[Openswan Users] ipsec whack --status weirdness...

Jeremy Mann jmann at txhmg.com
Wed Feb 15 12:00:00 CET 2006


Why does running ipsec whack --status produce the following output:

**SNIP**

000 #153: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 2368s; nodpd
000 #158: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 3109s; newest ISAKMP; nodpd
000 #152: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 2362s; nodpd
000 #155: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 3096s; nodpd
000 #151: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 2359s; nodpd
000 #144: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 886s; nodpd
000 #143: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 880s; nodpd
000 #154: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 2982s; nodpd
000 #147: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 1538s; nodpd
000 #146: "waxahachie-wireless-bedford":500 STATE_QUICK_R2 (IPsec SA 
established); EVENT_SA_REPLACE in 26154s; newest IPSEC; eroute owner
000 #146: "waxahachie-wireless-bedford" esp.4ca6ee4a at 65.91.22.234 
esp.24f669ca at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #145: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 953s; nodpd
000 #149: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 2073s; nodpd
000 #156: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 3100s; nodpd
000 #142: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 877s; nodpd
000 #141: "waxahachie-wireless-bedford":500 STATE_QUICK_I2 (sent QI2, 
IPsec SA established); EVENT_SA_REPLACE in 25669s
000 #141: "waxahachie-wireless-bedford" esp.31404439 at 65.91.22.234 
esp.215a0dd2 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #140: "waxahachie-wireless-bedford":500 STATE_MAIN_I4 (ISAKMP SA 
established); none in -1s; nodpd
000 #157: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 3103s; nodpd
000 #150: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, 
ISAKMP SA established); EVENT_SA_REPLACE in 2260s; nodpd

**SNIP**

Why are there so many EVENT_SA_REPLACE printouts? 

Attached is my ipsec barf output...


-------------- next part --------------
xserve2
Wed Feb 15 11:56:46 CST 2006
+ _________________________ version
+ ipsec --version
Linux Openswan U2.4.0/K2.6.12-9-686-smp (netkey)
See `ipsec --copyright' for copyright information.
+ _________________________ /proc/version
+ cat /proc/version
Linux version 2.6.12-9-686-smp (buildd at rothera) (gcc version 3.4.5 20050809 (prerelease) (Ubuntu 3.4.4-6ubuntu8)) #1 SMP Mon Oct 10 13:36:57 BST 2005
+ _________________________ /proc/net/ipsec_eroute
+ test -r /proc/net/ipsec_eroute
+ _________________________ netstat-rn
+ netstat -nr
+ head -n 100
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
216.158.212.112 0.0.0.0         255.255.255.248 U         0 0          0 eth1
216.158.212.168 0.0.0.0         255.255.255.248 U         0 0          0 eth1
192.168.160.64  216.158.212.169 255.255.255.224 UG        0 0          0 eth1
10.10.0.64      216.158.212.169 255.255.255.224 UG        0 0          0 eth1
192.168.192.0   216.158.212.113 255.255.255.224 UG        0 0          0 eth1
192.168.7.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.192.0   192.168.1.104   255.255.255.0   UG        0 0          0 eth0
192.168.6.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.5.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.4.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.3.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.2.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U         0 0          0 eth0
192.168.170.0   192.168.1.104   255.255.255.0   UG        0 0          0 eth0
192.168.12.0    192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.11.0    192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.191.0   192.168.1.104   255.255.255.0   UG        0 0          0 eth0
192.168.10.0    192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.9.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
192.168.8.0     192.168.1.1     255.255.255.0   UG        0 0          0 eth0
0.0.0.0         216.158.212.169 0.0.0.0         UG        0 0          0 eth1
+ _________________________ /proc/net/ipsec_spi
+ test -r /proc/net/ipsec_spi
+ _________________________ /proc/net/ipsec_spigrp
+ test -r /proc/net/ipsec_spigrp
+ _________________________ /proc/net/ipsec_tncfg
+ test -r /proc/net/ipsec_tncfg
+ _________________________ /proc/net/pfkey
+ test -r /proc/net/pfkey
+ cat /proc/net/pfkey
sk       RefCnt Rmem   Wmem   User   Inode
+ _________________________ setkey-D
+ setkey -D
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=620128714(0x24f669ca) reqid=16385(0x00004001)
	E: 3des-cbc  b663af21 a713bfef cd9fa097 e445ebff 596d9f46 d6b27c9d
	A: hmac-md5  a7ff584c c5c561b3 93bb67b7 aafa0dcb
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 11:16:25 2006	current: Feb 15 11:56:46 2006
	diff: 2421(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 11:16:27 2006	hard: 0(s)	soft: 0(s)
	current: 22598(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 97	hard: 0	soft: 0
	sadb_seq=21 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=559549906(0x215a0dd2) reqid=16385(0x00004001)
	E: 3des-cbc  0abff56d 1764caa0 d17717ce 199fe9ac e0d58a34 ddc8f070
	A: hmac-md5  c22a1eba cfdbef81 94babc6d 5031c45c
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 11:13:17 2006	current: Feb 15 11:56:46 2006
	diff: 2609(s)	hard: 0(s)	soft: 0(s)
	last:                     	hard: 0(s)	soft: 0(s)
	current: 0(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 0	hard: 0	soft: 0
	sadb_seq=20 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=1942592607(0x73c99c5f) reqid=16401(0x00004011)
	E: 3des-cbc  6ec9e44c a1cad00f 8429de79 5a35fdeb f46f57ed 42e06f27
	A: hmac-md5  202cd72c 4cf9269d c6859d70 bc86176e
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:16:11 2006	current: Feb 15 11:56:46 2006
	diff: 13235(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:16:14 2006	hard: 0(s)	soft: 0(s)
	current: 44779(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 221	hard: 0	soft: 0
	sadb_seq=19 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=2489061414(0x945c1026) reqid=16397(0x0000400d)
	E: 3des-cbc  64755946 238f0226 0751c112 79a336fe ff0d7a75 b411c33d
	A: hmac-md5  26851c5b 2176f677 e16ac83e 5791835c
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:14:04 2006	current: Feb 15 11:56:46 2006
	diff: 13362(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:14:09 2006	hard: 0(s)	soft: 0(s)
	current: 35529(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 151	hard: 0	soft: 0
	sadb_seq=18 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=3789930344(0xe1e5bf68) reqid=16405(0x00004015)
	E: 3des-cbc  3534d8de af70ec7b 4bf29e71 041a0315 73fe6051 f11af47f
	A: hmac-md5  34b2d8e8 e7fd32c5 e80729df 77b58c86
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:14:01 2006	current: Feb 15 11:56:46 2006
	diff: 13365(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:14:03 2006	hard: 0(s)	soft: 0(s)
	current: 52893(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 285	hard: 0	soft: 0
	sadb_seq=17 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=299765523(0x11de0f13) reqid=16413(0x0000401d)
	E: 3des-cbc  ea2c272a ae8fc35d 915e7155 49772bbc 8fd8ac92 a3743d40
	A: hmac-md5  4ec5aab0 f1975ae5 82b3f785 1f61eb20
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:03:38 2006	current: Feb 15 11:56:46 2006
	diff: 13988(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:04:37 2006	hard: 0(s)	soft: 0(s)
	current: 2606985(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 18388	hard: 0	soft: 0
	sadb_seq=16 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=3498925303(0xd08d5cf7) reqid=16409(0x00004019)
	E: 3des-cbc  8be621b5 592f3e7a acc19da7 92339b47 6294494f 4faf598a
	A: hmac-md5  8b1d7bac 9a663551 05025799 572b4108
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:03:21 2006	current: Feb 15 11:56:46 2006
	diff: 14005(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:03:21 2006	hard: 0(s)	soft: 0(s)
	current: 3219974(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 35212	hard: 0	soft: 0
	sadb_seq=15 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=970990004(0x39e021b4) reqid=16405(0x00004015)
	E: 3des-cbc  7635c1c2 2b88196a 7abe7f5e afe6c613 2b6ae4c9 75f4a3b4
	A: hmac-md5  de74bb20 c2e21ae5 66c12162 0c219a04
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:00:57 2006	current: Feb 15 11:56:46 2006
	diff: 14149(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:00:58 2006	hard: 0(s)	soft: 0(s)
	current: 2628(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 18	hard: 0	soft: 0
	sadb_seq=14 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=2813615070(0xa7b45bde) reqid=16397(0x0000400d)
	E: 3des-cbc  ea10c1b7 2186620f e4164d77 e8eb9c49 b9fddd36 999189ce
	A: hmac-md5  7d785f0b 736a80d7 f1ae18c9 f40ffb6c
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:00:57 2006	current: Feb 15 11:56:46 2006
	diff: 14149(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:00:57 2006	hard: 0(s)	soft: 0(s)
	current: 3394(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 4	hard: 0	soft: 0
	sadb_seq=13 pid=23598 refcnt=0
65.91.22.234 216.158.212.174 
	esp mode=tunnel spi=3452309409(0xcdc60fa1) reqid=16413(0x0000401d)
	E: 3des-cbc  5b130b77 a5ae9c2c 329b8917 3a4dd729 df98ac5c 24159185
	A: hmac-md5  0392d4fd 06fc5153 51009d3b e20e4cf8
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:00:43 2006	current: Feb 15 11:56:46 2006
	diff: 14163(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:00:44 2006	hard: 0(s)	soft: 0(s)
	current: 1880(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 19	hard: 0	soft: 0
	sadb_seq=12 pid=23598 refcnt=0
71.252.134.175 216.158.212.116 
	esp mode=tunnel spi=3434676500(0xccb90114) reqid=16417(0x00004021)
	E: aes-cbc  f910a066 1fe47e56 3a044773 a86c356a
	A: hmac-sha1  c480ba38 2547b04e 75d34aa3 1476a034 732e0c5c
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 07:57:50 2006	current: Feb 15 11:56:46 2006
	diff: 14336(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 07:57:55 2006	hard: 0(s)	soft: 0(s)
	current: 539457(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 3216	hard: 0	soft: 0
	sadb_seq=11 pid=23598 refcnt=0
216.158.212.116 71.252.134.175 
	esp mode=tunnel spi=2885067913(0xabf6a489) reqid=16417(0x00004021)
	E: aes-cbc  466c1e64 ead4dfdd 77f0b761 a76129e8
	A: hmac-sha1  9efc76a5 ce9cc27a d31fbccf 9a4d0c1c 72cacbd7
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 07:57:50 2006	current: Feb 15 11:56:46 2006
	diff: 14336(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 07:57:55 2006	hard: 0(s)	soft: 0(s)
	current: 265760(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 1460	hard: 0	soft: 0
	sadb_seq=10 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=1286008394(0x4ca6ee4a) reqid=16385(0x00004001)
	E: 3des-cbc  753be8f3 38c4b671 da040cf8 220ead29 ff5d3f7e 07ba9f57
	A: hmac-md5  714a09de cfd4f08b 0b849ecd 7e872462
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 11:16:26 2006	current: Feb 15 11:56:46 2006
	diff: 2420(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 11:16:27 2006	hard: 0(s)	soft: 0(s)
	current: 8776(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 43	hard: 0	soft: 0
	sadb_seq=9 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=826295353(0x31404439) reqid=16385(0x00004001)
	E: 3des-cbc  8a730dfb 75c27dfc 30de4785 72a817e5 d70f7691 e746a9ec
	A: hmac-md5  52e4d83e c88cd16b 136f2aad b33806d5
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 11:13:17 2006	current: Feb 15 11:56:46 2006
	diff: 2609(s)	hard: 0(s)	soft: 0(s)
	last:                     	hard: 0(s)	soft: 0(s)
	current: 0(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 0	hard: 0	soft: 0
	sadb_seq=8 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=4261774620(0xfe05851c) reqid=16401(0x00004011)
	E: 3des-cbc  b9f67c5b 23b739de 3648bac8 2fd4eef9 bc3c8355 6aeeef8a
	A: hmac-md5  64de668a 6639c74b 259bf01c 869010c4
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:16:11 2006	current: Feb 15 11:56:46 2006
	diff: 13235(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:16:14 2006	hard: 0(s)	soft: 0(s)
	current: 6032(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 35	hard: 0	soft: 0
	sadb_seq=7 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=4263918926(0xfe263d4e) reqid=16397(0x0000400d)
	E: 3des-cbc  18fb289b c45253cd ffaf10b6 c4b87069 fb28622c 1c8a745f
	A: hmac-md5  fd8b896f 63f214d6 87933cd8 6d8c90cd
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:14:04 2006	current: Feb 15 11:56:46 2006
	diff: 13362(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:14:09 2006	hard: 0(s)	soft: 0(s)
	current: 23600(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 44	hard: 0	soft: 0
	sadb_seq=6 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=2521458581(0x964a6795) reqid=16405(0x00004015)
	E: 3des-cbc  d4febbd8 6e4e868b 1afade62 a24640c3 18223897 c2a42d25
	A: hmac-md5  9dfcd11a ad8d3504 a1785e62 1b1fd50c
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:14:01 2006	current: Feb 15 11:56:46 2006
	diff: 13365(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:14:03 2006	hard: 0(s)	soft: 0(s)
	current: 26776(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 126	hard: 0	soft: 0
	sadb_seq=5 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=3174224488(0xbd32d268) reqid=16413(0x0000401d)
	E: 3des-cbc  d31695f1 adb246ad de7a9faf 704d6f9a 3430f1c0 0c82c5d1
	A: hmac-md5  3c090925 bd757f72 fe0ebcb5 0c5d5f18
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:03:38 2006	current: Feb 15 11:56:46 2006
	diff: 13988(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:04:37 2006	hard: 0(s)	soft: 0(s)
	current: 2428216(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 13083	hard: 0	soft: 0
	sadb_seq=4 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=4017646872(0xef786d18) reqid=16409(0x00004019)
	E: 3des-cbc  1d3f9814 eb7a3617 40d4b624 6f15fe05 1f45bf4e a760b393
	A: hmac-md5  05c86762 1689db1b 83f61af1 2b4fa296
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:03:21 2006	current: Feb 15 11:56:46 2006
	diff: 14005(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:03:22 2006	hard: 0(s)	soft: 0(s)
	current: 3833816(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 21142	hard: 0	soft: 0
	sadb_seq=3 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=3053868326(0xb6065526) reqid=16405(0x00004015)
	E: 3des-cbc  5d0e8ad0 fbb6e475 8f53f21e 63d5969b 06db74fb c4a9d2f8
	A: hmac-md5  04dd3cf8 a60ae0bf 46d4603b 9b80723e
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:00:57 2006	current: Feb 15 11:56:46 2006
	diff: 14149(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:00:58 2006	hard: 0(s)	soft: 0(s)
	current: 2808(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 12	hard: 0	soft: 0
	sadb_seq=2 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=333243828(0x13dce5b4) reqid=16397(0x0000400d)
	E: 3des-cbc  44f385f3 011b5592 17e6b0d5 95410a4d fa976671 ab540db5
	A: hmac-md5  3601f926 1855b682 eba75f78 6bb524ab
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:00:57 2006	current: Feb 15 11:56:46 2006
	diff: 14149(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:00:58 2006	hard: 0(s)	soft: 0(s)
	current: 2216(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 4	hard: 0	soft: 0
	sadb_seq=1 pid=23598 refcnt=0
216.158.212.174 65.91.22.234 
	esp mode=tunnel spi=3505336434(0xd0ef3072) reqid=16413(0x0000401d)
	E: 3des-cbc  1e0d504e 52b33d0d ba9e4d59 3948d1cb c93488b6 afeb9d7f
	A: hmac-md5  146cb697 6d116798 64a84a10 2621c641
	seq=0x00000000 replay=32 flags=0x00000000 state=mature 
	created: Feb 15 08:00:43 2006	current: Feb 15 11:56:46 2006
	diff: 14163(s)	hard: 0(s)	soft: 0(s)
	last: Feb 15 08:00:44 2006	hard: 0(s)	soft: 0(s)
	current: 4640(bytes)	hard: 0(bytes)	soft: 0(bytes)
	allocated: 19	hard: 0	soft: 0
	sadb_seq=0 pid=23598 refcnt=0
+ _________________________ setkey-D-P
+ setkey -D -P
192.168.192.0/27[any] 192.168.1.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/71.252.134.175-216.158.212.116/unique#16417
	created: Feb 15 07:57:50 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2760 seq=54 pid=23599
	refcnt=1
10.10.0.64/27[any] 192.168.1.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16409
	created: Feb 15 08:03:21 2006  lastused: Feb 15 11:53:18 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2928 seq=53 pid=23599
	refcnt=4
192.168.160.64/27[any] 192.168.1.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16413
	created: Feb 15 08:03:38 2006  lastused: Feb 15 11:55:42 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2944 seq=52 pid=23599
	refcnt=8
192.168.160.64/27[any] 192.168.12.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16405
	created: Feb 15 08:14:01 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2960 seq=51 pid=23599
	refcnt=1
192.168.160.64/27[any] 192.168.10.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16397
	created: Feb 15 08:14:04 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2976 seq=50 pid=23599
	refcnt=1
10.10.0.64/27[any] 192.168.12.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16401
	created: Feb 15 08:16:11 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2992 seq=49 pid=23599
	refcnt=1
10.10.0.64/27[any] 192.168.10.0/24[any] any
	in prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16385
	created: Feb 15 11:13:17 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=3040 seq=48 pid=23599
	refcnt=1
192.168.1.0/24[any] 192.168.192.0/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.116-71.252.134.175/unique#16417
	created: Feb 15 07:57:50 2006  lastused: Feb 15 11:56:46 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2777 seq=47 pid=23599
	refcnt=8
192.168.1.0/24[any] 192.168.160.64/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.174-65.91.22.234/unique#16413
	created: Feb 15 08:03:38 2006  lastused: Feb 15 11:56:43 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2801 seq=46 pid=23599
	refcnt=24
192.168.10.0/24[any] 192.168.160.64/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.174-65.91.22.234/unique#16397
	created: Feb 15 08:14:04 2006  lastused: Feb 15 11:47:21 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2825 seq=45 pid=23599
	refcnt=1
192.168.12.0/24[any] 192.168.160.64/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.174-65.91.22.234/unique#16405
	created: Feb 15 08:14:01 2006  lastused: Feb 15 11:46:30 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2849 seq=44 pid=23599
	refcnt=1
192.168.1.0/24[any] 10.10.0.64/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.174-65.91.22.234/unique#16409
	created: Feb 15 08:03:21 2006  lastused: Feb 15 11:56:46 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2873 seq=43 pid=23599
	refcnt=28
192.168.10.0/24[any] 10.10.0.64/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.174-65.91.22.234/unique#16385
	created: Feb 15 11:16:26 2006  lastused: Feb 15 11:53:19 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2897 seq=42 pid=23599
	refcnt=2
192.168.12.0/24[any] 10.10.0.64/27[any] any
	out prio high + 1073739483 ipsec
	esp/tunnel/216.158.212.174-65.91.22.234/unique#16401
	created: Feb 15 08:16:11 2006  lastused: Feb 15 11:46:41 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2921 seq=41 pid=23599
	refcnt=1
192.168.192.0/27[any] 192.168.1.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/71.252.134.175-216.158.212.116/unique#16417
	created: Feb 15 07:57:50 2006  lastused: Feb 15 11:56:46 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2770 seq=40 pid=23599
	refcnt=13
10.10.0.64/27[any] 192.168.1.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16409
	created: Feb 15 08:03:21 2006  lastused: Feb 15 11:56:46 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2938 seq=39 pid=23599
	refcnt=31
192.168.160.64/27[any] 192.168.1.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16413
	created: Feb 15 08:03:38 2006  lastused: Feb 15 11:56:43 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2954 seq=38 pid=23599
	refcnt=21
192.168.160.64/27[any] 192.168.12.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16405
	created: Feb 15 08:14:01 2006  lastused: Feb 15 11:55:42 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2970 seq=37 pid=23599
	refcnt=3
192.168.160.64/27[any] 192.168.10.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16397
	created: Feb 15 08:14:04 2006  lastused: Feb 15 11:55:42 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2986 seq=36 pid=23599
	refcnt=3
10.10.0.64/27[any] 192.168.12.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16401
	created: Feb 15 08:16:11 2006  lastused: Feb 15 11:53:18 2006
	lifetime: 0(s) validtime: 0(s)
	spid=3002 seq=35 pid=23599
	refcnt=3
10.10.0.64/27[any] 192.168.10.0/24[any] any
	fwd prio high + 1073739483 ipsec
	esp/tunnel/65.91.22.234-216.158.212.174/unique#16385
	created: Feb 15 11:13:17 2006  lastused: Feb 15 11:53:19 2006
	lifetime: 0(s) validtime: 0(s)
	spid=3050 seq=34 pid=23599
	refcnt=4
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2747 seq=33 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2731 seq=32 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2715 seq=31 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2699 seq=30 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2683 seq=29 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2667 seq=28 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2651 seq=27 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2635 seq=26 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2619 seq=25 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2603 seq=24 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2587 seq=23 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2571 seq=22 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused: Feb 15 11:52:21 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2555 seq=21 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2539 seq=20 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused: Feb 15 11:55:33 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2523 seq=19 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2507 seq=18 pid=23599
	refcnt=1
(per-socket policy) 
	in none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2491 seq=17 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2756 seq=16 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2740 seq=15 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2724 seq=14 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2708 seq=13 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2692 seq=12 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2676 seq=11 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2660 seq=10 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2644 seq=9 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2628 seq=8 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2612 seq=7 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2596 seq=6 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2580 seq=5 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused: Feb 15 11:52:21 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2564 seq=4 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2548 seq=3 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused: Feb 15 11:55:33 2006
	lifetime: 0(s) validtime: 0(s)
	spid=2532 seq=2 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2516 seq=1 pid=23599
	refcnt=1
(per-socket policy) 
	out none
	created: Feb 15 07:57:43 2006  lastused:                     
	lifetime: 0(s) validtime: 0(s)
	spid=2500 seq=0 pid=23599
	refcnt=1
+ _________________________ /proc/sys/net/ipsec-star
+ test -d /proc/sys/net/ipsec
+ _________________________ ipsec/status
+ ipsec auto --status
000 interface lo/lo ::1
000 interface lo/lo 127.0.0.1
000 interface lo/lo 127.0.0.1
000 interface eth0/eth0 192.168.1.41
000 interface eth0/eth0 192.168.1.41
000 interface eth0/eth0 192.168.1.54
000 interface eth0/eth0 192.168.1.54
000 interface eth0/eth0 192.168.1.103
000 interface eth0/eth0 192.168.1.103
000 interface eth0/eth0 192.168.1.160
000 interface eth0/eth0 192.168.1.160
000 interface eth1/eth1 216.158.212.174
000 interface eth1/eth1 216.158.212.174
000 interface eth1/eth1 216.158.212.116
000 interface eth1/eth1 216.158.212.116
000 interface eth1/eth1 216.158.212.171
000 interface eth1/eth1 216.158.212.171
000 %myid = (none)
000 debug none
000  
000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, keysizemax=64
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192, keysizemax=192
000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40, keysizemax=448
000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0, keysizemax=0
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, keysizemin=128, keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, keysizemin=256, keysizemax=256
000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0
000  
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,4,36} trans={0,4,336} attrs={0,4,224} 
000  
000 "home": 192.168.1.0/24===216.158.212.116[@work]---216.158.212.113...%any[@home]===192.168.192.0/27; unrouted; eroute owner: #0
000 "home":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "home":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "home":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "home":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "home"[1]: 192.168.1.0/24===216.158.212.116[@work]---216.158.212.113...71.252.134.175[@home]===192.168.192.0/27; erouted; eroute owner: #2
000 "home"[1]:     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "home"[1]:   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "home"[1]:   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "home"[1]:   newest ISAKMP SA: #159; newest IPsec SA: #2; 
000 "home"[1]:   IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536
000 "waxahachie-common": 216.158.212.174[@corp]---216.158.212.169...65.91.22.234; unrouted; eroute owner: #0
000 "waxahachie-common":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-common":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-common":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 32,32; interface: eth1; 
000 "waxahachie-common":   newest ISAKMP SA: #0; newest IPsec SA: #0; 
000 "waxahachie-common":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-common":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-common":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-common":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-lan-bedford": 192.168.10.0/24===216.158.212.174[@corp]---216.158.212.169...65.91.22.234===192.168.160.64/27; erouted; eroute owner: #22
000 "waxahachie-lan-bedford":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-lan-bedford":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-lan-bedford":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "waxahachie-lan-bedford":   newest ISAKMP SA: #0; newest IPsec SA: #22; 
000 "waxahachie-lan-bedford":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-lan-bedford":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-lan-bedford":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-lan-bedford":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-lan-bedford":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000 "waxahachie-lan-corp": 192.168.1.0/24===216.158.212.174[@corp]---216.158.212.169...65.91.22.234===192.168.160.64/27; erouted; eroute owner: #16
000 "waxahachie-lan-corp":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-lan-corp":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-lan-corp":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "waxahachie-lan-corp":   newest ISAKMP SA: #0; newest IPsec SA: #16; 
000 "waxahachie-lan-corp":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-lan-corp":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-lan-corp":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-lan-corp":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-lan-corp":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000 "waxahachie-lan-nurscare": 192.168.12.0/24===216.158.212.174[@corp]---216.158.212.169...65.91.22.234===192.168.160.64/27; erouted; eroute owner: #21
000 "waxahachie-lan-nurscare":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-lan-nurscare":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-lan-nurscare":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "waxahachie-lan-nurscare":   newest ISAKMP SA: #0; newest IPsec SA: #21; 
000 "waxahachie-lan-nurscare":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-lan-nurscare":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-lan-nurscare":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-lan-nurscare":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-lan-nurscare":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000 "waxahachie-wireless-bedford": 192.168.10.0/24===216.158.212.174[@corp]---216.158.212.169...65.91.22.234===10.10.0.64/27; erouted; eroute owner: #146
000 "waxahachie-wireless-bedford":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-wireless-bedford":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-wireless-bedford":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL+UP; prio: 24,27; interface: eth1; 
000 "waxahachie-wireless-bedford":   newest ISAKMP SA: #158; newest IPsec SA: #146; 
000 "waxahachie-wireless-bedford":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-wireless-bedford":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-wireless-bedford":   IKE algorithm newest: 3DES_CBC_192-SHA1-MODP1536
000 "waxahachie-wireless-bedford":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-wireless-bedford":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-wireless-bedford":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000 "waxahachie-wireless-corp": 192.168.1.0/24===216.158.212.174[@corp]---216.158.212.169...65.91.22.234===10.10.0.64/27; erouted; eroute owner: #15
000 "waxahachie-wireless-corp":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-wireless-corp":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-wireless-corp":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "waxahachie-wireless-corp":   newest ISAKMP SA: #0; newest IPsec SA: #15; 
000 "waxahachie-wireless-corp":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-wireless-corp":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-wireless-corp":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-wireless-corp":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-wireless-corp":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000 "waxahachie-wireless-nurscare": 192.168.12.0/24===216.158.212.174[@corp]---216.158.212.169...65.91.22.234===10.10.0.64/27; erouted; eroute owner: #23
000 "waxahachie-wireless-nurscare":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
000 "waxahachie-wireless-nurscare":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "waxahachie-wireless-nurscare":   policy: PSK+ENCRYPT+COMPRESS+TUNNEL; prio: 24,27; interface: eth1; 
000 "waxahachie-wireless-nurscare":   newest ISAKMP SA: #0; newest IPsec SA: #23; 
000 "waxahachie-wireless-nurscare":   IKE algorithms wanted: 5_000-2-5, 5_000-2-2, flags=-strict
000 "waxahachie-wireless-nurscare":   IKE algorithms found:  5_192-2_160-5, 5_192-2_160-2, 
000 "waxahachie-wireless-nurscare":   ESP algorithms wanted: 3_000-1, flags=-strict
000 "waxahachie-wireless-nurscare":   ESP algorithms loaded: 3_000-1, flags=-strict
000 "waxahachie-wireless-nurscare":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000  
000 #139: "home"[1] 71.252.134.175:500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 419s; lastdpd=-1s(seq in:0 out:0)
000 #159: "home"[1] 71.252.134.175:500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 3257s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0)
000 #2: "home"[1] 71.252.134.175:500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 14194s; newest IPSEC; eroute owner
000 #2: "home"[1] 71.252.134.175 esp.abf6a489 at 71.252.134.175 esp.ccb90114 at 216.158.212.116 tun.0 at 71.252.134.175 tun.0 at 216.158.212.116
000 #22: "waxahachie-lan-bedford":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 15168s; newest IPSEC; eroute owner
000 #22: "waxahachie-lan-bedford" esp.fe263d4e at 65.91.22.234 esp.945c1026 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #5: "waxahachie-lan-bedford":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 14381s
000 #5: "waxahachie-lan-bedford" esp.13dce5b4 at 65.91.22.234 esp.a7b45bde at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #16: "waxahachie-lan-corp":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 14542s; newest IPSEC; eroute owner
000 #16: "waxahachie-lan-corp" esp.bd32d268 at 65.91.22.234 esp.11de0f13 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #4: "waxahachie-lan-corp":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 14367s
000 #4: "waxahachie-lan-corp" esp.d0ef3072 at 65.91.22.234 esp.cdc60fa1 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #21: "waxahachie-lan-nurscare":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 15165s; newest IPSEC; eroute owner
000 #21: "waxahachie-lan-nurscare" esp.964a6795 at 65.91.22.234 esp.e1e5bf68 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #6: "waxahachie-lan-nurscare":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 14381s
000 #6: "waxahachie-lan-nurscare" esp.b6065526 at 65.91.22.234 esp.39e021b4 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #153: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2324s; nodpd
000 #158: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 3065s; newest ISAKMP; nodpd
000 #152: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2318s; nodpd
000 #155: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 3052s; nodpd
000 #151: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2315s; nodpd
000 #144: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 842s; nodpd
000 #143: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 836s; nodpd
000 #154: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2938s; nodpd
000 #147: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 1494s; nodpd
000 #146: "waxahachie-wireless-bedford":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 26110s; newest IPSEC; eroute owner
000 #146: "waxahachie-wireless-bedford" esp.4ca6ee4a at 65.91.22.234 esp.24f669ca at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #145: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 909s; nodpd
000 #149: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2029s; nodpd
000 #156: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 3056s; nodpd
000 #142: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 833s; nodpd
000 #141: "waxahachie-wireless-bedford":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 25625s
000 #141: "waxahachie-wireless-bedford" esp.31404439 at 65.91.22.234 esp.215a0dd2 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #140: "waxahachie-wireless-bedford":500 STATE_MAIN_I4 (ISAKMP SA established); none in -1s; nodpd
000 #157: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 3059s; nodpd
000 #150: "waxahachie-wireless-bedford":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 2216s; nodpd
000 #15: "waxahachie-wireless-corp":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 14525s; newest IPSEC; eroute owner
000 #15: "waxahachie-wireless-corp" esp.ef786d18 at 65.91.22.234 esp.d08d5cf7 at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000 #23: "waxahachie-wireless-nurscare":500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 15295s; newest IPSEC; eroute owner
000 #23: "waxahachie-wireless-nurscare" esp.fe05851c at 65.91.22.234 esp.73c99c5f at 216.158.212.174 tun.0 at 65.91.22.234 tun.0 at 216.158.212.174
000  
+ _________________________ ifconfig-a
+ ifconfig -a
eth0      Link encap:Ethernet  HWaddr 00:02:55:C7:19:59  
          inet addr:192.168.1.41  Bcast:192.168.1.255  Mask:255.255.255.0
          inet6 addr: fe80::202:55ff:fec7:1959/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1492  Metric:1
          RX packets:16855178 errors:0 dropped:1308 overruns:0 frame:234473801
          TX packets:16249611 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:3674514249 (3.4 GiB)  TX bytes:80401386 (76.6 MiB)

eth1      Link encap:Ethernet  HWaddr 00:02:55:C7:19:5A  
          inet addr:216.158.212.174  Bcast:216.158.212.175  Mask:255.255.255.248
          inet6 addr: fe80::202:55ff:fec7:195a/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1492  Metric:1
          RX packets:2521658 errors:0 dropped:168 overruns:0 frame:15015847
          TX packets:2064720 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:416895819 (397.5 MiB)  TX bytes:746216459 (711.6 MiB)

eth2      Link encap:Ethernet  HWaddr 00:02:B3:9D:B9:EB  
          BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

eth3      Link encap:Ethernet  HWaddr 00:02:B3:9D:B9:EC  
          BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:3523898 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3523898 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:1095937586 (1.0 GiB)  TX bytes:1095937586 (1.0 GiB)

sit0      Link encap:IPv6-in-IPv4  
          NOARP  MTU:1480  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

+ _________________________ ip-addr-list
+ ip addr list
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1492 qdisc pfifo_fast qlen 1000
    link/ether 00:02:55:c7:19:59 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.41/24 brd 192.168.1.255 scope global eth0
    inet 192.168.1.54/24 scope global secondary eth0
    inet 192.168.1.103/24 scope global secondary eth0
    inet 192.168.1.160/24 scope global secondary eth0
    inet6 fe80::202:55ff:fec7:1959/64 scope link 
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1492 qdisc pfifo_fast qlen 1000
    link/ether 00:02:55:c7:19:5a brd ff:ff:ff:ff:ff:ff
    inet 216.158.212.174/29 brd 216.158.212.175 scope global eth1
    inet 216.158.212.116/29 scope global eth1
    inet 216.158.212.171/29 scope global secondary eth1
    inet6 fe80::202:55ff:fec7:195a/64 scope link 
       valid_lft forever preferred_lft forever
4: eth2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000
    link/ether 00:02:b3:9d:b9:eb brd ff:ff:ff:ff:ff:ff
5: eth3: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000
    link/ether 00:02:b3:9d:b9:ec brd ff:ff:ff:ff:ff:ff
6: sit0: <NOARP> mtu 1480 qdisc noop 
    link/sit 0.0.0.0 brd 0.0.0.0
+ _________________________ ip-route-list
+ ip route list
216.158.212.112/29 dev eth1  proto kernel  scope link  src 216.158.212.116 
216.158.212.168/29 dev eth1  proto kernel  scope link  src 216.158.212.174 
192.168.160.64/27 via 216.158.212.169 dev eth1  mtu 1492
10.10.0.64/27 via 216.158.212.169 dev eth1  mtu 1492
192.168.192.0/27 via 216.158.212.113 dev eth1  mtu 1492
192.168.7.0/24 via 192.168.1.1 dev eth0 
192.168.192.0/24 via 192.168.1.104 dev eth0 
192.168.6.0/24 via 192.168.1.1 dev eth0 
192.168.5.0/24 via 192.168.1.1 dev eth0 
192.168.4.0/24 via 192.168.1.1 dev eth0 
192.168.3.0/24 via 192.168.1.1 dev eth0 
192.168.2.0/24 via 192.168.1.1 dev eth0 
192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.41 
192.168.170.0/24 via 192.168.1.104 dev eth0 
192.168.12.0/24 via 192.168.1.1 dev eth0 
192.168.11.0/24 via 192.168.1.1 dev eth0 
192.168.191.0/24 via 192.168.1.104 dev eth0 
192.168.10.0/24 via 192.168.1.1 dev eth0 
192.168.9.0/24 via 192.168.1.1 dev eth0 
192.168.8.0/24 via 192.168.1.1 dev eth0 
default via 216.158.212.169 dev eth1 
+ _________________________ ip-rule-list
+ ip rule list
0:	from all lookup local 
32766:	from all lookup main 
32767:	from all lookup default 
+ _________________________ ipsec_verify
+ ipsec verify --nocolour
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path                             	[OK]
Linux Openswan U2.4.0/K2.6.12-9-686-smp (netkey)
Checking for IPsec support in kernel                        	[OK]
Checking for RSA private key (/etc/ipsec.secrets)           	[FAILED]
ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running                              	[OK]
Two or more interfaces found, checking IP forwarding        	[OK]
Checking NAT and MASQUERADEing                              	[OK]
Checking for 'ip' command                                   	[OK]
Checking for 'iptables' command                             	[OK]
Checking for 'setkey' command for NETKEY IPsec stack support	[OK]
Opportunistic Encryption Support                            	[DISABLED]
+ _________________________ mii-tool
+ '[' -x /sbin/mii-tool ']'
+ /sbin/mii-tool -v
eth0: negotiated 100baseTx-FD, link ok
  product info: Intel 82555 rev 4
  basic mode:   autonegotiation enabled
  basic status: autonegotiation complete, link ok
  capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
  advertising:  100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
  link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
eth1: negotiated 100baseTx-FD, link ok
  product info: Intel 82555 rev 4
  basic mode:   autonegotiation enabled
  basic status: autonegotiation complete, link ok
  capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
  advertising:  100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
  link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
eth2: no link
  product info: Intel 82555 rev 4
  basic mode:   autonegotiation enabled
  basic status: no link
  capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
  advertising:  100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
eth3: no link
  product info: Intel 82555 rev 4
  basic mode:   autonegotiation enabled
  basic status: no link
  capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
  advertising:  100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control
+ _________________________ ipsec/directory
+ ipsec --directory
/usr/lib/ipsec
+ _________________________ hostname/fqdn
+ hostname --fqdn
localhost.localdomain
+ _________________________ hostname/ipaddress
+ hostname --ip-address
127.0.0.1 
+ _________________________ uptime
+ uptime
 11:56:46 up 6 days,  1:34,  1 user,  load average: 0.23, 0.37, 0.31
+ _________________________ ps
+ ps alxwf
+ egrep -i 'ppid|pluto|ipsec|klips'
F   UID   PID  PPID PRI  NI    VSZ   RSS WCHAN  STAT TTY        TIME COMMAND
0     0 23577 23550  20   0   3880  1360 wait   S+   pts/0      0:00          \_ /bin/sh /usr/lib/ipsec/barf
0     0 23652 23577  23   0   1624   500 pipe_w S+   pts/0      0:00              \_ grep -E -i ppid|pluto|ipsec|klips
1     0 11226     1  21   0   2396  1168 wait   S    ?          0:00 /bin/bash /usr/lib/ipsec/_plutorun --debug  --uniqueids yes --nocrsend  --strictcrlpolicy  --nat_traversal yes --keep_alive  --protostack auto --force_keepalive  --disable_port_floating  --virtual_private %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.1.0/24 --crlcheckinterval 0 --ocspuri  --nhelpers  --dump  --opts  --stderrlog  --wait no --pre  --post  --log daemon.error --pid /var/run/pluto/pluto.pid
1     0 11227 11226  21   0   2396  1176 wait   S    ?          0:00  \_ /bin/bash /usr/lib/ipsec/_plutorun --debug  --uniqueids yes --nocrsend  --strictcrlpolicy  --nat_traversal yes --keep_alive  --protostack auto --force_keepalive  --disable_port_floating  --virtual_private %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.1.0/24 --crlcheckinterval 0 --ocspuri  --nhelpers  --dump  --opts  --stderrlog  --wait no --pre  --post  --log daemon.error --pid /var/run/pluto/pluto.pid
4     0 11229 11227  15   0   6260  2716 -      S    ?          0:01  |   \_ /usr/lib/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets --ipsecdir /etc/ipsec.d --use-auto --uniqueids --nat_traversal --virtual_private %v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.1.0/24
1     0 11234 11229  27  10   5700  1740 -      SN   ?          0:01  |       \_ pluto helper  #  0    -nofork                                                                                                                                                                                          
0     0 11300 11229  19   0   1484   284 -      S    ?          0:00  |       \_ _pluto_adns
0     0 11230 11226  15   0   2372  1132 pipe_w S    ?          0:00  \_ /bin/sh /usr/lib/ipsec/_plutoload --wait no --post 
0     0 11228     1  21   0   1548   404 pipe_w S    ?          0:00 logger -s -p daemon.error -t ipsec__plutorun
+ _________________________ ipsec/showdefaults
+ ipsec showdefaults
routephys=eth1
routevirt=ipsec0
routeaddr=216.158.212.174
routenexthop=216.158.212.169
+ _________________________ ipsec/conf
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor

#< /etc/ipsec.conf 1
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.15.2.1 2005/07/26 12:28:39 ken Exp $

# This file:  /usr/share/doc/openswan/ipsec.conf-sample
#
# Manual:     ipsec.conf.5


version	2.0	# conforms to second version of ipsec.conf specification

# basic configuration
config setup
	interfaces=%defaultroute
	nat_traversal=yes
	virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.1.0/24

conn %default
	keyingtries=1
	compress=yes
	disablearrivalcheck=no
	authby=rsasig
	leftrsasigkey=%cert
	rightrsasigkey=%cert

conn waxahachie-wireless-corp
	leftsubnet=192.168.1.0/24
	rightsubnet=10.10.0.64/27
	also=waxahachie-common

conn waxahachie-wireless-bedford
	leftsubnet=192.168.10.0/24
	rightsubnet=10.10.0.64/27
	also=waxahachie-common

conn waxahachie-lan-corp
	leftsubnet=192.168.1.0/24
	rightsubnet=192.168.160.64/27
	also=waxahachie-common

conn waxahachie-lan-bedford
	leftsubnet=192.168.10.0/24
	rightsubnet=192.168.160.64/27
	also=waxahachie-common

conn waxahachie-wireless-nurscare
	leftsubnet=192.168.12.0/24
	rightsubnet=10.10.0.64/27
	also=waxahachie-common

conn waxahachie-lan-nurscare
	leftsubnet=192.168.12.0/24
	rightsubnet=192.168.160.64/27
	also=waxahachie-common

conn waxahachie-common
	left=216.158.212.174
	leftnexthop=216.158.212.169
	leftid=@corp
	right=65.91.22.234
	rightid=65.91.22.234
	pfs=no
	auto=add
	auth=esp
	esp=3des-md5
	ike=3des-sha1
	authby=secret

conn home
	left=%any
	leftsubnet=192.168.192.0/27
	leftid=@home
	right=216.158.212.116
	rightsubnet=192.168.1.0/24
	rightnexthop=216.158.212.113
	rightid=@work
	pfs=no
	authby=secret
	forceencaps=yes
	auto=add

#conn L2TP-PSK
#	left=216.158.212.116
#	leftnexthop=216.158.212.113
#	also=L2TP-common

#conn L2TP-PSK-INT
#	left=192.168.1.41
#	leftnexthop=192.168.1.1
#	also=L2TP-common

#conn L2TP-common
#	right=%any
#	authby=secret
 #       pfs=no
  #      rekey=no
   #     keyingtries=3
    #    leftprotoport=17/1701
     #   rightprotoport=17/%any
      #  auto=add

#conn sonicwall
#	left=216.158.212.174
#	leftnexthop=216.158.212.169
#	leftsubnet=192.168.1.0/24
#	leftid=@home
#	right=65.91.22.234
#	rightsubnet=10.10.0.64/27
#	rightid=65.91.22.234
#	pfs=no
#	auto=add
#	auth=esp
#	esp=3des-md5
#	ike=3des-sha1
#	authby=secret

#conn waxahachie2
#	left=216.158.212.174
#	leftnexthop=216.158.212.169
#	leftsubnet=192.168.10.0/24
#	leftid=@home
#	right=65.91.22.234
#	rightsubnet=10.10.0.64/27
#	rightid=65.91.22.234	
#	pfs=no
#	auto=add
#	auth=esp
#	esp=3des-md5
#	ike=3des-sha1
#	authby=secret


	# plutodebug / klipsdebug = "all", "none" or a combation from below:
	# "raw crypt parsing emitting control klips pfkey natt x509 private"
	# eg:
	# plutodebug="control parsing"
	#
	# Only enable klipsdebug=all if you are a developer
	#
	# NAT-TRAVERSAL support, see README.NAT-Traversal
	# nat_traversal=yes
	# virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12

# Add connections here

# sample VPN connection
#	conn sample
#		# Left security gateway, subnet behind it, nexthop toward right.
#		left=10.0.0.1
#		leftsubnet=172.16.0.0/24
#		leftnexthop=10.22.33.44
#		# Right security gateway, subnet behind it, nexthop toward left.
#		right=10.12.12.1
#		rightsubnet=192.168.0.0/24
#		rightnexthop=10.101.102.103
#		# To authorize this connection, but not actually start it, 
#		# at startup, uncomment this.
#		#auto=start

#Disable Opportunistic Encryption

#< /etc/ipsec.d/examples/no_oe.conf 1
# 'include' this file to disable Opportunistic Encryption.
# See /usr/share/doc/openswan/policygroups.html for details.
#
# RCSID $Id: no_oe.conf.in,v 1.2 2004/10/03 19:33:10 paul Exp $
conn block 
    auto=ignore

conn private 
    auto=ignore

conn private-or-clear 
    auto=ignore

conn clear-or-private 
    auto=ignore

conn clear 
    auto=ignore

conn packetdefault 
    auto=ignore

#> /etc/ipsec.conf 161
+ _________________________ ipsec/secrets
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor

#< /etc/ipsec.secrets 1
# RCSID $Id: ipsec.secrets.proto,v 1.2 2004/03/13 17:13:47 rene Exp $
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication.  See ipsec_pluto(8) manpage, and HTML documentation.

# RSA private key for this host, authenticating it to any other host
# which knows the public part.  Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "[sums to ef67...]".
216.158.212.174 %any: RSA elaremore.key "[sums to 3a72...]"
@corp 65.91.22.234: PSK "[sums to 3a72...]"
@home2 65.91.22.234: PSK "[sums to 3a72...]"
216.158.212.116 %any: PSK "[sums to 3a72...]"
192.168.1.41 %any: PSK "[sums to 3a72...]"
@work %any: PSK "[sums to 3a72...]"
+ _________________________ ipsec/listall
+ ipsec auto --listall
000  
000 List of Public Keys:
000  
000  
000 List of X.509 CA Certificates:
000  
000 Feb 15 07:57:42 2006, count: 1
000        subject: 'C=US, ST=Texas, L=Grapevine, O=Texas Health Management Group'
000        issuer:  'C=US, ST=Texas, L=Grapevine, O=Texas Health Management Group'
000        serial:   00:e5:74:35:63:bf:b7:a0:7b
000        pubkey:   1024 RSA Key AwEAAdCwg
000        validity: not before Nov 14 10:21:01 2005 ok
000                  not after  Nov 13 10:21:01 2015 ok
000        subjkey:  f7:d0:29:74:2e:a5:ac:43:f7:0d:c0:8c:aa:e5:a0:1d:67:d1:5a:48
000        authkey:  f7:d0:29:74:2e:a5:ac:43:f7:0d:c0:8c:aa:e5:a0:1d:67:d1:5a:48
000        aserial:  00:e5:74:35:63:bf:b7:a0:7b
000  
000 List of X.509 CRLs:
000  
000 Feb 15 07:57:42 2006, revoked certs: 0
000        issuer:  'C=US, ST=Texas, L=Grapevine, O=Texas Health Management Group'
000        updates:  this Nov 14 10:21:17 2005
000                  next Dec 14 10:21:17 2005 warning (expired)
+ '[' /etc/ipsec.d/policies ']'
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/block
+ base=block
+ _________________________ ipsec/policies/block
+ cat /etc/ipsec.d/policies/block
# This file defines the set of CIDRs (network/mask-length) to which
# communication should never be allowed.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#

+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear
+ base=clear
+ _________________________ ipsec/policies/clear
+ cat /etc/ipsec.d/policies/clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear-or-private
+ base=clear-or-private
+ _________________________ ipsec/policies/clear-or-private
+ cat /etc/ipsec.d/policies/clear-or-private
# This file defines the set of CIDRs (network/mask-length) to which
# we will communicate in the clear, or, if the other side initiates IPSEC,
# using encryption.  This behaviour is also called "Opportunistic Responder".
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private
+ base=private
+ _________________________ ipsec/policies/private
+ cat /etc/ipsec.d/policies/private
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be private (i.e. encrypted).
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private-or-clear
+ base=private-or-clear
+ _________________________ ipsec/policies/private-or-clear
+ cat /etc/ipsec.d/policies/private-or-clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should be private, if possible, but in the clear otherwise.
#
# If the target has a TXT (later IPSECKEY) record that specifies
# authentication material, we will require private (i.e. encrypted)
# communications.  If no such record is found, communications will be
# in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
#

0.0.0.0/0
+ _________________________ ipsec/ls-libdir
+ ls -l /usr/lib/ipsec
total 1368
-rwxr-xr-x  1 root root  15535 Oct  8 10:15 _confread
-rwxr-xr-x  1 root root   4296 Oct  8 10:15 _copyright
-rwxr-xr-x  1 root root   2379 Oct  8 10:15 _include
-rwxr-xr-x  1 root root   1475 Oct  8 10:15 _keycensor
-rwxr-xr-x  1 root root   7784 Oct  8 10:15 _pluto_adns
-rwxr-xr-x  1 root root   3586 Oct  8 10:15 _plutoload
-rwxr-xr-x  1 root root   7429 Oct  8 10:15 _plutorun
-rwxr-xr-x  1 root root  12275 Oct  8 10:15 _realsetup
-rwxr-xr-x  1 root root   1975 Oct  8 10:15 _secretcensor
-rwxr-xr-x  1 root root   9772 Oct  8 10:15 _startklips
-rwxr-xr-x  1 root root  13435 Feb  8 20:39 _updown
-rwxr-xr-x  1 root root  15746 Oct  8 10:15 _updown_x509
-rwxr-xr-x  1 root root  18846 Oct  8 10:15 auto
-rwxr-xr-x  1 root root  10560 Oct  8 10:15 barf
-rwxr-xr-x  1 root root    816 Oct  8 10:15 calcgoo
-rwxr-xr-x  1 root root  76964 Oct  8 10:15 eroute
-rwxr-xr-x  1 root root  16916 Oct  8 10:15 ikeping
-rwxr-xr-x  1 root root   1942 Oct  8 10:15 ipsec_pr.template
-rwxr-xr-x  1 root root  60992 Oct  8 10:15 klipsdebug
-rwxr-xr-x  1 root root   1836 Oct  8 10:15 livetest
-rwxr-xr-x  1 root root   2605 Oct  8 10:15 look
-rwxr-xr-x  1 root root   7147 Oct  8 10:15 mailkey
-rwxr-xr-x  1 root root  15951 Oct  8 10:15 manual
-rwxr-xr-x  1 root root   1926 Oct  8 10:15 newhostkey
-rwxr-xr-x  1 root root  52160 Oct  8 10:15 pf_key
-rwxr-xr-x  1 root root 640856 Oct  8 10:15 pluto
-rwxr-xr-x  1 root root   6244 Oct  8 10:15 ranbits
-rwxr-xr-x  1 root root  18684 Oct  8 10:15 rsasigkey
-rwxr-xr-x  1 root root    766 Oct  8 10:15 secrets
-rwxr-xr-x  1 root root  17624 Oct  8 10:15 send-pr
lrwxrwxrwx  1 root root     17 Nov 14 10:18 setup -> /etc/init.d/ipsec
-rwxr-xr-x  1 root root   1054 Oct  8 10:15 showdefaults
-rwxr-xr-x  1 root root   4748 Oct  8 10:15 showhostkey
-rwxr-xr-x  1 root root 114992 Oct  8 10:15 spi
-rwxr-xr-x  1 root root  65664 Oct  8 10:15 spigrp
-rwxr-xr-x  1 root root   9796 Oct  8 10:15 tncfg
-rwxr-xr-x  1 root root  10601 Oct  8 10:15 verify
-rwxr-xr-x  1 root root  47092 Oct  8 10:15 whack
+ _________________________ ipsec/ls-execdir
+ ls -l /usr/lib/ipsec
total 1368
-rwxr-xr-x  1 root root  15535 Oct  8 10:15 _confread
-rwxr-xr-x  1 root root   4296 Oct  8 10:15 _copyright
-rwxr-xr-x  1 root root   2379 Oct  8 10:15 _include
-rwxr-xr-x  1 root root   1475 Oct  8 10:15 _keycensor
-rwxr-xr-x  1 root root   7784 Oct  8 10:15 _pluto_adns
-rwxr-xr-x  1 root root   3586 Oct  8 10:15 _plutoload
-rwxr-xr-x  1 root root   7429 Oct  8 10:15 _plutorun
-rwxr-xr-x  1 root root  12275 Oct  8 10:15 _realsetup
-rwxr-xr-x  1 root root   1975 Oct  8 10:15 _secretcensor
-rwxr-xr-x  1 root root   9772 Oct  8 10:15 _startklips
-rwxr-xr-x  1 root root  13435 Feb  8 20:39 _updown
-rwxr-xr-x  1 root root  15746 Oct  8 10:15 _updown_x509
-rwxr-xr-x  1 root root  18846 Oct  8 10:15 auto
-rwxr-xr-x  1 root root  10560 Oct  8 10:15 barf
-rwxr-xr-x  1 root root    816 Oct  8 10:15 calcgoo
-rwxr-xr-x  1 root root  76964 Oct  8 10:15 eroute
-rwxr-xr-x  1 root root  16916 Oct  8 10:15 ikeping
-rwxr-xr-x  1 root root   1942 Oct  8 10:15 ipsec_pr.template
-rwxr-xr-x  1 root root  60992 Oct  8 10:15 klipsdebug
-rwxr-xr-x  1 root root   1836 Oct  8 10:15 livetest
-rwxr-xr-x  1 root root   2605 Oct  8 10:15 look
-rwxr-xr-x  1 root root   7147 Oct  8 10:15 mailkey
-rwxr-xr-x  1 root root  15951 Oct  8 10:15 manual
-rwxr-xr-x  1 root root   1926 Oct  8 10:15 newhostkey
-rwxr-xr-x  1 root root  52160 Oct  8 10:15 pf_key
-rwxr-xr-x  1 root root 640856 Oct  8 10:15 pluto
-rwxr-xr-x  1 root root   6244 Oct  8 10:15 ranbits
-rwxr-xr-x  1 root root  18684 Oct  8 10:15 rsasigkey
-rwxr-xr-x  1 root root    766 Oct  8 10:15 secrets
-rwxr-xr-x  1 root root  17624 Oct  8 10:15 send-pr
lrwxrwxrwx  1 root root     17 Nov 14 10:18 setup -> /etc/init.d/ipsec
-rwxr-xr-x  1 root root   1054 Oct  8 10:15 showdefaults
-rwxr-xr-x  1 root root   4748 Oct  8 10:15 showhostkey
-rwxr-xr-x  1 root root 114992 Oct  8 10:15 spi
-rwxr-xr-x  1 root root  65664 Oct  8 10:15 spigrp
-rwxr-xr-x  1 root root   9796 Oct  8 10:15 tncfg
-rwxr-xr-x  1 root root  10601 Oct  8 10:15 verify
-rwxr-xr-x  1 root root  47092 Oct  8 10:15 whack
+ _________________________ ipsec/updowns
++ ls /usr/lib/ipsec
++ egrep updown
+ for f in '`ls ${IPSEC_EXECDIR-/usr/libexec/ipsec} | egrep updown`'
+ cat /usr/lib/ipsec/_updown
#! /bin/sh
# iproute2 version, default updown script
#
# Copyright (C) 2003-2004 Nigel Metheringham
# Copyright (C) 2002-2004 Michael Richardson <mcr at xelerance.com>
# Copyright (C) 2003-2005 Tuomo Soini <tis at foobar.fi>
# 
# This program is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the
# Free Software Foundation; either version 2 of the License, or (at your
# option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
# 
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
# for more details.
#
# RCSID $Id: _updown.in,v 1.21.2.8 2005/08/28 02:45:26 paul Exp $



# CAUTION:  Installing a new version of FreeS/WAN will install a new
# copy of this script, wiping out any custom changes you make.  If
# you need changes, make a copy of this under another name, and customize
# that, and use the (left/right)updown parameters in ipsec.conf to make
# FreeS/WAN use yours instead of this default one.

LC_ALL=C export LC_ALL

# things that this script gets (from ipsec_pluto(8) man page)
#
#
#      PLUTO_VERSION
#              indicates  what  version of this interface is being
#              used.  This document describes version  1.1.   This
#              is upwardly compatible with version 1.0.
#
#       PLUTO_VERB
#              specifies the name of the operation to be performed
#              (prepare-host, prepare-client, up-host, up-client,
#              down-host, or down-client).  If the address family
#              for security gateway to security gateway communica­
#              tions is IPv6, then a suffix of -v6 is added to the
#              verb.
#
#       PLUTO_CONNECTION
#              is the name of the  connection  for  which  we  are
#              routing.
#
#       PLUTO_CONN_POLICY
#              the policy of the connection, as in:
#     RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+failureDROP+lKOD+rKOD  
#
#       PLUTO_NEXT_HOP
#              is the next hop to which packets bound for the peer
#              must be sent.
#
#       PLUTO_INTERFACE
#              is the name of the ipsec interface to be used.
#
#       PLUTO_ME
#              is the IP address of our host.
#
#       PLUTO_MY_CLIENT
#              is the IP address / count of our client subnet.  If
#              the  client  is  just  the  host,  this will be the
#              host's own IP address / max (where max  is  32  for
#              IPv4 and 128 for IPv6).
#
#       PLUTO_MY_CLIENT_NET
#              is the IP address of our client net.  If the client
#              is just the host, this will be the  host's  own  IP
#              address.
#
#       PLUTO_MY_CLIENT_MASK
#              is  the  mask for our client net.  If the client is
#              just the host, this will be 255.255.255.255.
#
#       PLUTO_MY_SOURCEIP
#              if non-empty, then the source address for the route will be
#              set to this IP address.
#
#       PLUTO_MY_PROTOCOL
#              is the protocol  for this  connection.  Useful  for
#              firewalling.
#
#       PLUTO_MY_PORT
#              is the port. Useful for firewalling.
#
#       PLUTO_PEER
#              is the IP address of our peer.
#
#       PLUTO_PEER_CLIENT
#              is the IP address / count of the peer's client sub­
#              net.   If the client is just the peer, this will be
#              the peer's own IP address / max (where  max  is  32
#              for IPv4 and 128 for IPv6).
#
#       PLUTO_PEER_CLIENT_NET
#              is the IP address of the peer's client net.  If the
#              client is just the peer, this will  be  the  peer's
#              own IP address.
#
#       PLUTO_PEER_CLIENT_MASK
#              is  the  mask  for  the  peer's client net.  If the
#              client   is   just   the   peer,   this   will   be
#              255.255.255.255.
#
#       PLUTO_PEER_PROTOCOL
#              is  the  protocol  set  for  remote  end  with port
#              selector.
#
#       PLUTO_PEER_PORT
#              is the peer's port. Useful for firewalling.
#
#       PLUTO_CONNECTION_TYPE
#

# Import default _updown configs from the /etc/sysconfig/pluto_updown file
#
# Two variables can be set in this file:
#
#       DEFAULTSOURCE
#              is the default value for PLUTO_MY_SOURCEIP
#
#       IPROUTETABLE
#              is the default value for IPROUTETABLE
#
#       IPROUTEARGS
#              is the extra argument list for ip route command
#
#       IPRULEARGS
#              is the extra argument list for ip rule command
#
if [ -f /etc/sysconfig/pluto_updown ]
then
    . /etc/sysconfig/pluto_updown
fi

# check interface version
case "$PLUTO_VERSION" in
1.[0])	# Older Pluto?!?  Play it safe, script may be using new features.
	echo "$0: obsolete interface version \`$PLUTO_VERSION'," >&2
	echo "$0: 	called by obsolete Pluto?" >&2
	exit 2
	;;
1.*)	;;
*)	echo "$0: unknown interface version \`$PLUTO_VERSION'" >&2
	exit 2
	;;
esac

# check parameter(s)
case "$1:$*" in
':')			# no parameters
	;;
ipfwadm:ipfwadm)	# due to (left/right)firewall; for default script only
	;;
custom:*)		# custom parameters (see above CAUTION comment)
	;;
*)	echo "$0: unknown parameters \`$*'" >&2
	exit 2
	;;
esac

# utility functions for route manipulation
# Meddling with this stuff should not be necessary and requires great care.
uproute() {
	doroute add
	ip route flush cache
}

downroute() {
	doroute delete
	ip route flush cache
}

uprule() {
	# policy based advanced routing
	if [ -n "$IPROUTETABLE" ]
	then
	    dorule delete
	    dorule add
	fi
	# virtual sourceip support
	if [ -n "$PLUTO_MY_SOURCEIP" ]
	then
	    if addsource
	    then
		changesource
	    fi
	fi
	ip route flush cache
}

downrule() {
	if [ -n "$IPROUTETABLE" ]
	then
	    dorule delete
	    ip route flush cache
	fi
}

addsource() {
	st=0
	# check if given sourceip is local and add as alias if not
	if ! ip -o route get ${PLUTO_MY_SOURCEIP%/*} | grep -q ^local
	then
	    it="ip addr add ${PLUTO_MY_SOURCEIP%/*}/32 dev ${PLUTO_INTERFACE%:*}"
	    oops="`eval $it 2>&1`"
	    st=$?
	    if test " $oops" = " " -a " $st" != " 0"
	    then
		oops="silent error, exit status $st"
	    fi
	    case "$oops" in
		    'RTNETLINK answers: File exists'*)
		    # should not happen, but ... ignore if the
		    # address was already assigned on interface
		    oops=""
		    st=0
		    ;;
	    esac
	    if test " $oops" != " " -o " $st" != " 0"
	    then
		echo "$0: addsource \`$it' failed ($oops)" >&2
	    fi
	fi
	return $st
}

changesource() {
	st=0
	parms="$PLUTO_PEER_CLIENT dev ${PLUTO_INTERFACE%:*}"
	parms="$parms src ${PLUTO_MY_SOURCEIP%/*} $IPROUTEARGS"
	if [ -n "$IPROUTETABLE" ]
	then
	    parms="$parms table $IPROUTETABLE"
	fi
	it="ip route change $parms"
 	case "$PLUTO_PEER_CLIENT" in
 	"0.0.0.0/0")
		# opportunistic encryption work around
		it=
 		;;
 	esac
	oops="`eval $it 2>&1`"
 	st=$?
	if test " $oops" = " " -a " $st" != " 0"
 	then
	    oops="silent error, exit status $st"
	fi
	if test " $oops" != " " -o " $st" != " 0"
	then
	    echo "$0: changesource \`$it' failed ($oops)" >&2
 	fi
 	return $st
}

dorule() {
	st=0
	it2=
	iprule="from $PLUTO_MY_CLIENT"
	iprule2="to $PLUTO_PEER_CLIENT table $IPROUTETABLE $IPRULEARGS"
	case "$PLUTO_PEER_CLIENT" in
	"0.0.0.0/0")
		# opportunistic encryption work around
		st=0
		;;
	*)
		if [ -z "$PLUTO_MY_SOURCEIP" ]
		then
		    if [ "$PLUTO_ME" = "${PLUTO_MY_CLIENT%/*}" ]
		    then
			it="ip rule $1 iif lo $iprule2"
		    else
			it="ip rule $1 $iprule $iprule2"
		    fi
		else
		    if [ "${PLUTO_MY_SOURCEIP%/*}" = "${PLUTO_MY_CLIENT%/*}" ]
		    then
			it="ip rule $1 iif lo $iprule2"
		    else
			it="ip rule $1 $iprule $iprule2"
			it2="ip rule $1 iif lo $iprule2"
		    fi
		fi
		oops="`eval $it 2>&1`"
		st=$?
		if test " $oops" = " " -a " $st" != " 0"
		then
		    oops="silent error, exit status $st"
		fi
		case "$oops" in
		'RTNETLINK answers: No such process'*)
			# This is what ip rule gives
			# for "could not find such a rule"
			oops=
			st=0
			;;
		esac
		if test " $oops" != " " -o " $st" != " 0"
		then
		    echo "$0: dorule \`$it' failed ($oops)" >&2
		fi
		if test "$st" = "0" -a -n "$it2"
		then
		    oops="`eval $it2 2>&1`"
		    st=$?
		    if test " $oops" = " " -a " $st" != " 0"
		    then
			oops="silent error, exit status $st"
		    fi
		    case "$oops" in
		    'RTNETLINK answers: No such process'*)
			    # This is what ip rule gives
			    # for "could not find such a rule"
			    oops=
			    st=0
			    ;;
		    esac
		    if test " $oops" != " " -o " $st" != " 0"
		    then
			echo "$0: dorule \`$it2' failed ($oops)" >&2
		    fi
		fi
		;;
	    esac
	return $st
}


doroute() {
	st=0
	parms="$PLUTO_PEER_CLIENT"
	parms2=
	if [ -n "$PLUTO_NEXT_HOP" ] && [ "$PLUTO_NEXT_HOP" != "$PLUTO_PEER" ]
	then
	   parms2="via $PLUTO_NEXT_HOP"
	fi
	parms2="$parms2 dev ${PLUTO_INTERFACE%:*}"
	parms3="$IPROUTEARGS"
	if [ -n "$IPROUTETABLE" ]
	then
	    parms3="$parms3 table $IPROUTETABLE"
	fi

	if [ -z "$PLUTO_MY_SOURCEIP" ] && [ -n "$DEFAULTSOURCE" ]
	then
	    PLUTO_MY_SOURCEIP="${DEFAULTSOURCE%/*}"
        fi

	if test "$1" = "add" -a -n "$PLUTO_MY_SOURCEIP" 
	then
	    addsource
	    parms3="$parms3 src ${PLUTO_MY_SOURCEIP%/*}"
	fi

	case "$PLUTO_PEER_CLIENT" in
	"0.0.0.0/0")
		# opportunistic encryption work around
		# need to provide route that eclipses default, without 
		# replacing it.
		it="ip route $1 0.0.0.0/1 $parms2 $parms3 &&
			ip route $1 128.0.0.0/1 $parms2 $parms3 mtu 1492"
		;;
	*)	it="ip route $1 $parms $parms2 $parms3 mtu 1492"
		;;
	esac
	oops="`eval $it 2>&1`"
	st=$?
	if test " $oops" = " " -a " $st" != " 0"
	then
	    oops="silent error, exit status $st"
	fi
	if test " $oops" != " " -o " $st" != " 0"
	then
	    echo "$0: doroute \`$it' failed ($oops)" >&2
	fi
	return $st
}
 

# the big choice
case "$PLUTO_VERB:$1" in
prepare-host:*|prepare-client:*)
	# delete possibly-existing route (preliminary to adding a route)
	case "$PLUTO_PEER_CLIENT" in
	"0.0.0.0/0")
		# need to provide route that eclipses default, without 
		# replacing it.
		parms1="0.0.0.0/1"
		parms2="128.0.0.0/1"
		it="ip route delete $parms1 $IPROUTEARGS 2>&1 ; ip route delete $parms2 $IPROUTEARGS 2>&1"
		oops="`ip route delete $parms1 $IPROUTEARGS 2>&1 ; ip route delete $parms2 $IPROUTEARGS 2>&1`"
		;;
	*)
		parms="$PLUTO_PEER_CLIENT $IPROUTEARGS"
		if [ -n "$IPROUTETABLE" ]
		then
		    parms="$parms table $IPROUTETABLE"
		fi
		it="ip route delete $parms 2>&1"
		oops="`ip route delete $parms 2>&1`"
		;;
	esac
	status="$?"
	if test " $oops" = " " -a " $status" != " 0"
	then
		oops="silent error, exit status $status"
	fi
	case "$oops" in
	*'RTNETLINK answers: No such process'*)	
		# This is what route (currently -- not documented!) gives
		# for "could not find such a route".
		oops=
		status=0
		;;
	esac
	if test " $oops" != " " -o " $status" != " 0"
	then
		echo "$0: \`$it' failed ($oops)" >&2
	fi
	exit $status
	;;
route-host:*|route-client:*)
	# connection to me or my client subnet being routed
	uproute
	;;
unroute-host:*|unroute-client:*)
	# connection to me or my client subnet being unrouted
	downroute
	;;
up-host:*)
	# connection to me coming up
	uprule
	# If you are doing a custom version, firewall commands go here.
	;;
down-host:*)
	# connection to me going down
	downrule
	# If you are doing a custom version, firewall commands go here.
	;;
up-client:)
	# connection to my client subnet coming up
	uprule
	# If you are doing a custom version, firewall commands go here.
	;;
down-client:)
	# connection to my client subnet going down
	downrule
	# If you are doing a custom version, firewall commands go here.
	;;
up-client:ipfwadm)
	# connection to client subnet, with (left/right)firewall=yes, coming up
	uprule
	# This is used only by the default updown script, not by your custom
	# ones, so do not mess with it; see CAUTION comment up at top.
	ipfwadm -F -i accept -b -S $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
		-D $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
	;;
down-client:ipfwadm)
	# connection to client subnet, with (left/right)firewall=yes, going down
	downrule
	# This is used only by the default updown script, not by your custom
	# ones, so do not mess with it; see CAUTION comment up at top.
	ipfwadm -F -d accept -b -S $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
		-D $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
	;;
#
# IPv6
#
prepare-host-v6:*|prepare-client-v6:*)
	;;
route-host-v6:*|route-client-v6:*)
	# connection to me or my client subnet being routed
	#uproute_v6
	;;
unroute-host-v6:*|unroute-client-v6:*)
	# connection to me or my client subnet being unrouted
	#downroute_v6
	;;
up-host-v6:*)
	# connection to me coming up
	# If you are doing a custom version, firewall commands go here.
	;;
down-host-v6:*)
	# connection to me going down
	# If you are doing a custom version, firewall commands go here.
	;;
up-client-v6:)
	# connection to my client subnet coming up
	# If you are doing a custom version, firewall commands go here.
	;;
down-client-v6:)
	# connection to my client subnet going down
	# If you are doing a custom version, firewall commands go here.
	;;
*)	echo "$0: unknown verb \`$PLUTO_VERB' or parameter \`$1'" >&2
	exit 1
	;;
esac
+ for f in '`ls ${IPSEC_EXECDIR-/usr/libexec/ipsec} | egrep updown`'
+ cat /usr/lib/ipsec/_updown_x509
#! /bin/sh
#
# customized updown script
#

# logging of VPN connections
#
# tag put in front of each log entry:
TAG=vpn
#
# syslog facility and priority used:
FAC_PRIO=local0.notice
#
# to create a special vpn logging file, put the following line into
# the syslog configuration file /etc/syslog.conf:
#
# local0.notice                   -/var/log/vpn
#
# are there port numbers?
if [ "$PLUTO_MY_PORT" != 0 ]
then
	S_MY_PORT="--sport $PLUTO_MY_PORT"
	D_MY_PORT="--dport $PLUTO_MY_PORT"
fi
if [ "$PLUTO_PEER_PORT" != 0 ]
then
	S_PEER_PORT="--sport $PLUTO_PEER_PORT"
	D_PEER_PORT="--dport $PLUTO_PEER_PORT"
fi

# CAUTION:  Installing a new version of Openswan will install a new
# copy of this script, wiping out any custom changes you make.  If
# you need changes, make a copy of this under another name, and customize
# that, and use the (left/right)updown parameters in ipsec.conf to make
# Openswan use yours instead of this default one.

LC_ALL=C export LC_ALL

# things that this script gets (from ipsec_pluto(8) man page)
#
#
#      PLUTO_VERSION
#              indicates  what  version of this interface is being
#              used.  This document describes version  1.1.   This
#              is upwardly compatible with version 1.0.
#
#       PLUTO_VERB
#              specifies the name of the operation to be performed
#              (prepare-host, prepare-client, up-host, up-client,
#              down-host, or down-client).  If the address family
#              for security gateway to security gateway communica­
#              tions is IPv6, then a suffix of -v6 is added to the
#              verb.
#
#       PLUTO_CONNECTION
#              is the name of the  connection  for  which  we  are
#              routing.
#
#       PLUTO_CONN_POLICY
#              the policy of the connection, as in:
#     RSASIG+ENCRYPT+TUNNEL+PFS+DONTREKEY+OPPORTUNISTIC+failureDROP+lKOD+rKOD  
#
#       PLUTO_NEXT_HOP
#              is the next hop to which packets bound for the peer
#              must be sent.
#
#       PLUTO_INTERFACE
#              is the name of the ipsec interface to be used.
#
#       PLUTO_ME
#              is the IP address of our host.
#
#       PLUTO_MY_CLIENT
#              is the IP address / count of our client subnet.  If
#              the  client  is  just  the  host,  this will be the
#              host's own IP address / max (where max  is  32  for
#              IPv4 and 128 for IPv6).
#
#       PLUTO_MY_CLIENT_NET
#              is the IP address of our client net.  If the client
#              is just the host, this will be the  host's  own  IP
#              address.
#
#       PLUTO_MY_CLIENT_MASK
#              is  the  mask for our client net.  If the client is
#              just the host, this will be 255.255.255.255.
#
#       PLUTO_MY_SOURCEIP
#              if non-empty, then the source address for the route will be
#              set to this IP address.
#
#       PLUTO_MY_PROTOCOL
#              is the protocol  for this  connection.  Useful  for
#              firewalling.
#
#       PLUTO_MY_PORT
#              is the port. Useful for firewalling.
#
#       PLUTO_PEER
#              is the IP address of our peer.
#
#       PLUTO_PEER_CLIENT
#              is the IP address / count of the peer's client sub­
#              net.   If the client is just the peer, this will be
#              the peer's own IP address / max (where  max  is  32
#              for IPv4 and 128 for IPv6).
#
#       PLUTO_PEER_CLIENT_NET
#              is the IP address of the peer's client net.  If the
#              client is just the peer, this will  be  the  peer's
#              own IP address.
#
#       PLUTO_PEER_CLIENT_MASK
#              is  the  mask  for  the  peer's client net.  If the
#              client   is   just   the   peer,   this   will   be
#              255.255.255.255.
#
#       PLUTO_PEER_PROTOCOL
#              is  the  protocol  set  for  remote  end  with port
#              selector.
#
#       PLUTO_PEER_PORT
#              is the peer's port. Useful for firewalling.
#
#       PLUTO_CONNECTION_TYPE
#

# Import default _updown configs from the /etc/sysconfig/pluto_updown file
#
# Two variables can be set in this file:
#
#       DEFAULTSOURCE
#              is the default value for PLUTO_MY_SOURCEIP
#
#       IPROUTETABLE
#              is the default value for IPROUTETABLE
#
#       IPROUTEARGS
#              is the extra argument list for ip route command
#
#       IPRULEARGS
#              is the extra argument list for ip rule command
#
if [ -f /etc/sysconfig/pluto_updown ]
then
    . /etc/sysconfig/pluto_updown
fi

# check interface version
case "$PLUTO_VERSION" in
1.[0])	# Older Pluto?!?  Play it safe, script may be using new features.
	echo "$0: obsolete interface version \`$PLUTO_VERSION'," >&2
	echo "$0: 	called by obsolete Pluto?" >&2
	exit 2
	;;
1.*)	;;
*)	echo "$0: unknown interface version \`$PLUTO_VERSION'" >&2
	exit 2
	;;
esac

# check parameter(s)
case "$1:$*" in
':')			# no parameters
	;;
ipfwadm:ipfwadm)	# due to (left/right)firewall; for default script only
	;;
custom:*)		# custom parameters (see above CAUTION comment)
	;;
*)	echo "$0: unknown parameters \`$*'" >&2
	exit 2
	;;
esac

# utility functions for route manipulation
# Meddling with this stuff should not be necessary and requires great care.
uproute() {
	doroute add
	ip route flush cache
}

downroute() {
	doroute delete
	ip route flush cache
}

uprule() {
	# policy based advanced routing
	if [ -n "$IPROUTETABLE" ]
	then
	    dorule delete
	    dorule add
	fi
	# virtual sourceip support
	if [ -n "$PLUTO_MY_SOURCEIP" ]
	then
	    addsource
	    changesource
	fi
	ip route flush cache
}

downrule() {
	if [ -n "$IPROUTETABLE" ]
	then
	    dorule delete
	    ip route flush cache
	fi
}

addsource() {
	st=0
	if ! ip -o route get ${PLUTO_MY_SOURCEIP%/*} | grep -q ^local
	then
	    it="ip addr add ${PLUTO_MY_SOURCEIP%/*}/32 dev ${PLUTO_INTERFACE%:*}"
	    oops="`eval $it 2>&1`"
	    st=$?
	    if test " $oops" = " " -a " $st" != " 0"
	    then
		oops="silent error, exit status $st"
	    fi
	    if test " $oops" != " " -o " $st" != " 0"
	    then
		echo "$0: addsource \`$it' failed ($oops)" >&2
	    fi
	fi
	return $st
}

changesource() {
	st=0
	parms="$PLUTO_PEER_CLIENT"
	parms2="dev ${PLUTO_INTERFACE%:*}"
	parms3="src ${PLUTO_MY_SOURCEIP%/*} $IPROUTEARGS"
	if [ -n "$IPROUTETABLE" ]
	then
	    parms3="$parms3 table '$IPROUTETABLE'"
	fi
 	case "$PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK" in
 	"0.0.0.0/0.0.0.0")
		# opportunistic encryption work around
		it=
 		;;
 	esac
	oops="`eval $it 2>&1`"
 	st=$?
	if test " $oops" = " " -a " $st" != " 0"
 	then
	    oops="silent error, exit status $st"
	fi
	if test " $oops" != " " -o " $st" != " 0"
	then
	    echo "$0: changesource \`$it' failed ($oops)" >&2
 	fi
 	return $st
}

dorule() {
	st=0
	it2=
	iprule="from $PLUTO_MY_CLIENT"
	iprule2="to $PLUTO_PEER_CLIENT table $IPROUTETABLE $IPRULEARGS"
	case "$PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK" in
	"0.0.0.0/0.0.0.0")
		# opportunistic encryption work around
		st=0
		;;
	*)
		if [ -z "$PLUTO_MY_SOURCEIP" ]
		then
		    if [ "$PLUTO_ME" = "${PLUTO_MY_CLIENT%/*}" ]
		    then
			it="ip rule $1 iif lo $iprule2"
		    else
			it="ip rule $1 $iprule $iprule2"
		    fi
		else
		    if [ "${PLUTO_MY_SOURCEIP%/*}" = "${PLUTO_MY_CLIENT%/*}" ]
		    then
			it="ip rule $1 iif lo $iprule2"
		    else
			it="ip rule $1 $iprule $iprule2"
			it2="ip rule $1 iif lo $iprule2"
		    fi
		fi
		oops="`eval $it 2>&1`"
		st=$?
		if test " $oops" = " " -a " $st" != " 0"
		then
		    oops="silent error, exit status $st"
		fi
		case "$oops" in
		'RTNETLINK answers: No such process'*)
			# This is what ip rule gives
			# for "could not find such a rule"
			oops=
			st=0
			;;
		esac
		if test " $oops" != " " -o " $st" != " 0"
		then
		    echo "$0: dorule \`$it' failed ($oops)" >&2
		fi
		if test "$st" = "0" -a -n "$it2"
		then
		    oops="`eval $it2 2>&1`"
		    st=$?
		    if test " $oops" = " " -a " $st" != " 0"
		    then
			oops="silent error, exit status $st"
		    fi
		    case "$oops" in
		    'RTNETLINK answers: No such process'*)
			    # This is what ip rule gives
			    # for "could not find such a rule"
			    oops=
			    st=0
			    ;;
		    esac
		    if test " $oops" != " " -o " $st" != " 0"
		    then
			echo "$0: dorule \`$it2' failed ($oops)" >&2
		    fi
		fi
		;;
	    esac
	return $st
}


doroute() {
	st=0
	parms="$PLUTO_PEER_CLIENT"
	parms2=
	if [ -n "$PLUTO_NEXT_HOP" ] && [ "$PLUTO_NEXT_HOP" != "$PLUTO_PEER" ]
	then
	   parms2="via $PLUTO_NEXT_HOP"
	fi
	parms2="$parms2 dev ${PLUTO_INTERFACE%:*}"
	parms3="$IPROUTEARGS"
	if [ -n "$IPROUTETABLE" ]
	then
	    parms3="$parms3 table $IPROUTETABLE"
	fi

	if [ -z "$PLUTO_MY_SOURCEIP" ] && [ -n "$DEFAULTSOURCE" ]
	then
	    PLUTO_MY_SOURCEIP="${DEFAULTSOURCE%/*}"
        fi

	if test "$1" = "add" -a -n "$PLUTO_MY_SOURCEIP" 
	then
	    addsource
	    parms3="$parms3 src ${PLUTO_MY_SOURCEIP%/*}"
	fi

	case "$PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK" in
	"0.0.0.0/0.0.0.0")
		# opportunistic encryption work around
		# need to provide route that eclipses default, without 
		# replacing it.
		it="ip route $1 0.0.0.0/1 $parms2 $parms3 &&
			ip route $1 128.0.0.0/1 $parms2 $parms3"
		;;
	*)	it="ip route $1 $parms $parms2 $parms3"
		;;
	esac
	oops="`eval $it 2>&1`"
	st=$?
	if test " $oops" = " " -a " $st" != " 0"
	then
	    oops="silent error, exit status $st"
	fi
	if test " $oops" != " " -o " $st" != " 0"
	then
	    echo "$0: doroute \`$it' failed ($oops)" >&2
	fi
	return $st
}
 

# the big choice
case "$PLUTO_VERB:$1" in
prepare-host:*|prepare-client:*)
	# delete possibly-existing route (preliminary to adding a route)
	case "$PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK" in
	"0.0.0.0/0.0.0.0")
		# need to provide route that eclipses default, without 
		# replacing it.
		parms1="0.0.0.0/1"
		parms2="128.0.0.0/1"
		it="ip route delete $parms1 $IPROUTEARGS 2>&1 ; ip route delete $parms2 $IPROUTEARGS 2>&1"
		oops="`ip route delete $parms1 $IPROUTEARGS 2>&1 ; ip route delete $parms2 $IPROUTEARGS 2>&1`"
		;;
	*)
		parms="$PLUTO_PEER_CLIENT $IPROUTEARGS"
		if [ -n "$IPROUTETABLE" ]
		then
		    parms="$parms table $IPROUTETABLE"
		fi
		it="ip route delete $parms 2>&1"
		oops="`ip route delete $parms 2>&1`"
		;;
	esac
	status="$?"
	if test " $oops" = " " -a " $status" != " 0"
	then
		oops="silent error, exit status $status"
	fi
	case "$oops" in
	*'RTNETLINK answers: No such process'*)	
		# This is what route (currently -- not documented!) gives
		# for "could not find such a route".
		oops=
		status=0
		;;
	esac
	if test " $oops" != " " -o " $status" != " 0"
	then
		echo "$0: \`$it' failed ($oops)" >&2
	fi
	exit $status
	;;
route-host:*|route-client:*)
	# connection to me or my client subnet being routed
	uproute
	;;
unroute-host:*|unroute-client:*)
	# connection to me or my client subnet being unrouted
	downroute
	;;
up-host:*)
	# connection to me coming up
	uprule
	# If you are doing a custom version, firewall commands go here.
	iptables -I INPUT 1 -i $PLUTO_INTERFACE -p $PLUTO_MY_PROTOCOL \
	    -s $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $S_PEER_PORT \
	    -d $PLUTO_ME $D_MY_PORT -j ACCEPT
	iptables -I OUTPUT 1 -o $PLUTO_INTERFACE -p $PLUTO_PEER_PROTOCOL \
	    -s $PLUTO_ME $S_MY_PORT \
	    -d $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $D_PEER_PORT -j ACCEPT
	#
	if [ "$PLUTO_PEER_CLIENT" == "$PLUTO_PEER/32" ]
	then
	  logger -t $TAG -p $FAC_PRIO \
	    "+ `echo -e $PLUTO_PEER_ID` $PLUTO_PEER -- $PLUTO_ME"
	else
	  logger -t $TAG -p $FAC_PRIO \
	    "+ `echo -e $PLUTO_PEER_ID` $PLUTO_PEER_CLIENT == $PLUTO_PEER -- $PLUTO_ME"
	fi
	;;
down-host:*)
	# connection to me going down
	downrule
	# If you are doing a custom version, firewall commands go here.
	iptables -D INPUT -i $PLUTO_INTERFACE -p $PLUTO_MY_PROTOCOL \
	    -s $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $S_PEER_PORT \
	    -d $PLUTO_ME $D_MY_PORT -j ACCEPT
	iptables -D OUTPUT -o $PLUTO_INTERFACE -p $PLUTO_PEER_PROTOCOL \
	    -s $PLUTO_ME $S_MY_PORT \
	    -d $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $D_PEER_PORT -j ACCEPT
	#
	if [ "$PLUTO_PEER_CLIENT" == "$PLUTO_PEER/32" ]
	then
	  logger -t $TAG -p $FAC_PRIO -- \
	    "- `echo -e $PLUTO_PEER_ID` $PLUTO_PEER -- $PLUTO_ME"
	else
	  logger -t $TAG -p $FAC_PRIO -- \
	  "- `echo -e $PLUTO_PEER_ID` $PLUTO_PEER_CLIENT == $PLUTO_PEER -- $PLUTO_ME"
	fi
	;;
up-client:)
	# connection to my client subnet coming up
	uprule
	# If you are doing a custom version, firewall commands go here.
	iptables -I FORWARD 1 -o $PLUTO_INTERFACE -p $PLUTO_PEER_PROTOCOL \
	    -s $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK $S_MY_PORT \
	    -d $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $D_PEER_PORT -j ACCEPT
	iptables -I FORWARD 1 -i $PLUTO_INTERFACE -p $PLUTO_MY_PROTOCOL \
	    -s $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $S_PEER_PORT \
	    -d $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK $D_MY_PORT -j ACCEPT
	#
	if [ "$PLUTO_PEER_CLIENT" == "$PLUTO_PEER/32" ]
	then
	  logger -t $TAG -p $FAC_PRIO \
	    "+ `echo -e $PLUTO_PEER_ID` $PLUTO_PEER -- $PLUTO_ME == $PLUTO_MY_CLIENT"
	else
	  logger -t $TAG -p $FAC_PRIO \
	    "+ `echo -e $PLUTO_PEER_ID` $PLUTO_PEER_CLIENT == $PLUTO_PEER -- $PLUTO_ME == $PLUTO_MY_CLIENT"
	fi
	;;
down-client:)
	# connection to my client subnet going down
	downrule
	# If you are doing a custom version, firewall commands go here.
	iptables -D FORWARD -o $PLUTO_INTERFACE -p $PLUTO_PEER_PROTOCOL \
	    -s $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK $S_MY_PORT \
	    -d $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $D_PEER_PORT -j ACCEPT
	iptables -D FORWARD -i $PLUTO_INTERFACE -p $PLUTO_MY_PROTOCOL \
	    -s $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK $S_PEER_PORT \
	    -d $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK $D_MY_PORT -j ACCEPT
	#
	if [ "$PLUTO_PEER_CLIENT" == "$PLUTO_PEER/32" ]
	then
	  logger -t $TAG -p $FAC_PRIO -- \
	    "- `echo -e $PLUTO_PEER_ID` $PLUTO_PEER -- $PLUTO_ME == $PLUTO_MY_CLIENT"
	else
	  logger -t $TAG -p $FAC_PRIO -- \
	    "- `echo -e $PLUTO_PEER_ID` $PLUTO_PEER_CLIENT == $PLUTO_PEER -- $PLUTO_ME == $PLUTO_MY_CLIENT"
	fi
	;;
up-client:ipfwadm)
	# connection to client subnet, with (left/right)firewall=yes, coming up
	uprule
	# This is used only by the default updown script, not by your custom
	# ones, so do not mess with it; see CAUTION comment up at top.
	ipfwadm -F -i accept -b -S $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
		-D $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
	;;
down-client:ipfwadm)
	# connection to client subnet, with (left/right)firewall=yes, going down
	downrule
	# This is used only by the default updown script, not by your custom
	# ones, so do not mess with it; see CAUTION comment up at top.
	ipfwadm -F -d accept -b -S $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
		-D $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
	;;
#
# IPv6
#
prepare-host-v6:*|prepare-client-v6:*)
	;;
route-host-v6:*|route-client-v6:*)
	# connection to me or my client subnet being routed
	#uproute_v6
	;;
unroute-host-v6:*|unroute-client-v6:*)
	# connection to me or my client subnet being unrouted
	#downroute_v6
	;;
up-host-v6:*)
	# connection to me coming up
	# If you are doing a custom version, firewall commands go here.
	;;
down-host-v6:*)
	# connection to me going down
	# If you are doing a custom version, firewall commands go here.
	;;
up-client-v6:)
	# connection to my client subnet coming up
	# If you are doing a custom version, firewall commands go here.
	;;
down-client-v6:)
	# connection to my client subnet going down
	# If you are doing a custom version, firewall commands go here.
	;;
*)	echo "$0: unknown verb \`$PLUTO_VERB' or parameter \`$1'" >&2
	exit 1
	;;
esac
+ _________________________ /proc/net/dev
+ cat /proc/net/dev
Inter-|   Receive                                                |  Transmit
 face |bytes    packets errs drop fifo frame compressed multicast|bytes    packets errs drop fifo colls carrier compressed
    lo:1095937586 3523898    0    0    0     0          0         0 1095937586 3523898    0    0    0     0       0          0
  eth0:3674517115 16855199    0 1308    0 234473801          0         0 80404288 16249630    0    0    0     0       0          0
  eth1:416895929 2521659    0  168    0 15015847          0         0 746216569 2064721    0    0    0     0       0          0
  eth2:       0       0    0    0    0     0          0         0        0       0    0    0    0     0       0          0
  eth3:       0       0    0    0    0     0          0         0        0       0    0    0    0     0       0          0
  sit0:       0       0    0    0    0     0          0         0        0       0    0    0    0     0       0          0
+ _________________________ /proc/net/route
+ cat /proc/net/route
Iface	Destination	Gateway 	Flags	RefCnt	Use	Metric	Mask		MTU	Window	IRTT                                                       
eth1	70D49ED8	00000000	0001	0	0	0	F8FFFFFF	0	0	0                                                                               
eth1	A8D49ED8	00000000	0001	0	0	0	F8FFFFFF	0	0	0                                                                               
eth1	40A0A8C0	A9D49ED8	0003	0	0	0	E0FFFFFF	0	0	0                                                                               
eth1	40000A0A	A9D49ED8	0003	0	0	0	E0FFFFFF	0	0	0                                                                               
eth1	00C0A8C0	71D49ED8	0003	0	0	0	E0FFFFFF	0	0	0                                                                               
eth0	0007A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	00C0A8C0	6801A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0006A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0005A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0004A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0003A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0002A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0001A8C0	00000000	0001	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	00AAA8C0	6801A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	000CA8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	000BA8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	00BFA8C0	6801A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	000AA8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0009A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth0	0008A8C0	0101A8C0	0003	0	0	0	00FFFFFF	0	0	0                                                                               
eth1	00000000	A9D49ED8	0003	0	0	0	00000000	0	0	0                                                                               
+ _________________________ /proc/sys/net/ipv4/ip_forward
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter eth1/rp_filter lo/rp_filter
all/rp_filter:1
default/rp_filter:1
eth0/rp_filter:1
eth1/rp_filter:1
lo/rp_filter:1
+ _________________________ uname-a
+ uname -a
Linux xserve2 2.6.12-9-686-smp #1 SMP Mon Oct 10 13:36:57 BST 2005 i686 GNU/Linux
+ _________________________ config-built-with
+ test -r /proc/config_built_with
+ _________________________ redhat-release
+ test -r /etc/redhat-release
+ test -r /etc/fedora-release
+ _________________________ /proc/net/ipsec_version
+ test -r /proc/net/ipsec_version
+ test -r /proc/net/pfkey
++ uname -r
+ echo 'NETKEY (2.6.12-9-686-smp) support detected '
NETKEY (2.6.12-9-686-smp) support detected 
+ _________________________ ipfwadm
+ test -r /sbin/ipfwadm
+ 'no old-style linux 1.x/2.0 ipfwadm firewall support'
/usr/lib/ipsec/barf: line 297: no old-style linux 1.x/2.0 ipfwadm firewall support: No such file or directory
+ _________________________ ipchains
+ test -r /sbin/ipchains
+ echo 'no old-style linux 2.0 ipchains firewall support'
no old-style linux 2.0 ipchains firewall support
+ _________________________ iptables
+ test -r /sbin/iptables
+ iptables -L -v -n
Chain INPUT (policy ACCEPT 209K packets, 56M bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain FORWARD (policy ACCEPT 114K packets, 10M bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain OUTPUT (policy ACCEPT 185K packets, 61M bytes)
 pkts bytes target     prot opt in     out     source               destination         
+ _________________________ iptables-nat
+ iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 4976 packets, 555K bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain POSTROUTING (policy ACCEPT 2961 packets, 357K bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain OUTPUT (policy ACCEPT 1844 packets, 146K bytes)
 pkts bytes target     prot opt in     out     source               destination         
+ _________________________ iptables-mangle
+ iptables -t mangle -L -v -n
Chain PREROUTING (policy ACCEPT 326K packets, 67M bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain INPUT (policy ACCEPT 209K packets, 56M bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain FORWARD (policy ACCEPT 114K packets, 10M bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain OUTPUT (policy ACCEPT 186K packets, 61M bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain POSTROUTING (policy ACCEPT 307K packets, 72M bytes)
 pkts bytes target     prot opt in     out     source               destination         
+ _________________________ /proc/modules
+ test -f /proc/modules
+ cat /proc/modules
iptable_mangle 2944 0 - Live 0xf8b59000
iptable_nat 23604 0 - Live 0xf8b94000
ip_conntrack 44296 1 iptable_nat, Live 0xf8c0a000
iptable_filter 3040 0 - Live 0xf8b66000
ip_tables 21472 3 iptable_mangle,iptable_nat,iptable_filter, Live 0xf8b6e000
xfrm_user 16324 0 - Live 0xf8b0b000
xfrm4_tunnel 3940 0 - Live 0xf8962000
af_key 34320 0 - Live 0xf8aa7000
nfsd 221056 9 - Live 0xf8c41000
exportfs 6432 1 nfsd, Live 0xf8b5b000
lockd 65288 2 nfsd, Live 0xf8b7b000
sunrpc 142436 13 nfsd,lockd, Live 0xf8be6000
af_packet 23656 2 - Live 0xf8b5f000
ipv6 263968 63 - Live 0xf8ba4000
video 16004 0 - Live 0xf8b44000
tc1100_wmi 6916 0 - Live 0xf8b54000
sony_acpi 5548 0 - Live 0xf8b51000
pcc_acpi 11360 0 - Live 0xf8b4d000
hotkey 9508 0 - Live 0xf8b49000
dev_acpi 11396 0 - Live 0xf8b10000
i2c_acpi_ec 5696 0 - Live 0xf8b41000
button 6704 0 - Live 0xf8b14000
battery 9572 0 - Live 0xf8ad0000
container 4608 0 - Live 0xf8b08000
ac 4932 0 - Live 0xf8b05000
ipcomp 8936 0 - Live 0xf8b01000
esp4 8320 22 - Live 0xf8afd000
ah4 6592 0 - Live 0xf8ad4000
pcspkr 3880 0 - Live 0xf899b000
rtc 13672 0 - Live 0xf8af8000
floppy 60564 0 - Live 0xf8b31000
shpchp 97860 0 - Live 0xf8b18000
pci_hotplug 28412 1 shpchp, Live 0xf8ae6000
i2c_piix4 8880 0 - Live 0xf8ae2000
i2c_core 21760 2 i2c_acpi_ec,i2c_piix4, Live 0xf8ab1000
sworks_agp 9568 0 - Live 0xf897c000
agpgart 35436 1 sworks_agp, Live 0xf8aee000
deflate 4224 0 - Live 0xf8aa4000
zlib_deflate 22808 1 deflate, Live 0xf8ac9000
twofish 37696 0 - Live 0xf8ad7000
serpent 17408 0 - Live 0xf8ac3000
aes_i586 39072 2 - Live 0xf8ab8000
blowfish 8192 0 - Live 0xf8980000
des 11776 20 - Live 0xf8aa0000
sha256 9408 0 - Live 0xf8a9c000
sha1 2784 2 - Live 0xf891e000
crypto_null 2400 0 - Live 0xf8920000
evdev 9920 0 - Live 0xf8978000
psmouse 30628 0 - Live 0xf8a93000
mousedev 12132 0 - Live 0xf8974000
parport_pc 36356 0 - Live 0xf8a89000
lp 12548 0 - Live 0xf892e000
parport 37384 2 parport_pc,lp, Live 0xf8990000
md 47536 0 - Live 0xf8983000
ext3 138824 2 - Live 0xf899d000
jbd 59768 1 ext3, Live 0xf8952000
mbcache 10116 1 ext3, Live 0xf8923000
dm_mod 59232 4 - Live 0xf8964000
thermal 13320 0 - Live 0xf8912000
processor 23816 1 thermal, Live 0xf8927000
fan 4708 0 - Live 0xf890f000
ohci_hcd 21988 0 - Live 0xf8917000
usbcore 121180 2 ohci_hcd, Live 0xf8933000
e100 37376 0 - Live 0xf88d4000
mii 5920 1 e100, Live 0xf88a6000
sd_mod 19680 4 - Live 0xf88aa000
ide_cd 42148 0 - Live 0xf88bb000
cdrom 40096 1 ide_cd, Live 0xf88b0000
ide_generic 1600 0 - Live 0xf883b000
aic7xxx 190548 2 - Live 0xf88df000
scsi_transport_spi 19872 1 aic7xxx, Live 0xf889d000
scsi_mod 137896 3 sd_mod,aic7xxx,scsi_transport_spi, Live 0xf8856000
serverworks 9640 1 - Live 0xf8837000
ide_core 140628 3 ide_cd,ide_generic,serverworks, Live 0xf8879000
unix 29392 531 - Live 0xf884d000
fbcon 38880 0 - Live 0xf8842000
tileblit 2592 1 fbcon, Live 0xf8829000
font 8448 1 fbcon, Live 0xf8833000
bitblit 5856 1 fbcon, Live 0xf8826000
vesafb 8216 0 - Live 0xf882b000
cfbcopyarea 4832 1 vesafb, Live 0xf8823000
cfbimgblt 3168 1 vesafb, Live 0xf8821000
cfbfillrect 4096 1 vesafb, Live 0xf881f000
softcursor 2496 1 vesafb, Live 0xf881d000
capability 4936 0 - Live 0xf8805000
commoncap 7040 1 capability, Live 0xf881a000
+ _________________________ /proc/meminfo
+ cat /proc/meminfo
MemTotal:      1036064 kB
MemFree:         25076 kB
Buffers:        187840 kB
Cached:         311620 kB
SwapCached:          0 kB
Active:         740968 kB
Inactive:       172592 kB
HighTotal:      130992 kB
HighFree:          120 kB
LowTotal:       905072 kB
LowFree:         24956 kB
SwapTotal:     1638392 kB
SwapFree:      1638392 kB
Dirty:             536 kB
Writeback:           0 kB
Mapped:         435772 kB
Slab:            85144 kB
CommitLimit:   2156424 kB
Committed_AS:   839816 kB
PageTables:       2604 kB
VmallocTotal:   114680 kB
VmallocUsed:      4332 kB
VmallocChunk:   110104 kB
+ _________________________ /proc/net/ipsec-ls
+ test -f /proc/net/ipsec_version
+ _________________________ usr/src/linux/.config
+ test -f /proc/config.gz
++ uname -r
+ test -f /lib/modules/2.6.12-9-686-smp/build/.config
+ echo 'no .config file found, cannot list kernel properties'
no .config file found, cannot list kernel properties
+ _________________________ etc/syslog.conf
+ cat /etc/syslog.conf
#  /etc/syslog.conf	Configuration file for syslogd.
#
#			For more information see syslog.conf(5)
#			manpage.

#
# First some standard logfiles.  Log by facility.
#

auth,authpriv.*			/var/log/auth.log
*.*;auth,authpriv.none		-/var/log/syslog
#cron.*				/var/log/cron.log
daemon.*			-/var/log/daemon.log
kern.*				-/var/log/kern.log
lpr.*				-/var/log/lpr.log
mail.*				-/var/log/mail.log
user.*				-/var/log/user.log
uucp.*				-/var/log/uucp.log
local7.*			-/var/log/cisco
#
# Logging for the mail system.  Split it up so that
# it is easy to write scripts to parse these files.
#
mail.info			-/var/log/mail.info
mail.warn			-/var/log/mail.warn
mail.err			/var/log/mail.err

# Logging for INN news system
#
news.crit			/var/log/news/news.crit
news.err			/var/log/news/news.err
news.notice			-/var/log/news/news.notice

#
# Some `catch-all' logfiles.
#
*.=debug;\
	auth,authpriv.none;\
	news.none;mail.none	-/var/log/debug
*.=info;*.=notice;*.=warn;\
	auth,authpriv.none;\
	cron,daemon.none;\
	mail,news.none		-/var/log/messages

#
# Emergencies are sent to everybody logged in.
#
*.emerg				*

#
# I like to have messages displayed on the console, but only on a virtual
# console I usually leave idle.
#
#daemon,mail.*;\
#	news.=crit;news.=err;news.=notice;\
#	*.=debug;*.=info;\
#	*.=notice;*.=warn	/dev/tty8

# The named pipe /dev/xconsole is for the `xconsole' utility.  To use it,
# you must invoke `xconsole' with the `-file' option:
# 
#    $ xconsole -file /dev/xconsole [...]
#
# NOTE: adjust the list below, or you'll go crazy if you have a reasonably
#      busy site..
#
daemon.*;mail.*;\
	news.crit;news.err;news.notice;\
	*.=debug;*.=info;\
	*.=notice;*.=warn	|/dev/xconsole

+ _________________________ etc/resolv.conf
+ cat /etc/resolv.conf
search integracarehh.com
nameserver 192.168.1.102
nameserver 192.168.1.103
+ _________________________ lib/modules-ls
+ ls -ltr /lib/modules
total 8
drwxr-xr-x  3 root root 4096 Dec 28 13:24 2.6.12-2-686-smp
drwxr-xr-x  4 root root 4096 Dec 28 13:26 2.6.12-9-686-smp
+ _________________________ /proc/ksyms-netif_rx
+ test -r /proc/ksyms
+ test -r /proc/kallsyms
+ egrep netif_rx /proc/kallsyms
c0248fd2 T netif_rx
c0249221 T netif_rx_ni
c0248fd2 U netif_rx	[ipv6]
+ _________________________ lib/modules-netif_rx
+ modulegoo kernel/net/ipv4/ipip.o netif_rx
+ set +x
2.6.12-2-686-smp: 
2.6.12-9-686-smp: 
+ _________________________ kern.debug
+ test -f /var/log/kern.debug
+ _________________________ klog
+ sed -n '1665,$p' /var/log/syslog
+ egrep -i 'ipsec|klips|pluto'
+ case "$1" in
+ cat
Feb 15 07:57:42 localhost ipsec_setup: Starting Openswan IPsec 2.4.0...
Feb 15 07:57:42 localhost ipsec_setup: insmod /lib/modules/2.6.12-9-686-smp/kernel/net/key/af_key.ko 
Feb 15 07:57:42 localhost ipsec_setup: insmod /lib/modules/2.6.12-9-686-smp/kernel/net/ipv4/xfrm4_tunnel.ko 
Feb 15 07:57:42 localhost ipsec_setup: insmod /lib/modules/2.6.12-9-686-smp/kernel/net/xfrm/xfrm_user.ko 
+ _________________________ plog
+ sed -n '6031,$p' /var/log/auth.log
+ egrep -i pluto
+ case "$1" in
+ cat
Feb 15 07:57:42 localhost ipsec__plutorun: Starting Pluto subsystem...
Feb 15 07:57:42 localhost pluto[11229]: Starting Pluto (Openswan Version 2.4.0 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OEr@`N\177X]mXi)
Feb 15 07:57:42 localhost pluto[11229]: Setting NAT-Traversal port-4500 floating to on
Feb 15 07:57:42 localhost pluto[11229]:    port floating activation criteria nat_t=1/port_fload=1
Feb 15 07:57:42 localhost pluto[11229]:   including NAT-Traversal patch (Version 0.6c)
Feb 15 07:57:42 localhost pluto[11229]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
Feb 15 07:57:42 localhost pluto[11229]: starting up 1 cryptographic helpers
Feb 15 07:57:42 localhost pluto[11229]: started helper pid=11234 (fd:6)
Feb 15 07:57:42 localhost pluto[11229]: Using Linux 2.6 IPsec interface code on 2.6.12-9-686-smp
Feb 15 07:57:42 localhost pluto[11229]: Changing to directory '/etc/ipsec.d/cacerts'
Feb 15 07:57:42 localhost pluto[11229]:   loaded CA cert file 'cacert.pem' (1078 bytes)
Feb 15 07:57:42 localhost pluto[11229]: Changing to directory '/etc/ipsec.d/aacerts'
Feb 15 07:57:42 localhost pluto[11229]: Changing to directory '/etc/ipsec.d/ocspcerts'
Feb 15 07:57:42 localhost pluto[11229]: Changing to directory '/etc/ipsec.d/crls'
Feb 15 07:57:42 localhost pluto[11229]:   loaded crl file 'crl.pem' (443 bytes)
Feb 15 07:57:42 localhost pluto[11229]: added connection description "waxahachie-wireless-bedford"
Feb 15 07:57:42 localhost pluto[11229]: added connection description "waxahachie-common"
Feb 15 07:57:42 localhost pluto[11229]: added connection description "home"
Feb 15 07:57:42 localhost pluto[11229]: added connection description "waxahachie-lan-bedford"
Feb 15 07:57:42 localhost pluto[11229]: added connection description "waxahachie-wireless-nurscare"
Feb 15 07:57:43 localhost pluto[11229]: added connection description "waxahachie-lan-nurscare"
Feb 15 07:57:43 localhost pluto[11229]: added connection description "waxahachie-wireless-corp"
Feb 15 07:57:43 localhost pluto[11229]: added connection description "waxahachie-lan-corp"
Feb 15 07:57:43 localhost pluto[11229]: listening for IKE messages
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth1/eth1 216.158.212.171:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth1/eth1 216.158.212.171:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth1/eth1 216.158.212.116:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth1/eth1 216.158.212.116:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth1/eth1 216.158.212.174:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth1/eth1 216.158.212.174:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.160:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.160:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.103:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.103:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.54:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.54:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.41:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface eth0/eth0 192.168.1.41:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface lo/lo 127.0.0.1:500
Feb 15 07:57:43 localhost pluto[11229]: adding interface lo/lo 127.0.0.1:4500
Feb 15 07:57:43 localhost pluto[11229]: adding interface lo/lo ::1:500
Feb 15 07:57:43 localhost pluto[11229]: loading secrets from "/etc/ipsec.secrets"
Feb 15 07:57:43 localhost pluto[11229]:   loaded private key file '/etc/ipsec.d/private/elaremore.key' (1696 bytes)
Feb 15 07:57:50 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Openswan (this version) 2.4.0  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Feb 15 07:57:50 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Dead Peer Detection]
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: responding to Main Mode from unknown peer 71.252.134.175
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: Main mode peer ID is ID_FQDN: '@home'
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: I did not send a certificate because I do not have one.
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #2: responding to Quick Mode {msgid:84d84e94}
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 07:57:50 localhost pluto[11229]: "home"[1] 71.252.134.175 #2: STATE_QUICK_R2: IPsec SA established {ESP/NAT=>0xabf6a489 <0xccb90114 xfrm=AES_0-HMAC_SHA1 NATD=none DPD=none}
Feb 15 07:58:00 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x43463605) not found (maybe expired)
Feb 15 07:58:00 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: received and ignored informational message
Feb 15 08:00:42 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:00:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: responding to Main Mode
Feb 15 08:00:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: received Vendor ID payload [XAUTH]
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: I did not send a certificate because I do not have one.
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-lan-corp" #4: responding to Quick Mode {msgid:d4084956}
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-lan-corp" #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-lan-corp" #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-lan-corp" #4: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:00:43 localhost pluto[11229]: "waxahachie-lan-corp" #4: STATE_QUICK_R2: IPsec SA established {ESP=>0xd0ef3072 <0xcdc60fa1 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-bedford" #5: responding to Quick Mode {msgid:198a84b4}
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-bedford" #5: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-bedford" #5: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-bedford" #5: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-bedford" #5: STATE_QUICK_R2: IPsec SA established {ESP=>0x13dce5b4 <0xa7b45bde xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-nurscare" #6: responding to Quick Mode {msgid:6b21aa9a}
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-nurscare" #6: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-nurscare" #6: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-nurscare" #6: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:00:57 localhost pluto[11229]: "waxahachie-lan-nurscare" #6: STATE_QUICK_R2: IPsec SA established {ESP=>0xb6065526 <0x39e021b4 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #3: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:01:00 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: responding to Main Mode
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Vendor ID payload [XAUTH]
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: I did not send a certificate because I do not have one.
Feb 15 08:01:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-corp" #8: responding to Quick Mode {msgid:4cc1ba49}
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-corp" #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-corp" #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-corp" #8: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-corp" #8: STATE_QUICK_R2: IPsec SA established {ESP=>0x583df581 <0x02d68fd0 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #9: responding to Quick Mode {msgid:e8a49d91}
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #9: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #9: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #9: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:01:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #9: STATE_QUICK_R2: IPsec SA established {ESP=>0x055ab995 <0xededf14e xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:01:20 localhost pluto[11229]: "waxahachie-lan-bedford" #10: responding to Quick Mode {msgid:b72926b6}
Feb 15 08:01:20 localhost pluto[11229]: "waxahachie-lan-bedford" #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:01:20 localhost pluto[11229]: "waxahachie-lan-bedford" #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:01:20 localhost pluto[11229]: "waxahachie-lan-bedford" #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:01:20 localhost pluto[11229]: "waxahachie-lan-bedford" #10: STATE_QUICK_R2: IPsec SA established {ESP=>0x73908d08 <0x1f2dfafc xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:01:56 localhost pluto[11229]: "waxahachie-wireless-corp" #11: responding to Quick Mode {msgid:1514a027}
Feb 15 08:01:56 localhost pluto[11229]: "waxahachie-wireless-corp" #11: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:01:56 localhost pluto[11229]: "waxahachie-wireless-corp" #11: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-corp" #11: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-corp" #11: STATE_QUICK_R2: IPsec SA established {ESP=>0x8dcd7448 <0xf2d0ea4c xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #12: responding to Quick Mode {msgid:d915e664}
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #12: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #12: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #12: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #12: STATE_QUICK_R2: IPsec SA established {ESP=>0x1807795e <0xf98d7948 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:01:57 localhost pluto[11229]: "waxahachie-wireless-nurscare" #13: responding to Quick Mode {msgid:5b96ff36}
Feb 15 08:01:58 localhost pluto[11229]: "waxahachie-wireless-nurscare" #13: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:01:58 localhost pluto[11229]: "waxahachie-wireless-nurscare" #13: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:01:58 localhost pluto[11229]: "waxahachie-wireless-nurscare" #13: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:01:58 localhost pluto[11229]: "waxahachie-wireless-nurscare" #13: STATE_QUICK_R2: IPsec SA established {ESP=>0xf1ed580c <0xb0db7825 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA(0x8dcd7448) payload: deleting IPSEC State #11
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xf2d0ea4c) not found (maybe expired)
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA(0x583df581) payload: deleting IPSEC State #8
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x02d68fd0) not found (maybe expired)
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA(0x1807795e) payload: deleting IPSEC State #12
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xf98d7948) not found (maybe expired)
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA(0x73908d08) payload: deleting IPSEC State #10
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x1f2dfafc) not found (maybe expired)
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA(0xf1ed580c) payload: deleting IPSEC State #13
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xb0db7825) not found (maybe expired)
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA(0x055ab995) payload: deleting IPSEC State #9
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xededf14e) not found (maybe expired)
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #7: received Delete SA payload: deleting ISAKMP State #7
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:16 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:17 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:17 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:17 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 08:03:17 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 08:03:20 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: responding to Main Mode
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: received Vendor ID payload [XAUTH]
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:03:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: I did not send a certificate because I do not have one.
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-corp" #15: responding to Quick Mode {msgid:3f0982c9}
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-corp" #15: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-corp" #15: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-corp" #15: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:03:21 localhost pluto[11229]: "waxahachie-wireless-corp" #15: STATE_QUICK_R2: IPsec SA established {ESP=>0xef786d18 <0xd08d5cf7 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:03:38 localhost pluto[11229]: "waxahachie-lan-corp" #16: responding to Quick Mode {msgid:ffa8228b}
Feb 15 08:03:38 localhost pluto[11229]: "waxahachie-lan-corp" #16: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:03:38 localhost pluto[11229]: "waxahachie-lan-corp" #16: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:03:38 localhost pluto[11229]: "waxahachie-lan-corp" #16: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:03:38 localhost pluto[11229]: "waxahachie-lan-corp" #16: STATE_QUICK_R2: IPsec SA established {ESP=>0xbd32d268 <0x11de0f13 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:10:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:10:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #14: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:11:02 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: responding to Main Mode
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: received Vendor ID payload [XAUTH]
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:11:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: I did not send a certificate because I do not have one.
Feb 15 08:11:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:11:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:11:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:11:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #17: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:11:08 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: responding to Main Mode
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: received Vendor ID payload [XAUTH]
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:11:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: I did not send a certificate because I do not have one.
Feb 15 08:11:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:11:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:11:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:11:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #18: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:13:31 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:13:31 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: responding to Main Mode
Feb 15 08:13:31 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:13:31 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: received Vendor ID payload [XAUTH]
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: I did not send a certificate because I do not have one.
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:13:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #19: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:14:01 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: responding to Main Mode
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: received Vendor ID payload [XAUTH]
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: I did not send a certificate because I do not have one.
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #21: responding to Quick Mode {msgid:84fc40f5}
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #21: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #21: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #21: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:14:01 localhost pluto[11229]: "waxahachie-lan-nurscare" #21: STATE_QUICK_R2: IPsec SA established {ESP=>0x964a6795 <0xe1e5bf68 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:14:04 localhost pluto[11229]: "waxahachie-lan-bedford" #22: responding to Quick Mode {msgid:a20b44ab}
Feb 15 08:14:04 localhost pluto[11229]: "waxahachie-lan-bedford" #22: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:14:04 localhost pluto[11229]: "waxahachie-lan-bedford" #22: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:14:04 localhost pluto[11229]: "waxahachie-lan-bedford" #22: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:14:04 localhost pluto[11229]: "waxahachie-lan-bedford" #22: STATE_QUICK_R2: IPsec SA established {ESP=>0xfe263d4e <0x945c1026 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:16:11 localhost pluto[11229]: "waxahachie-wireless-nurscare" #23: responding to Quick Mode {msgid:f8320850}
Feb 15 08:16:11 localhost pluto[11229]: "waxahachie-wireless-nurscare" #23: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:16:11 localhost pluto[11229]: "waxahachie-wireless-nurscare" #23: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:16:11 localhost pluto[11229]: "waxahachie-wireless-nurscare" #23: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:16:12 localhost pluto[11229]: "waxahachie-wireless-nurscare" #23: STATE_QUICK_R2: IPsec SA established {ESP=>0xfe05851c <0x73c99c5f xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:18:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:18:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #20: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:23:20 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: responding to Main Mode
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: received Vendor ID payload [XAUTH]
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:23:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:23:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:23:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: I did not send a certificate because I do not have one.
Feb 15 08:23:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:23:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:23:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:23:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #24: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:23:23 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: responding to Main Mode
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: received Vendor ID payload [XAUTH]
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:23:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:23:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:23:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: I did not send a certificate because I do not have one.
Feb 15 08:23:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:23:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:23:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:23:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #25: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:23:29 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: responding to Main Mode
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: received Vendor ID payload [XAUTH]
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:23:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:23:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:23:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: I did not send a certificate because I do not have one.
Feb 15 08:23:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:23:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:23:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:23:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #26: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:25:33 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:25:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: responding to Main Mode
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: received Vendor ID payload [XAUTH]
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: I did not send a certificate because I do not have one.
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:25:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #27: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:08 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: responding to Main Mode
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: received Vendor ID payload [XAUTH]
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: I did not send a certificate because I do not have one.
Feb 15 08:35:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #28: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:43 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: responding to Main Mode
Feb 15 08:35:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: received Vendor ID payload [XAUTH]
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: I did not send a certificate because I do not have one.
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #29: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:45 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: responding to Main Mode
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: received Vendor ID payload [XAUTH]
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: I did not send a certificate because I do not have one.
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #30: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:46 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: responding to Main Mode
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: received Vendor ID payload [XAUTH]
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: I did not send a certificate because I do not have one.
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #31: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:50 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: responding to Main Mode
Feb 15 08:35:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: received Vendor ID payload [XAUTH]
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: I did not send a certificate because I do not have one.
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #32: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:52 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: responding to Main Mode
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: received Vendor ID payload [XAUTH]
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: I did not send a certificate because I do not have one.
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #33: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:35:53 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:35:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: responding to Main Mode
Feb 15 08:35:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:35:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:35:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:35:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: received Vendor ID payload [XAUTH]
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: I did not send a certificate because I do not have one.
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:35:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #34: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:37:36 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: responding to Main Mode
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: received Vendor ID payload [XAUTH]
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:37:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:37:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:37:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: I did not send a certificate because I do not have one.
Feb 15 08:37:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:37:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:37:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:37:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #35: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:43:40 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: responding to Main Mode
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: received Vendor ID payload [XAUTH]
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: I did not send a certificate because I do not have one.
Feb 15 08:43:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:43:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:43:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:43:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #36: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:47:54 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Openswan (this version) 2.4.0  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Feb 15 08:47:54 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Dead Peer Detection]
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: responding to Main Mode from unknown peer 71.252.134.175
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: Main mode peer ID is ID_FQDN: '@home'
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: I did not send a certificate because I do not have one.
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:47:54 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
Feb 15 08:47:56 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: responding to Main Mode
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: received Vendor ID payload [XAUTH]
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: I did not send a certificate because I do not have one.
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:47:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #38: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:47:57 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: responding to Main Mode
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: received Vendor ID payload [XAUTH]
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:47:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:47:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:47:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: I did not send a certificate because I do not have one.
Feb 15 08:47:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:47:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:47:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:47:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #39: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:47:59 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: responding to Main Mode
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: received Vendor ID payload [XAUTH]
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: I did not send a certificate because I do not have one.
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:47:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #40: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:48:00 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: responding to Main Mode
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: received Vendor ID payload [XAUTH]
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:48:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:48:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:48:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: I did not send a certificate because I do not have one.
Feb 15 08:48:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:48:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:48:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:48:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #41: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:48:04 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: responding to Main Mode
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: received Vendor ID payload [XAUTH]
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:48:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: I did not send a certificate because I do not have one.
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #42: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:48:05 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: responding to Main Mode
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:48:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: received Vendor ID payload [XAUTH]
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: I did not send a certificate because I do not have one.
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:48:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #43: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:48:07 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: responding to Main Mode
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: received Vendor ID payload [XAUTH]
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:48:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:48:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:48:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: I did not send a certificate because I do not have one.
Feb 15 08:48:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:48:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:48:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:48:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #44: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:49:38 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:49:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: responding to Main Mode
Feb 15 08:49:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:49:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: received Vendor ID payload [XAUTH]
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: I did not send a certificate because I do not have one.
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:49:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #45: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:50:04 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: responding to Main Mode
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: received Vendor ID payload [XAUTH]
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: I did not send a certificate because I do not have one.
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:50:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #46: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:50:36 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: responding to Main Mode
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: received Vendor ID payload [XAUTH]
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: I did not send a certificate because I do not have one.
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #48: responding to Quick Mode {msgid:d28c09a9}
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #48: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #48: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 08:50:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #48: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 08:50:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #48: STATE_QUICK_R2: IPsec SA established {ESP=>0x341077d4 <0xca33d299 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 08:51:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:51:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #47: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:51:40 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: responding to Main Mode
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: received Vendor ID payload [XAUTH]
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: I did not send a certificate because I do not have one.
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 08:51:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 08:51:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 08:51:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #49: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 08:57:49 localhost pluto[11229]: "home"[1] 71.252.134.175 #1: received Delete SA payload: deleting ISAKMP State #1
Feb 15 08:57:49 localhost pluto[11229]: packet from 71.252.134.175:500: received and ignored informational message
Feb 15 09:00:11 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: responding to Main Mode
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: received Vendor ID payload [XAUTH]
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:00:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: I did not send a certificate because I do not have one.
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #50: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:00:12 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: responding to Main Mode
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:00:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: received Vendor ID payload [XAUTH]
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: I did not send a certificate because I do not have one.
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:00:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #51: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:00:14 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: responding to Main Mode
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: received Vendor ID payload [XAUTH]
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:00:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: I did not send a certificate because I do not have one.
Feb 15 09:00:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:00:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:00:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:00:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #52: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:00:18 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: responding to Main Mode
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: received Vendor ID payload [XAUTH]
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: I did not send a certificate because I do not have one.
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:00:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #53: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:00:19 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: responding to Main Mode
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: received Vendor ID payload [XAUTH]
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:00:19 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: I did not send a certificate because I do not have one.
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:00:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #54: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:00:21 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: responding to Main Mode
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: received Vendor ID payload [XAUTH]
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: I did not send a certificate because I do not have one.
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:00:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #55: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:00:43 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:00:43 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:01:40 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:01:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: responding to Main Mode
Feb 15 09:01:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:01:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: received Vendor ID payload [XAUTH]
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: I did not send a certificate because I do not have one.
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:01:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #56: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:03:21 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:03:21 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:06:40 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: responding to Main Mode
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: received Vendor ID payload [XAUTH]
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:06:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:06:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:06:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: I did not send a certificate because I do not have one.
Feb 15 09:06:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:06:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:06:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:06:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #57: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:11:02 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:11:02 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:11:08 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:11:08 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:12:25 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: responding to Main Mode
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: received Vendor ID payload [XAUTH]
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: I did not send a certificate because I do not have one.
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:12:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #58: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:12:26 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: responding to Main Mode
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: received Vendor ID payload [XAUTH]
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:12:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: I did not send a certificate because I do not have one.
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:12:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #59: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:12:28 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: responding to Main Mode
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: received Vendor ID payload [XAUTH]
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: I did not send a certificate because I do not have one.
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:12:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #60: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:12:31 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:12:31 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: responding to Main Mode
Feb 15 09:12:31 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:12:31 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: received Vendor ID payload [XAUTH]
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: I did not send a certificate because I do not have one.
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:12:32 localhost pluto[11229]: "waxahachie-wireless-bedford" #61: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:12:33 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: responding to Main Mode
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: received Vendor ID payload [XAUTH]
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:12:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: I did not send a certificate because I do not have one.
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #62: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:12:34 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: responding to Main Mode
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:12:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: received Vendor ID payload [XAUTH]
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:12:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:12:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: I did not send a certificate because I do not have one.
Feb 15 09:12:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:12:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:12:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:12:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #63: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:13:32 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:13:32 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:13:43 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: responding to Main Mode
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: received Vendor ID payload [XAUTH]
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: I did not send a certificate because I do not have one.
Feb 15 09:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #64: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:14:01 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:14:01 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:23:21 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:23:21 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:23:24 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:23:24 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:23:30 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:23:30 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:23:44 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: responding to Main Mode
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: received Vendor ID payload [XAUTH]
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:23:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: I did not send a certificate because I do not have one.
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:23:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:24:38 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:24:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: responding to Main Mode
Feb 15 09:24:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:24:38 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: received Vendor ID payload [XAUTH]
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: I did not send a certificate because I do not have one.
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:24:39 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:24:40 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: responding to Main Mode
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: received Vendor ID payload [XAUTH]
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:24:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: I did not send a certificate because I do not have one.
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:24:41 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: responding to Main Mode
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:24:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: received Vendor ID payload [XAUTH]
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: I did not send a certificate because I do not have one.
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:24:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:24:45 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:24:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: responding to Main Mode
Feb 15 09:24:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:24:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:24:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: received Vendor ID payload [XAUTH]
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: I did not send a certificate because I do not have one.
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:24:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:24:47 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: responding to Main Mode
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: received Vendor ID payload [XAUTH]
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:24:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: I did not send a certificate because I do not have one.
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:24:48 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: responding to Main Mode
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:24:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: received Vendor ID payload [XAUTH]
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: I did not send a certificate because I do not have one.
Feb 15 09:24:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:24:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:24:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:24:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:25:34 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:25:37 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:25:45 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: responding to Main Mode
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: received Vendor ID payload [XAUTH]
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:25:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:25:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:25:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: I did not send a certificate because I do not have one.
Feb 15 09:25:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:25:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:25:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:25:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:33:44 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Openswan (this version) 2.4.0  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Feb 15 09:33:44 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Dead Peer Detection]
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: responding to Main Mode from unknown peer 71.252.134.175
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: Main mode peer ID is ID_FQDN: '@home'
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: I did not send a certificate because I do not have one.
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:33:44 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
Feb 15 09:35:08 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:08 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:35:44 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:44 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:35:46 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:46 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:35:48 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:48 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:35:51 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:51 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:35:52 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:52 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:35:54 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:35:54 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:36:52 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:36:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: responding to Main Mode
Feb 15 09:36:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:36:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:36:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:36:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: received Vendor ID payload [XAUTH]
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: I did not send a certificate because I do not have one.
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:36:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:36:54 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: responding to Main Mode
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: received Vendor ID payload [XAUTH]
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: I did not send a certificate because I do not have one.
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:36:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:36:55 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:36:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: responding to Main Mode
Feb 15 09:36:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:36:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:36:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: received Vendor ID payload [XAUTH]
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: I did not send a certificate because I do not have one.
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:36:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:36:59 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: responding to Main Mode
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: received Vendor ID payload [XAUTH]
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:36:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: I did not send a certificate because I do not have one.
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:37:00 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: responding to Main Mode
Feb 15 09:37:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: received Vendor ID payload [XAUTH]
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: I did not send a certificate because I do not have one.
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:37:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:37:02 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: responding to Main Mode
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: received Vendor ID payload [XAUTH]
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:37:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:37:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:37:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: I did not send a certificate because I do not have one.
Feb 15 09:37:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:37:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:37:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:37:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:37:37 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:37:37 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:37:47 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:37:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: responding to Main Mode
Feb 15 09:37:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:37:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: received Vendor ID payload [XAUTH]
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: I did not send a certificate because I do not have one.
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:37:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:39:13 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: responding to Main Mode
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: received Vendor ID payload [XAUTH]
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: I did not send a certificate because I do not have one.
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:39:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #82: responding to Quick Mode {msgid:0f34928b}
Feb 15 09:39:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #82: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 09:39:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #82: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 09:39:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #82: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 09:39:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #82: STATE_QUICK_R2: IPsec SA established {ESP=>0x49d9b59d <0x6cf61f36 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 09:40:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:40:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:43:40 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:43:40 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:47:53 localhost pluto[11229]: "home"[1] 71.252.134.175 #37: received Delete SA payload: deleting ISAKMP State #37
Feb 15 09:47:53 localhost pluto[11229]: packet from 71.252.134.175:500: received and ignored informational message
Feb 15 09:47:56 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:47:56 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:47:58 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:47:58 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:47:59 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:47:59 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:48:01 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:48:01 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:48:05 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:48:05 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:48:06 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:48:06 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:48:08 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:48:08 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:49:06 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: responding to Main Mode
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: received Vendor ID payload [XAUTH]
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: I did not send a certificate because I do not have one.
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:07 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: responding to Main Mode
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: received Vendor ID payload [XAUTH]
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: I did not send a certificate because I do not have one.
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:09 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: responding to Main Mode
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: received Vendor ID payload [XAUTH]
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: I did not send a certificate because I do not have one.
Feb 15 09:49:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:13 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: responding to Main Mode
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: received Vendor ID payload [XAUTH]
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: I did not send a certificate because I do not have one.
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:13 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:14 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: responding to Main Mode
Feb 15 09:49:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: received Vendor ID payload [XAUTH]
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: I did not send a certificate because I do not have one.
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:16 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: responding to Main Mode
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: received Vendor ID payload [XAUTH]
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: I did not send a certificate because I do not have one.
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:20 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: responding to Main Mode
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: received Vendor ID payload [XAUTH]
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: I did not send a certificate because I do not have one.
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:49:39 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:49:39 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:49:50 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: responding to Main Mode
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: received Vendor ID payload [XAUTH]
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: I did not send a certificate because I do not have one.
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:49:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:50:04 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:50:04 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:50:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:50:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:51:40 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 09:51:41 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 09:53:36 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: responding to Main Mode
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: received Vendor ID payload [XAUTH]
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: I did not send a certificate because I do not have one.
Feb 15 09:53:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:53:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:53:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:53:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:55:43 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: responding to Main Mode
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: received Vendor ID payload [XAUTH]
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:55:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:55:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:55:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:55:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: I did not send a certificate because I do not have one.
Feb 15 09:55:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:55:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:55:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:55:46 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:56:47 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: responding to Main Mode
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: received Vendor ID payload [XAUTH]
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: I did not send a certificate because I do not have one.
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:56:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 09:57:19 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 09:57:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: responding to Main Mode
Feb 15 09:57:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 09:57:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: received Vendor ID payload [XAUTH]
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: I did not send a certificate because I do not have one.
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 09:57:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:00:11 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:00:11 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:00:13 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:00:13 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:00:14 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:00:14 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:00:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:00:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:00:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:00:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:00:21 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:00:21 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:01:20 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: responding to Main Mode
Feb 15 10:01:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: received Vendor ID payload [XAUTH]
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: I did not send a certificate because I do not have one.
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:01:21 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: responding to Main Mode
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: received Vendor ID payload [XAUTH]
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: I did not send a certificate because I do not have one.
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:22 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:01:23 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: responding to Main Mode
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: received Vendor ID payload [XAUTH]
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: I did not send a certificate because I do not have one.
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:01:26 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: responding to Main Mode
Feb 15 10:01:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: received Vendor ID payload [XAUTH]
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: I did not send a certificate because I do not have one.
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:01:28 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: responding to Main Mode
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: received Vendor ID payload [XAUTH]
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: I did not send a certificate because I do not have one.
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:01:29 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: responding to Main Mode
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: received Vendor ID payload [XAUTH]
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: I did not send a certificate because I do not have one.
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:01:41 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:01:41 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:01:52 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: responding to Main Mode
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: received Vendor ID payload [XAUTH]
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:01:52 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:01:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: I did not send a certificate because I do not have one.
Feb 15 10:01:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:01:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:01:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:01:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:06:41 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:06:41 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:12:20 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: responding to Main Mode
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: received Vendor ID payload [XAUTH]
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:12:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: I did not send a certificate because I do not have one.
Feb 15 10:12:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:12:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:12:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:12:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:12:25 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:12:25 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:12:27 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:12:27 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:12:28 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:12:28 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:12:32 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:12:32 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:12:34 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:12:34 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:12:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:12:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:13:33 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:13:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: responding to Main Mode
Feb 15 10:13:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:13:33 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: received Vendor ID payload [XAUTH]
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: I did not send a certificate because I do not have one.
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:13:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:13:35 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: responding to Main Mode
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: received Vendor ID payload [XAUTH]
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:13:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: I did not send a certificate because I do not have one.
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:13:36 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: responding to Main Mode
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:13:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: received Vendor ID payload [XAUTH]
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: I did not send a certificate because I do not have one.
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:13:37 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:13:40 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:13:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: responding to Main Mode
Feb 15 10:13:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:13:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:13:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: received Vendor ID payload [XAUTH]
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: I did not send a certificate because I do not have one.
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:13:41 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:13:42 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: responding to Main Mode
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: received Vendor ID payload [XAUTH]
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: I did not send a certificate because I do not have one.
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:13:42 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:13:43 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: responding to Main Mode
Feb 15 10:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:13:43 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: received Vendor ID payload [XAUTH]
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:13:44 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:13:44 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: next payload type of ISAKMP Identification Payload has an unknown value: 192
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 10:13:44 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 10:13:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: next payload type of ISAKMP Identification Payload has an unknown value: 192
Feb 15 10:13:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 10:13:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 10:14:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: next payload type of ISAKMP Identification Payload has an unknown value: 192
Feb 15 10:14:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 10:14:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 10:14:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: next payload type of ISAKMP Identification Payload has an unknown value: 192
Feb 15 10:14:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 10:14:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 10:14:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #108: max number of retransmissions (2) reached STATE_MAIN_R2
Feb 15 10:18:16 localhost pluto[11229]: "waxahachie-wireless-bedford": terminating SAs using this connection
Feb 15 10:18:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #48: deleting state (STATE_QUICK_R2)
Feb 15 10:18:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #82: deleting state (STATE_QUICK_R2)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #93: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #78: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #76: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #75: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #107: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #106: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #65: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #83: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #95: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #67: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #92: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #68: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #66: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #100: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #84: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #99: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #79: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #96: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #90: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #97: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #72: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #104: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #98: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #87: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #81: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #94: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #103: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #91: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #77: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #80: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #74: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #70: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #89: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #71: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #102: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #85: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #105: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #88: deleting state (STATE_MAIN_R3)
Feb 15 10:18:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #86: deleting state (STATE_MAIN_R3)
Feb 15 10:18:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #101: deleting state (STATE_MAIN_R3)
Feb 15 10:18:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #69: deleting state (STATE_MAIN_R3)
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:18 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:19 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 10:18:20 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 10:18:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: initiating Main Mode
Feb 15 10:18:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:18:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: enabling possible NAT-traversal with method draft-ietf-ipsec-nat-t-ike-02/03
Feb 15 10:18:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Feb 15 10:18:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: STATE_MAIN_I2: sent MI2, expecting MR2
Feb 15 10:18:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: received Vendor ID payload [XAUTH]
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: I did not send a certificate because I do not have one.
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: STATE_MAIN_I3: sent MI3, expecting MR3
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #110: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+UP {using isakmp#109}
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #110: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Feb 15 10:18:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #110: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0xf245816b <0x42385678 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 10:22:24 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Openswan (this version) 2.4.0  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Feb 15 10:22:24 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Dead Peer Detection]
Feb 15 10:22:24 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: responding to Main Mode from unknown peer 71.252.134.175
Feb 15 10:22:24 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:22:24 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:22:25 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:22:25 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:22:25 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: Main mode peer ID is ID_FQDN: '@home'
Feb 15 10:22:25 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: I did not send a certificate because I do not have one.
Feb 15 10:22:25 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:22:25 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
Feb 15 10:25:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:25:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:25:49 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: responding to Main Mode
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: received Vendor ID payload [XAUTH]
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: I did not send a certificate because I do not have one.
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:25:49 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:25:50 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: responding to Main Mode
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: received Vendor ID payload [XAUTH]
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:25:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: I did not send a certificate because I do not have one.
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:25:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:25:54 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: responding to Main Mode
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: received Vendor ID payload [XAUTH]
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:25:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: I did not send a certificate because I do not have one.
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:25:55 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: responding to Main Mode
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:25:55 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: received Vendor ID payload [XAUTH]
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: I did not send a certificate because I do not have one.
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:25:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:25:57 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: responding to Main Mode
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: received Vendor ID payload [XAUTH]
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:25:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:25:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:25:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: I did not send a certificate because I do not have one.
Feb 15 10:25:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:25:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:25:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:25:58 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:29:24 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: responding to Main Mode
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: received Vendor ID payload [XAUTH]
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: I did not send a certificate because I do not have one.
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:29:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:33:43 localhost pluto[11229]: "home"[1] 71.252.134.175 #73: received Delete SA payload: deleting ISAKMP State #73
Feb 15 10:33:44 localhost pluto[11229]: packet from 71.252.134.175:500: received and ignored informational message
Feb 15 10:38:00 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: responding to Main Mode
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: received Vendor ID payload [XAUTH]
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: I did not send a certificate because I do not have one.
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:38:01 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: responding to Main Mode
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: received Vendor ID payload [XAUTH]
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:01 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: I did not send a certificate because I do not have one.
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:38:02 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: responding to Main Mode
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: received Vendor ID payload [XAUTH]
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: I did not send a certificate because I do not have one.
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:38:04 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: responding to Main Mode
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: received Vendor ID payload [XAUTH]
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: I did not send a certificate because I do not have one.
Feb 15 10:38:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:38:05 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: responding to Main Mode
Feb 15 10:38:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: received Vendor ID payload [XAUTH]
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: I did not send a certificate because I do not have one.
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:38:08 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: responding to Main Mode
Feb 15 10:38:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: received Vendor ID payload [XAUTH]
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: I did not send a certificate because I do not have one.
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:38:14 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:38:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: responding to Main Mode
Feb 15 10:38:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:38:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: received Vendor ID payload [XAUTH]
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: I did not send a certificate because I do not have one.
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:38:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:46:27 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:46:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: responding to Main Mode
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: received Vendor ID payload [XAUTH]
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: I did not send a certificate because I do not have one.
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:46:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:50:02 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:50:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: responding to Main Mode
Feb 15 10:50:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:50:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:50:02 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: received Vendor ID payload [XAUTH]
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: I did not send a certificate because I do not have one.
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:50:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:50:26 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:50:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: responding to Main Mode
Feb 15 10:50:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:50:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: received Vendor ID payload [XAUTH]
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: I did not send a certificate because I do not have one.
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:50:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:50:29 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:50:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: responding to Main Mode
Feb 15 10:50:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:50:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: received Vendor ID payload [XAUTH]
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: I did not send a certificate because I do not have one.
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:50:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:50:35 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:50:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: responding to Main Mode
Feb 15 10:50:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:50:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: received Vendor ID payload [XAUTH]
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: I did not send a certificate because I do not have one.
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:50:36 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:54:59 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:54:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: responding to Main Mode
Feb 15 10:54:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:54:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: received Vendor ID payload [XAUTH]
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: I did not send a certificate because I do not have one.
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:55:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 10:59:15 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 10:59:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: responding to Main Mode
Feb 15 10:59:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 10:59:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: received Vendor ID payload [XAUTH]
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: I did not send a certificate because I do not have one.
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 10:59:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:01:23 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: responding to Main Mode
Feb 15 11:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:01:23 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: received Vendor ID payload [XAUTH]
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: I did not send a certificate because I do not have one.
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:01:24 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:02:05 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: responding to Main Mode
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: received Vendor ID payload [XAUTH]
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: I did not send a certificate because I do not have one.
Feb 15 11:02:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:02:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:02:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:02:06 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:02:27 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:02:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: responding to Main Mode
Feb 15 11:02:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:02:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: received Vendor ID payload [XAUTH]
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: I did not send a certificate because I do not have one.
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:02:28 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:02:47 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:02:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: responding to Main Mode
Feb 15 11:02:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:02:47 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: received Vendor ID payload [XAUTH]
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: I did not send a certificate because I do not have one.
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:02:48 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:02:50 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:02:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: responding to Main Mode
Feb 15 11:02:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:02:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: received Vendor ID payload [XAUTH]
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: I did not send a certificate because I do not have one.
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:02:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:02:56 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:02:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: responding to Main Mode
Feb 15 11:02:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:02:56 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: received Vendor ID payload [XAUTH]
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: I did not send a certificate because I do not have one.
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:02:57 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:02:59 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:02:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: responding to Main Mode
Feb 15 11:02:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:02:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: received Vendor ID payload [XAUTH]
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: I did not send a certificate because I do not have one.
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:03:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:08:15 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Openswan (this version) 2.4.0  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Feb 15 11:08:15 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Dead Peer Detection]
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: responding to Main Mode from unknown peer 71.252.134.175
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: Main mode peer ID is ID_FQDN: '@home'
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: I did not send a certificate because I do not have one.
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:08:15 localhost pluto[11229]: "home"[1] 71.252.134.175 #139: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford": terminating SAs using this connection
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #110: deleting state (STATE_QUICK_I2)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #112: deleting state (STATE_MAIN_R3)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #137: deleting state (STATE_MAIN_R3)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #134: deleting state (STATE_MAIN_R3)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #136: deleting state (STATE_MAIN_R3)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #128: deleting state (STATE_MAIN_R3)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #130: deleting state (STATE_MAIN_R3)
Feb 15 11:11:34 localhost pluto[11229]: "waxahachie-wireless-bedford" #125: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #120: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #138: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #122: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #124: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #114: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #126: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #117: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #116: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #115: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #132: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #129: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #133: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #118: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #131: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #121: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #127: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #123: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #113: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #109: deleting state (STATE_MAIN_I4)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #119: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #135: deleting state (STATE_MAIN_R3)
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:35 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:36 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:11:37 localhost pluto[11229]: packet from 65.91.22.234:500: ignoring informational payload, type INVALID_COOKIE
Feb 15 11:11:37 localhost pluto[11229]: packet from 65.91.22.234:500: received and ignored informational message
Feb 15 11:13:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: initiating Main Mode
Feb 15 11:13:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:13:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: enabling possible NAT-traversal with method draft-ietf-ipsec-nat-t-ike-02/03
Feb 15 11:13:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Feb 15 11:13:16 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: STATE_MAIN_I2: sent MI2, expecting MR2
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: received Vendor ID payload [XAUTH]
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: I did not send a certificate because I do not have one.
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: STATE_MAIN_I3: sent MI3, expecting MR3
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #141: initiating Quick Mode PSK+ENCRYPT+COMPRESS+TUNNEL+UP {using isakmp#140}
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #141: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Feb 15 11:13:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #141: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0x31404439 <0x215a0dd2 xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 11:14:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:14:07 localhost pluto[11229]: "waxahachie-wireless-bedford" #140: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:15:08 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:15:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: responding to Main Mode
Feb 15 11:15:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:15:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: received Vendor ID payload [XAUTH]
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: I did not send a certificate because I do not have one.
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:15:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #142: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:15:11 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:15:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: responding to Main Mode
Feb 15 11:15:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:15:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: received Vendor ID payload [XAUTH]
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: I did not send a certificate because I do not have one.
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:15:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #143: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:15:17 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:15:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: responding to Main Mode
Feb 15 11:15:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:15:17 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: received Vendor ID payload [XAUTH]
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: I did not send a certificate because I do not have one.
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:15:18 localhost pluto[11229]: "waxahachie-wireless-bedford" #144: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:16:25 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:16:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: responding to Main Mode
Feb 15 11:16:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:16:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:16:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:16:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:16:25 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: received Vendor ID payload [XAUTH]
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: I did not send a certificate because I do not have one.
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:16:26 localhost pluto[11229]: "waxahachie-wireless-bedford" #146: responding to Quick Mode {msgid:c20d6d52}
Feb 15 11:16:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #146: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Feb 15 11:16:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #146: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Feb 15 11:16:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #146: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Feb 15 11:16:27 localhost pluto[11229]: "waxahachie-wireless-bedford" #146: STATE_QUICK_R2: IPsec SA established {ESP=>0x4ca6ee4a <0x24f669ca xfrm=3DES_0-HMAC_MD5 NATD=65.91.22.234:500 DPD=none}
Feb 15 11:18:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:18:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #145: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:22:24 localhost pluto[11229]: "home"[1] 71.252.134.175 #111: received Delete SA payload: deleting ISAKMP State #111
Feb 15 11:22:24 localhost pluto[11229]: packet from 71.252.134.175:500: received and ignored informational message
Feb 15 11:26:09 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:26:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: responding to Main Mode
Feb 15 11:26:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:26:09 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: received Vendor ID payload [XAUTH]
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: I did not send a certificate because I do not have one.
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:26:10 localhost pluto[11229]: "waxahachie-wireless-bedford" #147: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:27:29 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:27:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: responding to Main Mode
Feb 15 11:27:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:27:29 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: received Vendor ID payload [XAUTH]
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: next payload type of ISAKMP Identification Payload has an unknown value: 41
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 11:27:30 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 11:27:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: next payload type of ISAKMP Identification Payload has an unknown value: 41
Feb 15 11:27:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 11:27:35 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 11:27:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: next payload type of ISAKMP Identification Payload has an unknown value: 41
Feb 15 11:27:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 11:27:45 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 11:28:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: next payload type of ISAKMP Identification Payload has an unknown value: 41
Feb 15 11:28:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
Feb 15 11:28:03 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: sending notification PAYLOAD_MALFORMED to 65.91.22.234:500
Feb 15 11:28:40 localhost pluto[11229]: "waxahachie-wireless-bedford" #148: max number of retransmissions (2) reached STATE_MAIN_R2
Feb 15 11:35:04 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: responding to Main Mode
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: received Vendor ID payload [XAUTH]
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:35:04 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:35:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:35:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: I did not send a certificate because I do not have one.
Feb 15 11:35:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:35:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:35:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:35:05 localhost pluto[11229]: "waxahachie-wireless-bedford" #149: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:38:11 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:38:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: responding to Main Mode
Feb 15 11:38:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: received Vendor ID payload [XAUTH]
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: I did not send a certificate because I do not have one.
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:38:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #150: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:39:50 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:39:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: responding to Main Mode
Feb 15 11:39:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:39:50 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: received Vendor ID payload [XAUTH]
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: I did not send a certificate because I do not have one.
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:39:51 localhost pluto[11229]: "waxahachie-wireless-bedford" #151: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:39:53 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:39:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: responding to Main Mode
Feb 15 11:39:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:39:53 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: received Vendor ID payload [XAUTH]
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: I did not send a certificate because I do not have one.
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:39:54 localhost pluto[11229]: "waxahachie-wireless-bedford" #152: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:39:59 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:39:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: responding to Main Mode
Feb 15 11:39:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:39:59 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: received Vendor ID payload [XAUTH]
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: I did not send a certificate because I do not have one.
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:40:00 localhost pluto[11229]: "waxahachie-wireless-bedford" #153: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:50:14 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: responding to Main Mode
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: received Vendor ID payload [XAUTH]
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: I did not send a certificate because I do not have one.
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:50:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:50:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #154: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:52:07 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: responding to Main Mode
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: received Vendor ID payload [XAUTH]
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: I did not send a certificate because I do not have one.
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:52:08 localhost pluto[11229]: "waxahachie-wireless-bedford" #155: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:52:11 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:52:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: responding to Main Mode
Feb 15 11:52:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:52:11 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: received Vendor ID payload [XAUTH]
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: I did not send a certificate because I do not have one.
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:52:12 localhost pluto[11229]: "waxahachie-wireless-bedford" #156: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:52:14 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:52:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: responding to Main Mode
Feb 15 11:52:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:52:14 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: received Vendor ID payload [XAUTH]
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: I did not send a certificate because I do not have one.
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:52:15 localhost pluto[11229]: "waxahachie-wireless-bedford" #157: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:52:20 localhost pluto[11229]: packet from 65.91.22.234:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 15 11:52:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: responding to Main Mode
Feb 15 11:52:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:52:20 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: ignoring unknown Vendor ID payload [da8e937880010000]
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: ignoring unknown Vendor ID payload [404bf439522ca3f6]
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: received Vendor ID payload [XAUTH]
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-00/01: no NAT detected
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: Main mode peer ID is ID_IPV4_ADDR: '65.91.22.234'
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: I did not send a certificate because I do not have one.
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1536}
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: cannot respond to IPsec SA request because no connection is known for 192.168.1.0/24===216.158.212.174[@corp]...65.91.22.234===1.1.1.1/32
Feb 15 11:52:21 localhost pluto[11229]: "waxahachie-wireless-bedford" #158: sending encrypted notification INVALID_ID_INFORMATION to 65.91.22.234:500
Feb 15 11:55:33 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Openswan (this version) 2.4.0  X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
Feb 15 11:55:33 localhost pluto[11229]: packet from 71.252.134.175:500: received Vendor ID payload [Dead Peer Detection]
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: responding to Main Mode from unknown peer 71.252.134.175
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: STATE_MAIN_R2: sent MR2, expecting MI3
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: Main mode peer ID is ID_FQDN: '@home'
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: I did not send a certificate because I do not have one.
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Feb 15 11:55:33 localhost pluto[11229]: "home"[1] 71.252.134.175 #159: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
+ _________________________ date
+ date
Wed Feb 15 11:56:47 CST 2006


More information about the Users mailing list