Created
February 19, 2018 00:59
-
-
Save alimakki/20365d49ad0c624136970bbb01008b92 to your computer and use it in GitHub Desktop.
pluto log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Feb 19 00:48:15.900570: | inserting event EVENT_SHUNT_SCAN, timeout in 20.000 seconds | |
Feb 19 00:48:15.900648: | free_event_entry: release EVENT_SHUNT_SCAN-pe@0x5650b272f728 | |
Feb 19 00:48:17.667347: | *received 224 bytes from 162.222.81.188:20572 on eth0 (port=500) | |
Feb 19 00:48:17.667632: | e5 e9 88 9b 1f fd dd 07 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.667723: | 21 20 22 08 00 00 00 00 00 00 00 e0 22 00 00 28 | |
Feb 19 00:48:17.667804: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | |
Feb 19 00:48:17.667889: | 80 0e 00 80 03 00 00 08 02 00 00 05 00 00 00 08 | |
Feb 19 00:48:17.667979: | 04 00 00 13 28 00 00 48 00 13 00 00 2d a0 d9 53 | |
Feb 19 00:48:17.668076: | 92 96 68 a9 38 e0 5e 5a 9a af 10 1b 66 23 25 ea | |
Feb 19 00:48:17.668139: | c0 4b 92 f8 d6 09 33 60 19 cd 96 38 ae 99 6c bc | |
Feb 19 00:48:17.668199: | 47 9d 29 e2 13 df 22 9c 98 73 b7 a1 d8 e9 dd b3 | |
Feb 19 00:48:17.668261: | 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e 29 00 00 14 | |
Feb 19 00:48:17.668322: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.668374: | 29 00 00 1c 00 00 40 04 ae 3a 70 67 06 74 04 b5 | |
Feb 19 00:48:17.668423: | ed 09 0d dc 06 91 15 a0 03 c3 b3 51 29 00 00 1c | |
Feb 19 00:48:17.668472: | 00 00 40 05 9b da 44 94 b3 06 ae c6 76 f1 bc 3c | |
Feb 19 00:48:17.668520: | 85 be 83 10 4b 11 ff c4 00 00 00 08 00 00 40 2e | |
Feb 19 00:48:17.668574: | processing: start from 162.222.81.188:20572 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:17.668629: | **parse ISAKMP Message: | |
Feb 19 00:48:17.668679: | initiator cookie: | |
Feb 19 00:48:17.668727: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.668779: | responder cookie: | |
Feb 19 00:48:17.668829: | 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.668879: | next payload type: ISAKMP_NEXT_v2SA (0x21) | |
Feb 19 00:48:17.668929: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.668979: | exchange type: ISAKMP_v2_SA_INIT (0x22) | |
Feb 19 00:48:17.669033: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:17.669083: | message ID: 00 00 00 00 | |
Feb 19 00:48:17.669132: | length: 224 (0xe0) | |
Feb 19 00:48:17.669183: | processing version=2.0 packet with exchange type=ISAKMP_v2_SA_INIT (34) | |
Feb 19 00:48:17.669233: | I am receiving an IKEv2 Request ISAKMP_v2_SA_INIT | |
Feb 19 00:48:17.669282: | I am the IKE SA Original Responder | |
Feb 19 00:48:17.669337: | icookie table: hash icookie e5 e9 88 9b 1f fd dd 07 to 14431535757497531515 slot 0x5650b2652240 | |
Feb 19 00:48:17.669387: | parent_init v2 state object not found | |
Feb 19 00:48:17.669437: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:17.669486: | Unpacking clear payload for svm: Respond to IKE_SA_INIT | |
Feb 19 00:48:17.669535: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | |
Feb 19 00:48:17.669586: | ***parse IKEv2 Security Association Payload: | |
Feb 19 00:48:17.669635: | next payload type: ISAKMP_NEXT_v2KE (0x22) | |
Feb 19 00:48:17.669685: | flags: none (0x0) | |
Feb 19 00:48:17.669733: | length: 40 (0x28) | |
Feb 19 00:48:17.669782: | processing payload: ISAKMP_NEXT_v2SA (len=40) | |
Feb 19 00:48:17.669830: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) | |
Feb 19 00:48:17.669881: | ***parse IKEv2 Key Exchange Payload: | |
Feb 19 00:48:17.669938: | IKEv2 next payload type: ISAKMP_NEXT_v2Ni (0x28) | |
Feb 19 00:48:17.669987: | flags: none (0x0) | |
Feb 19 00:48:17.670034: | length: 72 (0x48) | |
Feb 19 00:48:17.670082: | DH group: OAKLEY_GROUP_ECP_256 (0x13) | |
Feb 19 00:48:17.670132: | processing payload: ISAKMP_NEXT_v2KE (len=72) | |
Feb 19 00:48:17.670181: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) | |
Feb 19 00:48:17.670230: | ***parse IKEv2 Nonce Payload: | |
Feb 19 00:48:17.670280: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.670329: | flags: none (0x0) | |
Feb 19 00:48:17.670406: | length: 20 (0x14) | |
Feb 19 00:48:17.670480: | processing payload: ISAKMP_NEXT_v2Ni (len=20) | |
Feb 19 00:48:17.670553: | Now let's proceed with payload (ISAKMP_NEXT_v2N) | |
Feb 19 00:48:17.670628: | ***parse IKEv2 Notify Payload: | |
Feb 19 00:48:17.670702: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.670776: | flags: none (0x0) | |
Feb 19 00:48:17.670848: | length: 28 (0x1c) | |
Feb 19 00:48:17.670921: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.670995: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.671069: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | |
Feb 19 00:48:17.671143: | processing payload: ISAKMP_NEXT_v2N (len=28) | |
Feb 19 00:48:17.671217: | Now let's proceed with payload (ISAKMP_NEXT_v2N) | |
Feb 19 00:48:17.671291: | ***parse IKEv2 Notify Payload: | |
Feb 19 00:48:17.671364: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.671459: | flags: none (0x0) | |
Feb 19 00:48:17.671533: | length: 28 (0x1c) | |
Feb 19 00:48:17.671604: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.671677: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.671751: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | |
Feb 19 00:48:17.671820: | processing payload: ISAKMP_NEXT_v2N (len=28) | |
Feb 19 00:48:17.671903: | Now let's proceed with payload (ISAKMP_NEXT_v2N) | |
Feb 19 00:48:17.671968: | ***parse IKEv2 Notify Payload: | |
Feb 19 00:48:17.672078: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.672146: | flags: none (0x0) | |
Feb 19 00:48:17.672208: | length: 8 (0x8) | |
Feb 19 00:48:17.672270: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.672332: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.672395: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | |
Feb 19 00:48:17.672458: | processing payload: ISAKMP_NEXT_v2N (len=8) | |
Feb 19 00:48:17.672471: | selected state microcode Respond to IKE_SA_INIT | |
Feb 19 00:48:17.672477: | #null state always idle | |
Feb 19 00:48:17.672482: | Now lets proceed with state specific processing | |
Feb 19 00:48:17.672488: | calling processor Respond to IKE_SA_INIT | |
Feb 19 00:48:17.672509: | anti-DDoS cookies not required (and no cookie received) | |
Feb 19 00:48:17.672521: | find_host_connection me=159.89.116.29:500 him=162.222.81.188:20572 policy=RSASIG+IKEV2_ALLOW | |
Feb 19 00:48:17.672528: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500 | |
Feb 19 00:48:17.672536: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW | |
Feb 19 00:48:17.672542: | find_next_host_connection returns empty | |
Feb 19 00:48:17.672549: | find_host_connection me=159.89.116.29:500 him=%any:20572 policy=RSASIG+IKEV2_ALLOW | |
Feb 19 00:48:17.672555: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500 | |
Feb 19 00:48:17.672561: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW | |
Feb 19 00:48:17.672569: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+DONT_REKEY+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (ikev2) | |
Feb 19 00:48:17.672575: | find_next_host_connection returns ikev2 | |
Feb 19 00:48:17.672591: | reference addresspool of conn ikev2[1] kind CK_TEMPLATE refcnt 1 | |
Feb 19 00:48:17.672600: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500 | |
Feb 19 00:48:17.672607: | connect_to_host_pair: 159.89.116.29:500 162.222.81.188:500 -> hp:none | |
Feb 19 00:48:17.672615: | rw_instantiate() instantiated "ikev2"[1] 162.222.81.188 for 162.222.81.188 | |
Feb 19 00:48:17.672622: | found connection: ikev2[1] 162.222.81.188 with policy RSASIG+IKEV2_ALLOW | |
Feb 19 00:48:17.672629: | find_host_pair: comparing 159.89.116.29:500 to 162.222.81.188:500 | |
Feb 19 00:48:17.672635: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500 | |
Feb 19 00:48:17.672642: | constructing IKE proposals for initial responder | |
Feb 19 00:48:17.672652: | converting ike_info AES_GCM_16_128-HMAC_SHA2_256-DH19 to ikev2 ... | |
Feb 19 00:48:17.672667: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;INTEG=NONE;DH=ECP_256 | |
Feb 19 00:48:17.672678: packet from 162.222.81.188:20572: ikev2 IKE proposals for initial responder: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;INTEG=NONE;DH=ECP_256 | |
Feb 19 00:48:17.672685: | Comparing remote proposals against IKE responder 1 local proposals | |
Feb 19 00:48:17.672692: | ****parse IKEv2 Proposal Substructure Payload: | |
Feb 19 00:48:17.672698: | last proposal: v2_PROPOSAL_LAST (0x0) | |
Feb 19 00:48:17.672703: | length: 36 (0x24) | |
Feb 19 00:48:17.672708: | prop #: 1 (0x1) | |
Feb 19 00:48:17.672714: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | |
Feb 19 00:48:17.672719: | spi size: 0 (0x0) | |
Feb 19 00:48:17.672724: | # transforms: 3 (0x3) | |
Feb 19 00:48:17.672731: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 1 local proposals | |
Feb 19 00:48:17.672738: | local proposal 1 type ENCR has 1 transforms | |
Feb 19 00:48:17.672743: | local proposal 1 type PRF has 1 transforms | |
Feb 19 00:48:17.672749: | local proposal 1 type INTEG has 1 transforms | |
Feb 19 00:48:17.672766: | local proposal 1 type DH has 1 transforms | |
Feb 19 00:48:17.672772: | local proposal 1 type ESN has 0 transforms | |
Feb 19 00:48:17.672778: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG | |
Feb 19 00:48:17.672784: | *****parse IKEv2 Transform Substructure Payload: | |
Feb 19 00:48:17.672791: | last transform: v2_TRANSFORM_NON_LAST (0x3) | |
Feb 19 00:48:17.672796: | length: 12 (0xc) | |
Feb 19 00:48:17.672801: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | |
Feb 19 00:48:17.672807: | IKEv2 transform ID: AES_GCM_C (0x14) | |
Feb 19 00:48:17.672813: | ******parse IKEv2 Attribute Substructure Payload: | |
Feb 19 00:48:17.672818: | af+type: IKEv2_KEY_LENGTH (0x800e) | |
Feb 19 00:48:17.672824: | length/value: 128 (0x80) | |
Feb 19 00:48:17.672832: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_128) matches local proposal 1 type 1 (ENCR) transform 0 | |
Feb 19 00:48:17.672838: | *****parse IKEv2 Transform Substructure Payload: | |
Feb 19 00:48:17.672844: | last transform: v2_TRANSFORM_NON_LAST (0x3) | |
Feb 19 00:48:17.672849: | length: 8 (0x8) | |
Feb 19 00:48:17.672854: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | |
Feb 19 00:48:17.672860: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | |
Feb 19 00:48:17.672867: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_256) matches local proposal 1 type 2 (PRF) transform 0 | |
Feb 19 00:48:17.672873: | *****parse IKEv2 Transform Substructure Payload: | |
Feb 19 00:48:17.672878: | last transform: v2_TRANSFORM_LAST (0x0) | |
Feb 19 00:48:17.672883: | length: 8 (0x8) | |
Feb 19 00:48:17.672888: | IKEv2 transform type: TRANS_TYPE_DH (0x4) | |
Feb 19 00:48:17.672894: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | |
Feb 19 00:48:17.672901: | remote proposal 1 transform 2 (DH=ECP_256) matches local proposal 1 type 4 (DH) transform 0 | |
Feb 19 00:48:17.672909: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none | |
Feb 19 00:48:17.672918: | comparing remote proposal 1 and local proposal 1 transforms: required: ENCR+PRF+DH; optional: ENCR+PRF+DH; proposed: INTEG; matched: ENCR+PRF+DH | |
Feb 19 00:48:17.672924: | remote proposal 1 matches local proposal 1 | |
Feb 19 00:48:17.672934: packet from 162.222.81.188:20572: proposal 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;DH=ECP_256 chosen from: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;DH=ECP_256[first-match] | |
Feb 19 00:48:17.672944: | accepted IKE proposal ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_256;DH=ECP_256 | |
Feb 19 00:48:17.672950: | converting proposal to internal trans attrs | |
Feb 19 00:48:17.672957: | encryption ike_alg_lookup_by_id id: AES_GCM_C=20, found AES_GCM_16 | |
Feb 19 00:48:17.672964: | PRF ike_alg_lookup_by_id id: HMAC_SHA2_256=5, found HMAC_SHA2_256 | |
Feb 19 00:48:17.672970: | DH ike_alg_lookup_by_id id: ECP_256=19, found DH19 | |
Feb 19 00:48:17.672976: | since AEAD, setting NULL integ to 'null' | |
Feb 19 00:48:17.672982: | DH public value received: | |
Feb 19 00:48:17.672988: | 2d a0 d9 53 92 96 68 a9 38 e0 5e 5a 9a af 10 1b | |
Feb 19 00:48:17.672993: | 66 23 25 ea c0 4b 92 f8 d6 09 33 60 19 cd 96 38 | |
Feb 19 00:48:17.672998: | ae 99 6c bc 47 9d 29 e2 13 df 22 9c 98 73 b7 a1 | |
Feb 19 00:48:17.673003: | d8 e9 dd b3 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e | |
Feb 19 00:48:17.673011: | creating state object #1 at 0x5650b273ace8 | |
Feb 19 00:48:17.673017: | parent state #1: new => (null)(ignore) | |
Feb 19 00:48:17.673023: | cookie hash sha2_256 init | |
Feb 19 00:48:17.673054: | cookie sha2_256 hasher: context 0x5650b273b6d0 | |
Feb 19 00:48:17.673062: | cookie hash sha2_256 digest addr-bytes@0x5650b2738c4c (length 4) | |
Feb 19 00:48:17.673069: | cookie hash sha2_256 digest sod-bytes@0x5650b266ed20 (length 20) | |
Feb 19 00:48:17.673076: | cookie hash sha2_256 digest counter-bytes@0x5650b2656b4c (length 4) | |
Feb 19 00:48:17.673082: | cookie hash sha2_256 final bytes@0x7ffc03ebe6b0 (length 32) | |
Feb 19 00:48:17.673098: | cookie 5d 14 f4 63 b9 ee 22 9a 73 17 99 c9 a0 75 f2 07 | |
Feb 19 00:48:17.673104: | cookie 94 ab 9e b2 58 30 81 8f e9 bf ce 58 e0 da 57 3b | |
Feb 19 00:48:17.673117: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188 (in initialize_new_state() at ipsec_doi.c:525) | |
Feb 19 00:48:17.673129: | inserting state object #1 | |
Feb 19 00:48:17.673138: | serialno list: inserting object 0x5650b273ace8 (state #1) entry 0x5650b273b478 into list 0x5650b265db80 (older 0x5650b265db80 newer 0x5650b265db80) | |
Feb 19 00:48:17.673146: | serialno list: inserted object 0x5650b273ace8 (state #1) entry 0x5650b273b478 (older 0x5650b265db80 newer 0x5650b265db80) | |
Feb 19 00:48:17.673153: | serialno list: list entry 0x5650b265db80 is HEAD (older 0x5650b273b478 newer 0x5650b273b478) | |
Feb 19 00:48:17.673161: | serialno table: inserting object 0x5650b273ace8 (state #1) entry 0x5650b273b498 into list 0x5650b2652a80 (older 0x5650b2652a80 newer 0x5650b2652a80) | |
Feb 19 00:48:17.673169: | serialno table: inserted object 0x5650b273ace8 (state #1) entry 0x5650b273b498 (older 0x5650b2652a80 newer 0x5650b2652a80) | |
Feb 19 00:48:17.673176: | serialno table: list entry 0x5650b2652a80 is HEAD (older 0x5650b273b498 newer 0x5650b273b498) | |
Feb 19 00:48:17.673186: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188 (in initialize_new_state() at ipsec_doi.c:545) | |
Feb 19 00:48:17.673196: | parent state #1: STATE_UNDEFINED(ignore) => STATE_PARENT_R1(half-open-ike) | |
Feb 19 00:48:17.673201: | ignore states: 0 | |
Feb 19 00:48:17.673206: | half-open-ike states: 1 | |
Feb 19 00:48:17.673211: | open-ike states: 0 | |
Feb 19 00:48:17.673216: | established-anonymous-ike states: 0 | |
Feb 19 00:48:17.673222: | established-authenticated-ike states: 0 | |
Feb 19 00:48:17.673227: | anonymous-ipsec states: 0 | |
Feb 19 00:48:17.673232: | authenticated-ipsec states: 0 | |
Feb 19 00:48:17.673237: | informational states: 0 | |
Feb 19 00:48:17.673242: | unknown states: 0 | |
Feb 19 00:48:17.673248: | category states: 1 count states: 1 | |
Feb 19 00:48:17.673254: | natd_hash: Warning, rcookie is zero !! | |
Feb 19 00:48:17.673260: | NATD hash sha init | |
Feb 19 00:48:17.673271: | NATD sha hasher: context 0x5650b273b6d0 | |
Feb 19 00:48:17.673277: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8) | |
Feb 19 00:48:17.673284: | NATD hash sha digest RCOOKIE-bytes@0x5650b265dba8 (length 8) | |
Feb 19 00:48:17.673290: | NATD hash sha digest SIN_ADDR-bytes@0x5650b2731bf8 (length 4) | |
Feb 19 00:48:17.673297: | NATD hash sha digest PORT-bytes@0x7ffc03ebe5de (length 2) | |
Feb 19 00:48:17.673303: | NATD hash sha final bytes@0x7ffc03ebe6a0 (length 20) | |
Feb 19 00:48:17.673314: | NATD 9b da 44 94 b3 06 ae c6 76 f1 bc 3c 85 be 83 10 | |
Feb 19 00:48:17.673320: | NATD 4b 11 ff c4 | |
Feb 19 00:48:17.673326: | natd_hash: hasher=0x5650b263fa60(20) | |
Feb 19 00:48:17.673331: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.673336: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.673341: | natd_hash: ip= 9f 59 74 1d | |
Feb 19 00:48:17.673346: | natd_hash: port=500 | |
Feb 19 00:48:17.673352: | natd_hash: hash= 9b da 44 94 b3 06 ae c6 76 f1 bc 3c 85 be 83 10 | |
Feb 19 00:48:17.673357: | natd_hash: hash= 4b 11 ff c4 | |
Feb 19 00:48:17.673362: | natd_hash: Warning, rcookie is zero !! | |
Feb 19 00:48:17.673367: | NATD hash sha init | |
Feb 19 00:48:17.673376: | NATD sha hasher: context 0x5650b273b6d0 | |
Feb 19 00:48:17.673382: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8) | |
Feb 19 00:48:17.673388: | NATD hash sha digest RCOOKIE-bytes@0x5650b265dba8 (length 8) | |
Feb 19 00:48:17.673394: | NATD hash sha digest SIN_ADDR-bytes@0x5650b2738c4c (length 4) | |
Feb 19 00:48:17.673400: | NATD hash sha digest PORT-bytes@0x7ffc03ebe5de (length 2) | |
Feb 19 00:48:17.673406: | NATD hash sha final bytes@0x7ffc03ebe6c0 (length 20) | |
Feb 19 00:48:17.673414: | NATD e0 0d 71 25 19 bc c5 58 0a 2d 4c fb a5 3a a8 47 | |
Feb 19 00:48:17.673420: | NATD e5 9e bb 71 | |
Feb 19 00:48:17.673425: | natd_hash: hasher=0x5650b263fa60(20) | |
Feb 19 00:48:17.673431: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.673436: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.673441: | natd_hash: ip= a2 de 51 bc | |
Feb 19 00:48:17.673446: | natd_hash: port=20572 | |
Feb 19 00:48:17.673452: | natd_hash: hash= e0 0d 71 25 19 bc c5 58 0a 2d 4c fb a5 3a a8 47 | |
Feb 19 00:48:17.673463: | natd_hash: hash= e5 9e bb 71 | |
Feb 19 00:48:17.673469: | NAT_TRAVERSAL local policy enforces encapsulation | |
Feb 19 00:48:17.673475: | NAT_TRAVERSAL forceencaps enabled | |
Feb 19 00:48:17.673480: | NAT_TRAVERSAL nat_keepalive enabled 162.222.81.188 | |
Feb 19 00:48:17.673489: | adding ikev2_inI1outR1 KE work-order 1 for state #1 | |
Feb 19 00:48:17.673495: | state #1 requesting to delete non existing event | |
Feb 19 00:48:17.673502: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278 | |
Feb 19 00:48:17.673512: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 | |
Feb 19 00:48:17.673525: | backlog: inserting object 0x5650b273b6a8 (work-order 1 state #1) entry 0x5650b273b6b0 into list 0x5650b266ed00 (older 0x5650b266ed00 newer 0x5650b266ed00) | |
Feb 19 00:48:17.673532: | backlog: inserted object 0x5650b273b6a8 (work-order 1 state #1) entry 0x5650b273b6b0 (older 0x5650b266ed00 newer 0x5650b266ed00) | |
Feb 19 00:48:17.673539: | backlog: list entry 0x5650b266ed00 is HEAD (older 0x5650b273b6b0 newer 0x5650b273b6b0) | |
Feb 19 00:48:17.675766: | crypto helper 0 resuming | |
Feb 19 00:48:17.675808: | backlog: removing object 0x5650b273b6a8 (work-order 1 state #1) entry 0x5650b273b6b0 (older 0x5650b266ed00 newer 0x5650b266ed00) | |
Feb 19 00:48:17.675815: | backlog: empty | |
Feb 19 00:48:17.675822: | crypto helper 0 starting work-order 1 for state #1 | |
Feb 19 00:48:17.675829: | crypto helper 0 doing build KE and nonce; request ID 1 | |
Feb 19 00:48:17.675978: | oid 208 d0 | |
Feb 19 00:48:17.675993: | pk11_data 2a 86 48 ce 3d 03 01 07 | |
Feb 19 00:48:17.676002: | pk11_param 06 08 2a 86 48 ce 3d 03 01 07 | |
Feb 19 00:48:17.678088: | public keyType 6 size 0 publicValue 0x7f2c4400210a 65 | |
Feb 19 00:48:17.678250: | public key 04 7a c5 ae 5b f2 54 fb a3 0e 97 d9 34 f1 72 79 | |
Feb 19 00:48:17.678295: | public key 46 bc c4 0d 53 5d d9 91 3f 4d 7a 7b d3 8f 97 40 | |
Feb 19 00:48:17.678335: | public key dd 9a 2d 4d 86 29 a8 4f 3a 9b e9 b4 c9 45 de eb | |
Feb 19 00:48:17.678374: | public key 4c a4 01 20 14 63 1d 72 86 92 23 a3 72 06 0a 6e | |
Feb 19 00:48:17.678413: | public key 0e | |
Feb 19 00:48:17.678455: | DH secret DH19@0x7f2c44001ef8: created | |
Feb 19 00:48:17.678496: | NSS: Local DH DH19 secret (pointer): 0x7f2c44001ef8 | |
Feb 19 00:48:17.678535: | NSS: Public DH wire value: | |
Feb 19 00:48:17.678573: | 7a c5 ae 5b f2 54 fb a3 0e 97 d9 34 f1 72 79 46 | |
Feb 19 00:48:17.678612: | bc c4 0d 53 5d d9 91 3f 4d 7a 7b d3 8f 97 40 dd | |
Feb 19 00:48:17.678650: | 9a 2d 4d 86 29 a8 4f 3a 9b e9 b4 c9 45 de eb 4c | |
Feb 19 00:48:17.678689: | a4 01 20 14 63 1d 72 86 92 23 a3 72 06 0a 6e 0e | |
Feb 19 00:48:17.678746: | Generated nonce: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.678788: | Generated nonce: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.678829: | crypto helper 0 finished build KE and nonce; request ID 1 time elapsed 2999 usec | |
Feb 19 00:48:17.678869: | crypto helper 0 sending results from work-order 1 for state #1 to event queue | |
Feb 19 00:48:17.678930: | scheduling now-event sending helper answer | |
Feb 19 00:48:17.678983: | crypto helper 0 waiting (nothing to do) | |
Feb 19 00:48:17.679044: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in log_stf_suspend() at ikev2.c:2243) | |
Feb 19 00:48:17.679093: | "ikev2"[1] 162.222.81.188 #1 complete v2 state STATE_PARENT_R1 transition with STF_SUSPEND suspended from new_pcrc:159 | |
Feb 19 00:48:17.679136: | processing: stop from 162.222.81.188:20572 (BACKGROUND) (in comm_handle() at demux.c:375) | |
Feb 19 00:48:17.679180: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:17.679221: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.679260: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.679300: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:17.679353: | executing now-event sending helper answer | |
Feb 19 00:48:17.679394: | crypto helper 0 replies to request ID 1 | |
Feb 19 00:48:17.679452: | calling continuation function 0x5650b2377c30 | |
Feb 19 00:48:17.679491: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.679530: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.679573: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in handle_helper_answer() at pluto_crypt.c:589) | |
Feb 19 00:48:17.679615: | ikev2_parent_inI1outR1_continue for #1: calculated ke+nonce, sending R1 | |
Feb 19 00:48:17.679670: | **emit ISAKMP Message: | |
Feb 19 00:48:17.679711: | initiator cookie: | |
Feb 19 00:48:17.679750: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.679788: | responder cookie: | |
Feb 19 00:48:17.679827: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.679888: | next payload type: ISAKMP_NEXT_v2SA (0x21) | |
Feb 19 00:48:17.679931: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.679970: | exchange type: ISAKMP_v2_SA_INIT (0x22) | |
Feb 19 00:48:17.680010: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:17.680083: | message ID: 00 00 00 00 | |
Feb 19 00:48:17.680128: | Emitting ikev2_proposal ... | |
Feb 19 00:48:17.680167: | ***emit IKEv2 Security Association Payload: | |
Feb 19 00:48:17.680207: | next payload type: ISAKMP_NEXT_v2KE (0x22) | |
Feb 19 00:48:17.680246: | flags: none (0x0) | |
Feb 19 00:48:17.680286: | ****emit IKEv2 Proposal Substructure Payload: | |
Feb 19 00:48:17.680326: | last proposal: v2_PROPOSAL_LAST (0x0) | |
Feb 19 00:48:17.680363: | prop #: 1 (0x1) | |
Feb 19 00:48:17.680403: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | |
Feb 19 00:48:17.680441: | spi size: 0 (0x0) | |
Feb 19 00:48:17.680479: | # transforms: 3 (0x3) | |
Feb 19 00:48:17.680519: | *****emit IKEv2 Transform Substructure Payload: | |
Feb 19 00:48:17.680559: | last transform: v2_TRANSFORM_NON_LAST (0x3) | |
Feb 19 00:48:17.680598: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | |
Feb 19 00:48:17.680638: | IKEv2 transform ID: AES_GCM_C (0x14) | |
Feb 19 00:48:17.680678: | ******emit IKEv2 Attribute Substructure Payload: | |
Feb 19 00:48:17.680718: | af+type: IKEv2_KEY_LENGTH (0x800e) | |
Feb 19 00:48:17.680763: | length/value: 128 (0x80) | |
Feb 19 00:48:17.680811: | emitting length of IKEv2 Transform Substructure Payload: 12 | |
Feb 19 00:48:17.680873: | *****emit IKEv2 Transform Substructure Payload: | |
Feb 19 00:48:17.680920: | last transform: v2_TRANSFORM_NON_LAST (0x3) | |
Feb 19 00:48:17.680962: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | |
Feb 19 00:48:17.681001: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) | |
Feb 19 00:48:17.681041: | emitting length of IKEv2 Transform Substructure Payload: 8 | |
Feb 19 00:48:17.681081: | *****emit IKEv2 Transform Substructure Payload: | |
Feb 19 00:48:17.681120: | last transform: v2_TRANSFORM_LAST (0x0) | |
Feb 19 00:48:17.681159: | IKEv2 transform type: TRANS_TYPE_DH (0x4) | |
Feb 19 00:48:17.681199: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) | |
Feb 19 00:48:17.681238: | emitting length of IKEv2 Transform Substructure Payload: 8 | |
Feb 19 00:48:17.681278: | emitting length of IKEv2 Proposal Substructure Payload: 36 | |
Feb 19 00:48:17.681317: | emitting length of IKEv2 Security Association Payload: 40 | |
Feb 19 00:48:17.681360: | wire (crypto helper) group DH19 and state group DH19 match | |
Feb 19 00:48:17.681401: | DH secret DH19@0x7f2c44001ef8: transfering ownership from helper KE to state #1 | |
Feb 19 00:48:17.681441: | ***emit IKEv2 Key Exchange Payload: | |
Feb 19 00:48:17.681481: | IKEv2 next payload type: ISAKMP_NEXT_v2Ni (0x28) | |
Feb 19 00:48:17.681520: | flags: none (0x0) | |
Feb 19 00:48:17.681558: | DH group: OAKLEY_GROUP_ECP_256 (0x13) | |
Feb 19 00:48:17.681618: | emitting 64 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | |
Feb 19 00:48:17.681676: | ikev2 g^x 7a c5 ae 5b f2 54 fb a3 0e 97 d9 34 f1 72 79 46 | |
Feb 19 00:48:17.681731: | ikev2 g^x bc c4 0d 53 5d d9 91 3f 4d 7a 7b d3 8f 97 40 dd | |
Feb 19 00:48:17.681786: | ikev2 g^x 9a 2d 4d 86 29 a8 4f 3a 9b e9 b4 c9 45 de eb 4c | |
Feb 19 00:48:17.681841: | ikev2 g^x a4 01 20 14 63 1d 72 86 92 23 a3 72 06 0a 6e 0e | |
Feb 19 00:48:17.681916: | emitting length of IKEv2 Key Exchange Payload: 72 | |
Feb 19 00:48:17.681972: | ***emit IKEv2 Nonce Payload: | |
Feb 19 00:48:17.682028: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.682084: | flags: none (0x0) | |
Feb 19 00:48:17.682139: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | |
Feb 19 00:48:17.682195: | IKEv2 nonce 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.682251: | IKEv2 nonce fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.682308: | emitting length of IKEv2 Nonce Payload: 36 | |
Feb 19 00:48:17.682364: | Adding a v2N Payload | |
Feb 19 00:48:17.682418: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:17.682475: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.682529: | flags: none (0x0) | |
Feb 19 00:48:17.682584: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.682640: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.682696: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | |
Feb 19 00:48:17.682753: | emitting 0 raw bytes of Notify data into IKEv2 Notify Payload | |
Feb 19 00:48:17.682807: | Notify data | |
Feb 19 00:48:17.682864: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:17.682920: | NAT-T: encapsulation=yes, so mangling hash to force NAT-T detection | |
Feb 19 00:48:17.682976: | NAT-Traversal support [enabled] add v2N payloads. | |
Feb 19 00:48:17.683032: | NATD hash sha init | |
Feb 19 00:48:17.683109: | NATD sha hasher: context 0x5650b273c4f0 | |
Feb 19 00:48:17.683171: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8) | |
Feb 19 00:48:17.683231: | NATD hash sha digest RCOOKIE-bytes@0x5650b273b208 (length 8) | |
Feb 19 00:48:17.683291: | NATD hash sha digest SIN_ADDR-bytes@0x5650b273afe4 (length 4) | |
Feb 19 00:48:17.683349: | NATD hash sha digest PORT-bytes@0x7ffc03ebe11e (length 2) | |
Feb 19 00:48:17.683407: | NATD hash sha final bytes@0x7ffc03ebe190 (length 20) | |
Feb 19 00:48:17.683486: | NATD a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1 | |
Feb 19 00:48:17.683558: | NATD fc 88 01 bf | |
Feb 19 00:48:17.683627: | natd_hash: hasher=0x5650b263fa60(20) | |
Feb 19 00:48:17.683684: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.683756: | natd_hash: rcookie= 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.683812: | natd_hash: ip= 9f 59 74 1d | |
Feb 19 00:48:17.683886: | natd_hash: port=0 | |
Feb 19 00:48:17.683944: | natd_hash: hash= a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1 | |
Feb 19 00:48:17.683999: | natd_hash: hash= fc 88 01 bf | |
Feb 19 00:48:17.684088: | Adding a v2N Payload | |
Feb 19 00:48:17.684146: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:17.684202: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.684257: | flags: none (0x0) | |
Feb 19 00:48:17.684313: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.684324: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.684330: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | |
Feb 19 00:48:17.684338: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | |
Feb 19 00:48:17.684343: | Notify data a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1 | |
Feb 19 00:48:17.684348: | Notify data fc 88 01 bf | |
Feb 19 00:48:17.684354: | emitting length of IKEv2 Notify Payload: 28 | |
Feb 19 00:48:17.684360: | NATD hash sha init | |
Feb 19 00:48:17.684375: | NATD sha hasher: context 0x5650b273c4f0 | |
Feb 19 00:48:17.684383: | NATD hash sha digest ICOOKIE-bytes@0x5650b273b1e0 (length 8) | |
Feb 19 00:48:17.684389: | NATD hash sha digest RCOOKIE-bytes@0x5650b273b208 (length 8) | |
Feb 19 00:48:17.684396: | NATD hash sha digest SIN_ADDR-bytes@0x5650b273afbc (length 4) | |
Feb 19 00:48:17.684403: | NATD hash sha digest PORT-bytes@0x7ffc03ebe11e (length 2) | |
Feb 19 00:48:17.684409: | NATD hash sha final bytes@0x7ffc03ebe190 (length 20) | |
Feb 19 00:48:17.684419: | NATD f0 63 99 ca ba e2 30 b0 3f 57 48 f7 06 dc 1c a7 | |
Feb 19 00:48:17.684425: | NATD 47 30 09 35 | |
Feb 19 00:48:17.684431: | natd_hash: hasher=0x5650b263fa60(20) | |
Feb 19 00:48:17.684437: | natd_hash: icookie= e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.684442: | natd_hash: rcookie= 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.684463: | natd_hash: ip= a2 de 51 bc | |
Feb 19 00:48:17.684469: | natd_hash: port=20572 | |
Feb 19 00:48:17.684474: | natd_hash: hash= f0 63 99 ca ba e2 30 b0 3f 57 48 f7 06 dc 1c a7 | |
Feb 19 00:48:17.684479: | natd_hash: hash= 47 30 09 35 | |
Feb 19 00:48:17.684484: | Adding a v2N Payload | |
Feb 19 00:48:17.684490: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:17.684496: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | |
Feb 19 00:48:17.684501: | flags: none (0x0) | |
Feb 19 00:48:17.684506: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.684511: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.684517: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | |
Feb 19 00:48:17.684523: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | |
Feb 19 00:48:17.684528: | Notify data f0 63 99 ca ba e2 30 b0 3f 57 48 f7 06 dc 1c a7 | |
Feb 19 00:48:17.684533: | Notify data 47 30 09 35 | |
Feb 19 00:48:17.684539: | emitting length of IKEv2 Notify Payload: 28 | |
Feb 19 00:48:17.684544: | going to send a certreq | |
Feb 19 00:48:17.684550: | connection->kind is not CK_PERMANENT (instance), so collect CAs | |
Feb 19 00:48:17.684560: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500 | |
Feb 19 00:48:17.684567: | connection is RW, lookup CA candidates | |
Feb 19 00:48:17.684573: | ***emit IKEv2 Certificate Request Payload: | |
Feb 19 00:48:17.684578: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.684584: | flags: none (0x0) | |
Feb 19 00:48:17.684589: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | |
Feb 19 00:48:17.685287: | NSS error locating CA cert '\364\001' for CERTREQ: Success | |
Feb 19 00:48:17.685309: | emitting length of IKEv2 Certificate Request Payload: 5 | |
Feb 19 00:48:17.685316: | no IKE message padding required for IKEv2 | |
Feb 19 00:48:17.685322: | emitting length of ISAKMP Message: 245 | |
Feb 19 00:48:17.685337: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in complete_v2_state_transition() at ikev2.c:2326) | |
Feb 19 00:48:17.685345: | #1 complete v2 state transition from STATE_PARENT_R1 with STF_OK | |
Feb 19 00:48:17.685351: | IKEv2: transition from state STATE_IKEv2_BASE to state STATE_PARENT_R1 | |
Feb 19 00:48:17.685358: | parent state #1: STATE_PARENT_R1(half-open-ike) => STATE_PARENT_R1(half-open-ike) | |
Feb 19 00:48:17.685363: | ignore states: 0 | |
Feb 19 00:48:17.685368: | half-open-ike states: 1 | |
Feb 19 00:48:17.685373: | open-ike states: 0 | |
Feb 19 00:48:17.685378: | established-anonymous-ike states: 0 | |
Feb 19 00:48:17.685383: | established-authenticated-ike states: 0 | |
Feb 19 00:48:17.685388: | anonymous-ipsec states: 0 | |
Feb 19 00:48:17.685392: | authenticated-ipsec states: 0 | |
Feb 19 00:48:17.685397: | informational states: 0 | |
Feb 19 00:48:17.685402: | unknown states: 0 | |
Feb 19 00:48:17.685407: | category states: 1 count states: 1 | |
Feb 19 00:48:17.685414: | message ID #1 STATE_PARENT_R1 ikev2 pst #1 st_msgid_nextuse(before=0) 0 st_msgid_lastack 4294967295 st_msgid_lastrecv 0 md is a request | |
Feb 19 00:48:17.685425: "ikev2"[1] 162.222.81.188 #1: STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=aes_gcm_16_128 integ=n/a prf=sha2_256 group=DH19} | |
Feb 19 00:48:17.685433: | sending V2 new request packet to 162.222.81.188:20572 (from port 500) | |
Feb 19 00:48:17.685442: | sending 245 bytes for STATE_IKEv2_BASE through eth0:500 to 162.222.81.188:20572 (using #1) | |
Feb 19 00:48:17.685448: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.685453: | 21 20 22 20 00 00 00 00 00 00 00 f5 22 00 00 28 | |
Feb 19 00:48:17.685458: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | |
Feb 19 00:48:17.685463: | 80 0e 00 80 03 00 00 08 02 00 00 05 00 00 00 08 | |
Feb 19 00:48:17.685468: | 04 00 00 13 28 00 00 48 00 13 00 00 7a c5 ae 5b | |
Feb 19 00:48:17.685472: | f2 54 fb a3 0e 97 d9 34 f1 72 79 46 bc c4 0d 53 | |
Feb 19 00:48:17.685477: | 5d d9 91 3f 4d 7a 7b d3 8f 97 40 dd 9a 2d 4d 86 | |
Feb 19 00:48:17.685482: | 29 a8 4f 3a 9b e9 b4 c9 45 de eb 4c a4 01 20 14 | |
Feb 19 00:48:17.685487: | 63 1d 72 86 92 23 a3 72 06 0a 6e 0e 29 00 00 24 | |
Feb 19 00:48:17.685500: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.685506: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.685511: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 | |
Feb 19 00:48:17.685516: | a9 f3 1a 3c d4 3a d2 54 5f 9a da ed 20 63 57 a1 | |
Feb 19 00:48:17.685520: | fc 88 01 bf 26 00 00 1c 00 00 40 05 f0 63 99 ca | |
Feb 19 00:48:17.685525: | ba e2 30 b0 3f 57 48 f7 06 dc 1c a7 47 30 09 35 | |
Feb 19 00:48:17.685530: | 00 00 00 05 04 | |
Feb 19 00:48:17.701138: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | |
Feb 19 00:48:17.701220: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278 | |
Feb 19 00:48:17.701270: | event_schedule: new EVENT_v2_RESPONDER_TIMEOUT-pe@0x5650b273c278 | |
Feb 19 00:48:17.701317: | inserting event EVENT_v2_RESPONDER_TIMEOUT, timeout in 200.000 seconds for #1 | |
Feb 19 00:48:17.701376: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in handle_helper_answer() at pluto_crypt.c:592) | |
Feb 19 00:48:17.701422: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.701464: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.761001: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:17.761225: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.761298: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00 | |
Feb 19 00:48:17.761363: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38 | |
Feb 19 00:48:17.761424: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a | |
Feb 19 00:48:17.761484: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01 | |
Feb 19 00:48:17.761551: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be | |
Feb 19 00:48:17.761611: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c | |
Feb 19 00:48:17.761672: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6 | |
Feb 19 00:48:17.761732: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a | |
Feb 19 00:48:17.761791: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f | |
Feb 19 00:48:17.761886: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d | |
Feb 19 00:48:17.761949: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28 | |
Feb 19 00:48:17.762008: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9 | |
Feb 19 00:48:17.762067: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99 | |
Feb 19 00:48:17.762127: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47 | |
Feb 19 00:48:17.762186: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13 | |
Feb 19 00:48:17.762244: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c | |
Feb 19 00:48:17.762289: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf | |
Feb 19 00:48:17.762332: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27 | |
Feb 19 00:48:17.762375: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa | |
Feb 19 00:48:17.762418: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20 | |
Feb 19 00:48:17.762461: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19 | |
Feb 19 00:48:17.762503: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57 | |
Feb 19 00:48:17.762546: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89 | |
Feb 19 00:48:17.762588: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a | |
Feb 19 00:48:17.762630: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69 | |
Feb 19 00:48:17.762672: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01 | |
Feb 19 00:48:17.762714: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15 | |
Feb 19 00:48:17.762757: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7 | |
Feb 19 00:48:17.762799: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2 | |
Feb 19 00:48:17.762841: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34 | |
Feb 19 00:48:17.762883: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11 | |
Feb 19 00:48:17.762925: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06 | |
Feb 19 00:48:17.762966: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c | |
Feb 19 00:48:17.763017: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:17.763066: | **parse ISAKMP Message: | |
Feb 19 00:48:17.763137: | initiator cookie: | |
Feb 19 00:48:17.763180: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.763223: | responder cookie: | |
Feb 19 00:48:17.763265: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.763308: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:17.763351: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.763395: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:17.763439: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:17.763483: | message ID: 00 00 00 01 | |
Feb 19 00:48:17.763526: | length: 540 (0x21c) | |
Feb 19 00:48:17.763569: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:17.763613: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:17.763656: | I am the IKE SA Original Responder | |
Feb 19 00:48:17.763709: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:17.763757: | parent v2 peer and cookies match on #1 | |
Feb 19 00:48:17.763802: | v2 state object #1 found, in STATE_PARENT_R1 | |
Feb 19 00:48:17.763861: | found state #1 | |
Feb 19 00:48:17.763908: | from_state is STATE_PARENT_R1 | |
Feb 19 00:48:17.763952: | Unpacking clear payload for svm: respond to IKE_AUTH | |
Feb 19 00:48:17.763995: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | |
Feb 19 00:48:17.764080: | ***parse IKEv2 Encrypted Fragment: | |
Feb 19 00:48:17.764131: | next payload type: ISAKMP_NEXT_v2IDi (0x23) | |
Feb 19 00:48:17.764174: | flags: none (0x0) | |
Feb 19 00:48:17.764216: | length: 512 (0x200) | |
Feb 19 00:48:17.764258: | fragment number: 1 (0x1) | |
Feb 19 00:48:17.764300: | total fragments: 4 (0x4) | |
Feb 19 00:48:17.764352: | processing payload: ISAKMP_NEXT_v2SKF (len=512) | |
Feb 19 00:48:17.764401: | received IKE encrypted fragment number '1', total number '4', next payload '35' | |
Feb 19 00:48:17.764448: | updated IKE fragment state to respond using fragments without waiting for re-transmits | |
Feb 19 00:48:17.764505: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:17.764560: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:17.764610: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.764658: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.764707: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:17.765057: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:17.765125: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.765174: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:17.765221: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24 | |
Feb 19 00:48:17.765268: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4 | |
Feb 19 00:48:17.765316: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29 | |
Feb 19 00:48:17.765362: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9 | |
Feb 19 00:48:17.765408: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd | |
Feb 19 00:48:17.765454: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70 | |
Feb 19 00:48:17.765500: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6 | |
Feb 19 00:48:17.765546: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57 | |
Feb 19 00:48:17.765593: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a | |
Feb 19 00:48:17.765641: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d | |
Feb 19 00:48:17.765687: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60 | |
Feb 19 00:48:17.765733: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73 | |
Feb 19 00:48:17.765780: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df | |
Feb 19 00:48:17.765826: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca | |
Feb 19 00:48:17.765873: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45 | |
Feb 19 00:48:17.765919: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34 | |
Feb 19 00:48:17.765966: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10 | |
Feb 19 00:48:17.766012: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59 | |
Feb 19 00:48:17.766081: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9 | |
Feb 19 00:48:17.766128: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20 | |
Feb 19 00:48:17.766174: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1 | |
Feb 19 00:48:17.766221: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8 | |
Feb 19 00:48:17.766267: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6 | |
Feb 19 00:48:17.766313: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a | |
Feb 19 00:48:17.766359: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f | |
Feb 19 00:48:17.766406: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44 | |
Feb 19 00:48:17.766452: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa | |
Feb 19 00:48:17.766498: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36 | |
Feb 19 00:48:17.766544: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93 | |
Feb 19 00:48:17.766591: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12 | |
Feb 19 00:48:17.766637: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72 | |
Feb 19 00:48:17.766684: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f | |
Feb 19 00:48:17.766736: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:17.766788: | **parse ISAKMP Message: | |
Feb 19 00:48:17.766835: | initiator cookie: | |
Feb 19 00:48:17.766881: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.766928: | responder cookie: | |
Feb 19 00:48:17.766974: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.767020: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:17.767067: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.767114: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:17.767161: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:17.767209: | message ID: 00 00 00 01 | |
Feb 19 00:48:17.767256: | length: 540 (0x21c) | |
Feb 19 00:48:17.767304: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:17.767352: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:17.767398: | I am the IKE SA Original Responder | |
Feb 19 00:48:17.767455: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:17.767506: | parent v2 peer and cookies match on #1 | |
Feb 19 00:48:17.767554: | v2 state object #1 found, in STATE_PARENT_R1 | |
Feb 19 00:48:17.767600: | found state #1 | |
Feb 19 00:48:17.767646: | from_state is STATE_PARENT_R1 | |
Feb 19 00:48:17.767692: | Unpacking clear payload for svm: respond to IKE_AUTH | |
Feb 19 00:48:17.767813: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | |
Feb 19 00:48:17.767902: | ***parse IKEv2 Encrypted Fragment: | |
Feb 19 00:48:17.767984: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.768135: | flags: none (0x0) | |
Feb 19 00:48:17.768210: | length: 512 (0x200) | |
Feb 19 00:48:17.768277: | fragment number: 2 (0x2) | |
Feb 19 00:48:17.768337: | total fragments: 4 (0x4) | |
Feb 19 00:48:17.768403: | processing payload: ISAKMP_NEXT_v2SKF (len=512) | |
Feb 19 00:48:17.768457: | received IKE encrypted fragment number '2', total number '4', next payload '0' | |
Feb 19 00:48:17.768514: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:17.768566: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:17.768616: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.768663: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.768711: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:17.769084: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:17.769104: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.769111: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:17.769116: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8 | |
Feb 19 00:48:17.769121: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98 | |
Feb 19 00:48:17.769125: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db | |
Feb 19 00:48:17.769149: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c | |
Feb 19 00:48:17.769155: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a | |
Feb 19 00:48:17.769159: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d | |
Feb 19 00:48:17.769164: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5 | |
Feb 19 00:48:17.769169: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed | |
Feb 19 00:48:17.769173: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2 | |
Feb 19 00:48:17.769179: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5 | |
Feb 19 00:48:17.769183: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18 | |
Feb 19 00:48:17.769188: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49 | |
Feb 19 00:48:17.769193: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7 | |
Feb 19 00:48:17.769198: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71 | |
Feb 19 00:48:17.769202: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59 | |
Feb 19 00:48:17.769207: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d | |
Feb 19 00:48:17.769212: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e | |
Feb 19 00:48:17.769217: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98 | |
Feb 19 00:48:17.769222: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6 | |
Feb 19 00:48:17.769227: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3 | |
Feb 19 00:48:17.769232: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44 | |
Feb 19 00:48:17.769236: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83 | |
Feb 19 00:48:17.769241: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6 | |
Feb 19 00:48:17.769246: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6 | |
Feb 19 00:48:17.769251: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0 | |
Feb 19 00:48:17.769256: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4 | |
Feb 19 00:48:17.769261: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95 | |
Feb 19 00:48:17.769266: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa | |
Feb 19 00:48:17.769271: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f | |
Feb 19 00:48:17.769276: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c | |
Feb 19 00:48:17.769280: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b | |
Feb 19 00:48:17.769285: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7 | |
Feb 19 00:48:17.769293: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:17.769301: | **parse ISAKMP Message: | |
Feb 19 00:48:17.769307: | initiator cookie: | |
Feb 19 00:48:17.769312: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.769317: | responder cookie: | |
Feb 19 00:48:17.769321: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.769327: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:17.769332: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.769337: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:17.769343: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:17.769348: | message ID: 00 00 00 01 | |
Feb 19 00:48:17.769353: | length: 540 (0x21c) | |
Feb 19 00:48:17.769359: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:17.769364: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:17.769369: | I am the IKE SA Original Responder | |
Feb 19 00:48:17.769383: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:17.769390: | parent v2 peer and cookies match on #1 | |
Feb 19 00:48:17.769395: | v2 state object #1 found, in STATE_PARENT_R1 | |
Feb 19 00:48:17.769400: | found state #1 | |
Feb 19 00:48:17.769405: | from_state is STATE_PARENT_R1 | |
Feb 19 00:48:17.769411: | Unpacking clear payload for svm: respond to IKE_AUTH | |
Feb 19 00:48:17.769416: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | |
Feb 19 00:48:17.769422: | ***parse IKEv2 Encrypted Fragment: | |
Feb 19 00:48:17.769427: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.769432: | flags: none (0x0) | |
Feb 19 00:48:17.769437: | length: 512 (0x200) | |
Feb 19 00:48:17.769442: | fragment number: 3 (0x3) | |
Feb 19 00:48:17.769452: | total fragments: 4 (0x4) | |
Feb 19 00:48:17.769457: | processing payload: ISAKMP_NEXT_v2SKF (len=512) | |
Feb 19 00:48:17.769463: | received IKE encrypted fragment number '3', total number '4', next payload '0' | |
Feb 19 00:48:17.769472: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:17.769479: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:17.769485: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.769490: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.769495: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:17.769514: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:17.769521: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.769526: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8 | |
Feb 19 00:48:17.769530: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86 | |
Feb 19 00:48:17.769535: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b | |
Feb 19 00:48:17.769540: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc | |
Feb 19 00:48:17.769545: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56 | |
Feb 19 00:48:17.769550: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26 | |
Feb 19 00:48:17.769555: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d | |
Feb 19 00:48:17.769559: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f | |
Feb 19 00:48:17.769564: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4 | |
Feb 19 00:48:17.769569: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16 | |
Feb 19 00:48:17.769573: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c | |
Feb 19 00:48:17.769578: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61 | |
Feb 19 00:48:17.769583: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5 | |
Feb 19 00:48:17.769588: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b | |
Feb 19 00:48:17.769593: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed | |
Feb 19 00:48:17.769597: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce | |
Feb 19 00:48:17.769602: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0 | |
Feb 19 00:48:17.769607: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47 | |
Feb 19 00:48:17.769612: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2 | |
Feb 19 00:48:17.769616: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50 | |
Feb 19 00:48:17.769621: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30 | |
Feb 19 00:48:17.769626: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5 | |
Feb 19 00:48:17.769631: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf | |
Feb 19 00:48:17.769636: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4 | |
Feb 19 00:48:17.769641: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65 | |
Feb 19 00:48:17.769646: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d | |
Feb 19 00:48:17.769651: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e | |
Feb 19 00:48:17.769656: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c | |
Feb 19 00:48:17.769660: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23 | |
Feb 19 00:48:17.769665: | 14 70 e4 81 | |
Feb 19 00:48:17.769671: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:17.769677: | **parse ISAKMP Message: | |
Feb 19 00:48:17.769682: | initiator cookie: | |
Feb 19 00:48:17.769687: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.769692: | responder cookie: | |
Feb 19 00:48:17.769696: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.769701: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:17.769706: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.769711: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:17.769717: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:17.769721: | message ID: 00 00 00 01 | |
Feb 19 00:48:17.769726: | length: 484 (0x1e4) | |
Feb 19 00:48:17.769732: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:17.769737: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:17.769748: | I am the IKE SA Original Responder | |
Feb 19 00:48:17.769760: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:17.769765: | parent v2 peer and cookies match on #1 | |
Feb 19 00:48:17.769770: | v2 state object #1 found, in STATE_PARENT_R1 | |
Feb 19 00:48:17.769775: | found state #1 | |
Feb 19 00:48:17.769779: | from_state is STATE_PARENT_R1 | |
Feb 19 00:48:17.769784: | Unpacking clear payload for svm: respond to IKE_AUTH | |
Feb 19 00:48:17.769789: | Now let's proceed with payload (ISAKMP_NEXT_v2SKF) | |
Feb 19 00:48:17.769794: | ***parse IKEv2 Encrypted Fragment: | |
Feb 19 00:48:17.769799: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.769804: | flags: none (0x0) | |
Feb 19 00:48:17.769809: | length: 456 (0x1c8) | |
Feb 19 00:48:17.769814: | fragment number: 4 (0x4) | |
Feb 19 00:48:17.769819: | total fragments: 4 (0x4) | |
Feb 19 00:48:17.769824: | processing payload: ISAKMP_NEXT_v2SKF (len=456) | |
Feb 19 00:48:17.769829: | received IKE encrypted fragment number '4', total number '4', next payload '0' | |
Feb 19 00:48:17.769835: | selected state microcode respond to IKE_AUTH | |
Feb 19 00:48:17.769847: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in process_v2_packet() at ikev2.c:1469) | |
Feb 19 00:48:17.769855: | processing: start connection "ikev2"[1] 162.222.81.188 (BACKGROUND) (in process_v2_packet() at ikev2.c:1470) | |
Feb 19 00:48:17.769861: | #1 is idle | |
Feb 19 00:48:17.769866: | #1 idle | |
Feb 19 00:48:17.769871: | Now lets proceed with state specific processing | |
Feb 19 00:48:17.769876: | calling processor respond to IKE_AUTH | |
Feb 19 00:48:17.769882: | ikev2 parent inI2outR2: calculating g^{xy} in order to decrypt I2 | |
Feb 19 00:48:17.769903: | calculating skeyseed using prf=HMAC_SHA2_256 integ=NONE cipherkey=AES_GCM_16 | |
Feb 19 00:48:17.769910: | start_dh_v2: reference skey_d_old-key@NULL | |
Feb 19 00:48:17.769918: | DH secret DH19@0x7f2c44001ef8: transfering ownership from state #1 to helper IKEv2 DH | |
Feb 19 00:48:17.769924: | adding ikev2_inI2outR2 KE work-order 2 for state #1 | |
Feb 19 00:48:17.769930: | state #1 requesting EVENT_v2_RESPONDER_TIMEOUT to be deleted | |
Feb 19 00:48:17.769938: | free_event_entry: release EVENT_v2_RESPONDER_TIMEOUT-pe@0x5650b273c278 | |
Feb 19 00:48:17.769945: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278 | |
Feb 19 00:48:17.769953: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60.000 seconds for #1 | |
Feb 19 00:48:17.769964: | backlog: inserting object 0x5650b273cd68 (work-order 2 state #1) entry 0x5650b273cd70 into list 0x5650b266ed00 (older 0x5650b266ed00 newer 0x5650b266ed00) | |
Feb 19 00:48:17.769972: | backlog: inserted object 0x5650b273cd68 (work-order 2 state #1) entry 0x5650b273cd70 (older 0x5650b266ed00 newer 0x5650b266ed00) | |
Feb 19 00:48:17.769978: | backlog: list entry 0x5650b266ed00 is HEAD (older 0x5650b273cd70 newer 0x5650b273cd70) | |
Feb 19 00:48:17.771241: | crypto helper 1 resuming | |
Feb 19 00:48:17.771348: | backlog: removing object 0x5650b273cd68 (work-order 2 state #1) entry 0x5650b273cd70 (older 0x5650b266ed00 newer 0x5650b266ed00) | |
Feb 19 00:48:17.771409: | backlog: empty | |
Feb 19 00:48:17.771425: | crypto helper 1 starting work-order 2 for state #1 | |
Feb 19 00:48:17.771432: | crypto helper 1 doing compute dh (V2); request ID 2 | |
Feb 19 00:48:17.771438: | peer's g: 2d a0 d9 53 92 96 68 a9 38 e0 5e 5a 9a af 10 1b | |
Feb 19 00:48:17.771444: | peer's g: 66 23 25 ea c0 4b 92 f8 d6 09 33 60 19 cd 96 38 | |
Feb 19 00:48:17.771448: | peer's g: ae 99 6c bc 47 9d 29 e2 13 df 22 9c 98 73 b7 a1 | |
Feb 19 00:48:17.771453: | peer's g: d8 e9 dd b3 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e | |
Feb 19 00:48:17.774379: | g_ir temp-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: ECDH1_DERIVE | |
Feb 19 00:48:17.776792: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.776850: | key-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: ECDH1_DERIVE | |
Feb 19 00:48:17.776859: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.776864: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.776953: | result: result-key@0x5650b270a760, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.776963: | NSS: extracted-key@0x5650b270a760 from ECDH temp-key@0x7f2c3c000910 (CKM_CONCATENATE_BASE_AND_KEY hack) | |
Feb 19 00:48:17.776969: | nss_ecp_calc_shared: release temp-key@0x7f2c3c000910 | |
Feb 19 00:48:17.776981: | DH secret DH19@0x7f2c44001ef8: computed shared DH secret key@0x5650b270a760 | |
Feb 19 00:48:17.776988: | dh-shared g^ir-key@0x5650b270a760, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.776994: | NSS: Started key computation | |
Feb 19 00:48:17.777001: | calculating skeyseed using prf=sha2_256 integ=none cipherkey-size=16 salt-size=4 | |
Feb 19 00:48:17.777009: | ike sa SKEYSEED PRF sha2_256 init Ni|Nr-chunk@0x7f2c3c0050f8 (length 48) | |
Feb 19 00:48:17.777017: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777022: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.777028: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777033: | data-bytes@0x7f2c3c0050f8 (48 bytes) | |
Feb 19 00:48:17.777038: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.777043: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.777048: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.777053: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777082: | result: Ni|Nr-key@0x7f2c3c005130, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777088: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.777094: | key-key@0x7f2c3c005130, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777099: | key-offset: 0, key-size: 48 | |
Feb 19 00:48:17.777104: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.777117: | result: Ni|Nr-key@0x5650b2708ee0, size: 48 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.777123: | Ni|Nr: release tmp-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777146: | ike sa SKEYSEED prf: created sha2_256 context 0x7f2c3c0053f0 from Ni|Nr-key@0x5650b2708ee0 | |
Feb 19 00:48:17.777153: | ike sa SKEYSEED prf: begin sha2_256 with context 0x7f2c3c0053f0 from Ni|Nr-key@0x5650b2708ee0 | |
Feb 19 00:48:17.777159: | ike sa SKEYSEED: release clone-key@0x5650b2708ee0 | |
Feb 19 00:48:17.777166: | ike sa SKEYSEED PRF sha2_256 crypt-prf@0x7f2c3c005388 | |
Feb 19 00:48:17.777172: | ike sa SKEYSEED PRF sha2_256 update g^ir-key@0x5650b270a760 (size 32) | |
Feb 19 00:48:17.777178: | nss hmac digest hack extracting all 32 bytes of key@0x5650b270a760 | |
Feb 19 00:48:17.777184: | nss hmac digest hacksymkey-key@0x5650b270a760, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777190: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777203: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777209: | sizeof bytes 32 | |
Feb 19 00:48:17.777226: | wrapper: e7 f3 5e 96 52 e1 df 5d 47 a2 8d 27 5b f0 d2 56 | |
Feb 19 00:48:17.777232: | wrapper: e8 7b ec 35 14 b0 3b 91 4d 1c ad 6c f5 e7 d2 1d | |
Feb 19 00:48:17.777246: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.777253: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c0050f8 | |
Feb 19 00:48:17.777259: | unwrapped: 81 56 e8 c1 34 40 19 48 e7 8e 81 45 cb 6a 56 5e | |
Feb 19 00:48:17.777264: | unwrapped: 15 c3 3c 67 a3 10 a4 d6 b4 f6 0e a7 ef 9a 1f 0c | |
Feb 19 00:48:17.777271: | ike sa SKEYSEED PRF sha2_256 final-key ... | |
Feb 19 00:48:17.777285: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777291: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.777296: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777301: | data-bytes@0x7f2c3c005988 (32 bytes) | |
Feb 19 00:48:17.777306: | b1 af a9 77 92 45 a2 63 2d b8 de db f6 70 5a 18 | |
Feb 19 00:48:17.777311: | d6 3d ad da 85 aa 24 53 78 8d 5a bc 2a 29 44 01 | |
Feb 19 00:48:17.777322: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777347: | result: final-key@0x7f2c3c005130, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777353: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.777359: | key-key@0x7f2c3c005130, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777364: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.777368: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777381: | result: final-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777386: | final: release tmp-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777393: | ike sa SKEYSEED PRF sha2_256 final-key@0x5650b2708ee0 (size 32) | |
Feb 19 00:48:17.777400: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777405: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.777410: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777415: | data-bytes@0x5650b273cdc0 (16 bytes) | |
Feb 19 00:48:17.777420: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.777425: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777456: | result: data-key@0x7f2c3c005460, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777463: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.777468: | key-key@0x7f2c3c005460, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777473: | key-offset: 0, key-size: 16 | |
Feb 19 00:48:17.777478: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777490: | result: data-key@0x7f2c3c005130, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777495: | data: release tmp-key@0x7f2c3c005460 | |
Feb 19 00:48:17.777502: | CONCATENATE_BASE_AND_DATA: | |
Feb 19 00:48:17.777508: | base-key@0x7f2c3c005130, size: 16 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777513: | data-bytes@0x5650b273cdd0 (32 bytes) | |
Feb 19 00:48:17.777518: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.777523: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.777528: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777542: | result: result-key@0x7f2c3c005460, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777548: | append_symkey_bytes: release lhs-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777554: | CONCATENATE_BASE_AND_DATA: | |
Feb 19 00:48:17.777560: | base-key@0x7f2c3c005460, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777565: | data-bytes@0x5650b273ce70 (8 bytes) | |
Feb 19 00:48:17.777569: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.777574: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777589: | result: result-key@0x7f2c3c005130, size: 56 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777594: | append_symkey_bytes: release lhs-key@0x7f2c3c005460 | |
Feb 19 00:48:17.777601: | CONCATENATE_BASE_AND_DATA: | |
Feb 19 00:48:17.777606: | base-key@0x7f2c3c005130, size: 56 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777612: | data-bytes@0x5650b273ce78 (8 bytes) | |
Feb 19 00:48:17.777616: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.777621: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777635: | result: result-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777640: | append_symkey_bytes: release lhs-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777647: | prf+0 PRF sha2_256 init key-key@0x5650b2708ee0 (size 32) | |
Feb 19 00:48:17.777652: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.777658: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777663: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.777668: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.777680: | result: clone-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.777695: | prf+0 prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777702: | prf+0 prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777713: | prf+0: release clone-key@0x7f2c3c005130 | |
Feb 19 00:48:17.777719: | prf+0 PRF sha2_256 crypt-prf@0x7f2c3c0008e8 | |
Feb 19 00:48:17.777725: | prf+0 PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64) | |
Feb 19 00:48:17.777730: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460 | |
Feb 19 00:48:17.777736: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777742: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.777758: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.777764: | sizeof bytes 64 | |
Feb 19 00:48:17.777775: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9 | |
Feb 19 00:48:17.777780: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53 | |
Feb 19 00:48:17.777786: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24 | |
Feb 19 00:48:17.777791: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3 | |
Feb 19 00:48:17.777800: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.777807: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c008998 | |
Feb 19 00:48:17.777812: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.789055: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in log_stf_suspend() at ikev2.c:2243) | |
Feb 19 00:48:17.789204: | "ikev2"[1] 162.222.81.188 #1 complete v2 state STATE_PARENT_R1 transition with STF_SUSPEND suspended from new_pcrc:159 | |
Feb 19 00:48:17.789310: | processing: stop from 162.222.81.188:20573 (BACKGROUND) (in comm_handle() at demux.c:375) | |
Feb 19 00:48:17.789413: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:17.789514: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.789576: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.789633: | processing: resume connection "ikev2"[1] 162.222.81.188 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:17.789688: | processing: stop connection "ikev2"[1] 162.222.81.188 (in comm_handle() at demux.c:381) | |
Feb 19 00:48:17.789758: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.789814: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.789865: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.789935: | prf+0 PRF sha2_256 update 1++-byte@0x1 (1) | |
Feb 19 00:48:17.789991: | prf+0 PRF sha2_256 final-key ... | |
Feb 19 00:48:17.790068: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.790124: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.790177: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.790229: | data-bytes@0x7f2c3c0088d8 (32 bytes) | |
Feb 19 00:48:17.790280: | 4e 70 1f 09 10 c7 3b 6a ee c2 5c 2c 72 e6 41 b2 | |
Feb 19 00:48:17.790332: | d5 4d 4b f0 5c a5 2f ba 0a 0b 75 0d 6f 7f 54 5f | |
Feb 19 00:48:17.790382: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.790472: | result: final-key@0x7f2c3c006d10, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.790530: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.790583: | key-key@0x7f2c3c006d10, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.790639: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.790690: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.790752: | result: final-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.790808: | final: release tmp-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.790873: | prf+0 PRF sha2_256 final-key@0x7f2c3c005130 (size 32) | |
Feb 19 00:48:17.790967: | ikev2_prfplus: reference old_t[1]-key@0x7f2c3c005130 | |
Feb 19 00:48:17.791027: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32) | |
Feb 19 00:48:17.791099: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.791152: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.791204: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.791254: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.791317: | result: clone-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.791387: | prf+N prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.791444: | prf+N prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.791497: | prf+N: release clone-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.791550: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c005438 | |
Feb 19 00:48:17.791602: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c005130 (size 32) | |
Feb 19 00:48:17.791654: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c005130 | |
Feb 19 00:48:17.791707: | nss hmac digest hacksymkey-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.791760: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.791863: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.791926: | sizeof bytes 32 | |
Feb 19 00:48:17.791993: | wrapper: 9b 6c 1e 65 2e 0d e5 d5 5c 5d 56 62 a8 d5 07 cc | |
Feb 19 00:48:17.792080: | wrapper: 96 84 cb 30 15 3c 4b 98 02 8a 9f 81 31 23 e7 38 | |
Feb 19 00:48:17.792146: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.792206: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c008988 | |
Feb 19 00:48:17.792259: | unwrapped: 4e 70 1f 09 10 c7 3b 6a ee c2 5c 2c 72 e6 41 b2 | |
Feb 19 00:48:17.792310: | unwrapped: d5 4d 4b f0 5c a5 2f ba 0a 0b 75 0d 6f 7f 54 5f | |
Feb 19 00:48:17.792365: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64) | |
Feb 19 00:48:17.792418: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460 | |
Feb 19 00:48:17.792470: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.792523: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.792583: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.792638: | sizeof bytes 64 | |
Feb 19 00:48:17.792697: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9 | |
Feb 19 00:48:17.792756: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53 | |
Feb 19 00:48:17.792820: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24 | |
Feb 19 00:48:17.792879: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3 | |
Feb 19 00:48:17.792943: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.793003: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00a308 | |
Feb 19 00:48:17.793057: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.793108: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.793158: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.793209: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.793269: | prf+N PRF sha2_256 update N++-byte@0x2 (2) | |
Feb 19 00:48:17.793324: | prf+N PRF sha2_256 final-key ... | |
Feb 19 00:48:17.793389: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.793444: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.793497: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.793556: | data-bytes@0x7f2c3c008988 (32 bytes) | |
Feb 19 00:48:17.793611: | ec a8 4c c0 9e 78 05 ce cb 9c 50 26 96 dc 44 b8 | |
Feb 19 00:48:17.793666: | f7 d5 ae 10 9a f2 5d b0 d6 6a 93 87 6f 8f 2f 20 | |
Feb 19 00:48:17.793720: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.793807: | result: final-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.793889: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.793945: | key-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794000: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.794055: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794122: | result: final-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794180: | final: release tmp-key@0x7f2c3c008b30 | |
Feb 19 00:48:17.794240: | prf+N PRF sha2_256 final-key@0x7f2c3c006d10 (size 32) | |
Feb 19 00:48:17.794297: | CONCATENATE_BASE_AND_KEY: | |
Feb 19 00:48:17.794354: | base-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794410: | key-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794464: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794534: | result: result-key@0x7f2c3c008b30, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794593: | append_symkey_symkey: release lhs-key@0x7f2c3c005130 | |
Feb 19 00:48:17.794648: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c005130 | |
Feb 19 00:48:17.794708: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32) | |
Feb 19 00:48:17.794764: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.794819: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.794882: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.794938: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.795006: | result: clone-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.795081: | prf+N prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.795141: | prf+N prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.795198: | prf+N: release clone-key@0x7f2c3c005130 | |
Feb 19 00:48:17.795255: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c00a248 | |
Feb 19 00:48:17.795310: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c006d10 (size 32) | |
Feb 19 00:48:17.795365: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c006d10 | |
Feb 19 00:48:17.795421: | nss hmac digest hacksymkey-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.795479: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.795563: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.795624: | sizeof bytes 32 | |
Feb 19 00:48:17.795694: | wrapper: f3 0f 4a 78 d4 1d c8 06 78 7c 16 23 8d 35 db 2f | |
Feb 19 00:48:17.795752: | wrapper: 73 fb 6d 54 30 24 7e a1 0b c3 82 23 02 52 34 ba | |
Feb 19 00:48:17.795816: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.795898: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c008be8 | |
Feb 19 00:48:17.795957: | unwrapped: ec a8 4c c0 9e 78 05 ce cb 9c 50 26 96 dc 44 b8 | |
Feb 19 00:48:17.796012: | unwrapped: f7 d5 ae 10 9a f2 5d b0 d6 6a 93 87 6f 8f 2f 20 | |
Feb 19 00:48:17.796106: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64) | |
Feb 19 00:48:17.796164: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460 | |
Feb 19 00:48:17.796221: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.796277: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.796341: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.796400: | sizeof bytes 64 | |
Feb 19 00:48:17.796471: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9 | |
Feb 19 00:48:17.796529: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53 | |
Feb 19 00:48:17.796585: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24 | |
Feb 19 00:48:17.796639: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3 | |
Feb 19 00:48:17.796702: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.796786: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00bc78 | |
Feb 19 00:48:17.796852: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.796910: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.796965: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.797019: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.797084: | prf+N PRF sha2_256 update N++-byte@0x3 (3) | |
Feb 19 00:48:17.797142: | prf+N PRF sha2_256 final-key ... | |
Feb 19 00:48:17.797212: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.797270: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.797326: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.797382: | data-bytes@0x7f2c3c008be8 (32 bytes) | |
Feb 19 00:48:17.797436: | 50 57 dc 74 4c fb 53 64 e9 e0 7b bb 06 2b 43 70 | |
Feb 19 00:48:17.797491: | 37 1f 29 c0 7d fd 06 65 6b cb c1 77 42 bb 85 15 | |
Feb 19 00:48:17.797551: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797638: | result: final-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797700: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.797755: | key-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797810: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.797863: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797886: | result: final-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797893: | final: release tmp-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.797902: | prf+N PRF sha2_256 final-key@0x7f2c3c005130 (size 32) | |
Feb 19 00:48:17.797908: | CONCATENATE_BASE_AND_KEY: | |
Feb 19 00:48:17.797913: | base-key@0x7f2c3c008b30, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797919: | key-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797924: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797941: | result: result-key@0x7f2c3c00a320, size: 96 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.797947: | append_symkey_symkey: release lhs-key@0x7f2c3c008b30 | |
Feb 19 00:48:17.820458: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.820564: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32) | |
Feb 19 00:48:17.820643: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.820719: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.820795: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.820870: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.820963: | result: clone-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.821061: | prf+N prf: created sha2_256 context 0x7f2c3c00bbe0 from key-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.821141: | prf+N prf: begin sha2_256 with context 0x7f2c3c00bbe0 from key-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.821216: | prf+N: release clone-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.821292: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c0008e8 | |
Feb 19 00:48:17.821366: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c005130 (size 32) | |
Feb 19 00:48:17.821433: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c005130 | |
Feb 19 00:48:17.821505: | nss hmac digest hacksymkey-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.821580: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.821670: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.821748: | sizeof bytes 32 | |
Feb 19 00:48:17.821838: | wrapper: 64 a4 38 9c da f7 29 a4 80 25 e9 61 e5 9d 86 ce | |
Feb 19 00:48:17.821918: | wrapper: 2e 3b d0 e1 2e 9f b0 f1 fc 31 3f 34 6d 8c 27 04 | |
Feb 19 00:48:17.821994: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.822065: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c006e68 | |
Feb 19 00:48:17.822151: | unwrapped: 50 57 dc 74 4c fb 53 64 e9 e0 7b bb 06 2b 43 70 | |
Feb 19 00:48:17.822213: | unwrapped: 37 1f 29 c0 7d fd 06 65 6b cb c1 77 42 bb 85 15 | |
Feb 19 00:48:17.822282: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64) | |
Feb 19 00:48:17.822356: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460 | |
Feb 19 00:48:17.822427: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.822503: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.822586: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.822659: | sizeof bytes 64 | |
Feb 19 00:48:17.822732: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9 | |
Feb 19 00:48:17.822798: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53 | |
Feb 19 00:48:17.822865: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24 | |
Feb 19 00:48:17.822929: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3 | |
Feb 19 00:48:17.822985: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.823038: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00a528 | |
Feb 19 00:48:17.823086: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.823131: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.823175: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.823220: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.823274: | prf+N PRF sha2_256 update N++-byte@0x4 (4) | |
Feb 19 00:48:17.823323: | prf+N PRF sha2_256 final-key ... | |
Feb 19 00:48:17.823383: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.823432: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.823479: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.823524: | data-bytes@0x7f2c3c006e68 (32 bytes) | |
Feb 19 00:48:17.823568: | 54 a3 e8 ea d2 d2 39 52 47 cc d1 7e fe d7 4e 77 | |
Feb 19 00:48:17.823612: | 74 55 3f f8 d6 3c 31 2d d8 8e 83 2d 3a f0 cd 75 | |
Feb 19 00:48:17.823657: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.823732: | result: final-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.823966: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.824104: | key-key@0x7f2c3c008b30, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.824210: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.824292: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.824409: | result: final-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.824513: | final: release tmp-key@0x7f2c3c008b30 | |
Feb 19 00:48:17.824620: | prf+N PRF sha2_256 final-key@0x7f2c3c006d10 (size 32) | |
Feb 19 00:48:17.824722: | CONCATENATE_BASE_AND_KEY: | |
Feb 19 00:48:17.824823: | base-key@0x7f2c3c00a320, size: 96 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.824924: | key-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.825005: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.825099: | result: result-key@0x7f2c3c008b30, size: 128 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.825203: | append_symkey_symkey: release lhs-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.825288: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c005130 | |
Feb 19 00:48:17.825371: | prf+N PRF sha2_256 init key-key@0x5650b2708ee0 (size 32) | |
Feb 19 00:48:17.825448: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.825546: | key-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.825647: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.825747: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.825858: | result: clone-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.826003: | prf+N prf: created sha2_256 context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.826108: | prf+N prf: begin sha2_256 with context 0x7f2c3c006ca0 from key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.826210: | prf+N: release clone-key@0x7f2c3c005130 | |
Feb 19 00:48:17.826227: | prf+N PRF sha2_256 crypt-prf@0x7f2c3c005438 | |
Feb 19 00:48:17.826234: | prf+N PRF sha2_256 update old_t-key@0x7f2c3c006d10 (size 32) | |
Feb 19 00:48:17.826240: | nss hmac digest hack extracting all 32 bytes of key@0x7f2c3c006d10 | |
Feb 19 00:48:17.826246: | nss hmac digest hacksymkey-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826252: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.826273: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826279: | sizeof bytes 32 | |
Feb 19 00:48:17.826301: | wrapper: 14 74 22 ba 1a 39 4d 33 fd 40 01 35 c4 b4 aa ba | |
Feb 19 00:48:17.826307: | wrapper: 90 a6 c1 80 11 85 a7 5d 43 04 15 e4 86 9e dc fb | |
Feb 19 00:48:17.826319: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.826327: | nss hmac digest hack extracted len 32 bytes at 0x7f2c3c008988 | |
Feb 19 00:48:17.826332: | unwrapped: 54 a3 e8 ea d2 d2 39 52 47 cc d1 7e fe d7 4e 77 | |
Feb 19 00:48:17.826338: | unwrapped: 74 55 3f f8 d6 3c 31 2d d8 8e 83 2d 3a f0 cd 75 | |
Feb 19 00:48:17.826345: | prf+N PRF sha2_256 update seed-key@0x7f2c3c005460 (size 64) | |
Feb 19 00:48:17.826351: | nss hmac digest hack extracting all 64 bytes of key@0x7f2c3c005460 | |
Feb 19 00:48:17.826356: | nss hmac digest hacksymkey-key@0x7f2c3c005460, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826362: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.826374: | nss hmac digest hacknew slot-key@0x7f2c3c000910, size: 64 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826379: | sizeof bytes 64 | |
Feb 19 00:48:17.826389: | wrapper: b3 3f d3 0c 5e 12 df 5a 16 67 08 55 df 8e bd e9 | |
Feb 19 00:48:17.826395: | wrapper: 50 e7 17 ee 18 50 a9 81 9a 14 3e 89 ab d1 67 53 | |
Feb 19 00:48:17.826400: | wrapper: cd e5 44 67 08 4b de cc 71 2f 1e b8 bc 71 8d 24 | |
Feb 19 00:48:17.826405: | wrapper: de 35 ed 50 e9 68 f2 fa 8e ec 69 fa 05 f5 94 d3 | |
Feb 19 00:48:17.826414: | nss hmac digest hack: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.826422: | nss hmac digest hack extracted len 64 bytes at 0x7f2c3c00bbb8 | |
Feb 19 00:48:17.826427: | unwrapped: 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.826432: | unwrapped: 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.826437: | unwrapped: fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.826442: | unwrapped: e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.826451: | prf+N PRF sha2_256 update N++-byte@0x5 (5) | |
Feb 19 00:48:17.826457: | prf+N PRF sha2_256 final-key ... | |
Feb 19 00:48:17.826472: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.826478: | CONCATENATE_DATA_AND_BASE: | |
Feb 19 00:48:17.826483: | base-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.826489: | data-bytes@0x7f2c3c008988 (32 bytes) | |
Feb 19 00:48:17.826494: | f8 40 1f b6 16 9c ae 48 5c 78 30 63 9f f4 e8 7d | |
Feb 19 00:48:17.826498: | 46 e3 2e e4 b7 f0 70 39 a4 38 91 14 78 5b ac 57 | |
Feb 19 00:48:17.826503: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826532: | result: final-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826538: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826544: | key-key@0x7f2c3c00a320, size: 48 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826549: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.826554: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826566: | result: final-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826580: | final: release tmp-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.826589: | prf+N PRF sha2_256 final-key@0x7f2c3c005130 (size 32) | |
Feb 19 00:48:17.826594: | CONCATENATE_BASE_AND_KEY: | |
Feb 19 00:48:17.826600: | base-key@0x7f2c3c008b30, size: 128 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826605: | key-key@0x7f2c3c005130, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826610: | -> target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826627: | result: result-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826633: | append_symkey_symkey: release lhs-key@0x7f2c3c008b30 | |
Feb 19 00:48:17.826641: | ikev2_prfplus: release old_t[N]-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.826649: | ikev2_prfplus: release old_t[final]-key@0x7f2c3c005130 | |
Feb 19 00:48:17.826656: | ikev2_ike_sa_keymat: release data-key@0x7f2c3c005460 | |
Feb 19 00:48:17.826665: | calc_skeyseed_v2: release skeyseed_k-key@0x5650b2708ee0 | |
Feb 19 00:48:17.826672: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826678: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826683: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.826688: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826701: | result: result-key@0x5650b2708ee0, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826706: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826780: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826787: | key-offset: 32, key-size: 0 | |
Feb 19 00:48:17.826792: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826802: | result: : result-key@NULL | |
Feb 19 00:48:17.826807: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826812: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826817: | key-offset: 32, key-size: 0 | |
Feb 19 00:48:17.826822: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826830: | result: : result-key@NULL | |
Feb 19 00:48:17.826836: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826841: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826846: | key-offset: 32, key-size: 16 | |
Feb 19 00:48:17.826852: | -> flags: ENCRYPT+DECRYPT target: AES_GCM | |
Feb 19 00:48:17.826865: | result: SK_ei_k-key@0x7f2c3c005460, size: 16 bytes, type/mechanism: AES_GCM | |
Feb 19 00:48:17.826871: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826877: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826882: | key-offset: 48, key-size: 4 | |
Feb 19 00:48:17.826887: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826899: | result: result-key@0x7f2c3c005130, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826905: | initiator salt extracting all 4 bytes of key@0x7f2c3c005130 | |
Feb 19 00:48:17.826911: | initiator saltsymkey-key@0x7f2c3c005130, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826917: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.826930: | initiator saltnew slot-key@0x7f2c3c000910, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826935: | sizeof bytes 16 | |
Feb 19 00:48:17.826948: | wrapper: ed f1 3f eb 2d 12 8a f2 cd 96 b9 9e 1f 2c ec 4c | |
Feb 19 00:48:17.826958: | initiator salt: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.826966: | initiator salt extracted len 16 bytes at 0x7f2c3c006e68 | |
Feb 19 00:48:17.826971: | unwrapped: f7 d5 ae 10 00 00 00 00 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.826976: | calc_skeyseed_v2: release initiator-salt-key-key@0x7f2c3c005130 | |
Feb 19 00:48:17.826982: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.826988: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.826993: | key-offset: 52, key-size: 16 | |
Feb 19 00:48:17.826998: | -> flags: ENCRYPT+DECRYPT target: AES_GCM | |
Feb 19 00:48:17.827010: | result: SK_er_k-key@0x7f2c3c005130, size: 16 bytes, type/mechanism: AES_GCM | |
Feb 19 00:48:17.827023: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.827029: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827034: | key-offset: 68, key-size: 4 | |
Feb 19 00:48:17.827039: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827051: | result: result-key@0x7f2c3c006d10, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827057: | responder salt extracting all 4 bytes of key@0x7f2c3c006d10 | |
Feb 19 00:48:17.827062: | responder saltsymkey-key@0x7f2c3c006d10, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827068: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.827080: | responder saltnew slot-key@0x7f2c3c000910, size: 4 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827086: | sizeof bytes 16 | |
Feb 19 00:48:17.827103: | wrapper: bc d5 08 bd 69 26 f6 7d f4 55 14 d7 13 28 90 dd | |
Feb 19 00:48:17.827113: | responder salt: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.827120: | responder salt extracted len 16 bytes at 0x7f2c3c005288 | |
Feb 19 00:48:17.827125: | unwrapped: 4c fb 53 64 00 00 00 00 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.827130: | calc_skeyseed_v2: release responder-salt-key-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.827137: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.827142: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827147: | key-offset: 72, key-size: 32 | |
Feb 19 00:48:17.827152: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827456: | result: result-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827470: | chunk_SK_pi extracting all 32 bytes of key@0x7f2c3c006d10 | |
Feb 19 00:48:17.827476: | chunk_SK_pisymkey-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827482: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.827496: | chunk_SK_pinew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827503: | sizeof bytes 32 | |
Feb 19 00:48:17.827514: | wrapper: aa c9 9e a5 d7 27 27 f4 fb fa a9 a3 a5 1c 0c 3a | |
Feb 19 00:48:17.827520: | wrapper: 1b e8 70 73 93 e9 30 0b ab 1e 14 0e ff 40 32 8e | |
Feb 19 00:48:17.827530: | chunk_SK_pi: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.827537: | chunk_SK_pi extracted len 32 bytes at 0x7f2c3c008988 | |
Feb 19 00:48:17.827543: | unwrapped: e9 e0 7b bb 06 2b 43 70 37 1f 29 c0 7d fd 06 65 | |
Feb 19 00:48:17.827548: | unwrapped: 6b cb c1 77 42 bb 85 15 54 a3 e8 ea d2 d2 39 52 | |
Feb 19 00:48:17.827553: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.827558: | key-key@0x7f2c3c00a320, size: 160 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827563: | key-offset: 104, key-size: 32 | |
Feb 19 00:48:17.827568: | -> flags: target: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827581: | result: result-key@0x7f2c3c008b30, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827587: | chunk_SK_pr extracting all 32 bytes of key@0x7f2c3c008b30 | |
Feb 19 00:48:17.827592: | chunk_SK_prsymkey-key@0x7f2c3c008b30, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827598: | ephemeral-key@0x5650b2707660, size: 16 bytes, type/mechanism: AES_KEY_GEN | |
Feb 19 00:48:17.827620: | chunk_SK_prnew slot-key@0x7f2c3c000910, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.827626: | sizeof bytes 32 | |
Feb 19 00:48:17.827636: | wrapper: 08 b1 7c 7c 53 13 98 01 17 43 3a a7 2d f3 ac 79 | |
Feb 19 00:48:17.827641: | wrapper: bb ef b5 bd a6 ec 38 93 d9 0f 0c df be f2 74 0d | |
Feb 19 00:48:17.827650: | chunk_SK_pr: release slot-key-key@0x7f2c3c000910 | |
Feb 19 00:48:17.827657: | chunk_SK_pr extracted len 32 bytes at 0x7f2c3c0008e8 | |
Feb 19 00:48:17.827662: | unwrapped: 47 cc d1 7e fe d7 4e 77 74 55 3f f8 d6 3c 31 2d | |
Feb 19 00:48:17.827667: | unwrapped: d8 8e 83 2d 3a f0 cd 75 f8 40 1f b6 16 9c ae 48 | |
Feb 19 00:48:17.827679: | NSS ikev2: finished computing individual keys for IKEv2 SA | |
Feb 19 00:48:17.827684: | calc_skeyseed_v2: release finalkey-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.827695: | calc_skeyseed_v2 pointers: shared-key@0x5650b270a760, SK_d-key@0x5650b2708ee0, SK_ai-key@(nil), SK_ar-key@(nil), SK_ei-key@0x7f2c3c005460, SK_er-key@0x7f2c3c005130, SK_pi-key@0x7f2c3c006d10, SK_pr-key@0x7f2c3c008b30 | |
Feb 19 00:48:17.827701: | calc_skeyseed_v2 initiator salt | |
Feb 19 00:48:17.827706: | f7 d5 ae 10 | |
Feb 19 00:48:17.827711: | calc_skeyseed_v2 responder salt | |
Feb 19 00:48:17.827715: | 4c fb 53 64 | |
Feb 19 00:48:17.827720: | calc_skeyseed_v2 SK_pi | |
Feb 19 00:48:17.827725: | e9 e0 7b bb 06 2b 43 70 37 1f 29 c0 7d fd 06 65 | |
Feb 19 00:48:17.827730: | 6b cb c1 77 42 bb 85 15 54 a3 e8 ea d2 d2 39 52 | |
Feb 19 00:48:17.827735: | calc_skeyseed_v2 SK_pr | |
Feb 19 00:48:17.827740: | 47 cc d1 7e fe d7 4e 77 74 55 3f f8 d6 3c 31 2d | |
Feb 19 00:48:17.827744: | d8 8e 83 2d 3a f0 cd 75 f8 40 1f b6 16 9c ae 48 | |
Feb 19 00:48:17.827752: | crypto helper 1 finished compute dh (V2); request ID 2 time elapsed 56320 usec | |
Feb 19 00:48:17.827758: | crypto helper 1 sending results from work-order 2 for state #1 to event queue | |
Feb 19 00:48:17.827764: | scheduling now-event sending helper answer | |
Feb 19 00:48:17.840048: | executing now-event sending helper answer | |
Feb 19 00:48:17.840105: | crypto helper 1 replies to request ID 2 | |
Feb 19 00:48:17.840113: | calling continuation function 0x5650b2376200 | |
Feb 19 00:48:17.840119: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.840125: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.840142: | processing: start state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in handle_helper_answer() at pluto_crypt.c:589) | |
Feb 19 00:48:17.840149: | ikev2_parent_inI2outR2_continue for #1: calculating g^{xy}, sending R2 | |
Feb 19 00:48:17.840157: | DH secret DH19@0x7f2c44001ef8: transfering ownership from helper IKEv2 DH to state #1 | |
Feb 19 00:48:17.840164: | finish_dh_v2: release st_shared_nss-key@NULL | |
Feb 19 00:48:17.840173: | Salt before authenticated decryption: | |
Feb 19 00:48:17.840178: | f7 d5 ae 10 | |
Feb 19 00:48:17.840183: | IV before authenticated decryption: | |
Feb 19 00:48:17.840188: | 00 00 00 00 00 00 00 02 | |
Feb 19 00:48:17.840193: | AAD before authenticated decryption: | |
Feb 19 00:48:17.840198: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.840203: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00 | |
Feb 19 00:48:17.840208: | 00 01 00 04 | |
Feb 19 00:48:17.840213: | data before authenticated decryption: | |
Feb 19 00:48:17.840218: | 20 6a 1f 38 f7 c8 6d fa 6c 49 08 b0 27 07 41 4a | |
Feb 19 00:48:17.840223: | 43 f3 c3 6a dd a8 17 b6 4f 70 98 dd 84 01 e8 59 | |
Feb 19 00:48:17.840228: | 23 3a 53 01 fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a | |
Feb 19 00:48:17.840233: | d9 ed 3c be f0 e4 55 94 01 10 46 d0 14 16 a7 e2 | |
Feb 19 00:48:17.840238: | ff a3 ff 4c 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 | |
Feb 19 00:48:17.840242: | 0d 0b 15 c6 b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 | |
Feb 19 00:48:17.840247: | 25 a9 11 0a 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d | |
Feb 19 00:48:17.840252: | dd ca 3a 7f 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c | |
Feb 19 00:48:17.840257: | 60 9a 18 2d e9 5f 04 44 49 af 0c b0 8f 10 12 40 | |
Feb 19 00:48:17.840262: | 13 4c 01 28 43 f7 6e f5 61 81 00 27 49 f1 b0 ff | |
Feb 19 00:48:17.840267: | 0e dc 51 d9 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 | |
Feb 19 00:48:17.840272: | a6 3d 47 99 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 | |
Feb 19 00:48:17.840277: | 38 87 19 47 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 | |
Feb 19 00:48:17.840282: | 3b c0 7a 13 a4 a9 90 22 67 6e 01 09 83 91 8e 66 | |
Feb 19 00:48:17.840286: | 28 73 21 9c fb 4f bb d6 ba 9c ca d7 ac e6 e3 be | |
Feb 19 00:48:17.840291: | a7 b8 48 cf f9 d1 58 35 97 57 07 27 44 37 fb d5 | |
Feb 19 00:48:17.840296: | c6 94 93 27 bc ca 64 c9 b3 05 91 81 17 e4 c7 74 | |
Feb 19 00:48:17.840301: | 92 a7 eb fa 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe | |
Feb 19 00:48:17.840325: | a8 df 99 20 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a | |
Feb 19 00:48:17.840331: | 61 99 53 19 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 | |
Feb 19 00:48:17.840336: | ad c3 52 57 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 | |
Feb 19 00:48:17.840341: | 29 1e c0 89 d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 | |
Feb 19 00:48:17.840346: | 2b 10 33 5a 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a | |
Feb 19 00:48:17.840350: | 75 12 a8 69 e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 | |
Feb 19 00:48:17.840355: | 16 71 c3 01 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b | |
Feb 19 00:48:17.840360: | ae 0b a0 15 e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 | |
Feb 19 00:48:17.840365: | b8 c1 c6 d7 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 | |
Feb 19 00:48:17.840370: | 0b 42 b5 d2 c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 | |
Feb 19 00:48:17.840375: | c5 94 d0 34 2c a2 16 03 76 18 02 78 10 16 89 86 | |
Feb 19 00:48:17.840380: | c1 ea a4 11 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 | |
Feb 19 00:48:17.840384: | integ before authenticated decryption: | |
Feb 19 00:48:17.840389: | d9 b4 50 06 d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c | |
Feb 19 00:48:17.840426: | data after authenticated decryption: | |
Feb 19 00:48:17.840433: | 29 00 00 14 02 00 00 00 64 6f 6e 6b 65 79 2d 65 | |
Feb 19 00:48:17.840438: | 61 67 65 72 24 00 00 08 00 00 40 00 26 00 00 1b | |
Feb 19 00:48:17.840443: | 02 00 00 00 62 6c 6f 6f 64 2d 62 65 63 6f 6d 65 | |
Feb 19 00:48:17.840448: | 2d 70 61 64 64 6c 65 27 00 00 19 04 72 1b af e4 | |
Feb 19 00:48:17.840453: | df e3 37 04 32 82 cc 76 69 90 a2 1e 4d b5 16 b9 | |
Feb 19 00:48:17.840458: | 25 00 01 08 01 00 00 00 9d 5a 18 01 b4 a0 8a 1b | |
Feb 19 00:48:17.840462: | 99 65 30 7b 16 26 78 47 56 b0 38 4a d8 e5 21 41 | |
Feb 19 00:48:17.840467: | dc f2 b2 4e 55 40 a7 7c 50 3f 4b c8 b7 35 8b 10 | |
Feb 19 00:48:17.840472: | ce ae dc e1 53 57 66 10 41 8e be 70 6b d5 f5 f5 | |
Feb 19 00:48:17.840477: | 4f aa 55 23 ea ae 2c 37 cf 71 8a e2 e3 7c a5 73 | |
Feb 19 00:48:17.840482: | f1 2f ca c1 19 97 35 ad 68 fc 9a d7 22 58 47 ef | |
Feb 19 00:48:17.840487: | a9 ba cf ab a5 b8 33 42 33 58 9f 28 f3 f7 b1 a8 | |
Feb 19 00:48:17.840491: | c1 1f 3c 5c b4 0f da 6f aa ea 11 ef f9 9c 8f 79 | |
Feb 19 00:48:17.840497: | 91 a1 c7 47 bd b1 2c 31 7a ff 38 90 69 81 f0 82 | |
Feb 19 00:48:17.840502: | 64 d6 dd d1 32 83 df ce b3 47 d3 8e 5a 63 5c 8c | |
Feb 19 00:48:17.840507: | 05 c2 6c a4 a8 6a 99 6d e8 35 bd c3 d1 32 e6 53 | |
Feb 19 00:48:17.840511: | e6 62 51 20 3e 2e 33 58 c7 20 5d c5 bc b4 c0 7c | |
Feb 19 00:48:17.840516: | 48 bc ad b0 1f 33 f0 ea 95 a3 db 88 51 d4 31 85 | |
Feb 19 00:48:17.840521: | c6 b0 15 2c dc f8 39 af 1e f3 05 90 c5 f4 6f 03 | |
Feb 19 00:48:17.840526: | 12 db cf 2f 9b ec f7 c5 04 f9 ef fc 04 65 e6 a8 | |
Feb 19 00:48:17.840531: | f1 87 b3 b6 cf 0e 87 6b 8b 5b 8e 09 2f 3d f5 c1 | |
Feb 19 00:48:17.840536: | 54 b8 ee db ea 51 a1 b8 2f 00 05 09 04 30 82 05 | |
Feb 19 00:48:17.840541: | 00 30 82 03 e8 a0 03 02 01 02 02 09 00 9f b4 67 | |
Feb 19 00:48:17.840546: | cd 4e 3b 83 f2 30 0d 06 09 2a 86 48 86 f7 0d 01 | |
Feb 19 00:48:17.840551: | 01 0b 05 00 30 81 89 31 0b 30 09 06 03 55 04 06 | |
Feb 19 00:48:17.840556: | 13 02 55 53 31 13 30 11 06 03 55 04 08 0c 0a 43 | |
Feb 19 00:48:17.840561: | 61 6c 69 66 6f 72 6e 69 61 31 16 30 14 06 03 55 | |
Feb 19 00:48:17.840565: | 04 07 0c 0d 42 65 76 65 72 6c 79 20 48 69 6c 6c | |
Feb 19 00:48:17.840570: | 73 31 19 30 17 06 03 55 04 0a 0c 10 41 43 4d 45 | |
Feb 19 00:48:17.840575: | 20 43 4f 52 50 4f 52 41 54 49 4f 4e 31 19 82 01 | |
Feb 19 00:48:17.840580: | d9 b4 50 06 d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c | |
Feb 19 00:48:17.840587: | payload contains 1 octets of extra padding (padding-length: 2 (octet 0x 1)) | |
Feb 19 00:48:17.840592: | stripping 2 octets as pad | |
Feb 19 00:48:17.840597: | Salt before authenticated decryption: | |
Feb 19 00:48:17.840602: | f7 d5 ae 10 | |
Feb 19 00:48:17.840606: | IV before authenticated decryption: | |
Feb 19 00:48:17.840611: | 00 00 00 00 00 00 00 03 | |
Feb 19 00:48:17.840616: | AAD before authenticated decryption: | |
Feb 19 00:48:17.840621: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.840632: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:17.840637: | 00 02 00 04 | |
Feb 19 00:48:17.840642: | data before authenticated decryption: | |
Feb 19 00:48:17.840647: | 70 22 4b 24 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 | |
Feb 19 00:48:17.840652: | 0d d3 a5 a4 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 | |
Feb 19 00:48:17.840656: | 5b 0b 09 29 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 | |
Feb 19 00:48:17.840661: | f1 d4 68 c9 6c 3d 54 2e ba 07 93 92 4e 48 da cb | |
Feb 19 00:48:17.840666: | 0c fd d5 bd 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 | |
Feb 19 00:48:17.840671: | 72 c6 68 70 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 | |
Feb 19 00:48:17.840676: | bb af c4 b6 d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 | |
Feb 19 00:48:17.840681: | da 21 58 57 b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 | |
Feb 19 00:48:17.840685: | 73 ec 16 2a ac 63 e9 4e d2 be 05 8a f3 9a 98 6c | |
Feb 19 00:48:17.840690: | 93 5b 12 4d c9 10 b5 ca 70 49 cb 07 82 07 11 53 | |
Feb 19 00:48:17.840695: | 31 d0 02 60 e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c | |
Feb 19 00:48:17.840700: | 61 12 56 73 ca 1b 44 b5 80 ab c8 f8 83 83 7e cd | |
Feb 19 00:48:17.840705: | 3f 68 04 df 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 | |
Feb 19 00:48:17.840710: | 85 5c c9 ca d1 e4 44 72 ff db ea 1c 9b 4c f3 ac | |
Feb 19 00:48:17.840715: | 18 a5 fd 45 97 53 b0 48 13 09 3b 3e b9 06 1d 8e | |
Feb 19 00:48:17.840719: | c7 e2 25 34 ab db 59 46 a0 27 3c b4 8c 4c 5b 71 | |
Feb 19 00:48:17.840724: | 7f 60 0e 10 f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a | |
Feb 19 00:48:17.840729: | c8 51 71 59 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 | |
Feb 19 00:48:17.840734: | 3e 38 13 b9 40 55 24 9e 99 c1 eb 74 8d de aa eb | |
Feb 19 00:48:17.840739: | 81 70 1e 20 71 f1 59 e0 07 7a 00 67 9b a7 71 2f | |
Feb 19 00:48:17.840744: | 9b 55 7d c1 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 | |
Feb 19 00:48:17.840748: | 13 49 8e a8 20 9a 43 ef 7e 3f ce 30 28 57 84 8c | |
Feb 19 00:48:17.840753: | 89 dd a5 d6 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 | |
Feb 19 00:48:17.840758: | 29 d9 de 3a ca 27 69 65 35 e6 21 22 67 4a be fe | |
Feb 19 00:48:17.840763: | e0 76 aa 1f d8 ab 6b 26 35 10 af 33 5e 25 0f 8c | |
Feb 19 00:48:17.840768: | 56 8c 63 44 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 | |
Feb 19 00:48:17.840773: | fc 3e 04 fa 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c | |
Feb 19 00:48:17.840777: | e7 b4 5d 36 b0 85 24 7b c7 98 fe e3 76 23 f3 30 | |
Feb 19 00:48:17.840782: | ad 2f 42 93 d7 af d9 4c d6 94 3e c1 9b c2 73 1a | |
Feb 19 00:48:17.840787: | cf 21 66 12 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 | |
Feb 19 00:48:17.840792: | integ before authenticated decryption: | |
Feb 19 00:48:17.840797: | 66 6c 2a 72 50 cc c5 49 c5 16 61 f8 15 47 40 0f | |
Feb 19 00:48:17.840809: | data after authenticated decryption: | |
Feb 19 00:48:17.840815: | 30 17 06 03 55 04 0b 0c 10 41 6e 76 69 6c 20 44 | |
Feb 19 00:48:17.840820: | 65 70 61 72 74 6d 65 6e 74 31 17 30 15 06 03 55 | |
Feb 19 00:48:17.840824: | 04 03 0c 0e 63 61 2d 63 65 72 74 69 66 69 63 61 | |
Feb 19 00:48:17.840829: | 74 65 30 1e 17 0d 31 38 30 32 31 39 30 30 33 38 | |
Feb 19 00:48:17.840834: | 35 30 5a 17 0d 32 33 30 32 31 38 30 30 33 38 35 | |
Feb 19 00:48:17.840839: | 30 5a 30 81 87 31 0b 30 09 06 03 55 04 06 13 02 | |
Feb 19 00:48:17.840844: | 55 53 31 13 30 11 06 03 55 04 08 0c 0a 43 61 6c | |
Feb 19 00:48:17.840849: | 69 66 6f 72 6e 69 61 31 16 30 14 06 03 55 04 07 | |
Feb 19 00:48:17.840854: | 0c 0d 42 65 76 65 72 6c 79 20 48 69 6c 6c 73 31 | |
Feb 19 00:48:17.840858: | 19 30 17 06 03 55 04 0a 0c 10 41 43 4d 45 20 43 | |
Feb 19 00:48:17.840863: | 4f 52 50 4f 52 41 54 49 4f 4e 31 19 30 17 06 03 | |
Feb 19 00:48:17.840868: | 55 04 0b 0c 10 41 6e 76 69 6c 20 44 65 70 61 72 | |
Feb 19 00:48:17.840873: | 74 6d 65 6e 74 31 15 30 13 06 03 55 04 03 0c 0c | |
Feb 19 00:48:17.840877: | 64 6f 6e 6b 65 79 2d 65 61 67 65 72 30 82 01 22 | |
Feb 19 00:48:17.840882: | 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 | |
Feb 19 00:48:17.840887: | 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c6 b6 3c | |
Feb 19 00:48:17.840892: | 99 bf 11 90 36 53 45 10 d4 52 6b fe 85 d4 7d 2f | |
Feb 19 00:48:17.840906: | b8 7f b4 6a 69 86 5c 70 2a 78 85 9f 35 81 96 b8 | |
Feb 19 00:48:17.840911: | 44 5b ba 2f ed 54 58 10 bd 12 fa 2c fc a4 47 61 | |
Feb 19 00:48:17.840916: | 2a 67 8f 21 16 20 4e be 54 81 b1 89 02 f1 c8 be | |
Feb 19 00:48:17.840920: | 50 1b 9a 41 09 a4 48 db 44 d7 7a 5e 53 db ec 56 | |
Feb 19 00:48:17.840925: | 38 75 4f cb bb 19 a1 9c e5 6c 4e 29 15 4a 21 7a | |
Feb 19 00:48:17.840930: | 7d c6 55 39 2f 22 fd 0f 13 8b ed 28 1a 49 9c b5 | |
Feb 19 00:48:17.840935: | d2 2a 04 13 47 3b 05 7c 8c bd f3 64 a2 0c e5 8f | |
Feb 19 00:48:17.840940: | c4 28 d3 1b 87 1b c2 a8 aa cf de 4f 8b dd 1a 94 | |
Feb 19 00:48:17.840944: | b5 6d 68 69 9d 89 33 f3 2b 6f 63 f2 33 06 4f 18 | |
Feb 19 00:48:17.840949: | d9 d5 3a ad 21 5b ed 4b a1 0a ec 26 f4 f8 91 64 | |
Feb 19 00:48:17.840954: | 41 8d a2 2f d6 53 7f 04 29 60 3f 7c 75 c5 92 f1 | |
Feb 19 00:48:17.840959: | 59 7b bb 75 f1 27 82 63 9e d0 91 48 69 f1 17 4b | |
Feb 19 00:48:17.840964: | 27 1a c2 ad b0 6d 08 32 07 c6 85 d5 36 ca e9 01 | |
Feb 19 00:48:17.840969: | 66 6c 2a 72 50 cc c5 49 c5 16 61 f8 15 47 40 0f | |
Feb 19 00:48:17.840974: | payload contains 1 octets of extra padding (padding-length: 2 (octet 0x 1)) | |
Feb 19 00:48:17.840979: | stripping 2 octets as pad | |
Feb 19 00:48:17.840984: | Salt before authenticated decryption: | |
Feb 19 00:48:17.840988: | f7 d5 ae 10 | |
Feb 19 00:48:17.840993: | IV before authenticated decryption: | |
Feb 19 00:48:17.840998: | 00 00 00 00 00 00 00 04 | |
Feb 19 00:48:17.841002: | AAD before authenticated decryption: | |
Feb 19 00:48:17.841007: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.841012: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:17.841016: | 00 03 00 04 | |
Feb 19 00:48:17.841021: | data before authenticated decryption: | |
Feb 19 00:48:17.841026: | 13 b2 27 d8 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 | |
Feb 19 00:48:17.841031: | 87 8b 1e 98 d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 | |
Feb 19 00:48:17.841035: | ae f2 41 db de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 | |
Feb 19 00:48:17.841040: | bb c4 4f 6c 38 72 28 58 56 85 f6 e4 89 75 8b 39 | |
Feb 19 00:48:17.841045: | 9c 16 41 7a 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 | |
Feb 19 00:48:17.841050: | 25 2a d7 4d 6d 88 4c cb 75 cf aa eb c9 6f 03 8d | |
Feb 19 00:48:17.841054: | c2 4a 78 c5 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d | |
Feb 19 00:48:17.841059: | fb 5b a8 ed 7c e6 82 50 26 a4 56 2c 04 35 60 05 | |
Feb 19 00:48:17.841064: | 61 b0 2c d2 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d | |
Feb 19 00:48:17.841069: | f9 a1 44 e5 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 | |
Feb 19 00:48:17.841073: | b9 01 d0 18 eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 | |
Feb 19 00:48:17.841078: | 8d be 24 49 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 | |
Feb 19 00:48:17.841083: | 12 4a 33 b7 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f | |
Feb 19 00:48:17.841088: | b8 11 94 71 68 25 ab fe 63 09 05 85 b4 5e 7f 0f | |
Feb 19 00:48:17.841093: | a0 07 ff 59 f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 | |
Feb 19 00:48:17.841098: | bf 32 ab 0d e1 bf 75 63 4d 7f dc 34 88 38 33 43 | |
Feb 19 00:48:17.841103: | be 48 29 2e fe ad 5a f8 cc e0 90 83 0c ac 45 89 | |
Feb 19 00:48:17.841107: | 7f d9 71 98 d7 b6 bd bf 42 3c 71 01 29 0e cc 44 | |
Feb 19 00:48:17.841112: | 2f e8 7c e6 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 | |
Feb 19 00:48:17.841117: | 35 74 95 c3 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 | |
Feb 19 00:48:17.841122: | 66 82 5c 44 ee 9c ce dc 32 7b a5 85 60 05 47 ce | |
Feb 19 00:48:17.841127: | 32 03 73 83 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 | |
Feb 19 00:48:17.841131: | c1 69 cc c6 11 2e 90 35 8a ad 31 4e 75 11 74 4f | |
Feb 19 00:48:17.841136: | 3a 5f 0c a6 55 3b ba a5 09 81 b1 af 32 a2 9c 6b | |
Feb 19 00:48:17.841142: | 01 db 82 d0 fc d8 6e ee 60 1b 17 3b d8 8d c5 96 | |
Feb 19 00:48:17.841147: | 33 31 cc e4 69 12 08 17 7b 07 cb d6 99 90 b1 d5 | |
Feb 19 00:48:17.841152: | 6c ae 42 95 a0 93 ab 13 d2 03 31 b7 38 03 21 cb | |
Feb 19 00:48:17.841157: | ae 69 ad aa 54 08 fa 7d bc d1 de 87 84 df aa 9f | |
Feb 19 00:48:17.841162: | 3c bb 91 5f c6 db 25 35 63 ef 04 39 b7 0f f6 bd | |
Feb 19 00:48:17.841171: | c4 ab 9c 4c 08 39 15 33 21 ce e6 07 e8 1b 69 cb | |
Feb 19 00:48:17.841176: | integ before authenticated decryption: | |
Feb 19 00:48:17.841181: | 0e 94 ed 5b a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7 | |
Feb 19 00:48:17.841193: | data after authenticated decryption: | |
Feb 19 00:48:17.841198: | 79 a2 83 88 99 19 8f f8 5a af 95 ce 8c 46 8d f0 | |
Feb 19 00:48:17.841203: | 21 5a b6 d2 af 9c c0 99 54 95 47 86 b6 1b d1 02 | |
Feb 19 00:48:17.841208: | 03 01 00 01 a3 82 01 69 30 82 01 65 30 09 06 03 | |
Feb 19 00:48:17.841213: | 55 1d 13 04 02 30 00 30 33 06 09 60 86 48 01 86 | |
Feb 19 00:48:17.841218: | f8 42 01 0d 04 26 16 24 41 6e 73 69 62 6c 65 20 | |
Feb 19 00:48:17.841223: | 47 65 6e 65 72 61 74 65 64 20 43 6c 69 65 6e 74 | |
Feb 19 00:48:17.841227: | 20 43 65 72 74 69 66 69 63 61 74 65 30 1d 06 03 | |
Feb 19 00:48:17.841232: | 55 1d 0e 04 16 04 14 b9 e6 4a b2 44 30 10 4c 82 | |
Feb 19 00:48:17.841237: | 76 33 b0 c8 d0 b6 89 55 f1 43 00 30 81 be 06 03 | |
Feb 19 00:48:17.841242: | 55 1d 23 04 81 b6 30 81 b3 80 14 73 5e 91 af 6c | |
Feb 19 00:48:17.841247: | 73 5d 3b 93 b3 6a 3d 72 58 e5 8c 7d 21 07 10 a1 | |
Feb 19 00:48:17.841252: | 81 8f a4 81 8c 30 81 89 31 0b 30 09 06 03 55 04 | |
Feb 19 00:48:17.841256: | 06 13 02 55 53 31 13 30 11 06 03 55 04 08 0c 0a | |
Feb 19 00:48:17.841261: | 43 61 6c 69 66 6f 72 6e 69 61 31 16 30 14 06 03 | |
Feb 19 00:48:17.841266: | 55 04 07 0c 0d 42 65 76 65 72 6c 79 20 48 69 6c | |
Feb 19 00:48:17.841271: | 6c 73 31 19 30 17 06 03 55 04 0a 0c 10 41 43 4d | |
Feb 19 00:48:17.841276: | 45 20 43 4f 52 50 4f 52 41 54 49 4f 4e 31 19 30 | |
Feb 19 00:48:17.841280: | 17 06 03 55 04 0b 0c 10 41 6e 76 69 6c 20 44 65 | |
Feb 19 00:48:17.841285: | 70 61 72 74 6d 65 6e 74 31 17 30 15 06 03 55 04 | |
Feb 19 00:48:17.841290: | 03 0c 0e 63 61 2d 63 65 72 74 69 66 69 63 61 74 | |
Feb 19 00:48:17.841295: | 65 82 09 00 9a 4e bd 11 2f 04 a7 6e 30 1d 06 03 | |
Feb 19 00:48:17.841300: | 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 | |
Feb 19 00:48:17.841304: | 01 06 08 2b 06 01 05 05 07 03 02 30 0b 06 03 55 | |
Feb 19 00:48:17.841309: | 1d 0f 04 04 03 02 05 a0 30 17 06 03 55 1d 11 04 | |
Feb 19 00:48:17.841314: | 10 30 0e 82 0c 64 6f 6e 6b 65 79 2d 65 61 67 65 | |
Feb 19 00:48:17.841319: | 72 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 | |
Feb 19 00:48:17.841324: | 03 82 01 01 00 5b 19 90 a0 b9 d9 b7 12 06 ad 56 | |
Feb 19 00:48:17.841329: | e8 cf f9 44 0b 3a 5b ef c2 0c bf cb 8e 3a 08 78 | |
Feb 19 00:48:17.841334: | 75 57 f6 7c e9 0e 0a 59 d2 a5 50 01 35 23 59 da | |
Feb 19 00:48:17.841339: | 49 3a a2 a4 67 e9 8f ca c0 5e a9 45 05 d1 a0 01 | |
Feb 19 00:48:17.841344: | 0e 94 ed 5b a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7 | |
Feb 19 00:48:17.841349: | payload contains 1 octets of extra padding (padding-length: 2 (octet 0x 1)) | |
Feb 19 00:48:17.841354: | stripping 2 octets as pad | |
Feb 19 00:48:17.841359: | Salt before authenticated decryption: | |
Feb 19 00:48:17.841364: | f7 d5 ae 10 | |
Feb 19 00:48:17.841368: | IV before authenticated decryption: | |
Feb 19 00:48:17.841373: | 00 00 00 00 00 00 00 05 | |
Feb 19 00:48:17.841378: | AAD before authenticated decryption: | |
Feb 19 00:48:17.841383: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.841387: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8 | |
Feb 19 00:48:17.841392: | 00 04 00 04 | |
Feb 19 00:48:17.841396: | data before authenticated decryption: | |
Feb 19 00:48:17.841401: | 0d 61 ba 86 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 | |
Feb 19 00:48:17.841406: | 6f 6a 87 2b 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 | |
Feb 19 00:48:17.841411: | 41 14 80 fc e0 db 8e f1 3c a8 e3 41 85 9f d9 2b | |
Feb 19 00:48:17.841416: | d3 43 5b 56 bb 4d 47 b2 05 17 56 fa 94 a3 25 78 | |
Feb 19 00:48:17.841421: | 21 28 c4 26 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 | |
Feb 19 00:48:17.841426: | c6 5f d3 8d d4 62 71 fd 8e 67 0a 23 97 54 f5 37 | |
Feb 19 00:48:17.841431: | 0e 13 40 8f 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 | |
Feb 19 00:48:17.841436: | 34 7b 8c c4 f6 f3 67 90 88 87 12 11 9b f5 5a 95 | |
Feb 19 00:48:17.841446: | 71 91 27 16 da fc 83 81 c2 01 cb 56 13 c9 ce da | |
Feb 19 00:48:17.841451: | 44 61 0e 5c ac 21 2d c7 50 31 78 fc 0c 81 17 f4 | |
Feb 19 00:48:17.841456: | 66 29 a6 61 17 97 b7 28 26 8b c7 6a 21 67 d8 44 | |
Feb 19 00:48:17.841461: | 37 96 f3 b5 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 | |
Feb 19 00:48:17.841466: | 64 2e 33 1b 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 | |
Feb 19 00:48:17.841470: | a9 0a 30 ed fe ca bf c6 fa d1 9d 32 c7 27 b8 aa | |
Feb 19 00:48:17.841475: | b4 67 00 ce 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 | |
Feb 19 00:48:17.841480: | 8e 4d 55 a0 a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 | |
Feb 19 00:48:17.841485: | cd a4 f6 47 ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c | |
Feb 19 00:48:17.841490: | d0 fe 0e d2 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 | |
Feb 19 00:48:17.841495: | 84 6f f7 50 b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d | |
Feb 19 00:48:17.841500: | da 09 be 30 1e c8 52 94 eb 09 a1 6a de 52 9b 08 | |
Feb 19 00:48:17.841504: | fb ff 50 e5 b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 | |
Feb 19 00:48:17.841509: | 20 1c 53 bf 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 | |
Feb 19 00:48:17.841514: | 37 81 15 f4 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 | |
Feb 19 00:48:17.841519: | 9e 76 c1 65 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 | |
Feb 19 00:48:17.841524: | f8 16 c7 9d d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 | |
Feb 19 00:48:17.841529: | 06 ca 2a 2e 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 | |
Feb 19 00:48:17.841533: | 84 1f a2 0c 3b e2 38 0f | |
Feb 19 00:48:17.841538: | integ before authenticated decryption: | |
Feb 19 00:48:17.841543: | 22 35 5e 12 13 23 4e 90 31 00 47 23 14 70 e4 81 | |
Feb 19 00:48:17.841563: | data after authenticated decryption: | |
Feb 19 00:48:17.841570: | 5c c9 f5 1e 64 7f 32 f7 3a 01 81 30 89 64 49 72 | |
Feb 19 00:48:17.841575: | 51 3b 76 f2 af be e0 6d e4 8d b0 d2 cd 23 0b b1 | |
Feb 19 00:48:17.841579: | bc d2 f0 0f b0 59 72 cb b6 4e 65 0b 13 34 95 4b | |
Feb 19 00:48:17.841584: | e1 f5 ad 31 01 ff f3 1f ad a8 3c c9 d5 dc 4b f4 | |
Feb 19 00:48:17.841589: | c5 21 2b e9 ee d0 b4 98 93 4f df 5d 4f 96 e0 2a | |
Feb 19 00:48:17.841594: | da 2e d3 8c 54 65 60 26 4f c9 f7 51 13 27 b1 49 | |
Feb 19 00:48:17.841599: | c1 7d e7 8f d6 36 61 10 93 4a 44 2c 22 9a ce 8f | |
Feb 19 00:48:17.841604: | 2f 1f 01 67 ae 12 2b 8e a2 32 0a 97 c2 b4 4c ba | |
Feb 19 00:48:17.841609: | ab cd fe f4 dd c5 47 a3 57 62 74 80 b2 44 9e 83 | |
Feb 19 00:48:17.841614: | a8 53 3b 18 61 76 77 6d f1 19 90 91 4e f6 c4 9d | |
Feb 19 00:48:17.841619: | cc 5a ce 4c 23 4c a0 7f 64 d9 7c d7 3f ee c4 17 | |
Feb 19 00:48:17.841624: | 90 c4 04 24 9b 0f 4c 3f 94 d0 84 7d 5a 0f 7b 37 | |
Feb 19 00:48:17.841629: | 45 b1 fc 7f 17 4f 09 29 00 00 28 01 00 00 00 00 | |
Feb 19 00:48:17.841633: | 01 00 00 00 06 00 00 00 03 00 00 00 02 00 00 00 | |
Feb 19 00:48:17.841638: | 08 00 00 00 0c 00 00 00 0a 00 00 00 19 00 00 29 | |
Feb 19 00:48:17.841643: | 00 00 08 00 00 40 0a 21 00 00 08 00 00 40 0b 2c | |
Feb 19 00:48:17.841648: | 00 00 24 00 00 00 20 01 03 04 02 0f 4c a2 e6 03 | |
Feb 19 00:48:17.841653: | 00 00 0c 01 00 00 14 80 0e 00 80 00 00 00 08 05 | |
Feb 19 00:48:17.841658: | 00 00 00 2d 00 00 40 02 00 00 00 07 00 00 10 00 | |
Feb 19 00:48:17.841663: | 00 ff ff 00 00 00 00 ff ff ff ff 08 00 00 28 00 | |
Feb 19 00:48:17.841667: | 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.841672: | 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff | |
Feb 19 00:48:17.841677: | ff ff ff 00 00 00 40 02 00 00 00 07 00 00 10 00 | |
Feb 19 00:48:17.841682: | 00 ff ff 00 00 00 00 ff ff ff ff 08 00 00 28 00 | |
Feb 19 00:48:17.841687: | 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.841692: | 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff | |
Feb 19 00:48:17.841697: | ff ff ff 2f 4c 08 37 04 22 35 5e 12 13 23 4e 90 | |
Feb 19 00:48:17.841701: | 31 00 47 23 14 70 e4 81 | |
Feb 19 00:48:17.841706: | payload contains 4 octets of extra padding (padding-length: 5 (octet 0x 4)) | |
Feb 19 00:48:17.841712: | stripping 5 octets as pad | |
Feb 19 00:48:17.841722: | #1 ikev2 ISAKMP_v2_AUTH decrypt success | |
Feb 19 00:48:17.841735: | Now let's proceed with payload (ISAKMP_NEXT_v2IDi) | |
Feb 19 00:48:17.841743: | **parse IKEv2 Identification Payload: | |
Feb 19 00:48:17.841748: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.841755: | flags: none (0x0) | |
Feb 19 00:48:17.841760: | length: 20 (0x14) | |
Feb 19 00:48:17.841765: | ID type: ID_FQDN (0x2) | |
Feb 19 00:48:17.841770: | processing payload: ISAKMP_NEXT_v2IDi (len=20) | |
Feb 19 00:48:17.841775: | Now let's proceed with payload (ISAKMP_NEXT_v2N) | |
Feb 19 00:48:17.841782: | **parse IKEv2 Notify Payload: | |
Feb 19 00:48:17.841787: | next payload type: ISAKMP_NEXT_v2IDr (0x24) | |
Feb 19 00:48:17.841791: | flags: none (0x0) | |
Feb 19 00:48:17.841796: | length: 8 (0x8) | |
Feb 19 00:48:17.841801: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.841806: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.841812: | Notify Message Type: v2N_INITIAL_CONTACT (0x4000) | |
Feb 19 00:48:17.841817: | processing payload: ISAKMP_NEXT_v2N (len=8) | |
Feb 19 00:48:17.841822: | Now let's proceed with payload (ISAKMP_NEXT_v2IDr) | |
Feb 19 00:48:17.841828: | **parse IKEv2 Identification Payload: | |
Feb 19 00:48:17.841833: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) | |
Feb 19 00:48:17.841838: | flags: none (0x0) | |
Feb 19 00:48:17.841842: | length: 27 (0x1b) | |
Feb 19 00:48:17.841847: | ID type: ID_FQDN (0x2) | |
Feb 19 00:48:17.841852: | processing payload: ISAKMP_NEXT_v2IDr (len=27) | |
Feb 19 00:48:17.841857: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) | |
Feb 19 00:48:17.841863: | **parse IKEv2 Certificate Request Payload: | |
Feb 19 00:48:17.841868: | next payload type: ISAKMP_NEXT_v2AUTH (0x27) | |
Feb 19 00:48:17.841873: | flags: none (0x0) | |
Feb 19 00:48:17.841877: | length: 25 (0x19) | |
Feb 19 00:48:17.841883: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | |
Feb 19 00:48:17.841888: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=25) | |
Feb 19 00:48:17.841892: | Now let's proceed with payload (ISAKMP_NEXT_v2AUTH) | |
Feb 19 00:48:17.841898: | **parse IKEv2 Authentication Payload: | |
Feb 19 00:48:17.841903: | next payload type: ISAKMP_NEXT_v2CERT (0x25) | |
Feb 19 00:48:17.841908: | flags: none (0x0) | |
Feb 19 00:48:17.841913: | length: 264 (0x108) | |
Feb 19 00:48:17.841918: | auth method: IKEv2_AUTH_RSA (0x1) | |
Feb 19 00:48:17.841923: | processing payload: ISAKMP_NEXT_v2AUTH (len=264) | |
Feb 19 00:48:17.841928: | Now let's proceed with payload (ISAKMP_NEXT_v2CERT) | |
Feb 19 00:48:17.841933: | **parse IKEv2 Certificate Payload: | |
Feb 19 00:48:17.841938: | next payload type: ISAKMP_NEXT_v2CP (0x2f) | |
Feb 19 00:48:17.841943: | flags: none (0x0) | |
Feb 19 00:48:17.841948: | length: 1289 (0x509) | |
Feb 19 00:48:17.841953: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) | |
Feb 19 00:48:17.841958: | processing payload: ISAKMP_NEXT_v2CERT (len=1289) | |
Feb 19 00:48:17.841963: | Now let's proceed with payload (ISAKMP_NEXT_v2CP) | |
Feb 19 00:48:17.841968: | **parse IKEv2 Configuration Payload: | |
Feb 19 00:48:17.841973: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.841978: | flags: none (0x0) | |
Feb 19 00:48:17.841983: | length: 40 (0x28) | |
Feb 19 00:48:17.841988: | ikev2_cfg_type: IKEv2_CP_CFG_REQUEST (0x1) | |
Feb 19 00:48:17.841993: | processing payload: ISAKMP_NEXT_v2CP (len=40) | |
Feb 19 00:48:17.841998: | Now let's proceed with payload (ISAKMP_NEXT_v2N) | |
Feb 19 00:48:17.842003: | **parse IKEv2 Notify Payload: | |
Feb 19 00:48:17.842008: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.842013: | flags: none (0x0) | |
Feb 19 00:48:17.842018: | length: 8 (0x8) | |
Feb 19 00:48:17.842023: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.842028: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.842033: | Notify Message Type: v2N_ESP_TFC_PADDING_NOT_SUPPORTED (0x400a) | |
Feb 19 00:48:17.842038: | processing payload: ISAKMP_NEXT_v2N (len=8) | |
Feb 19 00:48:17.842043: | Now let's proceed with payload (ISAKMP_NEXT_v2N) | |
Feb 19 00:48:17.842048: | **parse IKEv2 Notify Payload: | |
Feb 19 00:48:17.842054: | next payload type: ISAKMP_NEXT_v2SA (0x21) | |
Feb 19 00:48:17.842058: | flags: none (0x0) | |
Feb 19 00:48:17.842063: | length: 8 (0x8) | |
Feb 19 00:48:17.842073: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.842078: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.842083: | Notify Message Type: v2N_NON_FIRST_FRAGMENTS_ALSO (0x400b) | |
Feb 19 00:48:17.842088: | processing payload: ISAKMP_NEXT_v2N (len=8) | |
Feb 19 00:48:17.842093: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) | |
Feb 19 00:48:17.842099: | **parse IKEv2 Security Association Payload: | |
Feb 19 00:48:17.842104: | next payload type: ISAKMP_NEXT_v2TSi (0x2c) | |
Feb 19 00:48:17.842109: | flags: none (0x0) | |
Feb 19 00:48:17.842113: | length: 36 (0x24) | |
Feb 19 00:48:17.842118: | processing payload: ISAKMP_NEXT_v2SA (len=36) | |
Feb 19 00:48:17.842123: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi) | |
Feb 19 00:48:17.842129: | **parse IKEv2 Traffic Selector Payload: | |
Feb 19 00:48:17.842134: | next payload type: ISAKMP_NEXT_v2TSr (0x2d) | |
Feb 19 00:48:17.842139: | flags: none (0x0) | |
Feb 19 00:48:17.842144: | length: 64 (0x40) | |
Feb 19 00:48:17.842149: | number of TS: 2 (0x2) | |
Feb 19 00:48:17.842154: | processing payload: ISAKMP_NEXT_v2TSi (len=64) | |
Feb 19 00:48:17.842159: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr) | |
Feb 19 00:48:17.842164: | **parse IKEv2 Traffic Selector Payload: | |
Feb 19 00:48:17.842169: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.842174: | flags: none (0x0) | |
Feb 19 00:48:17.842179: | length: 64 (0x40) | |
Feb 19 00:48:17.842184: | number of TS: 2 (0x2) | |
Feb 19 00:48:17.842188: | processing payload: ISAKMP_NEXT_v2TSr (len=64) | |
Feb 19 00:48:17.842194: | #1 match encrypted payloads to svm respond to IKE_AUTH | |
Feb 19 00:48:17.842203: | state #1 NAT-T: new mapping 162.222.81.188:20573 | |
Feb 19 00:48:17.842215: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20572 (in for_each_state() at state.c:1518) | |
Feb 19 00:48:17.842222: | new NAT mapping for #1, was 162.222.81.188:20572, now 162.222.81.188:20573 | |
Feb 19 00:48:17.842231: | processing: stop state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in for_each_state() at state.c:1518) | |
Feb 19 00:48:17.842237: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.842242: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.842249: | processing: resume state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in for_each_state() at state.c:1518) | |
Feb 19 00:48:17.842255: | NAT-T: updating local port to 4500 | |
Feb 19 00:48:17.842263: | NAT-T connection has wrong interface definition 159.89.116.29:4500 vs 159.89.116.29:500 | |
Feb 19 00:48:17.842270: | NAT-T: updated to use interface eth0:4500 | |
Feb 19 00:48:17.842276: | received IDr payload - extracting our alleged ID | |
Feb 19 00:48:17.842282: | checking for CERT payloads | |
Feb 19 00:48:17.842289: | found at last one CERT payload, calling pluto_process_certs() | |
Feb 19 00:48:17.844072: | crypto helper 1 waiting (nothing to do) | |
Feb 19 00:48:17.844909: | decoded CN=donkey-eager,OU=Anvil Department,O=ACME CORPORATION,L=Beverly Hills,ST=California,C=US | |
Feb 19 00:48:17.844927: | get_issuer_crl : looking for a CRL issued by CN=ca-certificate,OU=Anvil Department,O=ACME CORPORATION,L=Beverly Hills,ST=California,C=US | |
Feb 19 00:48:17.845360: | missing or expired CRL | |
Feb 19 00:48:17.848545: | crl_strict: 0, ocsp: 0, ocsp_strict: 0 | |
Feb 19 00:48:17.850278: | certificate is valid | |
Feb 19 00:48:17.850339: "ikev2"[1] 162.222.81.188 #1: certificate verified OK: CN=donkey-eager,OU=Anvil Department,O=ACME CORPORATION,L=Beverly Hills,ST=California,C=US | |
Feb 19 00:48:17.850884: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x5650b273c6f8 | |
Feb 19 00:48:17.850900: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x5650b2742688 | |
Feb 19 00:48:17.851093: | unreference key: 0x5650b2746638 C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager cnt 1-- | |
Feb 19 00:48:17.851113: | Verifying configured ID matches certificate | |
Feb 19 00:48:17.851128: | ID_DER_ASN1_DN '%fromcert' does not need further ID verification | |
Feb 19 00:48:17.851138: | SAN ID matched, updating that.cert | |
Feb 19 00:48:17.851160: | Peer public key SubjectAltName matches peer ID for this connection | |
Feb 19 00:48:17.851168: | X509: CERT and ID matches current connection | |
Feb 19 00:48:17.851174: | CERT_X509_SIGNATURE CR: | |
Feb 19 00:48:17.851179: | 72 1b af e4 df e3 37 04 32 82 cc 76 69 90 a2 1e | |
Feb 19 00:48:17.851185: | 4d b5 16 b9 | |
Feb 19 00:48:17.851191: | cert blob content is not binary ASN.1 | |
Feb 19 00:48:17.851200: | refine_host_connection for IKEv2: starting with "ikev2"[1] 162.222.81.188 | |
Feb 19 00:48:17.851212: | match_id a=@donkey-eager | |
Feb 19 00:48:17.851218: | b=C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager | |
Feb 19 00:48:17.851224: | results fail | |
Feb 19 00:48:17.851233: | trusted_ca_nss: trustee A = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate' | |
Feb 19 00:48:17.851239: | trusted_ca_nss: trustor B = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate' | |
Feb 19 00:48:17.851246: | same_dn_any_order: not an exact match, now checking any RDN order | |
Feb 19 00:48:17.851257: | match_dn_unordered A: C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate, B: F\241t\262PV | |
Feb 19 00:48:17.878788: | trusted_ca_nss: returning untrusted at pathlen 1 | |
Feb 19 00:48:17.878904: | refine_host_connection: checking "ikev2"[1] 162.222.81.188 against "ikev2"[1] 162.222.81.188, best=(none) with match=0(id=0/ca=0/reqca=1) | |
Feb 19 00:48:17.878925: | Peer expects us to be @blood-become-paddle (ID_FQDN) according to its IDr payload | |
Feb 19 00:48:17.878932: | This connection's local id is @159.89.116.29 (ID_FQDN) | |
Feb 19 00:48:17.878951: "ikev2"[1] 162.222.81.188 #1: No matching subjectAltName found | |
Feb 19 00:48:17.878959: | IDr payload '@blood-become-paddle' is NOT a valid certificate SAN for this connection | |
Feb 19 00:48:17.878964: | Peer IDr payload does not match our expected ID, this connection will not do | |
Feb 19 00:48:17.878970: | refine going into 2nd loop allowing instantiated conns as well | |
Feb 19 00:48:17.878977: | find_host_pair: comparing 159.89.116.29:500 to 0.0.0.0:500 | |
Feb 19 00:48:17.878985: | match_id a=@donkey-eager | |
Feb 19 00:48:17.878990: | b=%fromcert | |
Feb 19 00:48:17.878994: | results fail | |
Feb 19 00:48:17.879006: | trusted_ca_nss: trustee A = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate' | |
Feb 19 00:48:17.879013: | trusted_ca_nss: trustor B = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate' | |
Feb 19 00:48:17.879019: | same_dn_any_order: not an exact match, now checking any RDN order | |
Feb 19 00:48:17.879031: | match_dn_unordered A: C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate, B: | refine going into 2nd loop allowing instantiated connsp\327\353\003\374\177 | |
Feb 19 00:48:17.882069: | trusted_ca_nss: returning untrusted at pathlen 1 | |
Feb 19 00:48:17.882133: | refine_host_connection: checking "ikev2"[1] 162.222.81.188 against "ikev2", best=(none) with match=0(id=0/ca=0/reqca=1) | |
Feb 19 00:48:17.882145: "ikev2"[1] 162.222.81.188 #1: Warning: not switching back to template of current instance (FIXME) | |
Feb 19 00:48:17.882152: | returning since no better match then original best_found | |
Feb 19 00:48:17.882160: | no suitable connection for peer '@donkey-eager' | |
Feb 19 00:48:17.882166: | Peer ID matches and no better connection found - continuing with existing connection | |
Feb 19 00:48:17.882173: | offered CA: '@donkey-eager' | |
Feb 19 00:48:17.882181: "ikev2"[1] 162.222.81.188 #1: IKEv2 mode peer ID is ID_FQDN: '@donkey-eager' | |
Feb 19 00:48:17.882191: | hmac PRF sha2_256 init symkey-key@0x7f2c3c006d10 (size 32) | |
Feb 19 00:48:17.882199: | EXTRACT_KEY_FROM_KEY: | |
Feb 19 00:48:17.882205: | key-key@0x7f2c3c006d10, size: 32 bytes, type/mechanism: EXTRACT_KEY_FROM_KEY | |
Feb 19 00:48:17.882211: | key-offset: 0, key-size: 32 | |
Feb 19 00:48:17.882217: | -> flags: SIGN target: SHA256_HMAC | |
Feb 19 00:48:17.882264: | result: clone-key@0x7f2c3c00a320, size: 32 bytes, type/mechanism: SHA256_HMAC | |
Feb 19 00:48:17.882282: | hmac prf: created sha2_256 context 0x5650b2745c00 from symkey-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.882289: | hmac prf: begin sha2_256 with context 0x5650b2745c00 from symkey-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.882296: | hmac: release clone-key@0x7f2c3c00a320 | |
Feb 19 00:48:17.882302: | hmac PRF sha2_256 crypt-prf@0x5650b273c688 | |
Feb 19 00:48:17.882308: | idhash verify I2 02 00 00 00 64 6f 6e 6b 65 79 2d 65 61 67 65 72 | |
Feb 19 00:48:17.882315: | hmac PRF sha2_256 update data-bytes@0x5650b273d93c (length 16) | |
Feb 19 00:48:17.882322: | hmac PRF sha2_256 final-bytes ... | |
Feb 19 00:48:17.882336: | hmac PRF sha2_256 final-bytes@0x7ffc03ebe440 (length 32) | |
Feb 19 00:48:17.882343: | received CERTREQ payload; going to decode it | |
Feb 19 00:48:17.882349: | CERT_X509_SIGNATURE CR: | |
Feb 19 00:48:17.882354: | 72 1b af e4 df e3 37 04 32 82 cc 76 69 90 a2 1e | |
Feb 19 00:48:17.882359: | 4d b5 16 b9 | |
Feb 19 00:48:17.882365: | cert blob content is not binary ASN.1 | |
Feb 19 00:48:17.882371: | inputs to hash1 (first packet) | |
Feb 19 00:48:17.882376: | e5 e9 88 9b 1f fd dd 07 00 00 00 00 00 00 00 00 | |
Feb 19 00:48:17.882381: | 21 20 22 08 00 00 00 00 00 00 00 e0 22 00 00 28 | |
Feb 19 00:48:17.882386: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 | |
Feb 19 00:48:17.882391: | 80 0e 00 80 03 00 00 08 02 00 00 05 00 00 00 08 | |
Feb 19 00:48:17.882397: | 04 00 00 13 28 00 00 48 00 13 00 00 2d a0 d9 53 | |
Feb 19 00:48:17.882402: | 92 96 68 a9 38 e0 5e 5a 9a af 10 1b 66 23 25 ea | |
Feb 19 00:48:17.882407: | c0 4b 92 f8 d6 09 33 60 19 cd 96 38 ae 99 6c bc | |
Feb 19 00:48:17.882412: | 47 9d 29 e2 13 df 22 9c 98 73 b7 a1 d8 e9 dd b3 | |
Feb 19 00:48:17.882417: | 7e 06 b9 ef 9a 60 ca c7 b6 61 93 6e 29 00 00 14 | |
Feb 19 00:48:17.882422: | 7a a9 0d 7f b7 9b a5 0b a9 b7 cd 90 f3 86 e3 c5 | |
Feb 19 00:48:17.882427: | 29 00 00 1c 00 00 40 04 ae 3a 70 67 06 74 04 b5 | |
Feb 19 00:48:17.882432: | ed 09 0d dc 06 91 15 a0 03 c3 b3 51 29 00 00 1c | |
Feb 19 00:48:17.882437: | 00 00 40 05 9b da 44 94 b3 06 ae c6 76 f1 bc 3c | |
Feb 19 00:48:17.882442: | 85 be 83 10 4b 11 ff c4 00 00 00 08 00 00 40 2e | |
Feb 19 00:48:17.882447: | inputs to hash2 (responder nonce) | |
Feb 19 00:48:17.882452: | 25 46 5d 54 0b 42 86 9b f5 b4 00 4f d4 9c e2 c3 | |
Feb 19 00:48:17.882457: | fa 19 e3 2d eb d8 6f 5a 7d 98 62 dd e8 4a d0 5d | |
Feb 19 00:48:17.882463: | idhash e9 25 b7 c8 ec 0d 26 d5 7f 86 6f 65 58 40 f9 c8 | |
Feb 19 00:48:17.882468: | idhash e2 20 3e e3 b0 45 a6 d2 90 e0 ff de a0 a3 57 a3 | |
Feb 19 00:48:17.882474: | sighash hash sha init | |
Feb 19 00:48:17.882484: | sighash sha hasher: context 0x5650b2745c00 | |
Feb 19 00:48:17.882491: | sighash hash sha digest first packet-chunk@0x5650b273c378 (length 224) | |
Feb 19 00:48:17.882501: | sighash hash sha digest nunce-chunk@0x7f2c44001f48 (length 32) | |
Feb 19 00:48:17.882509: | sighash hash sha digest IDHASH-bytes@0x7ffc03ebe440 (length 32) | |
Feb 19 00:48:17.882517: | sighash hash sha final bytes@0x7ffc03ebe320 (length 20) | |
Feb 19 00:48:17.882525: | sighash 5e a3 ff d5 0b 14 0d 35 e0 90 68 ff 73 80 23 38 | |
Feb 19 00:48:17.882531: | sighash 99 ce 14 6d | |
Feb 19 00:48:17.882538: | required CA is '\370' | |
Feb 19 00:48:17.882555: | checking keyid 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' | |
Feb 19 00:48:17.882566: | trusted_ca_nss: trustee A = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate' | |
Feb 19 00:48:17.882572: | trusted_ca_nss: trustor B = 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate' | |
Feb 19 00:48:17.882578: | same_dn_any_order: not an exact match, now checking any RDN order | |
Feb 19 00:48:17.882590: | match_dn_unordered A: C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=ca-certificate, B: | checking keyid 'C=US, ST=California, L=Beverly Hills, \320\332\353\003\374\177 | |
Feb 19 00:48:17.885674: | trusted_ca_nss: returning untrusted at pathlen 1 | |
Feb 19 00:48:17.885746: | checking keyid '@donkey-eager' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' | |
Feb 19 00:48:17.885759: | checking keyid '@159.89.116.29' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' | |
Feb 19 00:48:17.885774: | checking keyid 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=159.89.116.29' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' | |
Feb 19 00:48:17.885787: | checking keyid '159.89.116.29' for match with 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' | |
Feb 19 00:48:17.885801: "ikev2"[1] 162.222.81.188 #1: no RSA public key known for 'C=US, ST=California, L=Beverly Hills, O=ACME CORPORATION, OU=Anvil Department, CN=donkey-eager' | |
Feb 19 00:48:17.885809: "ikev2"[1] 162.222.81.188 #1: RSA authentication failed | |
Feb 19 00:48:17.885817: "ikev2"[1] 162.222.81.188 #1: sending unencrypted notification v2N_AUTHENTICATION_FAILED to 162.222.81.188:20573 | |
Feb 19 00:48:17.885824: | **emit ISAKMP Message: | |
Feb 19 00:48:17.885830: | initiator cookie: | |
Feb 19 00:48:17.885835: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:17.885840: | responder cookie: | |
Feb 19 00:48:17.885844: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:17.885850: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:17.885856: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:17.885862: | exchange type: ISAKMP_v2_SA_INIT (0x22) | |
Feb 19 00:48:17.885868: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:17.885873: | message ID: 00 00 00 00 | |
Feb 19 00:48:17.885879: | Adding a v2N Payload | |
Feb 19 00:48:17.885885: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:17.885890: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:17.885896: | flags: none (0x0) | |
Feb 19 00:48:17.885901: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:17.885906: | SPI size: 0 (0x0) | |
Feb 19 00:48:17.885911: | Notify Message Type: v2N_AUTHENTICATION_FAILED (0x18) | |
Feb 19 00:48:17.885917: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:17.885923: | no IKE message padding required for IKEv2 | |
Feb 19 00:48:17.885928: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:17.885938: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #1) | |
Feb 19 00:48:17.885944: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:17.885949: | b9 ee 22 9a 29 20 22 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:17.885954: | 00 00 00 08 00 00 00 18 | |
Feb 19 00:48:17.886093: | ikev2_parent_inI2outR2_tail returned STF_FATAL | |
Feb 19 00:48:17.886111: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in complete_v2_state_transition() at ikev2.c:2326) | |
Feb 19 00:48:17.886118: | #1 complete v2 state transition from STATE_PARENT_R1 with STF_FATAL | |
Feb 19 00:48:17.886128: | processing: [RE]START state #1 connection "ikev2"[1] 162.222.81.188 162.222.81.188:20573 (in delete_state() at state.c:879) | |
Feb 19 00:48:17.886136: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.886141: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.886148: "ikev2"[1] 162.222.81.188 #1: deleting state (STATE_PARENT_R1) | |
Feb 19 00:48:17.886155: | parent state #1: STATE_PARENT_R1(half-open-ike) => delete | |
Feb 19 00:48:17.886161: | state #1 requesting N/A-pe@(nil) be deleted | |
Feb 19 00:48:17.886166: | delete_pluto_event cannot delete NULL event | |
Feb 19 00:48:17.886171: | state #1 requesting N/A-pe@(nil) be deleted | |
Feb 19 00:48:17.886176: | delete_pluto_event cannot delete NULL event | |
Feb 19 00:48:17.886181: | state #1 requesting N/A-pe@(nil) be deleted | |
Feb 19 00:48:17.886186: | delete_pluto_event cannot delete NULL event | |
Feb 19 00:48:17.886210: | state #1 requesting N/A-pe@(nil) be deleted | |
Feb 19 00:48:17.886216: | delete_pluto_event cannot delete NULL event | |
Feb 19 00:48:17.886221: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | |
Feb 19 00:48:17.886231: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5650b273c278 | |
Feb 19 00:48:17.886245: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:17.886254: | serialno list: removing object 0x5650b273ace8 (state #1) entry 0x5650b273b478 (older 0x5650b265db80 newer 0x5650b265db80) | |
Feb 19 00:48:17.886259: | serialno list: empty | |
Feb 19 00:48:17.886266: | serialno table: removing object 0x5650b273ace8 (state #1) entry 0x5650b273b498 (older 0x5650b2652a80 newer 0x5650b2652a80) | |
Feb 19 00:48:17.886271: | serialno table: empty | |
Feb 19 00:48:17.886277: | in connection_discard for connection ikev2 | |
Feb 19 00:48:17.886282: | connection is instance | |
Feb 19 00:48:17.886287: | not in pending use | |
Feb 19 00:48:17.886292: | no states use this connection, deleting | |
Feb 19 00:48:17.886301: | processing: start connection "ikev2"[1] 162.222.81.188 (BACKGROUND) (in delete_connection() at connections.c:262) | |
Feb 19 00:48:17.886308: deleting connection "ikev2"[1] 162.222.81.188 instance with peer 162.222.81.188 {isakmp=#0/ipsec=#0} | |
Feb 19 00:48:17.886314: | Deleting states for connection - not including other IPsec SA's | |
Feb 19 00:48:17.886319: | pass 0 | |
Feb 19 00:48:17.886324: | pass 1 | |
Feb 19 00:48:17.886330: | unreference addresspool of conn ikev2[1] kind CK_GOING_AWAY refcnt 2 | |
Feb 19 00:48:17.886338: | processing: stop connection "ikev2" (BACKGROUND) (in delete_connection() at connections.c:312) | |
Feb 19 00:48:17.886352: | parent state #1: STATE_PARENT_R1(half-open-ike) => STATE_UNDEFINED(ignore) | |
Feb 19 00:48:17.886357: | ignore states: 0 | |
Feb 19 00:48:17.886362: | half-open-ike states: 0 | |
Feb 19 00:48:17.886366: | open-ike states: 0 | |
Feb 19 00:48:17.886371: | established-anonymous-ike states: 0 | |
Feb 19 00:48:17.886376: | established-authenticated-ike states: 0 | |
Feb 19 00:48:17.886380: | anonymous-ipsec states: 0 | |
Feb 19 00:48:17.886385: | authenticated-ipsec states: 0 | |
Feb 19 00:48:17.886390: | informational states: 0 | |
Feb 19 00:48:17.886395: | unknown states: 0 | |
Feb 19 00:48:17.886400: | category states: 0 count states: 0 | |
Feb 19 00:48:17.886408: | DH secret DH19@0x7f2c44001ef8: destroyed | |
Feb 19 00:48:17.886431: | processing: stop state #1 162.222.81.188:20573 (in delete_state() at state.c:1102) | |
Feb 19 00:48:17.886437: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.886443: | serialno table: hash serialno #1 to head 0x5650b2652a80 | |
Feb 19 00:48:17.886451: | delete_state: release st->st_shared_nss-key@0x5650b270a760 | |
Feb 19 00:48:17.886462: | delete_state: release st->st_skeyid_nss-key@NULL | |
Feb 19 00:48:17.886467: | delete_state: release st->st_skey_d_nss-key@0x5650b2708ee0 | |
Feb 19 00:48:17.886476: | delete_state: release st->st_skey_ai_nss-key@NULL | |
Feb 19 00:48:17.886481: | delete_state: release st->st_skey_ar_nss-key@NULL | |
Feb 19 00:48:17.886486: | delete_state: release st->st_skey_ei_nss-key@0x7f2c3c005460 | |
Feb 19 00:48:17.886494: | delete_state: release st->st_skey_er_nss-key@0x7f2c3c005130 | |
Feb 19 00:48:17.886503: | delete_state: release st->st_skey_pi_nss-key@0x7f2c3c006d10 | |
Feb 19 00:48:17.886511: | delete_state: release st->st_skey_pr_nss-key@0x7f2c3c008b30 | |
Feb 19 00:48:17.886519: | delete_state: release st->st_enc_key_nss-key@NULL | |
Feb 19 00:48:17.886525: | delete_state: release st->st_sk_d_no_ppk-key@NULL | |
Feb 19 00:48:17.886530: | delete_state: release st->st_sk_pi_no_ppk-key@NULL | |
Feb 19 00:48:17.886534: | delete_state: release st->st_sk_pr_no_ppk-key@NULL | |
Feb 19 00:48:17.886545: | processing: STOP state #0 (in handle_helper_answer() at pluto_crypt.c:592) | |
Feb 19 00:48:17.886551: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:17.886556: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.765859: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:20.796158: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.796203: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00 | |
Feb 19 00:48:20.796213: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38 | |
Feb 19 00:48:20.796218: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a | |
Feb 19 00:48:20.796224: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01 | |
Feb 19 00:48:20.796229: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be | |
Feb 19 00:48:20.796235: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c | |
Feb 19 00:48:20.796240: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6 | |
Feb 19 00:48:20.796245: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a | |
Feb 19 00:48:20.796251: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f | |
Feb 19 00:48:20.796257: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d | |
Feb 19 00:48:20.796262: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28 | |
Feb 19 00:48:20.796267: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9 | |
Feb 19 00:48:20.796273: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99 | |
Feb 19 00:48:20.796279: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47 | |
Feb 19 00:48:20.796284: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13 | |
Feb 19 00:48:20.796289: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c | |
Feb 19 00:48:20.796295: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf | |
Feb 19 00:48:20.796300: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27 | |
Feb 19 00:48:20.796306: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa | |
Feb 19 00:48:20.796311: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20 | |
Feb 19 00:48:20.796317: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19 | |
Feb 19 00:48:20.796322: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57 | |
Feb 19 00:48:20.796328: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89 | |
Feb 19 00:48:20.796333: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a | |
Feb 19 00:48:20.796338: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69 | |
Feb 19 00:48:20.796344: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01 | |
Feb 19 00:48:20.796349: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15 | |
Feb 19 00:48:20.796355: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7 | |
Feb 19 00:48:20.796360: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2 | |
Feb 19 00:48:20.796365: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34 | |
Feb 19 00:48:20.796370: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11 | |
Feb 19 00:48:20.796375: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06 | |
Feb 19 00:48:20.796380: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c | |
Feb 19 00:48:20.796393: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:20.796404: | **parse ISAKMP Message: | |
Feb 19 00:48:20.796411: | initiator cookie: | |
Feb 19 00:48:20.796416: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.796422: | responder cookie: | |
Feb 19 00:48:20.796427: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.796433: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:20.796440: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.796445: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.796452: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:20.796457: | message ID: 00 00 00 01 | |
Feb 19 00:48:20.796463: | length: 540 (0x21c) | |
Feb 19 00:48:20.796469: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:20.796475: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:20.796481: | I am the IKE SA Original Responder | |
Feb 19 00:48:20.796497: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:20.796503: | parent v2 state object not found | |
Feb 19 00:48:20.796510: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:20.796516: | selected state microcode roof | |
Feb 19 00:48:20.796521: | no useful state microcode entry found | |
Feb 19 00:48:20.796534: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:20.796549: | **emit ISAKMP Message: | |
Feb 19 00:48:20.796556: | initiator cookie: | |
Feb 19 00:48:20.796561: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.796566: | responder cookie: | |
Feb 19 00:48:20.796572: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.796578: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:20.796583: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.796589: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.796595: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:20.796601: | message ID: 00 00 00 00 | |
Feb 19 00:48:20.796608: | Adding a v2N Payload | |
Feb 19 00:48:20.796614: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:20.796620: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:20.796626: | flags: none (0x0) | |
Feb 19 00:48:20.796632: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:20.796637: | SPI size: 0 (0x0) | |
Feb 19 00:48:20.796643: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:20.796649: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:20.796655: | no IKEv1 message padding required | |
Feb 19 00:48:20.796661: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:20.796672: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:20.796678: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:20.796684: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:20.796689: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:20.796766: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:20.796781: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:20.796788: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.796794: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.796801: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:20.796850: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:20.796859: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.796864: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:20.796870: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24 | |
Feb 19 00:48:20.796875: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4 | |
Feb 19 00:48:20.796880: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29 | |
Feb 19 00:48:20.796886: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9 | |
Feb 19 00:48:20.796891: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd | |
Feb 19 00:48:20.796897: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70 | |
Feb 19 00:48:20.796902: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6 | |
Feb 19 00:48:20.796908: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57 | |
Feb 19 00:48:20.796913: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a | |
Feb 19 00:48:20.796919: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d | |
Feb 19 00:48:20.796924: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60 | |
Feb 19 00:48:20.796930: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73 | |
Feb 19 00:48:20.796935: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df | |
Feb 19 00:48:20.796940: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca | |
Feb 19 00:48:20.796946: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45 | |
Feb 19 00:48:20.796951: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34 | |
Feb 19 00:48:20.796957: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10 | |
Feb 19 00:48:20.796963: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59 | |
Feb 19 00:48:20.796968: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9 | |
Feb 19 00:48:20.796973: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20 | |
Feb 19 00:48:20.796979: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1 | |
Feb 19 00:48:20.796984: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8 | |
Feb 19 00:48:20.796990: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6 | |
Feb 19 00:48:20.797002: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a | |
Feb 19 00:48:20.797008: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f | |
Feb 19 00:48:20.797014: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44 | |
Feb 19 00:48:20.797019: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa | |
Feb 19 00:48:20.797025: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36 | |
Feb 19 00:48:20.797030: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93 | |
Feb 19 00:48:20.797036: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12 | |
Feb 19 00:48:20.797041: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72 | |
Feb 19 00:48:20.797047: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f | |
Feb 19 00:48:20.797054: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:20.797061: | **parse ISAKMP Message: | |
Feb 19 00:48:20.797067: | initiator cookie: | |
Feb 19 00:48:20.797072: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.797078: | responder cookie: | |
Feb 19 00:48:20.797083: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.797089: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:20.797095: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.797101: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.797107: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:20.797112: | message ID: 00 00 00 01 | |
Feb 19 00:48:20.797118: | length: 540 (0x21c) | |
Feb 19 00:48:20.797124: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:20.797130: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:20.797135: | I am the IKE SA Original Responder | |
Feb 19 00:48:20.797148: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:20.797154: | parent v2 state object not found | |
Feb 19 00:48:20.797160: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:20.797166: | selected state microcode roof | |
Feb 19 00:48:20.797171: | no useful state microcode entry found | |
Feb 19 00:48:20.797179: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:20.797185: | **emit ISAKMP Message: | |
Feb 19 00:48:20.797190: | initiator cookie: | |
Feb 19 00:48:20.797195: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.797200: | responder cookie: | |
Feb 19 00:48:20.797205: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.797211: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:20.797217: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.797223: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.797229: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:20.797234: | message ID: 00 00 00 00 | |
Feb 19 00:48:20.797240: | Adding a v2N Payload | |
Feb 19 00:48:20.797246: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:20.797251: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:20.797257: | flags: none (0x0) | |
Feb 19 00:48:20.797263: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:20.797268: | SPI size: 0 (0x0) | |
Feb 19 00:48:20.797274: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:20.797280: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:20.797285: | no IKEv1 message padding required | |
Feb 19 00:48:20.797291: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:20.797299: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:20.797305: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:20.797310: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:20.797315: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:20.797336: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:20.797345: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:20.797351: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.797357: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.797369: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:20.797391: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:20.797399: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.797405: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:20.797410: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8 | |
Feb 19 00:48:20.797415: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98 | |
Feb 19 00:48:20.797421: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db | |
Feb 19 00:48:20.797426: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c | |
Feb 19 00:48:20.797432: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a | |
Feb 19 00:48:20.797437: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d | |
Feb 19 00:48:20.797443: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5 | |
Feb 19 00:48:20.797448: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed | |
Feb 19 00:48:20.797453: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2 | |
Feb 19 00:48:20.797459: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5 | |
Feb 19 00:48:20.797464: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18 | |
Feb 19 00:48:20.797470: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49 | |
Feb 19 00:48:20.797475: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7 | |
Feb 19 00:48:20.797481: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71 | |
Feb 19 00:48:20.797486: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59 | |
Feb 19 00:48:20.797491: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d | |
Feb 19 00:48:20.797497: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e | |
Feb 19 00:48:20.797503: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98 | |
Feb 19 00:48:20.797508: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6 | |
Feb 19 00:48:20.797514: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3 | |
Feb 19 00:48:20.797519: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44 | |
Feb 19 00:48:20.797525: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83 | |
Feb 19 00:48:20.797530: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6 | |
Feb 19 00:48:20.797536: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6 | |
Feb 19 00:48:20.797541: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0 | |
Feb 19 00:48:20.797547: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4 | |
Feb 19 00:48:20.797552: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95 | |
Feb 19 00:48:20.797557: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa | |
Feb 19 00:48:20.797563: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f | |
Feb 19 00:48:20.797568: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c | |
Feb 19 00:48:20.797574: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b | |
Feb 19 00:48:20.797579: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7 | |
Feb 19 00:48:20.797586: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:20.797593: | **parse ISAKMP Message: | |
Feb 19 00:48:20.797599: | initiator cookie: | |
Feb 19 00:48:20.797604: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.797610: | responder cookie: | |
Feb 19 00:48:20.797615: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.797621: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:20.797626: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.797632: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.797638: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:20.797644: | message ID: 00 00 00 01 | |
Feb 19 00:48:20.797649: | length: 540 (0x21c) | |
Feb 19 00:48:20.797655: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:20.797661: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:20.797667: | I am the IKE SA Original Responder | |
Feb 19 00:48:20.797680: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:20.797685: | parent v2 state object not found | |
Feb 19 00:48:20.797691: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:20.797704: | selected state microcode roof | |
Feb 19 00:48:20.797709: | no useful state microcode entry found | |
Feb 19 00:48:20.797717: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:20.797723: | **emit ISAKMP Message: | |
Feb 19 00:48:20.797729: | initiator cookie: | |
Feb 19 00:48:20.797734: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.797739: | responder cookie: | |
Feb 19 00:48:20.797745: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.797750: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:20.797756: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.797762: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.797768: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:20.797774: | message ID: 00 00 00 00 | |
Feb 19 00:48:20.797779: | Adding a v2N Payload | |
Feb 19 00:48:20.797785: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:20.797791: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:20.797796: | flags: none (0x0) | |
Feb 19 00:48:20.797802: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:20.797808: | SPI size: 0 (0x0) | |
Feb 19 00:48:20.797814: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:20.797820: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:20.797825: | no IKEv1 message padding required | |
Feb 19 00:48:20.797831: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:20.797838: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:20.797844: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:20.797850: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:20.797855: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:20.797873: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:20.797882: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:20.797888: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.797894: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.797900: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:20.797921: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:20.797928: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.797934: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8 | |
Feb 19 00:48:20.797939: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86 | |
Feb 19 00:48:20.797945: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b | |
Feb 19 00:48:20.797950: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc | |
Feb 19 00:48:20.797956: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56 | |
Feb 19 00:48:20.797961: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26 | |
Feb 19 00:48:20.797967: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d | |
Feb 19 00:48:20.797972: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f | |
Feb 19 00:48:20.797978: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4 | |
Feb 19 00:48:20.797983: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16 | |
Feb 19 00:48:20.797989: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c | |
Feb 19 00:48:20.797994: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61 | |
Feb 19 00:48:20.798000: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5 | |
Feb 19 00:48:20.798005: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b | |
Feb 19 00:48:20.798011: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed | |
Feb 19 00:48:20.798016: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce | |
Feb 19 00:48:20.798022: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0 | |
Feb 19 00:48:20.798027: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47 | |
Feb 19 00:48:20.798033: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2 | |
Feb 19 00:48:20.798039: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50 | |
Feb 19 00:48:20.798044: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30 | |
Feb 19 00:48:20.798056: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5 | |
Feb 19 00:48:20.798062: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf | |
Feb 19 00:48:20.798068: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4 | |
Feb 19 00:48:20.798073: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65 | |
Feb 19 00:48:20.798079: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d | |
Feb 19 00:48:20.798084: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e | |
Feb 19 00:48:20.798090: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c | |
Feb 19 00:48:20.798095: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23 | |
Feb 19 00:48:20.798100: | 14 70 e4 81 | |
Feb 19 00:48:20.798108: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:20.798114: | **parse ISAKMP Message: | |
Feb 19 00:48:20.798120: | initiator cookie: | |
Feb 19 00:48:20.798125: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.798131: | responder cookie: | |
Feb 19 00:48:20.798136: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.798142: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:20.798148: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.798154: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.798160: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:20.798165: | message ID: 00 00 00 01 | |
Feb 19 00:48:20.798171: | length: 484 (0x1e4) | |
Feb 19 00:48:20.798177: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:20.798183: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:20.798187: | I am the IKE SA Original Responder | |
Feb 19 00:48:20.798198: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:20.798204: | parent v2 state object not found | |
Feb 19 00:48:20.798211: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:20.798216: | selected state microcode roof | |
Feb 19 00:48:20.798220: | no useful state microcode entry found | |
Feb 19 00:48:20.798227: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:20.798233: | **emit ISAKMP Message: | |
Feb 19 00:48:20.798238: | initiator cookie: | |
Feb 19 00:48:20.798243: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:20.798248: | responder cookie: | |
Feb 19 00:48:20.798252: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:20.798257: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:20.798262: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:20.798268: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:20.798273: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:20.798278: | message ID: 00 00 00 00 | |
Feb 19 00:48:20.798284: | Adding a v2N Payload | |
Feb 19 00:48:20.798289: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:20.798294: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:20.798300: | flags: none (0x0) | |
Feb 19 00:48:20.798305: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:20.798310: | SPI size: 0 (0x0) | |
Feb 19 00:48:20.798315: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:20.798321: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:20.798326: | no IKEv1 message padding required | |
Feb 19 00:48:20.798332: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:20.798340: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:20.798347: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:20.798353: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:20.798358: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:20.798384: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:20.798394: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:20.798401: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.798407: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:20.798413: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:23.765472: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:23.765786: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.765882: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00 | |
Feb 19 00:48:23.765968: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38 | |
Feb 19 00:48:23.766050: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a | |
Feb 19 00:48:23.766122: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01 | |
Feb 19 00:48:23.766190: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be | |
Feb 19 00:48:23.766258: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c | |
Feb 19 00:48:23.766272: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6 | |
Feb 19 00:48:23.766278: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a | |
Feb 19 00:48:23.766284: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f | |
Feb 19 00:48:23.766289: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d | |
Feb 19 00:48:23.766295: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28 | |
Feb 19 00:48:23.766300: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9 | |
Feb 19 00:48:23.766306: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99 | |
Feb 19 00:48:23.766311: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47 | |
Feb 19 00:48:23.766317: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13 | |
Feb 19 00:48:23.766323: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c | |
Feb 19 00:48:23.766328: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf | |
Feb 19 00:48:23.766334: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27 | |
Feb 19 00:48:23.766339: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa | |
Feb 19 00:48:23.766345: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20 | |
Feb 19 00:48:23.766350: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19 | |
Feb 19 00:48:23.766356: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57 | |
Feb 19 00:48:23.766361: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89 | |
Feb 19 00:48:23.766367: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a | |
Feb 19 00:48:23.766372: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69 | |
Feb 19 00:48:23.766378: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01 | |
Feb 19 00:48:23.766383: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15 | |
Feb 19 00:48:23.766389: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7 | |
Feb 19 00:48:23.766394: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2 | |
Feb 19 00:48:23.766400: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34 | |
Feb 19 00:48:23.766405: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11 | |
Feb 19 00:48:23.766411: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06 | |
Feb 19 00:48:23.766416: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c | |
Feb 19 00:48:23.766428: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:23.766438: | **parse ISAKMP Message: | |
Feb 19 00:48:23.766445: | initiator cookie: | |
Feb 19 00:48:23.766450: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.766455: | responder cookie: | |
Feb 19 00:48:23.766461: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.766468: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:23.766474: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.766480: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.766487: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:23.766493: | message ID: 00 00 00 01 | |
Feb 19 00:48:23.766499: | length: 540 (0x21c) | |
Feb 19 00:48:23.766506: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:23.766512: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:23.766518: | I am the IKE SA Original Responder | |
Feb 19 00:48:23.766532: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:23.766540: | parent v2 state object not found | |
Feb 19 00:48:23.766546: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:23.766552: | selected state microcode roof | |
Feb 19 00:48:23.766578: | no useful state microcode entry found | |
Feb 19 00:48:23.766593: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:23.766601: | **emit ISAKMP Message: | |
Feb 19 00:48:23.766608: | initiator cookie: | |
Feb 19 00:48:23.766613: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.766618: | responder cookie: | |
Feb 19 00:48:23.766624: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.766630: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:23.766636: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.766642: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.766648: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:23.766653: | message ID: 00 00 00 00 | |
Feb 19 00:48:23.766661: | Adding a v2N Payload | |
Feb 19 00:48:23.766666: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:23.766672: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:23.766678: | flags: none (0x0) | |
Feb 19 00:48:23.766684: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:23.766690: | SPI size: 0 (0x0) | |
Feb 19 00:48:23.766695: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:23.766702: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:23.766708: | no IKEv1 message padding required | |
Feb 19 00:48:23.766713: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:23.766724: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:23.766730: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:23.766736: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:23.766741: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:23.766782: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:23.766794: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:23.766801: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.766807: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.766815: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:23.768520: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:23.768700: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.769486: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:23.769585: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24 | |
Feb 19 00:48:23.769650: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4 | |
Feb 19 00:48:23.769710: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29 | |
Feb 19 00:48:23.769771: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9 | |
Feb 19 00:48:23.769832: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd | |
Feb 19 00:48:23.769911: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70 | |
Feb 19 00:48:23.769976: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6 | |
Feb 19 00:48:23.770040: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57 | |
Feb 19 00:48:23.770122: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a | |
Feb 19 00:48:23.770188: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d | |
Feb 19 00:48:23.770250: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60 | |
Feb 19 00:48:23.770311: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73 | |
Feb 19 00:48:23.770381: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df | |
Feb 19 00:48:23.770445: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca | |
Feb 19 00:48:23.770507: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45 | |
Feb 19 00:48:23.770571: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34 | |
Feb 19 00:48:23.770633: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10 | |
Feb 19 00:48:23.770706: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59 | |
Feb 19 00:48:23.770768: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9 | |
Feb 19 00:48:23.770829: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20 | |
Feb 19 00:48:23.770889: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1 | |
Feb 19 00:48:23.770973: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8 | |
Feb 19 00:48:23.771035: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6 | |
Feb 19 00:48:23.771097: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a | |
Feb 19 00:48:23.771157: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f | |
Feb 19 00:48:23.771218: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44 | |
Feb 19 00:48:23.771279: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa | |
Feb 19 00:48:23.771338: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36 | |
Feb 19 00:48:23.771402: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93 | |
Feb 19 00:48:23.771460: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12 | |
Feb 19 00:48:23.771517: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72 | |
Feb 19 00:48:23.771575: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f | |
Feb 19 00:48:23.771643: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:23.771706: | **parse ISAKMP Message: | |
Feb 19 00:48:23.771766: | initiator cookie: | |
Feb 19 00:48:23.771824: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.771896: | responder cookie: | |
Feb 19 00:48:23.771954: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.772009: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:23.772111: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.772186: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.772249: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:23.772314: | message ID: 00 00 00 01 | |
Feb 19 00:48:23.772374: | length: 540 (0x21c) | |
Feb 19 00:48:23.772441: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:23.772510: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:23.772587: | I am the IKE SA Original Responder | |
Feb 19 00:48:23.772614: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:23.772623: | parent v2 state object not found | |
Feb 19 00:48:23.772631: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:23.772637: | selected state microcode roof | |
Feb 19 00:48:23.772642: | no useful state microcode entry found | |
Feb 19 00:48:23.772656: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:23.772666: | **emit ISAKMP Message: | |
Feb 19 00:48:23.772673: | initiator cookie: | |
Feb 19 00:48:23.772679: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.772684: | responder cookie: | |
Feb 19 00:48:23.772689: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.772696: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:23.772702: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.772707: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.772714: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:23.772719: | message ID: 00 00 00 00 | |
Feb 19 00:48:23.772726: | Adding a v2N Payload | |
Feb 19 00:48:23.772732: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:23.772740: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:23.772745: | flags: none (0x0) | |
Feb 19 00:48:23.772750: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:23.772756: | SPI size: 0 (0x0) | |
Feb 19 00:48:23.772761: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:23.772767: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:23.772772: | no IKEv1 message padding required | |
Feb 19 00:48:23.772777: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:23.772787: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:23.772793: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:23.772798: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:23.772804: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:23.773590: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:23.773627: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:23.773658: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.773666: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.773672: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:23.773727: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:23.773737: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.773743: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:23.773748: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8 | |
Feb 19 00:48:23.773752: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98 | |
Feb 19 00:48:23.773757: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db | |
Feb 19 00:48:23.773762: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c | |
Feb 19 00:48:23.773767: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a | |
Feb 19 00:48:23.773771: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d | |
Feb 19 00:48:23.773776: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5 | |
Feb 19 00:48:23.773780: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed | |
Feb 19 00:48:23.773785: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2 | |
Feb 19 00:48:23.773790: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5 | |
Feb 19 00:48:23.773794: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18 | |
Feb 19 00:48:23.773799: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49 | |
Feb 19 00:48:23.773803: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7 | |
Feb 19 00:48:23.773808: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71 | |
Feb 19 00:48:23.773813: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59 | |
Feb 19 00:48:23.773818: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d | |
Feb 19 00:48:23.773823: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e | |
Feb 19 00:48:23.773828: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98 | |
Feb 19 00:48:23.773833: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6 | |
Feb 19 00:48:23.773838: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3 | |
Feb 19 00:48:23.773843: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44 | |
Feb 19 00:48:23.773848: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83 | |
Feb 19 00:48:23.773852: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6 | |
Feb 19 00:48:23.773856: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6 | |
Feb 19 00:48:23.773861: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0 | |
Feb 19 00:48:23.773866: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4 | |
Feb 19 00:48:23.774058: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95 | |
Feb 19 00:48:23.774076: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa | |
Feb 19 00:48:23.774082: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f | |
Feb 19 00:48:23.774086: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c | |
Feb 19 00:48:23.774091: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b | |
Feb 19 00:48:23.774096: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7 | |
Feb 19 00:48:23.774104: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:23.774112: | **parse ISAKMP Message: | |
Feb 19 00:48:23.774119: | initiator cookie: | |
Feb 19 00:48:23.774123: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.774128: | responder cookie: | |
Feb 19 00:48:23.774133: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.774139: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:23.774145: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.774151: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.774156: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:23.774161: | message ID: 00 00 00 01 | |
Feb 19 00:48:23.774166: | length: 540 (0x21c) | |
Feb 19 00:48:23.774172: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:23.774178: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:23.774183: | I am the IKE SA Original Responder | |
Feb 19 00:48:23.774195: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:23.774210: | parent v2 state object not found | |
Feb 19 00:48:23.774216: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:23.774221: | selected state microcode roof | |
Feb 19 00:48:23.774226: | no useful state microcode entry found | |
Feb 19 00:48:23.774348: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:23.774364: | **emit ISAKMP Message: | |
Feb 19 00:48:23.774403: | initiator cookie: | |
Feb 19 00:48:23.774411: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.774416: | responder cookie: | |
Feb 19 00:48:23.774421: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.774427: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:23.774432: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.774437: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.774443: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:23.774450: | message ID: 00 00 00 00 | |
Feb 19 00:48:23.774456: | Adding a v2N Payload | |
Feb 19 00:48:23.774462: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:23.774468: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:23.774473: | flags: none (0x0) | |
Feb 19 00:48:23.774479: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:23.774484: | SPI size: 0 (0x0) | |
Feb 19 00:48:23.774490: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:23.774496: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:23.774502: | no IKEv1 message padding required | |
Feb 19 00:48:23.774507: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:23.774517: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:23.774525: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:23.774531: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:23.774536: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:23.774631: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:23.774648: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:23.774656: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.774662: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.774668: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:23.774702: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:23.774712: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.774717: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8 | |
Feb 19 00:48:23.774721: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86 | |
Feb 19 00:48:23.774726: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b | |
Feb 19 00:48:23.774730: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc | |
Feb 19 00:48:23.774735: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56 | |
Feb 19 00:48:23.774740: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26 | |
Feb 19 00:48:23.774745: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d | |
Feb 19 00:48:23.774750: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f | |
Feb 19 00:48:23.774756: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4 | |
Feb 19 00:48:23.774761: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16 | |
Feb 19 00:48:23.774766: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c | |
Feb 19 00:48:23.774771: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61 | |
Feb 19 00:48:23.774777: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5 | |
Feb 19 00:48:23.774782: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b | |
Feb 19 00:48:23.774787: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed | |
Feb 19 00:48:23.774792: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce | |
Feb 19 00:48:23.774797: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0 | |
Feb 19 00:48:23.774802: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47 | |
Feb 19 00:48:23.774807: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2 | |
Feb 19 00:48:23.774812: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50 | |
Feb 19 00:48:23.774825: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30 | |
Feb 19 00:48:23.774830: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5 | |
Feb 19 00:48:23.774835: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf | |
Feb 19 00:48:23.774840: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4 | |
Feb 19 00:48:23.774844: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65 | |
Feb 19 00:48:23.774849: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d | |
Feb 19 00:48:23.774853: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e | |
Feb 19 00:48:23.774858: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c | |
Feb 19 00:48:23.774862: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23 | |
Feb 19 00:48:23.774867: | 14 70 e4 81 | |
Feb 19 00:48:23.774873: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:23.774879: | **parse ISAKMP Message: | |
Feb 19 00:48:23.774884: | initiator cookie: | |
Feb 19 00:48:23.775004: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.775018: | responder cookie: | |
Feb 19 00:48:23.775024: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.775030: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:23.775035: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.775040: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.775046: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:23.775051: | message ID: 00 00 00 01 | |
Feb 19 00:48:23.775056: | length: 484 (0x1e4) | |
Feb 19 00:48:23.775062: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:23.775067: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:23.775072: | I am the IKE SA Original Responder | |
Feb 19 00:48:23.775085: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:23.775091: | parent v2 state object not found | |
Feb 19 00:48:23.775097: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:23.775102: | selected state microcode roof | |
Feb 19 00:48:23.775107: | no useful state microcode entry found | |
Feb 19 00:48:23.775116: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:23.775123: | **emit ISAKMP Message: | |
Feb 19 00:48:23.775128: | initiator cookie: | |
Feb 19 00:48:23.775134: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:23.775139: | responder cookie: | |
Feb 19 00:48:23.775144: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:23.775149: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:23.775155: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:23.775161: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:23.775167: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:23.775172: | message ID: 00 00 00 00 | |
Feb 19 00:48:23.775179: | Adding a v2N Payload | |
Feb 19 00:48:23.775184: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:23.775190: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:23.775196: | flags: none (0x0) | |
Feb 19 00:48:23.775201: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:23.775206: | SPI size: 0 (0x0) | |
Feb 19 00:48:23.775211: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:23.775217: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:23.775223: | no IKEv1 message padding required | |
Feb 19 00:48:23.775228: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:23.775236: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:23.775242: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:23.775247: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:23.775252: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:23.775319: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:23.775335: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:23.775342: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.776887: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:23.777493: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:26.765975: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:26.766287: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.766379: | 35 20 23 08 00 00 00 01 00 00 02 1c 23 00 02 00 | |
Feb 19 00:48:26.766450: | 00 01 00 04 00 00 00 00 00 00 00 02 20 6a 1f 38 | |
Feb 19 00:48:26.766517: | f7 c8 6d fa 6c 49 08 b0 27 07 41 4a 43 f3 c3 6a | |
Feb 19 00:48:26.766585: | dd a8 17 b6 4f 70 98 dd 84 01 e8 59 23 3a 53 01 | |
Feb 19 00:48:26.766653: | fa 66 6d 4c 7c 8a 81 e5 34 cb f0 1a d9 ed 3c be | |
Feb 19 00:48:26.766720: | f0 e4 55 94 01 10 46 d0 14 16 a7 e2 ff a3 ff 4c | |
Feb 19 00:48:26.766788: | 84 f4 7c 51 2d e7 8a 69 29 bb 39 06 0d 0b 15 c6 | |
Feb 19 00:48:26.766857: | b6 40 b0 cd 13 f0 ed ce 06 8d 61 c1 25 a9 11 0a | |
Feb 19 00:48:26.766925: | 2e a6 88 96 d5 65 6d 5a 5d 3a aa 4d dd ca 3a 7f | |
Feb 19 00:48:26.766985: | 09 4c c3 6f 8c 5c a4 6c b1 36 82 4c 60 9a 18 2d | |
Feb 19 00:48:26.767043: | e9 5f 04 44 49 af 0c b0 8f 10 12 40 13 4c 01 28 | |
Feb 19 00:48:26.767101: | 43 f7 6e f5 61 81 00 27 49 f1 b0 ff 0e dc 51 d9 | |
Feb 19 00:48:26.767158: | 76 c3 3e 80 cb 98 4c 2d f6 f8 74 54 a6 3d 47 99 | |
Feb 19 00:48:26.767216: | 14 a7 8a a2 a4 58 e7 35 02 e5 58 d5 38 87 19 47 | |
Feb 19 00:48:26.767274: | 68 1a db 1e aa f5 f3 b1 e1 c7 9e d9 3b c0 7a 13 | |
Feb 19 00:48:26.767331: | a4 a9 90 22 67 6e 01 09 83 91 8e 66 28 73 21 9c | |
Feb 19 00:48:26.767386: | fb 4f bb d6 ba 9c ca d7 ac e6 e3 be a7 b8 48 cf | |
Feb 19 00:48:26.767441: | f9 d1 58 35 97 57 07 27 44 37 fb d5 c6 94 93 27 | |
Feb 19 00:48:26.767495: | bc ca 64 c9 b3 05 91 81 17 e4 c7 74 92 a7 eb fa | |
Feb 19 00:48:26.767549: | 1e cf ef e0 e3 05 8d 7c 2d a1 e3 fe a8 df 99 20 | |
Feb 19 00:48:26.767603: | 2a 5c a6 e0 d3 f0 2d a5 51 10 4c 5a 61 99 53 19 | |
Feb 19 00:48:26.767660: | 09 af 4f a7 1a 39 56 39 d7 cb 9e d7 ad c3 52 57 | |
Feb 19 00:48:26.767714: | 6f 0b 6d 09 cd 0a 2c bb 27 6f 91 68 29 1e c0 89 | |
Feb 19 00:48:26.767768: | d3 3a 76 3a 05 7e cc 37 48 4f 6c 10 2b 10 33 5a | |
Feb 19 00:48:26.767822: | 10 3b 96 b7 ac 90 78 6a ec 99 eb 0a 75 12 a8 69 | |
Feb 19 00:48:26.767896: | e6 2b f0 ef 66 c7 19 31 a4 f7 42 b0 16 71 c3 01 | |
Feb 19 00:48:26.767953: | 96 8d cf 4e 59 a6 bb 4e 44 fd c0 3b ae 0b a0 15 | |
Feb 19 00:48:26.768006: | e4 4a 44 bf 68 b9 ff 0f ef 16 23 c5 b8 c1 c6 d7 | |
Feb 19 00:48:26.768091: | 5a 58 28 52 ad b8 a0 87 3d fc 69 e6 0b 42 b5 d2 | |
Feb 19 00:48:26.768147: | c2 5e 0f 54 aa 16 f3 9b eb 5a 57 c6 c5 94 d0 34 | |
Feb 19 00:48:26.768204: | 2c a2 16 03 76 18 02 78 10 16 89 86 c1 ea a4 11 | |
Feb 19 00:48:26.768260: | 6f 11 ee be df 28 0a 57 a5 e2 a5 c4 d9 b4 50 06 | |
Feb 19 00:48:26.768317: | d8 2f 38 79 71 e6 42 f0 ba 6d 2c 1c | |
Feb 19 00:48:26.768382: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:26.768446: | **parse ISAKMP Message: | |
Feb 19 00:48:26.768505: | initiator cookie: | |
Feb 19 00:48:26.768562: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.768620: | responder cookie: | |
Feb 19 00:48:26.768675: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.768733: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:26.768792: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.768850: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.768918: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:26.768980: | message ID: 00 00 00 01 | |
Feb 19 00:48:26.769043: | length: 540 (0x21c) | |
Feb 19 00:48:26.769105: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:26.769170: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:26.769233: | I am the IKE SA Original Responder | |
Feb 19 00:48:26.769306: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:26.769395: | parent v2 state object not found | |
Feb 19 00:48:26.769458: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:26.769520: | selected state microcode roof | |
Feb 19 00:48:26.769580: | no useful state microcode entry found | |
Feb 19 00:48:26.769647: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:26.769710: | **emit ISAKMP Message: | |
Feb 19 00:48:26.769769: | initiator cookie: | |
Feb 19 00:48:26.769829: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.769887: | responder cookie: | |
Feb 19 00:48:26.769944: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.770001: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:26.770060: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.770120: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.770177: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:26.770233: | message ID: 00 00 00 00 | |
Feb 19 00:48:26.770289: | Adding a v2N Payload | |
Feb 19 00:48:26.770347: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:26.770407: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:26.770466: | flags: none (0x0) | |
Feb 19 00:48:26.770526: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:26.770586: | SPI size: 0 (0x0) | |
Feb 19 00:48:26.770646: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:26.770709: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:26.770770: | no IKEv1 message padding required | |
Feb 19 00:48:26.770831: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:26.770898: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:26.770960: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:26.771022: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:26.771083: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:26.771198: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:26.771271: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:26.771336: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.771398: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.771460: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:26.771807: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:26.771900: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.771963: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:26.772043: | 00 02 00 04 00 00 00 00 00 00 00 03 70 22 4b 24 | |
Feb 19 00:48:26.772109: | 6d d7 02 c6 c0 7f ff 97 7f 9c 05 93 0d d3 a5 a4 | |
Feb 19 00:48:26.772168: | 72 2f 06 9e 2f 94 3a 7a b5 15 b5 b1 5b 0b 09 29 | |
Feb 19 00:48:26.772226: | 32 ab 60 9c 58 03 6f 3c 04 d6 b8 d5 f1 d4 68 c9 | |
Feb 19 00:48:26.772284: | 6c 3d 54 2e ba 07 93 92 4e 48 da cb 0c fd d5 bd | |
Feb 19 00:48:26.772341: | 48 7b 7c 59 65 1d b3 6e 1d 2c 34 82 72 c6 68 70 | |
Feb 19 00:48:26.772400: | 08 8a 3f 12 24 46 53 c1 d8 5c b5 f2 bb af c4 b6 | |
Feb 19 00:48:26.772458: | d4 68 c7 f9 91 30 48 6f 0a 9c 2d d0 da 21 58 57 | |
Feb 19 00:48:26.772513: | b0 4e 9e 2d 33 cd f5 57 15 46 30 b6 73 ec 16 2a | |
Feb 19 00:48:26.772567: | ac 63 e9 4e d2 be 05 8a f3 9a 98 6c 93 5b 12 4d | |
Feb 19 00:48:26.772623: | c9 10 b5 ca 70 49 cb 07 82 07 11 53 31 d0 02 60 | |
Feb 19 00:48:26.772680: | e8 e2 9d c8 23 0e dc 62 16 a2 2e 2c 61 12 56 73 | |
Feb 19 00:48:26.772739: | ca 1b 44 b5 80 ab c8 f8 83 83 7e cd 3f 68 04 df | |
Feb 19 00:48:26.772799: | 7c c4 d8 be 94 16 b8 ca 0c 57 d6 48 85 5c c9 ca | |
Feb 19 00:48:26.772859: | d1 e4 44 72 ff db ea 1c 9b 4c f3 ac 18 a5 fd 45 | |
Feb 19 00:48:26.772920: | 97 53 b0 48 13 09 3b 3e b9 06 1d 8e c7 e2 25 34 | |
Feb 19 00:48:26.772980: | ab db 59 46 a0 27 3c b4 8c 4c 5b 71 7f 60 0e 10 | |
Feb 19 00:48:26.772994: | f0 62 d6 22 ee 55 86 f1 d8 34 8b 1a c8 51 71 59 | |
Feb 19 00:48:26.773000: | 68 0f 54 94 84 ef 7d d3 f6 d7 6b 49 3e 38 13 b9 | |
Feb 19 00:48:26.773006: | 40 55 24 9e 99 c1 eb 74 8d de aa eb 81 70 1e 20 | |
Feb 19 00:48:26.773031: | 71 f1 59 e0 07 7a 00 67 9b a7 71 2f 9b 55 7d c1 | |
Feb 19 00:48:26.773038: | 80 6a 0d 7c 96 fe 32 ab 78 6a 59 48 13 49 8e a8 | |
Feb 19 00:48:26.773043: | 20 9a 43 ef 7e 3f ce 30 28 57 84 8c 89 dd a5 d6 | |
Feb 19 00:48:26.773049: | 2e a1 f5 b8 52 dc 12 17 eb 98 d0 01 29 d9 de 3a | |
Feb 19 00:48:26.773054: | ca 27 69 65 35 e6 21 22 67 4a be fe e0 76 aa 1f | |
Feb 19 00:48:26.773060: | d8 ab 6b 26 35 10 af 33 5e 25 0f 8c 56 8c 63 44 | |
Feb 19 00:48:26.773065: | 22 e0 c6 e0 ca 41 f3 c0 0c 62 ad 67 fc 3e 04 fa | |
Feb 19 00:48:26.773071: | 05 c4 dd 5c e2 1c 5b db 1f 0e df 4c e7 b4 5d 36 | |
Feb 19 00:48:26.773076: | b0 85 24 7b c7 98 fe e3 76 23 f3 30 ad 2f 42 93 | |
Feb 19 00:48:26.773082: | d7 af d9 4c d6 94 3e c1 9b c2 73 1a cf 21 66 12 | |
Feb 19 00:48:26.773087: | 58 13 55 30 6f b2 cb 2a 0f 62 9f e8 66 6c 2a 72 | |
Feb 19 00:48:26.773093: | 50 cc c5 49 c5 16 61 f8 15 47 40 0f | |
Feb 19 00:48:26.773105: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:26.773115: | **parse ISAKMP Message: | |
Feb 19 00:48:26.773121: | initiator cookie: | |
Feb 19 00:48:26.773127: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.773132: | responder cookie: | |
Feb 19 00:48:26.773138: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.773144: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:26.773151: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.773157: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.773163: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:26.773169: | message ID: 00 00 00 01 | |
Feb 19 00:48:26.773175: | length: 540 (0x21c) | |
Feb 19 00:48:26.773181: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:26.773188: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:26.773193: | I am the IKE SA Original Responder | |
Feb 19 00:48:26.773210: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:26.773217: | parent v2 state object not found | |
Feb 19 00:48:26.773223: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:26.773229: | selected state microcode roof | |
Feb 19 00:48:26.773234: | no useful state microcode entry found | |
Feb 19 00:48:26.773248: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:26.773256: | **emit ISAKMP Message: | |
Feb 19 00:48:26.773262: | initiator cookie: | |
Feb 19 00:48:26.773268: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.773273: | responder cookie: | |
Feb 19 00:48:26.773278: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.773284: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:26.773290: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.773296: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.773302: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:26.773308: | message ID: 00 00 00 00 | |
Feb 19 00:48:26.773315: | Adding a v2N Payload | |
Feb 19 00:48:26.773321: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:26.773327: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:26.773333: | flags: none (0x0) | |
Feb 19 00:48:26.773339: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:26.773344: | SPI size: 0 (0x0) | |
Feb 19 00:48:26.773350: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:26.773356: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:26.773362: | no IKEv1 message padding required | |
Feb 19 00:48:26.773368: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:26.773379: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:26.773385: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:26.773391: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:26.773396: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:26.773504: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:26.773529: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:26.773537: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.773543: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.773550: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:26.773597: | *received 540 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:26.773605: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.773611: | 35 20 23 08 00 00 00 01 00 00 02 1c 00 00 02 00 | |
Feb 19 00:48:26.773617: | 00 03 00 04 00 00 00 00 00 00 00 04 13 b2 27 d8 | |
Feb 19 00:48:26.773622: | 3a b9 f3 ee 49 06 66 5b 24 11 a9 a7 87 8b 1e 98 | |
Feb 19 00:48:26.773628: | d0 d3 27 a5 05 0d c6 dd 4c 95 ba 20 ae f2 41 db | |
Feb 19 00:48:26.773633: | de 55 5a 78 e9 5b 4e 60 d2 d1 05 54 bb c4 4f 6c | |
Feb 19 00:48:26.773639: | 38 72 28 58 56 85 f6 e4 89 75 8b 39 9c 16 41 7a | |
Feb 19 00:48:26.773644: | 59 56 71 2a fc 54 ad a6 a2 c2 5c b2 25 2a d7 4d | |
Feb 19 00:48:26.773650: | 6d 88 4c cb 75 cf aa eb c9 6f 03 8d c2 4a 78 c5 | |
Feb 19 00:48:26.773655: | 04 0a 07 b2 29 71 a8 ee f9 03 b9 6d fb 5b a8 ed | |
Feb 19 00:48:26.773661: | 7c e6 82 50 26 a4 56 2c 04 35 60 05 61 b0 2c d2 | |
Feb 19 00:48:26.773666: | 5d b4 de 8f 17 52 ba 36 7d 0e 19 5d f9 a1 44 e5 | |
Feb 19 00:48:26.773672: | 4a 65 c0 fc 60 3e 9a d4 73 b1 52 c3 b9 01 d0 18 | |
Feb 19 00:48:26.773677: | eb 73 41 d3 7c 1d 6f e4 38 a7 ca 39 8d be 24 49 | |
Feb 19 00:48:26.773683: | 1b 49 1c bb cb 4e b3 6d e0 b8 39 f6 12 4a 33 b7 | |
Feb 19 00:48:26.773688: | 67 b1 a4 96 d3 e4 cd a6 19 95 75 1f b8 11 94 71 | |
Feb 19 00:48:26.773694: | 68 25 ab fe 63 09 05 85 b4 5e 7f 0f a0 07 ff 59 | |
Feb 19 00:48:26.773699: | f7 fd 9a 40 6f df c6 ab ba 1a e3 e5 bf 32 ab 0d | |
Feb 19 00:48:26.773705: | e1 bf 75 63 4d 7f dc 34 88 38 33 43 be 48 29 2e | |
Feb 19 00:48:26.773710: | fe ad 5a f8 cc e0 90 83 0c ac 45 89 7f d9 71 98 | |
Feb 19 00:48:26.773716: | d7 b6 bd bf 42 3c 71 01 29 0e cc 44 2f e8 7c e6 | |
Feb 19 00:48:26.773721: | 5c 98 16 e0 d0 10 ea 2c 61 77 1c a9 35 74 95 c3 | |
Feb 19 00:48:26.773727: | 5c 9b cb e0 14 74 f0 9e 9c a7 26 c7 66 82 5c 44 | |
Feb 19 00:48:26.773732: | ee 9c ce dc 32 7b a5 85 60 05 47 ce 32 03 73 83 | |
Feb 19 00:48:26.773738: | 60 25 e7 f0 32 04 ed 1f 6d 69 00 50 c1 69 cc c6 | |
Feb 19 00:48:26.773744: | 11 2e 90 35 8a ad 31 4e 75 11 74 4f 3a 5f 0c a6 | |
Feb 19 00:48:26.773749: | 55 3b ba a5 09 81 b1 af 32 a2 9c 6b 01 db 82 d0 | |
Feb 19 00:48:26.773754: | fc d8 6e ee 60 1b 17 3b d8 8d c5 96 33 31 cc e4 | |
Feb 19 00:48:26.773759: | 69 12 08 17 7b 07 cb d6 99 90 b1 d5 6c ae 42 95 | |
Feb 19 00:48:26.773764: | a0 93 ab 13 d2 03 31 b7 38 03 21 cb ae 69 ad aa | |
Feb 19 00:48:26.773769: | 54 08 fa 7d bc d1 de 87 84 df aa 9f 3c bb 91 5f | |
Feb 19 00:48:26.773774: | c6 db 25 35 63 ef 04 39 b7 0f f6 bd c4 ab 9c 4c | |
Feb 19 00:48:26.773780: | 08 39 15 33 21 ce e6 07 e8 1b 69 cb 0e 94 ed 5b | |
Feb 19 00:48:26.773785: | a5 a2 81 80 7f 83 3a 2d a2 cd 90 a7 | |
Feb 19 00:48:26.773793: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:26.773799: | **parse ISAKMP Message: | |
Feb 19 00:48:26.773805: | initiator cookie: | |
Feb 19 00:48:26.773811: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.773816: | responder cookie: | |
Feb 19 00:48:26.773821: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.773827: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:26.773833: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.773839: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.773845: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:26.773851: | message ID: 00 00 00 01 | |
Feb 19 00:48:26.773856: | length: 540 (0x21c) | |
Feb 19 00:48:26.773863: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:26.773868: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:26.773874: | I am the IKE SA Original Responder | |
Feb 19 00:48:26.773893: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:26.773899: | parent v2 state object not found | |
Feb 19 00:48:26.773905: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:26.773911: | selected state microcode roof | |
Feb 19 00:48:26.773916: | no useful state microcode entry found | |
Feb 19 00:48:26.773924: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:26.773930: | **emit ISAKMP Message: | |
Feb 19 00:48:26.773936: | initiator cookie: | |
Feb 19 00:48:26.773941: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.773947: | responder cookie: | |
Feb 19 00:48:26.773952: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.773958: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:26.773964: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.773970: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.773976: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:26.773981: | message ID: 00 00 00 00 | |
Feb 19 00:48:26.773987: | Adding a v2N Payload | |
Feb 19 00:48:26.773993: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:26.773999: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:26.774004: | flags: none (0x0) | |
Feb 19 00:48:26.774010: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:26.774015: | SPI size: 0 (0x0) | |
Feb 19 00:48:26.774021: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:26.774027: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:26.774033: | no IKEv1 message padding required | |
Feb 19 00:48:26.774039: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:26.774047: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:26.774053: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:26.774058: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:26.774064: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:26.774119: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:26.774131: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:26.774138: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.774144: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.774150: | processing: STOP connection NULL (in comm_handle() at demux.c:381) | |
Feb 19 00:48:26.774174: | *received 484 bytes from 162.222.81.188:20573 on eth0 (port=4500) | |
Feb 19 00:48:26.774182: | e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.774187: | 35 20 23 08 00 00 00 01 00 00 01 e4 00 00 01 c8 | |
Feb 19 00:48:26.774193: | 00 04 00 04 00 00 00 00 00 00 00 05 0d 61 ba 86 | |
Feb 19 00:48:26.774198: | 73 22 4e 29 ab 4e 5d ef 08 dc 1e 16 6f 6a 87 2b | |
Feb 19 00:48:26.774204: | 20 6e 38 d2 f2 51 43 33 03 c2 bf a7 41 14 80 fc | |
Feb 19 00:48:26.774209: | e0 db 8e f1 3c a8 e3 41 85 9f d9 2b d3 43 5b 56 | |
Feb 19 00:48:26.774215: | bb 4d 47 b2 05 17 56 fa 94 a3 25 78 21 28 c4 26 | |
Feb 19 00:48:26.774220: | 02 40 1e 03 0c 9e 9d bc 7c b9 0f 73 c6 5f d3 8d | |
Feb 19 00:48:26.774226: | d4 62 71 fd 8e 67 0a 23 97 54 f5 37 0e 13 40 8f | |
Feb 19 00:48:26.774231: | 05 0a 5c b6 0b 75 e0 b8 42 e6 36 78 34 7b 8c c4 | |
Feb 19 00:48:26.774236: | f6 f3 67 90 88 87 12 11 9b f5 5a 95 71 91 27 16 | |
Feb 19 00:48:26.774242: | da fc 83 81 c2 01 cb 56 13 c9 ce da 44 61 0e 5c | |
Feb 19 00:48:26.774248: | ac 21 2d c7 50 31 78 fc 0c 81 17 f4 66 29 a6 61 | |
Feb 19 00:48:26.774253: | 17 97 b7 28 26 8b c7 6a 21 67 d8 44 37 96 f3 b5 | |
Feb 19 00:48:26.774259: | 33 b9 89 3b 66 d8 36 2c a3 ee 29 24 64 2e 33 1b | |
Feb 19 00:48:26.774264: | 5d 5d 9a 09 74 5a 88 c5 d3 bd 17 b0 a9 0a 30 ed | |
Feb 19 00:48:26.774270: | fe ca bf c6 fa d1 9d 32 c7 27 b8 aa b4 67 00 ce | |
Feb 19 00:48:26.774275: | 89 95 40 9f 25 d1 98 a2 71 ef 47 a1 8e 4d 55 a0 | |
Feb 19 00:48:26.774280: | a6 c9 40 f1 c6 cf 40 04 c9 a0 73 f9 cd a4 f6 47 | |
Feb 19 00:48:26.774293: | ed b7 ff f3 2a 13 a3 6c fa e2 7d 6c d0 fe 0e d2 | |
Feb 19 00:48:26.774299: | 1b a4 6d f5 8b 81 05 c0 88 3a 02 44 84 6f f7 50 | |
Feb 19 00:48:26.774304: | b9 b4 e9 00 9a c7 12 04 4f a1 8a 3d da 09 be 30 | |
Feb 19 00:48:26.774310: | 1e c8 52 94 eb 09 a1 6a de 52 9b 08 fb ff 50 e5 | |
Feb 19 00:48:26.774315: | b3 3f 8f 0e 0f d8 15 d3 53 97 fa d2 20 1c 53 bf | |
Feb 19 00:48:26.774321: | 14 2e 5c c0 20 1a c3 72 02 b3 c4 f8 37 81 15 f4 | |
Feb 19 00:48:26.774326: | 2a 66 11 bd c4 97 d5 57 b9 02 ea c7 9e 76 c1 65 | |
Feb 19 00:48:26.774332: | 81 5e fb e3 d6 66 0e c2 86 e3 fb 25 f8 16 c7 9d | |
Feb 19 00:48:26.774337: | d0 f5 0d 55 a2 c9 ee f7 fc e0 bb 52 06 ca 2a 2e | |
Feb 19 00:48:26.774343: | 78 1f eb 9f bd 3e 81 2f 2a e4 f3 b2 84 1f a2 0c | |
Feb 19 00:48:26.774348: | 3b e2 38 0f 22 35 5e 12 13 23 4e 90 31 00 47 23 | |
Feb 19 00:48:26.774353: | 14 70 e4 81 | |
Feb 19 00:48:26.774359: | processing: start from 162.222.81.188:20573 (in comm_handle() at demux.c:373) | |
Feb 19 00:48:26.774366: | **parse ISAKMP Message: | |
Feb 19 00:48:26.774371: | initiator cookie: | |
Feb 19 00:48:26.774377: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.774382: | responder cookie: | |
Feb 19 00:48:26.774387: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.774393: | next payload type: ISAKMP_NEXT_v2SKF (0x35) | |
Feb 19 00:48:26.774399: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.774405: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.774411: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | |
Feb 19 00:48:26.774416: | message ID: 00 00 00 01 | |
Feb 19 00:48:26.774422: | length: 484 (0x1e4) | |
Feb 19 00:48:26.774428: | processing version=2.0 packet with exchange type=ISAKMP_v2_AUTH (35) | |
Feb 19 00:48:26.774434: | I am receiving an IKEv2 Request ISAKMP_v2_AUTH | |
Feb 19 00:48:26.774439: | I am the IKE SA Original Responder | |
Feb 19 00:48:26.774452: | cookies table: hash icookie e5 e9 88 9b 1f fd dd 07 rcookie 5d 14 f4 63 b9 ee 22 9a to 15653435803944118534 slot 0x5650b264db40 | |
Feb 19 00:48:26.774457: | parent v2 state object not found | |
Feb 19 00:48:26.774463: | from_state is STATE_UNDEFINED | |
Feb 19 00:48:26.774468: | selected state microcode roof | |
Feb 19 00:48:26.774473: | no useful state microcode entry found | |
Feb 19 00:48:26.774481: packet from 162.222.81.188:20573: sending unencrypted notification v2N_INVALID_IKE_SPI to 162.222.81.188:20573 | |
Feb 19 00:48:26.774487: | **emit ISAKMP Message: | |
Feb 19 00:48:26.774493: | initiator cookie: | |
Feb 19 00:48:26.774498: | e5 e9 88 9b 1f fd dd 07 | |
Feb 19 00:48:26.774504: | responder cookie: | |
Feb 19 00:48:26.774509: | 5d 14 f4 63 b9 ee 22 9a | |
Feb 19 00:48:26.774515: | next payload type: ISAKMP_NEXT_v2N (0x29) | |
Feb 19 00:48:26.774521: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | |
Feb 19 00:48:26.774527: | exchange type: ISAKMP_v2_AUTH (0x23) | |
Feb 19 00:48:26.774533: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) | |
Feb 19 00:48:26.774538: | message ID: 00 00 00 00 | |
Feb 19 00:48:26.774544: | Adding a v2N Payload | |
Feb 19 00:48:26.774549: | ***emit IKEv2 Notify Payload: | |
Feb 19 00:48:26.774555: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | |
Feb 19 00:48:26.774561: | flags: none (0x0) | |
Feb 19 00:48:26.774567: | Protocol ID: PROTO_v2_RESERVED (0x0) | |
Feb 19 00:48:26.774572: | SPI size: 0 (0x0) | |
Feb 19 00:48:26.774578: | Notify Message Type: v2N_INVALID_IKE_SPI (0x4) | |
Feb 19 00:48:26.774584: | emitting length of IKEv2 Notify Payload: 8 | |
Feb 19 00:48:26.774590: | no IKEv1 message padding required | |
Feb 19 00:48:26.774595: | emitting length of ISAKMP Message: 36 | |
Feb 19 00:48:26.774603: | sending 40 bytes for v2 notify through eth0:4500 to 162.222.81.188:20573 (using #0) | |
Feb 19 00:48:26.774609: | 00 00 00 00 e5 e9 88 9b 1f fd dd 07 5d 14 f4 63 | |
Feb 19 00:48:26.774615: | b9 ee 22 9a 29 20 23 20 00 00 00 00 00 00 00 24 | |
Feb 19 00:48:26.774620: | 00 00 00 08 00 00 00 04 | |
Feb 19 00:48:26.774669: | processing: stop from 162.222.81.188:20573 (in comm_handle() at demux.c:375) | |
Feb 19 00:48:26.774683: | processing: STOP state #0 (in comm_handle() at demux.c:380) | |
Feb 19 00:48:26.774695: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.774701: | serialno table: hash serialno #0 to head 0x5650b2652a60 | |
Feb 19 00:48:26.774707: | processing: STOP connection NULL (in comm_handle() at demux.c:381) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment