN_I1(half-open-ike) => STATE_MAIN_I2(open-ike) Jan 30 17:23:47.211487: | ignore states: 0 Jan 30 17:23:47.211492: | half-open-ike states: 0 Jan 30 17:23:47.211497: | open-ike states: 1 Jan 30 17:23:47.211502: | established-anonymous-ike states: 0 Jan 30 17:23:47.211507: | established-authenticated-ike states: 0 Jan 30 17:23:47.211512: | anonymous-ipsec states: 0 Jan 30 17:23:47.211517: | authenticated-ipsec states: 0 Jan 30 17:23:47.211522: | informational states: 0 Jan 30 17:23:47.211526: | unknown states: 0 Jan 30 17:23:47.211531: | category states: 1 count states: 1 Jan 30 17:23:47.211536: | event_already_set, deleting event Jan 30 17:23:47.211542: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:23:47.211548: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:47.211555: | sending reply packet to :500 (from port 500) Jan 30 17:23:47.211571: | sending 396 bytes for STATE_MAIN_I1 through eth1:500 to :500 (using #1) Jan 30 17:23:47.211577: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.211582: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Jan 30 17:23:47.211587: | bf eb ce ca 26 62 1f 32 f5 d3 ed 33 8e 5b 16 e8 Jan 30 17:23:47.211592: | 0f 9f 09 d5 2a 44 aa 5d 75 a2 83 72 61 66 dc ef Jan 30 17:23:47.211597: | 85 5f 22 cc 28 c9 1e a5 df 84 77 23 ec 7d 82 45 Jan 30 17:23:47.211602: | 5f e3 c0 3a 1d 1e 5b c8 3b 70 cb 81 04 e0 3b fe Jan 30 17:23:47.211607: | 77 5d e5 17 98 94 25 5d 59 70 2e 4a 51 57 33 55 Jan 30 17:23:47.211612: | 42 5d 22 0c 0f 9a 63 18 76 52 80 85 6e 5c 08 d8 Jan 30 17:23:47.211617: | e1 5c 13 7a c6 06 29 4a 62 cf 13 9e 92 cc 52 e7 Jan 30 17:23:47.211622: | 0c 04 db 8c dd d3 99 32 fe 24 cc 4b 60 f7 8f 68 Jan 30 17:23:47.211630: | 1d 0d 3d 7c 45 77 4f f4 c2 e2 60 a1 35 2d 08 fd Jan 30 17:23:47.211635: | 9e 68 81 f9 e9 b0 70 07 cc 8a 23 52 28 28 db 06 Jan 30 17:23:47.211640: | 0f 91 26 7b a4 bb 97 16 28 2b 12 c4 9b bc 14 90 Jan 30 17:23:47.211645: | 22 b6 67 e5 4e 4e 35 d2 02 dc fd c4 6a 91 95 bf Jan 30 17:23:47.211650: | 85 9d 9d 6c 2c 3c 33 77 73 bb 44 4f 14 b2 ce 03 Jan 30 17:23:47.211655: | 94 b6 d6 91 99 cd 1d 69 37 72 8a 32 54 e7 d3 f5 Jan 30 17:23:47.211660: | 30 f1 6a 64 3d 60 32 33 a5 b3 fa 4d 0b 04 73 bd Jan 30 17:23:47.211664: | f1 93 4d d2 ea 0c 90 74 9a 82 9f 74 fb f6 08 6b Jan 30 17:23:47.211669: | 14 00 00 24 96 98 19 cf 8f d2 29 c4 53 9a ee c1 Jan 30 17:23:47.211674: | 42 e5 5a be 73 73 91 97 db f3 8f 08 df 4b 5d d8 Jan 30 17:23:47.211679: | 4f 1f 1c 43 14 00 00 24 a5 4d 3e 63 ce b2 f2 75 Jan 30 17:23:47.211684: | 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b 99 f8 f6 d2 Jan 30 17:23:47.211689: | b9 ff d9 69 2b f0 0c 1d 00 00 00 24 d2 8f c9 5d Jan 30 17:23:47.211694: | fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 Jan 30 17:23:47.211699: | d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.211730: | !event_already_set at reschedule Jan 30 17:23:47.211747: | event_schedule: new EVENT_v1_RETRANSMIT-pe@0x556c11a2d588 Jan 30 17:23:47.211756: | inserting event EVENT_v1_RETRANSMIT, timeout in 0.500 seconds for #1 Jan 30 17:23:47.211764: | #1 STATE_MAIN_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 1272.332 Jan 30 17:23:47.211771: "lagu_tunnel" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Jan 30 17:23:47.211783: | modecfg pull: noquirk policy:push not-client Jan 30 17:23:47.211788: | phase 1 is done, looking for phase 2 to unpend Jan 30 17:23:47.211796: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:47.211802: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.211807: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.216031: | *received 380 bytes from :500 on eth1 (port=500) Jan 30 17:23:47.216045: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.216050: | 04 10 02 00 00 00 00 00 00 00 01 7c 0a 00 01 04 Jan 30 17:23:47.216054: | 7b c4 a6 5b 1e 75 dc 02 6d c1 61 07 2b cf 2f 07 Jan 30 17:23:47.216057: | 42 e9 4d fc 43 7a df 65 c2 1f 3a 7d 9d e2 dc e8 Jan 30 17:23:47.216061: | 25 53 1a 61 82 d8 67 a2 05 b2 b0 dd 69 12 4a ef Jan 30 17:23:47.216064: | dd 7e 18 cc 75 67 a0 11 07 70 85 44 2f e3 49 16 Jan 30 17:23:47.216068: | d5 73 90 c3 1c e4 7a d8 88 e5 c9 63 bb e5 e8 fc Jan 30 17:23:47.216072: | b2 cc 3a e2 75 3a 20 99 1b 0b 60 22 d2 e9 4d 92 Jan 30 17:23:47.216075: | 2f 19 cc 20 5e 3f c6 4b 27 82 ce 2f 23 a5 94 e3 Jan 30 17:23:47.216079: | 07 1a e0 29 12 f8 84 aa 30 59 7f cd c0 68 36 0f Jan 30 17:23:47.216082: | 17 ad 95 85 3c f4 a8 27 e1 51 6e 83 bd 3a 0e 74 Jan 30 17:23:47.216086: | 53 ba b0 57 db 50 a9 ca a8 66 3c d9 25 d2 8b 17 Jan 30 17:23:47.216089: | 54 06 b6 c3 a9 dd 87 3d 96 2f e9 46 16 09 e3 e5 Jan 30 17:23:47.216093: | 14 97 7f c0 a3 a6 d2 22 88 fa fc 03 fc ed ac ac Jan 30 17:23:47.216097: | 02 02 c3 38 8a 83 d8 ad cb e2 1e 19 08 12 b9 bb Jan 30 17:23:47.216100: | 9f 3f 68 d2 e0 bf 66 fa 36 47 31 e2 2c 52 fa 6f Jan 30 17:23:47.216104: | db 61 3c f4 c8 e7 59 b9 2b e6 88 fd b0 82 f7 23 Jan 30 17:23:47.216107: | 37 09 fe 8f 60 94 24 08 00 99 ac 19 08 fe f7 ee Jan 30 17:23:47.216111: | 14 00 00 14 04 ce 23 6a c8 e1 58 e7 7d ca 10 57 Jan 30 17:23:47.216115: | ed 41 da 57 14 00 00 24 d2 8f c9 5d fb 96 f5 cf Jan 30 17:23:47.216118: | 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 d8 0e 2a 51 Jan 30 17:23:47.216122: | e0 12 cf be 5f 24 97 f7 00 00 00 24 a5 4d 3e 63 Jan 30 17:23:47.216125: | ce b2 f2 75 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b Jan 30 17:23:47.216129: | 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.216138: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:47.216143: | **parse ISAKMP Message: Jan 30 17:23:47.216147: | initiator cookie: Jan 30 17:23:47.216151: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.216154: | responder cookie: Jan 30 17:23:47.216158: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.216162: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:47.216166: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.216170: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:47.216174: | flags: none (0x0) Jan 30 17:23:47.216177: | message ID: 00 00 00 00 Jan 30 17:23:47.216181: | length: 380 (0x17c) Jan 30 17:23:47.216185: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:47.216193: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:47.216197: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:47.216201: | v1 state object #1 found, in STATE_MAIN_I2 Jan 30 17:23:47.216207: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:47.216211: | #1 is idle Jan 30 17:23:47.216214: | #1 idle Jan 30 17:23:47.216218: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Jan 30 17:23:47.216222: | ***parse ISAKMP Key Exchange Payload: Jan 30 17:23:47.216226: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:47.216230: | length: 260 (0x104) Jan 30 17:23:47.216234: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Jan 30 17:23:47.216238: | ***parse ISAKMP Nonce Payload: Jan 30 17:23:47.216241: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:47.216245: | length: 20 (0x14) Jan 30 17:23:47.216249: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:47.216253: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:47.216256: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:47.216260: | length: 36 (0x24) Jan 30 17:23:47.216264: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:47.216267: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:47.216271: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.216275: | length: 36 (0x24) Jan 30 17:23:47.216281: | started looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:47.216286: | actually looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:47.216290: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:47.216294: | no Preshared Key Found Jan 30 17:23:47.216300: | adding aggr outR1 DH work-order 2 for state #1 Jan 30 17:23:47.216304: | state #1 requesting EVENT_v1_RETRANSMIT to be deleted Jan 30 17:23:47.216308: | #1 STATE_MAIN_I2: retransmits: cleared Jan 30 17:23:47.216313: | free_event_entry: release EVENT_v1_RETRANSMIT-pe@0x556c11a2d588 Jan 30 17:23:47.216317: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:47.216323: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:47.216329: | backlog: inserting object 0x556c11a2f448 (work-order 2 state #1) entry 0x556c11a2f450 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.216334: | backlog: inserted object 0x556c11a2f448 (work-order 2 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.216339: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2f450 newer 0x556c11a2f450) Jan 30 17:23:47.216346: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:47.216352: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:47.216356: | suspending state #1 and saving MD Jan 30 17:23:47.216359: | #1 is busy; has a suspended MD Jan 30 17:23:47.216364: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:47.216371: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:47.216375: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.216379: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.216383: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:47.216397: | crypto helper 2 resuming Jan 30 17:23:47.216404: | backlog: removing object 0x556c11a2f448 (work-order 2 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.216408: | backlog: empty Jan 30 17:23:47.216413: | crypto helper 2 starting work-order 2 for state #1 Jan 30 17:23:47.216417: | crypto helper 2 doing compute dh+iv (V1 Phase 1); request ID 2 Jan 30 17:23:47.217217: | crypto helper 2 finished compute dh+iv (V1 Phase 1); request ID 2 time elapsed 798 usec Jan 30 17:23:47.217229: | crypto helper 2 sending results from work-order 2 for state #1 to event queue Jan 30 17:23:47.217234: | scheduling now-event sending helper answer for #1 Jan 30 17:23:47.217243: | crypto helper 2 waiting (nothing to do) Jan 30 17:23:47.217255: | executing now-event sending helper answer for 1 Jan 30 17:23:47.217260: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:47.217264: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:47.217269: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:47.217273: | crypto helper 2 replies to request ID 2 Jan 30 17:23:47.217277: | calling continuation function 0x556c0ff2df10 Jan 30 17:23:47.217281: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Jan 30 17:23:47.217288: | **emit ISAKMP Message: Jan 30 17:23:47.217293: | initiator cookie: Jan 30 17:23:47.217296: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.217300: | responder cookie: Jan 30 17:23:47.217303: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.217307: | next payload type: ISAKMP_NEXT_ID (0x5) Jan 30 17:23:47.217311: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.217315: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:47.217319: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Jan 30 17:23:47.217323: | message ID: 00 00 00 00 Jan 30 17:23:47.217327: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:47.217335: | thinking about whether to send my certificate: Jan 30 17:23:47.217339: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Jan 30 17:23:47.217343: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Jan 30 17:23:47.217347: | so do not send cert. Jan 30 17:23:47.217351: | I did not send a certificate because I do not have one. Jan 30 17:23:47.217354: | I am not sending a certificate request Jan 30 17:23:47.217358: | I will NOT send an initial contact payload Jan 30 17:23:47.217362: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal) Jan 30 17:23:47.217372: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:47.217377: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.217381: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.217384: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:47.217388: | natd_hash: port=500 Jan 30 17:23:47.217392: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.217396: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.217402: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:47.217407: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.217410: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.217414: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:47.217418: | natd_hash: port=500 Jan 30 17:23:47.217421: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.217425: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.217432: | expected NAT-D(me): d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.217436: | expected NAT-D(me): 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.217440: | expected NAT-D(him): Jan 30 17:23:47.217444: | a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.217447: | 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.217451: | received NAT-D: d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.217455: | received NAT-D: 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.217459: | received NAT-D: a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.217463: | received NAT-D: 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.217466: | NAT_TRAVERSAL encaps using auto-detect Jan 30 17:23:47.217470: | NAT_TRAVERSAL this end is NOT behind NAT Jan 30 17:23:47.217474: | NAT_TRAVERSAL that end is NOT behind NAT Jan 30 17:23:47.217478: | NAT_TRAVERSAL nat_keepalive enabled Jan 30 17:23:47.217482: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Jan 30 17:23:47.217485: | NAT_T_WITH_KA detected Jan 30 17:23:47.217489: | event_schedule: new EVENT_NAT_T_KEEPALIVE-pe@0x556c11a2d368 Jan 30 17:23:47.217495: | inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20.000 seconds Jan 30 17:23:47.217500: | ***emit ISAKMP Identification Payload (IPsec DOI): Jan 30 17:23:47.217504: | next payload type: ISAKMP_NEXT_SIG (0x9) Jan 30 17:23:47.217508: | ID type: ID_FQDN (0x2) Jan 30 17:23:47.217512: | Protocol ID: 0 (0x0) Jan 30 17:23:47.217515: | port: 0 (0x0) Jan 30 17:23:47.217520: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Jan 30 17:23:47.217523: | my identity 77 65 73 74 Jan 30 17:23:47.217527: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Jan 30 17:23:47.217554: | started looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:47.217567: | actually looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:47.217573: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:47.217577: "lagu_tunnel" #1: unable to locate my private key for RSA Signature Jan 30 17:23:47.217587: | complete v1 state transition with AUTHENTICATION_FAILED Jan 30 17:23:47.217592: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:47.217596: | #1 is idle Jan 30 17:23:47.217608: "lagu_tunnel" #1: sending notification AUTHENTICATION_FAILED to :500 Jan 30 17:23:47.217615: | **emit ISAKMP Message: Jan 30 17:23:47.217619: | initiator cookie: Jan 30 17:23:47.217622: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.217626: | responder cookie: Jan 30 17:23:47.217629: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.217633: | next payload type: ISAKMP_NEXT_N (0xb) Jan 30 17:23:47.217637: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.217640: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 30 17:23:47.217644: | flags: none (0x0) Jan 30 17:23:47.217648: | message ID: 00 00 00 00 Jan 30 17:23:47.217652: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:47.217656: | ***emit ISAKMP Notification Payload: Jan 30 17:23:47.217659: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.217663: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:47.217667: | protocol ID: 1 (0x1) Jan 30 17:23:47.217670: | SPI size: 0 (0x0) Jan 30 17:23:47.217674: | Notify Message Type: AUTHENTICATION_FAILED (0x18) Jan 30 17:23:47.217678: | emitting length of ISAKMP Notification Payload: 12 Jan 30 17:23:47.217681: | emitting length of ISAKMP Message: 40 Jan 30 17:23:47.217686: | sending 40 bytes for notification packet through eth1:500 to :500 (using #1) Jan 30 17:23:47.217690: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.217694: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Jan 30 17:23:47.217700: | 00 00 00 01 01 00 00 18 Jan 30 17:23:47.217721: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Jan 30 17:23:47.217747: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:47.217752: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.217755: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.716761: | *received 380 bytes from :500 on eth1 (port=500) Jan 30 17:23:47.716789: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.716794: | 04 10 02 00 00 00 00 00 00 00 01 7c 0a 00 01 04 Jan 30 17:23:47.716798: | 7b c4 a6 5b 1e 75 dc 02 6d c1 61 07 2b cf 2f 07 Jan 30 17:23:47.716801: | 42 e9 4d fc 43 7a df 65 c2 1f 3a 7d 9d e2 dc e8 Jan 30 17:23:47.716805: | 25 53 1a 61 82 d8 67 a2 05 b2 b0 dd 69 12 4a ef Jan 30 17:23:47.716809: | dd 7e 18 cc 75 67 a0 11 07 70 85 44 2f e3 49 16 Jan 30 17:23:47.716812: | d5 73 90 c3 1c e4 7a d8 88 e5 c9 63 bb e5 e8 fc Jan 30 17:23:47.716816: | b2 cc 3a e2 75 3a 20 99 1b 0b 60 22 d2 e9 4d 92 Jan 30 17:23:47.716819: | 2f 19 cc 20 5e 3f c6 4b 27 82 ce 2f 23 a5 94 e3 Jan 30 17:23:47.716823: | 07 1a e0 29 12 f8 84 aa 30 59 7f cd c0 68 36 0f Jan 30 17:23:47.716827: | 17 ad 95 85 3c f4 a8 27 e1 51 6e 83 bd 3a 0e 74 Jan 30 17:23:47.716830: | 53 ba b0 57 db 50 a9 ca a8 66 3c d9 25 d2 8b 17 Jan 30 17:23:47.716834: | 54 06 b6 c3 a9 dd 87 3d 96 2f e9 46 16 09 e3 e5 Jan 30 17:23:47.716838: | 14 97 7f c0 a3 a6 d2 22 88 fa fc 03 fc ed ac ac Jan 30 17:23:47.716841: | 02 02 c3 38 8a 83 d8 ad cb e2 1e 19 08 12 b9 bb Jan 30 17:23:47.716845: | 9f 3f 68 d2 e0 bf 66 fa 36 47 31 e2 2c 52 fa 6f Jan 30 17:23:47.716848: | db 61 3c f4 c8 e7 59 b9 2b e6 88 fd b0 82 f7 23 Jan 30 17:23:47.716852: | 37 09 fe 8f 60 94 24 08 00 99 ac 19 08 fe f7 ee Jan 30 17:23:47.716856: | 14 00 00 14 04 ce 23 6a c8 e1 58 e7 7d ca 10 57 Jan 30 17:23:47.716859: | ed 41 da 57 14 00 00 24 d2 8f c9 5d fb 96 f5 cf Jan 30 17:23:47.716863: | 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 d8 0e 2a 51 Jan 30 17:23:47.716866: | e0 12 cf be 5f 24 97 f7 00 00 00 24 a5 4d 3e 63 Jan 30 17:23:47.716870: | ce b2 f2 75 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b Jan 30 17:23:47.716874: | 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.716880: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:47.716886: | **parse ISAKMP Message: Jan 30 17:23:47.716890: | initiator cookie: Jan 30 17:23:47.716894: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.716897: | responder cookie: Jan 30 17:23:47.716901: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.716905: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:47.716909: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.716913: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:47.716917: | flags: none (0x0) Jan 30 17:23:47.716921: | message ID: 00 00 00 00 Jan 30 17:23:47.716925: | length: 380 (0x17c) Jan 30 17:23:47.716929: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:47.716939: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:47.716944: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:47.716948: | v1 state object #1 found, in STATE_MAIN_I2 Jan 30 17:23:47.716953: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:47.716958: | #1 is idle Jan 30 17:23:47.716962: | #1 idle Jan 30 17:23:47.716966: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Jan 30 17:23:47.716975: | ***parse ISAKMP Key Exchange Payload: Jan 30 17:23:47.716981: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:47.716985: | length: 260 (0x104) Jan 30 17:23:47.716990: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Jan 30 17:23:47.717000: | ***parse ISAKMP Nonce Payload: Jan 30 17:23:47.717004: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:47.717008: | length: 20 (0x14) Jan 30 17:23:47.717012: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:47.717016: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:47.717020: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:47.717023: | length: 36 (0x24) Jan 30 17:23:47.717027: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:47.717031: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:47.717035: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.717041: | length: 36 (0x24) Jan 30 17:23:47.717052: | started looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:47.717056: | actually looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:47.717061: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:47.717065: | no Preshared Key Found Jan 30 17:23:47.717072: | adding aggr outR1 DH work-order 3 for state #1 Jan 30 17:23:47.717076: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:23:47.717082: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:47.717086: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:47.717093: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:47.717100: | backlog: inserting object 0x556c11a2f448 (work-order 3 state #1) entry 0x556c11a2f450 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.717105: | backlog: inserted object 0x556c11a2f448 (work-order 3 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.717109: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2f450 newer 0x556c11a2f450) Jan 30 17:23:47.717118: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:47.717123: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:47.717128: | suspending state #1 and saving MD Jan 30 17:23:47.717131: | #1 is busy; has a suspended MD Jan 30 17:23:47.717136: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:47.717141: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:47.717145: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.717149: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.717153: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:47.717171: | crypto helper 3 resuming Jan 30 17:23:47.717178: | backlog: removing object 0x556c11a2f448 (work-order 3 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:47.717182: | backlog: empty Jan 30 17:23:47.717187: | crypto helper 3 starting work-order 3 for state #1 Jan 30 17:23:47.717191: | crypto helper 3 doing compute dh+iv (V1 Phase 1); request ID 3 Jan 30 17:23:47.717982: | crypto helper 3 finished compute dh+iv (V1 Phase 1); request ID 3 time elapsed 790 usec Jan 30 17:23:47.717993: | crypto helper 3 sending results from work-order 3 for state #1 to event queue Jan 30 17:23:47.717998: | scheduling now-event sending helper answer for #1 Jan 30 17:23:47.718007: | crypto helper 3 waiting (nothing to do) Jan 30 17:23:47.718020: | executing now-event sending helper answer for 1 Jan 30 17:23:47.718025: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:47.718029: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:47.718035: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:47.718039: | crypto helper 3 replies to request ID 3 Jan 30 17:23:47.718042: | calling continuation function 0x556c0ff2df10 Jan 30 17:23:47.718046: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Jan 30 17:23:47.718061: | **emit ISAKMP Message: Jan 30 17:23:47.718066: | initiator cookie: Jan 30 17:23:47.718070: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.718074: | responder cookie: Jan 30 17:23:47.718077: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.718081: | next payload type: ISAKMP_NEXT_ID (0x5) Jan 30 17:23:47.718085: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.718089: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:47.718093: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Jan 30 17:23:47.718097: | message ID: 00 00 00 00 Jan 30 17:23:47.718101: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:47.718106: | thinking about whether to send my certificate: Jan 30 17:23:47.718110: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Jan 30 17:23:47.718114: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Jan 30 17:23:47.718118: | so do not send cert. Jan 30 17:23:47.718122: | I did not send a certificate because I do not have one. Jan 30 17:23:47.718125: | I am not sending a certificate request Jan 30 17:23:47.718129: | I will NOT send an initial contact payload Jan 30 17:23:47.718133: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal) Jan 30 17:23:47.718144: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:47.718149: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.718152: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.718156: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:47.718160: | natd_hash: port=500 Jan 30 17:23:47.718163: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.718167: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.718174: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:47.718178: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.718182: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.718186: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:47.718189: | natd_hash: port=500 Jan 30 17:23:47.718193: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.718196: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.718200: | expected NAT-D(me): d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.718204: | expected NAT-D(me): 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.718208: | expected NAT-D(him): Jan 30 17:23:47.718211: | a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.718215: | 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.718218: | received NAT-D: d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:47.718222: | received NAT-D: 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:47.718226: | received NAT-D: a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:47.718230: | received NAT-D: 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:47.718234: | NAT_TRAVERSAL encaps using auto-detect Jan 30 17:23:47.718238: | NAT_TRAVERSAL this end is NOT behind NAT Jan 30 17:23:47.718241: | NAT_TRAVERSAL that end is NOT behind NAT Jan 30 17:23:47.718245: | NAT_TRAVERSAL nat_keepalive enabled Jan 30 17:23:47.718250: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Jan 30 17:23:47.718253: | NAT_T_WITH_KA detected Jan 30 17:23:47.718257: | ***emit ISAKMP Identification Payload (IPsec DOI): Jan 30 17:23:47.718261: | next payload type: ISAKMP_NEXT_SIG (0x9) Jan 30 17:23:47.718265: | ID type: ID_FQDN (0x2) Jan 30 17:23:47.718269: | Protocol ID: 0 (0x0) Jan 30 17:23:47.718272: | port: 0 (0x0) Jan 30 17:23:47.718277: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Jan 30 17:23:47.718280: | my identity 77 65 73 74 Jan 30 17:23:47.718284: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Jan 30 17:23:47.718315: | started looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:47.718321: | actually looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:47.718326: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:47.718331: "lagu_tunnel" #1: unable to locate my private key for RSA Signature Jan 30 17:23:47.718343: | complete v1 state transition with AUTHENTICATION_FAILED Jan 30 17:23:47.718349: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:47.718353: | #1 is idle Jan 30 17:23:47.718364: "lagu_tunnel" #1: sending notification AUTHENTICATION_FAILED to :500 Jan 30 17:23:47.718370: | **emit ISAKMP Message: Jan 30 17:23:47.718374: | initiator cookie: Jan 30 17:23:47.718378: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:47.718382: | responder cookie: Jan 30 17:23:47.718385: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.718389: | next payload type: ISAKMP_NEXT_N (0xb) Jan 30 17:23:47.718393: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:47.718397: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 30 17:23:47.718400: | flags: none (0x0) Jan 30 17:23:47.718404: | message ID: 00 00 00 00 Jan 30 17:23:47.718408: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:47.718412: | ***emit ISAKMP Notification Payload: Jan 30 17:23:47.718416: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:47.718420: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:47.718423: | protocol ID: 1 (0x1) Jan 30 17:23:47.718427: | SPI size: 0 (0x0) Jan 30 17:23:47.718431: | Notify Message Type: AUTHENTICATION_FAILED (0x18) Jan 30 17:23:47.718436: | emitting length of ISAKMP Notification Payload: 12 Jan 30 17:23:47.718440: | emitting length of ISAKMP Message: 40 Jan 30 17:23:47.718445: | sending 40 bytes for notification packet through eth1:500 to :500 (using #1) Jan 30 17:23:47.718450: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:47.718453: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Jan 30 17:23:47.718457: | 00 00 00 01 01 00 00 18 Jan 30 17:23:47.718495: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Jan 30 17:23:47.718504: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:47.718508: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:47.718512: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:48.221726: | *received 380 bytes from :500 on eth1 (port=500) Jan 30 17:23:48.221757: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.221761: | 04 10 02 00 00 00 00 00 00 00 01 7c 0a 00 01 04 Jan 30 17:23:48.221765: | 7b c4 a6 5b 1e 75 dc 02 6d c1 61 07 2b cf 2f 07 Jan 30 17:23:48.221769: | 42 e9 4d fc 43 7a df 65 c2 1f 3a 7d 9d e2 dc e8 Jan 30 17:23:48.221773: | 25 53 1a 61 82 d8 67 a2 05 b2 b0 dd 69 12 4a ef Jan 30 17:23:48.221776: | dd 7e 18 cc 75 67 a0 11 07 70 85 44 2f e3 49 16 Jan 30 17:23:48.221780: | d5 73 90 c3 1c e4 7a d8 88 e5 c9 63 bb e5 e8 fc Jan 30 17:23:48.221783: | b2 cc 3a e2 75 3a 20 99 1b 0b 60 22 d2 e9 4d 92 Jan 30 17:23:48.221787: | 2f 19 cc 20 5e 3f c6 4b 27 82 ce 2f 23 a5 94 e3 Jan 30 17:23:48.221791: | 07 1a e0 29 12 f8 84 aa 30 59 7f cd c0 68 36 0f Jan 30 17:23:48.221794: | 17 ad 95 85 3c f4 a8 27 e1 51 6e 83 bd 3a 0e 74 Jan 30 17:23:48.221798: | 53 ba b0 57 db 50 a9 ca a8 66 3c d9 25 d2 8b 17 Jan 30 17:23:48.221801: | 54 06 b6 c3 a9 dd 87 3d 96 2f e9 46 16 09 e3 e5 Jan 30 17:23:48.221805: | 14 97 7f c0 a3 a6 d2 22 88 fa fc 03 fc ed ac ac Jan 30 17:23:48.221809: | 02 02 c3 38 8a 83 d8 ad cb e2 1e 19 08 12 b9 bb Jan 30 17:23:48.221812: | 9f 3f 68 d2 e0 bf 66 fa 36 47 31 e2 2c 52 fa 6f Jan 30 17:23:48.221816: | db 61 3c f4 c8 e7 59 b9 2b e6 88 fd b0 82 f7 23 Jan 30 17:23:48.221819: | 37 09 fe 8f 60 94 24 08 00 99 ac 19 08 fe f7 ee Jan 30 17:23:48.221832: | 14 00 00 14 04 ce 23 6a c8 e1 58 e7 7d ca 10 57 Jan 30 17:23:48.221840: | ed 41 da 57 14 00 00 24 d2 8f c9 5d fb 96 f5 cf Jan 30 17:23:48.221845: | 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 d8 0e 2a 51 Jan 30 17:23:48.221851: | e0 12 cf be 5f 24 97 f7 00 00 00 24 a5 4d 3e 63 Jan 30 17:23:48.221857: | ce b2 f2 75 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b Jan 30 17:23:48.221862: | 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:48.221868: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:48.221874: | **parse ISAKMP Message: Jan 30 17:23:48.221878: | initiator cookie: Jan 30 17:23:48.221882: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:48.221886: | responder cookie: Jan 30 17:23:48.221889: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.221893: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:48.221897: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:48.221901: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:48.221905: | flags: none (0x0) Jan 30 17:23:48.221909: | message ID: 00 00 00 00 Jan 30 17:23:48.221913: | length: 380 (0x17c) Jan 30 17:23:48.221917: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:48.221926: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:48.221931: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:48.221935: | v1 state object #1 found, in STATE_MAIN_I2 Jan 30 17:23:48.221941: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:48.221945: | #1 is idle Jan 30 17:23:48.221949: | #1 idle Jan 30 17:23:48.221953: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Jan 30 17:23:48.221958: | ***parse ISAKMP Key Exchange Payload: Jan 30 17:23:48.221961: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:48.221965: | length: 260 (0x104) Jan 30 17:23:48.221969: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Jan 30 17:23:48.221973: | ***parse ISAKMP Nonce Payload: Jan 30 17:23:48.221977: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:48.221981: | length: 20 (0x14) Jan 30 17:23:48.221985: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:48.221988: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:48.221992: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:48.221996: | length: 36 (0x24) Jan 30 17:23:48.221999: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:48.222003: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:48.222007: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:48.222010: | length: 36 (0x24) Jan 30 17:23:48.222019: | started looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:48.222023: | actually looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:48.222029: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:48.222032: | no Preshared Key Found Jan 30 17:23:48.222039: | adding aggr outR1 DH work-order 4 for state #1 Jan 30 17:23:48.222044: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:23:48.222050: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:48.222054: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:48.222061: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:48.222068: | backlog: inserting object 0x556c11a2f448 (work-order 4 state #1) entry 0x556c11a2f450 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:48.222073: | backlog: inserted object 0x556c11a2f448 (work-order 4 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:48.222078: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2f450 newer 0x556c11a2f450) Jan 30 17:23:48.222089: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:48.222095: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:48.222099: | suspending state #1 and saving MD Jan 30 17:23:48.222103: | #1 is busy; has a suspended MD Jan 30 17:23:48.222107: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:48.222112: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:48.222116: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:48.222120: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:48.222124: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:48.222143: | crypto helper 0 resuming Jan 30 17:23:48.222156: | backlog: removing object 0x556c11a2f448 (work-order 4 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:48.222160: | backlog: empty Jan 30 17:23:48.222166: | crypto helper 0 starting work-order 4 for state #1 Jan 30 17:23:48.222170: | crypto helper 0 doing compute dh+iv (V1 Phase 1); request ID 4 Jan 30 17:23:48.222970: | crypto helper 0 finished compute dh+iv (V1 Phase 1); request ID 4 time elapsed 799 usec Jan 30 17:23:48.222981: | crypto helper 0 sending results from work-order 4 for state #1 to event queue Jan 30 17:23:48.222986: | scheduling now-event sending helper answer for #1 Jan 30 17:23:48.222995: | crypto helper 0 waiting (nothing to do) Jan 30 17:23:48.223011: | executing now-event sending helper answer for 1 Jan 30 17:23:48.223016: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:48.223020: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:48.223027: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:48.223031: | crypto helper 0 replies to request ID 4 Jan 30 17:23:48.223034: | calling continuation function 0x556c0ff2df10 Jan 30 17:23:48.223038: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Jan 30 17:23:48.223050: | **emit ISAKMP Message: Jan 30 17:23:48.223055: | initiator cookie: Jan 30 17:23:48.223058: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:48.223062: | responder cookie: Jan 30 17:23:48.223065: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.223069: | next payload type: ISAKMP_NEXT_ID (0x5) Jan 30 17:23:48.223073: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:48.223077: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:48.223081: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Jan 30 17:23:48.223084: | message ID: 00 00 00 00 Jan 30 17:23:48.223089: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:48.223094: | thinking about whether to send my certificate: Jan 30 17:23:48.223098: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Jan 30 17:23:48.223102: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Jan 30 17:23:48.223106: | so do not send cert. Jan 30 17:23:48.223110: | I did not send a certificate because I do not have one. Jan 30 17:23:48.223113: | I am not sending a certificate request Jan 30 17:23:48.223117: | I will NOT send an initial contact payload Jan 30 17:23:48.223122: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal) Jan 30 17:23:48.223132: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:48.223137: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:48.223140: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.223144: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:48.223147: | natd_hash: port=500 Jan 30 17:23:48.223151: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:48.223155: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:48.223162: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:48.223170: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:48.223173: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.223177: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:48.223181: | natd_hash: port=500 Jan 30 17:23:48.223184: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:48.223188: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:48.223192: | expected NAT-D(me): d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:48.223195: | expected NAT-D(me): 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:48.223199: | expected NAT-D(him): Jan 30 17:23:48.223203: | a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:48.223206: | 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:48.223210: | received NAT-D: d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:48.223213: | received NAT-D: 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:48.223218: | received NAT-D: a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:48.223221: | received NAT-D: 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:48.223225: | NAT_TRAVERSAL encaps using auto-detect Jan 30 17:23:48.223229: | NAT_TRAVERSAL this end is NOT behind NAT Jan 30 17:23:48.223232: | NAT_TRAVERSAL that end is NOT behind NAT Jan 30 17:23:48.223236: | NAT_TRAVERSAL nat_keepalive enabled Jan 30 17:23:48.223240: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Jan 30 17:23:48.223244: | NAT_T_WITH_KA detected Jan 30 17:23:48.223248: | ***emit ISAKMP Identification Payload (IPsec DOI): Jan 30 17:23:48.223252: | next payload type: ISAKMP_NEXT_SIG (0x9) Jan 30 17:23:48.223256: | ID type: ID_FQDN (0x2) Jan 30 17:23:48.223259: | Protocol ID: 0 (0x0) Jan 30 17:23:48.223263: | port: 0 (0x0) Jan 30 17:23:48.223267: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Jan 30 17:23:48.223271: | my identity 77 65 73 74 Jan 30 17:23:48.223275: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Jan 30 17:23:48.223301: | started looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:48.223307: | actually looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:48.223312: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:48.223316: "lagu_tunnel" #1: unable to locate my private key for RSA Signature Jan 30 17:23:48.223329: | complete v1 state transition with AUTHENTICATION_FAILED Jan 30 17:23:48.223335: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:48.223339: | #1 is idle Jan 30 17:23:48.223349: "lagu_tunnel" #1: sending notification AUTHENTICATION_FAILED to :500 Jan 30 17:23:48.223356: | **emit ISAKMP Message: Jan 30 17:23:48.223359: | initiator cookie: Jan 30 17:23:48.223363: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:48.223367: | responder cookie: Jan 30 17:23:48.223370: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.223374: | next payload type: ISAKMP_NEXT_N (0xb) Jan 30 17:23:48.223378: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:48.223381: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 30 17:23:48.223385: | flags: none (0x0) Jan 30 17:23:48.223389: | message ID: 00 00 00 00 Jan 30 17:23:48.223392: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:48.223396: | ***emit ISAKMP Notification Payload: Jan 30 17:23:48.223400: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:48.223404: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:48.223407: | protocol ID: 1 (0x1) Jan 30 17:23:48.223411: | SPI size: 0 (0x0) Jan 30 17:23:48.223415: | Notify Message Type: AUTHENTICATION_FAILED (0x18) Jan 30 17:23:48.223419: | emitting length of ISAKMP Notification Payload: 12 Jan 30 17:23:48.223422: | emitting length of ISAKMP Message: 40 Jan 30 17:23:48.223430: | sending 40 bytes for notification packet through eth1:500 to :500 (using #1) Jan 30 17:23:48.223434: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:48.223438: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Jan 30 17:23:48.223442: | 00 00 00 01 01 00 00 18 Jan 30 17:23:48.223478: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Jan 30 17:23:48.223487: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:48.223491: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:48.223495: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:49.218724: | *received 380 bytes from :500 on eth1 (port=500) Jan 30 17:23:49.218754: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.218758: | 04 10 02 00 00 00 00 00 00 00 01 7c 0a 00 01 04 Jan 30 17:23:49.218762: | 7b c4 a6 5b 1e 75 dc 02 6d c1 61 07 2b cf 2f 07 Jan 30 17:23:49.218766: | 42 e9 4d fc 43 7a df 65 c2 1f 3a 7d 9d e2 dc e8 Jan 30 17:23:49.218770: | 25 53 1a 61 82 d8 67 a2 05 b2 b0 dd 69 12 4a ef Jan 30 17:23:49.218773: | dd 7e 18 cc 75 67 a0 11 07 70 85 44 2f e3 49 16 Jan 30 17:23:49.218777: | d5 73 90 c3 1c e4 7a d8 88 e5 c9 63 bb e5 e8 fc Jan 30 17:23:49.218781: | b2 cc 3a e2 75 3a 20 99 1b 0b 60 22 d2 e9 4d 92 Jan 30 17:23:49.218784: | 2f 19 cc 20 5e 3f c6 4b 27 82 ce 2f 23 a5 94 e3 Jan 30 17:23:49.218788: | 07 1a e0 29 12 f8 84 aa 30 59 7f cd c0 68 36 0f Jan 30 17:23:49.218792: | 17 ad 95 85 3c f4 a8 27 e1 51 6e 83 bd 3a 0e 74 Jan 30 17:23:49.218795: | 53 ba b0 57 db 50 a9 ca a8 66 3c d9 25 d2 8b 17 Jan 30 17:23:49.218799: | 54 06 b6 c3 a9 dd 87 3d 96 2f e9 46 16 09 e3 e5 Jan 30 17:23:49.218802: | 14 97 7f c0 a3 a6 d2 22 88 fa fc 03 fc ed ac ac Jan 30 17:23:49.218806: | 02 02 c3 38 8a 83 d8 ad cb e2 1e 19 08 12 b9 bb Jan 30 17:23:49.218809: | 9f 3f 68 d2 e0 bf 66 fa 36 47 31 e2 2c 52 fa 6f Jan 30 17:23:49.218813: | db 61 3c f4 c8 e7 59 b9 2b e6 88 fd b0 82 f7 23 Jan 30 17:23:49.218817: | 37 09 fe 8f 60 94 24 08 00 99 ac 19 08 fe f7 ee Jan 30 17:23:49.218820: | 14 00 00 14 04 ce 23 6a c8 e1 58 e7 7d ca 10 57 Jan 30 17:23:49.218824: | ed 41 da 57 14 00 00 24 d2 8f c9 5d fb 96 f5 cf Jan 30 17:23:49.218827: | 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 d8 0e 2a 51 Jan 30 17:23:49.218831: | e0 12 cf be 5f 24 97 f7 00 00 00 24 a5 4d 3e 63 Jan 30 17:23:49.218834: | ce b2 f2 75 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b Jan 30 17:23:49.218838: | 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:49.218844: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:49.218850: | **parse ISAKMP Message: Jan 30 17:23:49.218854: | initiator cookie: Jan 30 17:23:49.218858: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:49.218862: | responder cookie: Jan 30 17:23:49.218865: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.218869: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:49.218873: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:49.218877: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:49.218881: | flags: none (0x0) Jan 30 17:23:49.218885: | message ID: 00 00 00 00 Jan 30 17:23:49.218889: | length: 380 (0x17c) Jan 30 17:23:49.218893: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:49.218902: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:49.218907: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:49.218911: | v1 state object #1 found, in STATE_MAIN_I2 Jan 30 17:23:49.218917: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:49.218921: | #1 is idle Jan 30 17:23:49.218925: | #1 idle Jan 30 17:23:49.218930: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Jan 30 17:23:49.218946: | ***parse ISAKMP Key Exchange Payload: Jan 30 17:23:49.218951: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:49.218954: | length: 260 (0x104) Jan 30 17:23:49.218958: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Jan 30 17:23:49.218962: | ***parse ISAKMP Nonce Payload: Jan 30 17:23:49.218966: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:49.218970: | length: 20 (0x14) Jan 30 17:23:49.218974: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:49.218978: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:49.218981: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:49.218985: | length: 36 (0x24) Jan 30 17:23:49.218989: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:49.218992: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:49.218996: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:49.218999: | length: 36 (0x24) Jan 30 17:23:49.219008: | started looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:49.219012: | actually looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:49.219018: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:49.219021: | no Preshared Key Found Jan 30 17:23:49.219029: | adding aggr outR1 DH work-order 5 for state #1 Jan 30 17:23:49.219033: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:23:49.219039: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:49.219044: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:49.219050: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:49.219058: | backlog: inserting object 0x556c11a2f448 (work-order 5 state #1) entry 0x556c11a2f450 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:49.219063: | backlog: inserted object 0x556c11a2f448 (work-order 5 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:49.219067: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2f450 newer 0x556c11a2f450) Jan 30 17:23:49.219076: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:49.219081: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:49.219085: | suspending state #1 and saving MD Jan 30 17:23:49.219089: | #1 is busy; has a suspended MD Jan 30 17:23:49.219094: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:49.219098: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:49.219103: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:49.219106: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:49.219111: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:49.219122: | crypto helper 1 resuming Jan 30 17:23:49.219128: | backlog: removing object 0x556c11a2f448 (work-order 5 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:49.219132: | backlog: empty Jan 30 17:23:49.219137: | crypto helper 1 starting work-order 5 for state #1 Jan 30 17:23:49.219142: | crypto helper 1 doing compute dh+iv (V1 Phase 1); request ID 5 Jan 30 17:23:49.219937: | crypto helper 1 finished compute dh+iv (V1 Phase 1); request ID 5 time elapsed 794 usec Jan 30 17:23:49.219949: | crypto helper 1 sending results from work-order 5 for state #1 to event queue Jan 30 17:23:49.219953: | scheduling now-event sending helper answer for #1 Jan 30 17:23:49.219963: | crypto helper 1 waiting (nothing to do) Jan 30 17:23:49.219976: | executing now-event sending helper answer for 1 Jan 30 17:23:49.219981: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:49.219985: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:49.219991: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:49.219998: | crypto helper 1 replies to request ID 5 Jan 30 17:23:49.220002: | calling continuation function 0x556c0ff2df10 Jan 30 17:23:49.220007: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Jan 30 17:23:49.220018: | **emit ISAKMP Message: Jan 30 17:23:49.220023: | initiator cookie: Jan 30 17:23:49.220026: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:49.220030: | responder cookie: Jan 30 17:23:49.220033: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.220037: | next payload type: ISAKMP_NEXT_ID (0x5) Jan 30 17:23:49.220041: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:49.220045: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:49.220049: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Jan 30 17:23:49.220053: | message ID: 00 00 00 00 Jan 30 17:23:49.220057: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:49.220062: | thinking about whether to send my certificate: Jan 30 17:23:49.220067: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Jan 30 17:23:49.220071: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Jan 30 17:23:49.220074: | so do not send cert. Jan 30 17:23:49.220078: | I did not send a certificate because I do not have one. Jan 30 17:23:49.220081: | I am not sending a certificate request Jan 30 17:23:49.220085: | I will NOT send an initial contact payload Jan 30 17:23:49.220090: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal) Jan 30 17:23:49.220100: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:49.220105: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:49.220108: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.220112: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:49.220115: | natd_hash: port=500 Jan 30 17:23:49.220119: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:49.220123: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:49.220130: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:49.220134: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:49.220137: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.220141: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:49.220144: | natd_hash: port=500 Jan 30 17:23:49.220148: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:49.220152: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:49.220155: | expected NAT-D(me): d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:49.220159: | expected NAT-D(me): 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:49.220163: | expected NAT-D(him): Jan 30 17:23:49.220166: | a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:49.220170: | 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:49.220173: | received NAT-D: d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:49.220177: | received NAT-D: 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:49.220181: | received NAT-D: a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:49.220185: | received NAT-D: 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:49.220189: | NAT_TRAVERSAL encaps using auto-detect Jan 30 17:23:49.220192: | NAT_TRAVERSAL this end is NOT behind NAT Jan 30 17:23:49.220196: | NAT_TRAVERSAL that end is NOT behind NAT Jan 30 17:23:49.220200: | NAT_TRAVERSAL nat_keepalive enabled Jan 30 17:23:49.220204: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Jan 30 17:23:49.220207: | NAT_T_WITH_KA detected Jan 30 17:23:49.220212: | ***emit ISAKMP Identification Payload (IPsec DOI): Jan 30 17:23:49.220216: | next payload type: ISAKMP_NEXT_SIG (0x9) Jan 30 17:23:49.220219: | ID type: ID_FQDN (0x2) Jan 30 17:23:49.220223: | Protocol ID: 0 (0x0) Jan 30 17:23:49.220229: | port: 0 (0x0) Jan 30 17:23:49.220233: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Jan 30 17:23:49.220237: | my identity 77 65 73 74 Jan 30 17:23:49.220241: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Jan 30 17:23:49.220267: | started looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:49.220272: | actually looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:49.220277: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:49.220281: "lagu_tunnel" #1: unable to locate my private key for RSA Signature Jan 30 17:23:49.220294: | complete v1 state transition with AUTHENTICATION_FAILED Jan 30 17:23:49.220300: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:49.220304: | #1 is idle Jan 30 17:23:49.220314: "lagu_tunnel" #1: sending notification AUTHENTICATION_FAILED to :500 Jan 30 17:23:49.220321: | **emit ISAKMP Message: Jan 30 17:23:49.220324: | initiator cookie: Jan 30 17:23:49.220328: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:49.220331: | responder cookie: Jan 30 17:23:49.220335: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.220339: | next payload type: ISAKMP_NEXT_N (0xb) Jan 30 17:23:49.220342: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:49.220346: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 30 17:23:49.220350: | flags: none (0x0) Jan 30 17:23:49.220355: | message ID: 00 00 00 00 Jan 30 17:23:49.220361: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:49.220367: | ***emit ISAKMP Notification Payload: Jan 30 17:23:49.220373: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:49.220379: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:49.220384: | protocol ID: 1 (0x1) Jan 30 17:23:49.220390: | SPI size: 0 (0x0) Jan 30 17:23:49.220394: | Notify Message Type: AUTHENTICATION_FAILED (0x18) Jan 30 17:23:49.220398: | emitting length of ISAKMP Notification Payload: 12 Jan 30 17:23:49.220402: | emitting length of ISAKMP Message: 40 Jan 30 17:23:49.220408: | sending 40 bytes for notification packet through eth1:500 to :500 (using #1) Jan 30 17:23:49.220412: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:49.220415: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Jan 30 17:23:49.220419: | 00 00 00 01 01 00 00 18 Jan 30 17:23:49.220458: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Jan 30 17:23:49.220468: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:49.220473: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:49.220476: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:51.220600: | *received 380 bytes from :500 on eth1 (port=500) Jan 30 17:23:51.220631: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.220641: | 04 10 02 00 00 00 00 00 00 00 01 7c 0a 00 01 04 Jan 30 17:23:51.220645: | 7b c4 a6 5b 1e 75 dc 02 6d c1 61 07 2b cf 2f 07 Jan 30 17:23:51.220649: | 42 e9 4d fc 43 7a df 65 c2 1f 3a 7d 9d e2 dc e8 Jan 30 17:23:51.220653: | 25 53 1a 61 82 d8 67 a2 05 b2 b0 dd 69 12 4a ef Jan 30 17:23:51.220657: | dd 7e 18 cc 75 67 a0 11 07 70 85 44 2f e3 49 16 Jan 30 17:23:51.220660: | d5 73 90 c3 1c e4 7a d8 88 e5 c9 63 bb e5 e8 fc Jan 30 17:23:51.220664: | b2 cc 3a e2 75 3a 20 99 1b 0b 60 22 d2 e9 4d 92 Jan 30 17:23:51.220668: | 2f 19 cc 20 5e 3f c6 4b 27 82 ce 2f 23 a5 94 e3 Jan 30 17:23:51.220672: | 07 1a e0 29 12 f8 84 aa 30 59 7f cd c0 68 36 0f Jan 30 17:23:51.220675: | 17 ad 95 85 3c f4 a8 27 e1 51 6e 83 bd 3a 0e 74 Jan 30 17:23:51.220679: | 53 ba b0 57 db 50 a9 ca a8 66 3c d9 25 d2 8b 17 Jan 30 17:23:51.220683: | 54 06 b6 c3 a9 dd 87 3d 96 2f e9 46 16 09 e3 e5 Jan 30 17:23:51.220686: | 14 97 7f c0 a3 a6 d2 22 88 fa fc 03 fc ed ac ac Jan 30 17:23:51.220698: | 02 02 c3 38 8a 83 d8 ad cb e2 1e 19 08 12 b9 bb Jan 30 17:23:51.220702: | 9f 3f 68 d2 e0 bf 66 fa 36 47 31 e2 2c 52 fa 6f Jan 30 17:23:51.220706: | db 61 3c f4 c8 e7 59 b9 2b e6 88 fd b0 82 f7 23 Jan 30 17:23:51.220710: | 37 09 fe 8f 60 94 24 08 00 99 ac 19 08 fe f7 ee Jan 30 17:23:51.220713: | 14 00 00 14 04 ce 23 6a c8 e1 58 e7 7d ca 10 57 Jan 30 17:23:51.220717: | ed 41 da 57 14 00 00 24 d2 8f c9 5d fb 96 f5 cf Jan 30 17:23:51.220721: | 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 d8 0e 2a 51 Jan 30 17:23:51.220724: | e0 12 cf be 5f 24 97 f7 00 00 00 24 a5 4d 3e 63 Jan 30 17:23:51.220728: | ce b2 f2 75 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b Jan 30 17:23:51.220732: | 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:51.220738: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:51.220744: | **parse ISAKMP Message: Jan 30 17:23:51.220749: | initiator cookie: Jan 30 17:23:51.220752: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:51.220756: | responder cookie: Jan 30 17:23:51.220760: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.220764: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:51.220768: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:51.220772: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:51.220776: | flags: none (0x0) Jan 30 17:23:51.220780: | message ID: 00 00 00 00 Jan 30 17:23:51.220784: | length: 380 (0x17c) Jan 30 17:23:51.220788: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:51.220797: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:51.220802: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:51.220807: | v1 state object #1 found, in STATE_MAIN_I2 Jan 30 17:23:51.220813: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:51.220817: | #1 is idle Jan 30 17:23:51.220821: | #1 idle Jan 30 17:23:51.220825: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Jan 30 17:23:51.220830: | ***parse ISAKMP Key Exchange Payload: Jan 30 17:23:51.220834: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:51.220837: | length: 260 (0x104) Jan 30 17:23:51.220841: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Jan 30 17:23:51.220845: | ***parse ISAKMP Nonce Payload: Jan 30 17:23:51.220849: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:51.220853: | length: 20 (0x14) Jan 30 17:23:51.220857: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:51.220861: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:51.220864: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:51.220868: | length: 36 (0x24) Jan 30 17:23:51.220872: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:51.220876: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:51.220879: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:51.220883: | length: 36 (0x24) Jan 30 17:23:51.220891: | started looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:51.220896: | actually looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:51.220902: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:51.220905: | no Preshared Key Found Jan 30 17:23:51.220913: | adding aggr outR1 DH work-order 6 for state #1 Jan 30 17:23:51.220917: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:23:51.220923: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:51.220927: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:51.220934: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:51.220941: | backlog: inserting object 0x556c11a2f448 (work-order 6 state #1) entry 0x556c11a2f450 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:51.220949: | backlog: inserted object 0x556c11a2f448 (work-order 6 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:51.220953: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2f450 newer 0x556c11a2f450) Jan 30 17:23:51.220962: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:51.220967: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:51.220972: | suspending state #1 and saving MD Jan 30 17:23:51.220975: | #1 is busy; has a suspended MD Jan 30 17:23:51.220980: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:51.220985: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:51.220989: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:51.220993: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:51.220997: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:51.221010: | crypto helper 2 resuming Jan 30 17:23:51.221016: | backlog: removing object 0x556c11a2f448 (work-order 6 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:51.221020: | backlog: empty Jan 30 17:23:51.221025: | crypto helper 2 starting work-order 6 for state #1 Jan 30 17:23:51.221030: | crypto helper 2 doing compute dh+iv (V1 Phase 1); request ID 6 Jan 30 17:23:51.221835: | crypto helper 2 finished compute dh+iv (V1 Phase 1); request ID 6 time elapsed 804 usec Jan 30 17:23:51.221847: | crypto helper 2 sending results from work-order 6 for state #1 to event queue Jan 30 17:23:51.221851: | scheduling now-event sending helper answer for #1 Jan 30 17:23:51.221862: | crypto helper 2 waiting (nothing to do) Jan 30 17:23:51.221874: | executing now-event sending helper answer for 1 Jan 30 17:23:51.221879: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:51.221883: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:51.221889: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:51.221893: | crypto helper 2 replies to request ID 6 Jan 30 17:23:51.221896: | calling continuation function 0x556c0ff2df10 Jan 30 17:23:51.221900: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Jan 30 17:23:51.221913: | **emit ISAKMP Message: Jan 30 17:23:51.221917: | initiator cookie: Jan 30 17:23:51.221921: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:51.221925: | responder cookie: Jan 30 17:23:51.221928: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.221932: | next payload type: ISAKMP_NEXT_ID (0x5) Jan 30 17:23:51.221936: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:51.221940: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:51.221944: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Jan 30 17:23:51.221948: | message ID: 00 00 00 00 Jan 30 17:23:51.221952: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:51.221957: | thinking about whether to send my certificate: Jan 30 17:23:51.221961: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Jan 30 17:23:51.221965: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Jan 30 17:23:51.221969: | so do not send cert. Jan 30 17:23:51.221972: | I did not send a certificate because I do not have one. Jan 30 17:23:51.221976: | I am not sending a certificate request Jan 30 17:23:51.221980: | I will NOT send an initial contact payload Jan 30 17:23:51.221984: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal) Jan 30 17:23:51.221996: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:51.222001: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:51.222004: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.222008: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:51.222012: | natd_hash: port=500 Jan 30 17:23:51.222018: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:51.222022: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:51.222030: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:51.222034: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:51.222038: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.222041: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:51.222045: | natd_hash: port=500 Jan 30 17:23:51.222048: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:51.222052: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:51.222056: | expected NAT-D(me): d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:51.222060: | expected NAT-D(me): 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:51.222063: | expected NAT-D(him): Jan 30 17:23:51.222067: | a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:51.222070: | 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:51.222074: | received NAT-D: d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:51.222078: | received NAT-D: 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:51.222082: | received NAT-D: a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:51.222085: | received NAT-D: 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:51.222089: | NAT_TRAVERSAL encaps using auto-detect Jan 30 17:23:51.222093: | NAT_TRAVERSAL this end is NOT behind NAT Jan 30 17:23:51.222096: | NAT_TRAVERSAL that end is NOT behind NAT Jan 30 17:23:51.222100: | NAT_TRAVERSAL nat_keepalive enabled Jan 30 17:23:51.222105: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Jan 30 17:23:51.222108: | NAT_T_WITH_KA detected Jan 30 17:23:51.222112: | ***emit ISAKMP Identification Payload (IPsec DOI): Jan 30 17:23:51.222116: | next payload type: ISAKMP_NEXT_SIG (0x9) Jan 30 17:23:51.222120: | ID type: ID_FQDN (0x2) Jan 30 17:23:51.222124: | Protocol ID: 0 (0x0) Jan 30 17:23:51.222127: | port: 0 (0x0) Jan 30 17:23:51.222132: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Jan 30 17:23:51.222135: | my identity 77 65 73 74 Jan 30 17:23:51.222139: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Jan 30 17:23:51.222165: | started looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:51.222174: | actually looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:51.222181: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:51.222187: "lagu_tunnel" #1: unable to locate my private key for RSA Signature Jan 30 17:23:51.222203: | complete v1 state transition with AUTHENTICATION_FAILED Jan 30 17:23:51.222210: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:51.222213: | #1 is idle Jan 30 17:23:51.222223: "lagu_tunnel" #1: sending notification AUTHENTICATION_FAILED to :500 Jan 30 17:23:51.222230: | **emit ISAKMP Message: Jan 30 17:23:51.222234: | initiator cookie: Jan 30 17:23:51.222237: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:51.222241: | responder cookie: Jan 30 17:23:51.222244: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.222248: | next payload type: ISAKMP_NEXT_N (0xb) Jan 30 17:23:51.222252: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:51.222256: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 30 17:23:51.222259: | flags: none (0x0) Jan 30 17:23:51.222263: | message ID: 00 00 00 00 Jan 30 17:23:51.222267: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:51.222271: | ***emit ISAKMP Notification Payload: Jan 30 17:23:51.222275: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:51.222278: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:51.222282: | protocol ID: 1 (0x1) Jan 30 17:23:51.222288: | SPI size: 0 (0x0) Jan 30 17:23:51.222292: | Notify Message Type: AUTHENTICATION_FAILED (0x18) Jan 30 17:23:51.222296: | emitting length of ISAKMP Notification Payload: 12 Jan 30 17:23:51.222300: | emitting length of ISAKMP Message: 40 Jan 30 17:23:51.222306: | sending 40 bytes for notification packet through eth1:500 to :500 (using #1) Jan 30 17:23:51.222310: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:51.222314: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Jan 30 17:23:51.222317: | 00 00 00 01 01 00 00 18 Jan 30 17:23:51.222350: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Jan 30 17:23:51.222359: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:51.222364: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:51.222367: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:55.225654: | *received 380 bytes from :500 on eth1 (port=500) Jan 30 17:23:55.225684: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.225689: | 04 10 02 00 00 00 00 00 00 00 01 7c 0a 00 01 04 Jan 30 17:23:55.225693: | 7b c4 a6 5b 1e 75 dc 02 6d c1 61 07 2b cf 2f 07 Jan 30 17:23:55.225696: | 42 e9 4d fc 43 7a df 65 c2 1f 3a 7d 9d e2 dc e8 Jan 30 17:23:55.225700: | 25 53 1a 61 82 d8 67 a2 05 b2 b0 dd 69 12 4a ef Jan 30 17:23:55.225703: | dd 7e 18 cc 75 67 a0 11 07 70 85 44 2f e3 49 16 Jan 30 17:23:55.225707: | d5 73 90 c3 1c e4 7a d8 88 e5 c9 63 bb e5 e8 fc Jan 30 17:23:55.225711: | b2 cc 3a e2 75 3a 20 99 1b 0b 60 22 d2 e9 4d 92 Jan 30 17:23:55.225715: | 2f 19 cc 20 5e 3f c6 4b 27 82 ce 2f 23 a5 94 e3 Jan 30 17:23:55.225718: | 07 1a e0 29 12 f8 84 aa 30 59 7f cd c0 68 36 0f Jan 30 17:23:55.225722: | 17 ad 95 85 3c f4 a8 27 e1 51 6e 83 bd 3a 0e 74 Jan 30 17:23:55.225725: | 53 ba b0 57 db 50 a9 ca a8 66 3c d9 25 d2 8b 17 Jan 30 17:23:55.225729: | 54 06 b6 c3 a9 dd 87 3d 96 2f e9 46 16 09 e3 e5 Jan 30 17:23:55.225733: | 14 97 7f c0 a3 a6 d2 22 88 fa fc 03 fc ed ac ac Jan 30 17:23:55.225736: | 02 02 c3 38 8a 83 d8 ad cb e2 1e 19 08 12 b9 bb Jan 30 17:23:55.225740: | 9f 3f 68 d2 e0 bf 66 fa 36 47 31 e2 2c 52 fa 6f Jan 30 17:23:55.225743: | db 61 3c f4 c8 e7 59 b9 2b e6 88 fd b0 82 f7 23 Jan 30 17:23:55.225747: | 37 09 fe 8f 60 94 24 08 00 99 ac 19 08 fe f7 ee Jan 30 17:23:55.225750: | 14 00 00 14 04 ce 23 6a c8 e1 58 e7 7d ca 10 57 Jan 30 17:23:55.225754: | ed 41 da 57 14 00 00 24 d2 8f c9 5d fb 96 f5 cf Jan 30 17:23:55.225758: | 79 76 1c 4e 10 34 dd 50 8f 12 e2 26 d8 0e 2a 51 Jan 30 17:23:55.225761: | e0 12 cf be 5f 24 97 f7 00 00 00 24 a5 4d 3e 63 Jan 30 17:23:55.225765: | ce b2 f2 75 4f 52 94 2c 8c 56 57 1c 54 0a fb 2b Jan 30 17:23:55.225768: | 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:55.225774: | processing: start from :500 (in process_md() at demux.c:392) Jan 30 17:23:55.225781: | **parse ISAKMP Message: Jan 30 17:23:55.225785: | initiator cookie: Jan 30 17:23:55.225788: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:55.225792: | responder cookie: Jan 30 17:23:55.225795: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.225800: | next payload type: ISAKMP_NEXT_KE (0x4) Jan 30 17:23:55.225804: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:55.225808: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:55.225812: | flags: none (0x0) Jan 30 17:23:55.225816: | message ID: 00 00 00 00 Jan 30 17:23:55.225819: | length: 380 (0x17c) Jan 30 17:23:55.225824: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Jan 30 17:23:55.225832: | cookies table: hash icookie 7c b4 85 05 b9 af 11 33 rcookie ad 96 88 f0 b0 74 5e 9f to 14459572626601698814 slot 0x556c1021d860 Jan 30 17:23:55.225837: | v1 peer and cookies match on #1, provided msgid 00000000 == 00000000 Jan 30 17:23:55.225841: | v1 state object #1 found, in STATE_MAIN_I2 Jan 30 17:23:55.225855: | processing: start state #1 connection "lagu_tunnel" :8080 (in process_v1_packet() at ikev1.c:1117) Jan 30 17:23:55.225860: | #1 is idle Jan 30 17:23:55.225863: | #1 idle Jan 30 17:23:55.225868: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410opt: 0x102080 Jan 30 17:23:55.225872: | ***parse ISAKMP Key Exchange Payload: Jan 30 17:23:55.225876: | next payload type: ISAKMP_NEXT_NONCE (0xa) Jan 30 17:23:55.225880: | length: 260 (0x104) Jan 30 17:23:55.225883: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400opt: 0x102080 Jan 30 17:23:55.225887: | ***parse ISAKMP Nonce Payload: Jan 30 17:23:55.225891: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:55.225895: | length: 20 (0x14) Jan 30 17:23:55.225899: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:55.225903: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:55.225906: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Jan 30 17:23:55.225910: | length: 36 (0x24) Jan 30 17:23:55.225914: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0opt: 0x102080 Jan 30 17:23:55.225917: | ***parse ISAKMP NAT-D Payload: Jan 30 17:23:55.225921: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:55.225925: | length: 36 (0x24) Jan 30 17:23:55.225933: | started looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:55.225937: | actually looking for secret for @west->@east of kind PKK_PSK Jan 30 17:23:55.225943: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:55.225947: | no Preshared Key Found Jan 30 17:23:55.225953: | adding aggr outR1 DH work-order 7 for state #1 Jan 30 17:23:55.225958: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:23:55.225964: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:55.225972: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:23:55.225981: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 Jan 30 17:23:55.225993: | backlog: inserting object 0x556c11a2f448 (work-order 7 state #1) entry 0x556c11a2f450 into list 0x556c1022ffc0 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:55.226007: | backlog: inserted object 0x556c11a2f448 (work-order 7 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:55.226022: | backlog: list entry 0x556c1022ffc0 is HEAD (older 0x556c11a2f450 newer 0x556c11a2f450) Jan 30 17:23:55.226039: | complete v1 state transition with STF_SUSPEND Jan 30 17:23:55.226053: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2272) Jan 30 17:23:55.226063: | suspending state #1 and saving MD Jan 30 17:23:55.226070: | #1 is busy; has a suspended MD Jan 30 17:23:55.226081: | processing: stop from :500 (BACKGROUND) (in process_md() at demux.c:394) Jan 30 17:23:55.226093: | processing: stop state #1 connection "lagu_tunnel" :8080 (in process_md() at demux.c:396) Jan 30 17:23:55.226098: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:55.226102: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:55.226109: | processing: STOP connection NULL (in process_md() at demux.c:397) Jan 30 17:23:55.226128: | crypto helper 3 resuming Jan 30 17:23:55.226138: | backlog: removing object 0x556c11a2f448 (work-order 7 state #1) entry 0x556c11a2f450 (older 0x556c1022ffc0 newer 0x556c1022ffc0) Jan 30 17:23:55.226142: | backlog: empty Jan 30 17:23:55.226148: | crypto helper 3 starting work-order 7 for state #1 Jan 30 17:23:55.226155: | crypto helper 3 doing compute dh+iv (V1 Phase 1); request ID 7 Jan 30 17:23:55.226938: | crypto helper 3 finished compute dh+iv (V1 Phase 1); request ID 7 time elapsed 783 usec Jan 30 17:23:55.226950: | crypto helper 3 sending results from work-order 7 for state #1 to event queue Jan 30 17:23:55.226955: | scheduling now-event sending helper answer for #1 Jan 30 17:23:55.226965: | crypto helper 3 waiting (nothing to do) Jan 30 17:23:55.226987: | executing now-event sending helper answer for 1 Jan 30 17:23:55.226993: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:55.226996: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:23:55.227002: | processing: start state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:594) Jan 30 17:23:55.227006: | crypto helper 3 replies to request ID 7 Jan 30 17:23:55.227010: | calling continuation function 0x556c0ff2df10 Jan 30 17:23:55.227014: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Jan 30 17:23:55.227026: | **emit ISAKMP Message: Jan 30 17:23:55.227031: | initiator cookie: Jan 30 17:23:55.227034: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:55.227038: | responder cookie: Jan 30 17:23:55.227041: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.227045: | next payload type: ISAKMP_NEXT_ID (0x5) Jan 30 17:23:55.227049: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:55.227053: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Jan 30 17:23:55.227057: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Jan 30 17:23:55.227061: | message ID: 00 00 00 00 Jan 30 17:23:55.227065: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:55.227070: | thinking about whether to send my certificate: Jan 30 17:23:55.227074: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? Jan 30 17:23:55.227078: | sendcert: CERT_ALWAYSSEND and I did not get a certificate request Jan 30 17:23:55.227082: | so do not send cert. Jan 30 17:23:55.227086: | I did not send a certificate because I do not have one. Jan 30 17:23:55.227089: | I am not sending a certificate request Jan 30 17:23:55.227093: | I will NOT send an initial contact payload Jan 30 17:23:55.227098: | checking NAT-T: enabled and RFC 3947 (NAT-Traversal) Jan 30 17:23:55.227108: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:55.227113: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:55.227117: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.227120: | natd_hash: ip= 0a b7 80 2d Jan 30 17:23:55.227124: | natd_hash: port=500 Jan 30 17:23:55.227128: | natd_hash: hash= d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:55.227131: | natd_hash: hash= 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:55.227138: | natd_hash: hasher=0x556c1020ec20(32) Jan 30 17:23:55.227142: | natd_hash: icookie= 7c b4 85 05 b9 af 11 33 Jan 30 17:23:55.227146: | natd_hash: rcookie= ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.227149: | natd_hash: ip= 0a 98 77 3c Jan 30 17:23:55.227169: | natd_hash: port=500 Jan 30 17:23:55.227177: | natd_hash: hash= a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:55.227183: | natd_hash: hash= 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:55.227188: | expected NAT-D(me): d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:55.227194: | expected NAT-D(me): 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:55.227199: | expected NAT-D(him): Jan 30 17:23:55.227205: | a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:55.227210: | 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:55.227216: | received NAT-D: d2 8f c9 5d fb 96 f5 cf 79 76 1c 4e 10 34 dd 50 Jan 30 17:23:55.227221: | received NAT-D: 8f 12 e2 26 d8 0e 2a 51 e0 12 cf be 5f 24 97 f7 Jan 30 17:23:55.227227: | received NAT-D: a5 4d 3e 63 ce b2 f2 75 4f 52 94 2c 8c 56 57 1c Jan 30 17:23:55.227233: | received NAT-D: 54 0a fb 2b 99 f8 f6 d2 b9 ff d9 69 2b f0 0c 1d Jan 30 17:23:55.227239: | NAT_TRAVERSAL encaps using auto-detect Jan 30 17:23:55.227244: | NAT_TRAVERSAL this end is NOT behind NAT Jan 30 17:23:55.227249: | NAT_TRAVERSAL that end is NOT behind NAT Jan 30 17:23:55.227254: | NAT_TRAVERSAL nat_keepalive enabled Jan 30 17:23:55.227260: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Jan 30 17:23:55.227266: | NAT_T_WITH_KA detected Jan 30 17:23:55.227275: | ***emit ISAKMP Identification Payload (IPsec DOI): Jan 30 17:23:55.227281: | next payload type: ISAKMP_NEXT_SIG (0x9) Jan 30 17:23:55.227286: | ID type: ID_FQDN (0x2) Jan 30 17:23:55.227292: | Protocol ID: 0 (0x0) Jan 30 17:23:55.227297: | port: 0 (0x0) Jan 30 17:23:55.227303: | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Jan 30 17:23:55.227308: | my identity 77 65 73 74 Jan 30 17:23:55.227314: | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 Jan 30 17:23:55.227357: | started looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:55.227365: | actually looking for secret for @west->@east of kind PKK_RSA Jan 30 17:23:55.227372: | concluding with best_match=0 best=(nil) (lineno=-1) Jan 30 17:23:55.227379: "lagu_tunnel" #1: unable to locate my private key for RSA Signature Jan 30 17:23:55.227395: | complete v1 state transition with AUTHENTICATION_FAILED Jan 30 17:23:55.227403: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in complete_v1_state_transition() at ikev1.c:2297) Jan 30 17:23:55.227408: | #1 is idle Jan 30 17:23:55.227422: "lagu_tunnel" #1: sending notification AUTHENTICATION_FAILED to :500 Jan 30 17:23:55.227430: | **emit ISAKMP Message: Jan 30 17:23:55.227436: | initiator cookie: Jan 30 17:23:55.227441: | 7c b4 85 05 b9 af 11 33 Jan 30 17:23:55.227446: | responder cookie: Jan 30 17:23:55.227451: | ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.227457: | next payload type: ISAKMP_NEXT_N (0xb) Jan 30 17:23:55.227462: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Jan 30 17:23:55.227468: | exchange type: ISAKMP_XCHG_INFO (0x5) Jan 30 17:23:55.227473: | flags: none (0x0) Jan 30 17:23:55.227478: | message ID: 00 00 00 00 Jan 30 17:23:55.227484: | next payload type: saving message location 'ISAKMP Message' 'next payload type' Jan 30 17:23:55.227490: | ***emit ISAKMP Notification Payload: Jan 30 17:23:55.227495: | next payload type: ISAKMP_NEXT_NONE (0x0) Jan 30 17:23:55.227501: | DOI: ISAKMP_DOI_IPSEC (0x1) Jan 30 17:23:55.227506: | protocol ID: 1 (0x1) Jan 30 17:23:55.227511: | SPI size: 0 (0x0) Jan 30 17:23:55.227517: | Notify Message Type: AUTHENTICATION_FAILED (0x18) Jan 30 17:23:55.227523: | emitting length of ISAKMP Notification Payload: 12 Jan 30 17:23:55.227528: | emitting length of ISAKMP Message: 40 Jan 30 17:23:55.227536: | sending 40 bytes for notification packet through eth1:500 to :500 (using #1) Jan 30 17:23:55.227542: | 7c b4 85 05 b9 af 11 33 ad 96 88 f0 b0 74 5e 9f Jan 30 17:23:55.227547: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Jan 30 17:23:55.227552: | 00 00 00 01 01 00 00 18 Jan 30 17:23:55.227610: | state transition function for STATE_MAIN_I2 failed: AUTHENTICATION_FAILED Jan 30 17:23:55.227651: | processing: stop state #1 connection "lagu_tunnel" :8080 (in schedule_event_now_cb() at server.c:597) Jan 30 17:23:55.227659: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:23:55.227663: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:24:00.355834: | timer_event_cb: processing event@0x556c11a2be98 Jan 30 17:24:00.355876: | handling event EVENT_SHUNT_SCAN Jan 30 17:24:00.355885: | expiring aged bare shunts from shunt table Jan 30 17:24:00.355894: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:24:00.355904: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:24:00.355917: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2be98 Jan 30 17:24:07.220598: | timer_event_cb: processing event@0x556c11a2d368 Jan 30 17:24:07.220628: | handling event EVENT_NAT_T_KEEPALIVE Jan 30 17:24:07.220639: | processing: start state #1 connection "lagu_tunnel" :8080 (in for_each_state() at state.c:1614) Jan 30 17:24:07.220644: | Sending of NAT-T KEEP-ALIVE enabled by per-conn configuration (nat_keepalive=yes) Jan 30 17:24:07.220649: | processing: stop state #1 connection "lagu_tunnel" :8080 (in for_each_state() at state.c:1614) Jan 30 17:24:07.220662: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:24:07.220667: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:24:07.220674: | free_event_entry: release EVENT_NAT_T_KEEPALIVE-pe@0x556c11a2d368 Jan 30 17:24:10.848996: | processing: start connection "lagu_tunnel" (in terminate_a_connection() at terminate.c:71) Jan 30 17:24:10.849014: "lagu_tunnel": terminating SAs using this connection Jan 30 17:24:10.849028: | removing pending policy for no connection {0x556c11a1e238} Jan 30 17:24:10.849035: | connection not shared - terminating IKE and IPsec SA Jan 30 17:24:10.849040: | Deleting states for connection - not including other IPsec SA's Jan 30 17:24:10.849050: | pass 0 Jan 30 17:24:10.849055: | state #1 Jan 30 17:24:10.849062: | processing: suspend connection "lagu_tunnel" (in foreach_state_by_connection_func_delete() at state.c:1335) Jan 30 17:24:10.849071: | processing: start state #1 connection "lagu_tunnel" :8080 (in foreach_state_by_connection_func_delete() at state.c:1335) Jan 30 17:24:10.849079: | processing: [RE]START state #1 connection "lagu_tunnel" :8080 (in delete_state() at state.c:980) Jan 30 17:24:10.849086: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:24:10.849091: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:24:10.849097: "lagu_tunnel" #1: deleting state (STATE_MAIN_I2) and NOT sending notification Jan 30 17:24:10.849107: | parent state #1: STATE_MAIN_I2(open-ike) => delete Jan 30 17:24:10.849113: | state #1 requesting N/A-pe@(nil) be deleted Jan 30 17:24:10.849118: | delete_pluto_event cannot delete NULL event Jan 30 17:24:10.849123: | state #1 requesting N/A-pe@(nil) be deleted Jan 30 17:24:10.849128: | delete_pluto_event cannot delete NULL event Jan 30 17:24:10.849133: | state #1 requesting N/A-pe@(nil) be deleted Jan 30 17:24:10.849138: | delete_pluto_event cannot delete NULL event Jan 30 17:24:10.849144: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Jan 30 17:24:10.849151: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556c11a2d588 Jan 30 17:24:10.849159: | serialno list: removing object 0x556c11a2c518 (state #1) entry 0x556c11a2ccc0 (older 0x556c1022f0c0 newer 0x556c1022f0c0) Jan 30 17:24:10.849164: | serialno list: empty Jan 30 17:24:10.849170: | serialno table: removing object 0x556c11a2c518 (state #1) entry 0x556c11a2cce0 (older 0x556c10222000 newer 0x556c10222000) Jan 30 17:24:10.849175: | serialno table: empty Jan 30 17:24:10.849181: | in connection_discard for connection lagu_tunnel Jan 30 17:24:10.849187: | parent state #1: STATE_MAIN_I2(open-ike) => STATE_UNDEFINED(ignore) Jan 30 17:24:10.849192: | ignore states: 0 Jan 30 17:24:10.849197: | half-open-ike states: 0 Jan 30 17:24:10.849202: | open-ike states: 0 Jan 30 17:24:10.849207: | established-anonymous-ike states: 0 Jan 30 17:24:10.849212: | established-authenticated-ike states: 0 Jan 30 17:24:10.849217: | anonymous-ipsec states: 0 Jan 30 17:24:10.849222: | authenticated-ipsec states: 0 Jan 30 17:24:10.849227: | informational states: 0 Jan 30 17:24:10.849232: | unknown states: 0 Jan 30 17:24:10.849237: | category states: 0 count states: 0 Jan 30 17:24:10.849289: | processing: stop state #1 :8080 (in delete_state() at state.c:1198) Jan 30 17:24:10.849298: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:24:10.849303: | serialno table: hash serialno #1 to head 0x556c10222000 Jan 30 17:24:10.849309: | processing: resume connection "lagu_tunnel" (in delete_state() at state.c:1198) Jan 30 17:24:10.849338: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1335) Jan 30 17:24:10.849345: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:24:10.849351: | serialno table: hash serialno #0 to head 0x556c10221fe0 Jan 30 17:24:10.849356: | processing: resume connection "lagu_tunnel" (in foreach_state_by_connection_func_delete() at state.c:1335) Jan 30 17:24:10.849361: | pass 1 Jan 30 17:24:10.849371: | processing: stop connection "lagu_tunnel" (in terminate_a_connection() at terminate.c:88) Jan 30 17:24:15.572954: | processing: start connection "lagu_tunnel" (in delete_connection() at connections.c:264) Jan 30 17:24:15.572970: "lagu_tunnel": deleting non-instance connection Jan 30 17:24:15.572981: | Deleting states for connection - not including other IPsec SA's Jan 30 17:24:15.572989: | pass 0 Jan 30 17:24:15.572994: | pass 1 Jan 30 17:24:15.573004: | processing: stop connection "lagu_tunnel" (in delete_connection() at connections.c:314) Jan 30 17:24:20.265765: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:24:20.265810: | handling event EVENT_PENDING_DDNS Jan 30 17:24:20.265821: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:24:20.265832: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:24:20.265842: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:24:20.265851: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:24:20.356975: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:24:20.357003: | handling event EVENT_SHUNT_SCAN Jan 30 17:24:20.357010: | expiring aged bare shunts from shunt table Jan 30 17:24:20.357017: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:24:20.357026: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:24:20.357036: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:24:40.377091: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:24:40.377128: | handling event EVENT_SHUNT_SCAN Jan 30 17:24:40.377135: | expiring aged bare shunts from shunt table Jan 30 17:24:40.377141: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:24:40.377150: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:24:40.377158: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:25:00.345760: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:25:00.345809: | handling event EVENT_SD_WATCHDOG Jan 30 17:25:00.345820: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:25:00.346430: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a10a18 Jan 30 17:25:00.346443: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:25:00.346459: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a288f8 Jan 30 17:25:00.378574: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:25:00.378599: | handling event EVENT_SHUNT_SCAN Jan 30 17:25:00.378607: | expiring aged bare shunts from shunt table Jan 30 17:25:00.378615: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:25:00.378623: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:25:00.378632: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:25:20.277716: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:25:20.277749: | handling event EVENT_PENDING_PHASE2 Jan 30 17:25:20.277758: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a2e8a8 Jan 30 17:25:20.277767: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:25:20.277776: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a10b18 Jan 30 17:25:20.277781: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:25:20.277785: | handling event EVENT_PENDING_DDNS Jan 30 17:25:20.277789: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:25:20.277794: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:25:20.277807: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:25:20.277812: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:25:20.378944: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:25:20.378973: | handling event EVENT_SHUNT_SCAN Jan 30 17:25:20.378979: | expiring aged bare shunts from shunt table Jan 30 17:25:20.378985: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:25:20.378999: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:25:20.379009: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:25:40.399051: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:25:40.399082: | handling event EVENT_SHUNT_SCAN Jan 30 17:25:40.399089: | expiring aged bare shunts from shunt table Jan 30 17:25:40.399095: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:25:40.399102: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:25:40.399110: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:26:00.401611: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:26:00.401659: | handling event EVENT_SHUNT_SCAN Jan 30 17:26:00.401668: | expiring aged bare shunts from shunt table Jan 30 17:26:00.401678: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:26:00.401688: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:26:00.401699: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:26:20.295985: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:26:20.296029: | handling event EVENT_PENDING_DDNS Jan 30 17:26:20.296042: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:26:20.296053: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:26:20.296063: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:26:20.296072: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:26:20.402230: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:26:20.402274: | handling event EVENT_SHUNT_SCAN Jan 30 17:26:20.402283: | expiring aged bare shunts from shunt table Jan 30 17:26:20.402293: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:26:20.402303: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:26:20.402314: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:26:40.360051: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:26:40.360097: | handling event EVENT_SD_WATCHDOG Jan 30 17:26:40.360106: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:26:40.360888: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2d588 Jan 30 17:26:40.360902: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:26:40.360914: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a10a18 Jan 30 17:26:40.404001: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:26:40.404020: | handling event EVENT_SHUNT_SCAN Jan 30 17:26:40.404027: | expiring aged bare shunts from shunt table Jan 30 17:26:40.404032: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:26:40.404039: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:26:40.404045: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:27:00.411608: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:27:00.411645: | handling event EVENT_SHUNT_SCAN Jan 30 17:27:00.411653: | expiring aged bare shunts from shunt table Jan 30 17:27:00.411659: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:27:00.411667: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:27:00.411677: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:27:20.282597: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:27:20.282632: | handling event EVENT_PENDING_PHASE2 Jan 30 17:27:20.282641: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a10a18 Jan 30 17:27:20.282649: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:27:20.282657: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a2e8a8 Jan 30 17:27:20.296736: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:27:20.296747: | handling event EVENT_PENDING_DDNS Jan 30 17:27:20.296752: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2e8a8 Jan 30 17:27:20.296759: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:27:20.296772: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:27:20.296778: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:27:20.411924: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:27:20.411952: | handling event EVENT_SHUNT_SCAN Jan 30 17:27:20.411958: | expiring aged bare shunts from shunt table Jan 30 17:27:20.411963: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:27:20.411971: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:27:20.411981: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:27:40.432043: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:27:40.432091: | handling event EVENT_SHUNT_SCAN Jan 30 17:27:40.432099: | expiring aged bare shunts from shunt table Jan 30 17:27:40.432105: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:27:40.432113: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:27:40.432121: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:28:00.432610: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:28:00.432657: | handling event EVENT_SHUNT_SCAN Jan 30 17:28:00.432677: | expiring aged bare shunts from shunt table Jan 30 17:28:00.432686: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:28:00.432697: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:28:00.432708: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:28:20.312614: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:28:20.312650: | handling event EVENT_PENDING_DDNS Jan 30 17:28:20.312664: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:28:20.312675: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:28:20.312682: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:28:20.312689: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2e8a8 Jan 30 17:28:20.360780: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:28:20.360804: | handling event EVENT_SD_WATCHDOG Jan 30 17:28:20.360811: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:28:20.360924: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2e8a8 Jan 30 17:28:20.360934: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:28:20.360942: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2d588 Jan 30 17:28:20.433071: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:28:20.433101: | handling event EVENT_SHUNT_SCAN Jan 30 17:28:20.433108: | expiring aged bare shunts from shunt table Jan 30 17:28:20.433114: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:28:20.433122: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:28:20.433131: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:28:40.438606: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:28:40.438642: | handling event EVENT_SHUNT_SCAN Jan 30 17:28:40.438649: | expiring aged bare shunts from shunt table Jan 30 17:28:40.438655: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:28:40.438663: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:28:40.438673: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:29:00.458717: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:29:00.458750: | handling event EVENT_SHUNT_SCAN Jan 30 17:29:00.458756: | expiring aged bare shunts from shunt table Jan 30 17:29:00.458762: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:29:00.458770: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:29:00.458782: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:29:20.302599: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:29:20.302633: | handling event EVENT_PENDING_PHASE2 Jan 30 17:29:20.302643: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a288f8 Jan 30 17:29:20.302662: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:29:20.302672: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a10a18 Jan 30 17:29:20.313753: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:29:20.313765: | handling event EVENT_PENDING_DDNS Jan 30 17:29:20.313771: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:29:20.313777: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:29:20.313783: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:29:20.313788: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:29:20.458973: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:29:20.459003: | handling event EVENT_SHUNT_SCAN Jan 30 17:29:20.459010: | expiring aged bare shunts from shunt table Jan 30 17:29:20.459016: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:29:20.459023: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:29:20.459032: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:29:40.462599: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:29:40.462633: | handling event EVENT_SHUNT_SCAN Jan 30 17:29:40.462640: | expiring aged bare shunts from shunt table Jan 30 17:29:40.462647: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:29:40.462654: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:29:40.462663: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:30:00.378422: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:30:00.378457: | handling event EVENT_SD_WATCHDOG Jan 30 17:30:00.378464: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:30:00.378554: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a10b18 Jan 30 17:30:00.378586: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:30:00.378597: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2e8a8 Jan 30 17:30:00.463740: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:30:00.463775: | handling event EVENT_SHUNT_SCAN Jan 30 17:30:00.463782: | expiring aged bare shunts from shunt table Jan 30 17:30:00.463788: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:30:00.463796: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:30:00.463805: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:30:20.321944: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:30:20.321988: | handling event EVENT_PENDING_DDNS Jan 30 17:30:20.322001: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:30:20.322012: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:30:20.322021: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:30:20.322029: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:30:20.464212: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:30:20.464245: | handling event EVENT_SHUNT_SCAN Jan 30 17:30:20.464254: | expiring aged bare shunts from shunt table Jan 30 17:30:20.464262: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:30:20.464272: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:30:20.464282: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:30:40.483600: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:30:40.483641: | handling event EVENT_SHUNT_SCAN Jan 30 17:30:40.483650: | expiring aged bare shunts from shunt table Jan 30 17:30:40.483658: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:30:40.483669: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:30:40.483680: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:31:00.500608: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:31:00.500651: | handling event EVENT_SHUNT_SCAN Jan 30 17:31:00.500660: | expiring aged bare shunts from shunt table Jan 30 17:31:00.500679: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:31:00.500690: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:31:00.500701: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:31:20.322578: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:31:20.322619: | handling event EVENT_PENDING_PHASE2 Jan 30 17:31:20.322633: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a2e8a8 Jan 30 17:31:20.322642: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:31:20.322651: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a288f8 Jan 30 17:31:20.322655: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:31:20.322659: | handling event EVENT_PENDING_DDNS Jan 30 17:31:20.322663: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:31:20.322669: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:31:20.322674: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:31:20.322678: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:31:20.501898: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:31:20.501932: | handling event EVENT_SHUNT_SCAN Jan 30 17:31:20.501939: | expiring aged bare shunts from shunt table Jan 30 17:31:20.501945: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:31:20.501952: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:31:20.501961: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:31:40.382599: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:31:40.382635: | handling event EVENT_SD_WATCHDOG Jan 30 17:31:40.382642: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:31:40.383336: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a10a18 Jan 30 17:31:40.383349: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:31:40.383359: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a10b18 Jan 30 17:31:40.503511: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:31:40.503532: | handling event EVENT_SHUNT_SCAN Jan 30 17:31:40.503538: | expiring aged bare shunts from shunt table Jan 30 17:31:40.503544: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:31:40.503551: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:31:40.503566: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:32:00.512622: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:32:00.512673: | handling event EVENT_SHUNT_SCAN Jan 30 17:32:00.512683: | expiring aged bare shunts from shunt table Jan 30 17:32:00.512691: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:32:00.512700: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:32:00.512713: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:32:20.334265: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:32:20.334309: | handling event EVENT_PENDING_DDNS Jan 30 17:32:20.334320: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:32:20.334330: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:32:20.334340: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:32:20.334348: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:32:20.513583: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:32:20.513628: | handling event EVENT_SHUNT_SCAN Jan 30 17:32:20.513637: | expiring aged bare shunts from shunt table Jan 30 17:32:20.513645: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:32:20.513656: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:32:20.513667: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:32:40.528630: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:32:40.528679: | handling event EVENT_SHUNT_SCAN Jan 30 17:32:40.528691: | expiring aged bare shunts from shunt table Jan 30 17:32:40.528714: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:32:40.528729: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:32:40.528744: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:33:00.544033: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:33:00.544070: | handling event EVENT_SHUNT_SCAN Jan 30 17:33:00.544077: | expiring aged bare shunts from shunt table Jan 30 17:33:00.544089: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:33:00.544099: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:33:00.544108: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:33:20.342601: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:33:20.342636: | handling event EVENT_PENDING_PHASE2 Jan 30 17:33:20.342646: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a2d588 Jan 30 17:33:20.342654: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:33:20.342663: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a2e8a8 Jan 30 17:33:20.342667: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:33:20.342671: | handling event EVENT_PENDING_DDNS Jan 30 17:33:20.342675: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2e8a8 Jan 30 17:33:20.342681: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:33:20.342686: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:33:20.342690: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:33:20.382778: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:33:20.382804: | handling event EVENT_SD_WATCHDOG Jan 30 17:33:20.382810: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:33:20.383045: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a10b18 Jan 30 17:33:20.383055: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:33:20.383063: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a10a18 Jan 30 17:33:20.545270: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:33:20.545303: | handling event EVENT_SHUNT_SCAN Jan 30 17:33:20.545310: | expiring aged bare shunts from shunt table Jan 30 17:33:20.545316: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:33:20.545324: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:33:20.545333: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:33:40.565384: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:33:40.565429: | handling event EVENT_SHUNT_SCAN Jan 30 17:33:40.565439: | expiring aged bare shunts from shunt table Jan 30 17:33:40.565447: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:33:40.565457: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:33:40.565469: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:34:00.581621: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:34:00.581669: | handling event EVENT_SHUNT_SCAN Jan 30 17:34:00.581680: | expiring aged bare shunts from shunt table Jan 30 17:34:00.581690: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:34:00.581700: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:34:00.581719: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:34:20.352600: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:34:20.352639: | handling event EVENT_PENDING_DDNS Jan 30 17:34:20.352650: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:34:20.352658: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:34:20.352666: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:34:20.352673: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2e8a8 Jan 30 17:34:20.582954: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:34:20.582992: | handling event EVENT_SHUNT_SCAN Jan 30 17:34:20.583014: | expiring aged bare shunts from shunt table Jan 30 17:34:20.583024: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:34:20.583032: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:34:20.583041: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:34:40.597622: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:34:40.597663: | handling event EVENT_SHUNT_SCAN Jan 30 17:34:40.597670: | expiring aged bare shunts from shunt table Jan 30 17:34:40.597676: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:34:40.597684: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:34:40.597693: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:35:00.403531: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:35:00.403575: | handling event EVENT_SD_WATCHDOG Jan 30 17:35:00.403583: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:35:00.403887: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2e8a8 Jan 30 17:35:00.403899: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:35:00.403910: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a10b18 Jan 30 17:35:00.599186: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:35:00.599223: | handling event EVENT_SHUNT_SCAN Jan 30 17:35:00.599230: | expiring aged bare shunts from shunt table Jan 30 17:35:00.599236: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:35:00.599245: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:35:00.599253: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:35:20.362592: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:35:20.362625: | handling event EVENT_PENDING_PHASE2 Jan 30 17:35:20.362634: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a10a18 Jan 30 17:35:20.362642: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:35:20.362651: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a2d588 Jan 30 17:35:20.362656: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:35:20.362660: | handling event EVENT_PENDING_DDNS Jan 30 17:35:20.362664: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:35:20.362670: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:35:20.362681: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:35:20.362687: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:35:20.599861: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:35:20.599894: | handling event EVENT_SHUNT_SCAN Jan 30 17:35:20.599900: | expiring aged bare shunts from shunt table Jan 30 17:35:20.599906: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:35:20.599914: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:35:20.599922: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:35:40.619969: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:35:40.619999: | handling event EVENT_SHUNT_SCAN Jan 30 17:35:40.620006: | expiring aged bare shunts from shunt table Jan 30 17:35:40.620012: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:35:40.620019: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:35:40.620027: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:36:00.640085: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:36:00.640115: | handling event EVENT_SHUNT_SCAN Jan 30 17:36:00.640122: | expiring aged bare shunts from shunt table Jan 30 17:36:00.640128: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:36:00.640136: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:36:00.640145: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:36:20.382612: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:36:20.382656: | handling event EVENT_PENDING_DDNS Jan 30 17:36:20.382675: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:36:20.382685: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:36:20.382696: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:36:20.382705: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:36:20.641010: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:36:20.641051: | handling event EVENT_SHUNT_SCAN Jan 30 17:36:20.641059: | expiring aged bare shunts from shunt table Jan 30 17:36:20.641066: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:36:20.641076: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:36:20.641086: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:36:40.416600: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:36:40.416632: | handling event EVENT_SD_WATCHDOG Jan 30 17:36:40.416639: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:36:40.417340: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a288f8 Jan 30 17:36:40.417352: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:36:40.417361: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2e8a8 Jan 30 17:36:40.642625: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:36:40.642659: | handling event EVENT_SHUNT_SCAN Jan 30 17:36:40.642668: | expiring aged bare shunts from shunt table Jan 30 17:36:40.642674: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:36:40.642681: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:36:40.642691: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:37:00.646618: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:37:00.646665: | handling event EVENT_SHUNT_SCAN Jan 30 17:37:00.646675: | expiring aged bare shunts from shunt table Jan 30 17:37:00.646684: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:37:00.646693: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:37:00.646704: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:37:20.376595: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:37:20.376638: | handling event EVENT_PENDING_PHASE2 Jan 30 17:37:20.376651: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a2e8a8 Jan 30 17:37:20.376662: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:37:20.376674: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a10a18 Jan 30 17:37:20.383746: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:37:20.383755: | handling event EVENT_PENDING_DDNS Jan 30 17:37:20.383761: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:37:20.383769: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:37:20.383777: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:37:20.383783: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:37:20.647094: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:37:20.647131: | handling event EVENT_SHUNT_SCAN Jan 30 17:37:20.647139: | expiring aged bare shunts from shunt table Jan 30 17:37:20.647148: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:37:20.647157: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:37:20.647168: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:37:40.657223: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:37:40.657254: | handling event EVENT_SHUNT_SCAN Jan 30 17:37:40.657261: | expiring aged bare shunts from shunt table Jan 30 17:37:40.657267: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:37:40.657274: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:37:40.657283: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:38:00.676833: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:38:00.676866: | handling event EVENT_SHUNT_SCAN Jan 30 17:38:00.676882: | expiring aged bare shunts from shunt table Jan 30 17:38:00.676891: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:38:00.676902: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:38:00.676912: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:38:20.403665: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:38:20.403710: | handling event EVENT_PENDING_DDNS Jan 30 17:38:20.403732: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:38:20.403743: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:38:20.403754: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:38:20.403762: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:38:20.416842: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:38:20.416854: | handling event EVENT_SD_WATCHDOG Jan 30 17:38:20.416861: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:38:20.417452: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a10a18 Jan 30 17:38:20.417463: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:38:20.417472: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a288f8 Jan 30 17:38:20.677777: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:38:20.677811: | handling event EVENT_SHUNT_SCAN Jan 30 17:38:20.677817: | expiring aged bare shunts from shunt table Jan 30 17:38:20.677823: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:38:20.677831: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:38:20.677844: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:38:40.695367: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:38:40.695409: | handling event EVENT_SHUNT_SCAN Jan 30 17:38:40.695419: | expiring aged bare shunts from shunt table Jan 30 17:38:40.695427: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:38:40.695437: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:38:40.695448: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:39:00.715501: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:39:00.715542: | handling event EVENT_SHUNT_SCAN Jan 30 17:39:00.715549: | expiring aged bare shunts from shunt table Jan 30 17:39:00.715556: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:39:00.715572: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:39:00.715581: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:39:20.396611: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:39:20.396644: | handling event EVENT_PENDING_PHASE2 Jan 30 17:39:20.396654: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a10b18 Jan 30 17:39:20.396661: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:39:20.396670: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a2e8a8 Jan 30 17:39:20.404755: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:39:20.404768: | handling event EVENT_PENDING_DDNS Jan 30 17:39:20.404773: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2e8a8 Jan 30 17:39:20.404780: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:39:20.404786: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:39:20.404790: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:39:20.716145: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:39:20.716179: | handling event EVENT_SHUNT_SCAN Jan 30 17:39:20.716185: | expiring aged bare shunts from shunt table Jan 30 17:39:20.716191: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:39:20.716199: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:39:20.716208: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:39:40.723605: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:39:40.723649: | handling event EVENT_SHUNT_SCAN Jan 30 17:39:40.723656: | expiring aged bare shunts from shunt table Jan 30 17:39:40.723663: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:39:40.723677: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:39:40.723685: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:40:00.430427: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:40:00.430462: | handling event EVENT_SD_WATCHDOG Jan 30 17:40:00.430469: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:40:00.430577: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2d588 Jan 30 17:40:00.430589: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:40:00.430598: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a10a18 Jan 30 17:40:00.724999: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:40:00.725044: | handling event EVENT_SHUNT_SCAN Jan 30 17:40:00.725055: | expiring aged bare shunts from shunt table Jan 30 17:40:00.725064: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:40:00.725076: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:40:00.725090: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:40:20.415881: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:40:20.415924: | handling event EVENT_PENDING_DDNS Jan 30 17:40:20.415938: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:40:20.415948: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:40:20.415959: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:40:20.415967: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2e8a8 Jan 30 17:40:20.726323: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:40:20.726353: | handling event EVENT_SHUNT_SCAN Jan 30 17:40:20.726360: | expiring aged bare shunts from shunt table Jan 30 17:40:20.726365: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:40:20.726373: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:40:20.726381: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:40:40.746426: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:40:40.746458: | handling event EVENT_SHUNT_SCAN Jan 30 17:40:40.746465: | expiring aged bare shunts from shunt table Jan 30 17:40:40.746471: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:40:40.746482: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:40:40.746494: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:41:00.763642: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:41:00.763682: | handling event EVENT_SHUNT_SCAN Jan 30 17:41:00.763695: | expiring aged bare shunts from shunt table Jan 30 17:41:00.763702: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:41:00.763710: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:41:00.763719: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:41:20.402500: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:41:20.402541: | handling event EVENT_PENDING_PHASE2 Jan 30 17:41:20.402555: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a10a18 Jan 30 17:41:20.402581: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:41:20.402594: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a10b18 Jan 30 17:41:20.416669: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:41:20.416680: | handling event EVENT_PENDING_DDNS Jan 30 17:41:20.416687: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:41:20.416695: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:41:20.416703: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:41:20.416709: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a288f8 Jan 30 17:41:20.764109: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:41:20.764163: | handling event EVENT_SHUNT_SCAN Jan 30 17:41:20.764172: | expiring aged bare shunts from shunt table Jan 30 17:41:20.764181: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:41:20.764191: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:41:20.764202: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:41:40.450919: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:41:40.450963: | handling event EVENT_SD_WATCHDOG Jan 30 17:41:40.450972: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:41:40.451645: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2e8a8 Jan 30 17:41:40.451659: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:41:40.451671: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2d588 Jan 30 17:41:40.766035: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:41:40.766070: | handling event EVENT_SHUNT_SCAN Jan 30 17:41:40.766077: | expiring aged bare shunts from shunt table Jan 30 17:41:40.766082: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:41:40.766090: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:41:40.766098: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:42:00.772632: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:42:00.772676: | handling event EVENT_SHUNT_SCAN Jan 30 17:42:00.772687: | expiring aged bare shunts from shunt table Jan 30 17:42:00.772696: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:42:00.772705: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:42:00.772717: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:42:20.423897: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:42:20.423929: | handling event EVENT_PENDING_DDNS Jan 30 17:42:20.423938: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:42:20.423946: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:42:20.423961: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:42:20.423968: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:42:20.773367: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:42:20.773401: | handling event EVENT_SHUNT_SCAN Jan 30 17:42:20.773408: | expiring aged bare shunts from shunt table Jan 30 17:42:20.773414: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:42:20.773422: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:42:20.773431: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:42:40.783598: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:42:40.783631: | handling event EVENT_SHUNT_SCAN Jan 30 17:42:40.783637: | expiring aged bare shunts from shunt table Jan 30 17:42:40.783643: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:42:40.783651: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:42:40.783659: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:43:00.794382: | timer_event_cb: processing event@0x556c11a288f8 Jan 30 17:43:00.794426: | handling event EVENT_SHUNT_SCAN Jan 30 17:43:00.794436: | expiring aged bare shunts from shunt table Jan 30 17:43:00.794446: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:43:00.794457: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:43:00.794468: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a288f8 Jan 30 17:43:20.423139: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:43:20.423173: | handling event EVENT_PENDING_PHASE2 Jan 30 17:43:20.423184: | event_schedule: new EVENT_PENDING_PHASE2-pe@0x556c11a288f8 Jan 30 17:43:20.423192: | inserting event EVENT_PENDING_PHASE2, timeout in 120.000 seconds Jan 30 17:43:20.423200: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a10a18 Jan 30 17:43:20.424277: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:43:20.424298: | handling event EVENT_PENDING_DDNS Jan 30 17:43:20.424304: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:43:20.424310: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:43:20.424316: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:43:20.424321: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a2d588 Jan 30 17:43:20.451405: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:43:20.451422: | handling event EVENT_SD_WATCHDOG Jan 30 17:43:20.451436: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:43:20.451530: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2d588 Jan 30 17:43:20.451541: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:43:20.451547: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2e8a8 Jan 30 17:43:20.794936: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:43:20.794970: | handling event EVENT_SHUNT_SCAN Jan 30 17:43:20.794977: | expiring aged bare shunts from shunt table Jan 30 17:43:20.794983: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:43:20.794991: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:43:20.795000: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:43:40.795669: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:43:40.795702: | handling event EVENT_SHUNT_SCAN Jan 30 17:43:40.795709: | expiring aged bare shunts from shunt table Jan 30 17:43:40.795715: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:43:40.795722: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:43:40.795731: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:44:00.808131: | timer_event_cb: processing event@0x556c11a10b18 Jan 30 17:44:00.808163: | handling event EVENT_SHUNT_SCAN Jan 30 17:44:00.808171: | expiring aged bare shunts from shunt table Jan 30 17:44:00.808177: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:44:00.808184: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:44:00.808196: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10b18 Jan 30 17:44:20.440796: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:44:20.440838: | handling event EVENT_PENDING_DDNS Jan 30 17:44:20.440848: | event_schedule: new EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:44:20.440858: | inserting event EVENT_PENDING_DDNS, timeout in 60.000 seconds Jan 30 17:44:20.440869: | elapsed time in connection_check_ddns for hostname lookup 0.000000 Jan 30 17:44:20.440877: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10a18 Jan 30 17:44:20.809286: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:44:20.809328: | handling event EVENT_SHUNT_SCAN Jan 30 17:44:20.809337: | expiring aged bare shunts from shunt table Jan 30 17:44:20.809345: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:44:20.809355: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:44:20.809367: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:44:40.826440: | timer_event_cb: processing event@0x556c11a10a18 Jan 30 17:44:40.826483: | handling event EVENT_SHUNT_SCAN Jan 30 17:44:40.826492: | expiring aged bare shunts from shunt table Jan 30 17:44:40.826501: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:44:40.826510: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:44:40.826521: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a10a18 Jan 30 17:44:59.478084: | certs and keys locked by 'free_preshared_secrets' Jan 30 17:44:59.478100: | certs and keys unlocked by 'free_preshard_secrets' Jan 30 17:44:59.478221: loading secrets from "/etc/ipsec.secrets" Jan 30 17:44:59.478284: no secrets filename matched "/etc/ipsec.d/*.secrets" Jan 30 17:45:00.453345: | timer_event_cb: processing event@0x556c11a2d588 Jan 30 17:45:00.453390: | handling event EVENT_SD_WATCHDOG Jan 30 17:45:00.453410: | pluto_sd: executing action action: watchdog(3), status 0 Jan 30 17:45:00.453897: | event_schedule: new EVENT_SD_WATCHDOG-pe@0x556c11a2be98 Jan 30 17:45:00.453911: | inserting event EVENT_SD_WATCHDOG, timeout in 100.000 seconds Jan 30 17:45:00.453922: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2d588 Jan 30 17:45:00.828347: | timer_event_cb: processing event@0x556c11a2e8a8 Jan 30 17:45:00.828378: | handling event EVENT_SHUNT_SCAN Jan 30 17:45:00.828385: | expiring aged bare shunts from shunt table Jan 30 17:45:00.828391: | event_schedule: new EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:45:00.828398: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds Jan 30 17:45:00.828407: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2e8a8 Jan 30 17:45:12.705314: shutting down Jan 30 17:45:12.705339: | processing: RESET whack log_fd (was 15) (in exit_pluto() at plutomain.c:1784) Jan 30 17:45:12.705347: | pluto_sd: executing action action: stopping(6), status 0 Jan 30 17:45:12.705580: | certs and keys locked by 'free_preshared_secrets' Jan 30 17:45:12.705590: | certs and keys unlocked by 'free_preshard_secrets' Jan 30 17:45:12.705598: | unreference key: 0x556c11a2bfc8 @east cnt 1-- Jan 30 17:45:12.705616: | unreference key: 0x556c11a2bb48 @west cnt 1-- Jan 30 17:45:12.705629: | crl fetch request list locked by 'free_crl_fetch' Jan 30 17:45:12.705635: | crl fetch request list unlocked by 'free_crl_fetch' Jan 30 17:45:12.705647: shutting down interface eth1/eth1 :4500 Jan 30 17:45:12.705652: shutting down interface eth1/eth1 :500 Jan 30 17:45:12.705700: | free_event_entry: release EVENT_NULL-pe@0x556c11a2b258 Jan 30 17:45:12.705724: | free_event_entry: release EVENT_NULL-pe@0x556c11a2b378 Jan 30 17:45:12.706109: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x556c11a2d588 Jan 30 17:45:12.706120: | free_event_entry: release EVENT_SD_WATCHDOG-pe@0x556c11a2be98 Jan 30 17:45:12.706127: | free_event_entry: release EVENT_PENDING_DDNS-pe@0x556c11a10b18 Jan 30 17:45:12.706132: | free_event_entry: release EVENT_PENDING_PHASE2-pe@0x556c11a288f8 Jan 30 17:45:12.706145: | free_event_entry: release EVENT_NULL-pe@0x556c11a2ad78 Jan 30 17:45:12.706153: | free_event_entry: release EVENT_NULL-pe@0x556c11a2abb8 Jan 30 17:45:12.706161: | free_event_entry: release EVENT_NULL-pe@0x556c11a2aa18 Jan 30 17:45:12.706169: | free_event_entry: release EVENT_NULL-pe@0x556c11a2a048 Jan 30 17:45:12.706178: | free_event_entry: release EVENT_NULL-pe@0x556c11a29f28 Jan 30 17:45:12.706187: | free_event_entry: release EVENT_NULL-pe@0x556c11a1e3c8 Jan 30 17:45:12.706195: | free_event_entry: release EVENT_NULL-pe@0x556c11a1e2c8 Jan 30 17:45:12.706200: | free_event_entry: release EVENT_REINIT_SECRET-pe@0x556c11a108c8 Jan 30 17:45:12.706281: leak detective found no leaks