Skip to content

Instantly share code, notes, and snippets.

@alimakki
Created February 19, 2018 00:59
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save alimakki/20365d49ad0c624136970bbb01008b92 to your computer and use it in GitHub Desktop.
Save alimakki/20365d49ad0c624136970bbb01008b92 to your computer and use it in GitHub Desktop.
pluto log
Feb 19 00:48:15.900570: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds
Feb 19 00:48:15.900648: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x5650b272f728
Feb 19 00:48:17.667347: | *received 224 bytes from 162.222.81.188:20572 on eth0 (port=500)
Feb 19 00:48:17.667632: | e5 e9 88 9b 1f fd dd 07 00 00 00 00 00 00 00 00
Feb 19 00:48:17.667723: | 21 20 22 08 00 00 00 00 00 00 00 e0 22 00 00 28
Feb 19 00:48:17.667804: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14
Feb 19 00:48:17.667889: | 80 0e 00 80 03 00 00 08 02 00 00 05 00 00 00 08
Feb 19 00:48:17.667979: | 04 00 00 13 28 00 00 48 00 13 00 00 2d a0 d9 53
Feb 19 00:48:17.668076: | 92 96 68 a9 38 e0 5e 5a 9a af 10 1b 66 23 25 ea
Feb 19 00:48:17.668139: | c0 4b 92 f8 d6 09 33 60 19 cd 96 38 ae 99 6c bc
Feb 19 00:48:17.668199: | 47 9d 29 e2 13 df 22 9c 98 73 b7 a1 d8 e9 dd b3
Feb 19 00:48:17.668261: | 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e 29 00 00 14
Feb 19 00:48:17.668322: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.668374: | 29 00 00 1c 00 00 40 04 ae 3a 70 67 06 74 04 b5
Feb 19 00:48:17.668423: | ed 09 0d dc 06 91 15 a0 03 c3 b3 51 29 00 00 1c
Feb 19 00:48:17.668472: | 00 00 40 05 9b da 44 94 b3 06 ae c6 76 f1 bc 3c
Feb 19 00:48:17.668520: | 85 be 83 10 4b 11 ff c4 00 00 00 08 00 00 40 2e
Feb 19 00:48:17.668574: | processing: start from 162.222.81.188:20572 (in comm_handle() at demux.c:373)
Feb 19 00:48:17.668629: | **parse ISAKMP Message:
Feb 19 00:48:17.668679: | initiator cookie:
Feb 19 00:48:17.668727: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.668779: | responder cookie:
Feb 19 00:48:17.668829: | 00 00 00 00 00 00 00 00
Feb 19 00:48:17.668879: | next payload type: ISAKMP_NEXT_v2SA (0x21)
Feb 19 00:48:17.668929: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.668979: | exchange type: ISAKMP_v2_SA_INIT (0x22)
Feb 19 00:48:17.669033: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:17.669083: | message ID: 00 00 00 00
Feb 19 00:48:17.669132: | length: 224 (0xe0)
Feb 19 00:48:17.669183: | processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34)
Feb 19 00:48:17.669233: | I am receiving an IKEv2 Request ISAKMP_v2_SA_INIT
Feb 19 00:48:17.669282: | I am the IKE SA Original Responder
Feb 19 00:48:17.669337: | icookie table: hash icookie e5 e9 88 9b 1f fd dd 07 to 14431535757497531515 slot 0x5650b2652240
Feb 19 00:48:17.669387: | parent_init v2 state object not found
Feb 19 00:48:17.669437: | from_state is STATE_UNDEFINED
Feb 19 00:48:17.669486: | Unpacking clear payload for svm: Respond to IKE_SA_INIT
Feb 19 00:48:17.669535: | Now let's proceed with payload (ISAKMP_NEXT_v2SA)
Feb 19 00:48:17.669586: | ***parse IKEv2 Security Association Payload:
Feb 19 00:48:17.669635: | next payload type: ISAKMP_NEXT_v2KE (0x22)
Feb 19 00:48:17.669685: | flags: none (0x0)
Feb 19 00:48:17.669733: | length: 40 (0x28)
Feb 19 00:48:17.669782: | processing payload: ISAKMP_NEXT_v2SA (len=40)
Feb 19 00:48:17.669830: | Now let's proceed with payload (ISAKMP_NEXT_v2KE)
Feb 19 00:48:17.669881: | ***parse IKEv2 Key Exchange Payload:
Feb 19 00:48:17.669938: | IKEv2 next payload type: ISAKMP_NEXT_v2Ni (0x28)
Feb 19 00:48:17.669987: | flags: none (0x0)
Feb 19 00:48:17.670034: | length: 72 (0x48)
Feb 19 00:48:17.670082: | DH group: OAKLEY_GROUP_ECP_256 (0x13)
Feb 19 00:48:17.670132: | processing payload: ISAKMP_NEXT_v2KE (len=72)
Feb 19 00:48:17.670181: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni)
Feb 19 00:48:17.670230: | ***parse IKEv2 Nonce Payload:
Feb 19 00:48:17.670280: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.670329: | flags: none (0x0)
Feb 19 00:48:17.670406: | length: 20 (0x14)
Feb 19 00:48:17.670480: | processing payload: ISAKMP_NEXT_v2Ni (len=20)
Feb 19 00:48:17.670553: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Feb 19 00:48:17.670628: | ***parse IKEv2 Notify Payload:
Feb 19 00:48:17.670702: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.670776: | flags: none (0x0)
Feb 19 00:48:17.670848: | length: 28 (0x1c)
Feb 19 00:48:17.670921: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.670995: | SPI size: 0 (0x0)
Feb 19 00:48:17.671069: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
Feb 19 00:48:17.671143: | processing payload: ISAKMP_NEXT_v2N (len=28)
Feb 19 00:48:17.671217: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Feb 19 00:48:17.671291: | ***parse IKEv2 Notify Payload:
Feb 19 00:48:17.671364: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.671459: | flags: none (0x0)
Feb 19 00:48:17.671533: | length: 28 (0x1c)
Feb 19 00:48:17.671604: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.671677: | SPI size: 0 (0x0)
Feb 19 00:48:17.671751: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
Feb 19 00:48:17.671820: | processing payload: ISAKMP_NEXT_v2N (len=28)
Feb 19 00:48:17.671903: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Feb 19 00:48:17.671968: | ***parse IKEv2 Notify Payload:
Feb 19 00:48:17.672078: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.672146: | flags: none (0x0)
Feb 19 00:48:17.672208: | length: 8 (0x8)
Feb 19 00:48:17.672270: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.672332: | SPI size: 0 (0x0)
Feb 19 00:48:17.672395: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
Feb 19 00:48:17.672458: | processing payload: ISAKMP_NEXT_v2N (len=8)
Feb 19 00:48:17.672471: | selected state microcode Respond to IKE_SA_INIT
Feb 19 00:48:17.672477: | #null state always idle
Feb 19 00:48:17.672482: | Now lets proceed with state specific processing
Feb 19 00:48:17.672488: | calling processor Respond to IKE_SA_INIT
Feb 19 00:48:17.672509: | anti-DDoS cookies not required (and no cookie received)
Feb 19 00:48:17.672521: | find_host_connection me=159.89.116.29:500 him=162.222.81.188:20572 policy=RSASIG+IKEV2_ALLOW
Feb 19 00:48:17.672528: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500
Feb 19 00:48:17.672536: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW
Feb 19 00:48:17.672542: | find_next_host_connection returns empty
Feb 19 00:48:17.672549: | find_host_connection me=159.89.116.29:500 him=%any:20572 policy=RSASIG+IKEV2_ALLOW
Feb 19 00:48:17.672555: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500
Feb 19 00:48:17.672561: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW
Feb 19 00:48:17.672569: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+DONT_REKEY+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (ikev2)
Feb 19 00:48:17.672575: | find_next_host_connection returns ikev2
Feb 19 00:48:17.672591: | reference addresspool of conn ikev2[1] kind CK_TEMPLATE refcnt 1
Feb 19 00:48:17.672600: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500
Feb 19 00:48:17.672607: | connect_to_host_pair: 159.89.116.29:500 162.222.81.188:500 -> hp:none
Feb 19 00:48:17.672615: | rw_instantiate() instantiated "ikev2"[1] 162.222.81.188 for 162.222.81.188
Feb 19 00:48:17.672622: | found connection: ikev2[1] 162.222.81.188 with policy RSASIG+IKEV2_ALLOW
Feb 19 00:48:17.672629: | find_host_pair: comparing 159.89.116.29:500 to 162.222.81.188:500
Feb 19 00:48:17.672635: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500
Feb 19 00:48:17.672642: | constructing IKE proposals for initial responder
Feb 19 00:48:17.672652: | converting ike_info AES_GCM_16_128-HMAC_SHA2_256-DH19 to ikev2 ...
Feb 19 00:48:17.672667: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;INTEG=NONE;DH=ECP_256
Feb 19 00:48:17.672678: packet from 162.222.81.188:20572: ikev2 IKE proposals for initial responder: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;INTEG=NONE;DH=ECP_256
Feb 19 00:48:17.672685: | Comparing remote proposals against IKE responder 1 local proposals
Feb 19 00:48:17.672692: | ****parse IKEv2 Proposal Substructure Payload:
Feb 19 00:48:17.672698: | last proposal: v2_PROPOSAL_LAST (0x0)
Feb 19 00:48:17.672703: | length: 36 (0x24)
Feb 19 00:48:17.672708: | prop #: 1 (0x1)
Feb 19 00:48:17.672714: | proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Feb 19 00:48:17.672719: | spi size: 0 (0x0)
Feb 19 00:48:17.672724: | # transforms: 3 (0x3)
Feb 19 00:48:17.672731: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 1 local proposals
Feb 19 00:48:17.672738: | local proposal 1 type ENCR has 1 transforms
Feb 19 00:48:17.672743: | local proposal 1 type PRF has 1 transforms
Feb 19 00:48:17.672749: | local proposal 1 type INTEG has 1 transforms
Feb 19 00:48:17.672766: | local proposal 1 type DH has 1 transforms
Feb 19 00:48:17.672772: | local proposal 1 type ESN has 0 transforms
Feb 19 00:48:17.672778: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG
Feb 19 00:48:17.672784: | *****parse IKEv2 Transform Substructure Payload:
Feb 19 00:48:17.672791: | last transform: v2_TRANSFORM_NON_LAST (0x3)
Feb 19 00:48:17.672796: | length: 12 (0xc)
Feb 19 00:48:17.672801: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Feb 19 00:48:17.672807: | IKEv2 transform ID: AES_GCM_C (0x14)
Feb 19 00:48:17.672813: | ******parse IKEv2 Attribute Substructure Payload:
Feb 19 00:48:17.672818: | af+type: IKEv2_KEY_LENGTH (0x800e)
Feb 19 00:48:17.672824: | length/value: 128 (0x80)
Feb 19 00:48:17.672832: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_128) matches local proposal 1 type 1 (ENCR) transform 0
Feb 19 00:48:17.672838: | *****parse IKEv2 Transform Substructure Payload:
Feb 19 00:48:17.672844: | last transform: v2_TRANSFORM_NON_LAST (0x3)
Feb 19 00:48:17.672849: | length: 8 (0x8)
Feb 19 00:48:17.672854: | IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Feb 19 00:48:17.672860: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
Feb 19 00:48:17.672867: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_256) matches local proposal 1 type 2 (PRF) transform 0
Feb 19 00:48:17.672873: | *****parse IKEv2 Transform Substructure Payload:
Feb 19 00:48:17.672878: | last transform: v2_TRANSFORM_LAST (0x0)
Feb 19 00:48:17.672883: | length: 8 (0x8)
Feb 19 00:48:17.672888: | IKEv2 transform type: TRANS_TYPE_DH (0x4)
Feb 19 00:48:17.672894: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
Feb 19 00:48:17.672901: | remote proposal 1 transform 2 (DH=ECP_256) matches local proposal 1 type 4 (DH) transform 0
Feb 19 00:48:17.672909: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none
Feb 19 00:48:17.672918: | comparing remote proposal 1 and local proposal 1 transforms: required: ENCR+PRF+DH; optional: ENCR+PRF+DH; proposed: INTEG; matched: ENCR+PRF+DH
Feb 19 00:48:17.672924: | remote proposal 1 matches local proposal 1
Feb 19 00:48:17.672934: packet from 162.222.81.188:20572: proposal 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;DH=ECP_256 chosen from: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;DH=ECP_256[first-match]
Feb 19 00:48:17.672944: | accepted IKE proposal ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;DH=ECP_256
Feb 19 00:48:17.672950: | converting proposal to internal trans attrs
Feb 19 00:48:17.672957: | encryption ike_alg_lookup_by_id id: AES_GCM_C=20, found AES_GCM_16
Feb 19 00:48:17.672964: | PRF ike_alg_lookup_by_id id: HMAC_SHA2_256=5, found HMAC_SHA2_256
Feb 19 00:48:17.672970: | DH ike_alg_lookup_by_id id: ECP_256=19, found DH19
Feb 19 00:48:17.672976: | since AEAD, setting NULL integ to 'null'
Feb 19 00:48:17.672982: | DH public value received:
Feb 19 00:48:17.672988: | 2d a0 d9 53 92 96 68 a9 38 e0 5e 5a 9a af 10 1b
Feb 19 00:48:17.672993: | 66 23 25 ea c0 4b 92 f8 d6 09 33 60 19 cd 96 38
Feb 19 00:48:17.672998: | ae 99 6c bc 47 9d 29 e2 13 df 22 9c 98 73 b7 a1
Feb 19 00:48:17.673003: | d8 e9 dd b3 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e
Feb 19 00:48:17.673011: | creating state object #1 at 0x5650b273ace8
Feb 19 00:48:17.673017: | parent state #1: new => (null)(ignore)
Feb 19 00:48:17.673023: | cookie hash sha2_256 init
Feb 19 00:48:17.673054: | cookie sha2_256 hasher: context 0x5650b273b6d0
Feb 19 00:48:17.673062: | cookie hash sha2_256 digest addr-bytes@0x5650b2738c4c (length 4)
Feb 19 00:48:17.673069: | cookie hash sha2_256 digest sod-bytes@0x5650b266ed20 (length 20)
Feb 19 00:48:17.673076: | cookie hash sha2_256 digest counter-bytes@0x5650b2656b4c (length 4)
Feb 19 00:48:17.673082: | cookie hash sha2_256 final bytes@0x7ffc03ebe6b0 (length 32)
Feb 19 00:48:17.673098: | cookie 5d 14 f4 63 b9 ee 22 9a 73 17 99 c9 a0 75 f2 07
Feb 19 00:48:17.673104: | cookie 94 ab 9e b2 58 30 81 8f e9 bf ce 58 e0 da 57 3b
Feb 19 00:48:17.673117: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188 (in initialize_new_state() at ipsec_doi.c:525)
Feb 19 00:48:17.673129: | inserting state object #1
Feb 19 00:48:17.673138: | serialno list: inserting object 0x5650b273ace8 (state #1) entry 0x5650b273b478 into list 0x5650b265db80 (older 0x5650b265db80 newer 0x5650b265db80)
Feb 19 00:48:17.673146: | serialno list: inserted object 0x5650b273ace8 (state #1) entry 0x5650b273b478 (older 0x5650b265db80 newer 0x5650b265db80)
Feb 19 00:48:17.673153: | serialno list: list entry 0x5650b265db80 is HEAD (older 0x5650b273b478 newer 0x5650b273b478)
Feb 19 00:48:17.673161: | serialno table: inserting object 0x5650b273ace8 (state #1) entry 0x5650b273b498 into list 0x5650b2652a80 (older 0x5650b2652a80 newer 0x5650b2652a80)
Feb 19 00:48:17.673169: | serialno table: inserted object 0x5650b273ace8 (state #1) entry 0x5650b273b498 (older 0x5650b2652a80 newer 0x5650b2652a80)
Feb 19 00:48:17.673176: | serialno table: list entry 0x5650b2652a80 is HEAD (older 0x5650b273b498 newer 0x5650b273b498)
Feb 19 00:48:17.673186: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188 (in initialize_new_state() at ipsec_doi.c:545)
Feb 19 00:48:17.673196: | parent state #1: STATE_UNDEFINED(ignore) => STATE_PARENT_R1(half-open-ike)
Feb 19 00:48:17.673201: | ignore states: 0
Feb 19 00:48:17.673206: | half-open-ike states: 1
Feb 19 00:48:17.673211: | open-ike states: 0
Feb 19 00:48:17.673216: | established-anonymous-ike states: 0
Feb 19 00:48:17.673222: | established-authenticated-ike states: 0
Feb 19 00:48:17.673227: | anonymous-ipsec states: 0
Feb 19 00:48:17.673232: | authenticated-ipsec states: 0
Feb 19 00:48:17.673237: | informational states: 0
Feb 19 00:48:17.673242: | unknown states: 0
Feb 19 00:48:17.673248: | category states: 1 count states: 1
Feb 19 00:48:17.673254: | natd_hash: Warning, rcookie is zero !!
Feb 19 00:48:17.673260: | NATD hash sha init
Feb 19 00:48:17.673271: | NATD sha hasher: context 0x5650b273b6d0
Feb 19 00:48:17.673277: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8)
Feb 19 00:48:17.673284: | NATD hash sha digest RCOOKIE-bytes@0x5650b265dba8 (length 8)
Feb 19 00:48:17.673290: | NATD hash sha digest SIN_ADDR-bytes@0x5650b2731bf8 (length 4)
Feb 19 00:48:17.673297: | NATD hash sha digest PORT-bytes@0x7ffc03ebe5de (length 2)
Feb 19 00:48:17.673303: | NATD hash sha final bytes@0x7ffc03ebe6a0 (length 20)
Feb 19 00:48:17.673314: | NATD 9b da 44 94 b3 06 ae c6 76 f1 bc 3c 85 be 83 10
Feb 19 00:48:17.673320: | NATD 4b 11 ff c4
Feb 19 00:48:17.673326: | natd_hash: hasher=0x5650b263fa60(20)
Feb 19 00:48:17.673331: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.673336: | natd_hash: rcookie= 00 00 00 00 00 00 00 00
Feb 19 00:48:17.673341: | natd_hash: ip= 9f 59 74 1d
Feb 19 00:48:17.673346: | natd_hash: port=500
Feb 19 00:48:17.673352: | natd_hash: hash= 9b da 44 94 b3 06 ae c6 76 f1 bc 3c 85 be 83 10
Feb 19 00:48:17.673357: | natd_hash: hash= 4b 11 ff c4
Feb 19 00:48:17.673362: | natd_hash: Warning, rcookie is zero !!
Feb 19 00:48:17.673367: | NATD hash sha init
Feb 19 00:48:17.673376: | NATD sha hasher: context 0x5650b273b6d0
Feb 19 00:48:17.673382: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8)
Feb 19 00:48:17.673388: | NATD hash sha digest RCOOKIE-bytes@0x5650b265dba8 (length 8)
Feb 19 00:48:17.673394: | NATD hash sha digest SIN_ADDR-bytes@0x5650b2738c4c (length 4)
Feb 19 00:48:17.673400: | NATD hash sha digest PORT-bytes@0x7ffc03ebe5de (length 2)
Feb 19 00:48:17.673406: | NATD hash sha final bytes@0x7ffc03ebe6c0 (length 20)
Feb 19 00:48:17.673414: | NATD e0 0d 71 25 19 bc c5 58 0a 2d 4c fb a5 3a a8 47
Feb 19 00:48:17.673420: | NATD e5 9e bb 71
Feb 19 00:48:17.673425: | natd_hash: hasher=0x5650b263fa60(20)
Feb 19 00:48:17.673431: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.673436: | natd_hash: rcookie= 00 00 00 00 00 00 00 00
Feb 19 00:48:17.673441: | natd_hash: ip= a2 de 51 bc
Feb 19 00:48:17.673446: | natd_hash: port=20572
Feb 19 00:48:17.673452: | natd_hash: hash= e0 0d 71 25 19 bc c5 58 0a 2d 4c fb a5 3a a8 47
Feb 19 00:48:17.673463: | natd_hash: hash= e5 9e bb 71
Feb 19 00:48:17.673469: | NAT_TRAVERSAL local policy enforces encapsulation
Feb 19 00:48:17.673475: | NAT_TRAVERSAL forceencaps enabled
Feb 19 00:48:17.673480: | NAT_TRAVERSAL nat_keepalive enabled 162.222.81.188
Feb 19 00:48:17.673489: | adding ikev2_inI1outR1 KE work-order 1 for state #1
Feb 19 00:48:17.673495: | state #1 requesting to delete non existing event
Feb 19 00:48:17.673502: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278
Feb 19 00:48:17.673512: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1
Feb 19 00:48:17.673525: | backlog: inserting object 0x5650b273b6a8 (work-order 1 state #1) entry 0x5650b273b6b0 into list 0x5650b266ed00 (older 0x5650b266ed00 newer 0x5650b266ed00)
Feb 19 00:48:17.673532: | backlog: inserted object 0x5650b273b6a8 (work-order 1 state #1) entry 0x5650b273b6b0 (older 0x5650b266ed00 newer 0x5650b266ed00)
Feb 19 00:48:17.673539: | backlog: list entry 0x5650b266ed00 is HEAD (older 0x5650b273b6b0 newer 0x5650b273b6b0)
Feb 19 00:48:17.675766: | crypto helper 0 resuming
Feb 19 00:48:17.675808: | backlog: removing object 0x5650b273b6a8 (work-order 1 state #1) entry 0x5650b273b6b0 (older 0x5650b266ed00 newer 0x5650b266ed00)
Feb 19 00:48:17.675815: | backlog: empty
Feb 19 00:48:17.675822: | crypto helper 0 starting work-order 1 for state #1
Feb 19 00:48:17.675829: | crypto helper 0 doing build KE and nonce; request ID 1
Feb 19 00:48:17.675978: | oid 208 d0
Feb 19 00:48:17.675993: | pk11_data 2a 86 48 ce 3d 03 01 07
Feb 19 00:48:17.676002: | pk11_param 06 08 2a 86 48 ce 3d 03 01 07
Feb 19 00:48:17.678088: | public keyType 6 size 0 publicValue 0x7f2c4400210a 65
Feb 19 00:48:17.678250: | public key 04 7a c5 ae 5b f2 54 fb a3 0e 97 d9 34 f1 72 79
Feb 19 00:48:17.678295: | public key 46 bc c4 0d 53 5d d9 91 3f 4d 7a 7b d3 8f 97 40
Feb 19 00:48:17.678335: | public key dd 9a 2d 4d 86 29 a8 4f 3a 9b e9 b4 c9 45 de eb
Feb 19 00:48:17.678374: | public key 4c a4 01 20 14 63 1d 72 86 92 23 a3 72 06 0a 6e
Feb 19 00:48:17.678413: | public key 0e
Feb 19 00:48:17.678455: | DH secret DH19@0x7f2c44001ef8: created
Feb 19 00:48:17.678496: | NSS: Local DH DH19 secret (pointer): 0x7f2c44001ef8
Feb 19 00:48:17.678535: | NSS: Public DH wire value:
Feb 19 00:48:17.678573: | 7a c5 ae 5b f2 54 fb a3 0e 97 d9 34 f1 72 79 46
Feb 19 00:48:17.678612: | bc c4 0d 53 5d d9 91 3f 4d 7a 7b d3 8f 97 40 dd
Feb 19 00:48:17.678650: | 9a 2d 4d 86 29 a8 4f 3a 9b e9 b4 c9 45 de eb 4c
Feb 19 00:48:17.678689: | a4 01 20 14 63 1d 72 86 92 23 a3 72 06 0a 6e 0e
Feb 19 00:48:17.678746: | Generated nonce: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.678788: | Generated nonce: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.678829: | crypto helper 0 finished build KE and nonce; request ID 1 time elapsed 2999 usec
Feb 19 00:48:17.678869: | crypto helper 0 sending results from work-order 1 for state #1 to event queue
Feb 19 00:48:17.678930: | scheduling now-event sending helper answer
Feb 19 00:48:17.678983: | crypto helper 0 waiting (nothing to do)
Feb 19 00:48:17.679044: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in log_stf_suspend() at ikev2.c:2243)
Feb 19 00:48:17.679093: | "ikev2"[1] 162.222.81.188 #1 complete v2 state STATE_PARENT_R1 transition with STF_SUSPEND suspended from new_pcrc:159
Feb 19 00:48:17.679136: | processing: stop from 162.222.81.188:20572 (BACKGROUND) (in comm_handle() at demux.c:375)
Feb 19 00:48:17.679180: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in comm_handle() at demux.c:380)
Feb 19 00:48:17.679221: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.679260: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.679300: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:17.679353: | executing now-event sending helper answer
Feb 19 00:48:17.679394: | crypto helper 0 replies to request ID 1
Feb 19 00:48:17.679452: | calling continuation function 0x5650b2377c30
Feb 19 00:48:17.679491: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.679530: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.679573: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in handle_helper_answer() at pluto_crypt.c:589)
Feb 19 00:48:17.679615: | ikev2_parent_inI1outR1_continue for #1: calculated ke+nonce, sending R1
Feb 19 00:48:17.679670: | **emit ISAKMP Message:
Feb 19 00:48:17.679711: | initiator cookie:
Feb 19 00:48:17.679750: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.679788: | responder cookie:
Feb 19 00:48:17.679827: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.679888: | next payload type: ISAKMP_NEXT_v2SA (0x21)
Feb 19 00:48:17.679931: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.679970: | exchange type: ISAKMP_v2_SA_INIT (0x22)
Feb 19 00:48:17.680010: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:17.680083: | message ID: 00 00 00 00
Feb 19 00:48:17.680128: | Emitting ikev2_proposal ...
Feb 19 00:48:17.680167: | ***emit IKEv2 Security Association Payload:
Feb 19 00:48:17.680207: | next payload type: ISAKMP_NEXT_v2KE (0x22)
Feb 19 00:48:17.680246: | flags: none (0x0)
Feb 19 00:48:17.680286: | ****emit IKEv2 Proposal Substructure Payload:
Feb 19 00:48:17.680326: | last proposal: v2_PROPOSAL_LAST (0x0)
Feb 19 00:48:17.680363: | prop #: 1 (0x1)
Feb 19 00:48:17.680403: | proto ID: IKEv2_SEC_PROTO_IKE (0x1)
Feb 19 00:48:17.680441: | spi size: 0 (0x0)
Feb 19 00:48:17.680479: | # transforms: 3 (0x3)
Feb 19 00:48:17.680519: | *****emit IKEv2 Transform Substructure Payload:
Feb 19 00:48:17.680559: | last transform: v2_TRANSFORM_NON_LAST (0x3)
Feb 19 00:48:17.680598: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1)
Feb 19 00:48:17.680638: | IKEv2 transform ID: AES_GCM_C (0x14)
Feb 19 00:48:17.680678: | ******emit IKEv2 Attribute Substructure Payload:
Feb 19 00:48:17.680718: | af+type: IKEv2_KEY_LENGTH (0x800e)
Feb 19 00:48:17.680763: | length/value: 128 (0x80)
Feb 19 00:48:17.680811: | emitting length of IKEv2 Transform Substructure Payload: 12
Feb 19 00:48:17.680873: | *****emit IKEv2 Transform Substructure Payload:
Feb 19 00:48:17.680920: | last transform: v2_TRANSFORM_NON_LAST (0x3)
Feb 19 00:48:17.680962: | IKEv2 transform type: TRANS_TYPE_PRF (0x2)
Feb 19 00:48:17.681001: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5)
Feb 19 00:48:17.681041: | emitting length of IKEv2 Transform Substructure Payload: 8
Feb 19 00:48:17.681081: | *****emit IKEv2 Transform Substructure Payload:
Feb 19 00:48:17.681120: | last transform: v2_TRANSFORM_LAST (0x0)
Feb 19 00:48:17.681159: | IKEv2 transform type: TRANS_TYPE_DH (0x4)
Feb 19 00:48:17.681199: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13)
Feb 19 00:48:17.681238: | emitting length of IKEv2 Transform Substructure Payload: 8
Feb 19 00:48:17.681278: | emitting length of IKEv2 Proposal Substructure Payload: 36
Feb 19 00:48:17.681317: | emitting length of IKEv2 Security Association Payload: 40
Feb 19 00:48:17.681360: | wire (crypto helper) group DH19 and state group DH19 match
Feb 19 00:48:17.681401: | DH secret DH19@0x7f2c44001ef8: transfering ownership from helper KE to state #1
Feb 19 00:48:17.681441: | ***emit IKEv2 Key Exchange Payload:
Feb 19 00:48:17.681481: | IKEv2 next payload type: ISAKMP_NEXT_v2Ni (0x28)
Feb 19 00:48:17.681520: | flags: none (0x0)
Feb 19 00:48:17.681558: | DH group: OAKLEY_GROUP_ECP_256 (0x13)
Feb 19 00:48:17.681618: | emitting 64 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload
Feb 19 00:48:17.681676: | ikev2 g^x 7a c5 ae 5b f2 54 fb a3 0e 97 d9 34 f1 72 79 46
Feb 19 00:48:17.681731: | ikev2 g^x bc c4 0d 53 5d d9 91 3f 4d 7a 7b d3 8f 97 40 dd
Feb 19 00:48:17.681786: | ikev2 g^x 9a 2d 4d 86 29 a8 4f 3a 9b e9 b4 c9 45 de eb 4c
Feb 19 00:48:17.681841: | ikev2 g^x a4 01 20 14 63 1d 72 86 92 23 a3 72 06 0a 6e 0e
Feb 19 00:48:17.681916: | emitting length of IKEv2 Key Exchange Payload: 72
Feb 19 00:48:17.681972: | ***emit IKEv2 Nonce Payload:
Feb 19 00:48:17.682028: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.682084: | flags: none (0x0)
Feb 19 00:48:17.682139: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload
Feb 19 00:48:17.682195: | IKEv2 nonce 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.682251: | IKEv2 nonce fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.682308: | emitting length of IKEv2 Nonce Payload: 36
Feb 19 00:48:17.682364: | Adding a v2N Payload
Feb 19 00:48:17.682418: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:17.682475: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.682529: | flags: none (0x0)
Feb 19 00:48:17.682584: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.682640: | SPI size: 0 (0x0)
Feb 19 00:48:17.682696: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e)
Feb 19 00:48:17.682753: | emitting 0 raw bytes of Notify data into IKEv2 Notify Payload
Feb 19 00:48:17.682807: | Notify data
Feb 19 00:48:17.682864: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:17.682920: | NAT-T: encapsulation=yes, so mangling hash to force NAT-T detection
Feb 19 00:48:17.682976: | NAT-Traversal support [enabled] add v2N payloads.
Feb 19 00:48:17.683032: | NATD hash sha init
Feb 19 00:48:17.683109: | NATD sha hasher: context 0x5650b273c4f0
Feb 19 00:48:17.683171: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8)
Feb 19 00:48:17.683231: | NATD hash sha digest RCOOKIE-bytes@0x5650b273b208 (length 8)
Feb 19 00:48:17.683291: | NATD hash sha digest SIN_ADDR-bytes@0x5650b273afe4 (length 4)
Feb 19 00:48:17.683349: | NATD hash sha digest PORT-bytes@0x7ffc03ebe11e (length 2)
Feb 19 00:48:17.683407: | NATD hash sha final bytes@0x7ffc03ebe190 (length 20)
Feb 19 00:48:17.683486: | NATD a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1
Feb 19 00:48:17.683558: | NATD fc 88 01 bf
Feb 19 00:48:17.683627: | natd_hash: hasher=0x5650b263fa60(20)
Feb 19 00:48:17.683684: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.683756: | natd_hash: rcookie= 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.683812: | natd_hash: ip= 9f 59 74 1d
Feb 19 00:48:17.683886: | natd_hash: port=0
Feb 19 00:48:17.683944: | natd_hash: hash= a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1
Feb 19 00:48:17.683999: | natd_hash: hash= fc 88 01 bf
Feb 19 00:48:17.684088: | Adding a v2N Payload
Feb 19 00:48:17.684146: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:17.684202: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.684257: | flags: none (0x0)
Feb 19 00:48:17.684313: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.684324: | SPI size: 0 (0x0)
Feb 19 00:48:17.684330: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004)
Feb 19 00:48:17.684338: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
Feb 19 00:48:17.684343: | Notify data a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1
Feb 19 00:48:17.684348: | Notify data fc 88 01 bf
Feb 19 00:48:17.684354: | emitting length of IKEv2 Notify Payload: 28
Feb 19 00:48:17.684360: | NATD hash sha init
Feb 19 00:48:17.684375: | NATD sha hasher: context 0x5650b273c4f0
Feb 19 00:48:17.684383: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8)
Feb 19 00:48:17.684389: | NATD hash sha digest RCOOKIE-bytes@0x5650b273b208 (length 8)
Feb 19 00:48:17.684396: | NATD hash sha digest SIN_ADDR-bytes@0x5650b273afbc (length 4)
Feb 19 00:48:17.684403: | NATD hash sha digest PORT-bytes@0x7ffc03ebe11e (length 2)
Feb 19 00:48:17.684409: | NATD hash sha final bytes@0x7ffc03ebe190 (length 20)
Feb 19 00:48:17.684419: | NATD f0 63 99 ca ba e2 30 b0 3f 57 48 f7 06 dc 1c a7
Feb 19 00:48:17.684425: | NATD 47 30 09 35
Feb 19 00:48:17.684431: | natd_hash: hasher=0x5650b263fa60(20)
Feb 19 00:48:17.684437: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.684442: | natd_hash: rcookie= 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.684463: | natd_hash: ip= a2 de 51 bc
Feb 19 00:48:17.684469: | natd_hash: port=20572
Feb 19 00:48:17.684474: | natd_hash: hash= f0 63 99 ca ba e2 30 b0 3f 57 48 f7 06 dc 1c a7
Feb 19 00:48:17.684479: | natd_hash: hash= 47 30 09 35
Feb 19 00:48:17.684484: | Adding a v2N Payload
Feb 19 00:48:17.684490: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:17.684496: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26)
Feb 19 00:48:17.684501: | flags: none (0x0)
Feb 19 00:48:17.684506: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.684511: | SPI size: 0 (0x0)
Feb 19 00:48:17.684517: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005)
Feb 19 00:48:17.684523: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload
Feb 19 00:48:17.684528: | Notify data f0 63 99 ca ba e2 30 b0 3f 57 48 f7 06 dc 1c a7
Feb 19 00:48:17.684533: | Notify data 47 30 09 35
Feb 19 00:48:17.684539: | emitting length of IKEv2 Notify Payload: 28
Feb 19 00:48:17.684544: | going to send a certreq
Feb 19 00:48:17.684550: | connection->kind is not CK_PERMANENT (instance), so collect CAs
Feb 19 00:48:17.684560: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500
Feb 19 00:48:17.684567: | connection is RW, lookup CA candidates
Feb 19 00:48:17.684573: | ***emit IKEv2 Certificate Request Payload:
Feb 19 00:48:17.684578: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.684584: | flags: none (0x0)
Feb 19 00:48:17.684589: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4)
Feb 19 00:48:17.685287: | NSS error locating CA cert '\364\001' for CERTREQ: Success
Feb 19 00:48:17.685309: | emitting length of IKEv2 Certificate Request Payload: 5
Feb 19 00:48:17.685316: | no IKE message padding required for IKEv2
Feb 19 00:48:17.685322: | emitting length of ISAKMP Message: 245
Feb 19 00:48:17.685337: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in complete_v2_state_transition() at ikev2.c:2326)
Feb 19 00:48:17.685345: | #1 complete v2 state transition from STATE_PARENT_R1 with STF_OK
Feb 19 00:48:17.685351: | IKEv2: transition from state STATE_IKEv2_BASE to state STATE_PARENT_R1
Feb 19 00:48:17.685358: | parent state #1: STATE_PARENT_R1(half-open-ike) => STATE_PARENT_R1(half-open-ike)
Feb 19 00:48:17.685363: | ignore states: 0
Feb 19 00:48:17.685368: | half-open-ike states: 1
Feb 19 00:48:17.685373: | open-ike states: 0
Feb 19 00:48:17.685378: | established-anonymous-ike states: 0
Feb 19 00:48:17.685383: | established-authenticated-ike states: 0
Feb 19 00:48:17.685388: | anonymous-ipsec states: 0
Feb 19 00:48:17.685392: | authenticated-ipsec states: 0
Feb 19 00:48:17.685397: | informational states: 0
Feb 19 00:48:17.685402: | unknown states: 0
Feb 19 00:48:17.685407: | category states: 1 count states: 1
Feb 19 00:48:17.685414: | message ID #1 STATE_PARENT_R1 ikev2 pst #1 st_msgid_nextuse(before=0) 0 st_msgid_lastack 4294967295 st_msgid_lastrecv 0 md is a request
Feb 19 00:48:17.685425: "ikev2"[1] 162.222.81.188 #1: STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=aes_gcm_16_128 integ=n/a prf=sha2_256 group=DH19}
Feb 19 00:48:17.685433: | sending V2 new request packet to 162.222.81.188:20572 (from port 500)
Feb 19 00:48:17.685442: | sending 245 bytes for STATE_IKEv2_BASE through eth0:500 to 162.222.81.188:20572 (using #1)
Feb 19 00:48:17.685448: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.685453: | 21 20 22 20 00 00 00 00 00 00 00 f5 22 00 00 28
Feb 19 00:48:17.685458: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14
Feb 19 00:48:17.685463: | 80 0e 00 80 03 00 00 08 02 00 00 05 00 00 00 08
Feb 19 00:48:17.685468: | 04 00 00 13 28 00 00 48 00 13 00 00 7a c5 ae 5b
Feb 19 00:48:17.685472: | f2 54 fb a3 0e 97 d9 34 f1 72 79 46 bc c4 0d 53
Feb 19 00:48:17.685477: | 5d d9 91 3f 4d 7a 7b d3 8f 97 40 dd 9a 2d 4d 86
Feb 19 00:48:17.685482: | 29 a8 4f 3a 9b e9 b4 c9 45 de eb 4c a4 01 20 14
Feb 19 00:48:17.685487: | 63 1d 72 86 92 23 a3 72 06 0a 6e 0e 29 00 00 24
Feb 19 00:48:17.685500: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.685506: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.685511: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04
Feb 19 00:48:17.685516: | a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1
Feb 19 00:48:17.685520: | fc 88 01 bf 26 00 00 1c 00 00 40 05 f0 63 99 ca
Feb 19 00:48:17.685525: | ba e2 30 b0 3f 57 48 f7 06 dc 1c a7 47 30 09 35
Feb 19 00:48:17.685530: | 00 00 00 05 04
Feb 19 00:48:17.701138: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Feb 19 00:48:17.701220: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278
Feb 19 00:48:17.701270: | event_schedule: new EVENT_v2_RESPONDER_TIMEOUT-pe@0x5650b273c278
Feb 19 00:48:17.701317: | inserting event EVENT_v2_RESPONDER_TIMEOUT, timeout in 200.000 seconds for #1
Feb 19 00:48:17.701376: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in handle_helper_answer() at pluto_crypt.c:592)
Feb 19 00:48:17.701422: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.701464: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.761001: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:17.761225: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.761298: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00
Feb 19 00:48:17.761363: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38
Feb 19 00:48:17.761424: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a
Feb 19 00:48:17.761484: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01
Feb 19 00:48:17.761551: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be
Feb 19 00:48:17.761611: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c
Feb 19 00:48:17.761672: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6
Feb 19 00:48:17.761732: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a
Feb 19 00:48:17.761791: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f
Feb 19 00:48:17.761886: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d
Feb 19 00:48:17.761949: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28
Feb 19 00:48:17.762008: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9
Feb 19 00:48:17.762067: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99
Feb 19 00:48:17.762127: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47
Feb 19 00:48:17.762186: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13
Feb 19 00:48:17.762244: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c
Feb 19 00:48:17.762289: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf
Feb 19 00:48:17.762332: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27
Feb 19 00:48:17.762375: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa
Feb 19 00:48:17.762418: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20
Feb 19 00:48:17.762461: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19
Feb 19 00:48:17.762503: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57
Feb 19 00:48:17.762546: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89
Feb 19 00:48:17.762588: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a
Feb 19 00:48:17.762630: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69
Feb 19 00:48:17.762672: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01
Feb 19 00:48:17.762714: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15
Feb 19 00:48:17.762757: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7
Feb 19 00:48:17.762799: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2
Feb 19 00:48:17.762841: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34
Feb 19 00:48:17.762883: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11
Feb 19 00:48:17.762925: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06
Feb 19 00:48:17.762966: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c
Feb 19 00:48:17.763017: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:17.763066: | **parse ISAKMP Message:
Feb 19 00:48:17.763137: | initiator cookie:
Feb 19 00:48:17.763180: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.763223: | responder cookie:
Feb 19 00:48:17.763265: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.763308: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:17.763351: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.763395: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:17.763439: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:17.763483: | message ID: 00 00 00 01
Feb 19 00:48:17.763526: | length: 540 (0x21c)
Feb 19 00:48:17.763569: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:17.763613: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:17.763656: | I am the IKE SA Original Responder
Feb 19 00:48:17.763709: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:17.763757: | parent v2 peer and cookies match on #1
Feb 19 00:48:17.763802: | v2 state object #1 found, in STATE_PARENT_R1
Feb 19 00:48:17.763861: | found state #1
Feb 19 00:48:17.763908: | from_state is STATE_PARENT_R1
Feb 19 00:48:17.763952: | Unpacking clear payload for svm: respond to IKE_AUTH
Feb 19 00:48:17.763995: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF)
Feb 19 00:48:17.764080: | ***parse IKEv2 Encrypted Fragment:
Feb 19 00:48:17.764131: | next payload type: ISAKMP_NEXT_v2IDi (0x23)
Feb 19 00:48:17.764174: | flags: none (0x0)
Feb 19 00:48:17.764216: | length: 512 (0x200)
Feb 19 00:48:17.764258: | fragment number: 1 (0x1)
Feb 19 00:48:17.764300: | total fragments: 4 (0x4)
Feb 19 00:48:17.764352: | processing payload: ISAKMP_NEXT_v2SKF (len=512)
Feb 19 00:48:17.764401: | received IKE encrypted fragment number '1', total number '4', next payload '35'
Feb 19 00:48:17.764448: | updated IKE fragment state to respond using fragments without waiting for re-transmits
Feb 19 00:48:17.764505: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:17.764560: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:17.764610: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.764658: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.764707: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:17.765057: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:17.765125: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.765174: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:17.765221: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24
Feb 19 00:48:17.765268: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4
Feb 19 00:48:17.765316: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29
Feb 19 00:48:17.765362: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9
Feb 19 00:48:17.765408: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd
Feb 19 00:48:17.765454: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70
Feb 19 00:48:17.765500: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6
Feb 19 00:48:17.765546: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57
Feb 19 00:48:17.765593: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a
Feb 19 00:48:17.765641: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d
Feb 19 00:48:17.765687: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60
Feb 19 00:48:17.765733: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73
Feb 19 00:48:17.765780: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df
Feb 19 00:48:17.765826: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca
Feb 19 00:48:17.765873: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45
Feb 19 00:48:17.765919: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34
Feb 19 00:48:17.765966: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10
Feb 19 00:48:17.766012: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59
Feb 19 00:48:17.766081: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9
Feb 19 00:48:17.766128: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20
Feb 19 00:48:17.766174: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1
Feb 19 00:48:17.766221: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8
Feb 19 00:48:17.766267: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6
Feb 19 00:48:17.766313: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a
Feb 19 00:48:17.766359: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f
Feb 19 00:48:17.766406: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44
Feb 19 00:48:17.766452: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa
Feb 19 00:48:17.766498: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36
Feb 19 00:48:17.766544: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93
Feb 19 00:48:17.766591: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12
Feb 19 00:48:17.766637: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72
Feb 19 00:48:17.766684: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f
Feb 19 00:48:17.766736: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:17.766788: | **parse ISAKMP Message:
Feb 19 00:48:17.766835: | initiator cookie:
Feb 19 00:48:17.766881: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.766928: | responder cookie:
Feb 19 00:48:17.766974: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.767020: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:17.767067: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.767114: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:17.767161: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:17.767209: | message ID: 00 00 00 01
Feb 19 00:48:17.767256: | length: 540 (0x21c)
Feb 19 00:48:17.767304: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:17.767352: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:17.767398: | I am the IKE SA Original Responder
Feb 19 00:48:17.767455: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:17.767506: | parent v2 peer and cookies match on #1
Feb 19 00:48:17.767554: | v2 state object #1 found, in STATE_PARENT_R1
Feb 19 00:48:17.767600: | found state #1
Feb 19 00:48:17.767646: | from_state is STATE_PARENT_R1
Feb 19 00:48:17.767692: | Unpacking clear payload for svm: respond to IKE_AUTH
Feb 19 00:48:17.767813: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF)
Feb 19 00:48:17.767902: | ***parse IKEv2 Encrypted Fragment:
Feb 19 00:48:17.767984: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.768135: | flags: none (0x0)
Feb 19 00:48:17.768210: | length: 512 (0x200)
Feb 19 00:48:17.768277: | fragment number: 2 (0x2)
Feb 19 00:48:17.768337: | total fragments: 4 (0x4)
Feb 19 00:48:17.768403: | processing payload: ISAKMP_NEXT_v2SKF (len=512)
Feb 19 00:48:17.768457: | received IKE encrypted fragment number '2', total number '4', next payload '0'
Feb 19 00:48:17.768514: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:17.768566: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:17.768616: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.768663: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.768711: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:17.769084: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:17.769104: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.769111: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:17.769116: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8
Feb 19 00:48:17.769121: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98
Feb 19 00:48:17.769125: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db
Feb 19 00:48:17.769149: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c
Feb 19 00:48:17.769155: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a
Feb 19 00:48:17.769159: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d
Feb 19 00:48:17.769164: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5
Feb 19 00:48:17.769169: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed
Feb 19 00:48:17.769173: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2
Feb 19 00:48:17.769179: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5
Feb 19 00:48:17.769183: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18
Feb 19 00:48:17.769188: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49
Feb 19 00:48:17.769193: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7
Feb 19 00:48:17.769198: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71
Feb 19 00:48:17.769202: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59
Feb 19 00:48:17.769207: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d
Feb 19 00:48:17.769212: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e
Feb 19 00:48:17.769217: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98
Feb 19 00:48:17.769222: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6
Feb 19 00:48:17.769227: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3
Feb 19 00:48:17.769232: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44
Feb 19 00:48:17.769236: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83
Feb 19 00:48:17.769241: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6
Feb 19 00:48:17.769246: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6
Feb 19 00:48:17.769251: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0
Feb 19 00:48:17.769256: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4
Feb 19 00:48:17.769261: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95
Feb 19 00:48:17.769266: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa
Feb 19 00:48:17.769271: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f
Feb 19 00:48:17.769276: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c
Feb 19 00:48:17.769280: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b
Feb 19 00:48:17.769285: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7
Feb 19 00:48:17.769293: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:17.769301: | **parse ISAKMP Message:
Feb 19 00:48:17.769307: | initiator cookie:
Feb 19 00:48:17.769312: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.769317: | responder cookie:
Feb 19 00:48:17.769321: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.769327: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:17.769332: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.769337: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:17.769343: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:17.769348: | message ID: 00 00 00 01
Feb 19 00:48:17.769353: | length: 540 (0x21c)
Feb 19 00:48:17.769359: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:17.769364: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:17.769369: | I am the IKE SA Original Responder
Feb 19 00:48:17.769383: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:17.769390: | parent v2 peer and cookies match on #1
Feb 19 00:48:17.769395: | v2 state object #1 found, in STATE_PARENT_R1
Feb 19 00:48:17.769400: | found state #1
Feb 19 00:48:17.769405: | from_state is STATE_PARENT_R1
Feb 19 00:48:17.769411: | Unpacking clear payload for svm: respond to IKE_AUTH
Feb 19 00:48:17.769416: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF)
Feb 19 00:48:17.769422: | ***parse IKEv2 Encrypted Fragment:
Feb 19 00:48:17.769427: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.769432: | flags: none (0x0)
Feb 19 00:48:17.769437: | length: 512 (0x200)
Feb 19 00:48:17.769442: | fragment number: 3 (0x3)
Feb 19 00:48:17.769452: | total fragments: 4 (0x4)
Feb 19 00:48:17.769457: | processing payload: ISAKMP_NEXT_v2SKF (len=512)
Feb 19 00:48:17.769463: | received IKE encrypted fragment number '3', total number '4', next payload '0'
Feb 19 00:48:17.769472: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:17.769479: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:17.769485: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.769490: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.769495: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:17.769514: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:17.769521: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.769526: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8
Feb 19 00:48:17.769530: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86
Feb 19 00:48:17.769535: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b
Feb 19 00:48:17.769540: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc
Feb 19 00:48:17.769545: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56
Feb 19 00:48:17.769550: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26
Feb 19 00:48:17.769555: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d
Feb 19 00:48:17.769559: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f
Feb 19 00:48:17.769564: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4
Feb 19 00:48:17.769569: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16
Feb 19 00:48:17.769573: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c
Feb 19 00:48:17.769578: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61
Feb 19 00:48:17.769583: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5
Feb 19 00:48:17.769588: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b
Feb 19 00:48:17.769593: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed
Feb 19 00:48:17.769597: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce
Feb 19 00:48:17.769602: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0
Feb 19 00:48:17.769607: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47
Feb 19 00:48:17.769612: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2
Feb 19 00:48:17.769616: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50
Feb 19 00:48:17.769621: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30
Feb 19 00:48:17.769626: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5
Feb 19 00:48:17.769631: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf
Feb 19 00:48:17.769636: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4
Feb 19 00:48:17.769641: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65
Feb 19 00:48:17.769646: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d
Feb 19 00:48:17.769651: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e
Feb 19 00:48:17.769656: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c
Feb 19 00:48:17.769660: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23
Feb 19 00:48:17.769665: | 14 70 e4 81
Feb 19 00:48:17.769671: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:17.769677: | **parse ISAKMP Message:
Feb 19 00:48:17.769682: | initiator cookie:
Feb 19 00:48:17.769687: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.769692: | responder cookie:
Feb 19 00:48:17.769696: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.769701: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:17.769706: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.769711: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:17.769717: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:17.769721: | message ID: 00 00 00 01
Feb 19 00:48:17.769726: | length: 484 (0x1e4)
Feb 19 00:48:17.769732: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:17.769737: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:17.769748: | I am the IKE SA Original Responder
Feb 19 00:48:17.769760: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:17.769765: | parent v2 peer and cookies match on #1
Feb 19 00:48:17.769770: | v2 state object #1 found, in STATE_PARENT_R1
Feb 19 00:48:17.769775: | found state #1
Feb 19 00:48:17.769779: | from_state is STATE_PARENT_R1
Feb 19 00:48:17.769784: | Unpacking clear payload for svm: respond to IKE_AUTH
Feb 19 00:48:17.769789: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF)
Feb 19 00:48:17.769794: | ***parse IKEv2 Encrypted Fragment:
Feb 19 00:48:17.769799: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.769804: | flags: none (0x0)
Feb 19 00:48:17.769809: | length: 456 (0x1c8)
Feb 19 00:48:17.769814: | fragment number: 4 (0x4)
Feb 19 00:48:17.769819: | total fragments: 4 (0x4)
Feb 19 00:48:17.769824: | processing payload: ISAKMP_NEXT_v2SKF (len=456)
Feb 19 00:48:17.769829: | received IKE encrypted fragment number '4', total number '4', next payload '0'
Feb 19 00:48:17.769835: | selected state microcode respond to IKE_AUTH
Feb 19 00:48:17.769847: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in process_v2_packet() at ikev2.c:1469)
Feb 19 00:48:17.769855: | processing: start connection "ikev2"[1] 162.222.81.188 (BACKGROUND) (in process_v2_packet() at ikev2.c:1470)
Feb 19 00:48:17.769861: | #1 is idle
Feb 19 00:48:17.769866: | #1 idle
Feb 19 00:48:17.769871: | Now lets proceed with state specific processing
Feb 19 00:48:17.769876: | calling processor respond to IKE_AUTH
Feb 19 00:48:17.769882: | ikev2 parent inI2outR2: calculating g^{xy} in order to decrypt I2
Feb 19 00:48:17.769903: | calculating skeyseed using prf=HMAC_SHA2_256 integ=NONE cipherkey=AES_GCM_16
Feb 19 00:48:17.769910: | start_dh_v2: reference skey_d_old-key@NULL
Feb 19 00:48:17.769918: | DH secret DH19@0x7f2c44001ef8: transfering ownership from state #1 to helper IKEv2 DH
Feb 19 00:48:17.769924: | adding ikev2_inI2outR2 KE work-order 2 for state #1
Feb 19 00:48:17.769930: | state #1 requesting EVENT_v2_RESPONDER_TIMEOUT to be deleted
Feb 19 00:48:17.769938: | free_event_entry: release EVENT_v2_RESPONDER_TIMEOUT-pe@0x5650b273c278
Feb 19 00:48:17.769945: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278
Feb 19 00:48:17.769953: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1
Feb 19 00:48:17.769964: | backlog: inserting object 0x5650b273cd68 (work-order 2 state #1) entry 0x5650b273cd70 into list 0x5650b266ed00 (older 0x5650b266ed00 newer 0x5650b266ed00)
Feb 19 00:48:17.769972: | backlog: inserted object 0x5650b273cd68 (work-order 2 state #1) entry 0x5650b273cd70 (older 0x5650b266ed00 newer 0x5650b266ed00)
Feb 19 00:48:17.769978: | backlog: list entry 0x5650b266ed00 is HEAD (older 0x5650b273cd70 newer 0x5650b273cd70)
Feb 19 00:48:17.771241: | crypto helper 1 resuming
Feb 19 00:48:17.771348: | backlog: removing object 0x5650b273cd68 (work-order 2 state #1) entry 0x5650b273cd70 (older 0x5650b266ed00 newer 0x5650b266ed00)
Feb 19 00:48:17.771409: | backlog: empty
Feb 19 00:48:17.771425: | crypto helper 1 starting work-order 2 for state #1
Feb 19 00:48:17.771432: | crypto helper 1 doing compute dh (V2); request ID 2
Feb 19 00:48:17.771438: | peer's g: 2d a0 d9 53 92 96 68 a9 38 e0 5e 5a 9a af 10 1b
Feb 19 00:48:17.771444: | peer's g: 66 23 25 ea c0 4b 92 f8 d6 09 33 60 19 cd 96 38
Feb 19 00:48:17.771448: | peer's g: ae 99 6c bc 47 9d 29 e2 13 df 22 9c 98 73 b7 a1
Feb 19 00:48:17.771453: | peer's g: d8 e9 dd b3 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e
Feb 19 00:48:17.774379: | g_ir temp-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: ECDH1_DERIVE
Feb 19 00:48:17.776792: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.776850: | key-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: ECDH1_DERIVE
Feb 19 00:48:17.776859: | key-offset: 0, key-size: 32
Feb 19 00:48:17.776864: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.776953: | result: result-key@0x5650b270a760, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.776963: | NSS: extracted-key@0x5650b270a760 from ECDH temp-key@0x7f2c3c000910 (CKM_CONCATENATE_BASE_AND_KEY hack)
Feb 19 00:48:17.776969: | nss_ecp_calc_shared: release temp-key@0x7f2c3c000910
Feb 19 00:48:17.776981: | DH secret DH19@0x7f2c44001ef8: computed shared DH secret key@0x5650b270a760
Feb 19 00:48:17.776988: | dh-shared g^ir-key@0x5650b270a760, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.776994: | NSS: Started key computation
Feb 19 00:48:17.777001: | calculating skeyseed using prf=sha2_256 integ=none cipherkey-size=16 salt-size=4
Feb 19 00:48:17.777009: | ike sa SKEYSEED PRF sha2_256 init Ni|Nr-chunk@0x7f2c3c0050f8 (length 48)
Feb 19 00:48:17.777017: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777022: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.777028: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777033: | data-bytes@0x7f2c3c0050f8 (48 bytes)
Feb 19 00:48:17.777038: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.777043: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.777048: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.777053: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777082: | result: Ni|Nr-key@0x7f2c3c005130, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777088: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.777094: | key-key@0x7f2c3c005130, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777099: | key-offset: 0, key-size: 48
Feb 19 00:48:17.777104: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.777117: | result: Ni|Nr-key@0x5650b2708ee0, size: 48 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.777123: | Ni|Nr: release tmp-key@0x7f2c3c005130
Feb 19 00:48:17.777146: | ike sa SKEYSEED prf: created sha2_256 context 0x7f2c3c0053f0 from Ni|Nr-key@0x5650b2708ee0
Feb 19 00:48:17.777153: | ike sa SKEYSEED prf: begin sha2_256 with context 0x7f2c3c0053f0 from Ni|Nr-key@0x5650b2708ee0
Feb 19 00:48:17.777159: | ike sa SKEYSEED: release clone-key@0x5650b2708ee0
Feb 19 00:48:17.777166: | ike sa SKEYSEED PRF sha2_256 crypt-prf@0x7f2c3c005388
Feb 19 00:48:17.777172: | ike sa SKEYSEED PRF sha2_256 update g^ir-key@0x5650b270a760 (size 32)
Feb 19 00:48:17.777178: | nss hmac digest hack extracting all 32 bytes of key@0x5650b270a760
Feb 19 00:48:17.777184: | nss hmac digest hacksymkey-key@0x5650b270a760, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777190: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777203: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777209: | sizeof bytes 32
Feb 19 00:48:17.777226: | wrapper: e7 f3 5e 96 52 e1 df 5d 47 a2 8d 27 5b f0 d2 56
Feb 19 00:48:17.777232: | wrapper: e8 7b ec 35 14 b0 3b 91 4d 1c ad 6c f5 e7 d2 1d
Feb 19 00:48:17.777246: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.777253: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c0050f8
Feb 19 00:48:17.777259: | unwrapped: 81 56 e8 c1 34 40 19 48 e7 8e 81 45 cb 6a 56 5e
Feb 19 00:48:17.777264: | unwrapped: 15 c3 3c 67 a3 10 a4 d6 b4 f6 0e a7 ef 9a 1f 0c
Feb 19 00:48:17.777271: | ike sa SKEYSEED PRF sha2_256 final-key ...
Feb 19 00:48:17.777285: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777291: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.777296: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777301: | data-bytes@0x7f2c3c005988 (32 bytes)
Feb 19 00:48:17.777306: | b1 af a9 77 92 45 a2 63 2d b8 de db f6 70 5a 18
Feb 19 00:48:17.777311: | d6 3d ad da 85 aa 24 53 78 8d 5a bc 2a 29 44 01
Feb 19 00:48:17.777322: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777347: | result: final-key@0x7f2c3c005130, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777353: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.777359: | key-key@0x7f2c3c005130, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777364: | key-offset: 0, key-size: 32
Feb 19 00:48:17.777368: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777381: | result: final-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777386: | final: release tmp-key@0x7f2c3c005130
Feb 19 00:48:17.777393: | ike sa SKEYSEED PRF sha2_256 final-key@0x5650b2708ee0 (size 32)
Feb 19 00:48:17.777400: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777405: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.777410: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777415: | data-bytes@0x5650b273cdc0 (16 bytes)
Feb 19 00:48:17.777420: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.777425: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777456: | result: data-key@0x7f2c3c005460, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777463: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.777468: | key-key@0x7f2c3c005460, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777473: | key-offset: 0, key-size: 16
Feb 19 00:48:17.777478: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777490: | result: data-key@0x7f2c3c005130, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777495: | data: release tmp-key@0x7f2c3c005460
Feb 19 00:48:17.777502: | CONCATENATE_BASE_AND_DATA:
Feb 19 00:48:17.777508: | base-key@0x7f2c3c005130, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777513: | data-bytes@0x5650b273cdd0 (32 bytes)
Feb 19 00:48:17.777518: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.777523: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.777528: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777542: | result: result-key@0x7f2c3c005460, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777548: | append_symkey_bytes: release lhs-key@0x7f2c3c005130
Feb 19 00:48:17.777554: | CONCATENATE_BASE_AND_DATA:
Feb 19 00:48:17.777560: | base-key@0x7f2c3c005460, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777565: | data-bytes@0x5650b273ce70 (8 bytes)
Feb 19 00:48:17.777569: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.777574: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777589: | result: result-key@0x7f2c3c005130, size: 56 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777594: | append_symkey_bytes: release lhs-key@0x7f2c3c005460
Feb 19 00:48:17.777601: | CONCATENATE_BASE_AND_DATA:
Feb 19 00:48:17.777606: | base-key@0x7f2c3c005130, size: 56 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777612: | data-bytes@0x5650b273ce78 (8 bytes)
Feb 19 00:48:17.777616: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.777621: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777635: | result: result-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777640: | append_symkey_bytes: release lhs-key@0x7f2c3c005130
Feb 19 00:48:17.777647: | prf+0 PRF sha2_256 init key-key@0x5650b2708ee0 (size 32)
Feb 19 00:48:17.777652: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.777658: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777663: | key-offset: 0, key-size: 32
Feb 19 00:48:17.777668: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.777680: | result: clone-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.777695: | prf+0 prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130
Feb 19 00:48:17.777702: | prf+0 prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130
Feb 19 00:48:17.777713: | prf+0: release clone-key@0x7f2c3c005130
Feb 19 00:48:17.777719: | prf+0 PRF sha2_256 crypt-prf@0x7f2c3c0008e8
Feb 19 00:48:17.777725: | prf+0 PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64)
Feb 19 00:48:17.777730: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460
Feb 19 00:48:17.777736: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777742: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.777758: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.777764: | sizeof bytes 64
Feb 19 00:48:17.777775: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9
Feb 19 00:48:17.777780: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53
Feb 19 00:48:17.777786: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24
Feb 19 00:48:17.777791: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3
Feb 19 00:48:17.777800: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.777807: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c008998
Feb 19 00:48:17.777812: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.789055: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in log_stf_suspend() at ikev2.c:2243)
Feb 19 00:48:17.789204: | "ikev2"[1] 162.222.81.188 #1 complete v2 state STATE_PARENT_R1 transition with STF_SUSPEND suspended from new_pcrc:159
Feb 19 00:48:17.789310: | processing: stop from 162.222.81.188:20573 (BACKGROUND) (in comm_handle() at demux.c:375)
Feb 19 00:48:17.789413: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in comm_handle() at demux.c:380)
Feb 19 00:48:17.789514: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.789576: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.789633: | processing: resume connection "ikev2"[1] 162.222.81.188 (in comm_handle() at demux.c:380)
Feb 19 00:48:17.789688: | processing: stop connection "ikev2"[1] 162.222.81.188 (in comm_handle() at demux.c:381)
Feb 19 00:48:17.789758: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.789814: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.789865: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.789935: | prf+0 PRF sha2_256 update 1++-byte@0x1 (1)
Feb 19 00:48:17.789991: | prf+0 PRF sha2_256 final-key ...
Feb 19 00:48:17.790068: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.790124: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.790177: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.790229: | data-bytes@0x7f2c3c0088d8 (32 bytes)
Feb 19 00:48:17.790280: | 4e 70 1f 09 10 c7 3b 6a ee c2 5c 2c 72 e6 41 b2
Feb 19 00:48:17.790332: | d5 4d 4b f0 5c a5 2f ba 0a 0b 75 0d 6f 7f 54 5f
Feb 19 00:48:17.790382: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.790472: | result: final-key@0x7f2c3c006d10, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.790530: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.790583: | key-key@0x7f2c3c006d10, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.790639: | key-offset: 0, key-size: 32
Feb 19 00:48:17.790690: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.790752: | result: final-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.790808: | final: release tmp-key@0x7f2c3c006d10
Feb 19 00:48:17.790873: | prf+0 PRF sha2_256 final-key@0x7f2c3c005130 (size 32)
Feb 19 00:48:17.790967: | ikev2_prfplus: reference old_t[1]-key@0x7f2c3c005130
Feb 19 00:48:17.791027: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32)
Feb 19 00:48:17.791099: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.791152: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.791204: | key-offset: 0, key-size: 32
Feb 19 00:48:17.791254: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.791317: | result: clone-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.791387: | prf+N prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c006d10
Feb 19 00:48:17.791444: | prf+N prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c006d10
Feb 19 00:48:17.791497: | prf+N: release clone-key@0x7f2c3c006d10
Feb 19 00:48:17.791550: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c005438
Feb 19 00:48:17.791602: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c005130 (size 32)
Feb 19 00:48:17.791654: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c005130
Feb 19 00:48:17.791707: | nss hmac digest hacksymkey-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.791760: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.791863: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.791926: | sizeof bytes 32
Feb 19 00:48:17.791993: | wrapper: 9b 6c 1e 65 2e 0d e5 d5 5c 5d 56 62 a8 d5 07 cc
Feb 19 00:48:17.792080: | wrapper: 96 84 cb 30 15 3c 4b 98 02 8a 9f 81 31 23 e7 38
Feb 19 00:48:17.792146: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.792206: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c008988
Feb 19 00:48:17.792259: | unwrapped: 4e 70 1f 09 10 c7 3b 6a ee c2 5c 2c 72 e6 41 b2
Feb 19 00:48:17.792310: | unwrapped: d5 4d 4b f0 5c a5 2f ba 0a 0b 75 0d 6f 7f 54 5f
Feb 19 00:48:17.792365: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64)
Feb 19 00:48:17.792418: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460
Feb 19 00:48:17.792470: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.792523: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.792583: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.792638: | sizeof bytes 64
Feb 19 00:48:17.792697: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9
Feb 19 00:48:17.792756: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53
Feb 19 00:48:17.792820: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24
Feb 19 00:48:17.792879: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3
Feb 19 00:48:17.792943: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.793003: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00a308
Feb 19 00:48:17.793057: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.793108: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.793158: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.793209: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.793269: | prf+N PRF sha2_256 update N++-byte@0x2 (2)
Feb 19 00:48:17.793324: | prf+N PRF sha2_256 final-key ...
Feb 19 00:48:17.793389: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.793444: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.793497: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.793556: | data-bytes@0x7f2c3c008988 (32 bytes)
Feb 19 00:48:17.793611: | ec a8 4c c0 9e 78 05 ce cb 9c 50 26 96 dc 44 b8
Feb 19 00:48:17.793666: | f7 d5 ae 10 9a f2 5d b0 d6 6a 93 87 6f 8f 2f 20
Feb 19 00:48:17.793720: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.793807: | result: final-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.793889: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.793945: | key-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794000: | key-offset: 0, key-size: 32
Feb 19 00:48:17.794055: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794122: | result: final-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794180: | final: release tmp-key@0x7f2c3c008b30
Feb 19 00:48:17.794240: | prf+N PRF sha2_256 final-key@0x7f2c3c006d10 (size 32)
Feb 19 00:48:17.794297: | CONCATENATE_BASE_AND_KEY:
Feb 19 00:48:17.794354: | base-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794410: | key-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794464: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794534: | result: result-key@0x7f2c3c008b30, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794593: | append_symkey_symkey: release lhs-key@0x7f2c3c005130
Feb 19 00:48:17.794648: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c005130
Feb 19 00:48:17.794708: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32)
Feb 19 00:48:17.794764: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.794819: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.794882: | key-offset: 0, key-size: 32
Feb 19 00:48:17.794938: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.795006: | result: clone-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.795081: | prf+N prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130
Feb 19 00:48:17.795141: | prf+N prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130
Feb 19 00:48:17.795198: | prf+N: release clone-key@0x7f2c3c005130
Feb 19 00:48:17.795255: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c00a248
Feb 19 00:48:17.795310: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c006d10 (size 32)
Feb 19 00:48:17.795365: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c006d10
Feb 19 00:48:17.795421: | nss hmac digest hacksymkey-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.795479: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.795563: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.795624: | sizeof bytes 32
Feb 19 00:48:17.795694: | wrapper: f3 0f 4a 78 d4 1d c8 06 78 7c 16 23 8d 35 db 2f
Feb 19 00:48:17.795752: | wrapper: 73 fb 6d 54 30 24 7e a1 0b c3 82 23 02 52 34 ba
Feb 19 00:48:17.795816: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.795898: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c008be8
Feb 19 00:48:17.795957: | unwrapped: ec a8 4c c0 9e 78 05 ce cb 9c 50 26 96 dc 44 b8
Feb 19 00:48:17.796012: | unwrapped: f7 d5 ae 10 9a f2 5d b0 d6 6a 93 87 6f 8f 2f 20
Feb 19 00:48:17.796106: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64)
Feb 19 00:48:17.796164: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460
Feb 19 00:48:17.796221: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.796277: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.796341: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.796400: | sizeof bytes 64
Feb 19 00:48:17.796471: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9
Feb 19 00:48:17.796529: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53
Feb 19 00:48:17.796585: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24
Feb 19 00:48:17.796639: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3
Feb 19 00:48:17.796702: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.796786: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00bc78
Feb 19 00:48:17.796852: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.796910: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.796965: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.797019: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.797084: | prf+N PRF sha2_256 update N++-byte@0x3 (3)
Feb 19 00:48:17.797142: | prf+N PRF sha2_256 final-key ...
Feb 19 00:48:17.797212: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.797270: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.797326: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.797382: | data-bytes@0x7f2c3c008be8 (32 bytes)
Feb 19 00:48:17.797436: | 50 57 dc 74 4c fb 53 64 e9 e0 7b bb 06 2b 43 70
Feb 19 00:48:17.797491: | 37 1f 29 c0 7d fd 06 65 6b cb c1 77 42 bb 85 15
Feb 19 00:48:17.797551: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797638: | result: final-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797700: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.797755: | key-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797810: | key-offset: 0, key-size: 32
Feb 19 00:48:17.797863: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797886: | result: final-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797893: | final: release tmp-key@0x7f2c3c00a320
Feb 19 00:48:17.797902: | prf+N PRF sha2_256 final-key@0x7f2c3c005130 (size 32)
Feb 19 00:48:17.797908: | CONCATENATE_BASE_AND_KEY:
Feb 19 00:48:17.797913: | base-key@0x7f2c3c008b30, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797919: | key-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797924: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797941: | result: result-key@0x7f2c3c00a320, size: 96 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.797947: | append_symkey_symkey: release lhs-key@0x7f2c3c008b30
Feb 19 00:48:17.820458: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c006d10
Feb 19 00:48:17.820564: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32)
Feb 19 00:48:17.820643: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.820719: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.820795: | key-offset: 0, key-size: 32
Feb 19 00:48:17.820870: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.820963: | result: clone-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.821061: | prf+N prf: created sha2_256 context 0x7f2c3c00bbe0 from key-key@0x7f2c3c006d10
Feb 19 00:48:17.821141: | prf+N prf: begin sha2_256 with context 0x7f2c3c00bbe0 from key-key@0x7f2c3c006d10
Feb 19 00:48:17.821216: | prf+N: release clone-key@0x7f2c3c006d10
Feb 19 00:48:17.821292: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c0008e8
Feb 19 00:48:17.821366: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c005130 (size 32)
Feb 19 00:48:17.821433: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c005130
Feb 19 00:48:17.821505: | nss hmac digest hacksymkey-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.821580: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.821670: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.821748: | sizeof bytes 32
Feb 19 00:48:17.821838: | wrapper: 64 a4 38 9c da f7 29 a4 80 25 e9 61 e5 9d 86 ce
Feb 19 00:48:17.821918: | wrapper: 2e 3b d0 e1 2e 9f b0 f1 fc 31 3f 34 6d 8c 27 04
Feb 19 00:48:17.821994: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.822065: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c006e68
Feb 19 00:48:17.822151: | unwrapped: 50 57 dc 74 4c fb 53 64 e9 e0 7b bb 06 2b 43 70
Feb 19 00:48:17.822213: | unwrapped: 37 1f 29 c0 7d fd 06 65 6b cb c1 77 42 bb 85 15
Feb 19 00:48:17.822282: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64)
Feb 19 00:48:17.822356: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460
Feb 19 00:48:17.822427: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.822503: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.822586: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.822659: | sizeof bytes 64
Feb 19 00:48:17.822732: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9
Feb 19 00:48:17.822798: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53
Feb 19 00:48:17.822865: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24
Feb 19 00:48:17.822929: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3
Feb 19 00:48:17.822985: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.823038: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00a528
Feb 19 00:48:17.823086: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.823131: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.823175: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.823220: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.823274: | prf+N PRF sha2_256 update N++-byte@0x4 (4)
Feb 19 00:48:17.823323: | prf+N PRF sha2_256 final-key ...
Feb 19 00:48:17.823383: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.823432: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.823479: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.823524: | data-bytes@0x7f2c3c006e68 (32 bytes)
Feb 19 00:48:17.823568: | 54 a3 e8 ea d2 d2 39 52 47 cc d1 7e fe d7 4e 77
Feb 19 00:48:17.823612: | 74 55 3f f8 d6 3c 31 2d d8 8e 83 2d 3a f0 cd 75
Feb 19 00:48:17.823657: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.823732: | result: final-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.823966: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.824104: | key-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.824210: | key-offset: 0, key-size: 32
Feb 19 00:48:17.824292: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.824409: | result: final-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.824513: | final: release tmp-key@0x7f2c3c008b30
Feb 19 00:48:17.824620: | prf+N PRF sha2_256 final-key@0x7f2c3c006d10 (size 32)
Feb 19 00:48:17.824722: | CONCATENATE_BASE_AND_KEY:
Feb 19 00:48:17.824823: | base-key@0x7f2c3c00a320, size: 96 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.824924: | key-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.825005: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.825099: | result: result-key@0x7f2c3c008b30, size: 128 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.825203: | append_symkey_symkey: release lhs-key@0x7f2c3c00a320
Feb 19 00:48:17.825288: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c005130
Feb 19 00:48:17.825371: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32)
Feb 19 00:48:17.825448: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.825546: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.825647: | key-offset: 0, key-size: 32
Feb 19 00:48:17.825747: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.825858: | result: clone-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.826003: | prf+N prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130
Feb 19 00:48:17.826108: | prf+N prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130
Feb 19 00:48:17.826210: | prf+N: release clone-key@0x7f2c3c005130
Feb 19 00:48:17.826227: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c005438
Feb 19 00:48:17.826234: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c006d10 (size 32)
Feb 19 00:48:17.826240: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c006d10
Feb 19 00:48:17.826246: | nss hmac digest hacksymkey-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826252: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.826273: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826279: | sizeof bytes 32
Feb 19 00:48:17.826301: | wrapper: 14 74 22 ba 1a 39 4d 33 fd 40 01 35 c4 b4 aa ba
Feb 19 00:48:17.826307: | wrapper: 90 a6 c1 80 11 85 a7 5d 43 04 15 e4 86 9e dc fb
Feb 19 00:48:17.826319: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.826327: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c008988
Feb 19 00:48:17.826332: | unwrapped: 54 a3 e8 ea d2 d2 39 52 47 cc d1 7e fe d7 4e 77
Feb 19 00:48:17.826338: | unwrapped: 74 55 3f f8 d6 3c 31 2d d8 8e 83 2d 3a f0 cd 75
Feb 19 00:48:17.826345: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64)
Feb 19 00:48:17.826351: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460
Feb 19 00:48:17.826356: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826362: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.826374: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826379: | sizeof bytes 64
Feb 19 00:48:17.826389: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9
Feb 19 00:48:17.826395: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53
Feb 19 00:48:17.826400: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24
Feb 19 00:48:17.826405: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3
Feb 19 00:48:17.826414: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.826422: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00bbb8
Feb 19 00:48:17.826427: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.826432: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.826437: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.826442: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.826451: | prf+N PRF sha2_256 update N++-byte@0x5 (5)
Feb 19 00:48:17.826457: | prf+N PRF sha2_256 final-key ...
Feb 19 00:48:17.826472: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.826478: | CONCATENATE_DATA_AND_BASE:
Feb 19 00:48:17.826483: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.826489: | data-bytes@0x7f2c3c008988 (32 bytes)
Feb 19 00:48:17.826494: | f8 40 1f b6 16 9c ae 48 5c 78 30 63 9f f4 e8 7d
Feb 19 00:48:17.826498: | 46 e3 2e e4 b7 f0 70 39 a4 38 91 14 78 5b ac 57
Feb 19 00:48:17.826503: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826532: | result: final-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826538: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826544: | key-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826549: | key-offset: 0, key-size: 32
Feb 19 00:48:17.826554: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826566: | result: final-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826580: | final: release tmp-key@0x7f2c3c00a320
Feb 19 00:48:17.826589: | prf+N PRF sha2_256 final-key@0x7f2c3c005130 (size 32)
Feb 19 00:48:17.826594: | CONCATENATE_BASE_AND_KEY:
Feb 19 00:48:17.826600: | base-key@0x7f2c3c008b30, size: 128 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826605: | key-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826610: | -> target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826627: | result: result-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826633: | append_symkey_symkey: release lhs-key@0x7f2c3c008b30
Feb 19 00:48:17.826641: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c006d10
Feb 19 00:48:17.826649: | ikev2_prfplus: release old_t[final]-key@0x7f2c3c005130
Feb 19 00:48:17.826656: | ikev2_ike_sa_keymat: release data-key@0x7f2c3c005460
Feb 19 00:48:17.826665: | calc_skeyseed_v2: release skeyseed_k-key@0x5650b2708ee0
Feb 19 00:48:17.826672: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826678: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826683: | key-offset: 0, key-size: 32
Feb 19 00:48:17.826688: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826701: | result: result-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826706: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826780: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826787: | key-offset: 32, key-size: 0
Feb 19 00:48:17.826792: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826802: | result: : result-key@NULL
Feb 19 00:48:17.826807: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826812: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826817: | key-offset: 32, key-size: 0
Feb 19 00:48:17.826822: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826830: | result: : result-key@NULL
Feb 19 00:48:17.826836: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826841: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826846: | key-offset: 32, key-size: 16
Feb 19 00:48:17.826852: | -> flags: ENCRYPT+DECRYPT target: AES_GCM
Feb 19 00:48:17.826865: | result: SK_ei_k-key@0x7f2c3c005460, size: 16 bytes, type/mechanism: AES_GCM
Feb 19 00:48:17.826871: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826877: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826882: | key-offset: 48, key-size: 4
Feb 19 00:48:17.826887: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826899: | result: result-key@0x7f2c3c005130, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826905: | initiator salt extracting all 4 bytes of key@0x7f2c3c005130
Feb 19 00:48:17.826911: | initiator saltsymkey-key@0x7f2c3c005130, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826917: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.826930: | initiator saltnew slot-key@0x7f2c3c000910, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826935: | sizeof bytes 16
Feb 19 00:48:17.826948: | wrapper: ed f1 3f eb 2d 12 8a f2 cd 96 b9 9e 1f 2c ec 4c
Feb 19 00:48:17.826958: | initiator salt: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.826966: | initiator salt extracted len 16 bytes at 0x7f2c3c006e68
Feb 19 00:48:17.826971: | unwrapped: f7 d5 ae 10 00 00 00 00 00 00 00 00 00 00 00 00
Feb 19 00:48:17.826976: | calc_skeyseed_v2: release initiator-salt-key-key@0x7f2c3c005130
Feb 19 00:48:17.826982: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.826988: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.826993: | key-offset: 52, key-size: 16
Feb 19 00:48:17.826998: | -> flags: ENCRYPT+DECRYPT target: AES_GCM
Feb 19 00:48:17.827010: | result: SK_er_k-key@0x7f2c3c005130, size: 16 bytes, type/mechanism: AES_GCM
Feb 19 00:48:17.827023: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.827029: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827034: | key-offset: 68, key-size: 4
Feb 19 00:48:17.827039: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827051: | result: result-key@0x7f2c3c006d10, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827057: | responder salt extracting all 4 bytes of key@0x7f2c3c006d10
Feb 19 00:48:17.827062: | responder saltsymkey-key@0x7f2c3c006d10, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827068: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.827080: | responder saltnew slot-key@0x7f2c3c000910, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827086: | sizeof bytes 16
Feb 19 00:48:17.827103: | wrapper: bc d5 08 bd 69 26 f6 7d f4 55 14 d7 13 28 90 dd
Feb 19 00:48:17.827113: | responder salt: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.827120: | responder salt extracted len 16 bytes at 0x7f2c3c005288
Feb 19 00:48:17.827125: | unwrapped: 4c fb 53 64 00 00 00 00 00 00 00 00 00 00 00 00
Feb 19 00:48:17.827130: | calc_skeyseed_v2: release responder-salt-key-key@0x7f2c3c006d10
Feb 19 00:48:17.827137: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.827142: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827147: | key-offset: 72, key-size: 32
Feb 19 00:48:17.827152: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827456: | result: result-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827470: | chunk_SK_pi extracting all 32 bytes of key@0x7f2c3c006d10
Feb 19 00:48:17.827476: | chunk_SK_pisymkey-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827482: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.827496: | chunk_SK_pinew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827503: | sizeof bytes 32
Feb 19 00:48:17.827514: | wrapper: aa c9 9e a5 d7 27 27 f4 fb fa a9 a3 a5 1c 0c 3a
Feb 19 00:48:17.827520: | wrapper: 1b e8 70 73 93 e9 30 0b ab 1e 14 0e ff 40 32 8e
Feb 19 00:48:17.827530: | chunk_SK_pi: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.827537: | chunk_SK_pi extracted len 32 bytes at 0x7f2c3c008988
Feb 19 00:48:17.827543: | unwrapped: e9 e0 7b bb 06 2b 43 70 37 1f 29 c0 7d fd 06 65
Feb 19 00:48:17.827548: | unwrapped: 6b cb c1 77 42 bb 85 15 54 a3 e8 ea d2 d2 39 52
Feb 19 00:48:17.827553: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.827558: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827563: | key-offset: 104, key-size: 32
Feb 19 00:48:17.827568: | -> flags: target: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827581: | result: result-key@0x7f2c3c008b30, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827587: | chunk_SK_pr extracting all 32 bytes of key@0x7f2c3c008b30
Feb 19 00:48:17.827592: | chunk_SK_prsymkey-key@0x7f2c3c008b30, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827598: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN
Feb 19 00:48:17.827620: | chunk_SK_prnew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.827626: | sizeof bytes 32
Feb 19 00:48:17.827636: | wrapper: 08 b1 7c 7c 53 13 98 01 17 43 3a a7 2d f3 ac 79
Feb 19 00:48:17.827641: | wrapper: bb ef b5 bd a6 ec 38 93 d9 0f 0c df be f2 74 0d
Feb 19 00:48:17.827650: | chunk_SK_pr: release slot-key-key@0x7f2c3c000910
Feb 19 00:48:17.827657: | chunk_SK_pr extracted len 32 bytes at 0x7f2c3c0008e8
Feb 19 00:48:17.827662: | unwrapped: 47 cc d1 7e fe d7 4e 77 74 55 3f f8 d6 3c 31 2d
Feb 19 00:48:17.827667: | unwrapped: d8 8e 83 2d 3a f0 cd 75 f8 40 1f b6 16 9c ae 48
Feb 19 00:48:17.827679: | NSS ikev2: finished computing individual keys for IKEv2 SA
Feb 19 00:48:17.827684: | calc_skeyseed_v2: release finalkey-key@0x7f2c3c00a320
Feb 19 00:48:17.827695: | calc_skeyseed_v2 pointers: shared-key@0x5650b270a760, SK_d-key@0x5650b2708ee0, SK_ai-key@(nil), SK_ar-key@(nil), SK_ei-key@0x7f2c3c005460, SK_er-key@0x7f2c3c005130, SK_pi-key@0x7f2c3c006d10, SK_pr-key@0x7f2c3c008b30
Feb 19 00:48:17.827701: | calc_skeyseed_v2 initiator salt
Feb 19 00:48:17.827706: | f7 d5 ae 10
Feb 19 00:48:17.827711: | calc_skeyseed_v2 responder salt
Feb 19 00:48:17.827715: | 4c fb 53 64
Feb 19 00:48:17.827720: | calc_skeyseed_v2 SK_pi
Feb 19 00:48:17.827725: | e9 e0 7b bb 06 2b 43 70 37 1f 29 c0 7d fd 06 65
Feb 19 00:48:17.827730: | 6b cb c1 77 42 bb 85 15 54 a3 e8 ea d2 d2 39 52
Feb 19 00:48:17.827735: | calc_skeyseed_v2 SK_pr
Feb 19 00:48:17.827740: | 47 cc d1 7e fe d7 4e 77 74 55 3f f8 d6 3c 31 2d
Feb 19 00:48:17.827744: | d8 8e 83 2d 3a f0 cd 75 f8 40 1f b6 16 9c ae 48
Feb 19 00:48:17.827752: | crypto helper 1 finished compute dh (V2); request ID 2 time elapsed 56320 usec
Feb 19 00:48:17.827758: | crypto helper 1 sending results from work-order 2 for state #1 to event queue
Feb 19 00:48:17.827764: | scheduling now-event sending helper answer
Feb 19 00:48:17.840048: | executing now-event sending helper answer
Feb 19 00:48:17.840105: | crypto helper 1 replies to request ID 2
Feb 19 00:48:17.840113: | calling continuation function 0x5650b2376200
Feb 19 00:48:17.840119: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.840125: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.840142: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in handle_helper_answer() at pluto_crypt.c:589)
Feb 19 00:48:17.840149: | ikev2_parent_inI2outR2_continue for #1: calculating g^{xy}, sending R2
Feb 19 00:48:17.840157: | DH secret DH19@0x7f2c44001ef8: transfering ownership from helper IKEv2 DH to state #1
Feb 19 00:48:17.840164: | finish_dh_v2: release st_shared_nss-key@NULL
Feb 19 00:48:17.840173: | Salt before authenticated decryption:
Feb 19 00:48:17.840178: | f7 d5 ae 10
Feb 19 00:48:17.840183: | IV before authenticated decryption:
Feb 19 00:48:17.840188: | 00 00 00 00 00 00 00 02
Feb 19 00:48:17.840193: | AAD before authenticated decryption:
Feb 19 00:48:17.840198: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.840203: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00
Feb 19 00:48:17.840208: | 00 01 00 04
Feb 19 00:48:17.840213: | data before authenticated decryption:
Feb 19 00:48:17.840218: | 20 6a 1f 38 f7 c8 6d fa 6c 49 08 b0 27 07 41 4a
Feb 19 00:48:17.840223: | 43 f3 c3 6a dd a8 17 b6 4f 70 98 dd 84 01 e8 59
Feb 19 00:48:17.840228: | 23 3a 53 01 fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a
Feb 19 00:48:17.840233: | d9 ed 3c be f0 e4 55 94 01 10 46 d0 14 16 a7 e2
Feb 19 00:48:17.840238: | ff a3 ff 4c 84 f4 7c 51 2d e7 8a 69 29 bb 39 06
Feb 19 00:48:17.840242: | 0d 0b 15 c6 b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1
Feb 19 00:48:17.840247: | 25 a9 11 0a 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d
Feb 19 00:48:17.840252: | dd ca 3a 7f 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c
Feb 19 00:48:17.840257: | 60 9a 18 2d e9 5f 04 44 49 af 0c b0 8f 10 12 40
Feb 19 00:48:17.840262: | 13 4c 01 28 43 f7 6e f5 61 81 00 27 49 f1 b0 ff
Feb 19 00:48:17.840267: | 0e dc 51 d9 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54
Feb 19 00:48:17.840272: | a6 3d 47 99 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5
Feb 19 00:48:17.840277: | 38 87 19 47 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9
Feb 19 00:48:17.840282: | 3b c0 7a 13 a4 a9 90 22 67 6e 01 09 83 91 8e 66
Feb 19 00:48:17.840286: | 28 73 21 9c fb 4f bb d6 ba 9c ca d7 ac e6 e3 be
Feb 19 00:48:17.840291: | a7 b8 48 cf f9 d1 58 35 97 57 07 27 44 37 fb d5
Feb 19 00:48:17.840296: | c6 94 93 27 bc ca 64 c9 b3 05 91 81 17 e4 c7 74
Feb 19 00:48:17.840301: | 92 a7 eb fa 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe
Feb 19 00:48:17.840325: | a8 df 99 20 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a
Feb 19 00:48:17.840331: | 61 99 53 19 09 af 4f a7 1a 39 56 39 d7 cb 9e d7
Feb 19 00:48:17.840336: | ad c3 52 57 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68
Feb 19 00:48:17.840341: | 29 1e c0 89 d3 3a 76 3a 05 7e cc 37 48 4f 6c 10
Feb 19 00:48:17.840346: | 2b 10 33 5a 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a
Feb 19 00:48:17.840350: | 75 12 a8 69 e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0
Feb 19 00:48:17.840355: | 16 71 c3 01 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b
Feb 19 00:48:17.840360: | ae 0b a0 15 e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5
Feb 19 00:48:17.840365: | b8 c1 c6 d7 5a 58 28 52 ad b8 a0 87 3d fc 69 e6
Feb 19 00:48:17.840370: | 0b 42 b5 d2 c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6
Feb 19 00:48:17.840375: | c5 94 d0 34 2c a2 16 03 76 18 02 78 10 16 89 86
Feb 19 00:48:17.840380: | c1 ea a4 11 6f 11 ee be df 28 0a 57 a5 e2 a5 c4
Feb 19 00:48:17.840384: | integ before authenticated decryption:
Feb 19 00:48:17.840389: | d9 b4 50 06 d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c
Feb 19 00:48:17.840426: | data after authenticated decryption:
Feb 19 00:48:17.840433: | 29 00 00 14 02 00 00 00 64 6f 6e 6b 65 79 2d 65
Feb 19 00:48:17.840438: | 61 67 65 72 24 00 00 08 00 00 40 00 26 00 00 1b
Feb 19 00:48:17.840443: | 02 00 00 00 62 6c 6f 6f 64 2d 62 65 63 6f 6d 65
Feb 19 00:48:17.840448: | 2d 70 61 64 64 6c 65 27 00 00 19 04 72 1b af e4
Feb 19 00:48:17.840453: | df e3 37 04 32 82 cc 76 69 90 a2 1e 4d b5 16 b9
Feb 19 00:48:17.840458: | 25 00 01 08 01 00 00 00 9d 5a 18 01 b4 a0 8a 1b
Feb 19 00:48:17.840462: | 99 65 30 7b 16 26 78 47 56 b0 38 4a d8 e5 21 41
Feb 19 00:48:17.840467: | dc f2 b2 4e 55 40 a7 7c 50 3f 4b c8 b7 35 8b 10
Feb 19 00:48:17.840472: | ce ae dc e1 53 57 66 10 41 8e be 70 6b d5 f5 f5
Feb 19 00:48:17.840477: | 4f aa 55 23 ea ae 2c 37 cf 71 8a e2 e3 7c a5 73
Feb 19 00:48:17.840482: | f1 2f ca c1 19 97 35 ad 68 fc 9a d7 22 58 47 ef
Feb 19 00:48:17.840487: | a9 ba cf ab a5 b8 33 42 33 58 9f 28 f3 f7 b1 a8
Feb 19 00:48:17.840491: | c1 1f 3c 5c b4 0f da 6f aa ea 11 ef f9 9c 8f 79
Feb 19 00:48:17.840497: | 91 a1 c7 47 bd b1 2c 31 7a ff 38 90 69 81 f0 82
Feb 19 00:48:17.840502: | 64 d6 dd d1 32 83 df ce b3 47 d3 8e 5a 63 5c 8c
Feb 19 00:48:17.840507: | 05 c2 6c a4 a8 6a 99 6d e8 35 bd c3 d1 32 e6 53
Feb 19 00:48:17.840511: | e6 62 51 20 3e 2e 33 58 c7 20 5d c5 bc b4 c0 7c
Feb 19 00:48:17.840516: | 48 bc ad b0 1f 33 f0 ea 95 a3 db 88 51 d4 31 85
Feb 19 00:48:17.840521: | c6 b0 15 2c dc f8 39 af 1e f3 05 90 c5 f4 6f 03
Feb 19 00:48:17.840526: | 12 db cf 2f 9b ec f7 c5 04 f9 ef fc 04 65 e6 a8
Feb 19 00:48:17.840531: | f1 87 b3 b6 cf 0e 87 6b 8b 5b 8e 09 2f 3d f5 c1
Feb 19 00:48:17.840536: | 54 b8 ee db ea 51 a1 b8 2f 00 05 09 04 30 82 05
Feb 19 00:48:17.840541: | 00 30 82 03 e8 a0 03 02 01 02 02 09 00 9f b4 67
Feb 19 00:48:17.840546: | cd 4e 3b 83 f2 30 0d 06 09 2a 86 48 86 f7 0d 01
Feb 19 00:48:17.840551: | 01 0b 05 00 30 81 89 31 0b 30 09 06 03 55 04 06
Feb 19 00:48:17.840556: | 13 02 55 53 31 13 30 11 06 03 55 04 08 0c 0a 43
Feb 19 00:48:17.840561: | 61 6c 69 66 6f 72 6e 69 61 31 16 30 14 06 03 55
Feb 19 00:48:17.840565: | 04 07 0c 0d 42 65 76 65 72 6c 79 20 48 69 6c 6c
Feb 19 00:48:17.840570: | 73 31 19 30 17 06 03 55 04 0a 0c 10 41 43 4d 45
Feb 19 00:48:17.840575: | 20 43 4f 52 50 4f 52 41 54 49 4f 4e 31 19 82 01
Feb 19 00:48:17.840580: | d9 b4 50 06 d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c
Feb 19 00:48:17.840587: | payload contains 1 octets of extra padding (padding-length: 2 (octet 0x 1))
Feb 19 00:48:17.840592: | stripping 2 octets as pad
Feb 19 00:48:17.840597: | Salt before authenticated decryption:
Feb 19 00:48:17.840602: | f7 d5 ae 10
Feb 19 00:48:17.840606: | IV before authenticated decryption:
Feb 19 00:48:17.840611: | 00 00 00 00 00 00 00 03
Feb 19 00:48:17.840616: | AAD before authenticated decryption:
Feb 19 00:48:17.840621: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.840632: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:17.840637: | 00 02 00 04
Feb 19 00:48:17.840642: | data before authenticated decryption:
Feb 19 00:48:17.840647: | 70 22 4b 24 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93
Feb 19 00:48:17.840652: | 0d d3 a5 a4 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1
Feb 19 00:48:17.840656: | 5b 0b 09 29 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5
Feb 19 00:48:17.840661: | f1 d4 68 c9 6c 3d 54 2e ba 07 93 92 4e 48 da cb
Feb 19 00:48:17.840666: | 0c fd d5 bd 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82
Feb 19 00:48:17.840671: | 72 c6 68 70 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2
Feb 19 00:48:17.840676: | bb af c4 b6 d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0
Feb 19 00:48:17.840681: | da 21 58 57 b0 4e 9e 2d 33 cd f5 57 15 46 30 b6
Feb 19 00:48:17.840685: | 73 ec 16 2a ac 63 e9 4e d2 be 05 8a f3 9a 98 6c
Feb 19 00:48:17.840690: | 93 5b 12 4d c9 10 b5 ca 70 49 cb 07 82 07 11 53
Feb 19 00:48:17.840695: | 31 d0 02 60 e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c
Feb 19 00:48:17.840700: | 61 12 56 73 ca 1b 44 b5 80 ab c8 f8 83 83 7e cd
Feb 19 00:48:17.840705: | 3f 68 04 df 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48
Feb 19 00:48:17.840710: | 85 5c c9 ca d1 e4 44 72 ff db ea 1c 9b 4c f3 ac
Feb 19 00:48:17.840715: | 18 a5 fd 45 97 53 b0 48 13 09 3b 3e b9 06 1d 8e
Feb 19 00:48:17.840719: | c7 e2 25 34 ab db 59 46 a0 27 3c b4 8c 4c 5b 71
Feb 19 00:48:17.840724: | 7f 60 0e 10 f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a
Feb 19 00:48:17.840729: | c8 51 71 59 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49
Feb 19 00:48:17.840734: | 3e 38 13 b9 40 55 24 9e 99 c1 eb 74 8d de aa eb
Feb 19 00:48:17.840739: | 81 70 1e 20 71 f1 59 e0 07 7a 00 67 9b a7 71 2f
Feb 19 00:48:17.840744: | 9b 55 7d c1 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48
Feb 19 00:48:17.840748: | 13 49 8e a8 20 9a 43 ef 7e 3f ce 30 28 57 84 8c
Feb 19 00:48:17.840753: | 89 dd a5 d6 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01
Feb 19 00:48:17.840758: | 29 d9 de 3a ca 27 69 65 35 e6 21 22 67 4a be fe
Feb 19 00:48:17.840763: | e0 76 aa 1f d8 ab 6b 26 35 10 af 33 5e 25 0f 8c
Feb 19 00:48:17.840768: | 56 8c 63 44 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67
Feb 19 00:48:17.840773: | fc 3e 04 fa 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c
Feb 19 00:48:17.840777: | e7 b4 5d 36 b0 85 24 7b c7 98 fe e3 76 23 f3 30
Feb 19 00:48:17.840782: | ad 2f 42 93 d7 af d9 4c d6 94 3e c1 9b c2 73 1a
Feb 19 00:48:17.840787: | cf 21 66 12 58 13 55 30 6f b2 cb 2a 0f 62 9f e8
Feb 19 00:48:17.840792: | integ before authenticated decryption:
Feb 19 00:48:17.840797: | 66 6c 2a 72 50 cc c5 49 c5 16 61 f8 15 47 40 0f
Feb 19 00:48:17.840809: | data after authenticated decryption:
Feb 19 00:48:17.840815: | 30 17 06 03 55 04 0b 0c 10 41 6e 76 69 6c 20 44
Feb 19 00:48:17.840820: | 65 70 61 72 74 6d 65 6e 74 31 17 30 15 06 03 55
Feb 19 00:48:17.840824: | 04 03 0c 0e 63 61 2d 63 65 72 74 69 66 69 63 61
Feb 19 00:48:17.840829: | 74 65 30 1e 17 0d 31 38 30 32 31 39 30 30 33 38
Feb 19 00:48:17.840834: | 35 30 5a 17 0d 32 33 30 32 31 38 30 30 33 38 35
Feb 19 00:48:17.840839: | 30 5a 30 81 87 31 0b 30 09 06 03 55 04 06 13 02
Feb 19 00:48:17.840844: | 55 53 31 13 30 11 06 03 55 04 08 0c 0a 43 61 6c
Feb 19 00:48:17.840849: | 69 66 6f 72 6e 69 61 31 16 30 14 06 03 55 04 07
Feb 19 00:48:17.840854: | 0c 0d 42 65 76 65 72 6c 79 20 48 69 6c 6c 73 31
Feb 19 00:48:17.840858: | 19 30 17 06 03 55 04 0a 0c 10 41 43 4d 45 20 43
Feb 19 00:48:17.840863: | 4f 52 50 4f 52 41 54 49 4f 4e 31 19 30 17 06 03
Feb 19 00:48:17.840868: | 55 04 0b 0c 10 41 6e 76 69 6c 20 44 65 70 61 72
Feb 19 00:48:17.840873: | 74 6d 65 6e 74 31 15 30 13 06 03 55 04 03 0c 0c
Feb 19 00:48:17.840877: | 64 6f 6e 6b 65 79 2d 65 61 67 65 72 30 82 01 22
Feb 19 00:48:17.840882: | 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03
Feb 19 00:48:17.840887: | 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c6 b6 3c
Feb 19 00:48:17.840892: | 99 bf 11 90 36 53 45 10 d4 52 6b fe 85 d4 7d 2f
Feb 19 00:48:17.840906: | b8 7f b4 6a 69 86 5c 70 2a 78 85 9f 35 81 96 b8
Feb 19 00:48:17.840911: | 44 5b ba 2f ed 54 58 10 bd 12 fa 2c fc a4 47 61
Feb 19 00:48:17.840916: | 2a 67 8f 21 16 20 4e be 54 81 b1 89 02 f1 c8 be
Feb 19 00:48:17.840920: | 50 1b 9a 41 09 a4 48 db 44 d7 7a 5e 53 db ec 56
Feb 19 00:48:17.840925: | 38 75 4f cb bb 19 a1 9c e5 6c 4e 29 15 4a 21 7a
Feb 19 00:48:17.840930: | 7d c6 55 39 2f 22 fd 0f 13 8b ed 28 1a 49 9c b5
Feb 19 00:48:17.840935: | d2 2a 04 13 47 3b 05 7c 8c bd f3 64 a2 0c e5 8f
Feb 19 00:48:17.840940: | c4 28 d3 1b 87 1b c2 a8 aa cf de 4f 8b dd 1a 94
Feb 19 00:48:17.840944: | b5 6d 68 69 9d 89 33 f3 2b 6f 63 f2 33 06 4f 18
Feb 19 00:48:17.840949: | d9 d5 3a ad 21 5b ed 4b a1 0a ec 26 f4 f8 91 64
Feb 19 00:48:17.840954: | 41 8d a2 2f d6 53 7f 04 29 60 3f 7c 75 c5 92 f1
Feb 19 00:48:17.840959: | 59 7b bb 75 f1 27 82 63 9e d0 91 48 69 f1 17 4b
Feb 19 00:48:17.840964: | 27 1a c2 ad b0 6d 08 32 07 c6 85 d5 36 ca e9 01
Feb 19 00:48:17.840969: | 66 6c 2a 72 50 cc c5 49 c5 16 61 f8 15 47 40 0f
Feb 19 00:48:17.840974: | payload contains 1 octets of extra padding (padding-length: 2 (octet 0x 1))
Feb 19 00:48:17.840979: | stripping 2 octets as pad
Feb 19 00:48:17.840984: | Salt before authenticated decryption:
Feb 19 00:48:17.840988: | f7 d5 ae 10
Feb 19 00:48:17.840993: | IV before authenticated decryption:
Feb 19 00:48:17.840998: | 00 00 00 00 00 00 00 04
Feb 19 00:48:17.841002: | AAD before authenticated decryption:
Feb 19 00:48:17.841007: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.841012: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:17.841016: | 00 03 00 04
Feb 19 00:48:17.841021: | data before authenticated decryption:
Feb 19 00:48:17.841026: | 13 b2 27 d8 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7
Feb 19 00:48:17.841031: | 87 8b 1e 98 d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20
Feb 19 00:48:17.841035: | ae f2 41 db de 55 5a 78 e9 5b 4e 60 d2 d1 05 54
Feb 19 00:48:17.841040: | bb c4 4f 6c 38 72 28 58 56 85 f6 e4 89 75 8b 39
Feb 19 00:48:17.841045: | 9c 16 41 7a 59 56 71 2a fc 54 ad a6 a2 c2 5c b2
Feb 19 00:48:17.841050: | 25 2a d7 4d 6d 88 4c cb 75 cf aa eb c9 6f 03 8d
Feb 19 00:48:17.841054: | c2 4a 78 c5 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d
Feb 19 00:48:17.841059: | fb 5b a8 ed 7c e6 82 50 26 a4 56 2c 04 35 60 05
Feb 19 00:48:17.841064: | 61 b0 2c d2 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d
Feb 19 00:48:17.841069: | f9 a1 44 e5 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3
Feb 19 00:48:17.841073: | b9 01 d0 18 eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39
Feb 19 00:48:17.841078: | 8d be 24 49 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6
Feb 19 00:48:17.841083: | 12 4a 33 b7 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f
Feb 19 00:48:17.841088: | b8 11 94 71 68 25 ab fe 63 09 05 85 b4 5e 7f 0f
Feb 19 00:48:17.841093: | a0 07 ff 59 f7 fd 9a 40 6f df c6 ab ba 1a e3 e5
Feb 19 00:48:17.841098: | bf 32 ab 0d e1 bf 75 63 4d 7f dc 34 88 38 33 43
Feb 19 00:48:17.841103: | be 48 29 2e fe ad 5a f8 cc e0 90 83 0c ac 45 89
Feb 19 00:48:17.841107: | 7f d9 71 98 d7 b6 bd bf 42 3c 71 01 29 0e cc 44
Feb 19 00:48:17.841112: | 2f e8 7c e6 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9
Feb 19 00:48:17.841117: | 35 74 95 c3 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7
Feb 19 00:48:17.841122: | 66 82 5c 44 ee 9c ce dc 32 7b a5 85 60 05 47 ce
Feb 19 00:48:17.841127: | 32 03 73 83 60 25 e7 f0 32 04 ed 1f 6d 69 00 50
Feb 19 00:48:17.841131: | c1 69 cc c6 11 2e 90 35 8a ad 31 4e 75 11 74 4f
Feb 19 00:48:17.841136: | 3a 5f 0c a6 55 3b ba a5 09 81 b1 af 32 a2 9c 6b
Feb 19 00:48:17.841142: | 01 db 82 d0 fc d8 6e ee 60 1b 17 3b d8 8d c5 96
Feb 19 00:48:17.841147: | 33 31 cc e4 69 12 08 17 7b 07 cb d6 99 90 b1 d5
Feb 19 00:48:17.841152: | 6c ae 42 95 a0 93 ab 13 d2 03 31 b7 38 03 21 cb
Feb 19 00:48:17.841157: | ae 69 ad aa 54 08 fa 7d bc d1 de 87 84 df aa 9f
Feb 19 00:48:17.841162: | 3c bb 91 5f c6 db 25 35 63 ef 04 39 b7 0f f6 bd
Feb 19 00:48:17.841171: | c4 ab 9c 4c 08 39 15 33 21 ce e6 07 e8 1b 69 cb
Feb 19 00:48:17.841176: | integ before authenticated decryption:
Feb 19 00:48:17.841181: | 0e 94 ed 5b a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7
Feb 19 00:48:17.841193: | data after authenticated decryption:
Feb 19 00:48:17.841198: | 79 a2 83 88 99 19 8f f8 5a af 95 ce 8c 46 8d f0
Feb 19 00:48:17.841203: | 21 5a b6 d2 af 9c c0 99 54 95 47 86 b6 1b d1 02
Feb 19 00:48:17.841208: | 03 01 00 01 a3 82 01 69 30 82 01 65 30 09 06 03
Feb 19 00:48:17.841213: | 55 1d 13 04 02 30 00 30 33 06 09 60 86 48 01 86
Feb 19 00:48:17.841218: | f8 42 01 0d 04 26 16 24 41 6e 73 69 62 6c 65 20
Feb 19 00:48:17.841223: | 47 65 6e 65 72 61 74 65 64 20 43 6c 69 65 6e 74
Feb 19 00:48:17.841227: | 20 43 65 72 74 69 66 69 63 61 74 65 30 1d 06 03
Feb 19 00:48:17.841232: | 55 1d 0e 04 16 04 14 b9 e6 4a b2 44 30 10 4c 82
Feb 19 00:48:17.841237: | 76 33 b0 c8 d0 b6 89 55 f1 43 00 30 81 be 06 03
Feb 19 00:48:17.841242: | 55 1d 23 04 81 b6 30 81 b3 80 14 73 5e 91 af 6c
Feb 19 00:48:17.841247: | 73 5d 3b 93 b3 6a 3d 72 58 e5 8c 7d 21 07 10 a1
Feb 19 00:48:17.841252: | 81 8f a4 81 8c 30 81 89 31 0b 30 09 06 03 55 04
Feb 19 00:48:17.841256: | 06 13 02 55 53 31 13 30 11 06 03 55 04 08 0c 0a
Feb 19 00:48:17.841261: | 43 61 6c 69 66 6f 72 6e 69 61 31 16 30 14 06 03
Feb 19 00:48:17.841266: | 55 04 07 0c 0d 42 65 76 65 72 6c 79 20 48 69 6c
Feb 19 00:48:17.841271: | 6c 73 31 19 30 17 06 03 55 04 0a 0c 10 41 43 4d
Feb 19 00:48:17.841276: | 45 20 43 4f 52 50 4f 52 41 54 49 4f 4e 31 19 30
Feb 19 00:48:17.841280: | 17 06 03 55 04 0b 0c 10 41 6e 76 69 6c 20 44 65
Feb 19 00:48:17.841285: | 70 61 72 74 6d 65 6e 74 31 17 30 15 06 03 55 04
Feb 19 00:48:17.841290: | 03 0c 0e 63 61 2d 63 65 72 74 69 66 69 63 61 74
Feb 19 00:48:17.841295: | 65 82 09 00 9a 4e bd 11 2f 04 a7 6e 30 1d 06 03
Feb 19 00:48:17.841300: | 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03
Feb 19 00:48:17.841304: | 01 06 08 2b 06 01 05 05 07 03 02 30 0b 06 03 55
Feb 19 00:48:17.841309: | 1d 0f 04 04 03 02 05 a0 30 17 06 03 55 1d 11 04
Feb 19 00:48:17.841314: | 10 30 0e 82 0c 64 6f 6e 6b 65 79 2d 65 61 67 65
Feb 19 00:48:17.841319: | 72 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00
Feb 19 00:48:17.841324: | 03 82 01 01 00 5b 19 90 a0 b9 d9 b7 12 06 ad 56
Feb 19 00:48:17.841329: | e8 cf f9 44 0b 3a 5b ef c2 0c bf cb 8e 3a 08 78
Feb 19 00:48:17.841334: | 75 57 f6 7c e9 0e 0a 59 d2 a5 50 01 35 23 59 da
Feb 19 00:48:17.841339: | 49 3a a2 a4 67 e9 8f ca c0 5e a9 45 05 d1 a0 01
Feb 19 00:48:17.841344: | 0e 94 ed 5b a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7
Feb 19 00:48:17.841349: | payload contains 1 octets of extra padding (padding-length: 2 (octet 0x 1))
Feb 19 00:48:17.841354: | stripping 2 octets as pad
Feb 19 00:48:17.841359: | Salt before authenticated decryption:
Feb 19 00:48:17.841364: | f7 d5 ae 10
Feb 19 00:48:17.841368: | IV before authenticated decryption:
Feb 19 00:48:17.841373: | 00 00 00 00 00 00 00 05
Feb 19 00:48:17.841378: | AAD before authenticated decryption:
Feb 19 00:48:17.841383: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.841387: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8
Feb 19 00:48:17.841392: | 00 04 00 04
Feb 19 00:48:17.841396: | data before authenticated decryption:
Feb 19 00:48:17.841401: | 0d 61 ba 86 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16
Feb 19 00:48:17.841406: | 6f 6a 87 2b 20 6e 38 d2 f2 51 43 33 03 c2 bf a7
Feb 19 00:48:17.841411: | 41 14 80 fc e0 db 8e f1 3c a8 e3 41 85 9f d9 2b
Feb 19 00:48:17.841416: | d3 43 5b 56 bb 4d 47 b2 05 17 56 fa 94 a3 25 78
Feb 19 00:48:17.841421: | 21 28 c4 26 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73
Feb 19 00:48:17.841426: | c6 5f d3 8d d4 62 71 fd 8e 67 0a 23 97 54 f5 37
Feb 19 00:48:17.841431: | 0e 13 40 8f 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78
Feb 19 00:48:17.841436: | 34 7b 8c c4 f6 f3 67 90 88 87 12 11 9b f5 5a 95
Feb 19 00:48:17.841446: | 71 91 27 16 da fc 83 81 c2 01 cb 56 13 c9 ce da
Feb 19 00:48:17.841451: | 44 61 0e 5c ac 21 2d c7 50 31 78 fc 0c 81 17 f4
Feb 19 00:48:17.841456: | 66 29 a6 61 17 97 b7 28 26 8b c7 6a 21 67 d8 44
Feb 19 00:48:17.841461: | 37 96 f3 b5 33 b9 89 3b 66 d8 36 2c a3 ee 29 24
Feb 19 00:48:17.841466: | 64 2e 33 1b 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0
Feb 19 00:48:17.841470: | a9 0a 30 ed fe ca bf c6 fa d1 9d 32 c7 27 b8 aa
Feb 19 00:48:17.841475: | b4 67 00 ce 89 95 40 9f 25 d1 98 a2 71 ef 47 a1
Feb 19 00:48:17.841480: | 8e 4d 55 a0 a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9
Feb 19 00:48:17.841485: | cd a4 f6 47 ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c
Feb 19 00:48:17.841490: | d0 fe 0e d2 1b a4 6d f5 8b 81 05 c0 88 3a 02 44
Feb 19 00:48:17.841495: | 84 6f f7 50 b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d
Feb 19 00:48:17.841500: | da 09 be 30 1e c8 52 94 eb 09 a1 6a de 52 9b 08
Feb 19 00:48:17.841504: | fb ff 50 e5 b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2
Feb 19 00:48:17.841509: | 20 1c 53 bf 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8
Feb 19 00:48:17.841514: | 37 81 15 f4 2a 66 11 bd c4 97 d5 57 b9 02 ea c7
Feb 19 00:48:17.841519: | 9e 76 c1 65 81 5e fb e3 d6 66 0e c2 86 e3 fb 25
Feb 19 00:48:17.841524: | f8 16 c7 9d d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52
Feb 19 00:48:17.841529: | 06 ca 2a 2e 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2
Feb 19 00:48:17.841533: | 84 1f a2 0c 3b e2 38 0f
Feb 19 00:48:17.841538: | integ before authenticated decryption:
Feb 19 00:48:17.841543: | 22 35 5e 12 13 23 4e 90 31 00 47 23 14 70 e4 81
Feb 19 00:48:17.841563: | data after authenticated decryption:
Feb 19 00:48:17.841570: | 5c c9 f5 1e 64 7f 32 f7 3a 01 81 30 89 64 49 72
Feb 19 00:48:17.841575: | 51 3b 76 f2 af be e0 6d e4 8d b0 d2 cd 23 0b b1
Feb 19 00:48:17.841579: | bc d2 f0 0f b0 59 72 cb b6 4e 65 0b 13 34 95 4b
Feb 19 00:48:17.841584: | e1 f5 ad 31 01 ff f3 1f ad a8 3c c9 d5 dc 4b f4
Feb 19 00:48:17.841589: | c5 21 2b e9 ee d0 b4 98 93 4f df 5d 4f 96 e0 2a
Feb 19 00:48:17.841594: | da 2e d3 8c 54 65 60 26 4f c9 f7 51 13 27 b1 49
Feb 19 00:48:17.841599: | c1 7d e7 8f d6 36 61 10 93 4a 44 2c 22 9a ce 8f
Feb 19 00:48:17.841604: | 2f 1f 01 67 ae 12 2b 8e a2 32 0a 97 c2 b4 4c ba
Feb 19 00:48:17.841609: | ab cd fe f4 dd c5 47 a3 57 62 74 80 b2 44 9e 83
Feb 19 00:48:17.841614: | a8 53 3b 18 61 76 77 6d f1 19 90 91 4e f6 c4 9d
Feb 19 00:48:17.841619: | cc 5a ce 4c 23 4c a0 7f 64 d9 7c d7 3f ee c4 17
Feb 19 00:48:17.841624: | 90 c4 04 24 9b 0f 4c 3f 94 d0 84 7d 5a 0f 7b 37
Feb 19 00:48:17.841629: | 45 b1 fc 7f 17 4f 09 29 00 00 28 01 00 00 00 00
Feb 19 00:48:17.841633: | 01 00 00 00 06 00 00 00 03 00 00 00 02 00 00 00
Feb 19 00:48:17.841638: | 08 00 00 00 0c 00 00 00 0a 00 00 00 19 00 00 29
Feb 19 00:48:17.841643: | 00 00 08 00 00 40 0a 21 00 00 08 00 00 40 0b 2c
Feb 19 00:48:17.841648: | 00 00 24 00 00 00 20 01 03 04 02 0f 4c a2 e6 03
Feb 19 00:48:17.841653: | 00 00 0c 01 00 00 14 80 0e 00 80 00 00 00 08 05
Feb 19 00:48:17.841658: | 00 00 00 2d 00 00 40 02 00 00 00 07 00 00 10 00
Feb 19 00:48:17.841663: | 00 ff ff 00 00 00 00 ff ff ff ff 08 00 00 28 00
Feb 19 00:48:17.841667: | 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00
Feb 19 00:48:17.841672: | 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff
Feb 19 00:48:17.841677: | ff ff ff 00 00 00 40 02 00 00 00 07 00 00 10 00
Feb 19 00:48:17.841682: | 00 ff ff 00 00 00 00 ff ff ff ff 08 00 00 28 00
Feb 19 00:48:17.841687: | 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00
Feb 19 00:48:17.841692: | 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff
Feb 19 00:48:17.841697: | ff ff ff 2f 4c 08 37 04 22 35 5e 12 13 23 4e 90
Feb 19 00:48:17.841701: | 31 00 47 23 14 70 e4 81
Feb 19 00:48:17.841706: | payload contains 4 octets of extra padding (padding-length: 5 (octet 0x 4))
Feb 19 00:48:17.841712: | stripping 5 octets as pad
Feb 19 00:48:17.841722: | #1 ikev2 ISAKMP_v2_AUTH decrypt success
Feb 19 00:48:17.841735: | Now let's proceed with payload (ISAKMP_NEXT_v2IDi)
Feb 19 00:48:17.841743: | **parse IKEv2 Identification Payload:
Feb 19 00:48:17.841748: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.841755: | flags: none (0x0)
Feb 19 00:48:17.841760: | length: 20 (0x14)
Feb 19 00:48:17.841765: | ID type: ID_FQDN (0x2)
Feb 19 00:48:17.841770: | processing payload: ISAKMP_NEXT_v2IDi (len=20)
Feb 19 00:48:17.841775: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Feb 19 00:48:17.841782: | **parse IKEv2 Notify Payload:
Feb 19 00:48:17.841787: | next payload type: ISAKMP_NEXT_v2IDr (0x24)
Feb 19 00:48:17.841791: | flags: none (0x0)
Feb 19 00:48:17.841796: | length: 8 (0x8)
Feb 19 00:48:17.841801: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.841806: | SPI size: 0 (0x0)
Feb 19 00:48:17.841812: | Notify Message Type: v2N_INITIAL_CONTACT (0x4000)
Feb 19 00:48:17.841817: | processing payload: ISAKMP_NEXT_v2N (len=8)
Feb 19 00:48:17.841822: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr)
Feb 19 00:48:17.841828: | **parse IKEv2 Identification Payload:
Feb 19 00:48:17.841833: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26)
Feb 19 00:48:17.841838: | flags: none (0x0)
Feb 19 00:48:17.841842: | length: 27 (0x1b)
Feb 19 00:48:17.841847: | ID type: ID_FQDN (0x2)
Feb 19 00:48:17.841852: | processing payload: ISAKMP_NEXT_v2IDr (len=27)
Feb 19 00:48:17.841857: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ)
Feb 19 00:48:17.841863: | **parse IKEv2 Certificate Request Payload:
Feb 19 00:48:17.841868: | next payload type: ISAKMP_NEXT_v2AUTH (0x27)
Feb 19 00:48:17.841873: | flags: none (0x0)
Feb 19 00:48:17.841877: | length: 25 (0x19)
Feb 19 00:48:17.841883: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4)
Feb 19 00:48:17.841888: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=25)
Feb 19 00:48:17.841892: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH)
Feb 19 00:48:17.841898: | **parse IKEv2 Authentication Payload:
Feb 19 00:48:17.841903: | next payload type: ISAKMP_NEXT_v2CERT (0x25)
Feb 19 00:48:17.841908: | flags: none (0x0)
Feb 19 00:48:17.841913: | length: 264 (0x108)
Feb 19 00:48:17.841918: | auth method: IKEv2_AUTH_RSA (0x1)
Feb 19 00:48:17.841923: | processing payload: ISAKMP_NEXT_v2AUTH (len=264)
Feb 19 00:48:17.841928: | Now let's proceed with payload (ISAKMP_NEXT_v2CERT)
Feb 19 00:48:17.841933: | **parse IKEv2 Certificate Payload:
Feb 19 00:48:17.841938: | next payload type: ISAKMP_NEXT_v2CP (0x2f)
Feb 19 00:48:17.841943: | flags: none (0x0)
Feb 19 00:48:17.841948: | length: 1289 (0x509)
Feb 19 00:48:17.841953: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4)
Feb 19 00:48:17.841958: | processing payload: ISAKMP_NEXT_v2CERT (len=1289)
Feb 19 00:48:17.841963: | Now let's proceed with payload (ISAKMP_NEXT_v2CP)
Feb 19 00:48:17.841968: | **parse IKEv2 Configuration Payload:
Feb 19 00:48:17.841973: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.841978: | flags: none (0x0)
Feb 19 00:48:17.841983: | length: 40 (0x28)
Feb 19 00:48:17.841988: | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1)
Feb 19 00:48:17.841993: | processing payload: ISAKMP_NEXT_v2CP (len=40)
Feb 19 00:48:17.841998: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Feb 19 00:48:17.842003: | **parse IKEv2 Notify Payload:
Feb 19 00:48:17.842008: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.842013: | flags: none (0x0)
Feb 19 00:48:17.842018: | length: 8 (0x8)
Feb 19 00:48:17.842023: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.842028: | SPI size: 0 (0x0)
Feb 19 00:48:17.842033: | Notify Message Type: v2N_ESP_TFC_PADDING_NOT_SUPPORTED (0x400a)
Feb 19 00:48:17.842038: | processing payload: ISAKMP_NEXT_v2N (len=8)
Feb 19 00:48:17.842043: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Feb 19 00:48:17.842048: | **parse IKEv2 Notify Payload:
Feb 19 00:48:17.842054: | next payload type: ISAKMP_NEXT_v2SA (0x21)
Feb 19 00:48:17.842058: | flags: none (0x0)
Feb 19 00:48:17.842063: | length: 8 (0x8)
Feb 19 00:48:17.842073: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.842078: | SPI size: 0 (0x0)
Feb 19 00:48:17.842083: | Notify Message Type: v2N_NON_FIRST_FRAGMENTS_ALSO (0x400b)
Feb 19 00:48:17.842088: | processing payload: ISAKMP_NEXT_v2N (len=8)
Feb 19 00:48:17.842093: | Now let's proceed with payload (ISAKMP_NEXT_v2SA)
Feb 19 00:48:17.842099: | **parse IKEv2 Security Association Payload:
Feb 19 00:48:17.842104: | next payload type: ISAKMP_NEXT_v2TSi (0x2c)
Feb 19 00:48:17.842109: | flags: none (0x0)
Feb 19 00:48:17.842113: | length: 36 (0x24)
Feb 19 00:48:17.842118: | processing payload: ISAKMP_NEXT_v2SA (len=36)
Feb 19 00:48:17.842123: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi)
Feb 19 00:48:17.842129: | **parse IKEv2 Traffic Selector Payload:
Feb 19 00:48:17.842134: | next payload type: ISAKMP_NEXT_v2TSr (0x2d)
Feb 19 00:48:17.842139: | flags: none (0x0)
Feb 19 00:48:17.842144: | length: 64 (0x40)
Feb 19 00:48:17.842149: | number of TS: 2 (0x2)
Feb 19 00:48:17.842154: | processing payload: ISAKMP_NEXT_v2TSi (len=64)
Feb 19 00:48:17.842159: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr)
Feb 19 00:48:17.842164: | **parse IKEv2 Traffic Selector Payload:
Feb 19 00:48:17.842169: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.842174: | flags: none (0x0)
Feb 19 00:48:17.842179: | length: 64 (0x40)
Feb 19 00:48:17.842184: | number of TS: 2 (0x2)
Feb 19 00:48:17.842188: | processing payload: ISAKMP_NEXT_v2TSr (len=64)
Feb 19 00:48:17.842194: | #1 match encrypted payloads to svm respond to IKE_AUTH
Feb 19 00:48:17.842203: | state #1 NAT-T: new mapping 162.222.81.188:20573
Feb 19 00:48:17.842215: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in for_each_state() at state.c:1518)
Feb 19 00:48:17.842222: | new NAT mapping for #1, was 162.222.81.188:20572, now 162.222.81.188:20573
Feb 19 00:48:17.842231: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in for_each_state() at state.c:1518)
Feb 19 00:48:17.842237: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.842242: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.842249: | processing: resume state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in for_each_state() at state.c:1518)
Feb 19 00:48:17.842255: | NAT-T: updating local port to 4500
Feb 19 00:48:17.842263: | NAT-T connection has wrong interface definition 159.89.116.29:4500 vs 159.89.116.29:500
Feb 19 00:48:17.842270: | NAT-T: updated to use interface eth0:4500
Feb 19 00:48:17.842276: | received IDr payload - extracting our alleged ID
Feb 19 00:48:17.842282: | checking for CERT payloads
Feb 19 00:48:17.842289: | found at last one CERT payload, calling pluto_process_certs()
Feb 19 00:48:17.844072: | crypto helper 1 waiting (nothing to do)
Feb 19 00:48:17.844909: | decoded CN=donkey-eager,OU=Anvil Department,O=ACME CORPORATION,L=Beverly Hills,ST=California,C=US
Feb 19 00:48:17.844927: | get_issuer_crl : looking for a CRL issued by CN=ca-certificate,OU=Anvil Department,O=ACME CORPORATION,L=Beverly Hills,ST=California,C=US
Feb 19 00:48:17.845360: | missing or expired CRL
Feb 19 00:48:17.848545: | crl_strict: 0, ocsp: 0, ocsp_strict: 0
Feb 19 00:48:17.850278: | certificate is valid
Feb 19 00:48:17.850339: "ikev2"[1] 162.222.81.188 #1: certificate verified OK: CN=donkey-eager,OU=Anvil Department,O=ACME CORPORATION,L=Beverly Hills,ST=California,C=US
Feb 19 00:48:17.850884: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x5650b273c6f8
Feb 19 00:48:17.850900: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x5650b2742688
Feb 19 00:48:17.851093: | unreference key: 0x5650b2746638 C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager cnt 1--
Feb 19 00:48:17.851113: | Verifying configured ID matches certificate
Feb 19 00:48:17.851128: | ID_DER_ASN1_DN '%fromcert' does not need further ID verification
Feb 19 00:48:17.851138: | SAN ID matched, updating that.cert
Feb 19 00:48:17.851160: | Peer public key SubjectAltName matches peer ID for this connection
Feb 19 00:48:17.851168: | X509: CERT and ID matches current connection
Feb 19 00:48:17.851174: | CERT_X509_SIGNATURE CR:
Feb 19 00:48:17.851179: | 72 1b af e4 df e3 37 04 32 82 cc 76 69 90 a2 1e
Feb 19 00:48:17.851185: | 4d b5 16 b9
Feb 19 00:48:17.851191: | cert blob content is not binary ASN.1
Feb 19 00:48:17.851200: | refine_host_connection for IKEv2: starting with "ikev2"[1] 162.222.81.188
Feb 19 00:48:17.851212: | match_id a=@donkey-eager
Feb 19 00:48:17.851218: | b=C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager
Feb 19 00:48:17.851224: | results fail
Feb 19 00:48:17.851233: | trusted_ca_nss: trustee A = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate'
Feb 19 00:48:17.851239: | trusted_ca_nss: trustor B = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate'
Feb 19 00:48:17.851246: | same_dn_any_order: not an exact match, now checking any RDN order
Feb 19 00:48:17.851257: | match_dn_unordered A: C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate, B: F\241t\262PV
Feb 19 00:48:17.878788: | trusted_ca_nss: returning untrusted at pathlen 1
Feb 19 00:48:17.878904: | refine_host_connection: checking "ikev2"[1] 162.222.81.188 against "ikev2"[1] 162.222.81.188, best=(none) with match=0(id=0/ca=0/reqca=1)
Feb 19 00:48:17.878925: | Peer expects us to be @blood-become-paddle (ID_FQDN) according to its IDr payload
Feb 19 00:48:17.878932: | This connection's local id is @159.89.116.29 (ID_FQDN)
Feb 19 00:48:17.878951: "ikev2"[1] 162.222.81.188 #1: No matching subjectAltName found
Feb 19 00:48:17.878959: | IDr payload '@blood-become-paddle' is NOT a valid certificate SAN for this connection
Feb 19 00:48:17.878964: | Peer IDr payload does not match our expected ID, this connection will not do
Feb 19 00:48:17.878970: | refine going into 2nd loop allowing instantiated conns as well
Feb 19 00:48:17.878977: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500
Feb 19 00:48:17.878985: | match_id a=@donkey-eager
Feb 19 00:48:17.878990: | b=%fromcert
Feb 19 00:48:17.878994: | results fail
Feb 19 00:48:17.879006: | trusted_ca_nss: trustee A = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate'
Feb 19 00:48:17.879013: | trusted_ca_nss: trustor B = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate'
Feb 19 00:48:17.879019: | same_dn_any_order: not an exact match, now checking any RDN order
Feb 19 00:48:17.879031: | match_dn_unordered A: C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate, B: | refine going into 2nd loop allowing instantiated connsp\327\353\003\374\177
Feb 19 00:48:17.882069: | trusted_ca_nss: returning untrusted at pathlen 1
Feb 19 00:48:17.882133: | refine_host_connection: checking "ikev2"[1] 162.222.81.188 against "ikev2", best=(none) with match=0(id=0/ca=0/reqca=1)
Feb 19 00:48:17.882145: "ikev2"[1] 162.222.81.188 #1: Warning: not switching back to template of current instance (FIXME)
Feb 19 00:48:17.882152: | returning since no better match then original best_found
Feb 19 00:48:17.882160: | no suitable connection for peer '@donkey-eager'
Feb 19 00:48:17.882166: | Peer ID matches and no better connection found - continuing with existing connection
Feb 19 00:48:17.882173: | offered CA: '@donkey-eager'
Feb 19 00:48:17.882181: "ikev2"[1] 162.222.81.188 #1: IKEv2 mode peer ID is ID_FQDN: '@donkey-eager'
Feb 19 00:48:17.882191: | hmac PRF sha2_256 init symkey-key@0x7f2c3c006d10 (size 32)
Feb 19 00:48:17.882199: | EXTRACT_KEY_FROM_KEY:
Feb 19 00:48:17.882205: | key-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY
Feb 19 00:48:17.882211: | key-offset: 0, key-size: 32
Feb 19 00:48:17.882217: | -> flags: SIGN target: SHA256_HMAC
Feb 19 00:48:17.882264: | result: clone-key@0x7f2c3c00a320, size: 32 bytes, type/mechanism: SHA256_HMAC
Feb 19 00:48:17.882282: | hmac prf: created sha2_256 context 0x5650b2745c00 from symkey-key@0x7f2c3c00a320
Feb 19 00:48:17.882289: | hmac prf: begin sha2_256 with context 0x5650b2745c00 from symkey-key@0x7f2c3c00a320
Feb 19 00:48:17.882296: | hmac: release clone-key@0x7f2c3c00a320
Feb 19 00:48:17.882302: | hmac PRF sha2_256 crypt-prf@0x5650b273c688
Feb 19 00:48:17.882308: | idhash verify I2 02 00 00 00 64 6f 6e 6b 65 79 2d 65 61 67 65 72
Feb 19 00:48:17.882315: | hmac PRF sha2_256 update data-bytes@0x5650b273d93c (length 16)
Feb 19 00:48:17.882322: | hmac PRF sha2_256 final-bytes ...
Feb 19 00:48:17.882336: | hmac PRF sha2_256 final-bytes@0x7ffc03ebe440 (length 32)
Feb 19 00:48:17.882343: | received CERTREQ payload; going to decode it
Feb 19 00:48:17.882349: | CERT_X509_SIGNATURE CR:
Feb 19 00:48:17.882354: | 72 1b af e4 df e3 37 04 32 82 cc 76 69 90 a2 1e
Feb 19 00:48:17.882359: | 4d b5 16 b9
Feb 19 00:48:17.882365: | cert blob content is not binary ASN.1
Feb 19 00:48:17.882371: | inputs to hash1 (first packet)
Feb 19 00:48:17.882376: | e5 e9 88 9b 1f fd dd 07 00 00 00 00 00 00 00 00
Feb 19 00:48:17.882381: | 21 20 22 08 00 00 00 00 00 00 00 e0 22 00 00 28
Feb 19 00:48:17.882386: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14
Feb 19 00:48:17.882391: | 80 0e 00 80 03 00 00 08 02 00 00 05 00 00 00 08
Feb 19 00:48:17.882397: | 04 00 00 13 28 00 00 48 00 13 00 00 2d a0 d9 53
Feb 19 00:48:17.882402: | 92 96 68 a9 38 e0 5e 5a 9a af 10 1b 66 23 25 ea
Feb 19 00:48:17.882407: | c0 4b 92 f8 d6 09 33 60 19 cd 96 38 ae 99 6c bc
Feb 19 00:48:17.882412: | 47 9d 29 e2 13 df 22 9c 98 73 b7 a1 d8 e9 dd b3
Feb 19 00:48:17.882417: | 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e 29 00 00 14
Feb 19 00:48:17.882422: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5
Feb 19 00:48:17.882427: | 29 00 00 1c 00 00 40 04 ae 3a 70 67 06 74 04 b5
Feb 19 00:48:17.882432: | ed 09 0d dc 06 91 15 a0 03 c3 b3 51 29 00 00 1c
Feb 19 00:48:17.882437: | 00 00 40 05 9b da 44 94 b3 06 ae c6 76 f1 bc 3c
Feb 19 00:48:17.882442: | 85 be 83 10 4b 11 ff c4 00 00 00 08 00 00 40 2e
Feb 19 00:48:17.882447: | inputs to hash2 (responder nonce)
Feb 19 00:48:17.882452: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3
Feb 19 00:48:17.882457: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d
Feb 19 00:48:17.882463: | idhash e9 25 b7 c8 ec 0d 26 d5 7f 86 6f 65 58 40 f9 c8
Feb 19 00:48:17.882468: | idhash e2 20 3e e3 b0 45 a6 d2 90 e0 ff de a0 a3 57 a3
Feb 19 00:48:17.882474: | sighash hash sha init
Feb 19 00:48:17.882484: | sighash sha hasher: context 0x5650b2745c00
Feb 19 00:48:17.882491: | sighash hash sha digest first packet-chunk@0x5650b273c378 (length 224)
Feb 19 00:48:17.882501: | sighash hash sha digest nunce-chunk@0x7f2c44001f48 (length 32)
Feb 19 00:48:17.882509: | sighash hash sha digest IDHASH-bytes@0x7ffc03ebe440 (length 32)
Feb 19 00:48:17.882517: | sighash hash sha final bytes@0x7ffc03ebe320 (length 20)
Feb 19 00:48:17.882525: | sighash 5e a3 ff d5 0b 14 0d 35 e0 90 68 ff 73 80 23 38
Feb 19 00:48:17.882531: | sighash 99 ce 14 6d
Feb 19 00:48:17.882538: | required CA is '\370'
Feb 19 00:48:17.882555: | checking keyid 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager'
Feb 19 00:48:17.882566: | trusted_ca_nss: trustee A = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate'
Feb 19 00:48:17.882572: | trusted_ca_nss: trustor B = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate'
Feb 19 00:48:17.882578: | same_dn_any_order: not an exact match, now checking any RDN order
Feb 19 00:48:17.882590: | match_dn_unordered A: C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate, B: | checking keyid 'C=US, ST=California, L=Beverly Hills, \320\332\353\003\374\177
Feb 19 00:48:17.885674: | trusted_ca_nss: returning untrusted at pathlen 1
Feb 19 00:48:17.885746: | checking keyid '@donkey-eager' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager'
Feb 19 00:48:17.885759: | checking keyid '@159.89.116.29' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager'
Feb 19 00:48:17.885774: | checking keyid 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=159.89.116.29' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager'
Feb 19 00:48:17.885787: | checking keyid '159.89.116.29' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager'
Feb 19 00:48:17.885801: "ikev2"[1] 162.222.81.188 #1: no RSA public key known for 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager'
Feb 19 00:48:17.885809: "ikev2"[1] 162.222.81.188 #1: RSA authentication failed
Feb 19 00:48:17.885817: "ikev2"[1] 162.222.81.188 #1: sending unencrypted notification v2N_AUTHENTICATION_FAILED to 162.222.81.188:20573
Feb 19 00:48:17.885824: | **emit ISAKMP Message:
Feb 19 00:48:17.885830: | initiator cookie:
Feb 19 00:48:17.885835: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:17.885840: | responder cookie:
Feb 19 00:48:17.885844: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:17.885850: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:17.885856: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:17.885862: | exchange type: ISAKMP_v2_SA_INIT (0x22)
Feb 19 00:48:17.885868: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:17.885873: | message ID: 00 00 00 00
Feb 19 00:48:17.885879: | Adding a v2N Payload
Feb 19 00:48:17.885885: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:17.885890: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:17.885896: | flags: none (0x0)
Feb 19 00:48:17.885901: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:17.885906: | SPI size: 0 (0x0)
Feb 19 00:48:17.885911: | Notify Message Type: v2N_AUTHENTICATION_FAILED (0x18)
Feb 19 00:48:17.885917: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:17.885923: | no IKE message padding required for IKEv2
Feb 19 00:48:17.885928: | emitting length of ISAKMP Message: 36
Feb 19 00:48:17.885938: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #1)
Feb 19 00:48:17.885944: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:17.885949: | b9 ee 22 9a 29 20 22 20 00 00 00 00 00 00 00 24
Feb 19 00:48:17.885954: | 00 00 00 08 00 00 00 18
Feb 19 00:48:17.886093: | ikev2_parent_inI2outR2_tail returned STF_FATAL
Feb 19 00:48:17.886111: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in complete_v2_state_transition() at ikev2.c:2326)
Feb 19 00:48:17.886118: | #1 complete v2 state transition from STATE_PARENT_R1 with STF_FATAL
Feb 19 00:48:17.886128: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in delete_state() at state.c:879)
Feb 19 00:48:17.886136: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.886141: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.886148: "ikev2"[1] 162.222.81.188 #1: deleting state (STATE_PARENT_R1)
Feb 19 00:48:17.886155: | parent state #1: STATE_PARENT_R1(half-open-ike) => delete
Feb 19 00:48:17.886161: | state #1 requesting N/A-pe@(nil) be deleted
Feb 19 00:48:17.886166: | delete_pluto_event cannot delete NULL event
Feb 19 00:48:17.886171: | state #1 requesting N/A-pe@(nil) be deleted
Feb 19 00:48:17.886176: | delete_pluto_event cannot delete NULL event
Feb 19 00:48:17.886181: | state #1 requesting N/A-pe@(nil) be deleted
Feb 19 00:48:17.886186: | delete_pluto_event cannot delete NULL event
Feb 19 00:48:17.886210: | state #1 requesting N/A-pe@(nil) be deleted
Feb 19 00:48:17.886216: | delete_pluto_event cannot delete NULL event
Feb 19 00:48:17.886221: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted
Feb 19 00:48:17.886231: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278
Feb 19 00:48:17.886245: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:17.886254: | serialno list: removing object 0x5650b273ace8 (state #1) entry 0x5650b273b478 (older 0x5650b265db80 newer 0x5650b265db80)
Feb 19 00:48:17.886259: | serialno list: empty
Feb 19 00:48:17.886266: | serialno table: removing object 0x5650b273ace8 (state #1) entry 0x5650b273b498 (older 0x5650b2652a80 newer 0x5650b2652a80)
Feb 19 00:48:17.886271: | serialno table: empty
Feb 19 00:48:17.886277: | in connection_discard for connection ikev2
Feb 19 00:48:17.886282: | connection is instance
Feb 19 00:48:17.886287: | not in pending use
Feb 19 00:48:17.886292: | no states use this connection, deleting
Feb 19 00:48:17.886301: | processing: start connection "ikev2"[1] 162.222.81.188 (BACKGROUND) (in delete_connection() at connections.c:262)
Feb 19 00:48:17.886308: deleting connection "ikev2"[1] 162.222.81.188 instance with peer 162.222.81.188 {isakmp=#0/ipsec=#0}
Feb 19 00:48:17.886314: | Deleting states for connection - not including other IPsec SA's
Feb 19 00:48:17.886319: | pass 0
Feb 19 00:48:17.886324: | pass 1
Feb 19 00:48:17.886330: | unreference addresspool of conn ikev2[1] kind CK_GOING_AWAY refcnt 2
Feb 19 00:48:17.886338: | processing: stop connection "ikev2" (BACKGROUND) (in delete_connection() at connections.c:312)
Feb 19 00:48:17.886352: | parent state #1: STATE_PARENT_R1(half-open-ike) => STATE_UNDEFINED(ignore)
Feb 19 00:48:17.886357: | ignore states: 0
Feb 19 00:48:17.886362: | half-open-ike states: 0
Feb 19 00:48:17.886366: | open-ike states: 0
Feb 19 00:48:17.886371: | established-anonymous-ike states: 0
Feb 19 00:48:17.886376: | established-authenticated-ike states: 0
Feb 19 00:48:17.886380: | anonymous-ipsec states: 0
Feb 19 00:48:17.886385: | authenticated-ipsec states: 0
Feb 19 00:48:17.886390: | informational states: 0
Feb 19 00:48:17.886395: | unknown states: 0
Feb 19 00:48:17.886400: | category states: 0 count states: 0
Feb 19 00:48:17.886408: | DH secret DH19@0x7f2c44001ef8: destroyed
Feb 19 00:48:17.886431: | processing: stop state #1 162.222.81.188:20573 (in delete_state() at state.c:1102)
Feb 19 00:48:17.886437: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.886443: | serialno table: hash serialno #1 to head 0x5650b2652a80
Feb 19 00:48:17.886451: | delete_state: release st->st_shared_nss-key@0x5650b270a760
Feb 19 00:48:17.886462: | delete_state: release st->st_skeyid_nss-key@NULL
Feb 19 00:48:17.886467: | delete_state: release st->st_skey_d_nss-key@0x5650b2708ee0
Feb 19 00:48:17.886476: | delete_state: release st->st_skey_ai_nss-key@NULL
Feb 19 00:48:17.886481: | delete_state: release st->st_skey_ar_nss-key@NULL
Feb 19 00:48:17.886486: | delete_state: release st->st_skey_ei_nss-key@0x7f2c3c005460
Feb 19 00:48:17.886494: | delete_state: release st->st_skey_er_nss-key@0x7f2c3c005130
Feb 19 00:48:17.886503: | delete_state: release st->st_skey_pi_nss-key@0x7f2c3c006d10
Feb 19 00:48:17.886511: | delete_state: release st->st_skey_pr_nss-key@0x7f2c3c008b30
Feb 19 00:48:17.886519: | delete_state: release st->st_enc_key_nss-key@NULL
Feb 19 00:48:17.886525: | delete_state: release st->st_sk_d_no_ppk-key@NULL
Feb 19 00:48:17.886530: | delete_state: release st->st_sk_pi_no_ppk-key@NULL
Feb 19 00:48:17.886534: | delete_state: release st->st_sk_pr_no_ppk-key@NULL
Feb 19 00:48:17.886545: | processing: STOP state #0 (in handle_helper_answer() at pluto_crypt.c:592)
Feb 19 00:48:17.886551: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:17.886556: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.765859: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:20.796158: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.796203: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00
Feb 19 00:48:20.796213: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38
Feb 19 00:48:20.796218: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a
Feb 19 00:48:20.796224: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01
Feb 19 00:48:20.796229: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be
Feb 19 00:48:20.796235: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c
Feb 19 00:48:20.796240: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6
Feb 19 00:48:20.796245: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a
Feb 19 00:48:20.796251: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f
Feb 19 00:48:20.796257: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d
Feb 19 00:48:20.796262: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28
Feb 19 00:48:20.796267: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9
Feb 19 00:48:20.796273: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99
Feb 19 00:48:20.796279: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47
Feb 19 00:48:20.796284: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13
Feb 19 00:48:20.796289: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c
Feb 19 00:48:20.796295: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf
Feb 19 00:48:20.796300: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27
Feb 19 00:48:20.796306: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa
Feb 19 00:48:20.796311: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20
Feb 19 00:48:20.796317: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19
Feb 19 00:48:20.796322: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57
Feb 19 00:48:20.796328: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89
Feb 19 00:48:20.796333: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a
Feb 19 00:48:20.796338: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69
Feb 19 00:48:20.796344: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01
Feb 19 00:48:20.796349: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15
Feb 19 00:48:20.796355: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7
Feb 19 00:48:20.796360: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2
Feb 19 00:48:20.796365: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34
Feb 19 00:48:20.796370: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11
Feb 19 00:48:20.796375: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06
Feb 19 00:48:20.796380: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c
Feb 19 00:48:20.796393: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:20.796404: | **parse ISAKMP Message:
Feb 19 00:48:20.796411: | initiator cookie:
Feb 19 00:48:20.796416: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.796422: | responder cookie:
Feb 19 00:48:20.796427: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.796433: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:20.796440: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.796445: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.796452: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:20.796457: | message ID: 00 00 00 01
Feb 19 00:48:20.796463: | length: 540 (0x21c)
Feb 19 00:48:20.796469: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:20.796475: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:20.796481: | I am the IKE SA Original Responder
Feb 19 00:48:20.796497: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:20.796503: | parent v2 state object not found
Feb 19 00:48:20.796510: | from_state is STATE_UNDEFINED
Feb 19 00:48:20.796516: | selected state microcode roof
Feb 19 00:48:20.796521: | no useful state microcode entry found
Feb 19 00:48:20.796534: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:20.796549: | **emit ISAKMP Message:
Feb 19 00:48:20.796556: | initiator cookie:
Feb 19 00:48:20.796561: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.796566: | responder cookie:
Feb 19 00:48:20.796572: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.796578: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:20.796583: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.796589: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.796595: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:20.796601: | message ID: 00 00 00 00
Feb 19 00:48:20.796608: | Adding a v2N Payload
Feb 19 00:48:20.796614: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:20.796620: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:20.796626: | flags: none (0x0)
Feb 19 00:48:20.796632: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:20.796637: | SPI size: 0 (0x0)
Feb 19 00:48:20.796643: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:20.796649: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:20.796655: | no IKEv1 message padding required
Feb 19 00:48:20.796661: | emitting length of ISAKMP Message: 36
Feb 19 00:48:20.796672: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:20.796678: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:20.796684: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:20.796689: | 00 00 00 08 00 00 00 04
Feb 19 00:48:20.796766: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:20.796781: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:20.796788: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.796794: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.796801: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:20.796850: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:20.796859: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.796864: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:20.796870: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24
Feb 19 00:48:20.796875: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4
Feb 19 00:48:20.796880: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29
Feb 19 00:48:20.796886: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9
Feb 19 00:48:20.796891: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd
Feb 19 00:48:20.796897: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70
Feb 19 00:48:20.796902: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6
Feb 19 00:48:20.796908: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57
Feb 19 00:48:20.796913: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a
Feb 19 00:48:20.796919: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d
Feb 19 00:48:20.796924: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60
Feb 19 00:48:20.796930: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73
Feb 19 00:48:20.796935: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df
Feb 19 00:48:20.796940: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca
Feb 19 00:48:20.796946: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45
Feb 19 00:48:20.796951: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34
Feb 19 00:48:20.796957: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10
Feb 19 00:48:20.796963: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59
Feb 19 00:48:20.796968: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9
Feb 19 00:48:20.796973: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20
Feb 19 00:48:20.796979: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1
Feb 19 00:48:20.796984: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8
Feb 19 00:48:20.796990: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6
Feb 19 00:48:20.797002: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a
Feb 19 00:48:20.797008: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f
Feb 19 00:48:20.797014: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44
Feb 19 00:48:20.797019: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa
Feb 19 00:48:20.797025: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36
Feb 19 00:48:20.797030: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93
Feb 19 00:48:20.797036: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12
Feb 19 00:48:20.797041: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72
Feb 19 00:48:20.797047: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f
Feb 19 00:48:20.797054: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:20.797061: | **parse ISAKMP Message:
Feb 19 00:48:20.797067: | initiator cookie:
Feb 19 00:48:20.797072: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.797078: | responder cookie:
Feb 19 00:48:20.797083: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.797089: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:20.797095: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.797101: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.797107: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:20.797112: | message ID: 00 00 00 01
Feb 19 00:48:20.797118: | length: 540 (0x21c)
Feb 19 00:48:20.797124: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:20.797130: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:20.797135: | I am the IKE SA Original Responder
Feb 19 00:48:20.797148: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:20.797154: | parent v2 state object not found
Feb 19 00:48:20.797160: | from_state is STATE_UNDEFINED
Feb 19 00:48:20.797166: | selected state microcode roof
Feb 19 00:48:20.797171: | no useful state microcode entry found
Feb 19 00:48:20.797179: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:20.797185: | **emit ISAKMP Message:
Feb 19 00:48:20.797190: | initiator cookie:
Feb 19 00:48:20.797195: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.797200: | responder cookie:
Feb 19 00:48:20.797205: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.797211: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:20.797217: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.797223: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.797229: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:20.797234: | message ID: 00 00 00 00
Feb 19 00:48:20.797240: | Adding a v2N Payload
Feb 19 00:48:20.797246: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:20.797251: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:20.797257: | flags: none (0x0)
Feb 19 00:48:20.797263: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:20.797268: | SPI size: 0 (0x0)
Feb 19 00:48:20.797274: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:20.797280: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:20.797285: | no IKEv1 message padding required
Feb 19 00:48:20.797291: | emitting length of ISAKMP Message: 36
Feb 19 00:48:20.797299: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:20.797305: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:20.797310: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:20.797315: | 00 00 00 08 00 00 00 04
Feb 19 00:48:20.797336: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:20.797345: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:20.797351: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.797357: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.797369: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:20.797391: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:20.797399: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.797405: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:20.797410: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8
Feb 19 00:48:20.797415: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98
Feb 19 00:48:20.797421: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db
Feb 19 00:48:20.797426: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c
Feb 19 00:48:20.797432: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a
Feb 19 00:48:20.797437: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d
Feb 19 00:48:20.797443: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5
Feb 19 00:48:20.797448: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed
Feb 19 00:48:20.797453: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2
Feb 19 00:48:20.797459: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5
Feb 19 00:48:20.797464: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18
Feb 19 00:48:20.797470: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49
Feb 19 00:48:20.797475: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7
Feb 19 00:48:20.797481: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71
Feb 19 00:48:20.797486: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59
Feb 19 00:48:20.797491: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d
Feb 19 00:48:20.797497: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e
Feb 19 00:48:20.797503: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98
Feb 19 00:48:20.797508: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6
Feb 19 00:48:20.797514: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3
Feb 19 00:48:20.797519: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44
Feb 19 00:48:20.797525: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83
Feb 19 00:48:20.797530: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6
Feb 19 00:48:20.797536: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6
Feb 19 00:48:20.797541: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0
Feb 19 00:48:20.797547: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4
Feb 19 00:48:20.797552: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95
Feb 19 00:48:20.797557: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa
Feb 19 00:48:20.797563: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f
Feb 19 00:48:20.797568: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c
Feb 19 00:48:20.797574: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b
Feb 19 00:48:20.797579: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7
Feb 19 00:48:20.797586: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:20.797593: | **parse ISAKMP Message:
Feb 19 00:48:20.797599: | initiator cookie:
Feb 19 00:48:20.797604: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.797610: | responder cookie:
Feb 19 00:48:20.797615: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.797621: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:20.797626: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.797632: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.797638: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:20.797644: | message ID: 00 00 00 01
Feb 19 00:48:20.797649: | length: 540 (0x21c)
Feb 19 00:48:20.797655: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:20.797661: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:20.797667: | I am the IKE SA Original Responder
Feb 19 00:48:20.797680: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:20.797685: | parent v2 state object not found
Feb 19 00:48:20.797691: | from_state is STATE_UNDEFINED
Feb 19 00:48:20.797704: | selected state microcode roof
Feb 19 00:48:20.797709: | no useful state microcode entry found
Feb 19 00:48:20.797717: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:20.797723: | **emit ISAKMP Message:
Feb 19 00:48:20.797729: | initiator cookie:
Feb 19 00:48:20.797734: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.797739: | responder cookie:
Feb 19 00:48:20.797745: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.797750: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:20.797756: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.797762: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.797768: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:20.797774: | message ID: 00 00 00 00
Feb 19 00:48:20.797779: | Adding a v2N Payload
Feb 19 00:48:20.797785: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:20.797791: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:20.797796: | flags: none (0x0)
Feb 19 00:48:20.797802: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:20.797808: | SPI size: 0 (0x0)
Feb 19 00:48:20.797814: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:20.797820: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:20.797825: | no IKEv1 message padding required
Feb 19 00:48:20.797831: | emitting length of ISAKMP Message: 36
Feb 19 00:48:20.797838: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:20.797844: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:20.797850: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:20.797855: | 00 00 00 08 00 00 00 04
Feb 19 00:48:20.797873: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:20.797882: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:20.797888: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.797894: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.797900: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:20.797921: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:20.797928: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.797934: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8
Feb 19 00:48:20.797939: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86
Feb 19 00:48:20.797945: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b
Feb 19 00:48:20.797950: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc
Feb 19 00:48:20.797956: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56
Feb 19 00:48:20.797961: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26
Feb 19 00:48:20.797967: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d
Feb 19 00:48:20.797972: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f
Feb 19 00:48:20.797978: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4
Feb 19 00:48:20.797983: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16
Feb 19 00:48:20.797989: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c
Feb 19 00:48:20.797994: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61
Feb 19 00:48:20.798000: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5
Feb 19 00:48:20.798005: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b
Feb 19 00:48:20.798011: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed
Feb 19 00:48:20.798016: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce
Feb 19 00:48:20.798022: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0
Feb 19 00:48:20.798027: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47
Feb 19 00:48:20.798033: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2
Feb 19 00:48:20.798039: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50
Feb 19 00:48:20.798044: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30
Feb 19 00:48:20.798056: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5
Feb 19 00:48:20.798062: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf
Feb 19 00:48:20.798068: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4
Feb 19 00:48:20.798073: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65
Feb 19 00:48:20.798079: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d
Feb 19 00:48:20.798084: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e
Feb 19 00:48:20.798090: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c
Feb 19 00:48:20.798095: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23
Feb 19 00:48:20.798100: | 14 70 e4 81
Feb 19 00:48:20.798108: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:20.798114: | **parse ISAKMP Message:
Feb 19 00:48:20.798120: | initiator cookie:
Feb 19 00:48:20.798125: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.798131: | responder cookie:
Feb 19 00:48:20.798136: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.798142: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:20.798148: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.798154: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.798160: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:20.798165: | message ID: 00 00 00 01
Feb 19 00:48:20.798171: | length: 484 (0x1e4)
Feb 19 00:48:20.798177: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:20.798183: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:20.798187: | I am the IKE SA Original Responder
Feb 19 00:48:20.798198: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:20.798204: | parent v2 state object not found
Feb 19 00:48:20.798211: | from_state is STATE_UNDEFINED
Feb 19 00:48:20.798216: | selected state microcode roof
Feb 19 00:48:20.798220: | no useful state microcode entry found
Feb 19 00:48:20.798227: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:20.798233: | **emit ISAKMP Message:
Feb 19 00:48:20.798238: | initiator cookie:
Feb 19 00:48:20.798243: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:20.798248: | responder cookie:
Feb 19 00:48:20.798252: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:20.798257: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:20.798262: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:20.798268: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:20.798273: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:20.798278: | message ID: 00 00 00 00
Feb 19 00:48:20.798284: | Adding a v2N Payload
Feb 19 00:48:20.798289: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:20.798294: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:20.798300: | flags: none (0x0)
Feb 19 00:48:20.798305: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:20.798310: | SPI size: 0 (0x0)
Feb 19 00:48:20.798315: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:20.798321: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:20.798326: | no IKEv1 message padding required
Feb 19 00:48:20.798332: | emitting length of ISAKMP Message: 36
Feb 19 00:48:20.798340: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:20.798347: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:20.798353: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:20.798358: | 00 00 00 08 00 00 00 04
Feb 19 00:48:20.798384: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:20.798394: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:20.798401: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.798407: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:20.798413: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:23.765472: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:23.765786: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.765882: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00
Feb 19 00:48:23.765968: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38
Feb 19 00:48:23.766050: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a
Feb 19 00:48:23.766122: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01
Feb 19 00:48:23.766190: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be
Feb 19 00:48:23.766258: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c
Feb 19 00:48:23.766272: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6
Feb 19 00:48:23.766278: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a
Feb 19 00:48:23.766284: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f
Feb 19 00:48:23.766289: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d
Feb 19 00:48:23.766295: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28
Feb 19 00:48:23.766300: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9
Feb 19 00:48:23.766306: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99
Feb 19 00:48:23.766311: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47
Feb 19 00:48:23.766317: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13
Feb 19 00:48:23.766323: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c
Feb 19 00:48:23.766328: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf
Feb 19 00:48:23.766334: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27
Feb 19 00:48:23.766339: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa
Feb 19 00:48:23.766345: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20
Feb 19 00:48:23.766350: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19
Feb 19 00:48:23.766356: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57
Feb 19 00:48:23.766361: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89
Feb 19 00:48:23.766367: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a
Feb 19 00:48:23.766372: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69
Feb 19 00:48:23.766378: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01
Feb 19 00:48:23.766383: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15
Feb 19 00:48:23.766389: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7
Feb 19 00:48:23.766394: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2
Feb 19 00:48:23.766400: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34
Feb 19 00:48:23.766405: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11
Feb 19 00:48:23.766411: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06
Feb 19 00:48:23.766416: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c
Feb 19 00:48:23.766428: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:23.766438: | **parse ISAKMP Message:
Feb 19 00:48:23.766445: | initiator cookie:
Feb 19 00:48:23.766450: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.766455: | responder cookie:
Feb 19 00:48:23.766461: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.766468: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:23.766474: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.766480: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.766487: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:23.766493: | message ID: 00 00 00 01
Feb 19 00:48:23.766499: | length: 540 (0x21c)
Feb 19 00:48:23.766506: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:23.766512: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:23.766518: | I am the IKE SA Original Responder
Feb 19 00:48:23.766532: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:23.766540: | parent v2 state object not found
Feb 19 00:48:23.766546: | from_state is STATE_UNDEFINED
Feb 19 00:48:23.766552: | selected state microcode roof
Feb 19 00:48:23.766578: | no useful state microcode entry found
Feb 19 00:48:23.766593: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:23.766601: | **emit ISAKMP Message:
Feb 19 00:48:23.766608: | initiator cookie:
Feb 19 00:48:23.766613: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.766618: | responder cookie:
Feb 19 00:48:23.766624: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.766630: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:23.766636: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.766642: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.766648: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:23.766653: | message ID: 00 00 00 00
Feb 19 00:48:23.766661: | Adding a v2N Payload
Feb 19 00:48:23.766666: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:23.766672: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:23.766678: | flags: none (0x0)
Feb 19 00:48:23.766684: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:23.766690: | SPI size: 0 (0x0)
Feb 19 00:48:23.766695: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:23.766702: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:23.766708: | no IKEv1 message padding required
Feb 19 00:48:23.766713: | emitting length of ISAKMP Message: 36
Feb 19 00:48:23.766724: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:23.766730: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:23.766736: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:23.766741: | 00 00 00 08 00 00 00 04
Feb 19 00:48:23.766782: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:23.766794: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:23.766801: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.766807: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.766815: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:23.768520: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:23.768700: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.769486: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:23.769585: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24
Feb 19 00:48:23.769650: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4
Feb 19 00:48:23.769710: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29
Feb 19 00:48:23.769771: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9
Feb 19 00:48:23.769832: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd
Feb 19 00:48:23.769911: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70
Feb 19 00:48:23.769976: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6
Feb 19 00:48:23.770040: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57
Feb 19 00:48:23.770122: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a
Feb 19 00:48:23.770188: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d
Feb 19 00:48:23.770250: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60
Feb 19 00:48:23.770311: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73
Feb 19 00:48:23.770381: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df
Feb 19 00:48:23.770445: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca
Feb 19 00:48:23.770507: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45
Feb 19 00:48:23.770571: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34
Feb 19 00:48:23.770633: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10
Feb 19 00:48:23.770706: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59
Feb 19 00:48:23.770768: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9
Feb 19 00:48:23.770829: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20
Feb 19 00:48:23.770889: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1
Feb 19 00:48:23.770973: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8
Feb 19 00:48:23.771035: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6
Feb 19 00:48:23.771097: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a
Feb 19 00:48:23.771157: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f
Feb 19 00:48:23.771218: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44
Feb 19 00:48:23.771279: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa
Feb 19 00:48:23.771338: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36
Feb 19 00:48:23.771402: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93
Feb 19 00:48:23.771460: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12
Feb 19 00:48:23.771517: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72
Feb 19 00:48:23.771575: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f
Feb 19 00:48:23.771643: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:23.771706: | **parse ISAKMP Message:
Feb 19 00:48:23.771766: | initiator cookie:
Feb 19 00:48:23.771824: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.771896: | responder cookie:
Feb 19 00:48:23.771954: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.772009: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:23.772111: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.772186: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.772249: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:23.772314: | message ID: 00 00 00 01
Feb 19 00:48:23.772374: | length: 540 (0x21c)
Feb 19 00:48:23.772441: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:23.772510: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:23.772587: | I am the IKE SA Original Responder
Feb 19 00:48:23.772614: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:23.772623: | parent v2 state object not found
Feb 19 00:48:23.772631: | from_state is STATE_UNDEFINED
Feb 19 00:48:23.772637: | selected state microcode roof
Feb 19 00:48:23.772642: | no useful state microcode entry found
Feb 19 00:48:23.772656: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:23.772666: | **emit ISAKMP Message:
Feb 19 00:48:23.772673: | initiator cookie:
Feb 19 00:48:23.772679: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.772684: | responder cookie:
Feb 19 00:48:23.772689: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.772696: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:23.772702: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.772707: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.772714: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:23.772719: | message ID: 00 00 00 00
Feb 19 00:48:23.772726: | Adding a v2N Payload
Feb 19 00:48:23.772732: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:23.772740: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:23.772745: | flags: none (0x0)
Feb 19 00:48:23.772750: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:23.772756: | SPI size: 0 (0x0)
Feb 19 00:48:23.772761: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:23.772767: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:23.772772: | no IKEv1 message padding required
Feb 19 00:48:23.772777: | emitting length of ISAKMP Message: 36
Feb 19 00:48:23.772787: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:23.772793: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:23.772798: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:23.772804: | 00 00 00 08 00 00 00 04
Feb 19 00:48:23.773590: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:23.773627: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:23.773658: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.773666: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.773672: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:23.773727: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:23.773737: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.773743: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:23.773748: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8
Feb 19 00:48:23.773752: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98
Feb 19 00:48:23.773757: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db
Feb 19 00:48:23.773762: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c
Feb 19 00:48:23.773767: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a
Feb 19 00:48:23.773771: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d
Feb 19 00:48:23.773776: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5
Feb 19 00:48:23.773780: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed
Feb 19 00:48:23.773785: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2
Feb 19 00:48:23.773790: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5
Feb 19 00:48:23.773794: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18
Feb 19 00:48:23.773799: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49
Feb 19 00:48:23.773803: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7
Feb 19 00:48:23.773808: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71
Feb 19 00:48:23.773813: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59
Feb 19 00:48:23.773818: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d
Feb 19 00:48:23.773823: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e
Feb 19 00:48:23.773828: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98
Feb 19 00:48:23.773833: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6
Feb 19 00:48:23.773838: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3
Feb 19 00:48:23.773843: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44
Feb 19 00:48:23.773848: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83
Feb 19 00:48:23.773852: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6
Feb 19 00:48:23.773856: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6
Feb 19 00:48:23.773861: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0
Feb 19 00:48:23.773866: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4
Feb 19 00:48:23.774058: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95
Feb 19 00:48:23.774076: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa
Feb 19 00:48:23.774082: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f
Feb 19 00:48:23.774086: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c
Feb 19 00:48:23.774091: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b
Feb 19 00:48:23.774096: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7
Feb 19 00:48:23.774104: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:23.774112: | **parse ISAKMP Message:
Feb 19 00:48:23.774119: | initiator cookie:
Feb 19 00:48:23.774123: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.774128: | responder cookie:
Feb 19 00:48:23.774133: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.774139: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:23.774145: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.774151: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.774156: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:23.774161: | message ID: 00 00 00 01
Feb 19 00:48:23.774166: | length: 540 (0x21c)
Feb 19 00:48:23.774172: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:23.774178: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:23.774183: | I am the IKE SA Original Responder
Feb 19 00:48:23.774195: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:23.774210: | parent v2 state object not found
Feb 19 00:48:23.774216: | from_state is STATE_UNDEFINED
Feb 19 00:48:23.774221: | selected state microcode roof
Feb 19 00:48:23.774226: | no useful state microcode entry found
Feb 19 00:48:23.774348: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:23.774364: | **emit ISAKMP Message:
Feb 19 00:48:23.774403: | initiator cookie:
Feb 19 00:48:23.774411: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.774416: | responder cookie:
Feb 19 00:48:23.774421: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.774427: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:23.774432: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.774437: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.774443: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:23.774450: | message ID: 00 00 00 00
Feb 19 00:48:23.774456: | Adding a v2N Payload
Feb 19 00:48:23.774462: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:23.774468: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:23.774473: | flags: none (0x0)
Feb 19 00:48:23.774479: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:23.774484: | SPI size: 0 (0x0)
Feb 19 00:48:23.774490: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:23.774496: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:23.774502: | no IKEv1 message padding required
Feb 19 00:48:23.774507: | emitting length of ISAKMP Message: 36
Feb 19 00:48:23.774517: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:23.774525: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:23.774531: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:23.774536: | 00 00 00 08 00 00 00 04
Feb 19 00:48:23.774631: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:23.774648: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:23.774656: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.774662: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.774668: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:23.774702: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:23.774712: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.774717: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8
Feb 19 00:48:23.774721: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86
Feb 19 00:48:23.774726: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b
Feb 19 00:48:23.774730: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc
Feb 19 00:48:23.774735: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56
Feb 19 00:48:23.774740: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26
Feb 19 00:48:23.774745: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d
Feb 19 00:48:23.774750: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f
Feb 19 00:48:23.774756: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4
Feb 19 00:48:23.774761: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16
Feb 19 00:48:23.774766: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c
Feb 19 00:48:23.774771: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61
Feb 19 00:48:23.774777: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5
Feb 19 00:48:23.774782: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b
Feb 19 00:48:23.774787: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed
Feb 19 00:48:23.774792: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce
Feb 19 00:48:23.774797: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0
Feb 19 00:48:23.774802: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47
Feb 19 00:48:23.774807: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2
Feb 19 00:48:23.774812: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50
Feb 19 00:48:23.774825: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30
Feb 19 00:48:23.774830: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5
Feb 19 00:48:23.774835: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf
Feb 19 00:48:23.774840: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4
Feb 19 00:48:23.774844: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65
Feb 19 00:48:23.774849: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d
Feb 19 00:48:23.774853: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e
Feb 19 00:48:23.774858: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c
Feb 19 00:48:23.774862: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23
Feb 19 00:48:23.774867: | 14 70 e4 81
Feb 19 00:48:23.774873: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:23.774879: | **parse ISAKMP Message:
Feb 19 00:48:23.774884: | initiator cookie:
Feb 19 00:48:23.775004: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.775018: | responder cookie:
Feb 19 00:48:23.775024: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.775030: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:23.775035: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.775040: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.775046: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:23.775051: | message ID: 00 00 00 01
Feb 19 00:48:23.775056: | length: 484 (0x1e4)
Feb 19 00:48:23.775062: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:23.775067: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:23.775072: | I am the IKE SA Original Responder
Feb 19 00:48:23.775085: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:23.775091: | parent v2 state object not found
Feb 19 00:48:23.775097: | from_state is STATE_UNDEFINED
Feb 19 00:48:23.775102: | selected state microcode roof
Feb 19 00:48:23.775107: | no useful state microcode entry found
Feb 19 00:48:23.775116: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:23.775123: | **emit ISAKMP Message:
Feb 19 00:48:23.775128: | initiator cookie:
Feb 19 00:48:23.775134: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:23.775139: | responder cookie:
Feb 19 00:48:23.775144: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:23.775149: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:23.775155: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:23.775161: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:23.775167: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:23.775172: | message ID: 00 00 00 00
Feb 19 00:48:23.775179: | Adding a v2N Payload
Feb 19 00:48:23.775184: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:23.775190: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:23.775196: | flags: none (0x0)
Feb 19 00:48:23.775201: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:23.775206: | SPI size: 0 (0x0)
Feb 19 00:48:23.775211: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:23.775217: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:23.775223: | no IKEv1 message padding required
Feb 19 00:48:23.775228: | emitting length of ISAKMP Message: 36
Feb 19 00:48:23.775236: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:23.775242: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:23.775247: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:23.775252: | 00 00 00 08 00 00 00 04
Feb 19 00:48:23.775319: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:23.775335: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:23.775342: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.776887: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:23.777493: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:26.765975: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:26.766287: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.766379: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00
Feb 19 00:48:26.766450: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38
Feb 19 00:48:26.766517: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a
Feb 19 00:48:26.766585: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01
Feb 19 00:48:26.766653: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be
Feb 19 00:48:26.766720: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c
Feb 19 00:48:26.766788: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6
Feb 19 00:48:26.766857: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a
Feb 19 00:48:26.766925: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f
Feb 19 00:48:26.766985: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d
Feb 19 00:48:26.767043: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28
Feb 19 00:48:26.767101: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9
Feb 19 00:48:26.767158: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99
Feb 19 00:48:26.767216: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47
Feb 19 00:48:26.767274: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13
Feb 19 00:48:26.767331: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c
Feb 19 00:48:26.767386: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf
Feb 19 00:48:26.767441: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27
Feb 19 00:48:26.767495: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa
Feb 19 00:48:26.767549: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20
Feb 19 00:48:26.767603: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19
Feb 19 00:48:26.767660: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57
Feb 19 00:48:26.767714: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89
Feb 19 00:48:26.767768: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a
Feb 19 00:48:26.767822: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69
Feb 19 00:48:26.767896: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01
Feb 19 00:48:26.767953: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15
Feb 19 00:48:26.768006: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7
Feb 19 00:48:26.768091: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2
Feb 19 00:48:26.768147: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34
Feb 19 00:48:26.768204: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11
Feb 19 00:48:26.768260: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06
Feb 19 00:48:26.768317: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c
Feb 19 00:48:26.768382: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:26.768446: | **parse ISAKMP Message:
Feb 19 00:48:26.768505: | initiator cookie:
Feb 19 00:48:26.768562: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.768620: | responder cookie:
Feb 19 00:48:26.768675: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.768733: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:26.768792: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.768850: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.768918: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:26.768980: | message ID: 00 00 00 01
Feb 19 00:48:26.769043: | length: 540 (0x21c)
Feb 19 00:48:26.769105: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:26.769170: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:26.769233: | I am the IKE SA Original Responder
Feb 19 00:48:26.769306: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:26.769395: | parent v2 state object not found
Feb 19 00:48:26.769458: | from_state is STATE_UNDEFINED
Feb 19 00:48:26.769520: | selected state microcode roof
Feb 19 00:48:26.769580: | no useful state microcode entry found
Feb 19 00:48:26.769647: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:26.769710: | **emit ISAKMP Message:
Feb 19 00:48:26.769769: | initiator cookie:
Feb 19 00:48:26.769829: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.769887: | responder cookie:
Feb 19 00:48:26.769944: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.770001: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:26.770060: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.770120: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.770177: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:26.770233: | message ID: 00 00 00 00
Feb 19 00:48:26.770289: | Adding a v2N Payload
Feb 19 00:48:26.770347: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:26.770407: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:26.770466: | flags: none (0x0)
Feb 19 00:48:26.770526: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:26.770586: | SPI size: 0 (0x0)
Feb 19 00:48:26.770646: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:26.770709: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:26.770770: | no IKEv1 message padding required
Feb 19 00:48:26.770831: | emitting length of ISAKMP Message: 36
Feb 19 00:48:26.770898: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:26.770960: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:26.771022: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:26.771083: | 00 00 00 08 00 00 00 04
Feb 19 00:48:26.771198: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:26.771271: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:26.771336: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.771398: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.771460: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:26.771807: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:26.771900: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.771963: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:26.772043: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24
Feb 19 00:48:26.772109: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4
Feb 19 00:48:26.772168: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29
Feb 19 00:48:26.772226: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9
Feb 19 00:48:26.772284: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd
Feb 19 00:48:26.772341: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70
Feb 19 00:48:26.772400: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6
Feb 19 00:48:26.772458: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57
Feb 19 00:48:26.772513: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a
Feb 19 00:48:26.772567: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d
Feb 19 00:48:26.772623: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60
Feb 19 00:48:26.772680: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73
Feb 19 00:48:26.772739: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df
Feb 19 00:48:26.772799: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca
Feb 19 00:48:26.772859: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45
Feb 19 00:48:26.772920: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34
Feb 19 00:48:26.772980: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10
Feb 19 00:48:26.772994: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59
Feb 19 00:48:26.773000: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9
Feb 19 00:48:26.773006: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20
Feb 19 00:48:26.773031: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1
Feb 19 00:48:26.773038: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8
Feb 19 00:48:26.773043: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6
Feb 19 00:48:26.773049: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a
Feb 19 00:48:26.773054: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f
Feb 19 00:48:26.773060: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44
Feb 19 00:48:26.773065: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa
Feb 19 00:48:26.773071: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36
Feb 19 00:48:26.773076: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93
Feb 19 00:48:26.773082: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12
Feb 19 00:48:26.773087: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72
Feb 19 00:48:26.773093: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f
Feb 19 00:48:26.773105: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:26.773115: | **parse ISAKMP Message:
Feb 19 00:48:26.773121: | initiator cookie:
Feb 19 00:48:26.773127: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.773132: | responder cookie:
Feb 19 00:48:26.773138: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.773144: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:26.773151: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.773157: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.773163: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:26.773169: | message ID: 00 00 00 01
Feb 19 00:48:26.773175: | length: 540 (0x21c)
Feb 19 00:48:26.773181: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:26.773188: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:26.773193: | I am the IKE SA Original Responder
Feb 19 00:48:26.773210: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:26.773217: | parent v2 state object not found
Feb 19 00:48:26.773223: | from_state is STATE_UNDEFINED
Feb 19 00:48:26.773229: | selected state microcode roof
Feb 19 00:48:26.773234: | no useful state microcode entry found
Feb 19 00:48:26.773248: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:26.773256: | **emit ISAKMP Message:
Feb 19 00:48:26.773262: | initiator cookie:
Feb 19 00:48:26.773268: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.773273: | responder cookie:
Feb 19 00:48:26.773278: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.773284: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:26.773290: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.773296: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.773302: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:26.773308: | message ID: 00 00 00 00
Feb 19 00:48:26.773315: | Adding a v2N Payload
Feb 19 00:48:26.773321: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:26.773327: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:26.773333: | flags: none (0x0)
Feb 19 00:48:26.773339: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:26.773344: | SPI size: 0 (0x0)
Feb 19 00:48:26.773350: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:26.773356: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:26.773362: | no IKEv1 message padding required
Feb 19 00:48:26.773368: | emitting length of ISAKMP Message: 36
Feb 19 00:48:26.773379: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:26.773385: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:26.773391: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:26.773396: | 00 00 00 08 00 00 00 04
Feb 19 00:48:26.773504: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:26.773529: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:26.773537: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.773543: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.773550: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:26.773597: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:26.773605: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.773611: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00
Feb 19 00:48:26.773617: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8
Feb 19 00:48:26.773622: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98
Feb 19 00:48:26.773628: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db
Feb 19 00:48:26.773633: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c
Feb 19 00:48:26.773639: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a
Feb 19 00:48:26.773644: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d
Feb 19 00:48:26.773650: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5
Feb 19 00:48:26.773655: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed
Feb 19 00:48:26.773661: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2
Feb 19 00:48:26.773666: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5
Feb 19 00:48:26.773672: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18
Feb 19 00:48:26.773677: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49
Feb 19 00:48:26.773683: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7
Feb 19 00:48:26.773688: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71
Feb 19 00:48:26.773694: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59
Feb 19 00:48:26.773699: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d
Feb 19 00:48:26.773705: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e
Feb 19 00:48:26.773710: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98
Feb 19 00:48:26.773716: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6
Feb 19 00:48:26.773721: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3
Feb 19 00:48:26.773727: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44
Feb 19 00:48:26.773732: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83
Feb 19 00:48:26.773738: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6
Feb 19 00:48:26.773744: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6
Feb 19 00:48:26.773749: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0
Feb 19 00:48:26.773754: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4
Feb 19 00:48:26.773759: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95
Feb 19 00:48:26.773764: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa
Feb 19 00:48:26.773769: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f
Feb 19 00:48:26.773774: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c
Feb 19 00:48:26.773780: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b
Feb 19 00:48:26.773785: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7
Feb 19 00:48:26.773793: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:26.773799: | **parse ISAKMP Message:
Feb 19 00:48:26.773805: | initiator cookie:
Feb 19 00:48:26.773811: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.773816: | responder cookie:
Feb 19 00:48:26.773821: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.773827: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:26.773833: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.773839: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.773845: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:26.773851: | message ID: 00 00 00 01
Feb 19 00:48:26.773856: | length: 540 (0x21c)
Feb 19 00:48:26.773863: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:26.773868: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:26.773874: | I am the IKE SA Original Responder
Feb 19 00:48:26.773893: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:26.773899: | parent v2 state object not found
Feb 19 00:48:26.773905: | from_state is STATE_UNDEFINED
Feb 19 00:48:26.773911: | selected state microcode roof
Feb 19 00:48:26.773916: | no useful state microcode entry found
Feb 19 00:48:26.773924: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:26.773930: | **emit ISAKMP Message:
Feb 19 00:48:26.773936: | initiator cookie:
Feb 19 00:48:26.773941: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.773947: | responder cookie:
Feb 19 00:48:26.773952: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.773958: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:26.773964: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.773970: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.773976: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:26.773981: | message ID: 00 00 00 00
Feb 19 00:48:26.773987: | Adding a v2N Payload
Feb 19 00:48:26.773993: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:26.773999: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:26.774004: | flags: none (0x0)
Feb 19 00:48:26.774010: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:26.774015: | SPI size: 0 (0x0)
Feb 19 00:48:26.774021: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:26.774027: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:26.774033: | no IKEv1 message padding required
Feb 19 00:48:26.774039: | emitting length of ISAKMP Message: 36
Feb 19 00:48:26.774047: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:26.774053: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:26.774058: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:26.774064: | 00 00 00 08 00 00 00 04
Feb 19 00:48:26.774119: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:26.774131: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:26.774138: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.774144: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.774150: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Feb 19 00:48:26.774174: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500)
Feb 19 00:48:26.774182: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.774187: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8
Feb 19 00:48:26.774193: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86
Feb 19 00:48:26.774198: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b
Feb 19 00:48:26.774204: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc
Feb 19 00:48:26.774209: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56
Feb 19 00:48:26.774215: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26
Feb 19 00:48:26.774220: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d
Feb 19 00:48:26.774226: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f
Feb 19 00:48:26.774231: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4
Feb 19 00:48:26.774236: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16
Feb 19 00:48:26.774242: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c
Feb 19 00:48:26.774248: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61
Feb 19 00:48:26.774253: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5
Feb 19 00:48:26.774259: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b
Feb 19 00:48:26.774264: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed
Feb 19 00:48:26.774270: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce
Feb 19 00:48:26.774275: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0
Feb 19 00:48:26.774280: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47
Feb 19 00:48:26.774293: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2
Feb 19 00:48:26.774299: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50
Feb 19 00:48:26.774304: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30
Feb 19 00:48:26.774310: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5
Feb 19 00:48:26.774315: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf
Feb 19 00:48:26.774321: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4
Feb 19 00:48:26.774326: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65
Feb 19 00:48:26.774332: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d
Feb 19 00:48:26.774337: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e
Feb 19 00:48:26.774343: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c
Feb 19 00:48:26.774348: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23
Feb 19 00:48:26.774353: | 14 70 e4 81
Feb 19 00:48:26.774359: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373)
Feb 19 00:48:26.774366: | **parse ISAKMP Message:
Feb 19 00:48:26.774371: | initiator cookie:
Feb 19 00:48:26.774377: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.774382: | responder cookie:
Feb 19 00:48:26.774387: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.774393: | next payload type: ISAKMP_NEXT_v2SKF (0x35)
Feb 19 00:48:26.774399: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.774405: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.774411: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Feb 19 00:48:26.774416: | message ID: 00 00 00 01
Feb 19 00:48:26.774422: | length: 484 (0x1e4)
Feb 19 00:48:26.774428: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35)
Feb 19 00:48:26.774434: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH
Feb 19 00:48:26.774439: | I am the IKE SA Original Responder
Feb 19 00:48:26.774452: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40
Feb 19 00:48:26.774457: | parent v2 state object not found
Feb 19 00:48:26.774463: | from_state is STATE_UNDEFINED
Feb 19 00:48:26.774468: | selected state microcode roof
Feb 19 00:48:26.774473: | no useful state microcode entry found
Feb 19 00:48:26.774481: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573
Feb 19 00:48:26.774487: | **emit ISAKMP Message:
Feb 19 00:48:26.774493: | initiator cookie:
Feb 19 00:48:26.774498: | e5 e9 88 9b 1f fd dd 07
Feb 19 00:48:26.774504: | responder cookie:
Feb 19 00:48:26.774509: | 5d 14 f4 63 b9 ee 22 9a
Feb 19 00:48:26.774515: | next payload type: ISAKMP_NEXT_v2N (0x29)
Feb 19 00:48:26.774521: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Feb 19 00:48:26.774527: | exchange type: ISAKMP_v2_AUTH (0x23)
Feb 19 00:48:26.774533: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20)
Feb 19 00:48:26.774538: | message ID: 00 00 00 00
Feb 19 00:48:26.774544: | Adding a v2N Payload
Feb 19 00:48:26.774549: | ***emit IKEv2 Notify Payload:
Feb 19 00:48:26.774555: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Feb 19 00:48:26.774561: | flags: none (0x0)
Feb 19 00:48:26.774567: | Protocol ID: PROTO_v2_RESERVED (0x0)
Feb 19 00:48:26.774572: | SPI size: 0 (0x0)
Feb 19 00:48:26.774578: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4)
Feb 19 00:48:26.774584: | emitting length of IKEv2 Notify Payload: 8
Feb 19 00:48:26.774590: | no IKEv1 message padding required
Feb 19 00:48:26.774595: | emitting length of ISAKMP Message: 36
Feb 19 00:48:26.774603: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0)
Feb 19 00:48:26.774609: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63
Feb 19 00:48:26.774615: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24
Feb 19 00:48:26.774620: | 00 00 00 08 00 00 00 04
Feb 19 00:48:26.774669: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375)
Feb 19 00:48:26.774683: | processing: STOP state #0 (in comm_handle() at demux.c:380)
Feb 19 00:48:26.774695: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.774701: | serialno table: hash serialno #0 to head 0x5650b2652a60
Feb 19 00:48:26.774707: | processing: STOP connection NULL (in comm_handle() at demux.c:381)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment