Project

General

Profile

Bug #8304 » sha512.log

Justin Lex, 01/30/2018 01:49 AM

 
1
Jan 30 08:30:35 	ipsec_starter[37500]: Starting strongSwan 5.6.0 IPsec [starter]...
2
Jan 30 08:30:35 	ipsec_starter[37500]: no netkey IPsec stack detected
3
Jan 30 08:30:35 	ipsec_starter[37500]: no KLIPS IPsec stack detected
4
Jan 30 08:30:35 	ipsec_starter[37500]: no known IPsec stack detected, ignoring!
5
Jan 30 08:30:35 	charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.6.0, FreeBSD 11.1-RELEASE-p6, amd64)
6
Jan 30 08:30:35 	charon: 00[KNL] unable to set UDP_ENCAP: Invalid argument
7
Jan 30 08:30:35 	charon: 00[NET] enabling UDP decapsulation for IPv6 on port 4500 failed
8
Jan 30 08:30:36 	charon: 00[CFG] loading unbound resolver config from '/etc/resolv.conf'
9
Jan 30 08:30:36 	charon: 00[CFG] loading unbound trust anchors from '/usr/local/etc/ipsec.d/dnssec.keys'
10
Jan 30 08:30:36 	charon: 00[CFG] ipseckey plugin is disabled
11
Jan 30 08:30:36 	charon: 00[CFG] loading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
12
Jan 30 08:30:36 	charon: 00[CFG] loading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
13
Jan 30 08:30:36 	charon: 00[CFG] loading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'
14
Jan 30 08:30:36 	charon: 00[CFG] loading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
15
Jan 30 08:30:36 	charon: 00[CFG] loading crls from '/usr/local/etc/ipsec.d/crls'
16
Jan 30 08:30:36 	charon: 00[CFG] loading secrets from '/var/etc/ipsec/ipsec.secrets'
17
Jan 30 08:30:36 	charon: 00[CFG] loaded IKE secret for %any
18
Jan 30 08:30:36 	charon: 00[CFG] opening triplet file /usr/local/etc/ipsec.d/triplets.dat failed: No such file or directory
19
Jan 30 08:30:36 	charon: 00[CFG] loaded 0 RADIUS server configurations
20
Jan 30 08:30:36 	charon: 00[LIB] loaded plugins: charon unbound aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey ipseckey pem openssl fips-prf curve25519 xcbc cmac hmac curl attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-sim eap-md5 eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap whitelist addrblock
21
Jan 30 08:30:36 	charon: 00[JOB] spawning 16 worker threads
22
Jan 30 08:30:36 	ipsec_starter[37980]: charon (38289) started after 140 ms
23
Jan 30 08:30:36 	charon: 01[CFG] received stroke: add connection 'bypasslan'
24
Jan 30 08:30:36 	charon: 01[CFG] conn bypasslan
25
Jan 30 08:30:36 	charon: 01[CFG] left=%any
26
Jan 30 08:30:36 	charon: 01[CFG] leftsubnet=10.0.0.0/16
27
Jan 30 08:30:36 	charon: 01[CFG] right=%any
28
Jan 30 08:30:36 	charon: 01[CFG] rightsubnet=10.0.0.0/16
29
Jan 30 08:30:36 	charon: 01[CFG] ike=aes128-sha256-curve25519
30
Jan 30 08:30:36 	charon: 01[CFG] esp=aes128-sha256
31
Jan 30 08:30:36 	charon: 01[CFG] dpddelay=30
32
Jan 30 08:30:36 	charon: 01[CFG] dpdtimeout=150
33
Jan 30 08:30:36 	charon: 01[CFG] sha256_96=no
34
Jan 30 08:30:36 	charon: 01[CFG] mediation=no
35
Jan 30 08:30:36 	charon: 01[CFG] added configuration 'bypasslan'
36
Jan 30 08:30:36 	charon: 05[CFG] received stroke: route 'bypasslan'
37
Jan 30 08:30:36 	charon: 05[CFG] proposing traffic selectors for us:
38
Jan 30 08:30:36 	charon: 05[CFG] 10.0.0.0/16|/0
39
Jan 30 08:30:36 	charon: 05[CFG] proposing traffic selectors for other:
40
Jan 30 08:30:36 	charon: 05[CFG] 10.0.0.0/16|/0
41
Jan 30 08:30:36 	ipsec_starter[37980]: 'bypasslan' shunt PASS policy installed
42
Jan 30 08:30:36 	ipsec_starter[37980]:
43
Jan 30 08:30:36 	charon: 15[CFG] received stroke: add connection 'con1'
44
Jan 30 08:30:36 	charon: 15[CFG] conn con1
45
Jan 30 08:30:36 	charon: 15[CFG] left=%any
46
Jan 30 08:30:36 	charon: 15[CFG] leftauth=psk
47
Jan 30 08:30:36 	charon: 15[CFG] leftid=PFSENSE.WAN.IP.ADDRESS
48
Jan 30 08:30:36 	charon: 15[CFG] right=%any
49
Jan 30 08:30:36 	charon: 15[CFG] rightauth=psk
50
Jan 30 08:30:36 	charon: 15[CFG] ike=aes256-sha256-modp2048!
51
Jan 30 08:30:36 	charon: 15[CFG] esp=aes128-sha256!
52
Jan 30 08:30:36 	charon: 15[CFG] dpddelay=10
53
Jan 30 08:30:36 	charon: 15[CFG] dpdtimeout=60
54
Jan 30 08:30:36 	charon: 15[CFG] dpdaction=1
55
Jan 30 08:30:36 	charon: 15[CFG] sha256_96=no
56
Jan 30 08:30:36 	charon: 15[CFG] mediation=no
57
Jan 30 08:30:36 	charon: 15[CFG] added configuration 'con1'
58
Jan 30 08:39:39 	charon: 13[CFG] rereading secrets
59
Jan 30 08:39:39 	charon: 13[CFG] loading secrets from '/var/etc/ipsec/ipsec.secrets'
60
Jan 30 08:39:39 	charon: 13[CFG] loaded IKE secret for %any
61
Jan 30 08:39:39 	charon: 13[CFG] rereading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
62
Jan 30 08:39:39 	charon: 13[CFG] rereading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
63
Jan 30 08:39:39 	charon: 13[CFG] rereading ocsp signer certificates from '/usr/local/etc/ipsec.d/ocspcerts'
64
Jan 30 08:39:39 	charon: 13[CFG] rereading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
65
Jan 30 08:39:39 	charon: 13[CFG] rereading crls from '/usr/local/etc/ipsec.d/crls'
66
Jan 30 08:39:39 	charon: 13[CFG] received stroke: unroute 'bypasslan'
67
Jan 30 08:39:39 	charon: 13[CFG] proposing traffic selectors for us:
68
Jan 30 08:39:39 	charon: 13[CFG] 10.0.0.0/16|/0
69
Jan 30 08:39:39 	charon: 13[CFG] proposing traffic selectors for other:
70
Jan 30 08:39:39 	charon: 13[CFG] 10.0.0.0/16|/0
71
Jan 30 08:39:39 	ipsec_starter[37980]: shunt policy 'bypasslan' uninstalled
72
Jan 30 08:39:39 	ipsec_starter[37980]:
73
Jan 30 08:39:39 	charon: 12[CFG] received stroke: delete connection 'bypasslan'
74
Jan 30 08:39:39 	charon: 12[CFG] deleted connection 'bypasslan'
75
Jan 30 08:39:39 	charon: 12[CFG] received stroke: delete connection 'con1'
76
Jan 30 08:39:39 	charon: 12[CFG] deleted connection 'con1'
77
Jan 30 08:39:39 	charon: 12[CFG] received stroke: add connection 'bypasslan'
78
Jan 30 08:39:39 	charon: 12[CFG] conn bypasslan
79
Jan 30 08:39:39 	charon: 12[CFG] left=%any
80
Jan 30 08:39:39 	charon: 12[CFG] leftsubnet=10.0.0.0/16
81
Jan 30 08:39:39 	charon: 12[CFG] right=%any
82
Jan 30 08:39:39 	charon: 12[CFG] rightsubnet=10.0.0.0/16
83
Jan 30 08:39:39 	charon: 12[CFG] ike=aes128-sha256-curve25519
84
Jan 30 08:39:39 	charon: 12[CFG] esp=aes128-sha256
85
Jan 30 08:39:39 	charon: 12[CFG] dpddelay=30
86
Jan 30 08:39:39 	charon: 12[CFG] dpdtimeout=150
87
Jan 30 08:39:39 	charon: 12[CFG] sha256_96=no
88
Jan 30 08:39:39 	charon: 12[CFG] mediation=no
89
Jan 30 08:39:39 	charon: 12[CFG] added configuration 'bypasslan'
90
Jan 30 08:39:39 	charon: 10[CFG] received stroke: route 'bypasslan'
91
Jan 30 08:39:39 	charon: 10[CFG] proposing traffic selectors for us:
92
Jan 30 08:39:39 	charon: 10[CFG] 10.0.0.0/16|/0
93
Jan 30 08:39:39 	charon: 10[CFG] proposing traffic selectors for other:
94
Jan 30 08:39:39 	charon: 10[CFG] 10.0.0.0/16|/0
95
Jan 30 08:39:39 	ipsec_starter[37980]: 'bypasslan' shunt PASS policy installed
96
Jan 30 08:39:39 	ipsec_starter[37980]:
97
Jan 30 08:39:39 	charon: 11[CFG] received stroke: add connection 'con1'
98
Jan 30 08:39:39 	charon: 11[CFG] conn con1
99
Jan 30 08:39:39 	charon: 11[CFG] left=%any
100
Jan 30 08:39:39 	charon: 11[CFG] leftauth=psk
101
Jan 30 08:39:39 	charon: 11[CFG] leftid=PFSENSE.WAN.IP.ADDRESS
102
Jan 30 08:39:39 	charon: 11[CFG] right=%any
103
Jan 30 08:39:39 	charon: 11[CFG] rightauth=psk
104
Jan 30 08:39:39 	charon: 11[CFG] ike=aes256-sha256-modp2048!
105
Jan 30 08:39:39 	charon: 11[CFG] esp=aes128-sha512!
106
Jan 30 08:39:39 	charon: 11[CFG] dpddelay=10
107
Jan 30 08:39:39 	charon: 11[CFG] dpdtimeout=60
108
Jan 30 08:39:39 	charon: 11[CFG] dpdaction=1
109
Jan 30 08:39:39 	charon: 11[CFG] sha256_96=no
110
Jan 30 08:39:39 	charon: 11[CFG] mediation=no
111
Jan 30 08:39:39 	charon: 11[CFG] added configuration 'con1'
112
Jan 30 08:40:04 	charon: 11[NET] <1> received packet: from PHONE.4G.IP.ADDRESS[11688] to PFSENSE.WAN.IP.ADDRESS[500] (580 bytes)
113
Jan 30 08:40:04 	charon: 11[ENC] <1> parsed ID_PROT request 0 [ SA V V V V V V ]
114
Jan 30 08:40:04 	charon: 11[CFG] <1> looking for an ike config for PFSENSE.WAN.IP.ADDRESS...PHONE.4G.IP.ADDRESS
115
Jan 30 08:40:04 	charon: 11[CFG] <1> candidate: %any...%any, prio 24
116
Jan 30 08:40:04 	charon: 11[CFG] <1> candidate: %any...%any, prio 24
117
Jan 30 08:40:04 	charon: 11[CFG] <1> found matching ike config: %any...%any with prio 24
118
Jan 30 08:40:04 	charon: 11[IKE] <1> received NAT-T (RFC 3947) vendor ID
119
Jan 30 08:40:04 	charon: 11[IKE] <1> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
120
Jan 30 08:40:04 	charon: 11[IKE] <1> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
121
Jan 30 08:40:04 	charon: 11[IKE] <1> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
122
Jan 30 08:40:04 	charon: 11[IKE] <1> received FRAGMENTATION vendor ID
123
Jan 30 08:40:04 	charon: 11[IKE] <1> received DPD vendor ID
124
Jan 30 08:40:04 	charon: 11[IKE] <1> PHONE.4G.IP.ADDRESS is initiating a Main Mode IKE_SA
125
Jan 30 08:40:04 	charon: 11[IKE] <1> IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
126
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
127
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
128
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
129
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
130
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
131
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
132
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
133
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable PSEUDO_RANDOM_FUNCTION found
134
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
135
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable PSEUDO_RANDOM_FUNCTION found
136
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
137
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable DIFFIE_HELLMAN_GROUP found
138
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
139
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
140
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
141
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
142
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
143
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
144
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
145
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
146
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
147
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
148
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
149
Jan 30 08:40:04 	charon: 11[CFG] <1> no acceptable ENCRYPTION_ALGORITHM found
150
Jan 30 08:40:04 	charon: 11[CFG] <1> selecting proposal:
151
Jan 30 08:40:04 	charon: 11[CFG] <1> proposal matches
152
Jan 30 08:40:04 	charon: 11[CFG] <1> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
153
Jan 30 08:40:04 	charon: 11[CFG] <1> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024
154
Jan 30 08:40:04 	charon: 11[CFG] <1> selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
155
Jan 30 08:40:04 	charon: 11[IKE] <1> sending XAuth vendor ID
156
Jan 30 08:40:04 	charon: 11[IKE] <1> sending DPD vendor ID
157
Jan 30 08:40:04 	charon: 11[IKE] <1> sending FRAGMENTATION vendor ID
158
Jan 30 08:40:04 	charon: 11[IKE] <1> sending NAT-T (RFC 3947) vendor ID
159
Jan 30 08:40:04 	charon: 11[ENC] <1> generating ID_PROT response 0 [ SA V V V V ]
160
Jan 30 08:40:04 	charon: 11[NET] <1> sending packet: from PFSENSE.WAN.IP.ADDRESS[500] to PHONE.4G.IP.ADDRESS[11688] (160 bytes)
161
Jan 30 08:40:04 	charon: 10[NET] <1> received packet: from PHONE.4G.IP.ADDRESS[11688] to PFSENSE.WAN.IP.ADDRESS[500] (228 bytes)
162
Jan 30 08:40:04 	charon: 10[ENC] <1> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
163
Jan 30 08:40:04 	charon: 10[IKE] <1> remote host is behind NAT
164
Jan 30 08:40:04 	charon: 10[CFG] <1> candidate "bypasslan", match: 1/1/24 (me/other/ike)
165
Jan 30 08:40:04 	charon: 10[CFG] <1> candidate "con1", match: 1/1/24 (me/other/ike)
166
Jan 30 08:40:04 	charon: 10[ENC] <1> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
167
Jan 30 08:40:04 	charon: 10[NET] <1> sending packet: from PFSENSE.WAN.IP.ADDRESS[500] to PHONE.4G.IP.ADDRESS[11688] (244 bytes)
168
Jan 30 08:40:04 	charon: 10[NET] <1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (92 bytes)
169
Jan 30 08:40:04 	charon: 10[ENC] <1> parsed ID_PROT request 0 [ ID HASH ]
170
Jan 30 08:40:04 	charon: 10[CFG] <1> looking for pre-shared key peer configs matching PFSENSE.WAN.IP.ADDRESS...PHONE.4G.IP.ADDRESS[100.100.206.219]
171
Jan 30 08:40:04 	charon: 10[CFG] <1> candidate "bypasslan", match: 1/1/24 (me/other/ike)
172
Jan 30 08:40:04 	charon: 10[CFG] <1> candidate "con1", match: 1/1/24 (me/other/ike)
173
Jan 30 08:40:04 	charon: 10[CFG] <1> selected peer config "con1"
174
Jan 30 08:40:04 	charon: 10[IKE] <con1|1> IKE_SA con1[1] established between PFSENSE.WAN.IP.ADDRESS[PFSENSE.WAN.IP.ADDRESS]...PHONE.4G.IP.ADDRESS[100.100.206.219]
175
Jan 30 08:40:04 	charon: 10[IKE] <con1|1> IKE_SA con1[1] state change: CONNECTING => ESTABLISHED
176
Jan 30 08:40:04 	charon: 10[IKE] <con1|1> scheduling reauthentication in 28251s
177
Jan 30 08:40:04 	charon: 10[IKE] <con1|1> maximum IKE_SA lifetime 28791s
178
Jan 30 08:40:04 	charon: 10[ENC] <con1|1> generating ID_PROT response 0 [ ID HASH ]
179
Jan 30 08:40:04 	charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
180
Jan 30 08:40:04 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (108 bytes)
181
Jan 30 08:40:04 	charon: 12[ENC] <con1|1> parsed INFORMATIONAL_V1 request 3689217329 [ HASH N(INITIAL_CONTACT) ]
182
Jan 30 08:40:05 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
183
Jan 30 08:40:05 	charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
184
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> changing received traffic selectors 100.100.206.219/32|/0[udp]=== PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] due to NAT
185
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> looking for a child config for PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] === PHONE.4G.IP.ADDRESS/32|/0[udp]
186
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> proposing traffic selectors for us:
187
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> PFSENSE.WAN.IP.ADDRESS/32|/0
188
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> proposing traffic selectors for other:
189
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> PHONE.4G.IP.ADDRESS/32|/0
190
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> candidate "con1" with prio 1+1
191
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> found matching child config "con1" with prio 2
192
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting traffic selectors for other:
193
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> config: PHONE.4G.IP.ADDRESS/32|/0, received: PHONE.4G.IP.ADDRESS/32|/0[udp] => match: PHONE.4G.IP.ADDRESS/32|/0[udp]
194
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting traffic selectors for us:
195
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> config: PFSENSE.WAN.IP.ADDRESS/32|/0, received: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] => match: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f]
196
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
197
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
198
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
199
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
200
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
201
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
202
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
203
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
204
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
205
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
206
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
207
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
208
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
209
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
210
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
211
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
212
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
213
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
214
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
215
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
216
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
217
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
218
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> selecting proposal:
219
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
220
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
221
Jan 30 08:40:05 	charon: 12[CFG] <con1|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA2_512_256/NO_EXT_SEQ
222
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> received 28800s lifetime, configured 3600s
223
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> no matching proposal found, sending NO_PROPOSAL_CHOSEN
224
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> queueing INFORMATIONAL task
225
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> activating new tasks
226
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> activating INFORMATIONAL task
227
Jan 30 08:40:05 	charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 227678193 [ HASH N(NO_PROP) ]
228
Jan 30 08:40:05 	charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
229
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> activating new tasks
230
Jan 30 08:40:05 	charon: 12[IKE] <con1|1> nothing to initiate
231
Jan 30 08:40:08 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
232
Jan 30 08:40:08 	charon: 12[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
233
Jan 30 08:40:12 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
234
Jan 30 08:40:12 	charon: 12[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
235
Jan 30 08:40:15 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
236
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
237
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> sending DPD request
238
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> queueing ISAKMP_DPD task
239
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> activating new tasks
240
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> activating ISAKMP_DPD task
241
Jan 30 08:40:15 	charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 3065278085 [ HASH N(DPD) ]
242
Jan 30 08:40:15 	charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
243
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> activating new tasks
244
Jan 30 08:40:15 	charon: 12[IKE] <con1|1> nothing to initiate
245
Jan 30 08:40:16 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (108 bytes)
246
Jan 30 08:40:16 	charon: 12[ENC] <con1|1> parsed INFORMATIONAL_V1 request 2520618926 [ HASH N(DPD_ACK) ]
247
Jan 30 08:40:16 	charon: 12[IKE] <con1|1> activating new tasks
248
Jan 30 08:40:16 	charon: 12[IKE] <con1|1> nothing to initiate
249
Jan 30 08:40:18 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
250
Jan 30 08:40:18 	charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
251
Jan 30 08:40:18 	charon: 12[ENC] <con1|1> received HASH payload does not match
252
Jan 30 08:40:18 	charon: 12[IKE] <con1|1> integrity check failed
253
Jan 30 08:40:18 	charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 2066252053 [ HASH N(INVAL_HASH) ]
254
Jan 30 08:40:18 	charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
255
Jan 30 08:40:18 	charon: 12[IKE] <con1|1> QUICK_MODE request with message ID 4162421179 processing failed
256
Jan 30 08:40:21 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
257
Jan 30 08:40:21 	charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
258
Jan 30 08:40:21 	charon: 12[ENC] <con1|1> received HASH payload does not match
259
Jan 30 08:40:21 	charon: 12[IKE] <con1|1> integrity check failed
260
Jan 30 08:40:21 	charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 2553682064 [ HASH N(INVAL_HASH) ]
261
Jan 30 08:40:21 	charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
262
Jan 30 08:40:21 	charon: 12[IKE] <con1|1> QUICK_MODE request with message ID 4162421179 processing failed
263
Jan 30 08:40:24 	charon: 12[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
264
Jan 30 08:40:24 	charon: 12[ENC] <con1|1> parsed QUICK_MODE request 4162421179 [ HASH SA No ID ID ]
265
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> changing received traffic selectors 100.100.206.219/32|/0[udp]=== PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] due to NAT
266
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> looking for a child config for PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] === PHONE.4G.IP.ADDRESS/32|/0[udp]
267
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> proposing traffic selectors for us:
268
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> PFSENSE.WAN.IP.ADDRESS/32|/0
269
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> proposing traffic selectors for other:
270
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> PHONE.4G.IP.ADDRESS/32|/0
271
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> candidate "con1" with prio 1+1
272
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> found matching child config "con1" with prio 2
273
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting traffic selectors for other:
274
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> config: PHONE.4G.IP.ADDRESS/32|/0, received: PHONE.4G.IP.ADDRESS/32|/0[udp] => match: PHONE.4G.IP.ADDRESS/32|/0[udp]
275
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting traffic selectors for us:
276
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> config: PFSENSE.WAN.IP.ADDRESS/32|/0, received: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f] => match: PFSENSE.WAN.IP.ADDRESS/32|/0[udp/l2f]
277
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
278
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
279
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
280
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
281
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
282
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
283
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
284
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
285
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
286
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
287
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
288
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable INTEGRITY_ALGORITHM found
289
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
290
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
291
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
292
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
293
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
294
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
295
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
296
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
297
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
298
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
299
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> selecting proposal:
300
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> no acceptable ENCRYPTION_ALGORITHM found
301
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_MD5_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
302
Jan 30 08:40:24 	charon: 12[CFG] <con1|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA2_512_256/NO_EXT_SEQ
303
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> received 28800s lifetime, configured 3600s
304
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> no matching proposal found, sending NO_PROPOSAL_CHOSEN
305
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> queueing INFORMATIONAL task
306
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> activating new tasks
307
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> activating INFORMATIONAL task
308
Jan 30 08:40:24 	charon: 12[ENC] <con1|1> generating INFORMATIONAL_V1 request 2196097090 [ HASH N(NO_PROP) ]
309
Jan 30 08:40:24 	charon: 12[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (76 bytes)
310
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> activating new tasks
311
Jan 30 08:40:24 	charon: 12[IKE] <con1|1> nothing to initiate
312
Jan 30 08:40:27 	charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
313
Jan 30 08:40:27 	charon: 10[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
314
Jan 30 08:40:30 	charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
315
Jan 30 08:40:30 	charon: 10[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
316
Jan 30 08:40:33 	charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (460 bytes)
317
Jan 30 08:40:33 	charon: 10[IKE] <con1|1> received retransmit of request with ID 4162421179, but no response to retransmit
318
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> sending DPD request
319
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
320
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> activating new tasks
321
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
322
Jan 30 08:40:34 	charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1560874215 [ HASH N(DPD) ]
323
Jan 30 08:40:34 	charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
324
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> activating new tasks
325
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> nothing to initiate
326
Jan 30 08:40:34 	charon: 10[NET] <con1|1> received packet: from PHONE.4G.IP.ADDRESS[5004] to PFSENSE.WAN.IP.ADDRESS[4500] (108 bytes)
327
Jan 30 08:40:34 	charon: 10[ENC] <con1|1> parsed INFORMATIONAL_V1 request 3555995187 [ HASH N(DPD_ACK) ]
328
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> activating new tasks
329
Jan 30 08:40:34 	charon: 10[IKE] <con1|1> nothing to initiate
330
Jan 30 08:40:45 	charon: 10[IKE] <con1|1> sending DPD request
331
Jan 30 08:40:45 	charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
332
Jan 30 08:40:45 	charon: 10[IKE] <con1|1> activating new tasks
333
Jan 30 08:40:45 	charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
334
Jan 30 08:40:45 	charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1823026341 [ HASH N(DPD) ]
335
Jan 30 08:40:45 	charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
336
Jan 30 08:40:45 	charon: 10[IKE] <con1|1> activating new tasks
337
Jan 30 08:40:45 	charon: 10[IKE] <con1|1> nothing to initiate
338
Jan 30 08:40:55 	charon: 10[IKE] <con1|1> sending DPD request
339
Jan 30 08:40:55 	charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
340
Jan 30 08:40:55 	charon: 10[IKE] <con1|1> activating new tasks
341
Jan 30 08:40:55 	charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
342
Jan 30 08:40:55 	charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1160826629 [ HASH N(DPD) ]
343
Jan 30 08:40:55 	charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
344
Jan 30 08:40:55 	charon: 10[IKE] <con1|1> activating new tasks
345
Jan 30 08:40:55 	charon: 10[IKE] <con1|1> nothing to initiate
346
Jan 30 08:41:05 	charon: 10[IKE] <con1|1> sending DPD request
347
Jan 30 08:41:05 	charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
348
Jan 30 08:41:05 	charon: 10[IKE] <con1|1> activating new tasks
349
Jan 30 08:41:05 	charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
350
Jan 30 08:41:05 	charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1558937606 [ HASH N(DPD) ]
351
Jan 30 08:41:05 	charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
352
Jan 30 08:41:05 	charon: 10[IKE] <con1|1> activating new tasks
353
Jan 30 08:41:05 	charon: 10[IKE] <con1|1> nothing to initiate
354
Jan 30 08:41:15 	charon: 10[IKE] <con1|1> sending DPD request
355
Jan 30 08:41:15 	charon: 10[IKE] <con1|1> queueing ISAKMP_DPD task
356
Jan 30 08:41:15 	charon: 10[IKE] <con1|1> activating new tasks
357
Jan 30 08:41:15 	charon: 10[IKE] <con1|1> activating ISAKMP_DPD task
358
Jan 30 08:41:15 	charon: 10[ENC] <con1|1> generating INFORMATIONAL_V1 request 1035159668 [ HASH N(DPD) ]
359
Jan 30 08:41:15 	charon: 10[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
360
Jan 30 08:41:15 	charon: 10[IKE] <con1|1> activating new tasks
361
Jan 30 08:41:15 	charon: 10[IKE] <con1|1> nothing to initiate
362
Jan 30 08:41:25 	charon: 13[IKE] <con1|1> sending DPD request
363
Jan 30 08:41:25 	charon: 13[IKE] <con1|1> queueing ISAKMP_DPD task
364
Jan 30 08:41:25 	charon: 13[IKE] <con1|1> activating new tasks
365
Jan 30 08:41:25 	charon: 13[IKE] <con1|1> activating ISAKMP_DPD task
366
Jan 30 08:41:25 	charon: 13[ENC] <con1|1> generating INFORMATIONAL_V1 request 1524726655 [ HASH N(DPD) ]
367
Jan 30 08:41:25 	charon: 13[NET] <con1|1> sending packet: from PFSENSE.WAN.IP.ADDRESS[4500] to PHONE.4G.IP.ADDRESS[5004] (92 bytes)
368
Jan 30 08:41:25 	charon: 13[IKE] <con1|1> activating new tasks
369
Jan 30 08:41:25 	charon: 13[IKE] <con1|1> nothing to initiate
370
Jan 30 08:41:35 	charon: 13[JOB] <con1|1> DPD check timed out, enforcing DPD action
371
Jan 30 08:41:35 	charon: 13[IKE] <con1|1> IKE_SA con1[1] state change: ESTABLISHED => DESTROYING
(5-5/6)