[Openswan Users] Connection only in one direction

Martin Gerstendorf martin.gerstendorf at oint.net
Tue Aug 5 02:04:13 EDT 2008


Hi!
I have an ipsec connection running between Linksys wrv200 and an Openswan
Gateway. The tunnel is up and i can connect everything behind the openswan
gatewy but there is no connection from the openswn gateway to the net
behind my wrv200?


Tue Aug  5 07:59:06 CEST 2008
+ _________________________ version
+ ipsec --version
Linux Openswan U2.4.13/K2.6.18-53.1.13.2.ccPAE (netkey)
See `ipsec --copyright' for copyright information.
+ _________________________ /proc/version
+ cat /proc/version
Linux version 2.6.18-53.1.13.2.ccPAE (darryl at cc4devel.lan) (gcc version
3.4.6 20060404 (Red Hat 3.4.6-8)) #1 SMP Wed Feb 27 18:52:16 EST 2008
+ _________________________ /proc/net/ipsec_eroute
+ test -r /proc/net/ipsec_eroute
+ _________________________ netstat-rn
+ netstat -nr
+ head -n 100
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt
Iface
192.168.2.2     0.0.0.0         255.255.255.255 UH        0 0          0
tun0
83.218.162.0    0.0.0.0         255.255.255.192 U         0 0          0
eth0
192.168.6.0     0.0.0.0         255.255.255.0   U         0 0          0
eth1
192.168.5.0     83.218.162.62   255.255.255.0   UG        0 0          0
eth0
192.168.2.0     192.168.2.2     255.255.255.0   UG        0 0          0
tun0
192.168.10.0    0.0.0.0         255.255.255.0   U         0 0          0
eth2
0.0.0.0         83.218.162.62   0.0.0.0         UG        0 0          0
eth0
+ _________________________ /proc/net/ipsec_spi
+ test -r /proc/net/ipsec_spi
+ _________________________ /proc/net/ipsec_spigrp
+ test -r /proc/net/ipsec_spigrp
+ _________________________ /proc/net/ipsec_tncfg
+ test -r /proc/net/ipsec_tncfg
+ _________________________ /proc/net/pfkey
+ test -r /proc/net/pfkey
+ cat /proc/net/pfkey
sk       RefCnt Rmem   Wmem   User   Inode
+ _________________________ ip-xfrm-state
+ ip xfrm state
src 83.218.162.44 dst 91.112.190.238
	proto ipv6-crypt spi 0x084aef4b reqid 16385 mode tunnel
	replay-window 32 
	auth md5 0xb1079966f11ac08a97b3acec4c49860b
	enc des3_ede 0x6e681737e3b810de4009051f439c30229369e514c1768ccc
src 91.112.190.238 dst 83.218.162.44
	proto ipv6-crypt spi 0x6778d334 reqid 16385 mode tunnel
	replay-window 32 
	auth md5 0x021e739c8ba84a352160d6b0c26d3313
	enc des3_ede 0x24617071281ba26744987a52d6a0d6c4060321dc32625887
+ _________________________ ip-xfrm-policy
+ ip xfrm policy
src 192.168.5.0/24 dst 192.168.6.0/24 
	dir in priority 2344 
	tmpl	src 91.112.190.238 dst 83.218.162.44
		proto ipv6-crypt spi 0x00000000 reqid 16385 mode tunnel
		
src 192.168.6.0/24 dst 192.168.5.0/24 
	dir out priority 2344 
	tmpl	src 83.218.162.44 dst 91.112.190.238
		proto ipv6-crypt spi 0x00000000 reqid 16385 mode tunnel
		
src 192.168.5.0/24 dst 192.168.6.0/24 
	dir fwd priority 2344 
	tmpl	src 91.112.190.238 dst 83.218.162.44
		proto ipv6-crypt spi 0x00000000 reqid 16385 mode tunnel
		
src ::/0 dst ::/0 
	dir in priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir in priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir in priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir in priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir in priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir in priority 0 
src ::/0 dst ::/0 
	dir out priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir out priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir out priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir out priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir out priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
	dir out priority 0 
+ _________________________ /proc/sys/net/ipsec-star
+ test -d /proc/sys/net/ipsec
+ _________________________ ipsec/status
+ ipsec auto --status
000 interface lo/lo ::1
000 interface lo/lo 127.0.0.1
000 interface eth0/eth0 83.218.162.44
000 interface eth1/eth1 192.168.6.1
000 interface eth2/eth2 192.168.10.1
000 interface tun0/tun0 192.168.2.1
000 %myid = (none)
000 debug
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509
000  
000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64,
keysizemax=64
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192,
keysizemax=192
000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40,
keysizemax=448
000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0,
keysizemax=0
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128,
keysizemax=256
000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5,
keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1,
keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256,
keysizemin=256, keysizemax=256
000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0,
keysizemax=0
000  
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8,
keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16,
keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000  
000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,2,36}
trans={0,2,336} attrs={0,2,224} 
000  
000 "edelweiss":
192.168.6.0/24===83.218.162.44---83.218.162.62...91.112.190.237---91.112.190.238===192.168.5.0/24;
erouted; eroute owner: #2
000 "edelweiss":     srcip=unset; dstip=unset; srcup=ipsec _updown;
dstup=ipsec _updown;
000 "edelweiss":   ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "edelweiss":   policy: PSK+ENCRYPT+TUNNEL+UP; prio: 24,24; interface:
eth0; encap: esp;
000 "edelweiss":   newest ISAKMP SA: #1; newest IPsec SA: #2; 
000 "edelweiss":   IKE algorithms wanted:
3DES_CBC(5)_000-MD5(1)-MODP1024(2); flags=strict
000 "edelweiss":   IKE algorithms found:
3DES_CBC(5)_192-MD5(1)_128-MODP1024(2)
000 "edelweiss":   IKE algorithm newest: 3DES_CBC_192-MD5-MODP1024
000 "edelweiss":   ESP algorithms wanted: 3DES(3)_000-MD5(1); flags=strict
000 "edelweiss":   ESP algorithms loaded: 3DES(3)_000-MD5(1); flags=strict
000 "edelweiss":   ESP algorithm newest: 3DES_0-HMAC_MD5; pfsgroup=<N/A>
000  
000 #2: "edelweiss":500 STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 1325s; newest IPSEC; eroute owner
000 #2: "edelweiss" esp.84aef4b at 91.112.190.238 esp.6778d334 at 83.218.162.44
tun.0 at 91.112.190.238 tun.0 at 83.218.162.44
000 #1: "edelweiss":500 STATE_MAIN_I4 (ISAKMP SA established);
EVENT_SA_REPLACE in 26792s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0)
000  
+ _________________________ ifconfig-a
+ ifconfig -a
eth0      Link encap:Ethernet  HWaddr 00:14:5E:21:17:C8  
          inet addr:83.218.162.44  Bcast:83.218.162.63 
Mask:255.255.255.192
          inet6 addr: fe80::214:5eff:fe21:17c8/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:199541 errors:0 dropped:0 overruns:0 frame:0
          TX packets:65133 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:83141142 (79.2 MiB)  TX bytes:9551814 (9.1 MiB)
          Interrupt:177 

eth1      Link encap:Ethernet  HWaddr 00:1A:70:13:CD:6F  
          inet addr:192.168.6.1  Bcast:192.168.6.255  Mask:255.255.255.0
          inet6 addr: fe80::21a:70ff:fe13:cd6f/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2817074 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2624599 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:2307220105 (2.1 GiB)  TX bytes:2753072503 (2.5 GiB)
          Interrupt:90 Base address:0x4000 

eth2      Link encap:Ethernet  HWaddr 00:1A:70:13:CD:4D  
          inet addr:192.168.10.1  Bcast:192.168.10.255  Mask:255.255.255.0
          inet6 addr: fe80::21a:70ff:fe13:cd4d/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2891014 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3040355 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:2958963027 (2.7 GiB)  TX bytes:2798735730 (2.6 GiB)
          Interrupt:98 Base address:0x6400 

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:64878 errors:0 dropped:0 overruns:0 frame:0
          TX packets:64878 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:171686070 (163.7 MiB)  TX bytes:171686070 (163.7 MiB)

sit0      Link encap:IPv6-in-IPv4  
          NOARP  MTU:1480  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

tun0      Link encap:UNSPEC  HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  
          inet addr:192.168.2.1  P-t-P:192.168.2.2  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:68900 errors:0 dropped:0 overruns:0 frame:0
          TX packets:81768 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100 
          RX bytes:4816703 (4.5 MiB)  TX bytes:10134022 (9.6 MiB)

+ _________________________ ip-addr-list
+ ip addr list
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
    link/ether 00:14:5e:21:17:c8 brd ff:ff:ff:ff:ff:ff
    inet 83.218.162.44/26 brd 83.218.162.63 scope global eth0
    inet6 fe80::214:5eff:fe21:17c8/64 scope link 
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
    link/ether 00:1a:70:13:cd:6f brd ff:ff:ff:ff:ff:ff
    inet 192.168.6.1/24 brd 192.168.6.255 scope global eth1
    inet6 fe80::21a:70ff:fe13:cd6f/64 scope link 
       valid_lft forever preferred_lft forever
4: eth2: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
    link/ether 00:1a:70:13:cd:4d brd ff:ff:ff:ff:ff:ff
    inet 192.168.10.1/24 brd 192.168.10.255 scope global eth2
    inet6 fe80::21a:70ff:fe13:cd4d/64 scope link 
       valid_lft forever preferred_lft forever
5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,10000> mtu 1500 qdisc pfifo_fast
qlen 100
    link/[65534] 
    inet 192.168.2.1 peer 192.168.2.2/32 scope global tun0
6: sit0: <NOARP> mtu 1480 qdisc noop 
    link/sit 0.0.0.0 brd 0.0.0.0
+ _________________________ ip-route-list
+ ip route list
192.168.2.2 dev tun0  proto kernel  scope link  src 192.168.2.1 
83.218.162.0/26 dev eth0  proto kernel  scope link  src 83.218.162.44 
192.168.6.0/24 dev eth1  proto kernel  scope link  src 192.168.6.1 
192.168.5.0/24 via 83.218.162.62 dev eth0 
192.168.2.0/24 via 192.168.2.2 dev tun0 
192.168.10.0/24 dev eth2  proto kernel  scope link  src 192.168.10.1 
default via 83.218.162.62 dev eth0 
+ _________________________ ip-rule-list
+ ip rule list
0:	from all lookup local 
32766:	from all lookup main 
32767:	from all lookup default 
+ _________________________ ipsec_verify
+ ipsec verify --nocolour
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path                             	[OK]
Linux Openswan U2.4.13/K2.6.18-53.1.13.2.ccPAE (netkey)
Checking for IPsec support in kernel                        	[OK]
NETKEY detected, testing for disabled ICMP send_redirects   	[FAILED]

  Please disable /proc/sys/net/ipv4/conf/*/send_redirects
  or NETKEY will cause the sending of bogus ICMP redirects!

NETKEY detected, testing for disabled ICMP accept_redirects 	[FAILED]

  Please disable /proc/sys/net/ipv4/conf/*/accept_redirects
  or NETKEY will accept bogus ICMP redirects!

Checking for RSA private key (/etc/ipsec.secrets)           	[DISABLED]
  ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running                              	[OK]
Two or more interfaces found, checking IP forwarding        	[OK]
Checking NAT and MASQUERADEing                              
Checking for 'ip' command                                   	[OK]
Checking for 'iptables' command                             	[OK]
Opportunistic Encryption Support                            	[DISABLED]
  Cannot execute command "which iptables": No such file or directory
+ _________________________ mii-tool
+ '[' -x /sbin/mii-tool ']'
+ /sbin/mii-tool -v
SIOCGMIIPHY on 'eth1' failed: Operation not supported
SIOCGMIIPHY on 'eth2' failed: Operation not supported
eth0: negotiated 100baseTx-FD flow-control, link ok
  product info: vendor 00:08:18, model 24 rev 0
  basic mode:   autonegotiation enabled
  basic status: autonegotiation complete, link ok
  capabilities: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
  advertising:  100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
flow-control
  link partner: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD
flow-control
+ _________________________ ipsec/directory
+ ipsec --directory
/usr/lib/ipsec
+ _________________________ hostname/fqdn
+ hostname --fqdn
mail.edelweiss-gurgl.com
+ _________________________ hostname/ipaddress
+ hostname --ip-address
83.218.162.44
+ _________________________ uptime
+ uptime
 07:59:06 up 16:51,  1 user,  load average: 0.00, 0.00, 0.00
+ _________________________ ps
+ ps alxwf
+ egrep -i 'ppid|pluto|ipsec|klips'
F   UID   PID  PPID PRI  NI    VSZ   RSS WCHAN  STAT TTY        TIME
COMMAND
0     0 29582 24571  25   0   4256  1144 wait   S+   pts/0      0:00       
  \_ /bin/sh /usr/libexec/ipsec/barf
0     0 29676 29582  25   0   1780   504 pipe_w S+   pts/0      0:00       
      \_ egrep -i ppid|pluto|ipsec|klips
1     0 27357     1  25   0   2180   388 wait   S    pts/0      0:00
/bin/sh /usr/lib/ipsec/_plutorun --debug all --uniqueids yes --nocrsend 
--strictcrlpolicy  --nat_traversal  --keep_alive  --protostack auto
--force_keepalive  --disable_port_floating  --virtual_private 
--crlcheckinterval 0 --ocspuri  --nhelpers  --dump  --opts  --stderrlog 
--wait no --pre  --post  --log daemon.error --pid /var/run/pluto/pluto.pid
1     0 27358 27357  25   0   2180   660 wait   S    pts/0      0:00  \_
/bin/sh /usr/lib/ipsec/_plutorun --debug all --uniqueids yes --nocrsend 
--strictcrlpolicy  --nat_traversal  --keep_alive  --protostack auto
--force_keepalive  --disable_port_floating  --virtual_private 
--crlcheckinterval 0 --ocspuri  --nhelpers  --dump  --opts  --stderrlog 
--wait no --pre  --post  --log daemon.error --pid /var/run/pluto/pluto.pid
4     0 27360 27358  17   0   2508  1264 -      S    pts/0      0:00  |  
\_ /usr/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets
--ipsecdir /etc/ipsec.d --debug-all --use-auto --uniqueids
1     0 27376 27360  26  10   2452   620 -      SN   pts/0      0:00  |    
  \_ pluto helper  #  0                                                    
                                                      
0     0 27434 27360  24   0   1480   276 -      S    pts/0      0:00  |    
  \_ _pluto_adns -d
0     0 27361 27357  25   0   2180  1024 pipe_w S    pts/0      0:00  \_
/bin/sh /usr/lib/ipsec/_plutoload --wait no --post 
0     0 27365     1  22   0   1540   488 pipe_w S    pts/0      0:00 logger
-s -p daemon.error -t ipsec__plutorun
+ _________________________ ipsec/showdefaults
+ ipsec showdefaults
routephys=eth0
routevirt=ipsec0
routeaddr=83.218.162.44
routenexthop=83.218.162.62
+ _________________________ ipsec/conf
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor

#< /etc/ipsec.conf 1
# The config file changed quite a bit from 1.x.
# See
http://www.freeswan.org/freeswan_trees/freeswan-2.00/doc/upgrading.html

version 2.0

# Default policy 
#---------------

config setup
	interfaces=%defaultroute
	klipsdebug=none
	plutodebug=all
	uniqueids=yes
	#nat_traversal=1

conn %default
	authby=secret
	auto=start

# Disable OE
#-----------

conn block
	auto=ignore

conn private
	auto=ignore

conn private-or-clear
	auto=ignore

conn clear-or-private
	auto=ignore

conn clear
	auto=ignore

conn packetdefault
	auto=ignore

conn edelweiss
        auto=start
        type=tunnel
        authby=secret
        pfs=no
        ike=3des-md5-modp1024
        esp=3des-md5
        #aggrmode=no
        compress=no
        ikelifetime=480m
        keylife=60m
        keyexchange=ike
       # dpddelay=30
       ## dpdtimeout=120
       ## dpdaction=hold
        left=91.112.190.238
        leftid=91.112.190.238
        leftnexthop=91.112.190.237
        leftsubnet=192.168.5.0/24
	  right=83.218.162.44
	  rightnexthop=83.218.162.62
        rightsubnet=192.168.6.0/24

+ _________________________ ipsec/secrets
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor

#< /etc/ipsec.secrets 1
83.218.162.44 91.112.190.238 : PSK "[sums to b2cf...]"

+ _________________________ ipsec/listall
+ ipsec auto --listall
000  
000 List of Public Keys:
000  
+ '[' /etc/ipsec.d/policies ']'
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/block
+ base=block
+ _________________________ ipsec/policies/block
+ cat /etc/ipsec.d/policies/block
# This file defines the set of CIDRs (network/mask-length) to which
# communication should never be allowed.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#

+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear
+ base=clear
+ _________________________ ipsec/policies/clear
+ cat /etc/ipsec.d/policies/clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear-or-private
+ base=clear-or-private
+ _________________________ ipsec/policies/clear-or-private
+ cat /etc/ipsec.d/policies/clear-or-private
# This file defines the set of CIDRs (network/mask-length) to which
# we will communicate in the clear, or, if the other side initiates IPSEC,
# using encryption.  This behaviour is also called "Opportunistic
Responder".
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private
+ base=private
+ _________________________ ipsec/policies/private
+ cat /etc/ipsec.d/policies/private
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be private (i.e. encrypted).
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private-or-clear
+ base=private-or-clear
+ _________________________ ipsec/policies/private-or-clear
+ cat /etc/ipsec.d/policies/private-or-clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should be private, if possible, but in the clear otherwise.
#
# If the target has a TXT (later IPSECKEY) record that specifies
# authentication material, we will require private (i.e. encrypted)
# communications.  If no such record is found, communications will be
# in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
#

0.0.0.0/0
+ _________________________ ipsec/ls-libdir
+ ls -l /usr/lib/ipsec
total 232
-rwxr-xr-x  1 root root 15848 Aug  4 22:46 _confread
-rwxr-xr-x  1 root root 15403 Dec 10  2004 _confread.old
-rwxr-xr-x  1 root root 13300 Aug  4 22:46 _copyright
-rwxr-xr-x  1 root root 45260 Dec 10  2004 _copyright.old
-rwxr-xr-x  1 root root  2379 Aug  4 22:46 _include
-rwxr-xr-x  1 root root  2379 Dec 10  2004 _include.old
-rwxr-xr-x  1 root root  1475 Aug  4 22:46 _keycensor
-rwxr-xr-x  1 root root  1475 Dec 10  2004 _keycensor.old
-rwxr-xr-x  1 root root  3648 Aug  4 22:46 _plutoload
-rwxr-xr-x  1 root root  3586 Dec 10  2004 _plutoload.old
-rwxr-xr-x  1 root root  8057 Aug  4 22:46 _plutorun
-rwxr-xr-x  1 root root  7167 Dec 10  2004 _plutorun.old
-rwxr-xr-x  1 root root 12324 Aug  4 22:46 _realsetup
-rwxr-xr-x  1 root root 10493 Dec 10  2004 _realsetup.old
-rwxr-xr-x  1 root root  1975 Aug  4 22:46 _secretcensor
-rwxr-xr-x  1 root root  1975 Dec 10  2004 _secretcensor.old
-rwxr-xr-x  1 root root 11102 Aug  4 22:46 _startklips
-rwxr-xr-x  1 root root  9016 Dec 10  2004 _startklips.old
-rwxr-xr-x  1 root root 13918 Aug  4 22:46 _updown
-rwxr-xr-x  1 root root 12313 Dec 10  2004 _updown.old
-rwxr-xr-x  1 root root 15746 Aug  4 22:46 _updown_x509
-rwxr-xr-x  1 root root  7572 Dec 10  2004 _updown_x509.old
-rwxr-xr-x  1 root root  1942 Dec 10  2004 ipsec_pr.template
+ _________________________ ipsec/ls-execdir
+ ls -l /usr/libexec/ipsec
total 8236
-rwxr-xr-x  1 root root   29259 Aug  4 22:46 _pluto_adns
-rwxr-xr-x  1 root root   67890 Dec 10  2004 _pluto_adns.old
-rwxr-xr-x  1 root root   18891 Aug  4 22:46 auto
-rwxr-xr-x  1 root root   19220 Dec 10  2004 auto.old
-rwxr-xr-x  1 root root   11367 Aug  4 22:46 barf
-rwxr-xr-x  1 root root   10248 Dec 10  2004 barf.old
-rwxr-xr-x  1 root root     816 Aug  4 22:46 calcgoo
-rwxr-xr-x  1 root root     816 Dec 10  2004 calcgoo.old
-rwxr-xr-x  1 root root  188210 Aug  4 22:46 eroute
-rwxr-xr-x  1 root root  308475 Dec 10  2004 eroute.old
-rwxr-xr-x  1 root root   62279 Aug  4 22:46 ikeping
-rwxr-xr-x  1 root root   62279 Aug  4 14:13 ikeping.old
-rwxr-xr-x  1 root root  117295 Aug  4 22:46 klipsdebug
-rwxr-xr-x  1 root root  180615 Dec 10  2004 klipsdebug.old
-rwxr-xr-x  1 root root    1836 Aug  4 22:46 livetest
-rwxr-xr-x  1 root root    1836 Aug  4 14:13 livetest.old
-rwxr-xr-x  1 root root    2604 Aug  4 22:46 look
-rwxr-xr-x  1 root root    2461 Dec 10  2004 look.old
-rwxr-xr-x  1 root root    7088 Aug  4 22:46 mailkey
-rwxr-xr-x  1 root root    7124 Dec 10  2004 mailkey.old
-rwxr-xr-x  1 root root   16015 Aug  4 22:46 manual
-rwxr-xr-x  1 root root   16188 Dec 10  2004 manual.old
-rwxr-xr-x  1 root root    1951 Aug  4 22:46 newhostkey
-rwxr-xr-x  1 root root    1874 Dec 10  2004 newhostkey.old
-rwxr-xr-x  1 root root  107052 Aug  4 22:46 pf_key
-rwxr-xr-x  1 root root  162490 Dec 10  2004 pf_key.old
-rwxr-xr-x  1 root root 1923964 Aug  4 22:46 pluto
-rwxr-xr-x  1 root root 2650315 Dec 10  2004 pluto.old
-rwxr-xr-x  1 root root   19878 Aug  4 22:46 ranbits
-rwxr-xr-x  1 root root   49208 Dec 10  2004 ranbits.old
-rwxr-xr-x  1 root root   47312 Aug  4 22:46 rsasigkey
-rwxr-xr-x  1 root root   79770 Dec 10  2004 rsasigkey.old
-rwxr-xr-x  1 root root     766 Aug  4 22:46 secrets
-rwxr-xr-x  1 root root     766 Dec 10  2004 secrets.old
-rwxr-xr-x  1 root root   17578 Dec 10  2004 send-pr
lrwxrwxrwx  1 root root      22 Aug  4 22:46 setup ->
/etc/rc.d/init.d/ipsec
-rwxr-xr-x  1 root root    1054 Aug  4 22:46 showdefaults
-rwxr-xr-x  1 root root    1048 Dec 10  2004 showdefaults.old
-rwxr-xr-x  1 root root    4845 Aug  4 22:46 showhostkey
-rwxr-xr-x  1 root root    4364 Dec 10  2004 showhostkey.old
-rwxr-xr-x  1 root root  307361 Aug  4 22:46 spi
-rwxr-xr-x  1 root root  492713 Dec 10  2004 spi.old
-rwxr-xr-x  1 root root  156751 Aug  4 22:46 spigrp
-rwxr-xr-x  1 root root  248367 Dec 10  2004 spigrp.old
-rwxr-xr-x  1 root root  469546 Dec 10  2004 starter
-rwxr-xr-x  1 root root   21928 Aug  4 22:46 tncfg
-rwxr-xr-x  1 root root   47750 Dec 10  2004 tncfg.old
-rwxr-xr-x  1 root root   13524 Aug  4 22:46 verify
-rwxr-xr-x  1 root root   10195 Dec 10  2004 verify.old
-rwxr-xr-x  1 root root  150398 Aug  4 22:46 whack
-rwxr-xr-x  1 root root  224507 Dec 10  2004 whack.old
+ _________________________ ipsec/updowns
++ ls /usr/libexec/ipsec
++ egrep updown
+ _________________________ /proc/net/dev
+ cat /proc/net/dev
Inter-|   Receive                                                | 
Transmit
 face |bytes    packets errs drop fifo frame compressed multicast|bytes   
packets errs drop fifo colls carrier compressed
    lo:171686070   64878    0    0    0     0          0         0
171686070   64878    0    0    0     0       0          0
  eth0:83143222  199557    0    0    0     0          0         0  9559644 
 65153    0    0    0     0       0          0
  eth1:2307220105 2817074    0    0    0     0          0         0
2753072503 2624599    0    0    0     0       0          0
  eth2:2958963027 2891014    0    0    0     0          0         0
2798735730 3040355    0    0    0     0       0          0
  tun0: 4816703   68900    0    0    0     0          0         0 10134022 
 81768    0    0    0     0       0          0
  sit0:       0       0    0    0    0     0          0         0        0 
     0    0    0    0     0       0          0
+ _________________________ /proc/net/route
+ cat /proc/net/route
Iface	Destination	Gateway 	Flags	RefCnt	Use	Metric	Mask		MTU	Window	IRTT   
                                                   
tun0	0202A8C0	00000000	0005	0	0	0	FFFFFFFF	0	0	0                           
                                                   
eth0	00A2DA53	00000000	0001	0	0	0	C0FFFFFF	0	0	0                           
                                                   
eth1	0006A8C0	00000000	0001	0	0	0	00FFFFFF	0	0	0                           
                                                   
eth0	0005A8C0	3EA2DA53	0003	0	0	0	00FFFFFF	0	0	0                           
                                                   
tun0	0002A8C0	0202A8C0	0003	0	0	0	00FFFFFF	0	0	0                           
                                                   
eth2	000AA8C0	00000000	0001	0	0	0	00FFFFFF	0	0	0                           
                                                   
eth0	00000000	3EA2DA53	0003	0	0	0	00000000	0	0	0                           
                                                   
+ _________________________ /proc/sys/net/ipv4/ip_forward
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________ /proc/sys/net/ipv4/tcp_ecn
+ cat /proc/sys/net/ipv4/tcp_ecn
0
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter eth1/rp_filter
eth2/rp_filter lo/rp_filter tun0/rp_filter
all/rp_filter:0
default/rp_filter:1
eth0/rp_filter:1
eth1/rp_filter:1
eth2/rp_filter:1
lo/rp_filter:0
tun0/rp_filter:1
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter eth1/rp_filter
eth2/rp_filter lo/rp_filter tun0/rp_filter
all/rp_filter:0
default/rp_filter:1
eth0/rp_filter:1
eth1/rp_filter:1
eth2/rp_filter:1
lo/rp_filter:0
tun0/rp_filter:1
+ _________________________ /proc/sys/net/ipv4/conf/star-star-redirects
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/accept_redirects all/secure_redirects all/send_redirects
default/accept_redirects default/secure_redirects default/send_redirects
eth0/accept_redirects eth0/secure_redirects eth0/send_redirects
eth1/accept_redirects eth1/secure_redirects eth1/send_redirects
eth2/accept_redirects eth2/secure_redirects eth2/send_redirects
lo/accept_redirects lo/secure_redirects lo/send_redirects
tun0/accept_redirects tun0/secure_redirects tun0/send_redirects
all/accept_redirects:0
all/secure_redirects:1
all/send_redirects:0
default/accept_redirects:1
default/secure_redirects:1
default/send_redirects:1
eth0/accept_redirects:1
eth0/secure_redirects:1
eth0/send_redirects:1
eth1/accept_redirects:1
eth1/secure_redirects:1
eth1/send_redirects:1
eth2/accept_redirects:1
eth2/secure_redirects:1
eth2/send_redirects:1
lo/accept_redirects:1
lo/secure_redirects:1
lo/send_redirects:1
tun0/accept_redirects:1
tun0/secure_redirects:1
tun0/send_redirects:1
+ _________________________ /proc/sys/net/ipv4/tcp_window_scaling
+ cat /proc/sys/net/ipv4/tcp_window_scaling
1
+ _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale
+ cat /proc/sys/net/ipv4/tcp_adv_win_scale
2
+ _________________________ uname-a
+ uname -a
Linux mail.edelweiss-gurgl.com 2.6.18-53.1.13.2.ccPAE #1 SMP Wed Feb 27
18:52:16 EST 2008 i686 i686 i386 GNU/Linux
+ _________________________ config-built-with
+ test -r /proc/config_built_with
+ _________________________ distro-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/redhat-release
+ cat /etc/redhat-release
CentOS release 4.4 (Final)
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/debian-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/SuSE-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/mandrake-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/mandriva-release
+ for distro in /etc/redhat-release /etc/debian-release /etc/SuSE-release
/etc/mandrake-release /etc/mandriva-release /etc/gentoo-release
+ test -f /etc/gentoo-release
+ _________________________ /proc/net/ipsec_version
+ test -r /proc/net/ipsec_version
+ test -r /proc/net/pfkey
++ uname -r
+ echo 'NETKEY (2.6.18-53.1.13.2.ccPAE) support detected '
NETKEY (2.6.18-53.1.13.2.ccPAE) support detected 
+ _________________________ ipfwadm
+ test -r /sbin/ipfwadm
+ 'no old-style linux 1.x/2.0 ipfwadm firewall support'
/usr/libexec/ipsec/barf: line 305: no old-style linux 1.x/2.0 ipfwadm
firewall support: Datei oder Verzeichnis nicht gefunden
+ _________________________ ipchains
+ test -r /sbin/ipchains
+ echo 'no old-style linux 2.0 ipchains firewall support'
no old-style linux 2.0 ipchains firewall support
+ _________________________ iptables
+ test -r /sbin/iptables
+ iptables -L -v -n
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state INVALID 
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:0x12/0x12 state NEW reject-with tcp-reset 
 1408  171K DROP       tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:!0x17/0x02 state NEW 
    0     0 DROP       all  --  eth0   *       127.0.0.0/8         
0.0.0.0/0           
    0     0 DROP       all  --  eth0   *       169.254.0.0/16      
0.0.0.0/0           
11821 3033K ACCEPT     all  --  lo     *       0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     all  --  pptp+  *       0.0.0.0/0           
0.0.0.0/0           
 1957  187K ACCEPT     all  --  tun+   *       0.0.0.0/0           
0.0.0.0/0           
17350 4040K ACCEPT     all  --  eth1   *       0.0.0.0/0           
0.0.0.0/0           
12412 3784K ACCEPT     all  --  eth2   *       0.0.0.0/0           
0.0.0.0/0           
  559 16211 ACCEPT     icmp --  eth0   *       0.0.0.0/0           
0.0.0.0/0           icmp type 0 
   51  4446 ACCEPT     icmp --  eth0   *       0.0.0.0/0           
0.0.0.0/0           icmp type 3 
   16   976 ACCEPT     icmp --  eth0   *       0.0.0.0/0           
0.0.0.0/0           icmp type 8 
   69  4320 ACCEPT     icmp --  eth0   *       0.0.0.0/0           
0.0.0.0/0           icmp type 11 
 1149  377K ACCEPT     udp  --  eth0   *       0.0.0.0/0           
0.0.0.0/0           udp spt:67 dpt:68 
    0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0           
0.0.0.0/0           tcp spt:67 dpt:68 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:20 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:21 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:443 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:444 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
83.218.162.44       udp dpt:4500 
  255 19380 ACCEPT     udp  --  *      *       0.0.0.0/0           
83.218.162.44       udp dpt:123 
11958 1612K ACCEPT     udp  --  *      *       0.0.0.0/0           
83.218.162.44       udp dpt:1194 
 1014  286K ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:25 
 1872  170K ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:22 
    3   144 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:5900 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:5800 
   21  2434 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:81 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:1875 
  256 39992 ACCEPT     udp  --  *      *       0.0.0.0/0           
83.218.162.44       udp spt:500 dpt:500 
 4058 1177K ACCEPT     esp  --  *      *       0.0.0.0/0           
83.218.162.44       
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
83.218.162.44       
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
83.218.162.44       MARK match 0x64 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
192.168.6.1         MARK match 0x64 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
192.168.10.1        MARK match 0x64 
 1188  189K ACCEPT     udp  --  eth0   *       0.0.0.0/0           
83.218.162.44       udp dpts:1024:65535 state RELATED,ESTABLISHED 
  285  122K ACCEPT     tcp  --  eth0   *       0.0.0.0/0           
83.218.162.44       tcp dpts:1024:65535 state RELATED,ESTABLISHED 
  113 19489 DROP       all  --  eth0   *       0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     esp  --  eth0   *       0.0.0.0/0           
0.0.0.0/0           

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
 3806  951K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           MARK match 0x64 
    0     0 ACCEPT     tcp  --  *      eth1    0.0.0.0/0           
192.168.10.10       tcp dpt:17344 
    0     0 ACCEPT     tcp  --  *      eth2    0.0.0.0/0           
192.168.10.10       tcp dpt:17344 
    0     0 ACCEPT     tcp  --  *      eth1    0.0.0.0/0           
192.168.10.62       tcp dpt:80 
   20  2303 ACCEPT     tcp  --  *      eth2    0.0.0.0/0           
192.168.10.62       tcp dpt:80 
3987K 4021M ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED 
 3977  475K ACCEPT     all  --  eth1   *       0.0.0.0/0           
0.0.0.0/0           
 2096  262K ACCEPT     all  --  eth2   *       0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     all  --  pptp+  *       0.0.0.0/0           
0.0.0.0/0           
   26  1878 ACCEPT     all  --  tun+   *       0.0.0.0/0           
0.0.0.0/0           
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
13229 3204K ACCEPT     all  --  *      lo      0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     all  --  *      pptp+   0.0.0.0/0           
0.0.0.0/0           
 2280  227K ACCEPT     all  --  *      tun+    0.0.0.0/0           
0.0.0.0/0           
  207 39741 ACCEPT     all  --  *      eth1    0.0.0.0/0           
0.0.0.0/0           
11949   16M ACCEPT     all  --  *      eth2    0.0.0.0/0           
0.0.0.0/0           
  636 24007 ACCEPT     icmp --  *      eth0    0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     udp  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           udp spt:68 dpt:67 
    0     0 ACCEPT     tcp  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           tcp spt:68 dpt:67 
    0     0 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:20 
    0     0 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:21 
    0     0 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:443 
    0     0 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:444 
    0     0 ACCEPT     udp  --  *      eth0    83.218.162.44       
0.0.0.0/0           udp spt:4500 
  255 19380 ACCEPT     udp  --  *      eth0    83.218.162.44       
0.0.0.0/0           udp spt:123 
14863 3335K ACCEPT     udp  --  *      eth0    83.218.162.44       
0.0.0.0/0           udp spt:1194 
  892 70964 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:25 
 2155  205K ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:22 
    3   120 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:5900 
    0     0 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:5800 
   23 29297 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:81 
    0     0 ACCEPT     tcp  --  *      eth0    83.218.162.44       
0.0.0.0/0           tcp spt:1875 
  153 22812 ACCEPT     udp  --  *      eth0    83.218.162.44       
0.0.0.0/0           udp spt:500 dpt:500 
 3221  894K ACCEPT     esp  --  *      eth0    83.218.162.44       
0.0.0.0/0           
    0     0 ACCEPT     ah   --  *      eth0    83.218.162.44       
0.0.0.0/0           
 1557  119K ACCEPT     all  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           
    0     0 DROP       all  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     esp  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           

Chain drop-lan (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           
+ _________________________ iptables-nat
+ iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 34324 packets, 5493K bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:17344 to:192.168.10.10:17344 
    3   180 DNAT       tcp  --  *      *       0.0.0.0/0           
83.218.162.44       tcp dpt:45850 to:192.168.10.62:80 

Chain POSTROUTING (policy ACCEPT 8449 packets, 1046K bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     esp  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0           
    0     0 ACCEPT     all  --  *      tun+    0.0.0.0/0           
0.0.0.0/0           
    0     0 SNAT       tcp  --  *      *       192.168.6.0/24      
192.168.10.10       tcp dpt:17344 to:192.168.6.1 
    0     0 SNAT       tcp  --  *      *       192.168.10.0/24     
192.168.10.10       tcp dpt:17344 to:192.168.10.1 
    0     0 SNAT       tcp  --  *      *       192.168.6.0/24      
192.168.10.62       tcp dpt:45850 to:192.168.6.1 
    0     0 SNAT       tcp  --  *      *       192.168.10.0/24     
192.168.10.62       tcp dpt:45850 to:192.168.10.1 
 3555  257K MASQUERADE  all  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           
    0     0 MASQUERADE  all  --  *      eth0    0.0.0.0/0           
0.0.0.0/0           

Chain OUTPUT (policy ACCEPT 3976 packets, 239K bytes)
 pkts bytes target     prot opt in     out     source              
destination         
+ _________________________ iptables-mangle
+ iptables -t mangle -L -v -n
Chain PREROUTING (policy ACCEPT 6355K packets, 5751M bytes)
 pkts bytes target     prot opt in     out     source              
destination         
 4058 1177K MARK       esp  --  *      *       0.0.0.0/0           
0.0.0.0/0           MARK set 0x64 
 3066  614K ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           MARK match !0x0 
4005K 4024M CONNMARK   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           CONNMARK restore 

Chain INPUT (policy ACCEPT 339K packets, 250M bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain FORWARD (policy ACCEPT 6035K packets, 5503M bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain OUTPUT (policy ACCEPT 340K packets, 346M bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain POSTROUTING (policy ACCEPT 6375K packets, 5850M bytes)
 pkts bytes target     prot opt in     out     source              
destination         
+ _________________________ /proc/modules
+ test -f /proc/modules
+ cat /proc/modules
xfrm4_tunnel 6656 0 - Live 0xf8e27000
af_key 41488 0 - Live 0xf8ec3000
iptable_raw 6144 0 - Live 0xf8e2a000
xfrm4_mode_tunnel 6912 2 - Live 0xf8e8d000
ipv6 256448 34 - Live 0xf8f02000
deflate 8064 0 - Live 0xf8e83000
zlib_deflate 22808 1 deflate, Live 0xf8e9b000
twofish 41472 0 - Live 0xf8eaa000
serpent 22272 0 - Live 0xf8e94000
blowfish 12800 0 - Live 0xf8e88000
crypto_null 6656 0 - Live 0xf8e80000
tunnel4 7428 1 xfrm4_tunnel, Live 0xf8e57000
ipcomp 11912 0 - Live 0xf8e79000
esp4 11776 2 - Live 0xf8e75000
ah4 10496 0 - Live 0xf8e71000
aes 32832 0 - Live 0xf8e67000
des 19712 2 - Live 0xf8e43000
md5 8192 2 - Live 0xf8e3a000
sha256 13440 0 - Live 0xf8e4e000
tun 14976 1 - Live 0xf8e49000
xt_CONNMARK 6528 1 - Live 0xf8e40000
xt_mark 6016 5 - Live 0xf8e3d000
xt_tcpudp 7424 46 - Live 0xf8e34000
xt_state 6272 6 - Live 0xf8e37000
sch_htb 20480 3 - Live 0xf8e2e000
xt_MARK 6528 1 - Live 0xf8e24000
ip_nat_pptp 10116 0 - Live 0xf8e20000
ipt_ipp2p 11008 0 - Live 0xf8df9000
ip_nat_mms 6784 0 - Live 0xf8e18000
ip_conntrack_mms 75440 1 ip_nat_mms, Live 0xf8e04000
ip_nat_irc 6784 0 - Live 0xf8e01000
ip_nat_ftp 7424 0 - Live 0xf8ded000
ipt_MASQUERADE 8448 2 - Live 0xf8dfd000
ip_conntrack_pptp 15760 1 ip_nat_pptp, Live 0xf8dd9000
arc4 6144 0 - Live 0xf8dea000
ppp_mppe 10500 0 - Live 0xf8de6000
ppp_generic 30740 1 ppp_mppe, Live 0xf8df0000
slhc 10624 1 ppp_generic, Live 0xf8de2000
ip_conntrack_irc 10864 1 ip_nat_irc, Live 0xf8dde000
ip_conntrack_ftp 12016 1 ip_nat_ftp, Live 0xf8db1000
ipt_REJECT 9600 1 - Live 0xf8db5000
ipt_LOG 10112 0 - Live 0xf8dd5000
iptable_nat 11652 1 - Live 0xf8dd1000
ip_nat 21932 6
ip_nat_pptp,ip_nat_mms,ip_nat_irc,ip_nat_ftp,ipt_MASQUERADE,iptable_nat,
Live 0xf8db9000
ip_conntrack 53984 13
xt_CONNMARK,xt_state,ip_nat_pptp,ip_nat_mms,ip_conntrack_mms,ip_nat_irc,ip_nat_ftp,ipt_MASQUERADE,ip_conntrack_pptp,ip_conntrack_irc,ip_conntrack_ftp,iptable_nat,ip_nat,
Live 0xf8b8f000
nfnetlink 10904 2 ip_nat,ip_conntrack, Live 0xf8b5c000
iptable_mangle 6912 1 - Live 0xf8b8c000
iptable_filter 7040 1 - Live 0xf8b60000
ip_tables 17492 4 iptable_raw,iptable_nat,iptable_mangle,iptable_filter,
Live 0xf8b71000
x_tables 17668 11
xt_CONNMARK,xt_mark,xt_tcpudp,xt_state,xt_MARK,ipt_ipp2p,ipt_MASQUERADE,ipt_REJECT,ipt_LOG,iptable_nat,ip_tables,
Live 0xf8b6b000
dm_mod 61976 0 - Live 0xf8b9f000
video 20484 0 - Live 0xf8b64000
sbs 18980 0 - Live 0xf8af0000
i2c_ec 9216 1 sbs, Live 0xf8b11000
button 10896 0 - Live 0xf8afb000
battery 13828 0 - Live 0xf8af6000
asus_acpi 19480 0 - Live 0xf8841000
ac 9348 0 - Live 0xf887b000
usb_storage 80480 1 - Live 0xf8b77000
uhci_hcd 26380 0 - Live 0xf8a78000
ehci_hcd 34444 0 - Live 0xf8b52000
i2c_i801 11532 0 - Live 0xf883d000
i2c_core 24064 2 i2c_ec,i2c_i801, Live 0xf8a71000
skge 39952 0 - Live 0xf8a66000
r8169 32520 0 - Live 0xf881c000
tg3 107012 0 - Live 0xf8b36000
ext3 126216 2 - Live 0xf8b16000
jbd 58152 1 ext3, Live 0xf8a56000
ata_piix 18820 0 - Live 0xf882d000
libata 119352 1 ata_piix, Live 0xf8ad1000
aacraid 62212 3 - Live 0xf886a000
sd_mod 25600 6 - Live 0xf8825000
scsi_mod 136460 4 usb_storage,libata,aacraid,sd_mod, Live 0xf8847000
+ _________________________ /proc/meminfo
+ cat /proc/meminfo
MemTotal:      4147604 kB
MemFree:        185024 kB
Buffers:        173368 kB
Cached:        2861608 kB
SwapCached:          0 kB
Active:         661504 kB
Inactive:      2728228 kB
HighTotal:     3276160 kB
HighFree:        51640 kB
LowTotal:       871444 kB
LowFree:        133384 kB
SwapTotal:     4192956 kB
SwapFree:      4192956 kB
Dirty:             268 kB
Writeback:           0 kB
AnonPages:      348208 kB
Mapped:          21572 kB
Slab:           560404 kB
PageTables:       2812 kB
NFS_Unstable:        0 kB
Bounce:              0 kB
CommitLimit:   6266756 kB
Committed_AS:   680584 kB
VmallocTotal:   116728 kB
VmallocUsed:      7020 kB
VmallocChunk:   109296 kB
HugePages_Total:     0
HugePages_Free:      0
HugePages_Rsvd:      0
Hugepagesize:     2048 kB
+ _________________________ /proc/net/ipsec-ls
+ test -f /proc/net/ipsec_version
+ _________________________ usr/src/linux/.config
+ test -f /proc/config.gz
++ uname -r
+ test -f /lib/modules/2.6.18-53.1.13.2.ccPAE/build/.config
++ uname -r
+ egrep
'CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_HW_RANDOM|CONFIG_CRYPTO_DEV|_XFRM'
+ cat /lib/modules/2.6.18-53.1.13.2.ccPAE/build/.config
CONFIG_XFRM=y
CONFIG_XFRM_USER=y
CONFIG_NET_KEY=m
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
# CONFIG_IP_FIB_TRIE is not set
CONFIG_IP_FIB_HASH=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_FWMARK=y
CONFIG_IP_ROUTE_MULTIPATH=y
# CONFIG_IP_ROUTE_MULTIPATH_CACHED is not set
CONFIG_IP_ROUTE_VERBOSE=y
# CONFIG_IP_PNP is not set
CONFIG_IP_MROUTE=y
CONFIG_IP_PIMSM_V1=y
CONFIG_IP_PIMSM_V2=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=m
CONFIG_INET_IPCOMP=m
CONFIG_INET_XFRM_TUNNEL=m
CONFIG_INET_TUNNEL=m
CONFIG_INET_XFRM_MODE_TRANSPORT=m
CONFIG_INET_XFRM_MODE_TUNNEL=m
CONFIG_INET_DIAG=m
CONFIG_INET_TCP_DIAG=m
CONFIG_IP_VS=m
# CONFIG_IP_VS_DEBUG is not set
CONFIG_IP_VS_TAB_BITS=12
CONFIG_IP_VS_PROTO_TCP=y
CONFIG_IP_VS_PROTO_UDP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=m
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=m
CONFIG_IP_VS_LBLCR=m
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=m
CONFIG_IP_VS_SED=m
CONFIG_IP_VS_NQ=m
CONFIG_IP_VS_FTP=m
CONFIG_IPV6=m
CONFIG_IPV6_PRIVACY=y
CONFIG_IPV6_ROUTER_PREF=y
CONFIG_IPV6_ROUTE_INFO=y
CONFIG_INET6_AH=m
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=m
CONFIG_INET6_XFRM_TUNNEL=m
CONFIG_INET6_TUNNEL=m
CONFIG_INET6_XFRM_MODE_TRANSPORT=m
CONFIG_INET6_XFRM_MODE_TUNNEL=m
CONFIG_IPV6_TUNNEL=m
# CONFIG_IPV6_SUBTREES is not set
CONFIG_IPV6_MULTIPLE_TABLES=y
CONFIG_IPV6_ROUTE_FWMARK=y
CONFIG_IP_NF_CONNTRACK=m
CONFIG_IP_NF_CT_ACCT=y
CONFIG_IP_NF_CONNTRACK_MARK=y
CONFIG_IP_NF_CONNTRACK_SECMARK=y
CONFIG_IP_NF_CONNTRACK_EVENTS=y
CONFIG_IP_NF_CONNTRACK_NETLINK=m
CONFIG_IP_NF_CT_PROTO_SCTP=m
CONFIG_IP_NF_FTP=m
CONFIG_IP_NF_IRC=m
CONFIG_IP_NF_NETBIOS_NS=m
CONFIG_IP_NF_TFTP=m
CONFIG_IP_NF_AMANDA=m
CONFIG_IP_NF_PPTP=m
CONFIG_IP_NF_H323=m
CONFIG_IP_NF_SIP=m
CONFIG_IP_NF_QUEUE=m
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_IPRANGE=m
CONFIG_IP_NF_MATCH_TOS=m
CONFIG_IP_NF_MATCH_RECENT=m
CONFIG_IP_NF_MATCH_ECN=m
CONFIG_IP_NF_MATCH_DSCP=m
CONFIG_IP_NF_MATCH_AH=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_MATCH_OWNER=m
CONFIG_IP_NF_MATCH_ADDRTYPE=m
CONFIG_IP_NF_MATCH_HASHLIMIT=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_ULOG=m
CONFIG_IP_NF_TARGET_TCPMSS=m
CONFIG_IP_NF_NAT=m
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_REDIRECT=m
CONFIG_IP_NF_TARGET_NETMAP=m
CONFIG_IP_NF_TARGET_SAME=m
CONFIG_IP_NF_NAT_SNMP_BASIC=m
CONFIG_IP_NF_NAT_IRC=m
CONFIG_IP_NF_NAT_FTP=m
CONFIG_IP_NF_NAT_TFTP=m
CONFIG_IP_NF_NAT_AMANDA=m
CONFIG_IP_NF_NAT_PPTP=m
CONFIG_IP_NF_NAT_H323=m
CONFIG_IP_NF_NAT_SIP=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_TOS=m
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_DSCP=m
CONFIG_IP_NF_TARGET_TTL=m
CONFIG_IP_NF_TARGET_CLUSTERIP=m
CONFIG_IP_NF_RAW=m
CONFIG_IP_NF_ARPTABLES=m
CONFIG_IP_NF_ARPFILTER=m
CONFIG_IP_NF_ARP_MANGLE=m
CONFIG_IP_NF_MATCH_IPP2P=m
CONFIG_IP_NF_NAT_MMS=m
CONFIG_IP_NF_MMS=m
CONFIG_IP6_NF_QUEUE=m
CONFIG_IP6_NF_IPTABLES=m
CONFIG_IP6_NF_MATCH_RT=m
CONFIG_IP6_NF_MATCH_OPTS=m
CONFIG_IP6_NF_MATCH_FRAG=m
CONFIG_IP6_NF_MATCH_HL=m
CONFIG_IP6_NF_MATCH_OWNER=m
CONFIG_IP6_NF_MATCH_IPV6HEADER=m
CONFIG_IP6_NF_MATCH_AH=m
CONFIG_IP6_NF_MATCH_EUI64=m
CONFIG_IP6_NF_FILTER=m
CONFIG_IP6_NF_TARGET_LOG=m
CONFIG_IP6_NF_TARGET_REJECT=m
CONFIG_IP6_NF_MANGLE=m
CONFIG_IP6_NF_TARGET_HL=m
CONFIG_IP6_NF_RAW=m
CONFIG_IP_DCCP=m
CONFIG_INET_DCCP_DIAG=m
CONFIG_IP_DCCP_ACKVEC=y
CONFIG_IP_DCCP_CCID2=m
CONFIG_IP_DCCP_CCID3=m
CONFIG_IP_DCCP_TFRC_LIB=m
# CONFIG_IP_DCCP_DEBUG is not set
CONFIG_IP_SCTP=m
CONFIG_IPX=m
# CONFIG_IPX_INTERN is not set
CONFIG_IPW2100=m
CONFIG_IPW2100_MONITOR=y
# CONFIG_IPW2100_DEBUG is not set
CONFIG_IPW2200=m
CONFIG_IPW2200_MONITOR=y
CONFIG_IPW2200_RADIOTAP=y
CONFIG_IPW2200_PROMISCUOUS=y
CONFIG_IPW2200_QOS=y
# CONFIG_IPW2200_DEBUG is not set
CONFIG_IPPP_FILTER=y
CONFIG_IPMI_HANDLER=m
# CONFIG_IPMI_PANIC_EVENT is not set
CONFIG_IPMI_DEVICE_INTERFACE=m
CONFIG_IPMI_SI=m
CONFIG_IPMI_WATCHDOG=m
CONFIG_IPMI_POWEROFF=m
CONFIG_HW_RANDOM=y
CONFIG_HW_RANDOM_INTEL=m
CONFIG_HW_RANDOM_AMD=m
CONFIG_HW_RANDOM_GEODE=m
CONFIG_HW_RANDOM_VIA=m
CONFIG_SECURITY_NETWORK_XFRM=y
CONFIG_CRYPTO_DEV_PADLOCK=m
CONFIG_CRYPTO_DEV_PADLOCK_AES=y
+ _________________________ etc/syslog.conf
+ cat /etc/syslog.conf
# Log all kernel messages to the console.
# Logging much else clutters up the screen.
#kern.*							/dev/console

# Suva logging:
local0.*						/var/log/suva

# Log anything (except mail) of level info or higher.
# Don't log private authentication messages!
*.info;mail.none;authpriv.none;local0.none;cron.none;local6.none
/var/log/messages

# The authpriv file has restricted access.
authpriv.*						/var/log/secure

# Log all the mail messages in one place.
mail.*							-/var/log/maillog


# Log cron stuff
cron.*							/var/log/cron

# Everybody gets emergency messages
*.emerg							*

# Save news errors of level crit and higher in a special file.
uucp,news.crit						/var/log/spooler

# Save boot messages also to boot.log
local7.*						/var/log/boot.log
local6.*                        /var/log/system
+ _________________________ etc/syslog-ng/syslog-ng.conf
+ cat /etc/syslog-ng/syslog-ng.conf
cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory
+ _________________________ etc/resolv.conf
+ cat /etc/resolv.conf
nameserver 127.0.0.1
nameserver 83.218.160.1
nameserver 83.218.160.2
+ _________________________ lib/modules-ls
+ ls -ltr /lib/modules
total 2
drwxr-xr-x  6 root root 1024 Aug  4 09:41 2.6.18-53.1.13.2.cc
drwxr-xr-x  6 root root 1024 Aug  4 13:48 2.6.18-53.1.13.2.ccPAE
+ _________________________ /proc/ksyms-netif_rx
+ test -r /proc/ksyms
+ test -r /proc/kallsyms
+ egrep netif_rx /proc/kallsyms
c05bd6fc T __netif_rx_schedule
c05bdde7 T netif_rx
c05bdf1a T netif_rx_ni
c05bdde7 U netif_rx	[ipv6]
c05bdf1a U netif_rx_ni	[tun]
c05bdde7 U netif_rx	[ppp_generic]
c05bd6fc U __netif_rx_schedule	[skge]
c05bd6fc U __netif_rx_schedule	[r8169]
c05bd6fc U __netif_rx_schedule	[tg3]
+ _________________________ lib/modules-netif_rx
+ modulegoo kernel/net/ipv4/ipip.o netif_rx
+ set +x
2.6.18-53.1.13.2.cc: 
2.6.18-53.1.13.2.ccPAE: 
+ _________________________ kern.debug
+ test -f /var/log/kern.debug
+ _________________________ klog
+ sed -n '6832,$p' /var/log/messages
+ egrep -i 'ipsec|klips|pluto'
+ case "$1" in
+ cat
Aug  5 07:35:49 mail ipsec_setup: Starting Openswan IPsec 2.4.13...
Aug  5 07:35:49 mail ipsec__plutorun: 104 "edelweiss" #1: STATE_MAIN_I1:
initiate
+ _________________________ plog
+ sed -n '8278,$p' /var/log/secure
+ egrep -i pluto
+ case "$1" in
+ cat
Aug  5 07:35:49 mail ipsec__plutorun: Starting Pluto subsystem...
Aug  5 07:35:49 mail ipsec__plutorun: Unknown default RSA hostkey scheme,
not generating a default hostkey
Aug  5 07:35:49 mail pluto[27360]: Starting Pluto (Openswan Version 2.4.13
PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE`fijAufQMD)
Aug  5 07:35:49 mail pluto[27360]: Setting NAT-Traversal port-4500 floating
to off
Aug  5 07:35:49 mail pluto[27360]:    port floating activation criteria
nat_t=0/port_fload=1
Aug  5 07:35:49 mail pluto[27360]:   including NAT-Traversal patch (Version
0.6c) [disabled]
Aug  5 07:35:49 mail pluto[27360]: | opening /dev/urandom
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_REINIT_SECRET,
timeout in 3600 seconds
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:35:49 mail pluto[27360]: ike_alg_register_enc(): Activating
OAKLEY_AES_CBC: Ok (ret=0)
Aug  5 07:35:49 mail pluto[27360]: starting up 1 cryptographic helpers
Aug  5 07:35:49 mail pluto[27376]: | opening /dev/urandom
Aug  5 07:35:49 mail pluto[27360]: started helper pid=27376 (fd:6)
Aug  5 07:35:49 mail pluto[27360]: | process 27360 listening for PF_KEY_V2
on file descriptor 7
Aug  5 07:35:49 mail pluto[27360]: Using NETKEY IPsec interface code on
2.6.18-53.1.13.2.ccPAE
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build: 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_entry &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050 *pfkey_ext=0p(nil).

Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_exit &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050
*pfkey_ext=0p0x95663e8. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
pfkey_msg=0p0x9566400 allocated 16 bytes, &(extensions[0])=0p0xbfb87050 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
extensions permitted=00000001, seen=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
parsing message ver=2, type=7(register), errno=0, satype=2(AH), len=2,
res=0, seq=1, pid=27360. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
remain=0 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, seen=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | finish_pfkey_msg: SADB_REGISTER
message 1 for AH 
Aug  5 07:35:49 mail pluto[27360]: |   02 07 00 02  02 00 00 00  01 00 00
00  e0 6a 00 00
Aug  5 07:35:49 mail pluto[27376]: ! helper 0 waiting on fd: 7
Aug  5 07:35:49 mail pluto[27360]: | pfkey_get: SADB_REGISTER message 1
Aug  5 07:35:49 mail pluto[27360]: | AH registered with kernel.
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build: 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_entry &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050 *pfkey_ext=0p(nil).

Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_exit &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050
*pfkey_ext=0p0x95663e8. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
pfkey_msg=0p0x9566400 allocated 16 bytes, &(extensions[0])=0p0xbfb87050 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
extensions permitted=00000001, seen=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
parsing message ver=2, type=7(register), errno=0, satype=3(ESP), len=2,
res=0, seq=2, pid=27360. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
remain=0 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, seen=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | finish_pfkey_msg: SADB_REGISTER
message 2 for ESP 
Aug  5 07:35:49 mail pluto[27360]: |   02 07 00 03  02 00 00 00  02 00 00
00  e0 6a 00 00
Aug  5 07:35:49 mail pluto[27360]: | pfkey_get: SADB_REGISTER message 2
Aug  5 07:35:49 mail pluto[27360]: | alg_init():memset(0x80eff00, 0, 2016)
memset(0x80f06e0, 0, 2048) 
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: sadb_msg_len=15 sadb_supported_len=40
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=251
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0,
alg_minbits=0, alg_maxbits=0, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=2
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0,
alg_minbits=128, alg_maxbits=128, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=3
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0,
alg_minbits=160, alg_maxbits=160, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=14,
alg_id=5
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0,
alg_minbits=256, alg_maxbits=256, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: sadb_msg_len=15 sadb_supported_len=64
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=11
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[4], exttype=15, satype=3, alg_id=11, alg_ivlen=0,
alg_minbits=0, alg_maxbits=0, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=2
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[5], exttype=15, satype=3, alg_id=2, alg_ivlen=8,
alg_minbits=64, alg_maxbits=64, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=3
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=3, alg_ivlen=8,
alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=7
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=7, alg_ivlen=8,
alg_minbits=40, alg_maxbits=448, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=12
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=12, alg_ivlen=8,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=252
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=252, alg_ivlen=8,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_add():satype=3, exttype=15,
alg_id=253
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=253, alg_ivlen=8,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Aug  5 07:35:49 mail pluto[27360]: | ESP registered with kernel.
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build: 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_entry &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050 *pfkey_ext=0p(nil).

Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_hdr_build:
on_exit &pfkey_ext=0p0xbfb86030 pfkey_ext=0p0xbfb87050
*pfkey_ext=0p0x95663e8. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
pfkey_msg=0p0x9566400 allocated 16 bytes, &(extensions[0])=0p0xbfb87050 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_build:
extensions permitted=00000001, seen=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
parsing message ver=2, type=7(register), errno=0, satype=9(IPIP), len=2,
res=0, seq=3, pid=27360. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
remain=0 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | pfkey_lib_debug:pfkey_msg_parse:
extensions permitted=00000001, seen=00000001, required=00000001. 
Aug  5 07:35:49 mail pluto[27360]: | finish_pfkey_msg: SADB_REGISTER
message 3 for IPCOMP 
Aug  5 07:35:49 mail pluto[27360]: |   02 07 00 09  02 00 00 00  03 00 00
00  e0 6a 00 00
Aug  5 07:35:49 mail pluto[27360]: | pfkey_get: SADB_REGISTER message 3
Aug  5 07:35:49 mail pluto[27360]: | IPCOMP registered with kernel.
Aug  5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/cacerts'
Aug  5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/aacerts'
Aug  5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/ocspcerts'
Aug  5 07:35:49 mail pluto[27360]: Changing to directory
'/etc/ipsec.d/crls'
Aug  5 07:35:49 mail pluto[27360]:   Warning: empty directory
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_LOG_DAILY,
timeout in 59051 seconds
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:35:49 mail pluto[27360]: |  
Aug  5 07:35:49 mail pluto[27360]: | *received whack message
Aug  5 07:35:49 mail pluto[27360]: loading secrets from
"/etc/ipsec.secrets"
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:35:49 mail pluto[27360]: |  
Aug  5 07:35:49 mail pluto[27360]: | *received whack message
Aug  5 07:35:49 mail pluto[27360]: | alg_info_parse_str() ealg_buf=3des
aalg_buf=md5eklen=0  aklen=0
Aug  5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0be4, "OAKLEY_3DES")
Aug  5 07:35:49 mail pluto[27360]: | enum_search_ppfixi () calling
enum_search(0x80d0be4, "OAKLEY_3DES_CBC")
Aug  5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
ealg_getbyname("3des")=5
Aug  5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0ba8, "OAKLEY_MD5")
Aug  5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Aug  5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0acc, "OAKLEY_GROUP_MODP1024")
Aug  5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
modp_getbyname("modp1024")=2
Aug  5 07:35:49 mail pluto[27360]: | __alg_info_ike_add() ealg=5 aalg=1
modp_id=2, cnt=1
Aug  5 07:35:49 mail pluto[27360]: | Added new connection edelweiss with
policy PSK+ENCRYPT+TUNNEL
Aug  5 07:35:49 mail pluto[27360]: | from whack: got --esp=3des-md5
Aug  5 07:35:49 mail pluto[27360]: | alg_info_parse_str() ealg_buf=3des
aalg_buf=md5eklen=0  aklen=0
Aug  5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d100c, "ESP_3DES")
Aug  5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
ealg_getbyname("3des")=3
Aug  5 07:35:49 mail pluto[27360]: | enum_search_prefix () calling
enum_search(0x80d0dc0, "AUTH_ALGORITHM_HMAC_MD5")
Aug  5 07:35:49 mail pluto[27360]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Aug  5 07:35:49 mail pluto[27360]: | __alg_info_esp_add() ealg=3 aalg=1
cnt=1
Aug  5 07:35:49 mail pluto[27360]: | esp string values: 3DES(3)_000-MD5(1);
flags=strict
Aug  5 07:35:49 mail pluto[27360]: | from whack: got
--ike=3des-md5-modp1024
Aug  5 07:35:49 mail pluto[27360]: | ike string values:
3DES_CBC(5)_000-MD5(1)-MODP1024(2); flags=strict
Aug  5 07:35:49 mail pluto[27360]: | counting wild cards for 91.112.190.238
is 0
Aug  5 07:35:49 mail pluto[27360]: | counting wild cards for (none) is 15
Aug  5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=1
Aug  5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=1
Aug  5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=2
Aug  5 07:35:49 mail pluto[27360]: | alg_info_addref() alg_info->ref_cnt=2
Aug  5 07:35:49 mail pluto[27360]: added connection description "edelweiss"
Aug  5 07:35:49 mail pluto[27360]: |
192.168.5.0/24===91.112.190.238---91.112.190.237...83.218.162.62---83.218.162.44===192.168.6.0/24
Aug  5 07:35:49 mail pluto[27360]: | ike_life: 28800s; ipsec_life: 3600s;
rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy:
PSK+ENCRYPT+TUNNEL
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:35:49 mail pluto[27360]: |  
Aug  5 07:35:49 mail pluto[27360]: | *received whack message
Aug  5 07:35:49 mail pluto[27360]: listening for IKE messages
Aug  5 07:35:49 mail pluto[27360]: | found lo with address 127.0.0.1
Aug  5 07:35:49 mail pluto[27360]: | found eth0 with address 83.218.162.44
Aug  5 07:35:49 mail pluto[27360]: | found eth1 with address 192.168.6.1
Aug  5 07:35:49 mail pluto[27360]: | found eth2 with address 192.168.10.1
Aug  5 07:35:49 mail pluto[27360]: | found tun0 with address 192.168.2.1
Aug  5 07:35:49 mail pluto[27360]: adding interface tun0/tun0
192.168.2.1:500
Aug  5 07:35:49 mail pluto[27360]: adding interface eth2/eth2
192.168.10.1:500
Aug  5 07:35:49 mail pluto[27360]: adding interface eth1/eth1
192.168.6.1:500
Aug  5 07:35:49 mail pluto[27360]: adding interface eth0/eth0
83.218.162.44:500
Aug  5 07:35:49 mail pluto[27360]: adding interface lo/lo 127.0.0.1:500
Aug  5 07:35:49 mail pluto[27360]: | found lo with address
0000:0000:0000:0000:0000:0000:0000:0001
Aug  5 07:35:49 mail pluto[27360]: adding interface lo/lo ::1:500
Aug  5 07:35:49 mail pluto[27360]: | connect_to_host_pair:
83.218.162.44:500 91.112.190.238:500 -> hp:none 
Aug  5 07:35:49 mail pluto[27360]: forgetting secrets
Aug  5 07:35:49 mail pluto[27360]: loading secrets from
"/etc/ipsec.secrets"
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:35:49 mail pluto[27360]: |  
Aug  5 07:35:49 mail pluto[27360]: | *received whack message
Aug  5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:49 mail pluto[27360]: | route owner of "edelweiss" unrouted:
NULL; eroute owner: NULL
Aug  5 07:35:49 mail pluto[27360]: | could_route called for edelweiss
(kind=CK_PERMANENT)
Aug  5 07:35:49 mail pluto[27360]: | route owner of "edelweiss" unrouted:
NULL; eroute owner: NULL
Aug  5 07:35:49 mail pluto[27360]: | route_and_eroute with c: edelweiss
(next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: 0
Aug  5 07:35:49 mail pluto[27360]: | add eroute 192.168.5.0/24:0 --0->
192.168.6.0/24:0 => %trap (raw_eroute)
Aug  5 07:35:49 mail pluto[27360]: | eroute_connection add eroute
192.168.6.0/24:0 --0-> 192.168.5.0/24:0 => %trap (raw_eroute)
Aug  5 07:35:49 mail pluto[27360]: | route_and_eroute: firewall_notified:
true
Aug  5 07:35:49 mail pluto[27360]: | command executing prepare-client
Aug  5 07:35:49 mail pluto[27360]: | executing prepare-client: 2>&1
PLUTO_VERSION='1.1' PLUTO_VERB='prepare-client'
PLUTO_CONNECTION='edelweiss' PLUTO_NEXT_HOP='83.218.162.62'
PLUTO_INTERFACE='eth0' PLUTO_ME='83.218.162.44' PLUTO_MY_ID='83.218.162.44'
PLUTO_MY_CLIENT='192.168.6.0/24' PLUTO_MY_CLIENT_NET='192.168.6.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL='0' PLUTO_PEER='91.112.190.238'
PLUTO_PEER_ID='91.112.190.238' PLUTO_PEER_CLIENT='192.168.5.0/24'
PLUTO_PEER_CLIENT_NET='192.168.5.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL'   ipsec _updown
Aug  5 07:35:49 mail pluto[27360]: | command executing route-client
Aug  5 07:35:49 mail pluto[27360]: | executing route-client: 2>&1
PLUTO_VERSION='1.1' PLUTO_VERB='route-client' PLUTO_CONNECTION='edelweiss'
PLUTO_NEXT_HOP='83.218.162.62' PLUTO_INTERFACE='eth0'
PLUTO_ME='83.218.162.44' PLUTO_MY_ID='83.218.162.44'
PLUTO_MY_CLIENT='192.168.6.0/24' PLUTO_MY_CLIENT_NET='192.168.6.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL='0' PLUTO_PEER='91.112.190.238'
PLUTO_PEER_ID='91.112.190.238' PLUTO_PEER_CLIENT='192.168.5.0/24'
PLUTO_PEER_CLIENT_NET='192.168.5.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL'   ipsec _updown
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:35:49 mail pluto[27360]: |  
Aug  5 07:35:49 mail pluto[27360]: | *received whack message
Aug  5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_db_new() initial
trans_cnt=28
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_db_new() will return
p_new->protoid=3, p_new->trans_cnt=1
Aug  5 07:35:49 mail pluto[27360]: | kernel_alg_db_new()     trans[0]:
transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=1
Aug  5 07:35:49 mail pluto[27360]: | returning new proposal from esp_info
Aug  5 07:35:49 mail pluto[27360]: | creating state object #1 at 0x9566720
Aug  5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:49 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: | RCOOKIE:  00 00 00 00  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:49 mail pluto[27360]: | state hash entry 8
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_SO_DISCARD,
timeout in 0 seconds for #1
Aug  5 07:35:49 mail pluto[27360]: | Queuing pending Quick Mode with
91.112.190.238 "edelweiss"
Aug  5 07:35:49 mail pluto[27360]: "edelweiss" #1: initiating Main Mode
Aug  5 07:35:49 mail pluto[27360]: | **emit ISAKMP Message:
Aug  5 07:35:49 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:49 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 00  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_SA
Aug  5 07:35:49 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:49 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_IDPROT
Aug  5 07:35:49 mail pluto[27360]: |    flags: none
Aug  5 07:35:49 mail pluto[27360]: |    message ID:  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Security Association
Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_VID
Aug  5 07:35:49 mail pluto[27360]: |    DOI: ISAKMP_DOI_IPSEC
Aug  5 07:35:49 mail pluto[27360]: | ****emit IPsec DOI SIT:
Aug  5 07:35:49 mail pluto[27360]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug  5 07:35:49 mail pluto[27360]: | out_sa pcn: 0 has 1 valid proposals
Aug  5 07:35:49 mail pluto[27360]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
Aug  5 07:35:49 mail pluto[27360]: | ****emit ISAKMP Proposal Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: |    proposal number: 0
Aug  5 07:35:49 mail pluto[27360]: |    protocol ID: PROTO_ISAKMP
Aug  5 07:35:49 mail pluto[27360]: |    SPI size: 0
Aug  5 07:35:49 mail pluto[27360]: |    number of transforms: 1
Aug  5 07:35:49 mail pluto[27360]: | *****emit ISAKMP Transform Payload
(ISAKMP):
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: |    transform number: 0
Aug  5 07:35:49 mail pluto[27360]: |    transform ID: KEY_IKE
Aug  5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_LIFE_TYPE
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:49 mail pluto[27360]: |     [1 is OAKLEY_LIFE_SECONDS]
Aug  5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_LIFE_DURATION
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 28800
Aug  5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 5
Aug  5 07:35:49 mail pluto[27360]: |     [5 is OAKLEY_3DES_CBC]
Aug  5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_HASH_ALGORITHM
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:49 mail pluto[27360]: |     [1 is OAKLEY_MD5]
Aug  5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:49 mail pluto[27360]: |     [1 is OAKLEY_PRESHARED_KEY]
Aug  5 07:35:49 mail pluto[27360]: | ******emit ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_GROUP_DESCRIPTION
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 2
Aug  5 07:35:49 mail pluto[27360]: |     [2 is OAKLEY_GROUP_MODP1024]
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Transform
Payload (ISAKMP): 32
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Proposal
Payload: 40
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Security
Association Payload: 52
Aug  5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Vendor ID Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: | emitting 12 raw bytes of Vendor ID
into ISAKMP Vendor ID Payload
Aug  5 07:35:49 mail pluto[27360]: | Vendor ID  4f 45 60 66  69 6a 41 75 
66 51 4d 44
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Vendor ID
Payload: 16
Aug  5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Vendor ID Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: | emitting 16 raw bytes of V_ID into
ISAKMP Vendor ID Payload
Aug  5 07:35:49 mail pluto[27360]: | V_ID  af ca d7 13  68 a1 f1 c9  6b 86
96 fc  77 57 01 00
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Vendor ID
Payload: 20
Aug  5 07:35:49 mail pluto[27360]: | nat traversal enabled: 0
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Message: 116
Aug  5 07:35:49 mail pluto[27360]: | sending 116 bytes for main_outI1
through eth0:500 to 91.112.190.238:500:
Aug  5 07:35:49 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  00 00 00
00  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: |   01 10 02 00  00 00 00 00  00 00 00
74  0d 00 00 34
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 01  00 00 00 01  00 00 00
28  00 01 00 01
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 20  00 01 00 00  80 0b 00
01  80 0c 70 80
Aug  5 07:35:49 mail pluto[27360]: |   80 01 00 05  80 02 00 01  80 03 00
01  80 04 00 02
Aug  5 07:35:49 mail pluto[27360]: |   0d 00 00 10  4f 45 60 66  69 6a 41
75  66 51 4d 44
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 14  af ca d7 13  68 a1 f1
c9  6b 86 96 fc
Aug  5 07:35:49 mail pluto[27360]: |   77 57 01 00
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #1
Aug  5 07:35:49 mail pluto[27360]: |  
Aug  5 07:35:49 mail pluto[27360]: | *received 116 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug  5 07:35:49 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:49 mail pluto[27360]: |   01 10 02 00  00 00 00 00  00 00 00
74  0d 00 00 34
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 01  00 00 00 01  00 00 00
28  00 01 00 01
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 20  00 01 00 00  80 0b 00
01  80 0c 70 80
Aug  5 07:35:49 mail pluto[27360]: |   80 01 00 05  80 02 00 01  80 03 00
01  80 04 00 02
Aug  5 07:35:49 mail pluto[27360]: |   0d 00 00 10  4f 45 72 5c  5b 75 40
61  66 6c 42 5f
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 14  af ca d7 13  68 a1 f1
c9  6b 86 96 fc
Aug  5 07:35:49 mail pluto[27360]: |   77 57 01 00
Aug  5 07:35:49 mail pluto[27360]: | **parse ISAKMP Message:
Aug  5 07:35:49 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:49 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:49 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_SA
Aug  5 07:35:49 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:49 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_IDPROT
Aug  5 07:35:49 mail pluto[27360]: |    flags: none
Aug  5 07:35:49 mail pluto[27360]: |    message ID:  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: |    length: 116
Aug  5 07:35:49 mail pluto[27360]: |  processing packet with exchange
type=ISAKMP_XCHG_IDPROT (2)
Aug  5 07:35:49 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: | RCOOKIE:  23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:49 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:49 mail pluto[27360]: | state hash entry 0
Aug  5 07:35:49 mail pluto[27360]: | state object not found
Aug  5 07:35:49 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: | RCOOKIE:  00 00 00 00  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:49 mail pluto[27360]: | state hash entry 8
Aug  5 07:35:49 mail pluto[27360]: | peer and cookies match on #1, provided
msgid 00000000 vs 00000000
Aug  5 07:35:49 mail pluto[27360]: | state object #1 found, in
STATE_MAIN_I1
Aug  5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:49 mail pluto[27360]: | np=1 and sd=0x80d8800 
Aug  5 07:35:49 mail pluto[27360]: | ***parse ISAKMP Security Association
Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_VID
Aug  5 07:35:49 mail pluto[27360]: |    length: 52
Aug  5 07:35:49 mail pluto[27360]: |    DOI: ISAKMP_DOI_IPSEC
Aug  5 07:35:49 mail pluto[27360]: | np=13 and sd=0x80d81d0 
Aug  5 07:35:49 mail pluto[27360]: | ***parse ISAKMP Vendor ID Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_VID
Aug  5 07:35:49 mail pluto[27360]: |    length: 16
Aug  5 07:35:49 mail pluto[27360]: | np=13 and sd=0x80d81d0 
Aug  5 07:35:49 mail pluto[27360]: | ***parse ISAKMP Vendor ID Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: |    length: 20
Aug  5 07:35:49 mail pluto[27360]: "edelweiss" #1: ignoring unknown Vendor
ID payload [4f45725c5b754061666c425f]
Aug  5 07:35:49 mail pluto[27360]: "edelweiss" #1: received Vendor ID
payload [Dead Peer Detection]
Aug  5 07:35:49 mail pluto[27360]: | ****parse IPsec DOI SIT:
Aug  5 07:35:49 mail pluto[27360]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug  5 07:35:49 mail pluto[27360]: | ****parse ISAKMP Proposal Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: |    length: 40
Aug  5 07:35:49 mail pluto[27360]: |    proposal number: 0
Aug  5 07:35:49 mail pluto[27360]: |    protocol ID: PROTO_ISAKMP
Aug  5 07:35:49 mail pluto[27360]: |    SPI size: 0
Aug  5 07:35:49 mail pluto[27360]: |    number of transforms: 1
Aug  5 07:35:49 mail pluto[27360]: | *****parse ISAKMP Transform Payload
(ISAKMP):
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: |    length: 32
Aug  5 07:35:49 mail pluto[27360]: |    transform number: 0
Aug  5 07:35:49 mail pluto[27360]: |    transform ID: KEY_IKE
Aug  5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_LIFE_TYPE
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:49 mail pluto[27360]: |    [1 is OAKLEY_LIFE_SECONDS]
Aug  5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_LIFE_DURATION
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 28800
Aug  5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 5
Aug  5 07:35:49 mail pluto[27360]: |    [5 is OAKLEY_3DES_CBC]
Aug  5 07:35:49 mail pluto[27360]: | ike_alg_enc_ok(ealg=5,key_len=0):
blocksize=8, keyminlen=192, keydeflen=192, keymaxlen=192, ret=1
Aug  5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_HASH_ALGORITHM
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:49 mail pluto[27360]: |    [1 is OAKLEY_MD5]
Aug  5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:49 mail pluto[27360]: |    [1 is OAKLEY_PRESHARED_KEY]
Aug  5 07:35:49 mail pluto[27360]: | started looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug  5 07:35:49 mail pluto[27360]: | actually looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug  5 07:35:49 mail pluto[27360]: | 1: compared PSK 83.218.181.63 to
83.218.162.44 / 91.112.190.238 -> 0
Aug  5 07:35:49 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 4
Aug  5 07:35:49 mail pluto[27360]: | 1: compared PSK 91.112.190.238 to
83.218.162.44 / 91.112.190.238 -> 2
Aug  5 07:35:49 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 6
Aug  5 07:35:49 mail pluto[27360]: | best_match 0>6 best=0x9564e98 (line=1)
Aug  5 07:35:49 mail pluto[27360]: | concluding with best_match=6
best=0x9564e98 (lineno=1)
Aug  5 07:35:49 mail pluto[27360]: | ******parse ISAKMP Oakley attribute:
Aug  5 07:35:49 mail pluto[27360]: |    af+type: OAKLEY_GROUP_DESCRIPTION
Aug  5 07:35:49 mail pluto[27360]: |    length/value: 2
Aug  5 07:35:49 mail pluto[27360]: |    [2 is OAKLEY_GROUP_MODP1024]
Aug  5 07:35:49 mail pluto[27360]: | Oakley Transform 0 accepted
Aug  5 07:35:49 mail pluto[27360]: | sender checking NAT-t: 0 and 0
Aug  5 07:35:49 mail pluto[27360]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt:
1
Aug  5 07:35:49 mail pluto[27360]: | asking helper 0 to do build_kenonce op
on seq: 1
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_CRYPTO_FAILED,
timeout in 300 seconds for #1
Aug  5 07:35:49 mail pluto[27376]: ! helper 0 doing build_kenonce op id: 1
Aug  5 07:35:49 mail pluto[27360]: | complete state transition with
STF_SUSPEND
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:35:49 mail pluto[27376]: ! Local DH secret:
Aug  5 07:35:49 mail pluto[27376]: !   52 45 96 51  40 93 51 a3  4d ce 5d
6e  2e 36 16 31
Aug  5 07:35:49 mail pluto[27376]: !   a4 bc 01 6a  07 63 8a 24  1a 84 b0
d6  07 9f 9c c9
Aug  5 07:35:49 mail pluto[27376]: ! Public DH value sent:
Aug  5 07:35:49 mail pluto[27376]: !   68 2a 24 91  3e 02 f0 32  fa 14 a5
26  1e ac a3 99
Aug  5 07:35:49 mail pluto[27376]: !   50 77 71 b6  28 3c f1 3d  04 25 d9
8c  0d 6d 4b 7a
Aug  5 07:35:49 mail pluto[27376]: !   06 da fa 1b  fe f3 bc e0  6f 47 2d
f2  6d ba 9d bb
Aug  5 07:35:49 mail pluto[27376]: !   63 76 b1 33  00 83 4b 2d  90 1d d4
29  b6 d3 ad 5c
Aug  5 07:35:49 mail pluto[27376]: !   52 ba 56 83  5d 36 70 1d  db c1 54
b4  ca 4f 50 1a
Aug  5 07:35:49 mail pluto[27376]: !   f2 03 8f e6  93 75 80 ff  a5 c0 17
e9  38 e8 eb 93
Aug  5 07:35:49 mail pluto[27376]: !   bf 16 15 b1  6f fe 15 69  df 7e 7d
2f  69 c9 5e 4c
Aug  5 07:35:49 mail pluto[27376]: !   81 fe 9a c2  70 d5 3d a9  cc 7c 10
38  94 a4 88 6b
Aug  5 07:35:49 mail pluto[27376]: ! Generated nonce:
Aug  5 07:35:49 mail pluto[27376]: !   d2 a8 78 c1  34 6f 5b ed  61 0f 1c
10  d3 64 4a 0c
Aug  5 07:35:49 mail pluto[27360]: | helper 0 has work (cnt now 0)
Aug  5 07:35:49 mail pluto[27360]: | helper 0 replies to sequence 1
Aug  5 07:35:49 mail pluto[27360]: | calling callback function 0x8061e74
Aug  5 07:35:49 mail pluto[27360]: | main inR1_outI2: calculated ke+nonce,
sending I2
Aug  5 07:35:49 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:49 mail pluto[27360]: | **emit ISAKMP Message:
Aug  5 07:35:49 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:49 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:49 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_KE
Aug  5 07:35:49 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:49 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_IDPROT
Aug  5 07:35:49 mail pluto[27360]: |    flags: none
Aug  5 07:35:49 mail pluto[27360]: |    message ID:  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Key Exchange Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type:
ISAKMP_NEXT_NONCE
Aug  5 07:35:49 mail pluto[27360]: | emitting 128 raw bytes of keyex value
into ISAKMP Key Exchange Payload
Aug  5 07:35:49 mail pluto[27360]: | keyex value  68 2a 24 91  3e 02 f0 32 
fa 14 a5 26  1e ac a3 99
Aug  5 07:35:49 mail pluto[27360]: |   50 77 71 b6  28 3c f1 3d  04 25 d9
8c  0d 6d 4b 7a
Aug  5 07:35:49 mail pluto[27360]: |   06 da fa 1b  fe f3 bc e0  6f 47 2d
f2  6d ba 9d bb
Aug  5 07:35:49 mail pluto[27360]: |   63 76 b1 33  00 83 4b 2d  90 1d d4
29  b6 d3 ad 5c
Aug  5 07:35:49 mail pluto[27360]: |   52 ba 56 83  5d 36 70 1d  db c1 54
b4  ca 4f 50 1a
Aug  5 07:35:49 mail pluto[27360]: |   f2 03 8f e6  93 75 80 ff  a5 c0 17
e9  38 e8 eb 93
Aug  5 07:35:49 mail pluto[27360]: |   bf 16 15 b1  6f fe 15 69  df 7e 7d
2f  69 c9 5e 4c
Aug  5 07:35:49 mail pluto[27360]: |   81 fe 9a c2  70 d5 3d a9  cc 7c 10
38  94 a4 88 6b
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Key Exchange
Payload: 132
Aug  5 07:35:49 mail pluto[27360]: | ***emit ISAKMP Nonce Payload:
Aug  5 07:35:49 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:49 mail pluto[27360]: | emitting 16 raw bytes of Ni into
ISAKMP Nonce Payload
Aug  5 07:35:49 mail pluto[27360]: | Ni  d2 a8 78 c1  34 6f 5b ed  61 0f 1c
10  d3 64 4a 0c
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Nonce
Payload: 20
Aug  5 07:35:49 mail pluto[27360]: | emitting length of ISAKMP Message: 180
Aug  5 07:35:49 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: | RCOOKIE:  00 00 00 00  00 00 00 00
Aug  5 07:35:49 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:49 mail pluto[27360]: | state hash entry 8
Aug  5 07:35:49 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:49 mail pluto[27360]: | RCOOKIE:  23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:49 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:49 mail pluto[27360]: | state hash entry 0
Aug  5 07:35:49 mail pluto[27360]: | complete state transition with STF_OK
Aug  5 07:35:49 mail pluto[27360]: "edelweiss" #1: transition from state
STATE_MAIN_I1 to state STATE_MAIN_I2
Aug  5 07:35:49 mail pluto[27360]: | sending reply packet to
91.112.190.238:500 (from port=500)
Aug  5 07:35:49 mail pluto[27360]: | sending 180 bytes for STATE_MAIN_I1
through eth0:500 to 91.112.190.238:500:
Aug  5 07:35:49 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:49 mail pluto[27360]: |   04 10 02 00  00 00 00 00  00 00 00
b4  0a 00 00 84
Aug  5 07:35:49 mail pluto[27360]: |   68 2a 24 91  3e 02 f0 32  fa 14 a5
26  1e ac a3 99
Aug  5 07:35:49 mail pluto[27360]: |   50 77 71 b6  28 3c f1 3d  04 25 d9
8c  0d 6d 4b 7a
Aug  5 07:35:49 mail pluto[27360]: |   06 da fa 1b  fe f3 bc e0  6f 47 2d
f2  6d ba 9d bb
Aug  5 07:35:49 mail pluto[27360]: |   63 76 b1 33  00 83 4b 2d  90 1d d4
29  b6 d3 ad 5c
Aug  5 07:35:49 mail pluto[27360]: |   52 ba 56 83  5d 36 70 1d  db c1 54
b4  ca 4f 50 1a
Aug  5 07:35:49 mail pluto[27360]: |   f2 03 8f e6  93 75 80 ff  a5 c0 17
e9  38 e8 eb 93
Aug  5 07:35:49 mail pluto[27360]: |   bf 16 15 b1  6f fe 15 69  df 7e 7d
2f  69 c9 5e 4c
Aug  5 07:35:49 mail pluto[27360]: |   81 fe 9a c2  70 d5 3d a9  cc 7c 10
38  94 a4 88 6b
Aug  5 07:35:49 mail pluto[27360]: |   00 00 00 14  d2 a8 78 c1  34 6f 5b
ed  61 0f 1c 10
Aug  5 07:35:49 mail pluto[27360]: |   d3 64 4a 0c
Aug  5 07:35:49 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1
Aug  5 07:35:49 mail pluto[27360]: "edelweiss" #1: STATE_MAIN_I2: sent MI2,
expecting MR2
Aug  5 07:35:49 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug  5 07:35:49 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug  5 07:35:49 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #1
Aug  5 07:35:50 mail pluto[27360]: |  
Aug  5 07:35:50 mail pluto[27360]: | *received 180 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |   04 10 02 00  00 00 00 00  00 00 00
b4  0a 00 00 84
Aug  5 07:35:50 mail pluto[27360]: |   ad 15 4b 79  d9 ee 90 db  0d 8a ac
1a  ff 48 63 d7
Aug  5 07:35:50 mail pluto[27360]: |   42 30 58 ac  bf 35 e6 e7  ec 2f 8c
f8  24 80 8a ec
Aug  5 07:35:50 mail pluto[27360]: |   23 9a 05 b3  76 3e 3a 99  a8 5d a8
af  b4 9b 57 2c
Aug  5 07:35:50 mail pluto[27360]: |   14 43 6c d9  71 2b fa 5c  bc b4 9b
a0  0f 5e 03 db
Aug  5 07:35:50 mail pluto[27360]: |   67 94 c5 54  b8 54 fe ca  4f 9b 55
f5  e2 5d 2a 09
Aug  5 07:35:50 mail pluto[27360]: |   20 ed f0 ac  9b 41 47 05  30 5e ae
bd  d6 4e c1 37
Aug  5 07:35:50 mail pluto[27360]: |   6d 9d 83 cb  a8 01 67 d7  60 40 a5
60  be 75 61 a5
Aug  5 07:35:50 mail pluto[27360]: |   0f d3 57 0b  f6 20 fd 25  b5 00 7c
76  49 7d 3f 11
Aug  5 07:35:50 mail pluto[27360]: |   00 00 00 14  97 5f 98 4a  8c 20 54
ec  80 d2 b2 34
Aug  5 07:35:50 mail pluto[27360]: |   ec 1e 72 44
Aug  5 07:35:50 mail pluto[27360]: | **parse ISAKMP Message:
Aug  5 07:35:50 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:50 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_KE
Aug  5 07:35:50 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:50 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_IDPROT
Aug  5 07:35:50 mail pluto[27360]: |    flags: none
Aug  5 07:35:50 mail pluto[27360]: |    message ID:  00 00 00 00
Aug  5 07:35:50 mail pluto[27360]: |    length: 180
Aug  5 07:35:50 mail pluto[27360]: |  processing packet with exchange
type=ISAKMP_XCHG_IDPROT (2)
Aug  5 07:35:50 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: | RCOOKIE:  23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug  5 07:35:50 mail pluto[27360]: | peer and cookies match on #1, provided
msgid 00000000 vs 00000000
Aug  5 07:35:50 mail pluto[27360]: | state object #1 found, in
STATE_MAIN_I2
Aug  5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:50 mail pluto[27360]: | np=4 and sd=0x80d8510 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Key Exchange Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type:
ISAKMP_NEXT_NONCE
Aug  5 07:35:50 mail pluto[27360]: |    length: 132
Aug  5 07:35:50 mail pluto[27360]: | np=10 and sd=0x80d8320 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Nonce Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    length: 20
Aug  5 07:35:50 mail pluto[27360]: | **emit ISAKMP Message:
Aug  5 07:35:50 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:50 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_ID
Aug  5 07:35:50 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:50 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_IDPROT
Aug  5 07:35:50 mail pluto[27360]: |    flags: ISAKMP_FLAG_ENCRYPTION
Aug  5 07:35:50 mail pluto[27360]: |    message ID:  00 00 00 00
Aug  5 07:35:50 mail pluto[27360]: | DH public value received:
Aug  5 07:35:50 mail pluto[27360]: |   ad 15 4b 79  d9 ee 90 db  0d 8a ac
1a  ff 48 63 d7
Aug  5 07:35:50 mail pluto[27360]: |   42 30 58 ac  bf 35 e6 e7  ec 2f 8c
f8  24 80 8a ec
Aug  5 07:35:50 mail pluto[27360]: |   23 9a 05 b3  76 3e 3a 99  a8 5d a8
af  b4 9b 57 2c
Aug  5 07:35:50 mail pluto[27360]: |   14 43 6c d9  71 2b fa 5c  bc b4 9b
a0  0f 5e 03 db
Aug  5 07:35:50 mail pluto[27360]: |   67 94 c5 54  b8 54 fe ca  4f 9b 55
f5  e2 5d 2a 09
Aug  5 07:35:50 mail pluto[27360]: |   20 ed f0 ac  9b 41 47 05  30 5e ae
bd  d6 4e c1 37
Aug  5 07:35:50 mail pluto[27360]: |   6d 9d 83 cb  a8 01 67 d7  60 40 a5
60  be 75 61 a5
Aug  5 07:35:50 mail pluto[27360]: |   0f d3 57 0b  f6 20 fd 25  b5 00 7c
76  49 7d 3f 11
Aug  5 07:35:50 mail pluto[27360]: | thinking about whether to send my
certificate:
Aug  5 07:35:50 mail pluto[27360]: |   I have RSA key: OAKLEY_PRESHARED_KEY
cert.type: CERT_NONE 
Aug  5 07:35:50 mail pluto[27360]: |   sendcert: CERT_ALWAYSSEND and I did
not get a certificate request 
Aug  5 07:35:50 mail pluto[27360]: |   so do not send cert.
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #1: I did not send a
certificate because I do not have one.
Aug  5 07:35:50 mail pluto[27360]: |  I am not sending a certificate
request
Aug  5 07:35:50 mail pluto[27360]: | started looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug  5 07:35:50 mail pluto[27360]: | actually looking for secret for
83.218.162.44->91.112.190.238 of kind PPK_PSK
Aug  5 07:35:50 mail pluto[27360]: | 1: compared PSK 83.218.181.63 to
83.218.162.44 / 91.112.190.238 -> 0
Aug  5 07:35:50 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 4
Aug  5 07:35:50 mail pluto[27360]: | 1: compared PSK 91.112.190.238 to
83.218.162.44 / 91.112.190.238 -> 2
Aug  5 07:35:50 mail pluto[27360]: | 2: compared PSK 83.218.162.44 to
83.218.162.44 / 91.112.190.238 -> 6
Aug  5 07:35:50 mail pluto[27360]: | best_match 0>6 best=0x9564e98 (line=1)
Aug  5 07:35:50 mail pluto[27360]: | concluding with best_match=6
best=0x9564e98 (lineno=1)
Aug  5 07:35:50 mail pluto[27360]: | calc_dh_shared(): time elapsed
(OAKLEY_GROUP_MODP1024): 2147 usec
Aug  5 07:35:50 mail pluto[27360]: | DH shared secret:
Aug  5 07:35:50 mail pluto[27360]: |   da a4 02 0c  8e fc 36 b1  fc cc 88
0c  e7 1f 72 94
Aug  5 07:35:50 mail pluto[27360]: |   6f 13 b0 cb  0b 72 12 19  08 11 e2
43  c0 1a e7 fe
Aug  5 07:35:50 mail pluto[27360]: |   37 30 92 3a  a8 e2 93 5f  01 d8 b0
21  f3 cd 84 81
Aug  5 07:35:50 mail pluto[27360]: |   cf 69 9d 4a  67 55 bf 5d  59 ae 73
28  24 17 2a 22
Aug  5 07:35:50 mail pluto[27360]: |   50 73 4f da  d3 ec 42 01  50 07 0b
c2  97 18 c8 16
Aug  5 07:35:50 mail pluto[27360]: |   1c 09 e9 5a  d7 37 41 de  83 06 5e
da  55 0c c5 06
Aug  5 07:35:50 mail pluto[27360]: |   08 36 4e 0a  a5 b9 8a 20  c3 b4 4b
4c  c3 03 e2 50
Aug  5 07:35:50 mail pluto[27360]: |   2a 52 a0 48  aa 7a a2 91  95 d5 07
6f  b4 fe 38 5f
Aug  5 07:35:50 mail pluto[27360]: | Skey inputs (PSK+NI+NR)
Aug  5 07:35:50 mail pluto[27360]: | ni:   d2 a8 78 c1  34 6f 5b ed  61 0f
1c 10  d3 64 4a 0c
Aug  5 07:35:50 mail pluto[27360]: | nr:   97 5f 98 4a  8c 20 54 ec  80 d2
b2 34  ec 1e 72 44
Aug  5 07:35:50 mail pluto[27360]: | keyid:   94 fb 0e 16  d6 9b ca 19  1c
0c 21 d7  57 73 b7 8f
Aug  5 07:35:50 mail pluto[27360]: | DH_i:  68 2a 24 91  3e 02 f0 32  fa 14
a5 26  1e ac a3 99
Aug  5 07:35:50 mail pluto[27360]: |   50 77 71 b6  28 3c f1 3d  04 25 d9
8c  0d 6d 4b 7a
Aug  5 07:35:50 mail pluto[27360]: |   06 da fa 1b  fe f3 bc e0  6f 47 2d
f2  6d ba 9d bb
Aug  5 07:35:50 mail pluto[27360]: |   63 76 b1 33  00 83 4b 2d  90 1d d4
29  b6 d3 ad 5c
Aug  5 07:35:50 mail pluto[27360]: |   52 ba 56 83  5d 36 70 1d  db c1 54
b4  ca 4f 50 1a
Aug  5 07:35:50 mail pluto[27360]: |   f2 03 8f e6  93 75 80 ff  a5 c0 17
e9  38 e8 eb 93
Aug  5 07:35:50 mail pluto[27360]: |   bf 16 15 b1  6f fe 15 69  df 7e 7d
2f  69 c9 5e 4c
Aug  5 07:35:50 mail pluto[27360]: |   81 fe 9a c2  70 d5 3d a9  cc 7c 10
38  94 a4 88 6b
Aug  5 07:35:50 mail pluto[27360]: | DH_r:  ad 15 4b 79  d9 ee 90 db  0d 8a
ac 1a  ff 48 63 d7
Aug  5 07:35:50 mail pluto[27360]: |   42 30 58 ac  bf 35 e6 e7  ec 2f 8c
f8  24 80 8a ec
Aug  5 07:35:50 mail pluto[27360]: |   23 9a 05 b3  76 3e 3a 99  a8 5d a8
af  b4 9b 57 2c
Aug  5 07:35:50 mail pluto[27360]: |   14 43 6c d9  71 2b fa 5c  bc b4 9b
a0  0f 5e 03 db
Aug  5 07:35:50 mail pluto[27360]: |   67 94 c5 54  b8 54 fe ca  4f 9b 55
f5  e2 5d 2a 09
Aug  5 07:35:50 mail pluto[27360]: |   20 ed f0 ac  9b 41 47 05  30 5e ae
bd  d6 4e c1 37
Aug  5 07:35:50 mail pluto[27360]: |   6d 9d 83 cb  a8 01 67 d7  60 40 a5
60  be 75 61 a5
Aug  5 07:35:50 mail pluto[27360]: |   0f d3 57 0b  f6 20 fd 25  b5 00 7c
76  49 7d 3f 11
Aug  5 07:35:50 mail pluto[27360]: | Skeyid:    94 fb 0e 16  d6 9b ca 19 
1c 0c 21 d7  57 73 b7 8f
Aug  5 07:35:50 mail pluto[27360]: | Skeyid_d:  71 c8 80 18  78 c0 2c 2f 
64 3d ed 81  e1 d4 e5 f7
Aug  5 07:35:50 mail pluto[27360]: | Skeyid_a:  ba 3b 9a 67  43 72 2c 94 
90 61 e1 ca  44 28 25 05
Aug  5 07:35:50 mail pluto[27360]: | Skeyid_e:  6b 96 01 a3  68 92 d5 24 
1e ef 4e 4e  a3 20 0e e3
Aug  5 07:35:50 mail pluto[27360]: | enc key:  19 25 3e 41  25 80 2c 09  06
46 bd c2  03 96 ce c9
Aug  5 07:35:50 mail pluto[27360]: |   d8 a6 9d 98  ed 2e ec f6
Aug  5 07:35:50 mail pluto[27360]: | IV:  8d 41 f5 8c  b4 92 0f cd  7e a9
2c 1a  61 d0 bd 1e
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Identification Payload
(IPsec DOI):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_HASH
Aug  5 07:35:50 mail pluto[27360]: |    ID type: ID_IPV4_ADDR
Aug  5 07:35:50 mail pluto[27360]: |    Protocol ID: 0
Aug  5 07:35:50 mail pluto[27360]: |    port: 0
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of my identity
into ISAKMP Identification Payload (IPsec DOI)
Aug  5 07:35:50 mail pluto[27360]: | my identity  53 da a2 2c
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP
Identification Payload (IPsec DOI): 12
Aug  5 07:35:50 mail pluto[27360]: | hashing 48 bytes of SA
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Hash Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: | emitting 16 raw bytes of HASH_I into
ISAKMP Hash Payload
Aug  5 07:35:50 mail pluto[27360]: | HASH_I  c0 5f 88 07  71 f2 a0 94  d2
73 cb 14  3f b4 ff c7
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Hash
Payload: 20
Aug  5 07:35:50 mail pluto[27360]: | encrypting:
Aug  5 07:35:50 mail pluto[27360]: |   08 00 00 0c  01 00 00 00  53 da a2
2c  00 00 00 14
Aug  5 07:35:50 mail pluto[27360]: |   c0 5f 88 07  71 f2 a0 94  d2 73 cb
14  3f b4 ff c7
Aug  5 07:35:50 mail pluto[27360]: | IV:
Aug  5 07:35:50 mail pluto[27360]: |   8d 41 f5 8c  b4 92 0f cd  7e a9 2c
1a  61 d0 bd 1e
Aug  5 07:35:50 mail pluto[27360]: | encrypting using OAKLEY_3DES_CBC
Aug  5 07:35:50 mail pluto[27360]: | next IV:  c5 22 7f ce  b8 15 9a 3e
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Message: 60
Aug  5 07:35:50 mail pluto[27360]: | complete state transition with STF_OK
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #1: transition from state
STATE_MAIN_I2 to state STATE_MAIN_I3
Aug  5 07:35:50 mail pluto[27360]: | sending reply packet to
91.112.190.238:500 (from port=500)
Aug  5 07:35:50 mail pluto[27360]: | sending 60 bytes for STATE_MAIN_I2
through eth0:500 to 91.112.190.238:500:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |   05 10 02 01  00 00 00 00  00 00 00
3c  43 81 dc 25
Aug  5 07:35:50 mail pluto[27360]: |   11 b9 99 f2  dc 75 5b 41  b4 ef ef
aa  2a 0d 17 92
Aug  5 07:35:50 mail pluto[27360]: |   24 5f ca a7  c5 22 7f ce  b8 15 9a
3e
Aug  5 07:35:50 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #1
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #1: STATE_MAIN_I3: sent MI3,
expecting MR3
Aug  5 07:35:50 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug  5 07:35:50 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug  5 07:35:50 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #1
Aug  5 07:35:50 mail pluto[27360]: |  
Aug  5 07:35:50 mail pluto[27360]: | *received 60 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |   05 10 02 01  00 00 00 00  00 00 00
3c  6d cc c9 dd
Aug  5 07:35:50 mail pluto[27360]: |   a5 39 b6 a3  49 0c 2a 07  83 8e 04
2e  61 84 93 8c
Aug  5 07:35:50 mail pluto[27360]: |   20 1a 0d 82  d1 ac f5 8d  34 46 ed
4a
Aug  5 07:35:50 mail pluto[27360]: | **parse ISAKMP Message:
Aug  5 07:35:50 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:50 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_ID
Aug  5 07:35:50 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:50 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_IDPROT
Aug  5 07:35:50 mail pluto[27360]: |    flags: ISAKMP_FLAG_ENCRYPTION
Aug  5 07:35:50 mail pluto[27360]: |    message ID:  00 00 00 00
Aug  5 07:35:50 mail pluto[27360]: |    length: 60
Aug  5 07:35:50 mail pluto[27360]: |  processing packet with exchange
type=ISAKMP_XCHG_IDPROT (2)
Aug  5 07:35:50 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: | RCOOKIE:  23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug  5 07:35:50 mail pluto[27360]: | peer and cookies match on #1, provided
msgid 00000000 vs 00000000
Aug  5 07:35:50 mail pluto[27360]: | state object #1 found, in
STATE_MAIN_I3
Aug  5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:50 mail pluto[27360]: | received encrypted packet from
91.112.190.238:500
Aug  5 07:35:50 mail pluto[27360]: | decrypting 32 bytes using algorithm
OAKLEY_3DES_CBC
Aug  5 07:35:50 mail pluto[27360]: | decrypted:
Aug  5 07:35:50 mail pluto[27360]: |   08 00 00 0c  01 00 00 00  5b 70 be
ee  00 00 00 14
Aug  5 07:35:50 mail pluto[27360]: |   4b 69 e0 a6  fa d6 ed f8  c8 3f 00
f6  0f 36 61 a0
Aug  5 07:35:50 mail pluto[27360]: | next IV:  d1 ac f5 8d  34 46 ed 4a
Aug  5 07:35:50 mail pluto[27360]: | np=5 and sd=(nil) 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Identification
Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_HASH
Aug  5 07:35:50 mail pluto[27360]: |    length: 12
Aug  5 07:35:50 mail pluto[27360]: |    ID type: ID_IPV4_ADDR
Aug  5 07:35:50 mail pluto[27360]: |    DOI specific A: 0
Aug  5 07:35:50 mail pluto[27360]: |    DOI specific B: 0
Aug  5 07:35:50 mail pluto[27360]: | np=8 and sd=0x80d8338 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Hash Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    length: 20
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #1: Main mode peer ID is
ID_IPV4_ADDR: '91.112.190.238'
Aug  5 07:35:50 mail pluto[27360]: | hashing 48 bytes of SA
Aug  5 07:35:50 mail pluto[27360]: | authentication succeeded
Aug  5 07:35:50 mail pluto[27360]: | complete state transition with STF_OK
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #1: transition from state
STATE_MAIN_I3 to state STATE_MAIN_I4
Aug  5 07:35:50 mail pluto[27360]: | inserting event EVENT_SA_REPLACE,
timeout in 28188 seconds for #1
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #1: STATE_MAIN_I4: ISAKMP SA
established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192
prf=oakley_md5 group=modp1024}
Aug  5 07:35:50 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug  5 07:35:50 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug  5 07:35:50 mail pluto[27360]: | unqueuing pending Quick Mode with
91.112.190.238 "edelweiss"
Aug  5 07:35:50 mail pluto[27360]: | duplicating state object #1
Aug  5 07:35:50 mail pluto[27360]: | creating state object #2 at 0x9567518
Aug  5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:50 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: | RCOOKIE:  23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug  5 07:35:50 mail pluto[27360]: | inserting event EVENT_SO_DISCARD,
timeout in 0 seconds for #2
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #2: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+UP {using isakmp#1}
Aug  5 07:35:50 mail pluto[27360]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt:
1
Aug  5 07:35:50 mail pluto[27360]: | asking helper 0 to do build_nonce op
on seq: 2
Aug  5 07:35:50 mail pluto[27360]: | inserting event EVENT_CRYPTO_FAILED,
timeout in 300 seconds for #2
Aug  5 07:35:50 mail pluto[27376]: ! helper 0 doing build_nonce op id: 2
Aug  5 07:35:50 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 119
seconds
Aug  5 07:35:50 mail pluto[27376]: ! Generated nonce:
Aug  5 07:35:50 mail pluto[27376]: !   b4 72 ff 55  76 c8 b3 2c  40 2e bd
59  f2 6f f9 53
Aug  5 07:35:50 mail pluto[27360]: | helper 0 has work (cnt now 0)
Aug  5 07:35:50 mail pluto[27360]: | helper 0 replies to sequence 2
Aug  5 07:35:50 mail pluto[27360]: | calling callback function 0x8066e98
Aug  5 07:35:50 mail pluto[27360]: | quick outI1: calculated ke+nonce,
sending I1
Aug  5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:50 mail pluto[27360]: | **emit ISAKMP Message:
Aug  5 07:35:50 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:50 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_HASH
Aug  5 07:35:50 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:50 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_QUICK
Aug  5 07:35:50 mail pluto[27360]: |    flags: ISAKMP_FLAG_ENCRYPTION
Aug  5 07:35:50 mail pluto[27360]: |    message ID:  9a d5 7b 33
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Hash Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_SA
Aug  5 07:35:50 mail pluto[27360]: | emitting 16 zero bytes of HASH into
ISAKMP Hash Payload
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Hash
Payload: 20
Aug  5 07:35:50 mail pluto[27360]: | kernel_alg_db_new() initial
trans_cnt=28
Aug  5 07:35:50 mail pluto[27360]: | kernel_alg_db_new() will return
p_new->protoid=3, p_new->trans_cnt=1
Aug  5 07:35:50 mail pluto[27360]: | kernel_alg_db_new()     trans[0]:
transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=1
Aug  5 07:35:50 mail pluto[27360]: | returning new proposal from esp_info
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Security Association
Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type:
ISAKMP_NEXT_NONCE
Aug  5 07:35:50 mail pluto[27360]: |    DOI: ISAKMP_DOI_IPSEC
Aug  5 07:35:50 mail pluto[27360]: | ****emit IPsec DOI SIT:
Aug  5 07:35:50 mail pluto[27360]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug  5 07:35:50 mail pluto[27360]: | out_sa pcn: 0 has 1 valid proposals
Aug  5 07:35:50 mail pluto[27360]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
Aug  5 07:35:50 mail pluto[27360]: | ****emit ISAKMP Proposal Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    proposal number: 0
Aug  5 07:35:50 mail pluto[27360]: |    protocol ID: PROTO_IPSEC_ESP
Aug  5 07:35:50 mail pluto[27360]: |    SPI size: 4
Aug  5 07:35:50 mail pluto[27360]: |    number of transforms: 1
Aug  5 07:35:50 mail pluto[27360]: | netlink_get_spi: allocated 0x6778d334
for esp.0 at 83.218.162.44
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of SPI into
ISAKMP Proposal Payload
Aug  5 07:35:50 mail pluto[27360]: | SPI  67 78 d3 34
Aug  5 07:35:50 mail pluto[27360]: | *****emit ISAKMP Transform Payload
(ESP):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    transform number: 0
Aug  5 07:35:50 mail pluto[27360]: |    transform ID: ESP_3DES
Aug  5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: ENCAPSULATION_MODE
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:50 mail pluto[27360]: |     [1 is ENCAPSULATION_MODE_TUNNEL]
Aug  5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: SA_LIFE_TYPE
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:50 mail pluto[27360]: |     [1 is SA_LIFE_TYPE_SECONDS]
Aug  5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: SA_LIFE_DURATION
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 3600
Aug  5 07:35:50 mail pluto[27360]: | ******emit ISAKMP IPsec DOI attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: AUTH_ALGORITHM
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:50 mail pluto[27360]: |     [1 is AUTH_ALGORITHM_HMAC_MD5]
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Transform
Payload (ESP): 24
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Proposal
Payload: 36
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Security
Association Payload: 48
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Nonce Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_ID
Aug  5 07:35:50 mail pluto[27360]: | emitting 16 raw bytes of Ni into
ISAKMP Nonce Payload
Aug  5 07:35:50 mail pluto[27360]: | Ni  b4 72 ff 55  76 c8 b3 2c  40 2e bd
59  f2 6f f9 53
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Nonce
Payload: 20
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Identification Payload
(IPsec DOI):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_ID
Aug  5 07:35:50 mail pluto[27360]: |    ID type: ID_IPV4_ADDR_SUBNET
Aug  5 07:35:50 mail pluto[27360]: |    Protocol ID: 0
Aug  5 07:35:50 mail pluto[27360]: |    port: 0
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client network
into ISAKMP Identification Payload (IPsec DOI)
Aug  5 07:35:50 mail pluto[27360]: | client network  c0 a8 06 00
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client mask
into ISAKMP Identification Payload (IPsec DOI)
Aug  5 07:35:50 mail pluto[27360]: | client mask  ff ff ff 00
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP
Identification Payload (IPsec DOI): 16
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Identification Payload
(IPsec DOI):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    ID type: ID_IPV4_ADDR_SUBNET
Aug  5 07:35:50 mail pluto[27360]: |    Protocol ID: 0
Aug  5 07:35:50 mail pluto[27360]: |    port: 0
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client network
into ISAKMP Identification Payload (IPsec DOI)
Aug  5 07:35:50 mail pluto[27360]: | client network  c0 a8 05 00
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 raw bytes of client mask
into ISAKMP Identification Payload (IPsec DOI)
Aug  5 07:35:50 mail pluto[27360]: | client mask  ff ff ff 00
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP
Identification Payload (IPsec DOI): 16
Aug  5 07:35:50 mail pluto[27360]: | HASH(1) computed:
Aug  5 07:35:50 mail pluto[27360]: |   b8 8c b0 cc  27 5a 79 de  36 59 2c
86  65 0a 88 e2
Aug  5 07:35:50 mail pluto[27360]: | last Phase 1 IV:  d1 ac f5 8d  34 46
ed 4a
Aug  5 07:35:50 mail pluto[27360]: | current Phase 1 IV:  d1 ac f5 8d  34
46 ed 4a
Aug  5 07:35:50 mail pluto[27360]: | computed Phase 2 IV:
Aug  5 07:35:50 mail pluto[27360]: |   fd ba ab 0d  26 92 4d 2a  9b c2 63
1d  44 49 bd c1
Aug  5 07:35:50 mail pluto[27360]: | encrypting:
Aug  5 07:35:50 mail pluto[27360]: |   01 00 00 14  b8 8c b0 cc  27 5a 79
de  36 59 2c 86
Aug  5 07:35:50 mail pluto[27360]: |   65 0a 88 e2  0a 00 00 30  00 00 00
01  00 00 00 01
Aug  5 07:35:50 mail pluto[27360]: |   00 00 00 24  00 03 04 01  67 78 d3
34  00 00 00 18
Aug  5 07:35:50 mail pluto[27360]: |   00 03 00 00  80 04 00 01  80 01 00
01  80 02 0e 10
Aug  5 07:35:50 mail pluto[27360]: |   80 05 00 01  05 00 00 14  b4 72 ff
55  76 c8 b3 2c
Aug  5 07:35:50 mail pluto[27360]: |   40 2e bd 59  f2 6f f9 53  05 00 00
10  04 00 00 00
Aug  5 07:35:50 mail pluto[27360]: |   c0 a8 06 00  ff ff ff 00  00 00 00
10  04 00 00 00
Aug  5 07:35:50 mail pluto[27360]: |   c0 a8 05 00  ff ff ff 00
Aug  5 07:35:50 mail pluto[27360]: | IV:
Aug  5 07:35:50 mail pluto[27360]: |   fd ba ab 0d  26 92 4d 2a  9b c2 63
1d  44 49 bd c1
Aug  5 07:35:50 mail pluto[27360]: | encrypting using OAKLEY_3DES_CBC
Aug  5 07:35:50 mail pluto[27360]: | next IV:  c4 8f 57 b7  d2 2c d5 1e
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Message: 148
Aug  5 07:35:50 mail pluto[27360]: | sending 148 bytes for quick_outI1
through eth0:500 to 91.112.190.238:500:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |   08 10 20 01  9a d5 7b 33  00 00 00
94  bf fe d8 35
Aug  5 07:35:50 mail pluto[27360]: |   3a 69 72 47  75 86 12 95  56 b1 99
aa  80 83 0e 56
Aug  5 07:35:50 mail pluto[27360]: |   f9 4f a2 ff  aa c7 cd 4e  73 2d 5b
69  bd 1b 35 bd
Aug  5 07:35:50 mail pluto[27360]: |   b7 42 21 c4  bf ca 71 e2  40 9f c6
bf  0e 3d 98 26
Aug  5 07:35:50 mail pluto[27360]: |   fc e2 09 1d  18 ff 33 20  73 4c 3d
2c  bf 4b 17 d5
Aug  5 07:35:50 mail pluto[27360]: |   07 d4 36 42  a4 13 4f 39  ba 25 40
b4  37 ee 20 84
Aug  5 07:35:50 mail pluto[27360]: |   9d 3c e8 3b  e0 96 81 94  27 14 e4
31  39 59 10 36
Aug  5 07:35:50 mail pluto[27360]: |   8f 43 64 7d  89 4e 8f bd  28 5b 4d
09  c4 8f 57 b7
Aug  5 07:35:50 mail pluto[27360]: |   d2 2c d5 1e
Aug  5 07:35:50 mail pluto[27360]: | inserting event EVENT_RETRANSMIT,
timeout in 10 seconds for #2
Aug  5 07:35:50 mail pluto[27360]: | next event EVENT_RETRANSMIT in 10
seconds for #2
Aug  5 07:35:50 mail pluto[27360]: |  
Aug  5 07:35:50 mail pluto[27360]: | *received 148 bytes from
91.112.190.238:500 on eth0 (port=500)
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |   08 10 20 01  9a d5 7b 33  00 00 00
94  98 39 ee 62
Aug  5 07:35:50 mail pluto[27360]: |   78 78 00 4f  12 3d 07 43  8c 50 57
d1  80 93 1d 5d
Aug  5 07:35:50 mail pluto[27360]: |   e9 23 14 ae  8f e2 08 2d  2d 86 b5
f8  c2 d5 53 c0
Aug  5 07:35:50 mail pluto[27360]: |   bd c0 4a a0  ad 47 36 3c  7e ce 5e
ff  d2 a2 f6 97
Aug  5 07:35:50 mail pluto[27360]: |   50 20 45 41  b0 1f 14 62  93 cf 39
d8  b6 a1 92 45
Aug  5 07:35:50 mail pluto[27360]: |   76 f0 03 37  0d 58 98 3c  6c 51 6a
3d  b2 dc 19 de
Aug  5 07:35:50 mail pluto[27360]: |   74 29 e1 89  fc 62 f6 a5  45 6b 95
ee  77 05 db c8
Aug  5 07:35:50 mail pluto[27360]: |   a0 a3 83 85  12 8e 88 a2  c0 3b 4e
60  9d be 39 6a
Aug  5 07:35:50 mail pluto[27360]: |   ac fc 2c 7a
Aug  5 07:35:50 mail pluto[27360]: | **parse ISAKMP Message:
Aug  5 07:35:50 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:50 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_HASH
Aug  5 07:35:50 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:50 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_QUICK
Aug  5 07:35:50 mail pluto[27360]: |    flags: ISAKMP_FLAG_ENCRYPTION
Aug  5 07:35:50 mail pluto[27360]: |    message ID:  9a d5 7b 33
Aug  5 07:35:50 mail pluto[27360]: |    length: 148
Aug  5 07:35:50 mail pluto[27360]: |  processing packet with exchange
type=ISAKMP_XCHG_QUICK (32)
Aug  5 07:35:50 mail pluto[27360]: | ICOOKIE:  bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: | RCOOKIE:  23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: | peer:  5b 70 be ee
Aug  5 07:35:50 mail pluto[27360]: | state hash entry 0
Aug  5 07:35:50 mail pluto[27360]: | peer and cookies match on #2, provided
msgid 9ad57b33 vs 9ad57b33
Aug  5 07:35:50 mail pluto[27360]: | state object #2 found, in
STATE_QUICK_I1
Aug  5 07:35:50 mail pluto[27360]: | processing connection edelweiss
Aug  5 07:35:50 mail pluto[27360]: | received encrypted packet from
91.112.190.238:500
Aug  5 07:35:50 mail pluto[27360]: | decrypting 120 bytes using algorithm
OAKLEY_3DES_CBC
Aug  5 07:35:50 mail pluto[27360]: | decrypted:
Aug  5 07:35:50 mail pluto[27360]: |   01 00 00 14  35 ff 37 bf  da 31 3a
97  e8 f6 d1 0d
Aug  5 07:35:50 mail pluto[27360]: |   0d 1a fc 9b  0a 00 00 30  00 00 00
01  00 00 00 01
Aug  5 07:35:50 mail pluto[27360]: |   00 00 00 24  00 03 04 01  08 4a ef
4b  00 00 00 18
Aug  5 07:35:50 mail pluto[27360]: |   00 03 00 00  80 04 00 01  80 01 00
01  80 02 0e 10
Aug  5 07:35:50 mail pluto[27360]: |   80 05 00 01  05 00 00 14  fa b1 9a
63  76 00 79 0e
Aug  5 07:35:50 mail pluto[27360]: |   3e 41 d1 35  27 02 17 20  05 00 00
10  04 00 00 00
Aug  5 07:35:50 mail pluto[27360]: |   c0 a8 06 00  ff ff ff 00  00 00 00
10  04 00 00 00
Aug  5 07:35:50 mail pluto[27360]: |   c0 a8 05 00  ff ff ff 00
Aug  5 07:35:50 mail pluto[27360]: | next IV:  9d be 39 6a  ac fc 2c 7a
Aug  5 07:35:50 mail pluto[27360]: | np=8 and sd=0x80d8338 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Hash Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_SA
Aug  5 07:35:50 mail pluto[27360]: |    length: 20
Aug  5 07:35:50 mail pluto[27360]: | np=1 and sd=0x80d8800 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Security Association
Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type:
ISAKMP_NEXT_NONCE
Aug  5 07:35:50 mail pluto[27360]: |    length: 48
Aug  5 07:35:50 mail pluto[27360]: |    DOI: ISAKMP_DOI_IPSEC
Aug  5 07:35:50 mail pluto[27360]: | np=10 and sd=0x80d8320 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Nonce Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_ID
Aug  5 07:35:50 mail pluto[27360]: |    length: 20
Aug  5 07:35:50 mail pluto[27360]: | np=5 and sd=(nil) 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Identification Payload
(IPsec DOI):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_ID
Aug  5 07:35:50 mail pluto[27360]: |    length: 16
Aug  5 07:35:50 mail pluto[27360]: |    ID type: ID_IPV4_ADDR_SUBNET
Aug  5 07:35:50 mail pluto[27360]: |    Protocol ID: 0
Aug  5 07:35:50 mail pluto[27360]: |    port: 0
Aug  5 07:35:50 mail pluto[27360]: | np=5 and sd=(nil) 
Aug  5 07:35:50 mail pluto[27360]: | ***parse ISAKMP Identification Payload
(IPsec DOI):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    length: 16
Aug  5 07:35:50 mail pluto[27360]: |    ID type: ID_IPV4_ADDR_SUBNET
Aug  5 07:35:50 mail pluto[27360]: |    Protocol ID: 0
Aug  5 07:35:50 mail pluto[27360]: |    port: 0
Aug  5 07:35:50 mail pluto[27360]: | **emit ISAKMP Message:
Aug  5 07:35:50 mail pluto[27360]: |    initiator cookie:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20
Aug  5 07:35:50 mail pluto[27360]: |    responder cookie:
Aug  5 07:35:50 mail pluto[27360]: |   23 de a8 6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_HASH
Aug  5 07:35:50 mail pluto[27360]: |    ISAKMP version: ISAKMP Version 1.0
Aug  5 07:35:50 mail pluto[27360]: |    exchange type: ISAKMP_XCHG_QUICK
Aug  5 07:35:50 mail pluto[27360]: |    flags: ISAKMP_FLAG_ENCRYPTION
Aug  5 07:35:50 mail pluto[27360]: |    message ID:  9a d5 7b 33
Aug  5 07:35:50 mail pluto[27360]: | HASH(2) computed:
Aug  5 07:35:50 mail pluto[27360]: |   35 ff 37 bf  da 31 3a 97  e8 f6 d1
0d  0d 1a fc 9b
Aug  5 07:35:50 mail pluto[27360]: | ****parse IPsec DOI SIT:
Aug  5 07:35:50 mail pluto[27360]: |    IPsec DOI SIT: SIT_IDENTITY_ONLY
Aug  5 07:35:50 mail pluto[27360]: | ****parse ISAKMP Proposal Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    length: 36
Aug  5 07:35:50 mail pluto[27360]: |    proposal number: 0
Aug  5 07:35:50 mail pluto[27360]: |    protocol ID: PROTO_IPSEC_ESP
Aug  5 07:35:50 mail pluto[27360]: |    SPI size: 4
Aug  5 07:35:50 mail pluto[27360]: |    number of transforms: 1
Aug  5 07:35:50 mail pluto[27360]: | parsing 4 raw bytes of ISAKMP Proposal
Payload into SPI
Aug  5 07:35:50 mail pluto[27360]: | SPI  08 4a ef 4b
Aug  5 07:35:50 mail pluto[27360]: | *****parse ISAKMP Transform Payload
(ESP):
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: |    length: 24
Aug  5 07:35:50 mail pluto[27360]: |    transform number: 0
Aug  5 07:35:50 mail pluto[27360]: |    transform ID: ESP_3DES
Aug  5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: ENCAPSULATION_MODE
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:50 mail pluto[27360]: |    [1 is ENCAPSULATION_MODE_TUNNEL]
Aug  5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: SA_LIFE_TYPE
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:50 mail pluto[27360]: |    [1 is SA_LIFE_TYPE_SECONDS]
Aug  5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: SA_LIFE_DURATION
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 3600
Aug  5 07:35:50 mail pluto[27360]: | ******parse ISAKMP IPsec DOI
attribute:
Aug  5 07:35:50 mail pluto[27360]: |    af+type: AUTH_ALGORITHM
Aug  5 07:35:50 mail pluto[27360]: |    length/value: 1
Aug  5 07:35:50 mail pluto[27360]: |    [1 is AUTH_ALGORITHM_HMAC_MD5]
Aug  5 07:35:50 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug  5 07:35:50 mail pluto[27360]: | kernel_alg_esp_enc_keylen():alg_id=3,
keylen=24
Aug  5 07:35:50 mail pluto[27360]: | our client is subnet 192.168.6.0/24
Aug  5 07:35:50 mail pluto[27360]: | our client protocol/port is 0/0
Aug  5 07:35:50 mail pluto[27360]: | peer client is subnet 192.168.5.0/24
Aug  5 07:35:50 mail pluto[27360]: | peer client protocol/port is 0/0
Aug  5 07:35:50 mail pluto[27360]: | ***emit ISAKMP Hash Payload:
Aug  5 07:35:50 mail pluto[27360]: |    next payload type: ISAKMP_NEXT_NONE
Aug  5 07:35:50 mail pluto[27360]: | emitting 16 zero bytes of HASH into
ISAKMP Hash Payload
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Hash
Payload: 20
Aug  5 07:35:50 mail pluto[27360]: | HASH(3) computed:  48 f3 e3 d3  55 bd
39 4e  36 a6 13 65  aa ac 92 c2
Aug  5 07:35:50 mail pluto[27360]: | compute_proto_keymat:needed_len (after
ESP enc)=24
Aug  5 07:35:50 mail pluto[27360]: | compute_proto_keymat:needed_len (after
ESP auth)=40
Aug  5 07:35:50 mail pluto[27360]: | KEYMAT computed:
Aug  5 07:35:50 mail pluto[27360]: |   24 61 70 71  28 1b a2 67  44 98 7a
52  d6 a0 d6 c4
Aug  5 07:35:50 mail pluto[27360]: |   06 03 21 dc  32 62 58 87  02 1e 73
9c  8b a8 4a 35
Aug  5 07:35:50 mail pluto[27360]: |   21 60 d6 b0  c2 6d 33 13
Aug  5 07:35:50 mail pluto[27360]: | Peer KEYMAT computed:
Aug  5 07:35:50 mail pluto[27360]: |   6e 68 17 37  e3 b8 10 de  40 09 05
1f  43 9c 30 22
Aug  5 07:35:50 mail pluto[27360]: |   93 69 e5 14  c1 76 8c cc  b1 07 99
66  f1 1a c0 8a
Aug  5 07:35:50 mail pluto[27360]: |   97 b3 ac ec  4c 49 86 0b
Aug  5 07:35:50 mail pluto[27360]: | install_ipsec_sa() for #2: inbound and
outbound
Aug  5 07:35:50 mail pluto[27360]: | route owner of "edelweiss" prospective
erouted: self; eroute owner: self
Aug  5 07:35:50 mail pluto[27360]: | could_route called for edelweiss
(kind=CK_PERMANENT)
Aug  5 07:35:50 mail pluto[27360]: | looking for alg with transid: 3
keylen: 0 auth: 1 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 1

Aug  5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 2

Aug  5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 0 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 1 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 2 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 0

Aug  5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 1

Aug  5 07:35:50 mail pluto[27360]: | add inbound eroute 192.168.5.0/24:0
--0-> 192.168.6.0/24:0 => tun.10000 at 83.218.162.44 (raw_eroute)
Aug  5 07:35:50 mail pluto[27360]: | looking for alg with transid: 3
keylen: 0 auth: 1 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 1

Aug  5 07:35:50 mail pluto[27360]: | checking transid: 11 keylen: 0 auth: 2

Aug  5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 0 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 1 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 2 keylen: 8 auth: 2 
Aug  5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 0

Aug  5 07:35:50 mail pluto[27360]: | checking transid: 3 keylen: 24 auth: 1

Aug  5 07:35:50 mail pluto[27360]: | sr for #2: prospective erouted
Aug  5 07:35:50 mail pluto[27360]: | route owner of "edelweiss" prospective
erouted: self; eroute owner: self
Aug  5 07:35:50 mail pluto[27360]: | route_and_eroute with c: edelweiss
(next: none) ero:edelweiss esr:{(nil)} ro:edelweiss rosr:{(nil)} and state:
2
Aug  5 07:35:50 mail pluto[27360]: | eroute_connection replace eroute
192.168.6.0/24:0 --0-> 192.168.5.0/24:0 => tun.0 at 91.112.190.238
(raw_eroute)
Aug  5 07:35:50 mail pluto[27360]: | command executing up-client
Aug  5 07:35:50 mail pluto[27360]: | executing up-client: 2>&1
PLUTO_VERSION='1.1' PLUTO_VERB='up-client' PLUTO_CONNECTION='edelweiss'
PLUTO_NEXT_HOP='83.218.162.62' PLUTO_INTERFACE='eth0'
PLUTO_ME='83.218.162.44' PLUTO_MY_ID='83.218.162.44'
PLUTO_MY_CLIENT='192.168.6.0/24' PLUTO_MY_CLIENT_NET='192.168.6.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL='0' PLUTO_PEER='91.112.190.238'
PLUTO_PEER_ID='91.112.190.238' PLUTO_PEER_CLIENT='192.168.5.0/24'
PLUTO_PEER_CLIENT_NET='192.168.5.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP'   ipsec _updown
Aug  5 07:35:50 mail pluto[27360]: | route_and_eroute: firewall_notified:
true
Aug  5 07:35:50 mail pluto[27360]: | route_and_eroute: instance
"edelweiss", setting eroute_owner {spd=0x95656ec,sr=0x95656ec} to #2 (was
#0) (newest_ipsec_sa=#0)
Aug  5 07:35:50 mail pluto[27360]: | encrypting:
Aug  5 07:35:50 mail pluto[27360]: |   00 00 00 14  48 f3 e3 d3  55 bd 39
4e  36 a6 13 65
Aug  5 07:35:50 mail pluto[27360]: |   aa ac 92 c2
Aug  5 07:35:50 mail pluto[27360]: | IV:
Aug  5 07:35:50 mail pluto[27360]: |   9d be 39 6a  ac fc 2c 7a
Aug  5 07:35:50 mail pluto[27360]: | emitting 4 zero bytes of encryption
padding into ISAKMP Message
Aug  5 07:35:50 mail pluto[27360]: | encrypting using OAKLEY_3DES_CBC
Aug  5 07:35:50 mail pluto[27360]: | next IV:  b3 71 1e 69  15 73 d7 3e
Aug  5 07:35:50 mail pluto[27360]: | emitting length of ISAKMP Message: 52
Aug  5 07:35:50 mail pluto[27360]: | inR1_outI2: instance edelweiss[0],
setting newest_ipsec_sa to #2 (was #0) (spd.eroute=#2)
Aug  5 07:35:50 mail pluto[27360]: | complete state transition with STF_OK
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #2: transition from state
STATE_QUICK_I1 to state STATE_QUICK_I2
Aug  5 07:35:50 mail pluto[27360]: | sending reply packet to
91.112.190.238:500 (from port=500)
Aug  5 07:35:50 mail pluto[27360]: | sending 52 bytes for STATE_QUICK_I1
through eth0:500 to 91.112.190.238:500:
Aug  5 07:35:50 mail pluto[27360]: |   bc 84 5c f3  50 d2 4c 20  23 de a8
6f  dc 64 e4 7a
Aug  5 07:35:50 mail pluto[27360]: |   08 10 20 01  9a d5 7b 33  00 00 00
34  30 55 08 05
Aug  5 07:35:50 mail pluto[27360]: |   6d 09 7b 39  4d 31 41 27  95 1c 08
c0  b3 71 1e 69
Aug  5 07:35:50 mail pluto[27360]: |   15 73 d7 3e
Aug  5 07:35:50 mail pluto[27360]: | inserting event EVENT_SA_REPLACE,
timeout in 2721 seconds for #2
Aug  5 07:35:50 mail pluto[27360]: "edelweiss" #2: STATE_QUICK_I2: sent
QI2, IPsec SA established {ESP=>0x084aef4b <0x6778d334 xfrm=3DES_0-HMAC_MD5
NATD=none DPD=none}
Aug  5 07:35:50 mail pluto[27360]: | modecfg pull: noquirk policy:push
not-client
Aug  5 07:35:50 mail pluto[27360]: | phase 1 is done, looking for phase 1
to unpend
Aug  5 07:35:50 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 119
seconds
Aug  5 07:37:49 mail pluto[27360]: |  
Aug  5 07:37:49 mail pluto[27360]: | *time to handle event
Aug  5 07:37:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:37:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2602 seconds
Aug  5 07:37:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:37:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:37:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:39:49 mail pluto[27360]: |  
Aug  5 07:39:49 mail pluto[27360]: | *time to handle event
Aug  5 07:39:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:39:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2482 seconds
Aug  5 07:39:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:39:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:39:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:41:49 mail pluto[27360]: |  
Aug  5 07:41:49 mail pluto[27360]: | *time to handle event
Aug  5 07:41:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:41:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2362 seconds
Aug  5 07:41:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:41:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:41:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:43:49 mail pluto[27360]: |  
Aug  5 07:43:49 mail pluto[27360]: | *time to handle event
Aug  5 07:43:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:43:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2242 seconds
Aug  5 07:43:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:43:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:43:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:45:49 mail pluto[27360]: |  
Aug  5 07:45:49 mail pluto[27360]: | *time to handle event
Aug  5 07:45:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:45:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2122 seconds
Aug  5 07:45:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:45:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:45:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:47:49 mail pluto[27360]: |  
Aug  5 07:47:49 mail pluto[27360]: | *time to handle event
Aug  5 07:47:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:47:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 2002 seconds
Aug  5 07:47:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:47:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:47:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:48:19 mail pluto[27360]: |  
Aug  5 07:48:19 mail pluto[27360]: | *received whack message
Aug  5 07:48:19 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug  5 07:48:19 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 90
seconds
Aug  5 07:49:49 mail pluto[27360]: |  
Aug  5 07:49:49 mail pluto[27360]: | *time to handle event
Aug  5 07:49:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:49:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1882 seconds
Aug  5 07:49:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:49:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:49:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:51:49 mail pluto[27360]: |  
Aug  5 07:51:49 mail pluto[27360]: | *time to handle event
Aug  5 07:51:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:51:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1762 seconds
Aug  5 07:51:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:51:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:51:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:53:49 mail pluto[27360]: |  
Aug  5 07:53:49 mail pluto[27360]: | *time to handle event
Aug  5 07:53:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:53:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1642 seconds
Aug  5 07:53:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:53:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:53:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:55:49 mail pluto[27360]: |  
Aug  5 07:55:49 mail pluto[27360]: | *time to handle event
Aug  5 07:55:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:55:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1522 seconds
Aug  5 07:55:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:55:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:55:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:57:49 mail pluto[27360]: |  
Aug  5 07:57:49 mail pluto[27360]: | *time to handle event
Aug  5 07:57:49 mail pluto[27360]: | handling event EVENT_PENDING_PHASE2
Aug  5 07:57:49 mail pluto[27360]: | event after this is EVENT_SA_REPLACE
in 1402 seconds
Aug  5 07:57:49 mail pluto[27360]: | inserting event EVENT_PENDING_PHASE2,
timeout in 120 seconds
Aug  5 07:57:49 mail pluto[27360]: | pending review: connection "edelweiss"
checked
Aug  5 07:57:49 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 120
seconds
Aug  5 07:59:06 mail pluto[27360]: |  
Aug  5 07:59:06 mail pluto[27360]: | *received whack message
Aug  5 07:59:06 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug  5 07:59:06 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 43
seconds
Aug  5 07:59:06 mail pluto[27360]: |  
Aug  5 07:59:06 mail pluto[27360]: | *received whack message
Aug  5 07:59:06 mail pluto[27360]: | kernel_alg_esp_enc_ok(3,0): alg_id=3,
alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
Aug  5 07:59:06 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 43
seconds
Aug  5 07:59:06 mail pluto[27360]: |  
Aug  5 07:59:06 mail pluto[27360]: | *received whack message
Aug  5 07:59:06 mail pluto[27360]: | next event EVENT_PENDING_PHASE2 in 43
seconds
+ _________________________ date
+ date
Tue Aug  5 07:59:06 CEST 2008




More information about the Users mailing list