[Openswan Users] Re: [Fwd: [PATCH] Openswan and OS X with NAT-T]
Agent Smith
news8080 at yahoo.com
Fri Sep 30 08:54:23 CEST 2005
The patch
(http://lists.openswan.org/pipermail/dev/2005-September/001066.html)
works with OSX behind a NAT device but then OSXes that
has public IP are broken.
see attachments. when 11.1.1.1 is given to the OSX
box, it fails but when I put up a linux box at
11.1.1.1 and nat the OSX machine behind it, it works
fine. (11.1.1.1 is changed here, no no offence group
:)
>From what I've been reading its apples fault that they
follow some RFC that eveyone else doesn't but I can't
explaing that to the users, they will look at me funny
if I do.
--- Jacco de Leeuw <jacco2 at dds.nl> wrote:
> Agent Smith wrote:
>
> > the patch does work with OSX machine behind a NAT
> > device but now OSX systems that have real
> addresses
> > can't connect. Win2k/XP NAT/NO_NAT are fine but
> its
> > those damn OSX systems.
>
> That appears to be another bug in Apple's IPsec
> implementation.
> A new version of Peter van der Beken's patch has
> been posted to
> the Dev mailinglist:
>
http://lists.openswan.org/pipermail/dev/2005-September/001079.html
> The updated patch works around this Apple bug. I
> don't think it is
> in CVS yet though.
>
> Jacco
> --
> Jacco de Leeuw
> mailto:jacco2 at dds.nl
> Zaandam, The Netherlands
> http://www.jacco2.dds.nl
> Mosquitos suck
> _______________________________________________
> Users mailing list
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
>
__________________________________
Yahoo! Mail - PC Magazine Editors' Choice 2005
http://mail.yahoo.com
-------------- next part --------------
Sep 30 09:35:02 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[24] (type=24)
Sep 30 09:35:02 vpn kernel: klips_debug:pfkey_msg_build: extensions permitted=05e00003, seen=01e00003, required=01e00001.
Sep 30 09:35:02 vpn kernel: klips_debug:pfkey_upmsg: allocating 136 bytes...
Sep 30 09:35:02 vpn kernel: klips_debug:pfkey_upmsg: ...allocated at 0pf660e380.
Sep 30 09:35:02 vpn kernel: klips_debug:pfkey_x_delflow_parse: sending up x_delflow reply message for satype=11(INT) to socket=0pc919f314 succeeded.
Sep 30 09:35:02 vpn kernel: klips_debug:pfkey_x_delflow_parse: extr->ips cleaned up and freed.
Sep 30 09:35:02 vpn kernel: klips_debug:ipsec_sa_wipe: removing SA=unk0:0@<invalid>(0pf61b0800), SAref=157, table=0(0pf8806000), entry=157 from the refTable.
Sep 30 09:35:02 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:unk0:0@<invalid>, ref:-1 reference count decremented.
Sep 30 09:35:02 vpn pppd[3377]: Exit.
Sep 30 09:35:02 vpn l2tpd[1328]: control_finish: Connection closed to 11.1.1.1, port 49304 (), Local: 52618, Remote: 24
Sep 30 09:35:39 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:35:39 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:128 id:20153 frag_off:0 ttl:48 proto:17 (UDP) chk:14780 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:35:39 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:35:39 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:35:39 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:268 id:20154 frag_off:0 ttl:48 proto:17 (UDP) chk:14639 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:35:39 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:35:39 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:35:39 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:1488 id:20155 frag_off:0 ttl:48 proto:17 (UDP) chk:13418 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:35:39 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:35:42 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:35:42 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:1488 id:20160 frag_off:0 ttl:48 proto:17 (UDP) chk:13413 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:35:42 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:35:45 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:35:45 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:1488 id:20164 frag_off:0 ttl:48 proto:17 (UDP) chk:13409 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:35:45 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:35:48 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:35:48 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:1488 id:20168 frag_off:0 ttl:48 proto:17 (UDP) chk:13405 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:35:48 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
-------------- next part --------------
Sep 30 09:34:21 vpn kernel: klips_debug:rj_walktree: for: rn=0pf7a3eae8 rj_b=-3 rj_flags=6 leaf key = 00000000->00000000
Sep 30 09:34:21 vpn kernel: klips_debug:rj_walktree: processing leaves, rn=0pf7a3eb18 rj_b=-3 rj_flags=6 leaf key = ffffffff->ffffffff
Sep 30 09:34:21 vpn kernel: klips_debug:rj_walktree: while: base=0p00000000 rn=0pf7a3eae8 rj_b=-3 rj_flags=6 leaf key = 00000000->00000000
Sep 30 09:34:31 vpn kernel: klips_debug:@ flags = 6 @key=0pf7a63d20 key = 00000000->00000000 @mask=0p00000000
Sep 30 09:34:31 vpn kernel: klips_debug:@ flags = 6 @key=0pf7a63d34 key = ffffffff->ffffffff @mask=0p00000000
Sep 30 09:34:31 vpn kernel: klips_debug: off = 0
Sep 30 09:34:31 vpn kernel: klips_debug:ipsec_eroute_get_info: buffer=0pebcdf000, *start=0p00000000, offset=0, length=3072
Sep 30 09:34:31 vpn kernel: klips_debug:rj_walktree: for: rn=0pf7a3eae8 rj_b=-3 rj_flags=6 leaf key = 00000000->00000000
Sep 30 09:34:31 vpn kernel: klips_debug:rj_walktree: processing leaves, rn=0pf7a3eb18 rj_b=-3 rj_flags=6 leaf key = ffffffff->ffffffff
Sep 30 09:34:31 vpn kernel: klips_debug:rj_walktree: while: base=0p00000000 rn=0pf7a3eae8 rj_b=-3 rj_flags=6 leaf key = 00000000->00000000
Sep 30 09:34:46 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:34:46 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:128 id:19867 frag_off:0 ttl:47 proto:17 (UDP) chk:20404 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:34:46 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:34:46 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [1].
Sep 30 09:34:46 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:268 id:19868 frag_off:0 ttl:47 proto:17 (UDP) chk:20263 saddr:11.1.1.1:500 daddr:68.68.68.68:500
Sep 30 09:34:46 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:34:46 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:46 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:1492 id:19869 frag_off:0 ttl:47 proto:17 (UDP) chk:19038 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:46 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:34:47 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:47 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:260 id:19871 frag_off:0 ttl:47 proto:17 (UDP) chk:20268 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:47 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: allocating 168 bytes for downward message.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: msg sent for parsing.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: parsing message ver=2, type=3, errno=0, satype=3(ESP), len=21, res=0, seq=5, pid=3125.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_SAref_alloc: SAref requested... head=151, cont=256, tail=255, listsize=256.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_SAref_alloc: allocating SAref=151, table=0, entry=151 of 65536.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_alloc: allocated 528 bytes for ipsec_sa struct=0pf61b0000 ref=151.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: allocated extr->ips=0pf61b0000.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: satype 3 lookups to proto=50.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=21, res=0, seq=5, pid=3125.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add).
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=19
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: extensions permitted=78001ffb, required=00000063.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=19.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=19 ext_type=1(security-association) ext_len=3 parsing ext 0pf5e3c9f0 with parser pfkey_sa_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=25cd0b73 replay=64 state=1 auth=3 encrypt=12 flags=0 ref=-1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 1(security-association) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=16.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=16 ext_type=5(source-address) ext_len=3 parsing ext 0pf5e3ca08 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=11.1.1.1 proto=0 port=49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 5(source-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=13.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=13 ext_type=6(destination-address) ext_len=3 parsing ext 0pf5e3ca20 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=68.68.68.68 proto=0 port=1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 6(destination-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=8(authentication-key) remain=10.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=10 ext_type=8(authentication-key) ext_len=4 parsing ext 0pf5e3ca38 with parser pfkey_key_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_parse: success, found len=4 exttype=8(authentication-key) bits=160 reserved=0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 8(authentication-key) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=9(cipher-key) remain=6.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=6 ext_type=9(cipher-key) ext_len=3 parsing ext 0pf5e3ca58 with parser pfkey_key_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_parse: success, found len=3 exttype=9(cipher-key) bits=128 reserved=0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 9(cipher-key) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=27(X-NAT-T-sport) remain=3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=3 ext_type=27(X-NAT-T-sport) ext_len=1 parsing ext 0pf5e3ca70 with parser pfkey_x_ext_nat_t_type_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 27(X-NAT-T-sport) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=28(X-NAT-T-dport) remain=2.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=2 ext_type=28(X-NAT-T-dport) ext_len=1 parsing ext 0pf5e3ca78 with parser pfkey_x_ext_nat_t_port_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 28(X-NAT-T-dport) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=29(X-NAT-T-OA) remain=1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=1 ext_type=29(X-NAT-T-OA) ext_len=1 parsing ext 0pf5e3ca80 with parser pfkey_x_ext_nat_t_port_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 29(X-NAT-T-OA) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: extensions permitted=78001ffb, seen=38000363, required=00000063.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 1 0pf5e3c9f0 with processor 0pc02e6830.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_process: .
Sep 30 09:34:48 vpn kernel: klips_debug: ipsec_alg_sa_init() :entering for encalg=12, authalg=3
Sep 30 09:34:48 vpn kernel: klips_debug: ipsec_alg_sa_init() :found ipsec_alg (ixt_e=c03ce340) for encalg=12
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 5 0pf5e3ca08 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found src address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 6 0pf5e3ca20 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 68.68.68.68.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found dst address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: ips_said.dst set to 68.68.68.68.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 8 0pf5e3ca38 with processor 0pc02e7140.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: allocating 20 bytes for authkey.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 9 0pf5e3ca58 with processor 0pc02e7140.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: allocating 16 bytes for enckey.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 27 0pf5e3ca70 with processor 0pc02e7710.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_nat_t_type_process: 2.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 28 0pf5e3ca78 with processor 0pc02e77e0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_nat_t_port_process: 28/4500.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 29 0pf5e3ca80 with processor 0pc02e77e0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_nat_t_port_process: 29/4500.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: parsing message type 3(add) with msg_parser 0pc02e1cf0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: .
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_getbyid: no entries in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: existing ipsec_sa not found (this is good) for SAesp.25cd0b73 at 68.68.68.68, in-bound, allocating.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey defined) called for SA:esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_ipsec_sa_init: calling init routine of ESP_AES_HMAC_SHA1
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_alg_enc_key_create: entering with encalg=12 ixt_e=c03ce340
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_alg_enc_key_create: about to call:set_key(key_e=f7394000, ekp=c926aa20, key_size=16)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pe376fccc pfkey_ext=0pe376fd08 *pfkey_ext=0p00000000.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pe376fccc pfkey_ext=0pe376fd08 *pfkey_ext=0pf354f2e0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_build: spi=25cd0b73 replay=64 sa_state=1 auth=3 encrypt=12 flags=1
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=11.1.1.1:49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=68.68.68.68:1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: pfkey_msg=0pf4f4d260 allocated 88 bytes, &(extensions[0])=0pe376fd08
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: extensions permitted=78001c7b, seen=00000063, required=00000063.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_upmsg: allocating 88 bytes...
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_upmsg: ...allocated at 0pf660e440.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: sending up add reply message for satype=3(ESP) to socket=0pc919f314 succeeded.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: successful for SA: esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:48 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:19873 frag_off:0 ttl:47 proto:17 (UDP) chk:20442 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_rcv: IKE packet - not handled here
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: allocating 168 bytes for downward message.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: msg sent for parsing.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: parsing message ver=2, type=3, errno=0, satype=3(ESP), len=21, res=0, seq=6, pid=3125.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_SAref_alloc: SAref requested... head=152, cont=256, tail=255, listsize=256.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_SAref_alloc: allocating SAref=152, table=0, entry=152 of 65536.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_alloc: allocated 528 bytes for ipsec_sa struct=0pf4e4bc00 ref=152.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: allocated extr->ips=0pf4e4bc00.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: satype 3 lookups to proto=50.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing message ver=2, type=3(add), errno=0, satype=3(ESP), len=21, res=0, seq=6, pid=3125.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 3(add).
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=19
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: extensions permitted=78001ffb, required=00000063.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=19.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=19 ext_type=1(security-association) ext_len=3 parsing ext 0pf5e3c8f0 with parser pfkey_sa_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0bfd9ad5 replay=64 state=1 auth=3 encrypt=12 flags=0 ref=-1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 1(security-association) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=16.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=16 ext_type=5(source-address) ext_len=3 parsing ext 0pf5e3c908 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=68.68.68.68 proto=0 port=1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 5(source-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=13.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=13 ext_type=6(destination-address) ext_len=3 parsing ext 0pf5e3c920 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=11.1.1.1 proto=0 port=49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 6(destination-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=8(authentication-key) remain=10.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=10 ext_type=8(authentication-key) ext_len=4 parsing ext 0pf5e3c938 with parser pfkey_key_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_parse: success, found len=4 exttype=8(authentication-key) bits=160 reserved=0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 8(authentication-key) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=9(cipher-key) remain=6.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=6 ext_type=9(cipher-key) ext_len=3 parsing ext 0pf5e3c958 with parser pfkey_key_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_parse: success, found len=3 exttype=9(cipher-key) bits=128 reserved=0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 9(cipher-key) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=27(X-NAT-T-sport) remain=3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=3 ext_type=27(X-NAT-T-sport) ext_len=1 parsing ext 0pf5e3c970 with parser pfkey_x_ext_nat_t_type_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 27(X-NAT-T-sport) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=28(X-NAT-T-dport) remain=2.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=2 ext_type=28(X-NAT-T-dport) ext_len=1 parsing ext 0pf5e3c978 with parser pfkey_x_ext_nat_t_port_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 28(X-NAT-T-dport) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=29(X-NAT-T-OA) remain=1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=1 ext_type=29(X-NAT-T-OA) ext_len=1 parsing ext 0pf5e3c980 with parser pfkey_x_ext_nat_t_port_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 29(X-NAT-T-OA) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: extensions permitted=78001ffb, seen=38000363, required=00000063.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 1 0pf5e3c8f0 with processor 0pc02e6830.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_process: .
Sep 30 09:34:48 vpn kernel: klips_debug: ipsec_alg_sa_init() :entering for encalg=12, authalg=3
Sep 30 09:34:48 vpn kernel: klips_debug: ipsec_alg_sa_init() :found ipsec_alg (ixt_e=c03ce340) for encalg=12
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 5 0pf5e3c908 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 68.68.68.68.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found src address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 6 0pf5e3c920 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found dst address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: ips_said.dst set to 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 8 0pf5e3c938 with processor 0pc02e7140.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: allocating 20 bytes for authkey.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 9 0pf5e3c958 with processor 0pc02e7140.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: allocating 16 bytes for enckey.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_key_process: success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 27 0pf5e3c970 with processor 0pc02e7710.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_nat_t_type_process: 2.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 28 0pf5e3c978 with processor 0pc02e77e0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_nat_t_port_process: 28/4500.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 29 0pf5e3c980 with processor 0pc02e77e0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_nat_t_port_process: 29/4500.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: parsing message type 3(add) with msg_parser 0pc02e1cf0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: .
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_getbyid: no entries in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: existing ipsec_sa not found (this is good) for SAesp.bfd9ad5 at 11.1.1.1, out-bound, allocating.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_ipsec_sa_init: (pfkey defined) called for SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_ipsec_sa_init: calling init routine of ESP_AES_HMAC_SHA1
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_alg_enc_key_create: entering with encalg=12 ixt_e=c03ce340
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_alg_enc_key_create: about to call:set_key(key_e=f6cc2000, ekp=f354f2e0, key_size=16)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pe376fccc pfkey_ext=0pe376fd08 *pfkey_ext=0p00000000.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pe376fccc pfkey_ext=0pe376fd08 *pfkey_ext=0pc926aa20.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_build: spi=0bfd9ad5 replay=64 sa_state=1 auth=3 encrypt=12 flags=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=68.68.68.68:1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=11.1.1.1:49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: pfkey_msg=0ped219d40 allocated 88 bytes, &(extensions[0])=0pe376fd08
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: extensions permitted=78001c7b, seen=00000063, required=00000063.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_upmsg: allocating 88 bytes...
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_upmsg: ...allocated at 0pec1b0a40.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: sending up add reply message for satype=3(ESP) to socket=0pc919f314 succeeded.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_add_parse: successful for SA: esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: allocating 192 bytes for downward message.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sendmsg: msg sent for parsing.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: parsing message ver=2, type=14, errno=0, satype=3(ESP), len=24, res=0, seq=7, pid=3125.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_SAref_alloc: SAref requested... head=153, cont=256, tail=255, listsize=256.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_SAref_alloc: allocating SAref=153, table=0, entry=153 of 65536.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_alloc: allocated 528 bytes for ipsec_sa struct=0pf4e4b800 ref=153.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: allocated extr->ips=0pf4e4b800.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: satype 3 lookups to proto=50.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing message ver=2, type=14(x-addflow(eroute)), errno=0, satype=3(ESP), len=24, res=0, seq=7, pid=3125.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: satype 3(ESP) conversion to proto gives 50 for msg_type 14(x-addflow(eroute)).
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=22
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: extensions permitted=05e00c63, required=01e00043.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=1(security-association) remain=22.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=22 ext_type=1(security-association) ext_len=3 parsing ext 0pf5e3c1f0 with parser pfkey_sa_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_parse: successfully found len=3 exttype=1(security-association) spi=0bfd9ad5 replay=0 state=0 auth=0 encrypt=0 flags=0 ref=-1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 1(security-association) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=5(source-address) remain=19.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=19 ext_type=5(source-address) ext_len=3 parsing ext 0pf5e3c208 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=5(source-address) family=2(AF_INET) address=68.68.68.68 proto=0 port=1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 5(source-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=6(destination-address) remain=16.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=16 ext_type=6(destination-address) ext_len=3 parsing ext 0pf5e3c220 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=6(destination-address) family=2(AF_INET) address=11.1.1.1 proto=0 port=49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 6(destination-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=21(X-source-flow-address) remain=13.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=13 ext_type=21(X-source-flow-address) ext_len=3 parsing ext 0pf5e3c238 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=21(X-source-flow-address) family=2(AF_INET) address=68.68.68.68 proto=0 port=1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 21(X-source-flow-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=22(X-dest-flow-address) remain=10.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=10 ext_type=22(X-dest-flow-address) ext_len=3 parsing ext 0pf5e3c250 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=22(X-dest-flow-address) family=2(AF_INET) address=11.1.1.1 proto=0 port=49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 22(X-dest-flow-address) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=23(X-source-mask) remain=7.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=7 ext_type=23(X-source-mask) ext_len=3 parsing ext 0pf5e3c268 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=23(X-source-mask) family=2(AF_INET) address=255.255.255.255 proto=0 port=65535.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 23(X-source-mask) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=24(X-dest-mask) remain=4.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=4 ext_type=24(X-dest-mask) ext_len=3 parsing ext 0pf5e3c280 with parser pfkey_address_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: found exttype=24(X-dest-mask) family=2(AF_INET) address=255.255.255.255 proto=0 port=65535.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 24(X-dest-mask) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: parsing ext type=26(X-NAT-T-type) remain=1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: remain=1 ext_type=26(X-NAT-T-type) ext_len=1 parsing ext 0pf5e3c298 with parser pfkey_x_ext_protocol_parse.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_protocol_parse:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: Extension 26(X-NAT-T-type) parsed.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_parse: extensions permitted=05e00c63, seen=05e00063, required=01e00043.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 1 0pf5e3c1f0 with processor 0pc02e6830.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_process: .
Sep 30 09:34:48 vpn kernel: klips_debug: ipsec_alg_sa_init() :entering for encalg=0, authalg=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 5 0pf5e3c208 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 68.68.68.68.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found src address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 6 0pf5e3c220 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found dst address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: allocating 16 bytes for saddr.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: ips_said.dst set to 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 21 0pf5e3c238 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 68.68.68.68.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found src flow address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_alloc_eroute: allocating 192 bytes for an eroute at 0pf5e3c8e0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: extr->eroute set to 68.68.68.68/0:1701->0.0.0.0/0:0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 22 0pf5e3c250 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 11.1.1.1.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found dst flow address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_alloc_eroute: eroute struct already allocated
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: extr->eroute set to 68.68.68.68/0:1701->11.1.1.1/0:49304
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 23 0pf5e3c268 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 255.255.255.255.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found src mask address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_alloc_eroute: eroute struct already allocated
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: extr->eroute set to 68.68.68.68/32:1701->11.1.1.1/0:49304
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 24 0pf5e3c280 with processor 0pc02e6ba0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found address family=2, AF_INET, 255.255.255.255.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: found dst mask address.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_alloc_eroute: eroute struct already allocated
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_parse: extr->eroute set to 68.68.68.68/32:1701->11.1.1.1/32:49304
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_process: successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: processing ext 26 0pf5e3c298 with processor 0pc02dfee0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_protocol_process: e376fe38
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_protocol_process: protocol = 17.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_interp: parsing message type 14(x-addflow(eroute)) with msg_parser 0pc02e43c0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_addflow_parse: .
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_addflow_parse: calling breakeroute and/or makeroute for 68.68.68.68/32->11.1.1.1/32
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_addflow_parse: calling makeroute.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_makeroute: attempting to allocate 192 bytes to insert eroute for 68.68.68.68/32->11.1.1.1/32, SA: esp.bfd9ad5 at 11.1.1.1, PID:3125, skb=0p00000000, ident:NULL->NULL
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_makeroute: 141a1000444a14ae9209031d110006a5c0980000 / 141aff00ffffffffffffffffff00ffffffff0000
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_makeroute: calling rj_addroute now
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_makeroute: pid=03125 count= 0 lasttime= 0 68.68.68.68/32 -> 11.1.1.1/32 => esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_makeroute: succeeded.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_addflow_parse: makeroute call successful.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build:
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0pe376fbac pfkey_ext=0pe376fcf8 *pfkey_ext=0p00000000.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0pe376fbac pfkey_ext=0pe376fcf8 *pfkey_ext=0pf354f2e0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_sa_build: spi=0bfd9ad5 replay=0 sa_state=0 auth=0 encrypt=0 flags=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=5 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=68.68.68.68:1701.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=6 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=11.1.1.1:49304.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=21 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=68.68.68.68:0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=22 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=11.1.1.1:0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=23 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=255.255.255.255:0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: exttype=24 proto=0 prefixlen=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address family AF_INET.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: found address=255.255.255.255:0.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_address_build: successful created len: 3.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build: error=0
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_safe_build:success.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: pfkey_msg=0pf5e3c5e0 allocated 184 bytes, &(extensions[0])=0pe376fcf8
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[1] (type=1)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[5] (type=5)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[6] (type=6)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[21] (type=21)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[22] (type=22)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[23] (type=23)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: copying 24 bytes from extensions[24] (type=24)
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_msg_build: extensions permitted=05e00063, seen=01e00063, required=01e00043.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_upmsg: allocating 184 bytes...
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_upmsg: ...allocated at 0pec1b0a40.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_addflow_parse: sending up x_addflow reply message for satype=3(ESP) (proto=50) to socket=0pc919f314 succeeded.
Sep 30 09:34:48 vpn kernel: klips_debug:pfkey_x_addflow_parse: extr->ips cleaned up and freed.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_wipe: removing SA=esp.bfd9ad5 at 11.1.1.1(0pf4e4b800), SAref=153, table=0(0pf8806000), entry=153 from the refTable.
Sep 30 09:34:48 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:-1 reference count decremented.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:144 id:19874 frag_off:0 ttl:47 proto:17 (UDP) chk:20381 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:19874 frag_off:0 ttl:47 proto:50 chk:20381 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:136 id:19874 frag_off:0 ttl:47 proto:50 chk:20381 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=1 (iv)=0x6d0162f92723f1c8 iplen=136 esplen=104 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=80 iv=f65db038, encrypt=0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=80
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: padlen=10, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:49 vpn kernel: klips_debug: 00: 01 02 03 04 05 06 07 08 09 0a
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 10
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: trimming to 88.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:19874 frag_off:0 ttl:47 proto:17 (UDP) chk:20437 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_neigh_setup:
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=127 hard_header_len:4 45:00:00:7f
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:127 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19536 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,17
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 123>28
Sep 30 09:34:49 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,25
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,17 before applying xforms with head,tailroom: 24,25 .
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1492 physmtu:1492 tothr:24 tottr:25 mtudiff:49 ippkttotlen:127
Sep 30 09:34:49 vpn kernel: klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1492 decreased by 53 to 1439
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,41 after allocation
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 17, proto 50.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f6eaee4c ilen=112 iv=f6eaee3c, encrypt=1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=112
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:168 id:0 DF frag_off:0 ttl:64 proto:50 chk:19462 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,16
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:176 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19487 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:49 vpn l2tpd[1328]: control_finish: Connection established to 11.1.1.1, 49304. Local: 52618, Remote: 24. LNS session is 'default'
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:96 id:19875 frag_off:0 ttl:47 proto:17 (UDP) chk:20428 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:19875 frag_off:0 ttl:47 proto:50 chk:20428 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:19875 frag_off:0 ttl:47 proto:50 chk:20428 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=2 (iv)=0xdd527a8a9cc71961 iplen=88 esplen=56 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=32 iv=f65db038, encrypt=0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:49 vpn kernel: klips_debug: 00: 01 02
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 2
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: trimming to 48.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:48 id:19875 frag_off:0 ttl:47 proto:17 (UDP) chk:20476 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:19876 frag_off:0 ttl:47 proto:17 (UDP) chk:20411 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19876 frag_off:0 ttl:47 proto:50 chk:20411 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19876 frag_off:0 ttl:47 proto:50 chk:20411 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=3 (iv)=0x72b455a861918a0e iplen=104 esplen=72 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=48 iv=f65db038, encrypt=0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: padlen=0, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: trimming to 66.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:66 id:19876 frag_off:0 ttl:47 proto:17 (UDP) chk:20457 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=40 hard_header_len:4 45:00:00:28
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:40 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19623 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,40
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 36>28
Sep 30 09:34:49 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,40 before applying xforms with head,tailroom: 24,32 .
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1439 physmtu:1492 tothr:24 tottr:32 mtudiff:3 ippkttotlen:40
Sep 30 09:34:49 vpn kernel: klips_info:ipsec_xmit_encap_bundle: dev ipsec0 mtu of 1439 decreased by 8 to 1431
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,32 after allocation
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 24, proto 50.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,8 before xform.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f5e3c22c ilen=32 iv=f5e3c21c, encrypt=1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:0 DF frag_off:0 ttl:64 proto:50 chk:19542 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,8
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:96 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19567 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=56 hard_header_len:4 45:00:00:38
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:56 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19607 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 52>28
Sep 30 09:34:49 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn pppd[3377]: Plugin radius.so loaded.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn l2tpd[1328]: control_finish: Call established with 11.1.1.1, Local: 47656, Remote: 550, Serial: 1
Sep 30 09:34:49 vpn pppd[3377]: RADIUS plugin initialized.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,32
Sep 30 09:34:49 vpn pppd[3377]: pppd 2.4.2b3 started by root, uid 0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,24 before applying xforms with head,tailroom: 24,32 .
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1431 physmtu:1492 tothr:24 tottr:32 mtudiff:-5 ippkttotlen:56
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,48 after allocation
Sep 30 09:34:49 vpn pppd[3377]: Using interface ppp1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn pppd[3377]: Connect: ppp1 <--> /dev/ttyp0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 24, proto 50.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f5e3c22c ilen=48 iv=f5e3c21c, encrypt=1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:0 DF frag_off:0 ttl:64 proto:50 chk:19526 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn /etc/hotplug/net.agent: assuming ppp1 is already up
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,16
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19551 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=40 hard_header_len:4 45:00:00:28
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:40 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19623 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,40
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 36>28
Sep 30 09:34:49 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,40 before applying xforms with head,tailroom: 24,32 .
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1431 physmtu:1492 tothr:24 tottr:32 mtudiff:-5 ippkttotlen:40
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,32 after allocation
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 24, proto 50.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,8 before xform.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f5e3c22c ilen=32 iv=f5e3c21c, encrypt=1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:0 DF frag_off:0 ttl:64 proto:50 chk:19542 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,8
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:96 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19567 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:128 id:19877 frag_off:0 ttl:47 proto:17 (UDP) chk:20394 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:120 id:19877 frag_off:0 ttl:47 proto:50 chk:20394 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:120 id:19877 frag_off:0 ttl:47 proto:50 chk:20394 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=4 (iv)=0x77961136bb72cc27 iplen=120 esplen=88 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=64 iv=f65db038, encrypt=0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=64
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: padlen=14, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:49 vpn kernel: klips_debug: 00: 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 14
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: trimming to 68.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:68 id:19877 frag_off:0 ttl:47 proto:17 (UDP) chk:20454 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:19878 frag_off:0 ttl:47 proto:17 (UDP) chk:20409 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19878 frag_off:0 ttl:47 proto:50 chk:20409 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19878 frag_off:0 ttl:47 proto:50 chk:20409 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=5 (iv)=0x4ed6e1f827507bcf iplen=104 esplen=72 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=48 iv=f65db038, encrypt=0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: padlen=6, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:49 vpn kernel: klips_debug: 00: 01 02 03 04 05 06
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 6
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: trimming to 60.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:60 id:19878 frag_off:0 ttl:47 proto:17 (UDP) chk:20461 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=40 hard_header_len:4 45:00:00:28
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:40 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19623 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,40
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 36>28
Sep 30 09:34:49 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,40 before applying xforms with head,tailroom: 24,32 .
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1431 physmtu:1492 tothr:24 tottr:32 mtudiff:-5 ippkttotlen:40
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,32 after allocation
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 24, proto 50.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,8 before xform.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f5e3c32c ilen=32 iv=f5e3c31c, encrypt=1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=32
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:0 DF frag_off:0 ttl:64 proto:50 chk:19542 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:49 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,8
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,0
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:49 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:96 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19567 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:49 vpn kernel: klips_debug:ipsec_device_event: NETDEV_REGISTER dev=ppp1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:19879 frag_off:0 ttl:47 proto:17 (UDP) chk:20408 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19879 frag_off:0 ttl:47 proto:50 chk:20408 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19879 frag_off:0 ttl:47 proto:50 chk:20408 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=6 (iv)=0x84dac30dfd1aaa3d iplen=104 esplen=72 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=48 iv=f65db038, encrypt=0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: padlen=6, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:52 vpn kernel: klips_debug: 00: 01 02 03 04 05 06
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 6
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: trimming to 60.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:60 id:19879 frag_off:0 ttl:47 proto:17 (UDP) chk:20460 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=64 hard_header_len:4 45:00:00:40
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:64 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19599 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,16
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:52 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 60>28
Sep 30 09:34:52 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,16 before applying xforms with head,tailroom: 24,24 .
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1431 physmtu:1492 tothr:24 tottr:24 mtudiff:-13 ippkttotlen:64
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,40 after allocation
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 16, proto 50.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f5e3c92c ilen=48 iv=f5e3c91c, encrypt=1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:0 DF frag_off:0 ttl:64 proto:50 chk:19526 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,16
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19551 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=60 hard_header_len:4 45:00:00:3c
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:60 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19603 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,20
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:52 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 56>28
Sep 30 09:34:52 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,28
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,20 before applying xforms with head,tailroom: 24,28 .
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1431 physmtu:1492 tothr:24 tottr:28 mtudiff:-9 ippkttotlen:60
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,44 after allocation
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 20, proto 50.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,24 before xform.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f5e3c22c ilen=48 iv=f5e3c21c, encrypt=1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:0 DF frag_off:0 ttl:64 proto:50 chk:19526 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,16
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19551 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:19880 frag_off:0 ttl:47 proto:17 (UDP) chk:20407 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19880 frag_off:0 ttl:47 proto:50 chk:20407 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19880 frag_off:0 ttl:47 proto:50 chk:20407 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=7 (iv)=0x8dc2f441d697b4dc iplen=104 esplen=72 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=48 iv=f65db038, encrypt=0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:52 vpn kernel: klips_debug: 00: 01 02
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 2
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: trimming to 64.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:64 id:19880 frag_off:0 ttl:47 proto:17 (UDP) chk:20455 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:96 id:19881 frag_off:0 ttl:47 proto:17 (UDP) chk:20422 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:19881 frag_off:0 ttl:47 proto:50 chk:20422 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:19881 frag_off:0 ttl:47 proto:50 chk:20422 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=8 (iv)=0xde103af2bf672598 iplen=88 esplen=56 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=32 iv=f65db038, encrypt=0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=32
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: padlen=2, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:52 vpn kernel: klips_debug: 00: 01 02
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 2
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: trimming to 48.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:48 id:19881 frag_off:0 ttl:47 proto:17 (UDP) chk:20470 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: >>> skb->len=46 hard_header_len:4 45:00:00:2e
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:46 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19617 saddr:68.68.68.68:1701 daddr:11.1.1.1:49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_strip_hard_header: Original head,tailroom: 16,34
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:1701->11.1.1.1:49304 17
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:52 vpn kernel: klips_debug:udp port check: fragoff: 0 len: 42>28
Sep 30 09:34:52 vpn kernel: klips_debug:udp port in packet: port 1701 -> 49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_SAlookup: checking for local udp/500 IKE packet saddr=444a14ae, er=0pf5e3c4e0, daddr=9209031d, er_dst=9209031d, proto=17 sport=1701 dport=49304
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=117 of SA:esp.bfd9ad5 at 11.1.1.1 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_put: ipsec_sa SA:esp.bfd9ad5 at 11.1.1.1, ref:152 reference count decremented.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: found ipsec_sa -- SA:<ESP_AES_HMAC_SHA1> esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: calling room for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: Required head,tailroom: 24,26
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: existing head,tailroom: 16,34 before applying xforms with head,tailroom: 24,26 .
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: mtu:1431 physmtu:1492 tothr:24 tottr:26 mtudiff:-11 ippkttotlen:46
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: hard header already stripped.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_bundle: head,tailroom: 56,26 after allocation
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: calling output for <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: pushing 24 bytes, putting 18, proto 50.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: head,tailroom: 32,8 before xform.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f6cc2000 idat=f22f58ac ilen=32 iv=f22f589c, encrypt=1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=32
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_encap_once: after <ESP_AES_HMAC_SHA1>, SA:esp.bfd9ad5 at 11.1.1.1:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:88 id:0 DF frag_off:0 ttl:64 proto:50 chk:19542 saddr:68.68.68.68 daddr:11.1.1.1
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_findroute: 68.68.68.68:0->11.1.1.1:0 50
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ** try to match a leaf, t=0pf5e3c4e0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: *** start searching up the tree, t=0pf5e3c4e0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: **** t=0pf5e3c4f8
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: **** t=0pf7a3eb00
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ***** cp2=0pf7a63d48 cp3=0pf43f2bd0
Sep 30 09:34:52 vpn kernel: klips_debug:rj_match: ***** not found.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: After recursive xforms -- head,tailroom: 32,8
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_tunnel_start_xmit: encapsuling packet into UDP (NAT-Traversal) (2 8)
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_restore_hard_header: With hard_header, final head,tailroom: 32,0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_xmit_send: ...done, calling ip_send() on device:ppp0
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:96 id:0 DF frag_off:0 ttl:64 proto:17 (UDP) chk:19567 saddr:68.68.68.68:4500 daddr:11.1.1.1:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:19882 frag_off:0 ttl:47 proto:17 (UDP) chk:20405 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19882 frag_off:0 ttl:47 proto:50 chk:20405 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19882 frag_off:0 ttl:47 proto:50 chk:20405 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=9 (iv)=0x0ee18462f1fbf35f iplen=104 esplen=72 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=48 iv=f65db038, encrypt=0
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: padlen=6, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:52 vpn kernel: klips_debug: 00: 01 02 03 04 05 06
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 6
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: trimming to 60.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:52 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:60 id:19882 frag_off:0 ttl:47 proto:17 (UDP) chk:20457 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:52 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: suspected ESPinUDP packet (NAT-Traversal) [2].
Sep 30 09:34:55 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:112 id:19883 frag_off:0 ttl:47 proto:17 (UDP) chk:20404 saddr:11.1.1.1:4500 daddr:68.68.68.68:4500
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: ESPinUDP pkt without Non-ESP - spi=0x25cd0b73
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: removing 8 bytes from ESPinUDP packet
Sep 30 09:34:55 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19883 frag_off:0 ttl:47 proto:50 chk:20404 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: <<< Info -- skb->dev=ppp0 dev=ppp0
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: assigning packet ownership to virtual device ipsec0 from physical device ppp0.
Sep 30 09:34:55 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:104 id:19883 frag_off:0 ttl:47 proto:50 chk:20404 saddr:11.1.1.1 daddr:68.68.68.68
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv_decap_once: decap (50) from 11.1.1.1 -> 68.68.68.68
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_sa_getbyid: linked entry in ipsec_sa table for hash=131 of SA:esp.25cd0b73 at 68.68.68.68 requested.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68, src=11.1.1.1 of pkt agrees with expected SA source address policy.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: SA:esp.25cd0b73 at 68.68.68.68 First SA in group.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: natt_type=2 tdbp->ips_natt_type=2 : ok
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: packet from 11.1.1.1 received with seq=10 (iv)=0x1a7d83866dc62b18 iplen=104 esplen=72 sa=esp.25cd0b73 at 68.68.68.68
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: encalg = 12, authalg = 3.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: authentication successful.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: encalg=12 esphlen=24
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: entering with encalg=12, ixt_e=c03ce340
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: calling cbc_encrypt encalg=12 ips_key_e=f7394000 idat=f65db048 ilen=48 iv=f65db038, encrypt=0
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_alg_esp_encrypt: returned ret=48
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: padlen=10, contents: 0x<offset>: 0x<value> 0x<value> ...
Sep 30 09:34:55 vpn kernel: klips_debug: 00: 01 02 03 04 05 06 07 08 09 0a
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: packet decrypted from 11.1.1.1: next_header = 17, padding = 10
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: trimming to 56.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: after <ESP_AES_HMAC_SHA1>, SA:esp.25cd0b73 at 68.68.68.68:
Sep 30 09:34:55 vpn kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:56 id:19883 frag_off:0 ttl:47 proto:17 (UDP) chk:20460 saddr:11.1.1.1:49304 daddr:68.68.68.68:1701
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: No ips_inext from this SA:esp.25cd0b73 at 68.68.68.68.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: ESP SA sets skb->nfmark=0x970000.
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: NAT-T & TRANSPORT: zero UDP checksum
Sep 30 09:34:55 vpn kernel: klips_debug:ipsec_rcv: netif_rx() called.
More information about the Users
mailing list