[root@FA520]# ping 10.2.111.0 Using fallback suid method PING klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. 10klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 .2ip=c0a800c8->0a026f00 .1klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:1411 00.0:01 (:0210:03.2:04.1:0511:00.0:01)::02 5:036 :04da:05ta:08 b:00yt esklips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58831 frag_off:0 ttl:64 proto:4 chk:43942 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58831 frag_off:0 ttl:64 proto:4 chk:43942 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 cf 00 00 40 32 ab a6 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 14 c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 05 7f cd 01 00 00 klips_debug: @040: 2b 99 50 47 40 d1 0c 00 00 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 klips_debug: @060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 klips_debug: @070: 00 00 00 10 5c fd ff bf 01 02 02 04 51 4c 7a 66 klips_debug: @080: 8d 57 d2 eb 73 ee 8d 83 klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58831 frag_off:0 ttl:64 proto:50 (ESP) chk:43864 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58831 frag_off:0 ttl:64 proto:50 (ESP) chk:43864 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58831 frag_off:0 ttl:64 proto:50 (ESP) chk:43864 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58832 frag_off:0 ttl:64 proto:4 chk:43941 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58832 frag_off:0 ttl:64 proto:4 chk:43941 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d0 00 00 40 32 ab a5 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 15 c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 2a 56 cd 01 01 00 klips_debug: @040: 2e 99 50 47 80 a9 03 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 53 57 32 25 klips_debug: @080: e7 13 75 05 6b bc ca 6d klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58832 frag_off:0 ttl:64 proto:50 (ESP) chk:43863 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58832 frag_off:0 ttl:64 proto:50 (ESP) chk:43863 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58832 frag_off:0 ttl:64 proto:50 (ESP) chk:43863 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58833 frag_off:0 ttl:64 proto:4 chk:43940 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58833 frag_off:0 ttl:64 proto:4 chk:43940 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d1 00 00 40 32 ab a4 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 16 c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 c1 89 cd 01 02 00 klips_debug: @040: 30 99 50 47 e0 75 09 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 d5 3a 87 b3 klips_debug: @080: 51 eb f1 f1 f3 6a 17 98 klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58833 frag_off:0 ttl:64 proto:50 (ESP) chk:43862 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58833 frag_off:0 ttl:64 proto:50 (ESP) chk:43862 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58833 frag_off:0 ttl:64 proto:50 (ESP) chk:43862 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58834 frag_off:0 ttl:64 proto:4 chk:43939 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58834 frag_off:0 ttl:64 proto:4 chk:43939 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d2 00 00 40 32 ab a3 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 17 c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 a6 ff cd 01 03 00 klips_debug: @040: 33 99 50 47 00 00 00 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 09 ca 39 82 klips_debug: @080: 1e 5a 02 8f f2 08 b0 7f klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58834 frag_off:0 ttl:64 proto:50 (ESP) chk:43861 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58834 frag_off:0 ttl:64 proto:50 (ESP) chk:43861 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58834 frag_off:0 ttl:64 proto:50 (ESP) chk:43861 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58835 frag_off:0 ttl:64 proto:4 chk:43938 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58835 frag_off:0 ttl:64 proto:4 chk:43938 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d3 00 00 40 32 ab a2 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 18 c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 3e 33 cd 01 04 00 klips_debug: @040: 35 99 50 47 60 cc 05 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 a2 68 f4 1b klips_debug: @080: 7d 43 d8 0e e4 3e 0b f2 klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58835 frag_off:0 ttl:64 proto:50 (ESP) chk:43860 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58835 frag_off:0 ttl:64 proto:50 (ESP) chk:43860 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58835 frag_off:0 ttl:64 proto:50 (ESP) chk:43860 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58836 frag_off:0 ttl:64 proto:4 chk:43937 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58836 frag_off:0 ttl:64 proto:4 chk:43937 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d4 00 00 40 32 ab a1 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 19 c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 d5 66 cd 01 05 00 klips_debug: @040: 37 99 50 47 c0 98 0b 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 84 1e fa 3f klips_debug: @080: ef 51 8e 38 a2 98 87 ee klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58836 frag_off:0 ttl:64 proto:50 (ESP) chk:43859 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58836 frag_off:0 ttl:64 proto:50 (ESP) chk:43859 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58836 frag_off:0 ttl:64 proto:50 (ESP) chk:43859 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58837 frag_off:0 ttl:64 proto:4 chk:43936 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58837 frag_off:0 ttl:64 proto:4 chk:43936 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d5 00 00 40 32 ab a0 c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 1a c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 ba dc cd 01 06 00 klips_debug: @040: 3a 99 50 47 e0 22 02 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 09 85 a7 57 klips_debug: @080: d3 ca 21 79 cb 80 c3 22 klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58837 frag_off:0 ttl:64 proto:50 (ESP) chk:43858 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58837 frag_off:0 ttl:64 proto:50 (ESP) chk:43858 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58837 frag_off:0 ttl:64 proto:50 (ESP) chk:43858 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=ipsec0->eth0 dev_addr=00:01:02:03:04:05 ip=c0a800c8->0a026f00 klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=98 hard_header_len:14 00:01:02:03:04:05:00:01:02:03:04:05:08:00 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 2,28 klips_debug:ipsec_findroute: 192.168.0.200:0->10.2.111.0:0 1 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=c0a800c8, er=0pc0b7d480, daddr=a026f00, er_dst=d34e545d, proto=1 sport=0 dport=0 klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=140 of SA:tun.1004@211.78.84.93 requested. klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA: tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 20,0 klips_debug:ipsec_xmit_encap_bundle: calling room for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 16,16 klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 2,28 before applying xforms with head,tailroom: 36,16 . klips_debug:ipsec_xmit_encap_bundle: mtu:1500 physmtu:1500 tothr:36 tottr:16 mtudiff:52 ippkttotlen:84 klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1500 decreased by 57 to 1443 klips_debug:ipsec_xmit_encap_bundle: allocating 14 bytes for hardheader. klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 16,28 after hard_header stripped. klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 68,40 after allocation klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:0 DF frag_off:0 ttl:64 proto:1 (ICMP) chk:55 saddr:192.168.0.200 daddr:10.2.111.0 type:code=8:0 klips_debug:ipsec_xmit_encap_once: calling output for , SA:tun.1004@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 20 bytes, putting 0, proto 4. klips_debug:ipsec_xmit_encap_once: head,tailroom: 48,40 before xform. klips_debug:ipsec_xmit_encap_once: after , SA:tun.1004@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58838 frag_off:0 ttl:64 proto:4 chk:43935 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:58838 frag_off:0 ttl:64 proto:4 chk:43935 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_xmit_encap_once: calling output for , SA:esp.e666fabc@211.78.84.93 klips_debug:ipsec_xmit_encap_once: pushing 16 bytes, putting 16, proto 50. klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform. klips_dmp: at pre-encrypt, len=136: klips_debug: @000: 45 00 00 88 e5 d6 00 00 40 32 ab 9f c0 a8 00 c8 klips_debug: @010: d3 4e 54 5d e6 66 fa bc 00 00 00 1b c0 a8 00 c8 klips_debug: @020: d3 4e 54 5d 45 00 00 54 00 00 40 00 40 01 00 37 klips_debug: @030: c0 a8 00 c8 0a 02 6f 00 08 00 52 10 cd 01 07 00 klips_debug: @040: 3c 99 50 47 40 ef 07 00 16 00 00 00 00 00 00 00 klips_debug: @050: 00 00 00 00 c8 70 0a 40 14 fd ff bf 00 00 00 00 klips_debug: @060: 40 00 00 00 20 88 07 00 01 00 00 00 b8 25 08 00 klips_debug: @070: 60 04 02 40 74 fd ff bf 01 02 02 04 1f 4f da 0e klips_debug: @080: cf 79 db b9 a4 e4 31 cb klips_debug:ipsec_alg_esp_encrypt: entering with encalg=3, ixt_e=c4faa9e4 klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=3 ips_key_e=c0d16400 idat=c0b7d2c4 ilen=88 iv=c0b7d2bc, encrypt=1 klips_debug:ipsec_alg_esp_encrypt: returned ret=1 klips_debug:ipsec_xmit_encap_once: after , SA:esp.e666fabc@211.78.84.93: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58838 frag_off:0 ttl:64 proto:50 (ESP) chk:43857 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58838 frag_off:0 ttl:64 proto:50 (ESP) chk:43857 saddr:192.168.0.200 daddr:211.78.84.93 klips_error:ipsec_sa_put: null pointer passed in! klips_debug:ipsec_findroute: 192.168.0.200:0->211.78.84.93:0 50 klips_debug:rj_match: * See if we match exactly as a host destination klips_debug:rj_match: ** try to match a leaf, t=0pc0b7d480 klips_debug:rj_match: *** start searching up the tree, t=0pc0b7d480 klips_debug:rj_match: **** t=0pc0b7d498 klips_debug:rj_match: **** t=0pc0a10820 klips_debug:rj_match: ***** cp2=0pc117d708 cp3=0pc0fda670 klips_debug:rj_match: ***** not found. klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24 klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 18,24 klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:eth0 klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:58838 frag_off:0 ttl:64 proto:50 (ESP) chk:43857 saddr:192.168.0.200 daddr:211.78.84.93 klips_debug:ipsec_tunnel_hard_header: skb->dev=ipsec0 dev=ipsec0. klips_debug:ipsec_tunnel_hard_header: Revectored 0p00000000->0pc09b71c8 len=84 type=2048 dev=