[Openswan Users] oakley.log for letoto
James
james at nttmcl.com
Fri Jun 1 15:41:47 EDT 2007
Having probs with winxp connecting. Tried both l2tp with winxp builtin
client and plain ipsec with linsys
Linux Client connects fine. Oakley.log is below
Here is my Server Side Config for ipsec.conf
config setup
interfaces=%defaultroute
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:xxx.xxx.xxx.192/27
plutodebug=all
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
conn roadwarrior-net
leftsubnet=xxx.xxx.xxx.192/27
also=roadwarrior
conn roadwarrior
left=%defaultroute
leftcert=/etc/ipsec.d/certs/vpnserver.pem
right=%any
rightsubnet=vhost:%no,%priv
auto=add
pfs=yes
conn roadwarrior-l2tp
type=transport
left=%defaultroute
leftcert=/etc/ipsec.d/certs/vpnserver.pem
leftprotoport=17/1701
right=%any
rightprotoport=17/1701
pfs=no
auto=add
conn roadwarrior-l2tp-oldwin
left=%defaultroute
leftcert=/etc/ipsec.d/certs/vpnserver.pem
leftprotoport=17/0
right=%any
rightprotoport=17/1701
rightsubnet=vhost:%no,%priv
pfs=no
auto=add
Oakley.log:
6-01: 12:31:37:477:548 QM PolicyName: L2TP Require Encryption Quick Mode
Policy dwFlags 0
6-01: 12:31:37:477:548 QMOffer[0] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[0] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:477:548 Algo[0] Operation: ESP Algo: Triple DES CBC
HMAC: MD5
6-01: 12:31:37:477:548 QMOffer[1] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[1] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:477:548 Algo[0] Operation: ESP Algo: Triple DES CBC
HMAC: SHA
6-01: 12:31:37:477:548 QMOffer[2] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[2] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:477:548 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:477:548 Algo[1] Operation: ESP Algo: Triple DES CBC HMAC: 0
6-01: 12:31:37:477:548 QMOffer[3] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[3] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:477:548 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:477:548 Algo[1] Operation: ESP Algo: Triple DES CBC HMAC: 0
6-01: 12:31:37:477:548 QMOffer[4] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[4] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:477:548 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:477:548 Algo[1] Operation: ESP Algo: Triple DES CBC
HMAC: SHA
6-01: 12:31:37:477:548 QMOffer[5] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[5] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:477:548 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:477:548 Algo[1] Operation: ESP Algo: Triple DES CBC
HMAC: MD5
6-01: 12:31:37:477:548 QMOffer[6] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:477:548 QMOffer[6] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:548 Algo[0] Operation: ESP Algo: DES CBC HMAC: MD5
6-01: 12:31:37:487:548 QMOffer[7] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:548 QMOffer[7] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:548 Algo[0] Operation: ESP Algo: DES CBC HMAC: SHA
6-01: 12:31:37:487:548 QMOffer[8] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:548 QMOffer[8] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:548 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:487:548 Algo[1] Operation: ESP Algo: DES CBC HMAC: 0
6-01: 12:31:37:487:548 QMOffer[9] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:548 QMOffer[9] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:548 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:487:548 Algo[1] Operation: ESP Algo: DES CBC HMAC: 0
6-01: 12:31:37:487:548 QMOffer[10] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:548 QMOffer[10] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:548 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:487:548 Algo[1] Operation: ESP Algo: DES CBC HMAC: SHA
6-01: 12:31:37:487:548 QMOffer[11] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:548 QMOffer[11] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:548 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:487:548 Algo[1] Operation: ESP Algo: DES CBC HMAC: MD5
6-01: 12:31:37:487:548 Internal Acquire: op=00000001
src=xxx.xxx.xxx.210.1701 dst=xxx.xxx.xxx.195.1701 proto = 17,
SrcMask=255.255.255.255, DstMask=255.255.255.255, Tunnel 0,
TunnelEndpt=0.0.0.0 Inbound TunnelEndpt=0.0.0.0, InitiateEvent=000006EC,
IKE SrcPort=500 IKE DstPort=500
6-01: 12:31:37:487:2e4 Filter to match: Src xxx.xxx.xxx.195 Dst
xxx.xxx.xxx.210
6-01: 12:31:37:487:2e4 MM PolicyName: L2TP Main Mode Policy
6-01: 12:31:37:487:2e4 MMPolicy dwFlags 8 SoftSAExpireTime 28800
6-01: 12:31:37:487:2e4 MMOffer[0] LifetimeSec 28800 QMLimit 0 DHGroup
268435457
6-01: 12:31:37:487:2e4 MMOffer[0] Encrypt: Triple DES CBC Hash: SHA
6-01: 12:31:37:487:2e4 MMOffer[1] LifetimeSec 28800 QMLimit 0 DHGroup 2
6-01: 12:31:37:487:2e4 MMOffer[1] Encrypt: Triple DES CBC Hash: SHA
6-01: 12:31:37:487:2e4 MMOffer[2] LifetimeSec 28800 QMLimit 0 DHGroup 2
6-01: 12:31:37:487:2e4 MMOffer[2] Encrypt: Triple DES CBC Hash: MD5
6-01: 12:31:37:487:2e4 MMOffer[3] LifetimeSec 28800 QMLimit 0 DHGroup 1
6-01: 12:31:37:487:2e4 MMOffer[3] Encrypt: DES CBC Hash: SHA
6-01: 12:31:37:487:2e4 MMOffer[4] LifetimeSec 28800 QMLimit 0 DHGroup 1
6-01: 12:31:37:487:2e4 MMOffer[4] Encrypt: DES CBC Hash: MD5
6-01: 12:31:37:487:2e4 Auth[0]:RSA Sig C=US, S=California, O=xxx mcl,
CN=CAHost.xxx.com, E=james at xxx.com AuthFlags 0
6-01: 12:31:37:487:2e4 QM PolicyName: L2TP Require Encryption Quick
Mode Policy dwFlags 0
6-01: 12:31:37:487:2e4 QMOffer[0] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[0] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: ESP Algo: Triple DES CBC
HMAC: MD5
6-01: 12:31:37:487:2e4 QMOffer[1] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[1] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: ESP Algo: Triple DES CBC
HMAC: SHA
6-01: 12:31:37:487:2e4 QMOffer[2] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[2] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: Triple DES CBC HMAC: 0
6-01: 12:31:37:487:2e4 QMOffer[3] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[3] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: Triple DES CBC HMAC: 0
6-01: 12:31:37:487:2e4 QMOffer[4] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[4] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: Triple DES CBC
HMAC: SHA
6-01: 12:31:37:487:2e4 QMOffer[5] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[5] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: Triple DES CBC
HMAC: MD5
6-01: 12:31:37:487:2e4 QMOffer[6] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[6] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: ESP Algo: DES CBC HMAC: MD5
6-01: 12:31:37:487:2e4 QMOffer[7] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[7] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: ESP Algo: DES CBC HMAC: SHA
6-01: 12:31:37:487:2e4 QMOffer[8] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[8] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: DES CBC HMAC: 0
6-01: 12:31:37:487:2e4 QMOffer[9] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[9] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: DES CBC HMAC: 0
6-01: 12:31:37:487:2e4 QMOffer[10] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[10] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: SHA
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: DES CBC HMAC: SHA
6-01: 12:31:37:487:2e4 QMOffer[11] LifetimeKBytes 250000 LifetimeSec 3600
6-01: 12:31:37:487:2e4 QMOffer[11] dwFlags 0 dwPFSGroup 0
6-01: 12:31:37:487:2e4 Algo[0] Operation: AH Algo: MD5
6-01: 12:31:37:487:2e4 Algo[1] Operation: ESP Algo: DES CBC HMAC: MD5
6-01: 12:31:37:487:2e4 Starting Negotiation: src =
xxx.xxx.xxx.210.0500, dst = xxx.xxx.xxx.195.0500, proto = 17, context =
00000000, ProxySrc = xxx.xxx.xxx.210.1701, ProxyDst =
xxx.xxx.xxx.195.1701 SrcMask = 0.0.0.0 DstMask = 0.0.0.0
6-01: 12:31:37:487:2e4 constructing ISAKMP Header
6-01: 12:31:37:487:2e4 constructing SA (ISAKMP)
6-01: 12:31:37:487:2e4 Constructing Vendor MS NT5 ISAKMPOAKLEY
6-01: 12:31:37:497:2e4 Constructing Vendor FRAGMENTATION
6-01: 12:31:37:497:2e4 Constructing Vendor draft-ietf-ipsec-nat-t-ike-02
6-01: 12:31:37:497:2e4 Constructing Vendor Vid-Initial-Contact
6-01: 12:31:37:497:2e4
6-01: 12:31:37:497:2e4 Sending: SA = 0x000E6DE0 to xxx.xxx.xxx.195:Type
2.500
6-01: 12:31:37:497:2e4 ISAKMP Header: (V1.0), len = 312
6-01: 12:31:37:497:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:37:497:2e4 R-COOKIE 0000000000000000
6-01: 12:31:37:497:2e4 exchange: Oakley Main Mode
6-01: 12:31:37:497:2e4 flags: 0
6-01: 12:31:37:497:2e4 next payload: SA
6-01: 12:31:37:497:2e4 message ID: 00000000
6-01: 12:31:37:497:2e4 Ports S:f401 D:f401
6-01: 12:31:37:497:2e4 Activating InitiateEvent 000006EC
6-01: 12:31:37:668:2e4
6-01: 12:31:37:668:2e4 Receive: (get) SA = 0x000e6de0 from
xxx.xxx.xxx.195.500
6-01: 12:31:37:668:2e4 ISAKMP Header: (V1.0), len = 140
6-01: 12:31:37:668:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:37:668:2e4 R-COOKIE e608157292ad684d
6-01: 12:31:37:668:2e4 exchange: Oakley Main Mode
6-01: 12:31:37:668:2e4 flags: 0
6-01: 12:31:37:668:2e4 next payload: SA
6-01: 12:31:37:668:2e4 message ID: 00000000
6-01: 12:31:37:668:2e4 processing payload SA
6-01: 12:31:37:668:2e4 Received Phase 1 Transform 1
6-01: 12:31:37:668:2e4 Encryption Alg Triple DES CBC(5)
6-01: 12:31:37:668:2e4 Hash Alg SHA(2)
6-01: 12:31:37:668:2e4 Oakley Group 14
6-01: 12:31:37:668:2e4 Auth Method RSA Signature with Certificates(3)
6-01: 12:31:37:668:2e4 Life type in Seconds
6-01: 12:31:37:668:2e4 Life duration of 28800
6-01: 12:31:37:668:2e4 Phase 1 SA accepted: transform=1
6-01: 12:31:37:668:2e4 SA - Oakley proposal accepted
6-01: 12:31:37:668:2e4 processing payload VENDOR ID
6-01: 12:31:37:668:2e4 processing payload VENDOR ID
6-01: 12:31:37:668:2e4 processing payload VENDOR ID
6-01: 12:31:37:668:2e4 Received VendorId draft-ietf-ipsec-nat-t-ike-02
6-01: 12:31:37:668:2e4 ClearFragList
6-01: 12:31:37:668:2e4 constructing ISAKMP Header
6-01: 12:31:38:88:2e4 constructing KE
6-01: 12:31:38:88:2e4 constructing NONCE (ISAKMP)
6-01: 12:31:38:88:2e4 Constructing NatDisc
6-01: 12:31:38:88:2e4
6-01: 12:31:38:88:2e4 Sending: SA = 0x000E6DE0 to xxx.xxx.xxx.195:Type
2.500
6-01: 12:31:38:88:2e4 ISAKMP Header: (V1.0), len = 360
6-01: 12:31:38:88:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:38:88:2e4 R-COOKIE e608157292ad684d
6-01: 12:31:38:88:2e4 exchange: Oakley Main Mode
6-01: 12:31:38:88:2e4 flags: 0
6-01: 12:31:38:88:2e4 next payload: KE
6-01: 12:31:38:88:2e4 message ID: 00000000
6-01: 12:31:38:88:2e4 Ports S:f401 D:f401
6-01: 12:31:38:419:2e4
6-01: 12:31:38:419:2e4 Receive: (get) SA = 0x000e6de0 from
xxx.xxx.xxx.195.500
6-01: 12:31:38:419:2e4 ISAKMP Header: (V1.0), len = 356
6-01: 12:31:38:419:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:38:419:2e4 R-COOKIE e608157292ad684d
6-01: 12:31:38:419:2e4 exchange: Oakley Main Mode
6-01: 12:31:38:419:2e4 flags: 0
6-01: 12:31:38:419:2e4 next payload: KE
6-01: 12:31:38:419:2e4 message ID: 00000000
6-01: 12:31:38:419:2e4 processing payload KE
6-01: 12:31:38:559:2e4 processing payload NONCE
6-01: 12:31:38:559:2e4 processing payload NATDISC
6-01: 12:31:38:559:2e4 Processing NatHash
6-01: 12:31:38:559:2e4 Nat hash c4e561aed8289dd252dc41e1a0449cfe
6-01: 12:31:38:559:2e4 cb179aeb
6-01: 12:31:38:559:2e4 SA StateMask2 e
6-01: 12:31:38:559:2e4 processing payload NATDISC
6-01: 12:31:38:559:2e4 Processing NatHash
6-01: 12:31:38:559:2e4 Nat hash a8410f550cb6eee57400a491b4714a30
6-01: 12:31:38:559:2e4 d8cdd2a7
6-01: 12:31:38:559:2e4 SA StateMask2 8e
6-01: 12:31:38:559:2e4 ClearFragList
6-01: 12:31:38:569:2e4 constructing ISAKMP Header
6-01: 12:31:38:569:2e4 constructing ID
6-01: 12:31:38:569:2e4 Received no valid CRPs. Using all configured
6-01: 12:31:38:569:2e4 Looking for IPSec only cert
6-01: 12:31:38:569:2e4 Trust failed. 400 100
6-01: 12:31:38:569:2e4 Cert SHA Thumbprint 6389b764a61deb16ef6fd3291e2ea991
6-01: 12:31:38:569:2e4 20936b83
6-01: 12:31:38:569:2e4 Looking for IPSec only cert
6-01: 12:31:38:569:2e4 failed to get chain 80092004
6-01: 12:31:38:569:2e4 Looking for any cert
6-01: 12:31:38:569:2e4 Trust failed. 400 100
6-01: 12:31:38:569:2e4 Cert SHA Thumbprint 6389b764a61deb16ef6fd3291e2ea991
6-01: 12:31:38:569:2e4 20936b83
6-01: 12:31:38:569:2e4 Looking for any cert
6-01: 12:31:38:569:2e4 failed to get chain 80092004
6-01: 12:31:38:569:2e4 ProcessFailure: sa:000E6DE0 centry:00000000
status:35ee
6-01: 12:31:38:569:2e4 isadb_set_status sa:000E6DE0 centry:00000000
status 35ee
6-01: 12:31:38:569:2e4 Key Exchange Mode (Main Mode)
6-01: 12:31:38:569:2e4 Source IP Address xxx.xxx.xxx.210 Source IP
Address Mask 255.255.255.255 Destination IP Address xxx.xxx.xxx.195
Destination IP Address Mask 255.255.255.255 Protocol 0 Source Port 0
Destination Port 0 IKE Local Addr xxx.xxx.xxx.210 IKE Peer Addr
xxx.xxx.xxx.195
6-01: 12:31:38:569:2e4 Certificate based Identity. Peer Subject
Peer SHA Thumbprint 0000000000000000000000000000000000000000 Peer
Issuing Certificate Authority Root Certificate Authority My Subject
C=US, S=something, L=something, O=something, CN=vpnclient,
E=james at somewhere.com My SHA Thumbprint
6389b764a61deb16ef6fd3291e2ea99120936b83 Peer IP Address: xxx.xxx.xxx.195
6-01: 12:31:38:569:2e4 Me
6-01: 12:31:38:569:2e4 IKE failed to find valid machine certificate
6-01: 12:31:38:569:2e4 0x80092004 0x100
6-01: 12:31:38:569:2e4 isadb_set_status InitiateEvent 000006EC: Setting
Status 35ee
6-01: 12:31:38:569:2e4 Clearing sa 000E6DE0 InitiateEvent 000006EC
6-01: 12:31:38:569:2e4 ProcessFailure: sa:000E6DE0 centry:00000000
status:35ee
6-01: 12:31:38:569:2e4 constructing ISAKMP Header
6-01: 12:31:38:569:2e4 constructing HASH (null)
6-01: 12:31:38:569:2e4 constructing NOTIFY 28
6-01: 12:31:38:569:2e4 constructing HASH (Notify/Delete)
6-01: 12:31:38:569:2e4
6-01: 12:31:38:569:2e4 Sending: SA = 0x000E6DE0 to xxx.xxx.xxx.195:Type
1.500
6-01: 12:31:38:569:2e4 ISAKMP Header: (V1.0), len = 84
6-01: 12:31:38:569:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:38:569:2e4 R-COOKIE e608157292ad684d
6-01: 12:31:38:569:2e4 exchange: ISAKMP Informational Exchange
6-01: 12:31:38:569:2e4 flags: 1 ( encrypted )
6-01: 12:31:38:569:2e4 next payload: HASH
6-01: 12:31:38:569:2e4 message ID: 145c92e1
6-01: 12:31:38:569:2e4 Ports S:f401 D:f401
6-01: 12:31:38:569:548 CloseNegHandle 000006EC
6-01: 12:31:38:569:548 SE cookie 5d8bee00f8076597
6-01: 12:31:38:659:2e4
6-01: 12:31:38:659:2e4 Receive: (get) SA = 0x000e6de0 from
xxx.xxx.xxx.195.500
6-01: 12:31:38:659:2e4 ISAKMP Header: (V1.0), len = 40
6-01: 12:31:38:659:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:38:659:2e4 R-COOKIE e608157292ad684d
6-01: 12:31:38:659:2e4 exchange: ISAKMP Informational Exchange
6-01: 12:31:38:659:2e4 flags: 0
6-01: 12:31:38:659:2e4 next payload: NOTIFY
6-01: 12:31:38:659:2e4 message ID: e00aed57
6-01: 12:31:38:659:2e4 received an unencrypted packet when crypto active
6-01: 12:31:38:659:2e4 GetPacket failed 35ec
6-01: 12:31:38:659:548 isadb_schedule_kill_oldPolicy_sas:
e243e61d-2f03-4569-95fc626a8b9bc018 4
6-01: 12:31:38:659:698 isadb_schedule_kill_oldPolicy_sas:
61a60461-18f4-4f52-b3f57b63340e63a1 3
6-01: 12:31:38:659:594 isadb_schedule_kill_oldPolicy_sas:
aa87991d-852c-446b-8698ae0a4db4fb7a 2
6-01: 12:31:38:659:548 isadb_schedule_kill_oldPolicy_sas:
bef9fb1f-fcb7-4f05-b98550db2613e34d 1
6-01: 12:31:38:669:2e4 entered kill_old_policy_sas 4
6-01: 12:31:38:669:2e4 SA Dead. sa:000E6DE0 status:3619
6-01: 12:31:38:669:2e4 constructing ISAKMP Header
6-01: 12:31:38:669:2e4 constructing HASH (null)
6-01: 12:31:38:669:2e4 constructing DELETE. MM 000E6DE0
6-01: 12:31:38:669:2e4 constructing HASH (Notify/Delete)
6-01: 12:31:38:669:2e4
6-01: 12:31:38:669:2e4 Sending: SA = 0x000E6DE0 to xxx.xxx.xxx.195:Type
1.500
6-01: 12:31:38:669:2e4 ISAKMP Header: (V1.0), len = 84
6-01: 12:31:38:669:2e4 I-COOKIE 5d8bee00f8076597
6-01: 12:31:38:669:2e4 R-COOKIE e608157292ad684d
6-01: 12:31:38:669:2e4 exchange: ISAKMP Informational Exchange
6-01: 12:31:38:669:2e4 flags: 1 ( encrypted )
6-01: 12:31:38:669:2e4 next payload: HASH
6-01: 12:31:38:669:2e4 message ID: 3a705729
6-01: 12:31:38:669:2e4 Ports S:f401 D:f401
6-01: 12:31:38:669:2e4 entered kill_old_policy_sas 3
6-01: 12:31:38:669:2e4 entered kill_old_policy_sas 2
6-01: 12:31:38:669:2e4 entered kill_old_policy_sas 1
More information about the Users
mailing list