Foreground mode. 2012-12-27 14:22:58: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net) 2012-12-27 14:22:58: INFO: @(#)This product linked OpenSSL 0.9.8n 24 Mar 2010 (http://www.openssl.org/) 2012-12-27 14:22:58: INFO: Reading configuration from "/var/etc/racoon.conf" 2012-12-27 14:22:58: DEBUG: call pfkey_send_register for AH 2012-12-27 14:22:58: DEBUG: call pfkey_send_register for ESP 2012-12-27 14:22:58: DEBUG: call pfkey_send_register for IPCOMP 2012-12-27 14:22:58: DEBUG: reading config file /var/etc/racoon.conf 2012-12-27 14:22:58: INFO: Resize address pool from 0 to 253 2012-12-27 14:22:58: DEBUG: hmac(modp1024) 2012-12-27 14:22:58: DEBUG: no check of compression algorithm; not supported in sadb message. 2012-12-27 14:22:58: DEBUG: getsainfo params: loc='ANONYMOUS' rmt='ANONYMOUS' peer='NULL' client='NULL' id=1 2012-12-27 14:22:58: DEBUG: open /var/db/racoon/racoon.sock as racoon management. 2012-12-27 14:22:58: INFO: XXX.XXX.XXX.XXX[4500] used for NAT-T 2012-12-27 14:22:58: INFO: XXX.XXX.XXX.XXX[4500] used as isakmp port (fd=7) 2012-12-27 14:22:58: INFO: XXX.XXX.XXX.XXX[500] used for NAT-T 2012-12-27 14:22:58: INFO: XXX.XXX.XXX.XXX[500] used as isakmp port (fd=8) 2012-12-27 14:22:58: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:22:58: DEBUG: got pfkey X_SPDDUMP message 2012-12-27 14:22:58: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:22:58: DEBUG: got pfkey X_SPDDUMP message 2012-12-27 14:22:58: DEBUG: sub:0xbfbfe5b4: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:22:58: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:22:58: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:22:58: DEBUG: got pfkey X_SPDDUMP message 2012-12-27 14:22:58: DEBUG: sub:0xbfbfe5b4: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:22:58: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:22:58: DEBUG: sub:0xbfbfe5b4: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:22:58: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:22:58: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:22:58: DEBUG: got pfkey X_SPDDUMP message 2012-12-27 14:22:58: DEBUG: sub:0xbfbfe5b4: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:22:58: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:22:58: DEBUG: sub:0xbfbfe5b4: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:22:58: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:22:58: DEBUG: sub:0xbfbfe5b4: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:22:58: DEBUG: db :0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:03: DEBUG: === 2012-12-27 14:23:03: DEBUG: 742 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:03: DEBUG: 925b8c8b b4e92e20 00000000 00000000 01100400 00000000 000002e6 04000124 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0a000084 66aa91b6 5607915e bb5bd74b 88640012 8b62f6d9 6e7b1a89 44558449 9a03842b ba83f879 44fc8270 015ac736 ba6da749 73d3c1bf f305d828 0a534cc6 2b18be0c cd4a337e 124674bd 0dc88407 8a1e05fe 55594dce 1fc626cd f220b4a3 a8f59f04 93bc7f2e 28a3a916 a071c3f7 0206136a 296fcc95 2227cf90 94d08cc0 09e68227 05000014 b877160e 0b50d3cc db98f1b4 d0c5ee1e 0d000012 0b000000 74657374 4067726f 75700d00 00144a13 1c810703 58455c57 28f20e95 452f0d00 00144df3 7928e9fc 4fd1b326 2170d515 c6620d00 00148f8d 83826d24 6b6fc7a8 a6a428c1 1de80d00 0014439b 59f8ba67 6c4c7737 ae22eab8 f5820d00 00144d1e 0e136dea fa34c4f3 ea9f02ec 72850d00 001480d0 bb3def54 565ee846 45d4c85c e3ee0d00 00149909 b64eed93 7c6573de 52ace952 fa6b0d00 00147d94 19a65310 ca6f2c17 9d921552 9d560d00 0014cd60 464335df 21f87cfd b2fc68b6 a4480d00 001490cb 80913ebb 696e0863 81b5ec42 7b1f0d00 000c0900 2689dfd6 b7120d00 001412f5 f28c4571 68a9702d 9fe274cc 01000000 0014afca d71368a1 f1c96b86 96fc7757 0100 2012-12-27 14:23:03: DEBUG: === 2012-12-27 14:23:03: INFO: respond new phase 1 negotiation: XXX.XXX.XXX.XXX[500]<=>181.12.242.251[500] 2012-12-27 14:23:03: INFO: begin Aggressive mode. 2012-12-27 14:23:03: DEBUG: begin. 2012-12-27 14:23:03: DEBUG: seen nptype=1(sa) 2012-12-27 14:23:03: DEBUG: seen nptype=4(ke) 2012-12-27 14:23:03: DEBUG: seen nptype=10(nonce) 2012-12-27 14:23:03: DEBUG: seen nptype=5(id) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: seen nptype=13(vid) 2012-12-27 14:23:03: DEBUG: succeed. 2012-12-27 14:23:03: DEBUG: received payload of type ke 2012-12-27 14:23:03: DEBUG: received payload of type nonce 2012-12-27 14:23:03: DEBUG: received payload of type id 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: RFC 3947 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: DEBUG: received unknown Vendor ID 2012-12-27 14:23:03: DEBUG: 4df37928 e9fc4fd1 b3262170 d515c662 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-08 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-07 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-06 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-05 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-04 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: CISCO-UNITY 2012-12-27 14:23:03: DEBUG: received payload of type vid 2012-12-27 14:23:03: INFO: received Vendor ID: DPD 2012-12-27 14:23:03: DEBUG: remote supports DPD 2012-12-27 14:23:03: [181.12.242.251] DEBUG: getrmconf_by_ph1: remote 181.12.242.251[500], identity . 2012-12-27 14:23:03: [181.12.242.251] DEBUG: configuration "anonymous" selected. 2012-12-27 14:23:03: [181.12.242.251] INFO: Selected NAT-T version: RFC 3947 2012-12-27 14:23:03: DEBUG: total SA len=288 2012-12-27 14:23:03: DEBUG: 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 2012-12-27 14:23:03: DEBUG: begin. 2012-12-27 14:23:03: DEBUG: seen nptype=2(prop) 2012-12-27 14:23:03: DEBUG: succeed. 2012-12-27 14:23:03: DEBUG: proposal #1 len=280 2012-12-27 14:23:03: DEBUG: begin. 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:03: DEBUG: succeed. 2012-12-27 14:23:03: DEBUG: transform #1 len=36 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #2 len=36 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: type=Key Length, flag=0x8000, lorv=128 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #3 len=36 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=MD5 2012-12-27 14:23:03: DEBUG: hash(md5) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #4 len=36 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: type=Key Length, flag=0x8000, lorv=128 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=MD5 2012-12-27 14:23:03: DEBUG: hash(md5) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #5 len=32 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2012-12-27 14:23:03: DEBUG: encryption(3des) 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #6 len=32 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2012-12-27 14:23:03: DEBUG: encryption(3des) 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=MD5 2012-12-27 14:23:03: DEBUG: hash(md5) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #7 len=32 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC 2012-12-27 14:23:03: DEBUG: encryption(des) 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: transform #8 len=32 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC 2012-12-27 14:23:03: DEBUG: encryption(des) 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=MD5 2012-12-27 14:23:03: DEBUG: hash(md5) 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: pair 1: 2012-12-27 14:23:03: DEBUG: 0x285245a0: next=0x0 tnext=0x285245b0 2012-12-27 14:23:03: DEBUG: 0x285245b0: next=0x0 tnext=0x285245c0 2012-12-27 14:23:03: DEBUG: 0x285245c0: next=0x0 tnext=0x285245d0 2012-12-27 14:23:03: DEBUG: 0x285245d0: next=0x0 tnext=0x285245e0 2012-12-27 14:23:03: DEBUG: 0x285245e0: next=0x0 tnext=0x285245f0 2012-12-27 14:23:03: DEBUG: 0x285245f0: next=0x0 tnext=0x28524600 2012-12-27 14:23:03: DEBUG: 0x28524600: next=0x0 tnext=0x28524610 2012-12-27 14:23:03: DEBUG: 0x28524610: next=0x0 tnext=0x0 2012-12-27 14:23:03: DEBUG: proposal #1: 8 transform 2012-12-27 14:23:03: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:03: DEBUG: type=Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:03: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 2012-12-27 14:23:03: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:03: DEBUG: type=Authentication Method, flag=0x8000, lorv=XAuth pskey client 2012-12-27 14:23:03: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2012-12-27 14:23:03: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2012-12-27 14:23:03: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=8 2012-12-27 14:23:03: DEBUG: trns#=1, trns-id=IKE 2012-12-27 14:23:03: DEBUG: lifetime = 3600 2012-12-27 14:23:03: DEBUG: lifebyte = 0 2012-12-27 14:23:03: DEBUG: enctype = AES-CBC 2012-12-27 14:23:03: DEBUG: encklen = 256 2012-12-27 14:23:03: DEBUG: hashtype = SHA 2012-12-27 14:23:03: DEBUG: authmethod = XAuth pskey client 2012-12-27 14:23:03: DEBUG: dh_group = 1024-bit MODP group 2012-12-27 14:23:03: DEBUG: an acceptable proposal found. 2012-12-27 14:23:03: DEBUG: hmac(modp1024) 2012-12-27 14:23:03: DEBUG: agreed on XAuth pskey server auth. 2012-12-27 14:23:03: DEBUG: === 2012-12-27 14:23:03: DEBUG: new cookie: 3b982c5815994205 2012-12-27 14:23:03: DEBUG: use ID type of IPv4_address 2012-12-27 14:23:03: DEBUG: compute DH's private. 2012-12-27 14:23:03: DEBUG: 449559ae 280e8cf0 e4a46eb8 da9adc62 848c898c fc834380 4895f99f 4932b6a2 9175aeaf a3cd2c26 ef8bc288 6a74598d e4664706 c18ff7de 5b7e637f b81c18d6 ad186eab 35d91e11 34dd4299 0b14e8f9 1861d478 82f752d0 6a224d65 307b4b16 81d0a939 bad93922 7cbe4ad6 09ec144d b4f96eca d6636d7f c1ea8b74 82caafa8 2012-12-27 14:23:03: DEBUG: compute DH's public. 2012-12-27 14:23:03: DEBUG: c8c57d51 ba87c123 3d1db319 850febb4 94e7f2aa d165a340 6954a96e 126eb5e9 1b477135 9ff3e4f0 9e67abb5 22622bd7 923ee692 2f12fa9b dad3fbc9 fa692bce 6dd32a44 b3178106 b7c04fa2 3581149f 469401a9 ef388b4c b87f0e82 6ef81d72 72a9df66 c257b551 f149a344 dce83c95 fcb5e79b 3bf563a3 955b0b04 65eb1878 2012-12-27 14:23:03: DEBUG: compute DH's shared. 2012-12-27 14:23:03: DEBUG: 174a57bb 03d7d54d cb3c21aa c2f7f016 7ec16ae9 b5d067a6 6c28b6f0 0c94b35e e037a13f 553fba5c 486d3a44 ef93f97e 8e843713 f30e587a 4c06a8ac 6cbd6f7c 80faaf91 5a3e14cc 30b74fae 427e6d82 9a56dbd6 56c2560e f358b251 ddccbf89 c41668ab 3e349451 02999c65 96f3e8f6 41d2e7f3 89282058 dd0ef4eb fea7f372 2012-12-27 14:23:03: DEBUG: the psk found. 2012-12-27 14:23:03: DEBUG: nonce 1: 2012-12-27 14:23:03: DEBUG: b877160e 0b50d3cc db98f1b4 d0c5ee1e 2012-12-27 14:23:03: DEBUG: nonce 2: 2012-12-27 14:23:03: DEBUG: 83bda291 51d68889 28c40aaa 5a9dc022 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: SKEYID computed: 2012-12-27 14:23:03: DEBUG: af73dd89 577c85d8 166ae106 15e1087f 2d076e60 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: SKEYID_d computed: 2012-12-27 14:23:03: DEBUG: 74069ec5 93dc825c a0a256eb c5e1db45 ed840dc5 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: SKEYID_a computed: 2012-12-27 14:23:03: DEBUG: 9d85dc6f 0e87f7a0 4d98b0a5 035e7b0d 0e4b65da 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: SKEYID_e computed: 2012-12-27 14:23:03: DEBUG: 1cff6cdd acdf3336 a1476022 4fd390bf 581fe8a8 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: compute intermediate encryption key K1 2012-12-27 14:23:03: DEBUG: 00 2012-12-27 14:23:03: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: compute intermediate encryption key K2 2012-12-27 14:23:03: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 2012-12-27 14:23:03: DEBUG: 52563aa2 6b3adb8f 92ab159b 49f03ebf 6fd81744 2012-12-27 14:23:03: DEBUG: final encryption key computed: 2012-12-27 14:23:03: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: IV computed: 2012-12-27 14:23:03: DEBUG: 21adcad4 18f43836 06c4feea 9e6bd3a7 2012-12-27 14:23:03: DEBUG: generate HASH_R 2012-12-27 14:23:03: DEBUG: HASH with: 2012-12-27 14:23:03: DEBUG: c8c57d51 ba87c123 3d1db319 850febb4 94e7f2aa d165a340 6954a96e 126eb5e9 1b477135 9ff3e4f0 9e67abb5 22622bd7 923ee692 2f12fa9b dad3fbc9 fa692bce 6dd32a44 b3178106 b7c04fa2 3581149f 469401a9 ef388b4c b87f0e82 6ef81d72 72a9df66 c257b551 f149a344 dce83c95 fcb5e79b 3bf563a3 955b0b04 65eb1878 66aa91b6 5607915e bb5bd74b 88640012 8b62f6d9 6e7b1a89 44558449 9a03842b ba83f879 44fc8270 015ac736 ba6da749 73d3c1bf f305d828 0a534cc6 2b18be0c cd4a337e 124674bd 0dc88407 8a1e05fe 55594dce 1fc626cd f220b4a3 a8f59f04 93bc7f2e 28a3a916 a071c3f7 0206136a 296fcc95 2227cf90 94d08cc0 09e68227 3b982c58 15994205 925b8c8b b4e92e20 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 011101f4 b50f59fa 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: HASH (resp) computed: 2012-12-27 14:23:03: DEBUG: 718da6b9 dedb3ea9 498df4b2 c2a57581 ff3414d0 2012-12-27 14:23:03: INFO: Adding remote and local NAT-D payloads. 2012-12-27 14:23:03: [181.12.242.251] INFO: Hashing 181.12.242.251[500] with algo #2 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: [XXX.XXX.XXX.XXX] INFO: Hashing XXX.XXX.XXX.XXX[500] with algo #2 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: INFO: Adding xauth VID payload. 2012-12-27 14:23:03: DEBUG: add payload of len 52, next type 4 2012-12-27 14:23:03: DEBUG: add payload of len 128, next type 10 2012-12-27 14:23:03: DEBUG: add payload of len 16, next type 5 2012-12-27 14:23:03: DEBUG: add payload of len 8, next type 8 2012-12-27 14:23:03: DEBUG: add payload of len 20, next type 13 2012-12-27 14:23:03: DEBUG: add payload of len 8, next type 13 2012-12-27 14:23:03: DEBUG: add payload of len 16, next type 13 2012-12-27 14:23:03: DEBUG: add payload of len 16, next type 20 2012-12-27 14:23:03: DEBUG: add payload of len 20, next type 20 2012-12-27 14:23:03: DEBUG: add payload of len 20, next type 13 2012-12-27 14:23:03: DEBUG: add payload of len 16, next type 0 2012-12-27 14:23:03: DEBUG: 392 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:03: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:03: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:03: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:03: DEBUG: 1 times of 392 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:03: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 01100400 00000000 00000188 04000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 0a000084 c8c57d51 ba87c123 3d1db319 850febb4 94e7f2aa d165a340 6954a96e 126eb5e9 1b477135 9ff3e4f0 9e67abb5 22622bd7 923ee692 2f12fa9b dad3fbc9 fa692bce 6dd32a44 b3178106 b7c04fa2 3581149f 469401a9 ef388b4c b87f0e82 6ef81d72 72a9df66 c257b551 f149a344 dce83c95 fcb5e79b 3bf563a3 955b0b04 65eb1878 05000014 83bda291 51d68889 28c40aaa 5a9dc022 0800000c 011101f4 b50f59fa 0d000018 718da6b9 dedb3ea9 498df4b2 c2a57581 ff3414d0 0d00000c 09002689 dfd6b712 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 14000014 4a131c81 07035845 5c5728f2 0e95452f 14000018 5dc3c684 be24d6fd a76bc76e 1543e7b2 de51ed4d 0d000018 365a93c2 d40ac1b1 069484ab 2857b991 cbe6a2a5 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2012-12-27 14:23:03: DEBUG: resend phase1 packet 925b8c8bb4e92e20:3b982c5815994205 2012-12-27 14:23:03: DEBUG: === 2012-12-27 14:23:03: DEBUG: 140 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:03: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100401 00000000 0000008c e559d159 4fd7e695 d63e5878 b5c0d502 979fcf08 6724d32f 5e6f0294 cc8ebaf3 5ba85288 0e3338bd 031713c6 849e122f d0b3128d caac2210 9971baf6 4c04878c 2d276fe0 28f0ce8b cf21c559 bb8e95ee 68960e95 e5ce68f4 80c46bff ca8efd9e 2704201f 4b11177b 5db93955 59d22f9a 2012-12-27 14:23:03: DEBUG: begin decryption. 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: IV was saved for next processing: 2012-12-27 14:23:03: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: with key: 2012-12-27 14:23:03: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:03: DEBUG: decrypted payload by IV: 2012-12-27 14:23:03: DEBUG: 21adcad4 18f43836 06c4feea 9e6bd3a7 2012-12-27 14:23:03: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:03: DEBUG: 14000018 9db22d47 63653087 938c3178 0af4d769 ebaa4da2 14000018 365a93c2 d40ac1b1 069484ab 2857b991 cbe6a2a5 0b000018 5dc3c684 be24d6fd a76bc76e 1543e7b2 de51ed4d 0000001c 00000001 01106002 925b8c8b b4e92e20 3b982c58 15994205 00000000 00000000 0000000c 2012-12-27 14:23:03: DEBUG: padding len=13 2012-12-27 14:23:03: DEBUG: skip to trim padding. 2012-12-27 14:23:03: DEBUG: decrypted. 2012-12-27 14:23:03: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100401 00000000 0000008c 14000018 9db22d47 63653087 938c3178 0af4d769 ebaa4da2 14000018 365a93c2 d40ac1b1 069484ab 2857b991 cbe6a2a5 0b000018 5dc3c684 be24d6fd a76bc76e 1543e7b2 de51ed4d 0000001c 00000001 01106002 925b8c8b b4e92e20 3b982c58 15994205 00000000 00000000 0000000c 2012-12-27 14:23:03: DEBUG: begin. 2012-12-27 14:23:03: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:03: DEBUG: seen nptype=20(nat-d) 2012-12-27 14:23:03: DEBUG: seen nptype=20(nat-d) 2012-12-27 14:23:03: DEBUG: seen nptype=11(notify) 2012-12-27 14:23:03: DEBUG: succeed. 2012-12-27 14:23:03: [XXX.XXX.XXX.XXX] INFO: Hashing XXX.XXX.XXX.XXX[500] with algo #2 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: INFO: NAT-D payload #0 verified 2012-12-27 14:23:03: [181.12.242.251] INFO: Hashing 181.12.242.251[500] with algo #2 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: INFO: NAT-D payload #1 verified 2012-12-27 14:23:03: [181.12.242.251] ERROR: notification INITIAL-CONTACT received in aggressive exchange. 2012-12-27 14:23:03: INFO: NAT not detected 2012-12-27 14:23:03: DEBUG: HASH received: 2012-12-27 14:23:03: DEBUG: 9db22d47 63653087 938c3178 0af4d769 ebaa4da2 2012-12-27 14:23:03: DEBUG: HASH with: 2012-12-27 14:23:03: DEBUG: 66aa91b6 5607915e bb5bd74b 88640012 8b62f6d9 6e7b1a89 44558449 9a03842b ba83f879 44fc8270 015ac736 ba6da749 73d3c1bf f305d828 0a534cc6 2b18be0c cd4a337e 124674bd 0dc88407 8a1e05fe 55594dce 1fc626cd f220b4a3 a8f59f04 93bc7f2e 28a3a916 a071c3f7 0206136a 296fcc95 2227cf90 94d08cc0 09e68227 c8c57d51 ba87c123 3d1db319 850febb4 94e7f2aa d165a340 6954a96e 126eb5e9 1b477135 9ff3e4f0 9e67abb5 22622bd7 923ee692 2f12fa9b dad3fbc9 fa692bce 6dd32a44 b3178106 b7c04fa2 3581149f 469401a9 ef388b4c b87f0e82 6ef81d72 72a9df66 c257b551 f149a344 dce83c95 fcb5e79b 3bf563a3 955b0b04 65eb1878 925b8c8b b4e92e20 3b982c58 15994205 00000001 00000001 00000118 01010008 03000024 01010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020002 80040002 03000024 02010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020002 80040002 03000024 03010000 800b0001 800c0e10 80010007 800e0100 8003fde9 80020001 80040002 03000024 04010000 800b0001 800c0e10 80010007 800e0080 8003fde9 80020001 80040002 03000020 05010000 800b0001 800c0e10 80010005 8003fde9 80020002 80040002 03000020 06010000 800b0001 800c0e10 80010005 8003fde9 80020001 80040002 03000020 07010000 800b0001 800c0e10 80010001 8003fde9 80020002 80040002 00000020 08010000 800b0001 800c0e10 80010001 8003fde9 80020001 80040002 0b000000 74657374 4067726f 7570 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: HASH (resp) computed: 2012-12-27 14:23:03: DEBUG: 9db22d47 63653087 938c3178 0af4d769 ebaa4da2 2012-12-27 14:23:03: DEBUG: HASH for PSK validated. 2012-12-27 14:23:03: DEBUG: === 2012-12-27 14:23:03: INFO: Sending Xauth request 2012-12-27 14:23:03: DEBUG: compute IV for phase2 2012-12-27 14:23:03: DEBUG: phase1 last IV: 2012-12-27 14:23:03: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a eefb4e49 2012-12-27 14:23:03: DEBUG: hash(sha1) 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: phase2 IV computed: 2012-12-27 14:23:03: DEBUG: ae2644cd 0f7445ea 752a60ef 1d6b40ce 2012-12-27 14:23:03: DEBUG: HASH with: 2012-12-27 14:23:03: DEBUG: eefb4e49 00000014 0100a8c9 c0880000 40890000 408a0000 2012-12-27 14:23:03: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:03: DEBUG: HASH computed: 2012-12-27 14:23:03: DEBUG: fdb53b8a 81406f03 71894d46 2c547037 73833849 2012-12-27 14:23:03: DEBUG: MODE_CFG packet to send 2012-12-27 14:23:03: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 eefb4e49 00000048 0e000018 fdb53b8a 81406f03 71894d46 2c547037 73833849 00000014 0100a8c9 c0880000 40890000 408a0000 2012-12-27 14:23:03: DEBUG: begin encryption. 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: pad length = 4 2012-12-27 14:23:03: DEBUG: 0e000018 fdb53b8a 81406f03 71894d46 2c547037 73833849 00000014 0100a8c9 c0880000 40890000 408a0000 dbecda03 2012-12-27 14:23:03: DEBUG: encryption(aes) 2012-12-27 14:23:03: DEBUG: with key: 2012-12-27 14:23:03: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:03: DEBUG: encrypted payload by IV: 2012-12-27 14:23:03: DEBUG: ae2644cd 0f7445ea 752a60ef 1d6b40ce 2012-12-27 14:23:03: DEBUG: save IV for next: 2012-12-27 14:23:03: DEBUG: 9d6bf6be 87e31072 889cbaf7 156033bd 2012-12-27 14:23:03: DEBUG: encrypted. 2012-12-27 14:23:03: DEBUG: 76 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:03: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:03: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:03: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:03: DEBUG: 1 times of 76 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:03: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 eefb4e49 0000004c 2b1311dc aff83d30 ff56a144 b1128a4d 3f13bc93 abe0c7b2 4b1ab36b 180b61dd 9d6bf6be 87e31072 889cbaf7 156033bd 2012-12-27 14:23:03: DEBUG: sendto mode config attr. 2012-12-27 14:23:03: INFO: ISAKMP-SA established XXX.XXX.XXX.XXX[500]-181.12.242.251[500] spi:925b8c8bb4e92e20:3b982c5815994205 2012-12-27 14:23:03: DEBUG: === 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: 92 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 eefb4e49 0000005c 265b736f 1992dc90 f68801f2 706a7f43 5b7af6f1 3eea03d0 d27de171 5d9be370 920de657 a8595d30 b9b73442 f35d6371 dcf624a3 9c0c66f3 0346332b 87b854a9 2012-12-27 14:23:04: DEBUG: begin decryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: IV was saved for next processing: 2012-12-27 14:23:04: DEBUG: dcf624a3 9c0c66f3 0346332b 87b854a9 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: decrypted payload by IV: 2012-12-27 14:23:04: DEBUG: 9d6bf6be 87e31072 889cbaf7 156033bd 2012-12-27 14:23:04: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:04: DEBUG: 0e000018 923f22c8 8ca89ce8 6e3ce2c7 c7b7fbe3 17c5eeea 0000001c 0200a800 40890005 6a6f7267 65408a00 07647245 73674559 00000000 00000000 0000000c 2012-12-27 14:23:04: DEBUG: padding len=13 2012-12-27 14:23:04: DEBUG: skip to trim padding. 2012-12-27 14:23:04: DEBUG: decrypted. 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 eefb4e49 0000005c 0e000018 923f22c8 8ca89ce8 6e3ce2c7 c7b7fbe3 17c5eeea 0000001c 0200a800 40890005 6a6f7267 65408a00 07647245 73674559 00000000 00000000 0000000c 2012-12-27 14:23:04: DEBUG: MODE_CFG packet 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 eefb4e49 0000005c 0e000018 923f22c8 8ca89ce8 6e3ce2c7 c7b7fbe3 17c5eeea 0000001c 0200a800 40890005 6a6f7267 65408a00 07647245 73674559 00000000 00000000 0000000c 2012-12-27 14:23:04: DEBUG: Seen payload 8 2012-12-27 14:23:04: DEBUG: 0e000018 923f22c8 8ca89ce8 6e3ce2c7 c7b7fbe3 17c5eeea 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: eefb4e49 0000001c 0200a800 40890005 6a6f7267 65408a00 07647245 73674559 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: 923f22c8 8ca89ce8 6e3ce2c7 c7b7fbe3 17c5eeea 2012-12-27 14:23:04: DEBUG: Seen payload 14 2012-12-27 14:23:04: DEBUG: 0000001c 0200a800 40890005 6a6f7267 65408a00 07647245 73674559 2012-12-27 14:23:04: DEBUG: Configuration exchange type mode config REPLY 2012-12-27 14:23:04: DEBUG: Attribute XAUTH_USER_NAME, len 5 2012-12-27 14:23:04: DEBUG: Attribute XAUTH_USER_PASSWORD, len 7 2012-12-27 14:23:04: INFO: Using port 0 2012-12-27 14:23:04: INFO: login succeeded for user "jorge" 2012-12-27 14:23:04: DEBUG: IV freed 2012-12-27 14:23:04: DEBUG: compute IV for phase2 2012-12-27 14:23:04: DEBUG: phase1 last IV: 2012-12-27 14:23:04: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a e509fd80 2012-12-27 14:23:04: DEBUG: hash(sha1) 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: phase2 IV computed: 2012-12-27 14:23:04: DEBUG: 45710b3a e41ceac0 cdf93599 b4495fbc 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: e509fd80 0000000c 0300a800 c08f0001 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: cc9443c8 d3df94c0 5da45327 cab9de60 f3730e99 2012-12-27 14:23:04: DEBUG: MODE_CFG packet to send 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 e509fd80 00000040 0e000018 cc9443c8 d3df94c0 5da45327 cab9de60 f3730e99 0000000c 0300a800 c08f0001 2012-12-27 14:23:04: DEBUG: begin encryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: pad length = 12 2012-12-27 14:23:04: DEBUG: 0e000018 cc9443c8 d3df94c0 5da45327 cab9de60 f3730e99 0000000c 0300a800 c08f0001 f9a9c487 a59ba0d9 ffd7ae0b 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: encrypted payload by IV: 2012-12-27 14:23:04: DEBUG: 45710b3a e41ceac0 cdf93599 b4495fbc 2012-12-27 14:23:04: DEBUG: save IV for next: 2012-12-27 14:23:04: DEBUG: 807fa7c0 6829e7e8 d2faa7f2 6acb6684 2012-12-27 14:23:04: DEBUG: encrypted. 2012-12-27 14:23:04: DEBUG: 76 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: 1 times of 76 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 e509fd80 0000004c e46eefb3 41f0352b a134c7b5 b479d997 83f1aa76 bd48dbf2 423c8ae5 b85e7784 807fa7c0 6829e7e8 d2faa7f2 6acb6684 2012-12-27 14:23:04: DEBUG: sendto mode config attr. 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: 76 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 e509fd80 0000004c 7aba9740 3f5e7759 3f579006 1d4b74c3 898926c1 31976751 2ab90451 00cf3164 66c8ef77 e7d852fb fc02f013 2338f263 2012-12-27 14:23:04: DEBUG: begin decryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: IV was saved for next processing: 2012-12-27 14:23:04: DEBUG: 66c8ef77 e7d852fb fc02f013 2338f263 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: decrypted payload by IV: 2012-12-27 14:23:04: DEBUG: 807fa7c0 6829e7e8 d2faa7f2 6acb6684 2012-12-27 14:23:04: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:04: DEBUG: 0e000018 9719b789 3c435cac e66e64e8 458dfea8 a1858225 0000000c 0400a800 c08f0000 00000000 00000000 0000000c 2012-12-27 14:23:04: DEBUG: padding len=13 2012-12-27 14:23:04: DEBUG: skip to trim padding. 2012-12-27 14:23:04: DEBUG: decrypted. 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 e509fd80 0000004c 0e000018 9719b789 3c435cac e66e64e8 458dfea8 a1858225 0000000c 0400a800 c08f0000 00000000 00000000 0000000c 2012-12-27 14:23:04: DEBUG: MODE_CFG packet 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 e509fd80 0000004c 0e000018 9719b789 3c435cac e66e64e8 458dfea8 a1858225 0000000c 0400a800 c08f0000 00000000 00000000 0000000c 2012-12-27 14:23:04: DEBUG: Seen payload 8 2012-12-27 14:23:04: DEBUG: 0e000018 9719b789 3c435cac e66e64e8 458dfea8 a1858225 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: e509fd80 0000000c 0400a800 c08f0000 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: 9719b789 3c435cac e66e64e8 458dfea8 a1858225 2012-12-27 14:23:04: DEBUG: Seen payload 14 2012-12-27 14:23:04: DEBUG: 0000000c 0400a800 c08f0000 2012-12-27 14:23:04: DEBUG: Configuration exchange type mode config ACK 2012-12-27 14:23:04: DEBUG: IV freed 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: 172 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 12bf6f5b 000000ac 5896a130 5efb73ac 1e2d45b2 cf0cd500 d1a3c59c 6c1b4121 0b3237bf 0844e661 76e6688b c0f22dc7 4a93fa50 bcdc6ca0 c2fc2476 90bbf956 b254c696 5fd90a38 d0312eea 398228bc b7ccae83 fa250c60 33751ff8 0e34ebdb b232114b 57b1c51e 50ac10aa d98c45e9 9e4410e7 66394873 702c2e87 6a9f7b0c 66a533e7 443c658f a94b0fb0 f67d4ce2 e25c4345 632c8817 2012-12-27 14:23:04: DEBUG: compute IV for phase2 2012-12-27 14:23:04: DEBUG: phase1 last IV: 2012-12-27 14:23:04: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 12bf6f5b 2012-12-27 14:23:04: DEBUG: hash(sha1) 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: phase2 IV computed: 2012-12-27 14:23:04: DEBUG: 82d413c1 0b471f11 567f4e56 b0053ab2 2012-12-27 14:23:04: DEBUG: begin decryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: IV was saved for next processing: 2012-12-27 14:23:04: DEBUG: a94b0fb0 f67d4ce2 e25c4345 632c8817 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: decrypted payload by IV: 2012-12-27 14:23:04: DEBUG: 82d413c1 0b471f11 567f4e56 b0053ab2 2012-12-27 14:23:04: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:04: DEBUG: 0e000018 a5b6c917 db618af4 1ffe91a3 f2b627ae 2bea83fc 00000070 010073d9 00010000 00020000 00030000 00040000 00050000 00070028 43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20352e31 2e313a69 50686f6e 65204f53 70000000 70020000 70030000 70040000 70060000 70070000 70010000 70080000 70090000 700b0000 00000000 00000008 2012-12-27 14:23:04: DEBUG: padding len=9 2012-12-27 14:23:04: DEBUG: skip to trim padding. 2012-12-27 14:23:04: DEBUG: decrypted. 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 12bf6f5b 000000ac 0e000018 a5b6c917 db618af4 1ffe91a3 f2b627ae 2bea83fc 00000070 010073d9 00010000 00020000 00030000 00040000 00050000 00070028 43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20352e31 2e313a69 50686f6e 65204f53 70000000 70020000 70030000 70040000 70060000 70070000 70010000 70080000 70090000 700b0000 00000000 00000008 2012-12-27 14:23:04: DEBUG: MODE_CFG packet 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 12bf6f5b 000000ac 0e000018 a5b6c917 db618af4 1ffe91a3 f2b627ae 2bea83fc 00000070 010073d9 00010000 00020000 00030000 00040000 00050000 00070028 43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20352e31 2e313a69 50686f6e 65204f53 70000000 70020000 70030000 70040000 70060000 70070000 70010000 70080000 70090000 700b0000 00000000 00000008 2012-12-27 14:23:04: DEBUG: Seen payload 8 2012-12-27 14:23:04: DEBUG: 0e000018 a5b6c917 db618af4 1ffe91a3 f2b627ae 2bea83fc 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: 12bf6f5b 00000070 010073d9 00010000 00020000 00030000 00040000 00050000 00070028 43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20352e31 2e313a69 50686f6e 65204f53 70000000 70020000 70030000 70040000 70060000 70070000 70010000 70080000 70090000 700b0000 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: a5b6c917 db618af4 1ffe91a3 f2b627ae 2bea83fc 2012-12-27 14:23:04: DEBUG: Seen payload 14 2012-12-27 14:23:04: DEBUG: 00000070 010073d9 00010000 00020000 00030000 00040000 00050000 00070028 43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20352e31 2e313a69 50686f6e 65204f53 70000000 70020000 70030000 70040000 70060000 70070000 70010000 70080000 70090000 700b0000 2012-12-27 14:23:04: DEBUG: Configuration exchange type mode config REQUEST 2012-12-27 14:23:04: DEBUG: Attribute INTERNAL_IP4_ADDRESS, len 0 2012-12-27 14:23:04: DEBUG: Attribute INTERNAL_IP4_NETMASK, len 0 2012-12-27 14:23:04: DEBUG: Attribute INTERNAL_IP4_DNS, len 0 2012-12-27 14:23:04: DEBUG: Attribute INTERNAL_IP4_NBNS, len 0 2012-12-27 14:23:04: DEBUG: Attribute INTERNAL_ADDRESS_EXPIRY, len 0 2012-12-27 14:23:04: WARNING: Ignored attribute INTERNAL_ADDRESS_EXPIRY 2012-12-27 14:23:04: DEBUG: Attribute APPLICATION_VERSION, len 40 2012-12-27 14:23:04: DEBUG: Attribute UNITY_BANNER, len 0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_DEF_DOMAIN, len 0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_SPLITDNS_NAME, len 0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_SPLIT_INCLUDE, len 0 2012-12-27 14:23:04: DEBUG: splitnet: 172.21.2.0/255.255.255.0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_LOCAL_LAN, len 0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_PFS, len 0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_SAVE_PASSWD, len 0 2012-12-27 14:23:04: DEBUG: Attribute UNITY_FW_TYPE, len 0 2012-12-27 14:23:04: DEBUG: Ignored attribute UNITY_FW_TYPE 2012-12-27 14:23:04: DEBUG: Attribute UNITY_BACKUP_SERVERS, len 0 2012-12-27 14:23:04: DEBUG: Ignored attribute UNITY_BACKUP_SERVERS 2012-12-27 14:23:04: DEBUG: Attribute 28683, len 0 2012-12-27 14:23:04: WARNING: Ignored attribute 28683 2012-12-27 14:23:04: DEBUG: Sending MODE_CFG REPLY 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: 12bf6f5b 000000b7 020073d9 00010004 0ab8d801 00020004 ffffff00 00030004 ac1502fe 00040004 ac1502fb 00070014 7261636f 6f6e202f 20495073 65632d74 6f6f6c73 70000034 4269656e 76656e69 646f2061 20474553 494e434f 2e205072 6f686962 69646f20 73752075 736f206e 6f206175 746f7269 7a61646f 7002000e 67657369 6e636f2e 636f6d2e 61727003 000f6765 73696e63 6f2e636f 6d2e6172 00700400 0eac1502 00ffffff 00000000 000000f0 070000f0 010001 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: ec21ebec e0e43808 c96ecae0 24891152 db38d759 2012-12-27 14:23:04: DEBUG: MODE_CFG packet to send 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 12bf6f5b 000000eb 0e000018 ec21ebec e0e43808 c96ecae0 24891152 db38d759 000000b7 020073d9 00010004 0ab8d801 00020004 ffffff00 00030004 ac1502fe 00040004 ac1502fb 00070014 7261636f 6f6e202f 20495073 65632d74 6f6f6c73 70000034 4269656e 76656e69 646f2061 20474553 494e434f 2e205072 6f686962 69646f20 73752075 736f206e 6f206175 746f7269 7a61646f 7002000e 67657369 6e636f2e 636f6d2e 61727003 000f6765 73696e63 6f2e636f 6d2e6172 00700400 0eac1502 00ffffff 00000000 000000f0 070000f0 010001 2012-12-27 14:23:04: DEBUG: begin encryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: pad length = 1 2012-12-27 14:23:04: DEBUG: 0e000018 ec21ebec e0e43808 c96ecae0 24891152 db38d759 000000b7 020073d9 00010004 0ab8d801 00020004 ffffff00 00030004 ac1502fe 00040004 ac1502fb 00070014 7261636f 6f6e202f 20495073 65632d74 6f6f6c73 70000034 4269656e 76656e69 646f2061 20474553 494e434f 2e205072 6f686962 69646f20 73752075 736f206e 6f206175 746f7269 7a61646f 7002000e 67657369 6e636f2e 636f6d2e 61727003 000f6765 73696e63 6f2e636f 6d2e6172 00700400 0eac1502 00ffffff 00000000 000000f0 070000f0 01000100 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: encrypted payload by IV: 2012-12-27 14:23:04: DEBUG: a94b0fb0 f67d4ce2 e25c4345 632c8817 2012-12-27 14:23:04: DEBUG: save IV for next: 2012-12-27 14:23:04: DEBUG: 2395dd1f 07179a5a 3c2c093e 1d635a17 2012-12-27 14:23:04: DEBUG: encrypted. 2012-12-27 14:23:04: DEBUG: 236 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: 1 times of 236 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100601 12bf6f5b 000000ec adde3920 50f6acdc 9d0b99a9 60713dbe 8590fd95 7fc7b6aa aa1181b7 663587fb 24de3d5a afcc9932 6a2f82d3 d0e53364 7e87ba1e 58b9982c d77e40d9 e75cca67 0a5984f8 333ef061 2276ce0c c50e2784 8a9ce791 48599ba2 094101be 2cfa52b3 f20d123e 1e0760db 8791d7ce 867a8730 8f71dc97 a70c93b7 b55bebff d0e7384a 71fc1a01 21ae8c72 39ef51d2 436c3ed8 0836dae0 2a8b7bd8 740b2a5e 0b0b28b0 69d659f8 0e4d6b37 66e95fc2 f18fe64d cf881a35 338b2636 3e66e5c3 bc2fc3c4 2395dd1f 07179a5a 3c2c093e 1d635a17 2012-12-27 14:23:04: DEBUG: sendto mode config attr. 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: 300 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08102001 0878c0f0 0000012c 84573eb1 899c212d 4e40ba80 57c78d83 1f2721a5 62016df5 cb9317cd 5aeb305f 43e71344 8a389c4a cd0632d1 1d32489a 39802789 ad5560cd 65df18b0 9fc7482d ef0e356a 35c9389c 38fb413a 5e620e24 7ddd59d8 a799c95c 7307643c ceeab85a 6769818e f805094e 63cd0607 ca0b2a74 0aef9693 f948e585 cec4b26e 1aa67c55 627a26ae c241ca60 b4897bde 3b0adcf7 882f1327 a6b32286 6a6a58d0 e3c954d5 4d4f4445 7b022eec 78eb6aec 46322336 028fcc8f 5eb5b90d 3d034467 11b8cae0 c8314173 54ab24a0 f695fc0a 4ccf1a22 d3343ae3 08e60cb6 0160faaf 1e50ec89 cd2aa979 5d5c2ef3 838a71cc bfb69603 ebb40f9b 57ff8ab6 0db20ed5 dff06077 9c073701 ef30f97b a86c8091 84f8264d 2012-12-27 14:23:04: DEBUG: IV freed 2012-12-27 14:23:04: DEBUG: compute IV for phase2 2012-12-27 14:23:04: DEBUG: phase1 last IV: 2012-12-27 14:23:04: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 0878c0f0 2012-12-27 14:23:04: DEBUG: hash(sha1) 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: phase2 IV computed: 2012-12-27 14:23:04: DEBUG: ce2cde17 659ff14a 250970af e5ca10f2 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: INFO: respond new phase 2 negotiation: XXX.XXX.XXX.XXX[500]<=>181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: begin decryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: IV was saved for next processing: 2012-12-27 14:23:04: DEBUG: 9c073701 ef30f97b a86c8091 84f8264d 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: decrypted payload by IV: 2012-12-27 14:23:04: DEBUG: ce2cde17 659ff14a 250970af e5ca10f2 2012-12-27 14:23:04: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:04: DEBUG: 01000018 749a2453 2b3c5c71 b72fcf7f 38014014 0f790f65 0a0000b8 00000001 00000001 000000ac 01030406 000543c4 0300001c 010c0000 80010001 80020e10 80040001 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040001 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040001 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040001 80060080 80050001 03000018 05030000 80010001 80020e10 80040001 80050002 00000018 06030000 80010001 80020e10 80040001 80050001 05000014 9ccb2f2b 6d00e5c0 7b58f881 fe9e951c 0500000c 01000000 0ab8d801 00000010 04000000 ac150200 ffffff00 00000000 00000000 00000000 00000010 2012-12-27 14:23:04: DEBUG: padding len=17 2012-12-27 14:23:04: DEBUG: skip to trim padding. 2012-12-27 14:23:04: DEBUG: decrypted. 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08102001 0878c0f0 0000012c 01000018 749a2453 2b3c5c71 b72fcf7f 38014014 0f790f65 0a0000b8 00000001 00000001 000000ac 01030406 000543c4 0300001c 010c0000 80010001 80020e10 80040001 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040001 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040001 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040001 80060080 80050001 03000018 05030000 80010001 80020e10 80040001 80050002 00000018 06030000 80010001 80020e10 80040001 80050001 05000014 9ccb2f2b 6d00e5c0 7b58f881 fe9e951c 0500000c 01000000 0ab8d801 00000010 04000000 ac150200 ffffff00 00000000 00000000 00000000 00000010 2012-12-27 14:23:04: DEBUG: begin. 2012-12-27 14:23:04: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:04: DEBUG: seen nptype=1(sa) 2012-12-27 14:23:04: DEBUG: seen nptype=10(nonce) 2012-12-27 14:23:04: DEBUG: seen nptype=5(id) 2012-12-27 14:23:04: DEBUG: seen nptype=5(id) 2012-12-27 14:23:04: DEBUG: succeed. 2012-12-27 14:23:04: DEBUG: received IDci2:2012-12-27 14:23:04: DEBUG: 01000000 0ab8d801 2012-12-27 14:23:04: DEBUG: received IDcr2:2012-12-27 14:23:04: DEBUG: 04000000 ac150200 ffffff00 2012-12-27 14:23:04: DEBUG: HASH(1) validate:2012-12-27 14:23:04: DEBUG: 749a2453 2b3c5c71 b72fcf7f 38014014 0f790f65 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: 0878c0f0 0a0000b8 00000001 00000001 000000ac 01030406 000543c4 0300001c 010c0000 80010001 80020e10 80040001 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040001 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040001 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040001 80060080 80050001 03000018 05030000 80010001 80020e10 80040001 80050002 00000018 06030000 80010001 80020e10 80040001 80050001 05000014 9ccb2f2b 6d00e5c0 7b58f881 fe9e951c 0500000c 01000000 0ab8d801 00000010 04000000 ac150200 ffffff00 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: 749a2453 2b3c5c71 b72fcf7f 38014014 0f790f65 2012-12-27 14:23:04: DEBUG: getsainfo params: loc='172.21.2.0/24' rmt='10.184.216.1' peer='' client='10.184.216.1' id=1 2012-12-27 14:23:04: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=1 2012-12-27 14:23:04: DEBUG: check and compare ids : values matched (ANONYMOUS) 2012-12-27 14:23:04: DEBUG: check and compare ids : values matched (ANONYMOUS) 2012-12-27 14:23:04: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=1 2012-12-27 14:23:04: DEBUG: Either family (2 - 2), types (1 - 0) of ID from initiator differ or matching sainfo has no id_i defined for the peer. Not filling iph2->sa_src and iph2->sa_dst. 2012-12-27 14:23:04: DEBUG: get src address from ID payload 10.184.216.1[0] prefixlen=32 ul_proto=255 2012-12-27 14:23:04: DEBUG: get dst address from ID payload 172.21.2.0[0] prefixlen=24 ul_proto=255 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db: 0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: 0xbfbfe380 masked with /24: 10.184.216.0[0] 2012-12-27 14:23:04: DEBUG: 0x2854b148 masked with /24: 172.21.2.0[0] 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: INFO: Update the generated policy : 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db: 0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db: 0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db: 0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: 0xbfbfe380 masked with /32: 172.21.2.0[0] 2012-12-27 14:23:04: DEBUG: 0x2854b508 masked with /32: 172.21.2.254[0] 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe380: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b648: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: suitable SP found:172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=1:1) 2012-12-27 14:23:04: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha) 2012-12-27 14:23:04: DEBUG: total SA len=180 2012-12-27 14:23:04: DEBUG: 00000001 00000001 000000ac 01030406 000543c4 0300001c 010c0000 80010001 80020e10 80040001 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040001 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040001 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040001 80060080 80050001 03000018 05030000 80010001 80020e10 80040001 80050002 00000018 06030000 80010001 80020e10 80040001 80050001 2012-12-27 14:23:04: DEBUG: begin. 2012-12-27 14:23:04: DEBUG: seen nptype=2(prop) 2012-12-27 14:23:04: DEBUG: succeed. 2012-12-27 14:23:04: DEBUG: proposal #1 len=172 2012-12-27 14:23:04: DEBUG: begin. 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: succeed. 2012-12-27 14:23:04: DEBUG: transform #1 len=28 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: transform #2 len=28 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2012-12-27 14:23:04: DEBUG: transform #3 len=28 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=128 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: transform #4 len=28 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=128 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2012-12-27 14:23:04: DEBUG: transform #5 len=24 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: transform #6 len=24 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2012-12-27 14:23:04: DEBUG: pair 1: 2012-12-27 14:23:04: DEBUG: 0x285246a0: next=0x0 tnext=0x285246b0 2012-12-27 14:23:04: DEBUG: 0x285246b0: next=0x0 tnext=0x285246c0 2012-12-27 14:23:04: DEBUG: 0x285246c0: next=0x0 tnext=0x285246d0 2012-12-27 14:23:04: DEBUG: 0x285246d0: next=0x0 tnext=0x285246e0 2012-12-27 14:23:04: DEBUG: 0x285246e0: next=0x0 tnext=0x285246f0 2012-12-27 14:23:04: DEBUG: 0x285246f0: next=0x0 tnext=0x0 2012-12-27 14:23:04: DEBUG: proposal #1: 6 transform 2012-12-27 14:23:04: DEBUG: begin compare proposals. 2012-12-27 14:23:04: DEBUG: pair[1]: 0x285246a0 2012-12-27 14:23:04: DEBUG: 0x285246a0: next=0x0 tnext=0x285246b0 2012-12-27 14:23:04: DEBUG: 0x285246b0: next=0x0 tnext=0x285246c0 2012-12-27 14:23:04: DEBUG: 0x285246c0: next=0x0 tnext=0x285246d0 2012-12-27 14:23:04: DEBUG: 0x285246d0: next=0x0 tnext=0x285246e0 2012-12-27 14:23:04: DEBUG: 0x285246e0: next=0x0 tnext=0x285246f0 2012-12-27 14:23:04: DEBUG: 0x285246f0: next=0x0 tnext=0x0 2012-12-27 14:23:04: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=1 trns-id=AES 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=2 trns-id=AES 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2012-12-27 14:23:04: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=3 trns-id=AES 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=128 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=4 trns-id=AES 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=128 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2012-12-27 14:23:04: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=5 trns-id=3DES 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=6 trns-id=3DES 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2012-12-27 14:23:04: DEBUG: peer's single bundle: 2012-12-27 14:23:04: DEBUG: (proto_id=ESP spisize=4 spi=000543c4 spi_p=00000000 encmode=Tunnel reqid=0:0) 2012-12-27 14:23:04: DEBUG: (trns_id=AES encklen=256 authtype=hmac-sha) 2012-12-27 14:23:04: DEBUG: (trns_id=AES encklen=256 authtype=hmac-md5) 2012-12-27 14:23:04: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha) 2012-12-27 14:23:04: DEBUG: (trns_id=AES encklen=128 authtype=hmac-md5) 2012-12-27 14:23:04: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-sha) 2012-12-27 14:23:04: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-md5) 2012-12-27 14:23:04: DEBUG: my single bundle: 2012-12-27 14:23:04: DEBUG: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=1:1) 2012-12-27 14:23:04: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha) 2012-12-27 14:23:04: DEBUG: matched 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: call pfkey_send_getspi 2012-12-27 14:23:04: DEBUG: pfkey GETSPI sent: ESP/Tunnel 181.12.242.251[500]->XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: pfkey getspi sent. 2012-12-27 14:23:04: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:23:04: DEBUG: got pfkey GETSPI message 2012-12-27 14:23:04: DEBUG: pfkey GETSPI succeeded: ESP/Tunnel 181.12.242.251[500]->XXX.XXX.XXX.XXX[500] spi=201647856(0xc04e6f0) 2012-12-27 14:23:04: DEBUG: total SA len=48 2012-12-27 14:23:04: DEBUG: 00000001 00000001 00000028 01030401 00000000 0000001c 010c0000 80010001 80020e10 80040001 80060100 80050002 2012-12-27 14:23:04: DEBUG: begin. 2012-12-27 14:23:04: DEBUG: seen nptype=2(prop) 2012-12-27 14:23:04: DEBUG: succeed. 2012-12-27 14:23:04: DEBUG: proposal #1 len=40 2012-12-27 14:23:04: DEBUG: begin. 2012-12-27 14:23:04: DEBUG: seen nptype=3(trns) 2012-12-27 14:23:04: DEBUG: succeed. 2012-12-27 14:23:04: DEBUG: transform #1 len=28 2012-12-27 14:23:04: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2012-12-27 14:23:04: DEBUG: type=SA Life Duration, flag=0x8000, lorv=3600 2012-12-27 14:23:04: DEBUG: life duration was in TLV. 2012-12-27 14:23:04: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2012-12-27 14:23:04: DEBUG: type=Key Length, flag=0x8000, lorv=256 2012-12-27 14:23:04: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2012-12-27 14:23:04: DEBUG: pair 1: 2012-12-27 14:23:04: DEBUG: 0x285246a0: next=0x0 tnext=0x0 2012-12-27 14:23:04: DEBUG: proposal #1: 1 transform 2012-12-27 14:23:04: DEBUG: add payload of len 48, next type 10 2012-12-27 14:23:04: DEBUG: add payload of len 16, next type 5 2012-12-27 14:23:04: DEBUG: add payload of len 8, next type 5 2012-12-27 14:23:04: DEBUG: add payload of len 12, next type 0 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: 0878c0f0 9ccb2f2b 6d00e5c0 7b58f881 fe9e951c 0a000034 00000001 00000001 00000028 01030401 0c04e6f0 0000001c 010c0000 80010001 80020e10 80040001 80060100 80050002 05000014 8c96c826 6d69fb11 ae41d374 9f063dc8 0500000c 01000000 0ab8d801 00000010 04000000 ac150200 ffffff00 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: a710f1e1 52c2b592 434536b5 ba867be8 533a8e69 2012-12-27 14:23:04: DEBUG: add payload of len 20, next type 1 2012-12-27 14:23:04: DEBUG: begin encryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: pad length = 4 2012-12-27 14:23:04: DEBUG: 01000018 a710f1e1 52c2b592 434536b5 ba867be8 533a8e69 0a000034 00000001 00000001 00000028 01030401 0c04e6f0 0000001c 010c0000 80010001 80020e10 80040001 80060100 80050002 05000014 8c96c826 6d69fb11 ae41d374 9f063dc8 0500000c 01000000 0ab8d801 00000010 04000000 ac150200 ffffff00 99f0b803 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: encrypted payload by IV: 2012-12-27 14:23:04: DEBUG: 9c073701 ef30f97b a86c8091 84f8264d 2012-12-27 14:23:04: DEBUG: save IV for next: 2012-12-27 14:23:04: DEBUG: c40037a9 a1ca3824 b98c1777 8426908a 2012-12-27 14:23:04: DEBUG: encrypted. 2012-12-27 14:23:04: DEBUG: 156 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: 1 times of 156 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08102001 0878c0f0 0000009c cd9e86ec 184221c8 585fd09d f44816ed fdd52263 49fbfe55 33f2aa58 bfd1fd9d 534930ae 57d1d88a 3754a8cf 18b6681b 46d9f83c 4f83f4ec 5aafa8cf c115493f 3012ea0e ea80f272 fd67b212 0c0df69a 40124ca2 155aae25 67c6f777 e11df442 99613730 ee07f303 d90b8fc4 c4659517 c40037a9 a1ca3824 b98c1777 8426908a 2012-12-27 14:23:04: DEBUG: resend phase2 packet 925b8c8bb4e92e20:3b982c5815994205:00000878 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: 60 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08102001 0878c0f0 0000003c afa6e35b 5ab6fcf1 57e9bac7 39510805 3fee8d79 5f10cf60 d1f58e9e 66d94b7a 2012-12-27 14:23:04: DEBUG: begin decryption. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: IV was saved for next processing: 2012-12-27 14:23:04: DEBUG: 3fee8d79 5f10cf60 d1f58e9e 66d94b7a 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: with key: 2012-12-27 14:23:04: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:04: DEBUG: decrypted payload by IV: 2012-12-27 14:23:04: DEBUG: c40037a9 a1ca3824 b98c1777 8426908a 2012-12-27 14:23:04: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:04: DEBUG: 00000018 ae32bdd6 83cf54d3 a99fe8fd 67c7fac7 dc894e4f 00000000 00000008 2012-12-27 14:23:04: DEBUG: padding len=9 2012-12-27 14:23:04: DEBUG: skip to trim padding. 2012-12-27 14:23:04: DEBUG: decrypted. 2012-12-27 14:23:04: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08102001 0878c0f0 0000003c 00000018 ae32bdd6 83cf54d3 a99fe8fd 67c7fac7 dc894e4f 00000000 00000008 2012-12-27 14:23:04: DEBUG: begin. 2012-12-27 14:23:04: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:04: DEBUG: succeed. 2012-12-27 14:23:04: DEBUG: HASH(3) validate:2012-12-27 14:23:04: DEBUG: ae32bdd6 83cf54d3 a99fe8fd 67c7fac7 dc894e4f 2012-12-27 14:23:04: DEBUG: HASH with: 2012-12-27 14:23:04: DEBUG: 000878c0 f09ccb2f 2b6d00e5 c07b58f8 81fe9e95 1c8c96c8 266d69fb 11ae41d3 749f063d c8 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: HASH computed: 2012-12-27 14:23:04: DEBUG: ae32bdd6 83cf54d3 a99fe8fd 67c7fac7 dc894e4f 2012-12-27 14:23:04: DEBUG: === 2012-12-27 14:23:04: DEBUG: KEYMAT compute with 2012-12-27 14:23:04: DEBUG: 030c04e6 f09ccb2f 2b6d00e5 c07b58f8 81fe9e95 1c8c96c8 266d69fb 11ae41d3 749f063d c8 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: hmac(sha1) 2012-12-27 14:23:04: DEBUG: encklen=256 authklen=160 2012-12-27 14:23:04: DEBUG: generating 640 bits of key (dupkeymat=4) 2012-12-27 14:23:04: DEBUG: generating K1...K4 for KEYMAT. 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: 05ae3bfb cbe63bc7 8613ee0e 9498daa4 bbba6e28 fcb482f5 e3feec41 872c0be6 d69828db 70ccc8d5 929277a2 04a05fba b7176b1c 20b2e232 f2d32754 f8ce8fd2 c9268bbc e1ecd9b9 5d073803 ca71c32c 2012-12-27 14:23:04: DEBUG: KEYMAT compute with 2012-12-27 14:23:04: DEBUG: 03000543 c49ccb2f 2b6d00e5 c07b58f8 81fe9e95 1c8c96c8 266d69fb 11ae41d3 749f063d c8 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: hmac(sha1) 2012-12-27 14:23:04: DEBUG: encklen=256 authklen=160 2012-12-27 14:23:04: DEBUG: generating 640 bits of key (dupkeymat=4) 2012-12-27 14:23:04: DEBUG: generating K1...K4 for KEYMAT. 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:04: DEBUG: 18dd4123 9fa3069e a3b80fac 70f4bff3 be95cbca e3e0b440 4a45fffa 164c735a 426b0843 487eeeae a92d2fec 6a14081a 822d4a21 51a1eaa3 183c2bcd 6bc2af1b 1d6f6abb 5946ed0c 728f2191 39ebf035 2012-12-27 14:23:04: DEBUG: KEYMAT computed. 2012-12-27 14:23:04: DEBUG: call pk_sendupdate 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: hmac(sha1) 2012-12-27 14:23:04: DEBUG: call pfkey_send_update2 2012-12-27 14:23:04: DEBUG: pfkey update sent. 2012-12-27 14:23:04: DEBUG: encryption(aes) 2012-12-27 14:23:04: DEBUG: hmac(sha1) 2012-12-27 14:23:04: DEBUG: call pfkey_send_add2 (NAT flavor) 2012-12-27 14:23:04: DEBUG: call pfkey_send_add2 2012-12-27 14:23:04: DEBUG: pfkey add sent. 2012-12-27 14:23:04: DEBUG: call pfkey_send_spdupdate2 2012-12-27 14:23:04: DEBUG: pfkey spdupdate2(inbound) sent. 2012-12-27 14:23:04: DEBUG: call pfkey_send_spdupdate2 2012-12-27 14:23:04: DEBUG: pfkey spdupdate2(outbound) sent. 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe258: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe258: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe258: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe258: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe258: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b648: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:23:04: DEBUG: got pfkey UPDATE message 2012-12-27 14:23:04: ERROR: pfkey UPDATE failed: Invalid argument 2012-12-27 14:23:04: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:23:04: DEBUG: got pfkey ADD message 2012-12-27 14:23:04: ERROR: pfkey ADD failed: Invalid argument 2012-12-27 14:23:04: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:23:04: DEBUG: got pfkey X_SPDUPDATE message 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe5b4: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe5b4: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: db :0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: this policy did not exist for removal: "10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in" 2012-12-27 14:23:04: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:23:04: DEBUG: got pfkey X_SPDUPDATE message 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe5b4: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe5b4: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: sub:0xbfbfe5b4: 172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out 2012-12-27 14:23:04: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:04: DEBUG: this policy did not exist for removal: "172.21.2.0/24[0] 10.184.216.1/32[0] proto=any dir=out" 2012-12-27 14:23:13: [181.12.242.251] DEBUG: DPD monitoring.... 2012-12-27 14:23:13: DEBUG: compute IV for phase2 2012-12-27 14:23:13: DEBUG: phase1 last IV: 2012-12-27 14:23:13: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a a62f96ec 2012-12-27 14:23:13: DEBUG: hash(sha1) 2012-12-27 14:23:13: DEBUG: encryption(aes) 2012-12-27 14:23:13: DEBUG: phase2 IV computed: 2012-12-27 14:23:13: DEBUG: cfadc2a4 d4ddb842 88689088 91ae4f2b 2012-12-27 14:23:13: DEBUG: HASH with: 2012-12-27 14:23:13: DEBUG: a62f96ec 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 000001a8 2012-12-27 14:23:13: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:13: DEBUG: HASH computed: 2012-12-27 14:23:13: DEBUG: b381cdf6 2db37f1a ac83017c 0798de00 73412518 2012-12-27 14:23:13: DEBUG: begin encryption. 2012-12-27 14:23:13: DEBUG: encryption(aes) 2012-12-27 14:23:13: DEBUG: pad length = 8 2012-12-27 14:23:13: DEBUG: 0b000018 b381cdf6 2db37f1a ac83017c 0798de00 73412518 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 000001a8 fed2c2bf d5cdf907 2012-12-27 14:23:13: DEBUG: encryption(aes) 2012-12-27 14:23:13: DEBUG: with key: 2012-12-27 14:23:13: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:13: DEBUG: encrypted payload by IV: 2012-12-27 14:23:13: DEBUG: cfadc2a4 d4ddb842 88689088 91ae4f2b 2012-12-27 14:23:13: DEBUG: save IV for next: 2012-12-27 14:23:13: DEBUG: 3f0cd1de 70c74409 722aca7b c64a193f 2012-12-27 14:23:13: DEBUG: encrypted. 2012-12-27 14:23:13: DEBUG: 92 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:13: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:13: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:13: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:13: DEBUG: 1 times of 92 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:13: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 a62f96ec 0000005c 0ac4aba0 38e6c1a5 51add86c c0119fa3 870eae19 a56b0d3d 69636dfc c36018e3 f7bd7f20 5234006e 0e1c2fbd 0bb75bf0 3f0cd1de 70c74409 722aca7b c64a193f 2012-12-27 14:23:13: DEBUG: sendto Information notify. 2012-12-27 14:23:13: DEBUG: IV freed 2012-12-27 14:23:13: [181.12.242.251] DEBUG: DPD R-U-There sent (0) 2012-12-27 14:23:13: [181.12.242.251] DEBUG: rescheduling send_r_u (5). 2012-12-27 14:23:14: DEBUG: === 2012-12-27 14:23:14: DEBUG: 92 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:14: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 7bbab246 0000005c 5dd13710 b192b15d 77aae08d 93df91d3 b3a70dbf 60b960c1 1ea0fabd d8b75670 180901a9 f6bdd060 ad035052 8feec933 d98d272d 7c6cac19 51128c98 5142a724 2012-12-27 14:23:14: DEBUG: receive Information. 2012-12-27 14:23:14: DEBUG: compute IV for phase2 2012-12-27 14:23:14: DEBUG: phase1 last IV: 2012-12-27 14:23:14: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 7bbab246 2012-12-27 14:23:14: DEBUG: hash(sha1) 2012-12-27 14:23:14: DEBUG: encryption(aes) 2012-12-27 14:23:14: DEBUG: phase2 IV computed: 2012-12-27 14:23:14: DEBUG: 6c3f954f 454d488c a21eaeb4 a81e999c 2012-12-27 14:23:14: DEBUG: begin decryption. 2012-12-27 14:23:14: DEBUG: encryption(aes) 2012-12-27 14:23:14: DEBUG: IV was saved for next processing: 2012-12-27 14:23:14: DEBUG: d98d272d 7c6cac19 51128c98 5142a724 2012-12-27 14:23:14: DEBUG: encryption(aes) 2012-12-27 14:23:14: DEBUG: with key: 2012-12-27 14:23:14: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:14: DEBUG: decrypted payload by IV: 2012-12-27 14:23:14: DEBUG: 6c3f954f 454d488c a21eaeb4 a81e999c 2012-12-27 14:23:14: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:14: DEBUG: 0b000018 6cf4e5eb 27c32f97 7a418677 49ef9400 4eed8cdc 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 000001a8 00000000 00000008 2012-12-27 14:23:14: DEBUG: padding len=9 2012-12-27 14:23:14: DEBUG: skip to trim padding. 2012-12-27 14:23:14: DEBUG: decrypted. 2012-12-27 14:23:14: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 7bbab246 0000005c 0b000018 6cf4e5eb 27c32f97 7a418677 49ef9400 4eed8cdc 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 000001a8 00000000 00000008 2012-12-27 14:23:14: DEBUG: IV freed 2012-12-27 14:23:14: DEBUG: HASH with: 2012-12-27 14:23:14: DEBUG: 7bbab246 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 000001a8 2012-12-27 14:23:14: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:14: DEBUG: HASH computed: 2012-12-27 14:23:14: DEBUG: 6cf4e5eb 27c32f97 7a418677 49ef9400 4eed8cdc 2012-12-27 14:23:14: DEBUG: hash validated. 2012-12-27 14:23:14: DEBUG: begin. 2012-12-27 14:23:14: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:14: DEBUG: seen nptype=11(notify) 2012-12-27 14:23:14: DEBUG: succeed. 2012-12-27 14:23:14: [181.12.242.251] DEBUG: DPD R-U-There-Ack received 2012-12-27 14:23:14: DEBUG: received an R-U-THERE-ACK 2012-12-27 14:23:23: DEBUG: === 2012-12-27 14:23:23: DEBUG: 92 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:23: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 8f1f32f6 0000005c 1afb4065 1fd28a7f 1f4aeca0 5309bbca 2c6f7b47 3ba8dfb4 8cad16ff 984f18c0 f36e129f 834847a7 b4a0882d 4dc52b84 cf802b40 42692690 f3403ce6 52d4685c 2012-12-27 14:23:23: DEBUG: receive Information. 2012-12-27 14:23:23: DEBUG: compute IV for phase2 2012-12-27 14:23:23: DEBUG: phase1 last IV: 2012-12-27 14:23:23: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 8f1f32f6 2012-12-27 14:23:23: DEBUG: hash(sha1) 2012-12-27 14:23:23: DEBUG: encryption(aes) 2012-12-27 14:23:23: DEBUG: phase2 IV computed: 2012-12-27 14:23:23: DEBUG: 0b064b58 1d2e2247 af4868d5 1b967dda 2012-12-27 14:23:23: DEBUG: begin decryption. 2012-12-27 14:23:23: DEBUG: encryption(aes) 2012-12-27 14:23:23: DEBUG: IV was saved for next processing: 2012-12-27 14:23:23: DEBUG: cf802b40 42692690 f3403ce6 52d4685c 2012-12-27 14:23:23: DEBUG: encryption(aes) 2012-12-27 14:23:23: DEBUG: with key: 2012-12-27 14:23:23: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:23: DEBUG: decrypted payload by IV: 2012-12-27 14:23:23: DEBUG: 0b064b58 1d2e2247 af4868d5 1b967dda 2012-12-27 14:23:23: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:23: DEBUG: 0b000018 d52dd34f 26fab832 f11f6f9d 5f2bc466 b35033cc 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 00000af4 00000000 00000008 2012-12-27 14:23:23: DEBUG: padding len=9 2012-12-27 14:23:23: DEBUG: skip to trim padding. 2012-12-27 14:23:23: DEBUG: decrypted. 2012-12-27 14:23:23: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 8f1f32f6 0000005c 0b000018 d52dd34f 26fab832 f11f6f9d 5f2bc466 b35033cc 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 00000af4 00000000 00000008 2012-12-27 14:23:23: DEBUG: IV freed 2012-12-27 14:23:23: DEBUG: HASH with: 2012-12-27 14:23:23: DEBUG: 8f1f32f6 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 00000af4 2012-12-27 14:23:23: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:23: DEBUG: HASH computed: 2012-12-27 14:23:23: DEBUG: d52dd34f 26fab832 f11f6f9d 5f2bc466 b35033cc 2012-12-27 14:23:23: DEBUG: hash validated. 2012-12-27 14:23:23: DEBUG: begin. 2012-12-27 14:23:23: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:23: DEBUG: seen nptype=11(notify) 2012-12-27 14:23:23: DEBUG: succeed. 2012-12-27 14:23:23: [181.12.242.251] DEBUG: DPD R-U-There received 2012-12-27 14:23:23: DEBUG: compute IV for phase2 2012-12-27 14:23:23: DEBUG: phase1 last IV: 2012-12-27 14:23:23: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a fa3654f8 2012-12-27 14:23:23: DEBUG: hash(sha1) 2012-12-27 14:23:23: DEBUG: encryption(aes) 2012-12-27 14:23:23: DEBUG: phase2 IV computed: 2012-12-27 14:23:23: DEBUG: 5002ec9c 67d061fd d784eaee d7f96670 2012-12-27 14:23:23: DEBUG: HASH with: 2012-12-27 14:23:23: DEBUG: fa3654f8 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 00000af4 2012-12-27 14:23:23: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:23: DEBUG: HASH computed: 2012-12-27 14:23:23: DEBUG: f4b0f200 b0d91d75 bdd6e42a c74c42d1 42b7e868 2012-12-27 14:23:23: DEBUG: begin encryption. 2012-12-27 14:23:23: DEBUG: encryption(aes) 2012-12-27 14:23:23: DEBUG: pad length = 8 2012-12-27 14:23:23: DEBUG: 0b000018 f4b0f200 b0d91d75 bdd6e42a c74c42d1 42b7e868 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 00000af4 8bf9f790 9a88b507 2012-12-27 14:23:23: DEBUG: encryption(aes) 2012-12-27 14:23:23: DEBUG: with key: 2012-12-27 14:23:23: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:23: DEBUG: encrypted payload by IV: 2012-12-27 14:23:23: DEBUG: 5002ec9c 67d061fd d784eaee d7f96670 2012-12-27 14:23:23: DEBUG: save IV for next: 2012-12-27 14:23:23: DEBUG: 247e0b0f 519fb431 4750b147 1fa3eb92 2012-12-27 14:23:23: DEBUG: encrypted. 2012-12-27 14:23:23: DEBUG: 92 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:23: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:23: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:23: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:23: DEBUG: 1 times of 92 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:23: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 fa3654f8 0000005c 077d798f c1613c57 7fe03491 d29c926a 6e8cd4b2 9a6272c4 04bef8fb 251e9b2a 955ae874 62d3c539 d2ec5677 120b2a96 247e0b0f 519fb431 4750b147 1fa3eb92 2012-12-27 14:23:23: DEBUG: sendto Information notify. 2012-12-27 14:23:23: DEBUG: IV freed 2012-12-27 14:23:23: DEBUG: received a valid R-U-THERE, ACK sent 2012-12-27 14:23:24: [181.12.242.251] DEBUG: DPD monitoring.... 2012-12-27 14:23:24: DEBUG: compute IV for phase2 2012-12-27 14:23:24: DEBUG: phase1 last IV: 2012-12-27 14:23:24: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 9538b20b 2012-12-27 14:23:24: DEBUG: hash(sha1) 2012-12-27 14:23:24: DEBUG: encryption(aes) 2012-12-27 14:23:24: DEBUG: phase2 IV computed: 2012-12-27 14:23:24: DEBUG: e432b6a4 62062ea3 9570259e 400d93dd 2012-12-27 14:23:24: DEBUG: HASH with: 2012-12-27 14:23:24: DEBUG: 9538b20b 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 000001a9 2012-12-27 14:23:24: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:24: DEBUG: HASH computed: 2012-12-27 14:23:24: DEBUG: eacf58a5 3ba4b2bb 3e88d786 03358b13 a6a2483e 2012-12-27 14:23:24: DEBUG: begin encryption. 2012-12-27 14:23:24: DEBUG: encryption(aes) 2012-12-27 14:23:24: DEBUG: pad length = 8 2012-12-27 14:23:24: DEBUG: 0b000018 eacf58a5 3ba4b2bb 3e88d786 03358b13 a6a2483e 00000020 00000001 01108d28 925b8c8b b4e92e20 3b982c58 15994205 000001a9 d3a4d5b8 e4e9f207 2012-12-27 14:23:24: DEBUG: encryption(aes) 2012-12-27 14:23:24: DEBUG: with key: 2012-12-27 14:23:24: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:24: DEBUG: encrypted payload by IV: 2012-12-27 14:23:24: DEBUG: e432b6a4 62062ea3 9570259e 400d93dd 2012-12-27 14:23:24: DEBUG: save IV for next: 2012-12-27 14:23:24: DEBUG: 1db6d10e 53a56f35 07737c76 283adcf0 2012-12-27 14:23:24: DEBUG: encrypted. 2012-12-27 14:23:24: DEBUG: 92 bytes from XXX.XXX.XXX.XXX[500] to 181.12.242.251[500] 2012-12-27 14:23:24: DEBUG: sockname XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:24: DEBUG: send packet from XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:24: DEBUG: send packet to 181.12.242.251[500] 2012-12-27 14:23:24: DEBUG: 1 times of 92 bytes message will be sent to 181.12.242.251[500] 2012-12-27 14:23:24: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 9538b20b 0000005c 75651bb0 c0d96f26 48bd7bd8 2e91447b 22ff28bf 9ca9e9dd 19b8b67c bc04ad1a 034437ca 0b4d6159 62a85153 bf30c611 1db6d10e 53a56f35 07737c76 283adcf0 2012-12-27 14:23:24: DEBUG: sendto Information notify. 2012-12-27 14:23:24: DEBUG: IV freed 2012-12-27 14:23:24: [181.12.242.251] DEBUG: DPD R-U-There sent (0) 2012-12-27 14:23:24: [181.12.242.251] DEBUG: rescheduling send_r_u (5). 2012-12-27 14:23:24: DEBUG: === 2012-12-27 14:23:24: DEBUG: 92 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:24: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 6b3d4079 0000005c 0bc5b55d 50589bb6 21f8e12c 4c090a09 5640c124 afd4a736 505df943 a9e3098d 30c15f7a 286e1ef9 55a10967 7214365c df7300c7 d794dbb7 b140a922 a0b07437 2012-12-27 14:23:24: DEBUG: receive Information. 2012-12-27 14:23:24: DEBUG: compute IV for phase2 2012-12-27 14:23:24: DEBUG: phase1 last IV: 2012-12-27 14:23:24: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 6b3d4079 2012-12-27 14:23:24: DEBUG: hash(sha1) 2012-12-27 14:23:24: DEBUG: encryption(aes) 2012-12-27 14:23:24: DEBUG: phase2 IV computed: 2012-12-27 14:23:24: DEBUG: 4e8b74ca 61260011 eaa55d98 51278f15 2012-12-27 14:23:24: DEBUG: begin decryption. 2012-12-27 14:23:24: DEBUG: encryption(aes) 2012-12-27 14:23:24: DEBUG: IV was saved for next processing: 2012-12-27 14:23:24: DEBUG: df7300c7 d794dbb7 b140a922 a0b07437 2012-12-27 14:23:24: DEBUG: encryption(aes) 2012-12-27 14:23:24: DEBUG: with key: 2012-12-27 14:23:24: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:24: DEBUG: decrypted payload by IV: 2012-12-27 14:23:24: DEBUG: 4e8b74ca 61260011 eaa55d98 51278f15 2012-12-27 14:23:24: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:24: DEBUG: 0b000018 861d728a 330e5477 cea52db1 ba4238e1 8b7bc853 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 000001a9 00000000 00000008 2012-12-27 14:23:24: DEBUG: padding len=9 2012-12-27 14:23:24: DEBUG: skip to trim padding. 2012-12-27 14:23:24: DEBUG: decrypted. 2012-12-27 14:23:24: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 6b3d4079 0000005c 0b000018 861d728a 330e5477 cea52db1 ba4238e1 8b7bc853 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 000001a9 00000000 00000008 2012-12-27 14:23:24: DEBUG: IV freed 2012-12-27 14:23:24: DEBUG: HASH with: 2012-12-27 14:23:24: DEBUG: 6b3d4079 00000020 00000001 01108d29 925b8c8b b4e92e20 3b982c58 15994205 000001a9 2012-12-27 14:23:24: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:24: DEBUG: HASH computed: 2012-12-27 14:23:24: DEBUG: 861d728a 330e5477 cea52db1 ba4238e1 8b7bc853 2012-12-27 14:23:24: DEBUG: hash validated. 2012-12-27 14:23:24: DEBUG: begin. 2012-12-27 14:23:24: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:24: DEBUG: seen nptype=11(notify) 2012-12-27 14:23:24: DEBUG: succeed. 2012-12-27 14:23:24: [181.12.242.251] DEBUG: DPD R-U-There-Ack received 2012-12-27 14:23:24: DEBUG: received an R-U-THERE-ACK 2012-12-27 14:23:32: DEBUG: === 2012-12-27 14:23:32: DEBUG: 92 bytes message received from 181.12.242.251[500] to XXX.XXX.XXX.XXX[500] 2012-12-27 14:23:32: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 8def9ceb 0000005c 4570707b 9be6e7d7 94536cfb 49969c05 8f072990 18100e98 b037704e 7966d0b8 46521675 c6e442e5 1fe9cec2 cd0dca3b 7c45b565 712d6528 4f092c97 bc7f4e4b 2012-12-27 14:23:32: DEBUG: receive Information. 2012-12-27 14:23:32: DEBUG: compute IV for phase2 2012-12-27 14:23:32: DEBUG: phase1 last IV: 2012-12-27 14:23:32: DEBUG: 2704201f 4b11177b 5db93955 59d22f9a 8def9ceb 2012-12-27 14:23:32: DEBUG: hash(sha1) 2012-12-27 14:23:32: DEBUG: encryption(aes) 2012-12-27 14:23:32: DEBUG: phase2 IV computed: 2012-12-27 14:23:32: DEBUG: 8c7b26ff 0ce5fb3f 18883c4e 003e3a18 2012-12-27 14:23:32: DEBUG: begin decryption. 2012-12-27 14:23:32: DEBUG: encryption(aes) 2012-12-27 14:23:32: DEBUG: IV was saved for next processing: 2012-12-27 14:23:32: DEBUG: 7c45b565 712d6528 4f092c97 bc7f4e4b 2012-12-27 14:23:32: DEBUG: encryption(aes) 2012-12-27 14:23:32: DEBUG: with key: 2012-12-27 14:23:32: DEBUG: dba485a6 3b4e9f91 9f17989f a570fdc3 8427244c 52563aa2 6b3adb8f 92ab159b 2012-12-27 14:23:32: DEBUG: decrypted payload by IV: 2012-12-27 14:23:32: DEBUG: 8c7b26ff 0ce5fb3f 18883c4e 003e3a18 2012-12-27 14:23:32: DEBUG: decrypted payload, but not trimed. 2012-12-27 14:23:32: DEBUG: 0c000018 9e95f384 5e3dd82c cca62387 c0c16654 7bcf5b70 0000001c 00000001 01100001 925b8c8b b4e92e20 3b982c58 15994205 00000000 00000000 0000000c 2012-12-27 14:23:32: DEBUG: padding len=13 2012-12-27 14:23:32: DEBUG: skip to trim padding. 2012-12-27 14:23:32: DEBUG: decrypted. 2012-12-27 14:23:32: DEBUG: 925b8c8b b4e92e20 3b982c58 15994205 08100501 8def9ceb 0000005c 0c000018 9e95f384 5e3dd82c cca62387 c0c16654 7bcf5b70 0000001c 00000001 01100001 925b8c8b b4e92e20 3b982c58 15994205 00000000 00000000 0000000c 2012-12-27 14:23:32: DEBUG: IV freed 2012-12-27 14:23:32: DEBUG: HASH with: 2012-12-27 14:23:32: DEBUG: 8def9ceb 0000001c 00000001 01100001 925b8c8b b4e92e20 3b982c58 15994205 2012-12-27 14:23:32: DEBUG: hmac(hmac_sha1) 2012-12-27 14:23:32: DEBUG: HASH computed: 2012-12-27 14:23:32: DEBUG: 9e95f384 5e3dd82c cca62387 c0c16654 7bcf5b70 2012-12-27 14:23:32: DEBUG: hash validated. 2012-12-27 14:23:32: DEBUG: begin. 2012-12-27 14:23:32: DEBUG: seen nptype=8(hash) 2012-12-27 14:23:32: DEBUG: seen nptype=12(delete) 2012-12-27 14:23:32: DEBUG: succeed. 2012-12-27 14:23:32: [181.12.242.251] DEBUG: delete payload for protocol ISAKMP 2012-12-27 14:23:32: INFO: purging ISAKMP-SA spi=925b8c8bb4e92e20:3b982c5815994205:000012bf. 2012-12-27 14:23:32: DEBUG: call pfkey_send_dump 2012-12-27 14:23:32: DEBUG: pk_recv: retry[0] recv() 2012-12-27 14:23:32: INFO: purged ISAKMP-SA spi=925b8c8bb4e92e20:3b982c5815994205:000012bf. 2012-12-27 14:23:32: INFO: deleting a generated policy. 2012-12-27 14:23:32: DEBUG: get a src address from ID payload 10.184.216.1[0] prefixlen=32 ul_proto=255 2012-12-27 14:23:32: DEBUG: get dst address from ID payload 172.21.2.0[0] prefixlen=24 ul_proto=255 2012-12-27 14:23:32: DEBUG: sub:0xbfbfe1e4: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:32: DEBUG: db :0x2854b148: 172.21.2.0/24[0] 172.21.2.254/32[0] proto=any dir=in 2012-12-27 14:23:32: DEBUG: sub:0xbfbfe1e4: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:32: DEBUG: db :0x2854b508: 172.21.2.254/32[0] 172.21.2.0/24[0] proto=any dir=out 2012-12-27 14:23:32: DEBUG: sub:0xbfbfe1e4: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:32: DEBUG: db :0x2854b288: 10.184.216.1/32[0] 172.21.2.0/24[0] proto=any dir=in 2012-12-27 14:23:32: DEBUG: IV freed 2012-12-27 14:23:32: INFO: ISAKMP-SA deleted XXX.XXX.XXX.XXX[500]-181.12.242.251[500] spi:925b8c8bb4e92e20:3b982c5815994205 2012-12-27 14:23:32: INFO: Released port 0 2012-12-27 14:23:32: DEBUG: IV freed 2012-12-27 14:23:32: DEBUG: purged SAs. 2012-12-27 14:23:42: INFO: caught signal 2 2012-12-27 14:23:42: INFO: racoon process 1566 shutdown