Skip to content

Instantly share code, notes, and snippets.

@williamsjj
Created December 3, 2014 19:55
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save williamsjj/0b1b58fe8bb216ccf275 to your computer and use it in GitHub Desktop.
Save williamsjj/0b1b58fe8bb216ccf275 to your computer and use it in GitHub Desktop.
"OPSGENESIS" #1: initiating Main Mode
"OPSGENESIS" #1: received Vendor ID payload [RFC 3947] method set to=115
"OPSGENESIS" #1: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
"OPSGENESIS" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
"OPSGENESIS" #1: STATE_MAIN_I2: sent MI2, expecting MR2
"OPSGENESIS" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
"OPSGENESIS" #1: STATE_MAIN_I3: sent MI3, expecting MR3
"OPSGENESIS" #1: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
"OPSGENESIS" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #2: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:d41116d7 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536}
"OPSGENESIS" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=d41116d7
"OPSGENESIS" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
"OPSGENESIS" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02350 <0x2f28d881 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none}
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #1: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #1: received Delete SA payload: replace IPSEC State #2 in 10 seconds
"OPSGENESIS" #1: received and ignored informational message
"OPSGENESIS" #1: received Delete SA payload: deleting ISAKMP State #1
packet from 1.2.3.4:4500: received and ignored informational message
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #3: responding to Main Mode
"OPSGENESIS" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"OPSGENESIS" #3: STATE_MAIN_R1: sent MR1, expecting MI2
"OPSGENESIS" #3: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"OPSGENESIS" #3: STATE_MAIN_R2: sent MR2, expecting MI3
"OPSGENESIS" #3: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"OPSGENESIS" #3: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"OPSGENESIS" #3: new NAT mapping for #3, was 1.2.3.4:500, now 1.2.3.4:4500
"OPSGENESIS" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #3: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0
"OPSGENESIS" #4: responding to Quick Mode proposal {msgid:43ccc015}
"OPSGENESIS" #4: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4
"OPSGENESIS" #4: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27
"OPSGENESIS" #4: keeping refhim=4294901761 during rekey
"OPSGENESIS" #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"OPSGENESIS" #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"OPSGENESIS" #4: next payload type of ISAKMP Hash Payload has an unknown value: 190
"OPSGENESIS" #4: malformed payload in packet
| payload malformed after IV
| e5 e8 5b 71 19 c4 c3 d3
"OPSGENESIS" #4: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #3: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #5: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #2 {using isakmp#3 msgid:0bb6a0dd proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536}
"OPSGENESIS" #4: next payload type of ISAKMP Hash Payload has an unknown value: 190
"OPSGENESIS" #4: malformed payload in packet
| payload malformed after IV
| e5 e8 5b 71 19 c4 c3 d3
"OPSGENESIS" #4: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #3: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #3: received Delete SA payload: deleting ISAKMP State #3
packet from 1.2.3.4:4500: received and ignored informational message
"OPSGENESIS" #2: IPsec SA expired (LATEST!)
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #6: responding to Main Mode
"OPSGENESIS" #6: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"OPSGENESIS" #6: STATE_MAIN_R1: sent MR1, expecting MI2
"OPSGENESIS" #6: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #6: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"OPSGENESIS" #6: STATE_MAIN_R2: sent MR2, expecting MI3
"OPSGENESIS" #6: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"OPSGENESIS" #6: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #6: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"OPSGENESIS" #6: new NAT mapping for #6, was 1.2.3.4:500, now 1.2.3.4:4500
"OPSGENESIS" #6: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #6: retransmitting in response to duplicate packet; already STATE_MAIN_R3
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #7: responding to Main Mode
"OPSGENESIS" #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"OPSGENESIS" #7: STATE_MAIN_R1: sent MR1, expecting MI2
"OPSGENESIS" #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"OPSGENESIS" #7: STATE_MAIN_R2: sent MR2, expecting MI3
"OPSGENESIS" #7: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"OPSGENESIS" #7: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #7: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"OPSGENESIS" #7: new NAT mapping for #7, was 1.2.3.4:500, now 1.2.3.4:4500
"OPSGENESIS" #7: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #7: retransmitting in response to duplicate packet; already STATE_MAIN_R3
"OPSGENESIS" #7: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0
"OPSGENESIS" #8: responding to Quick Mode proposal {msgid:81b11bc1}
"OPSGENESIS" #8: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4
"OPSGENESIS" #8: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27
"OPSGENESIS" #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"OPSGENESIS" #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"OPSGENESIS" #8: next payload type of ISAKMP Hash Payload has an unknown value: 113
"OPSGENESIS" #8: malformed payload in packet
| payload malformed after IV
| cf 08 92 3a 93 4c b0 a9
"OPSGENESIS" #8: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #8: next payload type of ISAKMP Hash Payload has an unknown value: 113
"OPSGENESIS" #8: malformed payload in packet
| payload malformed after IV
| cf 08 92 3a 93 4c b0 a9
"OPSGENESIS" #8: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #7: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #7: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #8: next payload type of ISAKMP Hash Payload has an unknown value: 113
"OPSGENESIS" #8: malformed payload in packet
| payload malformed after IV
| cf 08 92 3a 93 4c b0 a9
"OPSGENESIS" #8: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #7: received Delete SA payload: deleting ISAKMP State #7
packet from 1.2.3.4:4500: received and ignored informational message
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #9: responding to Main Mode
"OPSGENESIS" #9: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"OPSGENESIS" #9: STATE_MAIN_R1: sent MR1, expecting MI2
"OPSGENESIS" #9: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #9: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"OPSGENESIS" #9: STATE_MAIN_R2: sent MR2, expecting MI3
"OPSGENESIS" #9: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"OPSGENESIS" #9: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #9: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"OPSGENESIS" #9: new NAT mapping for #9, was 1.2.3.4:500, now 1.2.3.4:4500
"OPSGENESIS" #9: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #9: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0
"OPSGENESIS" #10: responding to Quick Mode proposal {msgid:772c49d7}
"OPSGENESIS" #10: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4
"OPSGENESIS" #10: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27
"OPSGENESIS" #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"OPSGENESIS" #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"OPSGENESIS" #10: next payload type of ISAKMP Hash Payload has an unknown value: 132
"OPSGENESIS" #10: malformed payload in packet
| payload malformed after IV
| 6a e0 d2 40 9c 71 28 37
"OPSGENESIS" #10: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #10: next payload type of ISAKMP Hash Payload has an unknown value: 132
"OPSGENESIS" #10: malformed payload in packet
| payload malformed after IV
| 6a e0 d2 40 9c 71 28 37
"OPSGENESIS" #10: sending notification PAYLOAD_MALFORMED to 1.2.3.4:4500
"OPSGENESIS" #9: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"OPSGENESIS" #10: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02354 <0x92c21ac4 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none}
"OPSGENESIS" #5: max number of retransmissions (2) reached STATE_QUICK_I1
"OPSGENESIS" #5: starting keying attempt 2 of an unlimited number
"OPSGENESIS" #11: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #5 {using isakmp#9 msgid:ca6aaed4 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=OAKLEY_GROUP_MODP1536}
"OPSGENESIS" #11: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=ca6aaed4
"OPSGENESIS" #11: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
"OPSGENESIS" #11: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xe3a02355 <0x7f676315 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none}
"OPSGENESIS" #11: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
"OPSGENESIS" #11: sending encrypted notification INVALID_PAYLOAD_TYPE to 1.2.3.4:4500
"OPSGENESIS" #11: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
"OPSGENESIS" #11: sending encrypted notification INVALID_PAYLOAD_TYPE to 1.2.3.4:4500
"OPSGENESIS" #9: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #11: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
"OPSGENESIS" #11: sending encrypted notification INVALID_PAYLOAD_TYPE to 1.2.3.4:4500
"OPSGENESIS" #9: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #9: received Delete SA(0xe3a02354) payload: deleting IPSEC State #10
"OPSGENESIS" #9: received and ignored informational message
"OPSGENESIS" #9: received Delete SA payload: deleting ISAKMP State #9
packet from 1.2.3.4:4500: received and ignored informational message
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #12: responding to Main Mode
"OPSGENESIS" #12: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"OPSGENESIS" #12: STATE_MAIN_R1: sent MR1, expecting MI2
"OPSGENESIS" #12: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #12: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"OPSGENESIS" #12: STATE_MAIN_R2: sent MR2, expecting MI3
"OPSGENESIS" #12: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"OPSGENESIS" #12: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #12: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"OPSGENESIS" #12: new NAT mapping for #12, was 1.2.3.4:500, now 1.2.3.4:4500
"OPSGENESIS" #12: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #12: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0
"OPSGENESIS" #13: responding to Quick Mode proposal {msgid:79274296}
"OPSGENESIS" #13: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4
"OPSGENESIS" #13: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27
"OPSGENESIS" #13: keeping refhim=4294901761 during rekey
"OPSGENESIS" #13: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"OPSGENESIS" #13: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"OPSGENESIS" #13: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"OPSGENESIS" #13: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02356 <0x393ee03c xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none}
"OPSGENESIS" #12: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #12: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #12: DPD: received old or duplicate R_U_THERE
"OPSGENESIS" #12: received Delete SA payload: replace IPSEC State #13 in 10 seconds
"OPSGENESIS" #12: received and ignored informational message
"OPSGENESIS" #12: received Delete SA payload: deleting ISAKMP State #12
packet from 1.2.3.4:4500: received and ignored informational message
packet from 1.2.3.4:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 1.2.3.4:500: ignoring unknown Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
packet from 1.2.3.4:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 1.2.3.4:500: received Vendor ID payload [Dead Peer Detection]
"OPSGENESIS" #14: responding to Main Mode
"OPSGENESIS" #14: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"OPSGENESIS" #14: STATE_MAIN_R1: sent MR1, expecting MI2
"OPSGENESIS" #14: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
"OPSGENESIS" #14: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"OPSGENESIS" #14: STATE_MAIN_R2: sent MR2, expecting MI3
"OPSGENESIS" #14: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"OPSGENESIS" #14: Main mode peer ID is ID_IPV4_ADDR: '1.2.3.4'
"OPSGENESIS" #14: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"OPSGENESIS" #14: new NAT mapping for #14, was 1.2.3.4:500, now 1.2.3.4:4500
"OPSGENESIS" #14: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
"OPSGENESIS" #14: retransmitting in response to duplicate packet; already STATE_MAIN_R3
"OPSGENESIS" #14: the peer proposed: 10.1.0.1/32:0/0 -> 172.16.1.0/27:0/0
"OPSGENESIS" #15: responding to Quick Mode proposal {msgid:4263fec4}
"OPSGENESIS" #15: us: 10.1.0.1/32===2.2.3.5<2.2.3.5>---2.2.3.4
"OPSGENESIS" #15: them: 2.2.3.4---1.2.3.4<1.2.3.4>===172.16.1.0/27
"OPSGENESIS" #15: keeping refhim=4294901761 during rekey
"OPSGENESIS" #15: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"OPSGENESIS" #15: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"OPSGENESIS" #15: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"OPSGENESIS" #15: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP/NAT=>0xe3a02357 <0xaf192574 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=1.2.3.4:4500 DPD=none}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment