[Openswan Users] Connection aborts
Peter McGill
petermcgill at goco.net
Wed Feb 4 09:03:23 EST 2009
Robert,
Turn off plutodebug and klipsdebug, they hinder more than help debugging
most of the time. They are meant for developers not users.
#plutodebug=none
#klipsdebug=none
Since the other side is sending you a Delete message, then you'll have
to look at it's logs to see why it's doing that. Openswan will honour
the delete request and not try to reconnect, even with auto=start or
dpdaction=restart. The only way to restart a connection after the other
side has terminated it with a Delete message is to manually reconnect.
ipsec auto --start conn-name
Peter
Robert Borz wrote:
> Ok, now I fetched the last part from the log, when the connection gets stalled. It seems the consumer router tries to delete the SA?
>
> What's wrong here? Any idea?
>
> Feb 4 09:58:31 vpn pluto[15879]: "**********" #1: received Delete SA(0xd3b1a629) payload: deleting IPSEC State #2
> Feb 4 09:58:31 vpn pluto[15879]: | deleting state #2
> Feb 4 09:58:31 vpn pluto[15879]: | processing connection **********
> Feb 4 09:58:31 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:58:31 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:58:31 vpn pluto[15879]: | b5 f6 fb da ac 17 cd bd
> Feb 4 09:58:31 vpn pluto[15879]: | responder cookie:
> Feb 4 09:58:31 vpn pluto[15879]: | 71 41 ab 8d 3f 79 5d cb
> Feb 4 09:58:31 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:58:31 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:58:31 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_INFO
> Feb 4 09:58:31 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:58:31 vpn pluto[15879]: | message ID: de 8a 1e be
> Feb 4 09:58:31 vpn pluto[15879]: | ***emit ISAKMP Hash Payload:
> Feb 4 09:58:31 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_D
> Feb 4 09:58:31 vpn pluto[15879]: | emitting 20 zero bytes of HASH(1) into ISAKMP Hash Payload
> Feb 4 09:58:31 vpn pluto[15879]: | emitting length of ISAKMP Hash Payload: 24
> Feb 4 09:58:31 vpn pluto[15879]: | ***emit ISAKMP Delete Payload:
> Feb 4 09:58:31 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:58:31 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:58:31 vpn pluto[15879]: | protocol ID: 3
> Feb 4 09:58:31 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:58:31 vpn pluto[15879]: | number of SPIs: 1
> Feb 4 09:58:31 vpn pluto[15879]: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload
> Feb 4 09:58:31 vpn pluto[15879]: | delete payload da 4a e1 f5
> Feb 4 09:58:31 vpn pluto[15879]: | emitting length of ISAKMP Delete Payload: 16
> Feb 4 09:58:31 vpn pluto[15879]: | HASH(1) computed:
> Feb 4 09:58:31 vpn pluto[15879]: | 4f 22 78 11 be 56 ef 1a a2 59 62 bf b0 c7 16 ff
> Feb 4 09:58:31 vpn pluto[15879]: | ce 02 e5 38
> Feb 4 09:58:31 vpn pluto[15879]: | last Phase 1 IV: 6f eb 5a 95 e6 99 fd df
> Feb 4 09:58:31 vpn pluto[15879]: | current Phase 1 IV: 6f eb 5a 95 e6 99 fd df
> Feb 4 09:58:31 vpn pluto[15879]: | computed Phase 2 IV:
> Feb 4 09:58:31 vpn pluto[15879]: | 0b 26 3c 08 98 a4 1e a3 8c b8 c2 98 af 17 e8 3f
> Feb 4 09:58:31 vpn pluto[15879]: | ef 48 c2 fd
> Feb 4 09:58:31 vpn pluto[15879]: | encrypting:
> Feb 4 09:58:31 vpn pluto[15879]: | 0c 00 00 18 4f 22 78 11 be 56 ef 1a a2 59 62 bf
> Feb 4 09:58:31 vpn pluto[15879]: | b0 c7 16 ff ce 02 e5 38 00 00 00 10 00 00 00 01
> Feb 4 09:58:31 vpn pluto[15879]: | 03 04 00 01 da 4a e1 f5
> Feb 4 09:58:31 vpn pluto[15879]: | IV:
> Feb 4 09:58:31 vpn pluto[15879]: | 0b 26 3c 08 98 a4 1e a3 8c b8 c2 98 af 17 e8 3f
> Feb 4 09:58:31 vpn pluto[15879]: | ef 48 c2 fd
> Feb 4 09:58:31 vpn pluto[15879]: | encrypting using OAKLEY_3DES_CBC
> Feb 4 09:58:31 vpn pluto[15879]: | next IV: cf 10 9c 00 ac 98 b0 44
> Feb 4 09:58:31 vpn pluto[15879]: | emitting length of ISAKMP Message: 68
> Feb 4 09:58:31 vpn pluto[15879]: | sending 68 bytes for delete notify through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:58:31 vpn pluto[15879]: | b5 f6 fb da ac 17 cd bd 71 41 ab 8d 3f 79 5d cb
> Feb 4 09:58:31 vpn pluto[15879]: | 08 10 05 01 de 8a 1e be 00 00 00 44 aa 52 1b d7
> Feb 4 09:58:31 vpn pluto[15879]: | 19 69 fe 3e b6 5f 97 fd a5 0d 57 3a b1 9b ea 20
> Feb 4 09:58:31 vpn pluto[15879]: | 94 5d 9b a7 b7 f9 2b 41 5e 93 fc 7b cf 10 9c 00
> Feb 4 09:58:31 vpn pluto[15879]: | ac 98 b0 44
> Feb 4 09:58:31 vpn pluto[15879]: | no suspended cryptographic state for 2
> Feb 4 09:58:31 vpn pluto[15879]: | delete esp.d3b1a629 at 79.207.134.254
> Feb 4 09:58:31 vpn pluto[15879]: | delete esp.da4ae1f5 at 84.154.56.62
> Feb 4 09:58:31 vpn pluto[15879]: | del: d3 b1 a6 29
> Feb 4 09:58:31 vpn pluto[15879]: "**********" #1: received and ignored informational message
> Feb 4 09:58:31 vpn pluto[15879]: | complete state transition with STF_IGNORE
> Feb 4 09:58:31 vpn pluto[15879]: | next event EVENT_REINIT_SECRET in 101 seconds
> Feb 4 09:58:31 vpn pluto[15879]: |
> Feb 4 09:58:31 vpn pluto[15879]: | *received 68 bytes from 79.207.134.254:500 on ppp0 (port=500)
> Feb 4 09:58:31 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:58:31 vpn pluto[15879]: | 08 10 05 01 3b 23 55 54 00 00 00 44 c6 2c c3 12
> Feb 4 09:58:31 vpn pluto[15879]: | d7 6d 65 dd d1 30 db d5 74 e8 46 ec 0c e4 c2 bc
> Feb 4 09:58:31 vpn pluto[15879]: | 37 b8 e7 ea 27 fe 3b b7 74 fa 5d a9 b0 99 41 a0
> Feb 4 09:58:31 vpn pluto[15879]: | 85 1d b1 a0
> Feb 4 09:58:31 vpn pluto[15879]: | **parse ISAKMP Message:
> Feb 4 09:58:31 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:58:31 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:58:31 vpn pluto[15879]: | responder cookie:
> Feb 4 09:58:31 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:58:31 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:58:31 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:58:31 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_INFO
> Feb 4 09:58:31 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:58:31 vpn pluto[15879]: | message ID: 3b 23 55 54
> Feb 4 09:58:31 vpn pluto[15879]: | length: 68
> Feb 4 09:58:31 vpn pluto[15879]: | processing packet with exchange type=ISAKMP_XCHG_INFO (5)
> Feb 4 09:58:31 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:58:31 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:58:31 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:58:31 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:58:31 vpn pluto[15879]: | peer and cookies match on #3, provided msgid 00000000 vs 95289516/00000000
> Feb 4 09:58:31 vpn pluto[15879]: | peer and cookies match on #1, provided msgid 00000000 vs 00000000/00000000
> Feb 4 09:58:31 vpn pluto[15879]: | p15 state object #1 found, in STATE_AGGR_I2
> Feb 4 09:58:31 vpn pluto[15879]: | processing connection **********
> Feb 4 09:58:31 vpn pluto[15879]: | last Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:58:31 vpn pluto[15879]: | current Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:58:31 vpn pluto[15879]: | computed Phase 2 IV:
> Feb 4 09:58:31 vpn pluto[15879]: | f2 5d ec cb 86 f4 46 84 8d 20 29 5b 22 94 61 38
> Feb 4 09:58:31 vpn pluto[15879]: | c9 89 c9 ca
> Feb 4 09:58:31 vpn pluto[15879]: | received encrypted packet from 79.207.134.254:500
> Feb 4 09:58:31 vpn pluto[15879]: | decrypting 40 bytes using algorithm OAKLEY_3DES_CBC
> Feb 4 09:58:31 vpn pluto[15879]: | decrypted:
> Feb 4 09:58:31 vpn pluto[15879]: | 0c 00 00 18 17 6b b6 27 91 f5 bc 3f 5d 7e 3d 46
> Feb 4 09:58:31 vpn pluto[15879]: | e6 56 79 92 83 2b 38 6e 00 00 00 10 00 00 00 01
> Feb 4 09:58:31 vpn pluto[15879]: | 03 04 00 01 da 4a e1 f5
> Feb 4 09:58:31 vpn pluto[15879]: | next IV: b0 99 41 a0 85 1d b1 a0
> Feb 4 09:58:31 vpn pluto[15879]: | np=8 and sd=0x80eae50
> Feb 4 09:58:31 vpn pluto[15879]: | ***parse ISAKMP Hash Payload:
> Feb 4 09:58:31 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_D
> Feb 4 09:58:31 vpn pluto[15879]: | length: 24
> Feb 4 09:58:31 vpn pluto[15879]: | np=12 and sd=0x80eae80
> Feb 4 09:58:31 vpn pluto[15879]: | ***parse ISAKMP Delete Payload:
> Feb 4 09:58:31 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:58:31 vpn pluto[15879]: | length: 16
> Feb 4 09:58:31 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:58:31 vpn pluto[15879]: | protocol ID: 3
> Feb 4 09:58:31 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:58:31 vpn pluto[15879]: | number of SPIs: 1
> Feb 4 09:58:31 vpn pluto[15879]: "**********" #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xda4ae1f5) not found (maybe expired)
> Feb 4 09:58:31 vpn pluto[15879]: | del: da 4a e1 f5
> Feb 4 09:58:31 vpn pluto[15879]: "**********" #1: received and ignored informational message
> Feb 4 09:58:31 vpn pluto[15879]: | complete state transition with STF_IGNORE
> Feb 4 09:58:31 vpn pluto[15879]: | next event EVENT_REINIT_SECRET in 101 seconds
>
> -----Original Message-----
> From: users-bounces at openswan.org [mailto:users-bounces at openswan.org] On Behalf Of Robert Borz
> Sent: Wednesday, February 04, 2009 9:39 AM
> To: users at openswan.org
> Subject: [Openswan Users] Connection aborts
>
> Hi,
>
> I'm using Openswan on Debian Lenny/5.0 with the shipped 2.6.26-1-686 kernel. I got a connection up and running between this box and a consumer router (AVM FRITZ!Box 7270).
>
> Both sides have public IP addresses, changing every day. So I created DynDNS accounts for them.
>
> The connection comes up and my routing table shows:
> 192.168.1.0/24 dev ppp0 scope link src 192.168.0.1
>
> Finally I'm able to send pings and other traffic from each side to the other, great! :-)
>
> But after some time, the connection gets stalled and won't get up anymore.
>
> Here's my configuration and auth.log file on my linux box. At the end I also attached the configuration for the consumer router on the other end.
>
> Maybe there's something unusual in there? Any hint would be really appreciated...
>
>
> Robert.
>
>
> ------------------------------ ipsec.conf ------------------------------
> version 2.0 # conforms to second version of ipsec.conf specification
>
> config setup
> interfaces=%defaultroute
> plutodebug=all
> klipsdebug=all
> nat_traversal=no
> virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
>
> conn **********
> auto = start
> leftid = @************************
> left = %defaultroute
> leftsubnet = 192.168.0.0/24
> leftsourceip = 192.168.0.1
> rightid = @**********
> right = **********.dyndns.org
> rightsubnet = 192.168.1.0/24
> rightsourceip = 192.168.1.1
> authby = secret
> aggrmode = yes
> ike = 3des-sha1-modp1024,3des-sha1-modp1536,aes-sha1-modp1024,aes-sha1-modp1536
> pfs = yes
>
> # Disable Opportunistic Encryption
> include /etc/ipsec.d/examples/no_oe.conf
> ------------------------------------------------------------------------
>
>
>
> ------------------------------- auth.log -------------------------------
> Feb 4 09:00:12 vpn ipsec__plutorun: Starting Pluto subsystem...
> Feb 4 09:00:12 vpn ipsec__plutorun: Unknown default RSA hostkey scheme, not generating a default hostkey
> Feb 4 09:00:12 vpn pluto[15879]: Starting Pluto (Openswan Version 2.4.12 LDAP_V3 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE`lPH|Vbpuu)
> Feb 4 09:00:12 vpn pluto[15879]: Setting NAT-Traversal port-4500 floating to off
> Feb 4 09:00:12 vpn pluto[15879]: port floating activation criteria nat_t=0/port_fload=1
> Feb 4 09:00:12 vpn pluto[15879]: including NAT-Traversal patch (Version 0.6c) [disabled]
> Feb 4 09:00:12 vpn pluto[15879]: | opening /dev/urandom
> Feb 4 09:00:12 vpn pluto[15879]: | inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds
> Feb 4 09:00:12 vpn pluto[15879]: | inserting event EVENT_PENDING_PHASE2, timeout in 120 seconds
> Feb 4 09:00:12 vpn pluto[15879]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
> Feb 4 09:00:12 vpn pluto[15879]: starting up 1 cryptographic helpers
> Feb 4 09:00:12 vpn pluto[15879]: started helper pid=15887 (fd:6)
> Feb 4 09:00:12 vpn pluto[15887]: | opening /dev/urandom
> Feb 4 09:00:12 vpn pluto[15879]: | process 15879 listening for PF_KEY_V2 on file descriptor 7
> Feb 4 09:00:12 vpn pluto[15887]: | certs and keys locked by 'free_preshared_secrets'
> Feb 4 09:00:12 vpn pluto[15879]: Using NETKEY IPsec interface code on 2.6.26-1-686
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build:
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfcf97e0 pfkey_ext=0p0xbfcfa800 *pfkey_ext=0p(nil).
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfcf97e0 pfkey_ext=0p0xbfcfa800 *pfkey_ext=0p0x88393e8.
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8839400 allocated 16 bytes, &(extensions[0])=0p0xbfcfa800
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_build: extensions permitted=00000001, seen=00000001, required=00000001.
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=2(AH), len=2, res=0, seq=1, pid=15879.
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: remain=0
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, required=00000001.
> Feb 4 09:00:12 vpn pluto[15887]: | certs and keys unlocked by 'free_preshard_secrets'
> Feb 4 09:00:12 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, seen=00000001, required=00000001.
> Feb 4 09:00:12 vpn pluto[15879]: | finish_pfkey_msg: SADB_REGISTER message 1 for AH
> Feb 4 09:00:12 vpn pluto[15887]: ! helper 0 waiting on fd: 7
> Feb 4 09:00:12 vpn pluto[15879]: | 02 07 00 02 02 00 00 00 01 00 00 00 07 3e 00 00
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_get: SADB_REGISTER message 1
> Feb 4 09:00:18 vpn pluto[15879]: | AH registered with kernel.
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build:
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfcf97e0 pfkey_ext=0p0xbfcfa800 *pfkey_ext=0p(nil).
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfcf97e0 pfkey_ext=0p0xbfcfa800 *pfkey_ext=0p0x88393e8.
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8839400 allocated 16 bytes, &(extensions[0])=0p0xbfcfa800
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_build: extensions permitted=00000001, seen=00000001, required=00000001.
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=3(ESP), len=2, res=0, seq=2, pid=15879.
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: remain=0
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, required=00000001.
> Feb 4 09:00:18 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, seen=00000001, required=00000001.
> Feb 4 09:00:18 vpn pluto[15879]: | finish_pfkey_msg: SADB_REGISTER message 2 for ESP
> Feb 4 09:00:18 vpn pluto[15879]: | 02 07 00 03 02 00 00 00 02 00 00 00 07 3e 00 00
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_get: SADB_REGISTER message 2
> Feb 4 09:00:22 vpn pluto[15879]: | alg_init():memset(0x8102e80, 0, 2016) memset(0x8103660, 0, 2048)
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=18 sadb_supported_len=48
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=14, alg_id=251
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=14, alg_id=2
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=14, alg_id=3
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=14, alg_id=5
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=14, alg_id=9
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14, satype=3, alg_id=9, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=18 sadb_supported_len=80
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=11
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=15, satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=2
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=3
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=7
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=12
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=252
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=22
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15, satype=3, alg_id=22, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=253
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15, satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_add():satype=3, exttype=15, alg_id=13
> Feb 4 09:00:22 vpn pluto[15879]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15, satype=3, alg_id=13, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
> Feb 4 09:00:22 vpn pluto[15879]: | ESP registered with kernel.
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build:
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbfcf97e0 pfkey_ext=0p0xbfcfa800 *pfkey_ext=0p(nil).
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbfcf97e0 pfkey_ext=0p0xbfcfa800 *pfkey_ext=0p0x88393e8.
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8839400 allocated 16 bytes, &(extensions[0])=0p0xbfcfa800
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_build: extensions permitted=00000001, seen=00000001, required=00000001.
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=9(IPIP), len=2, res=0, seq=3, pid=15879.
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: remain=0
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, required=00000001.
> Feb 4 09:00:22 vpn pluto[15879]: | pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, seen=00000001, required=00000001.
> Feb 4 09:00:22 vpn pluto[15879]: | finish_pfkey_msg: SADB_REGISTER message 3 for IPCOMP
> Feb 4 09:00:22 vpn pluto[15879]: | 02 07 00 09 02 00 00 00 03 00 00 00 07 3e 00 00
> Feb 4 09:00:26 vpn pluto[15879]: | pfkey_get: SADB_REGISTER message 3
> Feb 4 09:00:26 vpn pluto[15879]: | IPCOMP registered with kernel.
> Feb 4 09:00:26 vpn pluto[15879]: Changing to directory '/etc/ipsec.d/cacerts'
> Feb 4 09:00:26 vpn pluto[15879]: Changing to directory '/etc/ipsec.d/aacerts'
> Feb 4 09:00:26 vpn pluto[15879]: Changing to directory '/etc/ipsec.d/ocspcerts'
> Feb 4 09:00:26 vpn pluto[15879]: Changing to directory '/etc/ipsec.d/crls'
> Feb 4 09:00:26 vpn pluto[15879]: Warning: empty directory
> Feb 4 09:00:26 vpn pluto[15879]: | inserting event EVENT_LOG_DAILY, timeout in 53974 seconds
> Feb 4 09:00:26 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 106 seconds
> Feb 4 09:00:26 vpn pluto[15879]: |
> Feb 4 09:00:26 vpn pluto[15879]: | *received whack message
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys locked by 'free_preshared_secrets'
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys unlocked by 'free_preshard_secrets'
> Feb 4 09:00:26 vpn pluto[15879]: loading secrets from "/etc/ipsec.secrets"
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys locked by 'process_secret'
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys unlocked by 'process_secrets'
> Feb 4 09:00:26 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 106 seconds
> Feb 4 09:00:26 vpn pluto[15879]: |
> Feb 4 09:00:26 vpn pluto[15879]: | *received whack message
> Feb 4 09:00:26 vpn pluto[15879]: | alg_info_parse_str() ealg_buf=3des aalg_buf=sha1eklen=0 aklen=0
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4420, "OAKLEY_3DES")
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_ppfixi () calling enum_search(0x80e4420, "OAKLEY_3DES_CBC")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() ealg_getbyname("3des")=5
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4440, "OAKLEY_SHA1")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() aalg_getbyname("sha1")=2
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4470, "OAKLEY_GROUP_MODP1024")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() modp_getbyname("modp1024")=2
> Feb 4 09:00:26 vpn pluto[15879]: | __alg_info_ike_add() ealg=5 aalg=2 modp_id=2, cnt=1
> Feb 4 09:00:26 vpn pluto[15879]: | alg_info_parse_str() ealg_buf=3des aalg_buf=sha1eklen=0 aklen=0
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4420, "OAKLEY_3DES")
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_ppfixi () calling enum_search(0x80e4420, "OAKLEY_3DES_CBC")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() ealg_getbyname("3des")=5
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4440, "OAKLEY_SHA1")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() aalg_getbyname("sha1")=2
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4470, "OAKLEY_GROUP_MODP1536")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() modp_getbyname("modp1536")=5
> Feb 4 09:00:26 vpn pluto[15879]: | __alg_info_ike_add() ealg=5 aalg=2 modp_id=5, cnt=2
> Feb 4 09:00:26 vpn pluto[15879]: | alg_info_parse_str() ealg_buf=aes aalg_buf=sha1eklen=0 aklen=0
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4420, "OAKLEY_AES")
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_ppfixi () calling enum_search(0x80e4420, "OAKLEY_AES_CBC")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() ealg_getbyname("aes")=7
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4440, "OAKLEY_SHA1")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() aalg_getbyname("sha1")=2
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4470, "OAKLEY_GROUP_MODP1024")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() modp_getbyname("modp1024")=2
> Feb 4 09:00:26 vpn pluto[15879]: | __alg_info_ike_add() ealg=7 aalg=2 modp_id=2, cnt=3
> Feb 4 09:00:26 vpn pluto[15879]: | alg_info_parse_str() ealg_buf=aes aalg_buf=sha1eklen=0 aklen=0
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4420, "OAKLEY_AES")
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_ppfixi () calling enum_search(0x80e4420, "OAKLEY_AES_CBC")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() ealg_getbyname("aes")=7
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4440, "OAKLEY_SHA1")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() aalg_getbyname("sha1")=2
> Feb 4 09:00:26 vpn pluto[15879]: | enum_search_prefix () calling enum_search(0x80e4470, "OAKLEY_GROUP_MODP1536")
> Feb 4 09:00:26 vpn pluto[15879]: | parser_alg_info_add() modp_getbyname("modp1536")=5
> Feb 4 09:00:26 vpn pluto[15879]: | __alg_info_ike_add() ealg=7 aalg=2 modp_id=5, cnt=4
> Feb 4 09:00:26 vpn pluto[15879]: | Added new connection ********** with policy PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE
> Feb 4 09:00:26 vpn pluto[15879]: | from whack: got --ike=3des-sha1-modp1024,3des-sha1-modp1536,aes-sha1-modp1024,aes-sha1-modp1536
> Feb 4 09:00:26 vpn pluto[15879]: | ike string values: 3DES_CBC(5)_000-SHA1(2)-MODP1024(2), 3DES_CBC(5)_000-SHA1(2)-MODP1536(5), AES_CBC(7)_000-SHA1(2)-MODP1024(2), AES_CBC(7)_000-SHA1(2)-MODP1536(5); flags=strict
> Feb 4 09:00:26 vpn pluto[15879]: | counting wild cards for @************************ is 0
> Feb 4 09:00:26 vpn pluto[15879]: | counting wild cards for @********** is 0
> Feb 4 09:00:26 vpn pluto[15879]: | alg_info_addref() alg_info->ref_cnt=1
> Feb 4 09:00:26 vpn pluto[15879]: | alg_info_addref() alg_info->ref_cnt=2
> Feb 4 09:00:26 vpn pluto[15879]: added connection description "**********"
> Feb 4 09:00:26 vpn pluto[15879]: | 192.168.0.0/24===84.154.56.62[@************************]...79.207.134.254[@**********]===192.168.1.0/24
> Feb 4 09:00:26 vpn pluto[15879]: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE
> Feb 4 09:00:26 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 106 seconds
> Feb 4 09:00:26 vpn pluto[15879]: |
> Feb 4 09:00:26 vpn pluto[15879]: | *received whack message
> Feb 4 09:00:26 vpn pluto[15879]: listening for IKE messages
> Feb 4 09:00:26 vpn pluto[15879]: | found lo with address 127.0.0.1
> Feb 4 09:00:26 vpn pluto[15879]: | found eth0 with address 192.168.0.1
> Feb 4 09:00:26 vpn pluto[15879]: | found ppp0 with address 84.154.56.62
> Feb 4 09:00:26 vpn pluto[15879]: | found ppp1 with address 80.89.74.251
> Feb 4 09:00:26 vpn pluto[15879]: adding interface ppp1/ppp1 80.89.74.251:500
> Feb 4 09:00:26 vpn pluto[15879]: adding interface ppp0/ppp0 84.154.56.62:500
> Feb 4 09:00:26 vpn pluto[15879]: adding interface eth0/eth0 192.168.0.1:500
> Feb 4 09:00:26 vpn pluto[15879]: adding interface lo/lo 127.0.0.1:500
> Feb 4 09:00:26 vpn pluto[15879]: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
> Feb 4 09:00:26 vpn pluto[15879]: adding interface lo/lo ::1:500
> Feb 4 09:00:26 vpn pluto[15879]: | connect_to_host_pair: 84.154.56.62:500 79.207.134.254:500 -> hp:none
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys locked by 'free_preshared_secrets'
> Feb 4 09:00:26 vpn pluto[15879]: forgetting secrets
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys unlocked by 'free_preshard_secrets'
> Feb 4 09:00:26 vpn pluto[15879]: loading secrets from "/etc/ipsec.secrets"
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys locked by 'process_secret'
> Feb 4 09:00:26 vpn pluto[15879]: | certs and keys unlocked by 'process_secrets'
> Feb 4 09:00:26 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 106 seconds
> Feb 4 09:00:26 vpn pluto[15879]: |
> Feb 4 09:00:26 vpn pluto[15879]: | *received whack message
> Feb 4 09:00:26 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:26 vpn pluto[15879]: | route owner of "**********" unrouted: NULL; eroute owner: NULL
> Feb 4 09:00:26 vpn pluto[15879]: | could_route called for ********** (kind=CK_PERMANENT)
> Feb 4 09:00:26 vpn pluto[15879]: | route owner of "**********" unrouted: NULL; eroute owner: NULL
> Feb 4 09:00:26 vpn pluto[15879]: | route_and_eroute with c: ********** (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: 0
> Feb 4 09:00:26 vpn pluto[15879]: | add eroute 192.168.1.0/24:0 --0-> 192.168.0.0/24:0 => %trap (raw_eroute)
> Feb 4 09:00:26 vpn pluto[15879]: | eroute_connection add eroute 192.168.0.0/24:0 --0-> 192.168.1.0/24:0 => %trap (raw_eroute)
> Feb 4 09:00:26 vpn pluto[15879]: | route_and_eroute: firewall_notified: true
> Feb 4 09:00:26 vpn pluto[15879]: | command executing prepare-client
> Feb 4 09:00:26 vpn pluto[15879]: | executing prepare-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='prepare-client' PLUTO_CONNECTION='**********' PLUTO_NEXT_HOP='79.207.134.254' PLUTO_INTERFACE='ppp0' PLUTO_ME='84.154.56.62' PLUTO_MY_ID='@************************' PLUTO_MY_CLIENT='192.168.0.0/24' PLUTO_MY_CLIENT_NET='192.168.0.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='79.207.134.254' PLUTO_PEER_ID='@**********' PLUTO_PEER_CLIENT='192.168.1.0/24' PLUTO_PEER_CLIENT_NET='192.168.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE' PLUTO_MY_SOURCEIP='192.168.0.1' ipsec _updown
> Feb 4 09:00:26 vpn pluto[15879]: | command executing route-client
> Feb 4 09:00:26 vpn pluto[15879]: | executing route-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='route-client' PLUTO_CONNECTION='**********' PLUTO_NEXT_HOP='79.207.134.254' PLUTO_INTERFACE='ppp0' PLUTO_ME='84.154.56.62' PLUTO_MY_ID='@************************' PLUTO_MY_CLIENT='192.168.0.0/24' PLUTO_MY_CLIENT_NET='192.168.0.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='79.207.134.254' PLUTO_PEER_ID='@**********' PLUTO_PEER_CLIENT='192.168.1.0/24' PLUTO_PEER_CLIENT_NET='192.168.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE' PLUTO_MY_SOURCEIP='192.168.0.1' ipsec _updown
> Feb 4 09:00:27 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 105 seconds
> Feb 4 09:00:27 vpn pluto[15879]: |
> Feb 4 09:00:27 vpn pluto[15879]: | *received whack message
> Feb 4 09:00:27 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:27 vpn pluto[15879]: | empty esp_info, returning empty
> Feb 4 09:00:27 vpn pluto[15879]: | creating state object #1 at 0x8838b40
> Feb 4 09:00:27 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:27 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:27 vpn pluto[15879]: | RCOOKIE: 00 00 00 00 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:27 vpn pluto[15879]: | state hash entry 0
> Feb 4 09:00:27 vpn pluto[15879]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1
> Feb 4 09:00:27 vpn pluto[15879]: | using transform (5,2,2,0)
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: multiple transforms were set in aggressive mode. Only first one used.
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: transform (5,2,5,0) ignored.
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: transform (7,2,2,0) ignored.
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: transform (7,2,5,0) ignored.
> Feb 4 09:00:27 vpn pluto[15879]: | initiating aggressive mode with IKE=E=5-H=2-M=2
> Feb 4 09:00:27 vpn pluto[15879]: | Queuing pending Quick Mode with 79.207.134.254 "**********"
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: initiating Aggressive Mode #1, connection "**********"
> Feb 4 09:00:27 vpn pluto[15879]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1
> Feb 4 09:00:27 vpn pluto[15879]: | asking helper 0 to do build_kenonce op on seq: 1
> Feb 4 09:00:27 vpn pluto[15887]: ! helper 0 doing build_kenonce op id: 1
> Feb 4 09:00:27 vpn pluto[15879]: | inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #1
> Feb 4 09:00:27 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 105 seconds
> Feb 4 09:00:27 vpn pluto[15887]: ! Local DH secret:
> Feb 4 09:00:27 vpn pluto[15887]: ! 5f fc 95 fa 40 89 c7 18 c8 5d 2c 04 8b b7 42 af
> Feb 4 09:00:27 vpn pluto[15887]: ! 1e d7 1c 9c ba 85 c8 25 65 07 af a9 18 09 45 82
> Feb 4 09:00:27 vpn pluto[15887]: ! Public DH value sent:
> Feb 4 09:00:27 vpn pluto[15887]: ! d2 e5 6c dd 70 0f 4f 91 43 33 87 fc 43 8b b8 07
> Feb 4 09:00:27 vpn pluto[15887]: ! 62 9e 2f d8 89 75 9c 07 11 17 96 2d 37 18 ef 25
> Feb 4 09:00:27 vpn pluto[15887]: ! 3f 66 7a b9 10 d7 c9 2e bd 77 2f 38 4c 79 27 b7
> Feb 4 09:00:27 vpn pluto[15887]: ! 7d 40 25 7f fb 0b 4b 80 c9 83 1c d3 29 3b c5 35
> Feb 4 09:00:27 vpn pluto[15887]: ! 61 e6 6a 4a a1 f4 2d f4 22 89 b2 61 2a 72 0a 85
> Feb 4 09:00:27 vpn pluto[15887]: ! 48 7e 83 a9 e0 14 7b 53 7a c8 43 ef 5e e7 ed 1b
> Feb 4 09:00:27 vpn pluto[15887]: ! b5 19 cc 65 be ae 2c 0f 1b 4f 39 d2 2f 9d cf b2
> Feb 4 09:00:27 vpn pluto[15887]: ! e8 50 e6 4d 3f dd ea 67 b4 f5 4b 7b 16 df d0 ff
> Feb 4 09:00:27 vpn pluto[15887]: ! Generated nonce:
> Feb 4 09:00:27 vpn pluto[15887]: ! c7 bf 43 84 21 00 39 02 d1 21 c8 65 22 6a 71 9c
> Feb 4 09:00:27 vpn pluto[15879]: | helper 0 has work (cnt now 0)
> Feb 4 09:00:27 vpn pluto[15879]: | helper 0 replies to sequence 1
> Feb 4 09:00:27 vpn pluto[15879]: | calling callback function 0x80974c0
> Feb 4 09:00:27 vpn pluto[15879]: | aggr outI1: calculated ke+nonce, sending I1
> Feb 4 09:00:27 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:27 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:00:27 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:27 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:27 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 00 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_SA
> Feb 4 09:00:27 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:27 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_AGGR
> Feb 4 09:00:27 vpn pluto[15879]: | flags: none
> Feb 4 09:00:27 vpn pluto[15879]: | message ID: 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | using transform (5,2,2,0)
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: multiple transforms were set in aggressive mode. Only first one used.
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: transform (5,2,5,0) ignored.
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: transform (7,2,2,0) ignored.
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: transform (7,2,5,0) ignored.
> Feb 4 09:00:27 vpn pluto[15879]: | ***emit ISAKMP Security Association Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_KE
> Feb 4 09:00:27 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:27 vpn pluto[15879]: | ****emit IPsec DOI SIT:
> Feb 4 09:00:27 vpn pluto[15879]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
> Feb 4 09:00:27 vpn pluto[15879]: | out_sa pcn: 0 has 1 valid proposals
> Feb 4 09:00:27 vpn pluto[15879]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
> Feb 4 09:00:27 vpn pluto[15879]: | ****emit ISAKMP Proposal Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:27 vpn pluto[15879]: | proposal number: 0
> Feb 4 09:00:27 vpn pluto[15879]: | protocol ID: PROTO_ISAKMP
> Feb 4 09:00:27 vpn pluto[15879]: | SPI size: 0
> Feb 4 09:00:27 vpn pluto[15879]: | number of transforms: 1
> Feb 4 09:00:27 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ISAKMP):
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:27 vpn pluto[15879]: | transform number: 0
> Feb 4 09:00:27 vpn pluto[15879]: | transform ID: KEY_IKE
> Feb 4 09:00:27 vpn pluto[15879]: | ******emit ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_LIFE_TYPE
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:27 vpn pluto[15879]: | [1 is OAKLEY_LIFE_SECONDS]
> Feb 4 09:00:27 vpn pluto[15879]: | ******emit ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_LIFE_DURATION
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 3600
> Feb 4 09:00:27 vpn pluto[15879]: | ******emit ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 5
> Feb 4 09:00:27 vpn pluto[15879]: | [5 is OAKLEY_3DES_CBC]
> Feb 4 09:00:27 vpn pluto[15879]: | ******emit ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_HASH_ALGORITHM
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:27 vpn pluto[15879]: | [2 is OAKLEY_SHA1]
> Feb 4 09:00:27 vpn pluto[15879]: | ******emit ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_AUTHENTICATION_METHOD
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:27 vpn pluto[15879]: | [1 is OAKLEY_PRESHARED_KEY]
> Feb 4 09:00:27 vpn pluto[15879]: | ******emit ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_GROUP_DESCRIPTION
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:27 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Proposal Payload: 40
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Security Association Payload: 52
> Feb 4 09:00:27 vpn pluto[15879]: | ***emit ISAKMP Key Exchange Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONCE
> Feb 4 09:00:27 vpn pluto[15879]: | emitting 128 raw bytes of keyex value into ISAKMP Key Exchange Payload
> Feb 4 09:00:27 vpn pluto[15879]: | keyex value d2 e5 6c dd 70 0f 4f 91 43 33 87 fc 43 8b b8 07
> Feb 4 09:00:27 vpn pluto[15879]: | 62 9e 2f d8 89 75 9c 07 11 17 96 2d 37 18 ef 25
> Feb 4 09:00:27 vpn pluto[15879]: | 3f 66 7a b9 10 d7 c9 2e bd 77 2f 38 4c 79 27 b7
> Feb 4 09:00:27 vpn pluto[15879]: | 7d 40 25 7f fb 0b 4b 80 c9 83 1c d3 29 3b c5 35
> Feb 4 09:00:27 vpn pluto[15879]: | 61 e6 6a 4a a1 f4 2d f4 22 89 b2 61 2a 72 0a 85
> Feb 4 09:00:27 vpn pluto[15879]: | 48 7e 83 a9 e0 14 7b 53 7a c8 43 ef 5e e7 ed 1b
> Feb 4 09:00:27 vpn pluto[15879]: | b5 19 cc 65 be ae 2c 0f 1b 4f 39 d2 2f 9d cf b2
> Feb 4 09:00:27 vpn pluto[15879]: | e8 50 e6 4d 3f dd ea 67 b4 f5 4b 7b 16 df d0 ff
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Key Exchange Payload: 132
> Feb 4 09:00:27 vpn pluto[15879]: | ***emit ISAKMP Nonce Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:27 vpn pluto[15879]: | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload
> Feb 4 09:00:27 vpn pluto[15879]: | Ni c7 bf 43 84 21 00 39 02 d1 21 c8 65 22 6a 71 9c
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Nonce Payload: 20
> Feb 4 09:00:27 vpn pluto[15879]: | ***emit ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_VID
> Feb 4 09:00:27 vpn pluto[15879]: | ID type: ID_FQDN
> Feb 4 09:00:27 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:27 vpn pluto[15879]: | port: 0
> Feb 4 09:00:27 vpn pluto[15879]: | emitting 24 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:27 vpn pluto[15879]: | my identity 66 73 31 2e 69 6e 74 72 61 6e 65 74 2e 6f 76 65
> Feb 4 09:00:27 vpn pluto[15879]: | 72 74 75 72 6e 2e 64 65
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 32
> Feb 4 09:00:27 vpn pluto[15879]: | ***emit ISAKMP Vendor ID Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:27 vpn pluto[15879]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
> Feb 4 09:00:27 vpn pluto[15879]: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Vendor ID Payload: 20
> Feb 4 09:00:27 vpn pluto[15879]: | emitting length of ISAKMP Message: 284
> Feb 4 09:00:27 vpn pluto[15879]: | sending:
> Feb 4 09:00:27 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 00 00 00 00 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | 01 10 04 00 00 00 00 00 00 00 01 1c 04 00 00 34
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 01 00 00 00 01 00 00 00 28 00 01 00 01
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10
> Feb 4 09:00:27 vpn pluto[15879]: | 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02
> Feb 4 09:00:27 vpn pluto[15879]: | 0a 00 00 84 d2 e5 6c dd 70 0f 4f 91 43 33 87 fc
> Feb 4 09:00:27 vpn pluto[15879]: | 43 8b b8 07 62 9e 2f d8 89 75 9c 07 11 17 96 2d
> Feb 4 09:00:27 vpn pluto[15879]: | 37 18 ef 25 3f 66 7a b9 10 d7 c9 2e bd 77 2f 38
> Feb 4 09:00:27 vpn pluto[15879]: | 4c 79 27 b7 7d 40 25 7f fb 0b 4b 80 c9 83 1c d3
> Feb 4 09:00:27 vpn pluto[15879]: | 29 3b c5 35 61 e6 6a 4a a1 f4 2d f4 22 89 b2 61
> Feb 4 09:00:27 vpn pluto[15879]: | 2a 72 0a 85 48 7e 83 a9 e0 14 7b 53 7a c8 43 ef
> Feb 4 09:00:27 vpn pluto[15879]: | 5e e7 ed 1b b5 19 cc 65 be ae 2c 0f 1b 4f 39 d2
> Feb 4 09:00:27 vpn pluto[15879]: | 2f 9d cf b2 e8 50 e6 4d 3f dd ea 67 b4 f5 4b 7b
> Feb 4 09:00:27 vpn pluto[15879]: | 16 df d0 ff 05 00 00 14 c7 bf 43 84 21 00 39 02
> Feb 4 09:00:27 vpn pluto[15879]: | d1 21 c8 65 22 6a 71 9c 0d 00 00 20 02 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | 66 73 31 2e 69 6e 74 72 61 6e 65 74 2e 6f 76 65
> Feb 4 09:00:27 vpn pluto[15879]: | 72 74 75 72 6e 2e 64 65 00 00 00 14 af ca d7 13
> Feb 4 09:00:27 vpn pluto[15879]: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
> Feb 4 09:00:27 vpn pluto[15879]: | sending 284 bytes for aggr_outI1 through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:00:27 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 00 00 00 00 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | 01 10 04 00 00 00 00 00 00 00 01 1c 04 00 00 34
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 01 00 00 00 01 00 00 00 28 00 01 00 01
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10
> Feb 4 09:00:27 vpn pluto[15879]: | 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02
> Feb 4 09:00:27 vpn pluto[15879]: | 0a 00 00 84 d2 e5 6c dd 70 0f 4f 91 43 33 87 fc
> Feb 4 09:00:27 vpn pluto[15879]: | 43 8b b8 07 62 9e 2f d8 89 75 9c 07 11 17 96 2d
> Feb 4 09:00:27 vpn pluto[15879]: | 37 18 ef 25 3f 66 7a b9 10 d7 c9 2e bd 77 2f 38
> Feb 4 09:00:27 vpn pluto[15879]: | 4c 79 27 b7 7d 40 25 7f fb 0b 4b 80 c9 83 1c d3
> Feb 4 09:00:27 vpn pluto[15879]: | 29 3b c5 35 61 e6 6a 4a a1 f4 2d f4 22 89 b2 61
> Feb 4 09:00:27 vpn pluto[15879]: | 2a 72 0a 85 48 7e 83 a9 e0 14 7b 53 7a c8 43 ef
> Feb 4 09:00:27 vpn pluto[15879]: | 5e e7 ed 1b b5 19 cc 65 be ae 2c 0f 1b 4f 39 d2
> Feb 4 09:00:27 vpn pluto[15879]: | 2f 9d cf b2 e8 50 e6 4d 3f dd ea 67 b4 f5 4b 7b
> Feb 4 09:00:27 vpn pluto[15879]: | 16 df d0 ff 05 00 00 14 c7 bf 43 84 21 00 39 02
> Feb 4 09:00:27 vpn pluto[15879]: | d1 21 c8 65 22 6a 71 9c 0d 00 00 20 02 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | 66 73 31 2e 69 6e 74 72 61 6e 65 74 2e 6f 76 65
> Feb 4 09:00:27 vpn pluto[15879]: | 72 74 75 72 6e 2e 64 65 00 00 00 14 af ca d7 13
> Feb 4 09:00:27 vpn pluto[15879]: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
> Feb 4 09:00:27 vpn pluto[15879]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
> Feb 4 09:00:27 vpn pluto[15879]: | complete state transition with STF_IGNORE
> Feb 4 09:00:27 vpn pluto[15879]: | next event EVENT_RETRANSMIT in 10 seconds for #1
> Feb 4 09:00:27 vpn pluto[15879]: |
> Feb 4 09:00:27 vpn pluto[15879]: | *received kernel message
> Feb 4 09:00:27 vpn pluto[15879]: | netlink_get: XFRM_MSG_ACQUIRE message
> Feb 4 09:00:27 vpn pluto[15879]: | add bare shunt 0x88391c0 192.168.0.1/32:0 -0-> 192.168.1.1/32:0 => %hold 0 %acquire-netlink
> Feb 4 09:00:27 vpn pluto[15879]: | initiate on demand from 192.168.0.1:0 to 192.168.1.1:0 proto=0 state: fos_start because: acquire
> Feb 4 09:00:27 vpn pluto[15879]: | find_connection: looking for policy for connection: 192.168.0.1:0/0 -> 192.168.1.1:0/0
> Feb 4 09:00:27 vpn pluto[15879]: | find_connection: conn "**********" has compatible peers: 192.168.0.0/24 -> 192.168.1.0/24 [pri: 12632077]
> Feb 4 09:00:27 vpn pluto[15879]: | find_connection: comparing best "**********" [pri:12632077]{0x8838690} (child none) to "**********" [pri:12632077]{0x8838690} (child none)
> Feb 4 09:00:27 vpn pluto[15879]: | find_connection: concluding with "**********" [pri:12632077]{0x8838690} kind=CK_PERMANENT
> Feb 4 09:00:27 vpn pluto[15879]: | assign hold, routing was prospective erouted, needs to be erouted HOLD
> Feb 4 09:00:27 vpn pluto[15879]: | eroute_connection replace %trap with broad %hold eroute 192.168.0.0/24:0 --0-> 192.168.1.0/24:0 => %hold (raw_eroute)
> Feb 4 09:00:27 vpn pluto[15879]: | delete narrow %hold eroute 192.168.0.1/32:0 --0-> 192.168.1.1/32:0 => %hold (raw_eroute)
> Feb 4 09:00:27 vpn pluto[15879]: | delete bare shunt 0x88391c0 192.168.0.1/32:0 -0-> 192.168.1.1/32:0 => %hold 0 %acquire-netlink
> Feb 4 09:00:27 vpn pluto[15879]: | Queuing pending Quick Mode with 79.207.134.254 "**********"
> Feb 4 09:00:27 vpn pluto[15879]: | NETKEY workaround for missing hold state or proper rate limiting: deleting existing pending state from 1233734427.
> Feb 4 09:00:27 vpn pluto[15879]: | next event EVENT_RETRANSMIT in 10 seconds for #1
> Feb 4 09:00:27 vpn pluto[15879]: |
> Feb 4 09:00:27 vpn pluto[15879]: | *received 306 bytes from 79.207.134.254:500 on ppp0 (port=500)
> Feb 4 09:00:27 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:27 vpn pluto[15879]: | 01 10 04 00 00 00 00 00 00 00 01 32 04 00 00 34
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 01 00 00 00 01 00 00 00 28 01 01 00 01
> Feb 4 09:00:27 vpn pluto[15879]: | 00 00 00 20 01 01 00 00 80 01 00 05 80 02 00 02
> Feb 4 09:00:27 vpn pluto[15879]: | 80 03 00 01 80 04 00 02 80 0b 00 01 80 0c 0e 10
> Feb 4 09:00:27 vpn pluto[15879]: | 0a 00 00 84 92 24 e4 ae f6 bd 3c 80 5f a9 53 d5
> Feb 4 09:00:27 vpn pluto[15879]: | e4 bd 71 b0 bf a6 66 47 b5 3c 95 6b 7f bc 49 6e
> Feb 4 09:00:27 vpn pluto[15879]: | 4a 5a 67 10 dc e8 02 42 e2 d8 6e 30 3a 4b ab 35
> Feb 4 09:00:27 vpn pluto[15879]: | a2 7d 06 59 67 c4 64 bd f1 6f 52 de 54 3e 59 0e
> Feb 4 09:00:27 vpn pluto[15879]: | 43 ed 37 43 f3 0c e6 0c f3 e5 ff 8c a6 61 8c 69
> Feb 4 09:00:27 vpn pluto[15879]: | 19 ed 43 2e ef a5 f2 e8 2b 2e 73 20 ad a5 7c 38
> Feb 4 09:00:27 vpn pluto[15879]: | bb c8 bc 42 2d 99 66 dc 5b 55 c6 e7 64 62 81 e4
> Feb 4 09:00:27 vpn pluto[15879]: | d1 02 c7 2a c2 2c 79 11 4e cd 9a 59 e0 92 21 7b
> Feb 4 09:00:27 vpn pluto[15879]: | b2 2d 7a 71 05 00 00 14 19 1e d3 b4 0d d1 05 0d
> Feb 4 09:00:27 vpn pluto[15879]: | af 3d df 42 a7 9a 81 cf 08 00 00 12 02 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | 6c 61 31 2d 66 62 37 32 37 30 0d 00 00 18 9e 48
> Feb 4 09:00:27 vpn pluto[15879]: | 6a ab 82 62 83 49 21 d3 a5 3e 82 7f c9 db 30 6e
> Feb 4 09:00:27 vpn pluto[15879]: | b1 a2 0d 00 00 0c 09 00 26 89 df d6 b7 12 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57
> Feb 4 09:00:27 vpn pluto[15879]: | 01 00
> Feb 4 09:00:27 vpn pluto[15879]: | **parse ISAKMP Message:
> Feb 4 09:00:27 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:27 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:27 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:27 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_SA
> Feb 4 09:00:27 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:27 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_AGGR
> Feb 4 09:00:27 vpn pluto[15879]: | flags: none
> Feb 4 09:00:27 vpn pluto[15879]: | message ID: 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | length: 306
> Feb 4 09:00:27 vpn pluto[15879]: | processing packet with exchange type=ISAKMP_XCHG_AGGR (4)
> Feb 4 09:00:27 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:27 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:27 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:27 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:27 vpn pluto[15879]: | state object not found
> Feb 4 09:00:27 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:27 vpn pluto[15879]: | RCOOKIE: 00 00 00 00 00 00 00 00
> Feb 4 09:00:27 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:27 vpn pluto[15879]: | state hash entry 0
> Feb 4 09:00:27 vpn pluto[15879]: | peer and cookies match on #1, provided msgid 00000000 vs 00000000
> Feb 4 09:00:27 vpn pluto[15879]: | state object #1 found, in STATE_AGGR_I1
> Feb 4 09:00:27 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:27 vpn pluto[15879]: | np=1 and sd=0x80eadc0
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Security Association Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_KE
> Feb 4 09:00:27 vpn pluto[15879]: | length: 52
> Feb 4 09:00:27 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:27 vpn pluto[15879]: | np=4 and sd=0x80eae14
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Key Exchange Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONCE
> Feb 4 09:00:27 vpn pluto[15879]: | length: 132
> Feb 4 09:00:27 vpn pluto[15879]: | np=10 and sd=0x80eae68
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Nonce Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:27 vpn pluto[15879]: | length: 20
> Feb 4 09:00:27 vpn pluto[15879]: | np=5 and sd=(nil)
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Identification Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:27 vpn pluto[15879]: | length: 18
> Feb 4 09:00:27 vpn pluto[15879]: | ID type: ID_FQDN
> Feb 4 09:00:27 vpn pluto[15879]: | DOI specific A: 0
> Feb 4 09:00:27 vpn pluto[15879]: | DOI specific B: 0
> Feb 4 09:00:27 vpn pluto[15879]: | np=8 and sd=0x80eae50
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Hash Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_VID
> Feb 4 09:00:27 vpn pluto[15879]: | length: 24
> Feb 4 09:00:27 vpn pluto[15879]: | np=13 and sd=0x80eae8c
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Vendor ID Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_VID
> Feb 4 09:00:27 vpn pluto[15879]: | length: 12
> Feb 4 09:00:27 vpn pluto[15879]: | np=13 and sd=0x80eae8c
> Feb 4 09:00:27 vpn pluto[15879]: | ***parse ISAKMP Vendor ID Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:27 vpn pluto[15879]: | length: 20
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: received Vendor ID payload [XAUTH]
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: received Vendor ID payload [Dead Peer Detection]
> Feb 4 09:00:27 vpn pluto[15879]: "**********" #1: Aggressive mode peer ID is ID_FQDN: '@**********'
> Feb 4 09:00:27 vpn pluto[15879]: | refine_connection: starting with **********
> Feb 4 09:00:27 vpn pluto[15879]: | trusted_ca called with a=(empty) b=(empty)
> Feb 4 09:00:27 vpn pluto[15879]: | refine_connection: happy with starting point: **********
> Feb 4 09:00:27 vpn pluto[15879]: | offered CA: '%none'
> Feb 4 09:00:27 vpn pluto[15879]: | ****parse IPsec DOI SIT:
> Feb 4 09:00:27 vpn pluto[15879]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
> Feb 4 09:00:27 vpn pluto[15879]: | ****parse ISAKMP Proposal Payload:
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:27 vpn pluto[15879]: | length: 40
> Feb 4 09:00:27 vpn pluto[15879]: | proposal number: 1
> Feb 4 09:00:27 vpn pluto[15879]: | protocol ID: PROTO_ISAKMP
> Feb 4 09:00:27 vpn pluto[15879]: | SPI size: 0
> Feb 4 09:00:27 vpn pluto[15879]: | number of transforms: 1
> Feb 4 09:00:27 vpn pluto[15879]: | *****parse ISAKMP Transform Payload (ISAKMP):
> Feb 4 09:00:27 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:27 vpn pluto[15879]: | length: 32
> Feb 4 09:00:27 vpn pluto[15879]: | transform number: 1
> Feb 4 09:00:27 vpn pluto[15879]: | transform ID: KEY_IKE
> Feb 4 09:00:27 vpn pluto[15879]: | ******parse ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 5
> Feb 4 09:00:27 vpn pluto[15879]: | [5 is OAKLEY_3DES_CBC]
> Feb 4 09:00:27 vpn pluto[15879]: | ike_alg_enc_ok(ealg=5,key_len=0): blocksize=8, keyminlen=192, keydeflen=192, keymaxlen=192, ret=1
> Feb 4 09:00:27 vpn pluto[15879]: | ******parse ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_HASH_ALGORITHM
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:27 vpn pluto[15879]: | [2 is OAKLEY_SHA1]
> Feb 4 09:00:27 vpn pluto[15879]: | ******parse ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_AUTHENTICATION_METHOD
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:27 vpn pluto[15879]: | [1 is OAKLEY_PRESHARED_KEY]
> Feb 4 09:00:27 vpn pluto[15879]: | started looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:27 vpn pluto[15879]: | actually looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:27 vpn pluto[15879]: | 1: compared PSK @********** to @************************ / @********** -> 2
> Feb 4 09:00:27 vpn pluto[15879]: | 2: compared PSK @************************ to @************************ / @********** -> 6
> Feb 4 09:00:27 vpn pluto[15879]: | best_match 0>6 best=0x8838018 (line=11)
> Feb 4 09:00:27 vpn pluto[15879]: | concluding with best_match=6 best=0x8838018 (lineno=11)
> Feb 4 09:00:27 vpn pluto[15879]: | ******parse ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_GROUP_DESCRIPTION
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:27 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:27 vpn pluto[15879]: | ******parse ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_LIFE_TYPE
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:27 vpn pluto[15879]: | [1 is OAKLEY_LIFE_SECONDS]
> Feb 4 09:00:27 vpn pluto[15879]: | ******parse ISAKMP Oakley attribute:
> Feb 4 09:00:27 vpn pluto[15879]: | af+type: OAKLEY_LIFE_DURATION
> Feb 4 09:00:27 vpn pluto[15879]: | length/value: 3600
> Feb 4 09:00:27 vpn pluto[15879]: | Oakley Transform 1 accepted
> Feb 4 09:00:27 vpn pluto[15879]: | DH public value received:
> Feb 4 09:00:27 vpn pluto[15879]: | 92 24 e4 ae f6 bd 3c 80 5f a9 53 d5 e4 bd 71 b0
> Feb 4 09:00:28 vpn pluto[15879]: | bf a6 66 47 b5 3c 95 6b 7f bc 49 6e 4a 5a 67 10
> Feb 4 09:00:28 vpn pluto[15879]: | dc e8 02 42 e2 d8 6e 30 3a 4b ab 35 a2 7d 06 59
> Feb 4 09:00:28 vpn pluto[15879]: | 67 c4 64 bd f1 6f 52 de 54 3e 59 0e 43 ed 37 43
> Feb 4 09:00:28 vpn pluto[15879]: | f3 0c e6 0c f3 e5 ff 8c a6 61 8c 69 19 ed 43 2e
> Feb 4 09:00:28 vpn pluto[15879]: | ef a5 f2 e8 2b 2e 73 20 ad a5 7c 38 bb c8 bc 42
> Feb 4 09:00:28 vpn pluto[15879]: | 2d 99 66 dc 5b 55 c6 e7 64 62 81 e4 d1 02 c7 2a
> Feb 4 09:00:28 vpn pluto[15879]: | c2 2c 79 11 4e cd 9a 59 e0 92 21 7b b2 2d 7a 71
> Feb 4 09:00:28 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | RCOOKIE: 00 00 00 00 00 00 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:28 vpn pluto[15879]: | state hash entry 0
> Feb 4 09:00:28 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:28 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:28 vpn pluto[15879]: | started looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:28 vpn pluto[15879]: | actually looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:28 vpn pluto[15879]: | 1: compared PSK @********** to @************************ / @********** -> 2
> Feb 4 09:00:28 vpn pluto[15879]: | 2: compared PSK @************************ to @************************ / @********** -> 6
> Feb 4 09:00:28 vpn pluto[15879]: | best_match 0>6 best=0x8838018 (line=11)
> Feb 4 09:00:28 vpn pluto[15879]: | concluding with best_match=6 best=0x8838018 (lineno=11)
> Feb 4 09:00:28 vpn pluto[15879]: | calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1024): 62435 usec
> Feb 4 09:00:28 vpn pluto[15879]: | DH shared secret:
> Feb 4 09:00:28 vpn pluto[15879]: | 1b b5 b8 11 57 fe d3 02 00 3d f8 f7 3c d8 dc b3
> Feb 4 09:00:28 vpn pluto[15879]: | df 0d d6 c7 59 76 d0 29 6c 97 cd f3 ac 92 46 11
> Feb 4 09:00:28 vpn pluto[15879]: | dd 33 c8 50 84 4a 3b 11 f2 6e 7c 20 12 a9 91 ca
> Feb 4 09:00:28 vpn pluto[15879]: | 3c d0 ec 95 5f 7d 33 58 99 19 d5 71 9f 9d 27 e0
> Feb 4 09:00:28 vpn pluto[15879]: | b1 1a 86 0b 4d e3 2a 92 7d 90 9e 65 e9 96 30 6e
> Feb 4 09:00:28 vpn pluto[15879]: | 76 fe 06 94 a5 29 8e 83 46 c9 e6 36 56 b4 37 8a
> Feb 4 09:00:28 vpn pluto[15879]: | 20 bd 3a 13 6a f2 b2 18 ec c1 69 d5 bf d1 5a d0
> Feb 4 09:00:28 vpn pluto[15879]: | f1 66 ce 21 34 73 d8 e0 55 d7 e1 6c ef c4 39 a3
> Feb 4 09:00:28 vpn pluto[15879]: | Skey inputs (PSK+NI+NR)
> Feb 4 09:00:28 vpn pluto[15879]: | ni: c7 bf 43 84 21 00 39 02 d1 21 c8 65 22 6a 71 9c
> Feb 4 09:00:28 vpn pluto[15879]: | nr: 19 1e d3 b4 0d d1 05 0d af 3d df 42 a7 9a 81 cf
> Feb 4 09:00:28 vpn pluto[15879]: | keyid: da 4f 51 83 d1 45 30 31 b7 df 41 e4 f4 49 de 0d
> Feb 4 09:00:28 vpn pluto[15879]: | f9 a6 75 c2
> Feb 4 09:00:28 vpn pluto[15879]: | DH_i: d2 e5 6c dd 70 0f 4f 91 43 33 87 fc 43 8b b8 07
> Feb 4 09:00:28 vpn pluto[15879]: | 62 9e 2f d8 89 75 9c 07 11 17 96 2d 37 18 ef 25
> Feb 4 09:00:28 vpn pluto[15879]: | 3f 66 7a b9 10 d7 c9 2e bd 77 2f 38 4c 79 27 b7
> Feb 4 09:00:28 vpn pluto[15879]: | 7d 40 25 7f fb 0b 4b 80 c9 83 1c d3 29 3b c5 35
> Feb 4 09:00:28 vpn pluto[15879]: | 61 e6 6a 4a a1 f4 2d f4 22 89 b2 61 2a 72 0a 85
> Feb 4 09:00:28 vpn pluto[15879]: | 48 7e 83 a9 e0 14 7b 53 7a c8 43 ef 5e e7 ed 1b
> Feb 4 09:00:28 vpn pluto[15879]: | b5 19 cc 65 be ae 2c 0f 1b 4f 39 d2 2f 9d cf b2
> Feb 4 09:00:28 vpn pluto[15879]: | e8 50 e6 4d 3f dd ea 67 b4 f5 4b 7b 16 df d0 ff
> Feb 4 09:00:28 vpn pluto[15879]: | DH_r: 92 24 e4 ae f6 bd 3c 80 5f a9 53 d5 e4 bd 71 b0
> Feb 4 09:00:28 vpn pluto[15879]: | bf a6 66 47 b5 3c 95 6b 7f bc 49 6e 4a 5a 67 10
> Feb 4 09:00:28 vpn pluto[15879]: | dc e8 02 42 e2 d8 6e 30 3a 4b ab 35 a2 7d 06 59
> Feb 4 09:00:28 vpn pluto[15879]: | 67 c4 64 bd f1 6f 52 de 54 3e 59 0e 43 ed 37 43
> Feb 4 09:00:28 vpn pluto[15879]: | f3 0c e6 0c f3 e5 ff 8c a6 61 8c 69 19 ed 43 2e
> Feb 4 09:00:28 vpn pluto[15879]: | ef a5 f2 e8 2b 2e 73 20 ad a5 7c 38 bb c8 bc 42
> Feb 4 09:00:28 vpn pluto[15879]: | 2d 99 66 dc 5b 55 c6 e7 64 62 81 e4 d1 02 c7 2a
> Feb 4 09:00:28 vpn pluto[15879]: | c2 2c 79 11 4e cd 9a 59 e0 92 21 7b b2 2d 7a 71
> Feb 4 09:00:28 vpn pluto[15879]: | Skeyid: da 4f 51 83 d1 45 30 31 b7 df 41 e4 f4 49 de 0d
> Feb 4 09:00:28 vpn pluto[15879]: | f9 a6 75 c2
> Feb 4 09:00:28 vpn pluto[15879]: | Skeyid_d: eb 10 fa 22 75 e4 ec bc 26 44 b9 43 fb ca 6d 6e
> Feb 4 09:00:28 vpn pluto[15879]: | 10 67 be 95
> Feb 4 09:00:28 vpn pluto[15879]: | Skeyid_a: 46 4c 3a 7d c2 4c 5b 87 99 81 7c b5 ee 35 1c 82
> Feb 4 09:00:28 vpn pluto[15879]: | b4 ac 60 b3
> Feb 4 09:00:28 vpn pluto[15879]: | Skeyid_e: bf 3f 28 34 71 2d 51 06 bb 16 82 5b ae bd e7 8c
> Feb 4 09:00:28 vpn pluto[15879]: | be f1 65 bf
> Feb 4 09:00:28 vpn pluto[15879]: | enc key: 4e 04 f9 5f 39 b3 34 59 81 1b c0 3a 63 46 d4 14
> Feb 4 09:00:28 vpn pluto[15879]: | a0 3d 60 75 26 c5 a0 18
> Feb 4 09:00:28 vpn pluto[15879]: | IV: 5d 4d 8f 04 f8 6a 43 dc a1 20 65 59 6a 19 9f d1
> Feb 4 09:00:28 vpn pluto[15879]: | fa 47 b7 0a
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #1: Aggressive mode peer ID is ID_FQDN: '@**********'
> Feb 4 09:00:28 vpn pluto[15879]: | hashing 48 bytes of SA
> Feb 4 09:00:28 vpn pluto[15879]: | authentication succeeded
> Feb 4 09:00:28 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:00:28 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:28 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:28 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_AGGR
> Feb 4 09:00:28 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:28 vpn pluto[15879]: | message ID: 00 00 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | **emit ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 0
> Feb 4 09:00:28 vpn pluto[15879]: | ID type: ID_FQDN
> Feb 4 09:00:28 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:28 vpn pluto[15879]: | port: 0
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 8
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 24 raw bytes of my identity into identity payload
> Feb 4 09:00:28 vpn pluto[15879]: | my identity 66 73 31 2e 69 6e 74 72 61 6e 65 74 2e 6f 76 65
> Feb 4 09:00:28 vpn pluto[15879]: | 72 74 75 72 6e 2e 64 65
> Feb 4 09:00:28 vpn pluto[15879]: | hashing 48 bytes of SA
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Hash Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 20 raw bytes of HASH_I into ISAKMP Hash Payload
> Feb 4 09:00:28 vpn pluto[15879]: | HASH_I 17 02 40 d3 04 6b fa e0 e7 0c f8 83 d7 2c 14 e2
> Feb 4 09:00:28 vpn pluto[15879]: | 71 26 cc 89
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Hash Payload: 24
> Feb 4 09:00:28 vpn pluto[15879]: | encrypting:
> Feb 4 09:00:28 vpn pluto[15879]: | 00 00 00 18 17 02 40 d3 04 6b fa e0 e7 0c f8 83
> Feb 4 09:00:28 vpn pluto[15879]: | d7 2c 14 e2 71 26 cc 89
> Feb 4 09:00:28 vpn pluto[15879]: | IV:
> Feb 4 09:00:28 vpn pluto[15879]: | 5d 4d 8f 04 f8 6a 43 dc a1 20 65 59 6a 19 9f d1
> Feb 4 09:00:28 vpn pluto[15879]: | fa 47 b7 0a
> Feb 4 09:00:28 vpn pluto[15879]: | encrypting using OAKLEY_3DES_CBC
> Feb 4 09:00:28 vpn pluto[15879]: | next IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Message: 52
> Feb 4 09:00:28 vpn pluto[15879]: | complete state transition with STF_OK
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #1: transition from state STATE_AGGR_I1 to state STATE_AGGR_I2
> Feb 4 09:00:28 vpn pluto[15879]: | sending reply packet to 79.207.134.254:500 (from port=500)
> Feb 4 09:00:28 vpn pluto[15879]: | sending 52 bytes for STATE_AGGR_I1 through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | 08 10 04 01 00 00 00 00 00 00 00 34 1b 2c 32 69
> Feb 4 09:00:28 vpn pluto[15879]: | 0a 2c 4e 13 7a 4e 49 5c 8f d4 c0 b6 9b 97 c2 66
> Feb 4 09:00:28 vpn pluto[15879]: | 86 12 6f 4a
> Feb 4 09:00:28 vpn pluto[15879]: | inserting event EVENT_SA_REPLACE, timeout in 2581 seconds for #1
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #1: STATE_AGGR_I2: sent AI2, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
> Feb 4 09:00:28 vpn pluto[15879]: | modecfg pull: noquirk policy:push not-client
> Feb 4 09:00:28 vpn pluto[15879]: | phase 1 is done, looking for phase 1 to unpend
> Feb 4 09:00:28 vpn pluto[15879]: | unqueuing pending Quick Mode with 79.207.134.254 "**********"
> Feb 4 09:00:28 vpn pluto[15879]: | duplicating state object #1
> Feb 4 09:00:28 vpn pluto[15879]: | creating state object #2 at 0x883a438
> Feb 4 09:00:28 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:28 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:28 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:28 vpn pluto[15879]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #2
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE {using isakmp#1}
> Feb 4 09:00:28 vpn pluto[15879]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1
> Feb 4 09:00:28 vpn pluto[15879]: | asking helper 0 to do build_kenonce op on seq: 2
> Feb 4 09:00:28 vpn pluto[15887]: ! helper 0 doing build_kenonce op id: 2
> Feb 4 09:00:28 vpn pluto[15879]: | inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #2
> Feb 4 09:00:28 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 104 seconds
> Feb 4 09:00:28 vpn pluto[15879]: |
> Feb 4 09:00:28 vpn pluto[15879]: | *received 84 bytes from 79.207.134.254:500 on ppp0 (port=500)
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | 08 10 05 01 69 78 7b ab 00 00 00 54 24 e0 f3 8b
> Feb 4 09:00:28 vpn pluto[15879]: | 39 ef 67 f3 0f fb af 11 f1 01 98 3e f9 f8 bb 5d
> Feb 4 09:00:28 vpn pluto[15879]: | 9b 1e a1 79 b9 a7 80 7e c7 f3 76 d6 3b 56 8d 4b
> Feb 4 09:00:28 vpn pluto[15879]: | 7a 19 7d 43 cc ca 6f 54 69 de 69 e9 16 2a 9e 70
> Feb 4 09:00:28 vpn pluto[15879]: | b0 09 1c db
> Feb 4 09:00:28 vpn pluto[15879]: | **parse ISAKMP Message:
> Feb 4 09:00:28 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:28 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:28 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_INFO
> Feb 4 09:00:28 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:28 vpn pluto[15879]: | message ID: 69 78 7b ab
> Feb 4 09:00:28 vpn pluto[15879]: | length: 84
> Feb 4 09:00:28 vpn pluto[15879]: | processing packet with exchange type=ISAKMP_XCHG_INFO (5)
> Feb 4 09:00:28 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:28 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:28 vpn pluto[15879]: | peer and cookies match on #2, provided msgid 00000000 vs fb2872f0/00000000
> Feb 4 09:00:28 vpn pluto[15879]: | peer and cookies match on #1, provided msgid 00000000 vs 00000000/00000000
> Feb 4 09:00:28 vpn pluto[15879]: | p15 state object #1 found, in STATE_AGGR_I2
> Feb 4 09:00:28 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:28 vpn pluto[15879]: | last Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:28 vpn pluto[15879]: | current Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:28 vpn pluto[15879]: | computed Phase 2 IV:
> Feb 4 09:00:28 vpn pluto[15879]: | 16 66 d9 95 bf e3 70 4b f2 9d 1b b5 b3 dd 7e 42
> Feb 4 09:00:28 vpn pluto[15879]: | c2 a1 7b c7
> Feb 4 09:00:28 vpn pluto[15879]: | received encrypted packet from 79.207.134.254:500
> Feb 4 09:00:28 vpn pluto[15879]: | decrypting 56 bytes using algorithm OAKLEY_3DES_CBC
> Feb 4 09:00:28 vpn pluto[15879]: | decrypted:
> Feb 4 09:00:28 vpn pluto[15879]: | 0b 00 00 18 e9 9a 89 ed 30 8d b0 17 73 74 ef c3
> Feb 4 09:00:28 vpn pluto[15879]: | 0d a3 9f b7 96 7a 38 22 00 00 00 1c 00 00 00 01
> Feb 4 09:00:28 vpn pluto[15879]: | 01 10 60 02 51 ec 62 5a c7 55 66 cf 92 51 a3 c6
> Feb 4 09:00:28 vpn pluto[15879]: | 21 37 23 a1 00 00 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | next IV: 16 2a 9e 70 b0 09 1c db
> Feb 4 09:00:28 vpn pluto[15879]: | np=8 and sd=0x80eae50
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Hash Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_N
> Feb 4 09:00:28 vpn pluto[15879]: | length: 24
> Feb 4 09:00:28 vpn pluto[15879]: | np=11 and sd=0x80eae74
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Notification Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 28
> Feb 4 09:00:28 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:28 vpn pluto[15879]: | protocol ID: 1
> Feb 4 09:00:28 vpn pluto[15879]: | SPI size: 16
> Feb 4 09:00:28 vpn pluto[15879]: | Notify Message Type: IPSEC_INITIAL_CONTACT
> Feb 4 09:00:28 vpn pluto[15879]: | removing 4 bytes of padding
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT
> Feb 4 09:00:28 vpn pluto[15879]: | info: 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | processing informational IPSEC_INITIAL_CONTACT (24578)
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #1: received and ignored informational message
> Feb 4 09:00:28 vpn pluto[15879]: | complete state transition with STF_IGNORE
> Feb 4 09:00:28 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 104 seconds
> Feb 4 09:00:28 vpn pluto[15887]: ! Local DH secret:
> Feb 4 09:00:28 vpn pluto[15887]: ! 2d 4b 02 6f 52 ac 4e ee e9 be 54 92 bb 32 90 1e
> Feb 4 09:00:28 vpn pluto[15887]: ! 4e e7 ef 9e e4 99 e0 73 08 1a 68 c7 c5 d5 27 40
> Feb 4 09:00:28 vpn pluto[15887]: ! Public DH value sent:
> Feb 4 09:00:28 vpn pluto[15887]: ! 2d 0c 98 37 75 5b e8 8f 8c 86 a9 88 df 71 8c 7a
> Feb 4 09:00:28 vpn pluto[15887]: ! cd 12 c5 b8 9b 7d 45 80 d6 af a1 a5 56 6a 3f 13
> Feb 4 09:00:28 vpn pluto[15887]: ! 2c 32 ee 17 02 f3 cf 80 f1 95 87 65 f4 58 64 66
> Feb 4 09:00:28 vpn pluto[15887]: ! 1a 4e 5e bc 55 de 19 aa 94 5c fc 10 f0 be 24 00
> Feb 4 09:00:28 vpn pluto[15887]: ! c7 3c d1 40 6a a3 0e 08 ae a9 4b 3d 97 9f 36 96
> Feb 4 09:00:28 vpn pluto[15887]: ! c3 b6 6a 7b e8 71 81 61 99 72 94 53 15 a4 2d 2c
> Feb 4 09:00:28 vpn pluto[15887]: ! 98 cb 66 fe 21 51 df f2 49 ba 8d 76 77 64 6e fa
> Feb 4 09:00:28 vpn pluto[15887]: ! 7d 35 b1 8e ba f4 5d ca d9 cc a2 53 e6 e5 01 36
> Feb 4 09:00:28 vpn pluto[15887]: ! Generated nonce:
> Feb 4 09:00:28 vpn pluto[15887]: ! 75 25 9c fd b7 4b dc c9 44 2a 45 0d 9e bf 9f e0
> Feb 4 09:00:28 vpn pluto[15879]: | helper 0 has work (cnt now 0)
> Feb 4 09:00:28 vpn pluto[15879]: | helper 0 replies to sequence 2
> Feb 4 09:00:28 vpn pluto[15879]: | calling callback function 0x806d7e0
> Feb 4 09:00:28 vpn pluto[15879]: | quick outI1: calculated ke+nonce, sending I1
> Feb 4 09:00:28 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:28 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:00:28 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:28 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:28 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_QUICK
> Feb 4 09:00:28 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:28 vpn pluto[15879]: | message ID: fb 28 72 f0
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Hash Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_SA
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Hash Payload: 24
> Feb 4 09:00:28 vpn pluto[15879]: | empty esp_info, returning empty
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Security Association Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONCE
> Feb 4 09:00:28 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:28 vpn pluto[15879]: | ****emit IPsec DOI SIT:
> Feb 4 09:00:28 vpn pluto[15879]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
> Feb 4 09:00:28 vpn pluto[15879]: | out_sa pcn: 0 has 1 valid proposals
> Feb 4 09:00:28 vpn pluto[15879]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
> Feb 4 09:00:28 vpn pluto[15879]: | ****emit ISAKMP Proposal Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | proposal number: 0
> Feb 4 09:00:28 vpn pluto[15879]: | protocol ID: PROTO_IPSEC_ESP
> Feb 4 09:00:28 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:00:28 vpn pluto[15879]: | number of transforms: 4
> Feb 4 09:00:28 vpn pluto[15879]: | netlink_get_spi: allocated 0xda4ae1f5 for esp.0 at 84.154.56.62
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
> Feb 4 09:00:28 vpn pluto[15879]: | SPI da 4a e1 f5
> Feb 4 09:00:28 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_T
> Feb 4 09:00:28 vpn pluto[15879]: | transform number: 0
> Feb 4 09:00:28 vpn pluto[15879]: | transform ID: ESP_AES
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is AUTH_ALGORITHM_HMAC_SHA1]
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:28 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_T
> Feb 4 09:00:28 vpn pluto[15879]: | transform number: 1
> Feb 4 09:00:28 vpn pluto[15879]: | transform ID: ESP_AES
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is AUTH_ALGORITHM_HMAC_MD5]
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:28 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_T
> Feb 4 09:00:28 vpn pluto[15879]: | transform number: 2
> Feb 4 09:00:28 vpn pluto[15879]: | transform ID: ESP_3DES
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is AUTH_ALGORITHM_HMAC_SHA1]
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:28 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | transform number: 3
> Feb 4 09:00:28 vpn pluto[15879]: | transform ID: ESP_3DES
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:28 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is AUTH_ALGORITHM_HMAC_MD5]
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Proposal Payload: 124
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Security Association Payload: 136
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Nonce Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_KE
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload
> Feb 4 09:00:28 vpn pluto[15879]: | Ni 75 25 9c fd b7 4b dc c9 44 2a 45 0d 9e bf 9f e0
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Nonce Payload: 20
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Key Exchange Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 128 raw bytes of keyex value into ISAKMP Key Exchange Payload
> Feb 4 09:00:28 vpn pluto[15879]: | keyex value 2d 0c 98 37 75 5b e8 8f 8c 86 a9 88 df 71 8c 7a
> Feb 4 09:00:28 vpn pluto[15879]: | cd 12 c5 b8 9b 7d 45 80 d6 af a1 a5 56 6a 3f 13
> Feb 4 09:00:28 vpn pluto[15879]: | 2c 32 ee 17 02 f3 cf 80 f1 95 87 65 f4 58 64 66
> Feb 4 09:00:28 vpn pluto[15879]: | 1a 4e 5e bc 55 de 19 aa 94 5c fc 10 f0 be 24 00
> Feb 4 09:00:28 vpn pluto[15879]: | c7 3c d1 40 6a a3 0e 08 ae a9 4b 3d 97 9f 36 96
> Feb 4 09:00:28 vpn pluto[15879]: | c3 b6 6a 7b e8 71 81 61 99 72 94 53 15 a4 2d 2c
> Feb 4 09:00:28 vpn pluto[15879]: | 98 cb 66 fe 21 51 df f2 49 ba 8d 76 77 64 6e fa
> Feb 4 09:00:28 vpn pluto[15879]: | 7d 35 b1 8e ba f4 5d ca d9 cc a2 53 e6 e5 01 36
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Key Exchange Payload: 132
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:28 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:28 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:28 vpn pluto[15879]: | port: 0
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:28 vpn pluto[15879]: | client network c0 a8 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:28 vpn pluto[15879]: | client mask ff ff ff 00
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:28 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:28 vpn pluto[15879]: | port: 0
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:28 vpn pluto[15879]: | client network c0 a8 01 00
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:28 vpn pluto[15879]: | client mask ff ff ff 00
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
> Feb 4 09:00:28 vpn pluto[15879]: | HASH(1) computed:
> Feb 4 09:00:28 vpn pluto[15879]: | 14 0b 93 af e1 4f 96 c0 d1 69 8a b7 cc 94 20 ae
> Feb 4 09:00:28 vpn pluto[15879]: | 2c f8 39 84
> Feb 4 09:00:28 vpn pluto[15879]: | last Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:28 vpn pluto[15879]: | current Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:28 vpn pluto[15879]: | computed Phase 2 IV:
> Feb 4 09:00:28 vpn pluto[15879]: | 6a fd 07 04 27 fa 11 74 41 4f 98 92 0e 9f a5 11
> Feb 4 09:00:28 vpn pluto[15879]: | 08 df b9 74
> Feb 4 09:00:28 vpn pluto[15879]: | encrypting:
> Feb 4 09:00:28 vpn pluto[15879]: | 01 00 00 18 14 0b 93 af e1 4f 96 c0 d1 69 8a b7
> Feb 4 09:00:28 vpn pluto[15879]: | cc 94 20 ae 2c f8 39 84 0a 00 00 88 00 00 00 01
> Feb 4 09:00:28 vpn pluto[15879]: | 00 00 00 01 00 00 00 7c 00 03 04 04 da 4a e1 f5
> Feb 4 09:00:28 vpn pluto[15879]: | 03 00 00 1c 00 0c 00 00 80 03 00 02 80 04 00 01
> Feb 4 09:00:28 vpn pluto[15879]: | 80 01 00 01 80 02 70 80 80 05 00 02 03 00 00 1c
> Feb 4 09:00:28 vpn pluto[15879]: | 01 0c 00 00 80 03 00 02 80 04 00 01 80 01 00 01
> Feb 4 09:00:28 vpn pluto[15879]: | 80 02 70 80 80 05 00 01 03 00 00 1c 02 03 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | 80 03 00 02 80 04 00 01 80 01 00 01 80 02 70 80
> Feb 4 09:00:28 vpn pluto[15879]: | 80 05 00 02 00 00 00 1c 03 03 00 00 80 03 00 02
> Feb 4 09:00:28 vpn pluto[15879]: | 80 04 00 01 80 01 00 01 80 02 70 80 80 05 00 01
> Feb 4 09:00:28 vpn pluto[15879]: | 04 00 00 14 75 25 9c fd b7 4b dc c9 44 2a 45 0d
> Feb 4 09:00:28 vpn pluto[15879]: | 9e bf 9f e0 05 00 00 84 2d 0c 98 37 75 5b e8 8f
> Feb 4 09:00:28 vpn pluto[15879]: | 8c 86 a9 88 df 71 8c 7a cd 12 c5 b8 9b 7d 45 80
> Feb 4 09:00:28 vpn pluto[15879]: | d6 af a1 a5 56 6a 3f 13 2c 32 ee 17 02 f3 cf 80
> Feb 4 09:00:28 vpn pluto[15879]: | f1 95 87 65 f4 58 64 66 1a 4e 5e bc 55 de 19 aa
> Feb 4 09:00:28 vpn pluto[15879]: | 94 5c fc 10 f0 be 24 00 c7 3c d1 40 6a a3 0e 08
> Feb 4 09:00:28 vpn pluto[15879]: | ae a9 4b 3d 97 9f 36 96 c3 b6 6a 7b e8 71 81 61
> Feb 4 09:00:28 vpn pluto[15879]: | 99 72 94 53 15 a4 2d 2c 98 cb 66 fe 21 51 df f2
> Feb 4 09:00:28 vpn pluto[15879]: | 49 ba 8d 76 77 64 6e fa 7d 35 b1 8e ba f4 5d ca
> Feb 4 09:00:28 vpn pluto[15879]: | d9 cc a2 53 e6 e5 01 36 05 00 00 10 04 00 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | c0 a8 00 00 ff ff ff 00 00 00 00 10 04 00 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | c0 a8 01 00 ff ff ff 00
> Feb 4 09:00:28 vpn pluto[15879]: | IV:
> Feb 4 09:00:28 vpn pluto[15879]: | 6a fd 07 04 27 fa 11 74 41 4f 98 92 0e 9f a5 11
> Feb 4 09:00:28 vpn pluto[15879]: | 08 df b9 74
> Feb 4 09:00:28 vpn pluto[15879]: | encrypting using OAKLEY_3DES_CBC
> Feb 4 09:00:28 vpn pluto[15879]: | next IV: aa 21 a8 e2 b9 09 a2 3c
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Message: 372
> Feb 4 09:00:28 vpn pluto[15879]: | sending 372 bytes for quick_outI1 through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | 08 10 20 01 fb 28 72 f0 00 00 01 74 78 3b 16 5b
> Feb 4 09:00:28 vpn pluto[15879]: | 74 4f a0 f8 c4 1f dc a6 ee ad 87 f2 f7 59 87 22
> Feb 4 09:00:28 vpn pluto[15879]: | 60 7b 1d e0 06 7b 81 6f 2a d5 27 c9 0c 34 0f 7a
> Feb 4 09:00:28 vpn pluto[15879]: | 1c 39 11 98 46 3c 5f 29 19 d3 90 0e 5d 10 d3 cd
> Feb 4 09:00:28 vpn pluto[15879]: | d7 7c 1d 83 41 51 e0 e7 e1 88 72 ad e9 63 ba 02
> Feb 4 09:00:28 vpn pluto[15879]: | cc 6b 77 88 3f 83 ca 87 52 68 d3 7e 74 90 cd ae
> Feb 4 09:00:28 vpn pluto[15879]: | 72 9a f9 3b 23 3d a6 99 e4 d9 4a 67 21 bb 0b a6
> Feb 4 09:00:28 vpn pluto[15879]: | 0c af fe 31 d4 57 49 aa b3 64 fd c6 fb 4e 39 c2
> Feb 4 09:00:28 vpn pluto[15879]: | d4 2f 31 c2 e4 41 ab f3 7e 52 24 39 1b 2c 19 59
> Feb 4 09:00:28 vpn pluto[15879]: | ea d6 c3 86 e4 04 11 4e 59 f4 e3 a7 cb fb d8 d3
> Feb 4 09:00:28 vpn pluto[15879]: | 1c 72 a0 e5 01 4e 99 e5 f0 a4 32 2e b6 32 73 ee
> Feb 4 09:00:28 vpn pluto[15879]: | 5f 6f b1 a4 7e ca ad 69 88 5e 9f 53 26 d5 f8 01
> Feb 4 09:00:28 vpn pluto[15879]: | d1 be ba 5b 16 df f1 39 0c 5a 73 df ad 3a 95 b3
> Feb 4 09:00:28 vpn pluto[15879]: | 8d 50 28 4d b5 8d b7 74 cb 8c 68 15 d8 85 64 0d
> Feb 4 09:00:28 vpn pluto[15879]: | d5 3c 93 99 bd d6 9d 57 74 c8 b2 fc e4 ca af 76
> Feb 4 09:00:28 vpn pluto[15879]: | 4c 5a cd 9c ea f7 8c ea 30 47 c3 c6 fa 13 8a f5
> Feb 4 09:00:28 vpn pluto[15879]: | 30 96 06 c1 c3 68 a5 f5 ea 80 a4 49 ca 52 54 df
> Feb 4 09:00:28 vpn pluto[15879]: | f1 49 d1 44 43 e0 6e 63 59 17 73 5c fa 6f 8f 84
> Feb 4 09:00:28 vpn pluto[15879]: | 5a c6 04 05 73 a2 ce 9e 44 27 31 39 35 14 a9 a7
> Feb 4 09:00:28 vpn pluto[15879]: | 9a 5f 11 5b 92 40 90 4c a1 99 45 57 38 56 f6 f1
> Feb 4 09:00:28 vpn pluto[15879]: | a3 d9 b4 70 d0 d0 f1 27 51 88 0e f7 c8 c4 2f 89
> Feb 4 09:00:28 vpn pluto[15879]: | a4 ff 70 70 a0 df f6 9f 2e ee 5d c4 aa 21 a8 e2
> Feb 4 09:00:28 vpn pluto[15879]: | b9 09 a2 3c
> Feb 4 09:00:28 vpn pluto[15879]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #2
> Feb 4 09:00:28 vpn pluto[15879]: | next event EVENT_RETRANSMIT in 10 seconds for #2
> Feb 4 09:00:28 vpn pluto[15879]: |
> Feb 4 09:00:28 vpn pluto[15879]: | *received 316 bytes from 79.207.134.254:500 on ppp0 (port=500)
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | 08 10 20 01 fb 28 72 f0 00 00 01 3c f9 a6 43 85
> Feb 4 09:00:28 vpn pluto[15879]: | 71 a1 3f eb 21 4a d6 27 c7 b7 12 16 32 aa 39 34
> Feb 4 09:00:28 vpn pluto[15879]: | 6c cd 48 0b 8c 9c 9f 6f 3f ba 42 12 a8 86 f8 43
> Feb 4 09:00:28 vpn pluto[15879]: | db 84 a8 e1 49 b8 b2 2a 48 5b e3 13 36 ac 54 25
> Feb 4 09:00:28 vpn pluto[15879]: | 3c ca 0f 12 93 42 26 cd de a9 99 c1 ab e0 33 73
> Feb 4 09:00:28 vpn pluto[15879]: | 57 59 99 5d 3e 55 12 b3 53 b9 0d d9 f6 37 b8 e5
> Feb 4 09:00:28 vpn pluto[15879]: | 8d 34 e6 bc 64 22 f4 59 7e 21 e6 9f 8c d6 be 46
> Feb 4 09:00:28 vpn pluto[15879]: | c6 a9 d8 21 c2 6f e4 db 7c 20 c9 d3 6a ae 33 9e
> Feb 4 09:00:28 vpn pluto[15879]: | 1e 54 d6 20 43 28 93 c4 e7 38 24 e0 a4 4d a0 b7
> Feb 4 09:00:28 vpn pluto[15879]: | 09 a8 de 4a c7 de 80 d0 03 75 2d 5d 64 d7 d5 b3
> Feb 4 09:00:28 vpn pluto[15879]: | 63 9d 28 c0 02 52 88 30 26 8f a4 a3 72 5c dc 8e
> Feb 4 09:00:28 vpn pluto[15879]: | 89 95 67 e5 ee 27 ca 81 5a 7d 28 b8 0d 00 76 08
> Feb 4 09:00:28 vpn pluto[15879]: | d9 f2 7a dd 0e 84 13 16 a2 bd 13 45 9b 4d ce 7b
> Feb 4 09:00:28 vpn pluto[15879]: | 9c 78 66 c0 84 a0 ee db 3d 6c dc 90 b6 00 38 e2
> Feb 4 09:00:28 vpn pluto[15879]: | 92 ff cd 2f b7 0b fb 05 41 2f 36 36 e2 22 d0 3b
> Feb 4 09:00:28 vpn pluto[15879]: | 43 65 36 d4 57 62 bb 43 42 08 c5 ca df 5b 87 bb
> Feb 4 09:00:28 vpn pluto[15879]: | 09 e4 22 27 e8 5d 51 b9 f1 02 bb 1e 51 53 16 e4
> Feb 4 09:00:28 vpn pluto[15879]: | 87 08 e8 0f 4f 88 f2 8d 13 ae 92 fd 0d cb 1e ea
> Feb 4 09:00:28 vpn pluto[15879]: | d4 2f 0e c9 10 94 3f 1b ae 3f a2 b1
> Feb 4 09:00:28 vpn pluto[15879]: | **parse ISAKMP Message:
> Feb 4 09:00:28 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:28 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:28 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_QUICK
> Feb 4 09:00:28 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:28 vpn pluto[15879]: | message ID: fb 28 72 f0
> Feb 4 09:00:28 vpn pluto[15879]: | length: 316
> Feb 4 09:00:28 vpn pluto[15879]: | processing packet with exchange type=ISAKMP_XCHG_QUICK (32)
> Feb 4 09:00:28 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:28 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:28 vpn pluto[15879]: | peer and cookies match on #2, provided msgid fb2872f0 vs fb2872f0
> Feb 4 09:00:28 vpn pluto[15879]: | state object #2 found, in STATE_QUICK_I1
> Feb 4 09:00:28 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:28 vpn pluto[15879]: | received encrypted packet from 79.207.134.254:500
> Feb 4 09:00:28 vpn pluto[15879]: | decrypting 288 bytes using algorithm OAKLEY_3DES_CBC
> Feb 4 09:00:28 vpn pluto[15879]: | decrypted:
> Feb 4 09:00:28 vpn pluto[15879]: | 01 00 00 18 aa 3f 16 6e 47 e5 88 01 15 f1 66 cc
> Feb 4 09:00:28 vpn pluto[15879]: | 80 21 4e 55 b1 50 8b a8 0a 00 00 34 00 00 00 01
> Feb 4 09:00:28 vpn pluto[15879]: | 00 00 00 01 00 00 00 28 01 03 04 01 d3 b1 a6 29
> Feb 4 09:00:28 vpn pluto[15879]: | 00 00 00 1c 00 0c 00 00 80 05 00 02 80 03 00 02
> Feb 4 09:00:28 vpn pluto[15879]: | 80 01 00 01 80 02 70 80 80 04 00 01 04 00 00 14
> Feb 4 09:00:28 vpn pluto[15879]: | ba 3d c6 f6 aa 91 a3 93 a8 0e 8b 22 0a 59 b2 d0
> Feb 4 09:00:28 vpn pluto[15879]: | 05 00 00 84 93 e5 4a 7e 59 08 a9 95 84 ab 48 36
> Feb 4 09:00:28 vpn pluto[15879]: | 8c 21 70 ca 3f 54 14 50 d7 9c 19 11 40 de d7 33
> Feb 4 09:00:28 vpn pluto[15879]: | 07 2a 00 b5 f5 e2 28 bb 68 89 6b 45 18 08 dc db
> Feb 4 09:00:28 vpn pluto[15879]: | 23 f2 1f b5 08 9b e4 99 72 07 40 c9 88 11 ec 42
> Feb 4 09:00:28 vpn pluto[15879]: | 32 48 c6 a2 3d da 64 2f 6f 3d 73 5c 03 52 25 92
> Feb 4 09:00:28 vpn pluto[15879]: | ab f7 cd df f5 1e af ce ae b3 5c ca 24 03 5c a4
> Feb 4 09:00:28 vpn pluto[15879]: | 06 67 12 36 9e 5e b2 07 bd 88 c9 8b 17 df 0b a6
> Feb 4 09:00:28 vpn pluto[15879]: | d4 e9 57 3a 65 ad 0f 9c ff 1f 39 75 c6 ea 3d 80
> Feb 4 09:00:28 vpn pluto[15879]: | 31 2f 7f c6 05 00 00 10 04 00 00 00 c0 a8 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | ff ff ff 00 0b 00 00 10 04 00 00 00 c0 a8 01 00
> Feb 4 09:00:28 vpn pluto[15879]: | ff ff ff 00 00 00 00 18 00 00 00 01 03 04 60 00
> Feb 4 09:00:28 vpn pluto[15879]: | da 4a e1 f5 80 01 00 01 80 02 0e 10 00 00 00 00
> Feb 4 09:00:28 vpn pluto[15879]: | next IV: 10 94 3f 1b ae 3f a2 b1
> Feb 4 09:00:28 vpn pluto[15879]: | np=8 and sd=0x80eae50
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Hash Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_SA
> Feb 4 09:00:28 vpn pluto[15879]: | length: 24
> Feb 4 09:00:28 vpn pluto[15879]: | np=1 and sd=0x80eadc0
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Security Association Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONCE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 52
> Feb 4 09:00:28 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:28 vpn pluto[15879]: | np=10 and sd=0x80eae68
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Nonce Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_KE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 20
> Feb 4 09:00:28 vpn pluto[15879]: | np=4 and sd=0x80eae14
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Key Exchange Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:28 vpn pluto[15879]: | length: 132
> Feb 4 09:00:28 vpn pluto[15879]: | np=5 and sd=(nil)
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:28 vpn pluto[15879]: | length: 16
> Feb 4 09:00:28 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:28 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:28 vpn pluto[15879]: | port: 0
> Feb 4 09:00:28 vpn pluto[15879]: | np=5 and sd=(nil)
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_N
> Feb 4 09:00:28 vpn pluto[15879]: | length: 16
> Feb 4 09:00:28 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:28 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:28 vpn pluto[15879]: | port: 0
> Feb 4 09:00:28 vpn pluto[15879]: | np=11 and sd=0x80eae74
> Feb 4 09:00:28 vpn pluto[15879]: | ***parse ISAKMP Notification Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 24
> Feb 4 09:00:28 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:28 vpn pluto[15879]: | protocol ID: 3
> Feb 4 09:00:28 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:00:28 vpn pluto[15879]: | Notify Message Type: IPSEC_RESPONDER_LIFETIME
> Feb 4 09:00:28 vpn pluto[15879]: | removing 4 bytes of padding
> Feb 4 09:00:28 vpn pluto[15879]: "**********" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME
> Feb 4 09:00:28 vpn pluto[15879]: | info: da 4a e1 f5 80 01 00 01 80 02 0e 10
> Feb 4 09:00:28 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:00:28 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:28 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:28 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:28 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:28 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_QUICK
> Feb 4 09:00:28 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:28 vpn pluto[15879]: | message ID: fb 28 72 f0
> Feb 4 09:00:28 vpn pluto[15879]: | HASH(2) computed:
> Feb 4 09:00:28 vpn pluto[15879]: | aa 3f 16 6e 47 e5 88 01 15 f1 66 cc 80 21 4e 55
> Feb 4 09:00:28 vpn pluto[15879]: | b1 50 8b a8
> Feb 4 09:00:28 vpn pluto[15879]: | ****parse IPsec DOI SIT:
> Feb 4 09:00:28 vpn pluto[15879]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
> Feb 4 09:00:28 vpn pluto[15879]: | ****parse ISAKMP Proposal Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 40
> Feb 4 09:00:28 vpn pluto[15879]: | proposal number: 1
> Feb 4 09:00:28 vpn pluto[15879]: | protocol ID: PROTO_IPSEC_ESP
> Feb 4 09:00:28 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:00:28 vpn pluto[15879]: | number of transforms: 1
> Feb 4 09:00:28 vpn pluto[15879]: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
> Feb 4 09:00:28 vpn pluto[15879]: | SPI d3 b1 a6 29
> Feb 4 09:00:28 vpn pluto[15879]: | *****parse ISAKMP Transform Payload (ESP):
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | length: 28
> Feb 4 09:00:28 vpn pluto[15879]: | transform number: 0
> Feb 4 09:00:28 vpn pluto[15879]: | transform ID: ESP_AES
> Feb 4 09:00:28 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is AUTH_ALGORITHM_HMAC_SHA1]
> Feb 4 09:00:28 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:28 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:28 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:28 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:28 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:28 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:28 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:28 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:28 vpn pluto[15879]: | DH public value received:
> Feb 4 09:00:28 vpn pluto[15879]: | 93 e5 4a 7e 59 08 a9 95 84 ab 48 36 8c 21 70 ca
> Feb 4 09:00:28 vpn pluto[15879]: | 3f 54 14 50 d7 9c 19 11 40 de d7 33 07 2a 00 b5
> Feb 4 09:00:28 vpn pluto[15879]: | f5 e2 28 bb 68 89 6b 45 18 08 dc db 23 f2 1f b5
> Feb 4 09:00:28 vpn pluto[15879]: | 08 9b e4 99 72 07 40 c9 88 11 ec 42 32 48 c6 a2
> Feb 4 09:00:28 vpn pluto[15879]: | 3d da 64 2f 6f 3d 73 5c 03 52 25 92 ab f7 cd df
> Feb 4 09:00:28 vpn pluto[15879]: | f5 1e af ce ae b3 5c ca 24 03 5c a4 06 67 12 36
> Feb 4 09:00:28 vpn pluto[15879]: | 9e 5e b2 07 bd 88 c9 8b 17 df 0b a6 d4 e9 57 3a
> Feb 4 09:00:28 vpn pluto[15879]: | 65 ad 0f 9c ff 1f 39 75 c6 ea 3d 80 31 2f 7f c6
> Feb 4 09:00:28 vpn pluto[15879]: | started looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:28 vpn pluto[15879]: | actually looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:28 vpn pluto[15879]: | 1: compared PSK @********** to @************************ / @********** -> 2
> Feb 4 09:00:28 vpn pluto[15879]: | 2: compared PSK @************************ to @************************ / @********** -> 6
> Feb 4 09:00:28 vpn pluto[15879]: | best_match 0>6 best=0x8838018 (line=11)
> Feb 4 09:00:28 vpn pluto[15879]: | concluding with best_match=6 best=0x8838018 (lineno=11)
> Feb 4 09:00:28 vpn pluto[15879]: | calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1024): 54069 usec
> Feb 4 09:00:28 vpn pluto[15879]: | DH shared secret:
> Feb 4 09:00:28 vpn pluto[15879]: | 25 04 bb 25 5e b5 8a 7b 43 4a e0 81 b7 6f 36 25
> Feb 4 09:00:28 vpn pluto[15879]: | d3 67 29 72 ff 5d 89 55 33 83 f5 ea 07 96 ca 21
> Feb 4 09:00:28 vpn pluto[15879]: | a1 0b c5 bc 0d a0 f0 07 29 5a b2 e7 98 35 24 3e
> Feb 4 09:00:28 vpn pluto[15879]: | 25 21 ef 47 61 22 97 d9 a5 9f 82 57 32 cf 3e 2f
> Feb 4 09:00:28 vpn pluto[15879]: | 37 25 26 bc 49 eb 5d 61 ab 1b b4 ce e0 f5 a4 09
> Feb 4 09:00:28 vpn pluto[15879]: | 59 71 a7 68 0a c2 90 11 31 ff 22 fb 7c d4 53 77
> Feb 4 09:00:28 vpn pluto[15879]: | 91 9f e8 4d e8 6b 51 71 a6 9a 24 bd 4b d6 c2 54
> Feb 4 09:00:28 vpn pluto[15879]: | 19 97 20 1e 02 ac 39 1e 74 c2 df 69 44 81 1c 92
> Feb 4 09:00:28 vpn pluto[15879]: | our client is subnet 192.168.0.0/24
> Feb 4 09:00:28 vpn pluto[15879]: | our client protocol/port is 0/0
> Feb 4 09:00:28 vpn pluto[15879]: | peer client is subnet 192.168.1.0/24
> Feb 4 09:00:28 vpn pluto[15879]: | peer client protocol/port is 0/0
> Feb 4 09:00:28 vpn pluto[15879]: | ***emit ISAKMP Hash Payload:
> Feb 4 09:00:28 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:28 vpn pluto[15879]: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload
> Feb 4 09:00:28 vpn pluto[15879]: | emitting length of ISAKMP Hash Payload: 24
> Feb 4 09:00:28 vpn pluto[15879]: | HASH(3) computed: e2 64 dc 3a 25 c8 1d 3b d3 0b 5b 84 ba 0e 9e 16
> Feb 4 09:00:28 vpn pluto[15879]: | 46 f0 35 3e
> Feb 4 09:00:28 vpn pluto[15879]: | compute_proto_keymat:needed_len (after ESP enc)=16
> Feb 4 09:00:28 vpn pluto[15879]: | compute_proto_keymat:needed_len (after ESP auth)=36
> Feb 4 09:00:28 vpn pluto[15879]: | KEYMAT computed:
> Feb 4 09:00:28 vpn pluto[15879]: | 01 f3 26 df 62 71 7a 89 98 8a ce dc 19 78 46 03
> Feb 4 09:00:28 vpn pluto[15879]: | 50 0d dc 9b 5a 00 5f d3 b4 66 48 94 fe e8 e0 ac
> Feb 4 09:00:28 vpn pluto[15879]: | 17 3d 6e 9c
> Feb 4 09:00:28 vpn pluto[15879]: | Peer KEYMAT computed:
> Feb 4 09:00:28 vpn pluto[15879]: | 5d 62 fc 11 65 bf 92 20 72 b1 60 ac 99 f9 70 b5
> Feb 4 09:00:28 vpn pluto[15879]: | 0b aa 80 4e b8 03 35 41 20 4d 98 64 fa b8 ef 1d
> Feb 4 09:00:28 vpn pluto[15879]: | f8 92 48 c2
> Feb 4 09:00:28 vpn pluto[15879]: | install_ipsec_sa() for #2: inbound and outbound
> Feb 4 09:00:28 vpn pluto[15879]: | route owner of "**********" erouted HOLD: self; eroute owner: self
> Feb 4 09:00:28 vpn pluto[15879]: | could_route called for ********** (kind=CK_PERMANENT)
> Feb 4 09:00:28 vpn pluto[15879]: | looking for alg with transid: 12 keylen: 0 auth: 2
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 1
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 2
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 0
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 1
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 2
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 0
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 1
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 2
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 0
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 1
> Feb 4 09:00:28 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 2
> Feb 4 09:00:28 vpn pluto[15879]: | add inbound eroute 192.168.1.0/24:0 --0-> 192.168.0.0/24:0 => tun.10000 at 84.154.56.62 (raw_eroute)
> Feb 4 09:00:29 vpn pluto[15879]: | looking for alg with transid: 12 keylen: 0 auth: 2
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 1
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 2
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 0
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 1
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 2
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 0
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 1
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 2
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 0
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 1
> Feb 4 09:00:29 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 2
> Feb 4 09:00:29 vpn pluto[15879]: | sr for #2: erouted HOLD
> Feb 4 09:00:29 vpn pluto[15879]: | route owner of "**********" erouted HOLD: self; eroute owner: self
> Feb 4 09:00:29 vpn pluto[15879]: | route_and_eroute with c: ********** (next: none) ero:********** esr:{(nil)} ro:********** rosr:{(nil)} and state: 2
> Feb 4 09:00:29 vpn pluto[15879]: | eroute_connection replace eroute 192.168.0.0/24:0 --0-> 192.168.1.0/24:0 => tun.0 at 79.207.134.254 (raw_eroute)
> Feb 4 09:00:29 vpn pluto[15879]: | command executing up-client
> Feb 4 09:00:29 vpn pluto[15879]: | executing up-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='up-client' PLUTO_CONNECTION='**********' PLUTO_NEXT_HOP='79.207.134.254' PLUTO_INTERFACE='ppp0' PLUTO_ME='84.154.56.62' PLUTO_MY_ID='@************************' PLUTO_MY_CLIENT='192.168.0.0/24' PLUTO_MY_CLIENT_NET='192.168.0.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='79.207.134.254' PLUTO_PEER_ID='@**********' PLUTO_PEER_CLIENT='192.168.1.0/24' PLUTO_PEER_CLIENT_NET='192.168.1.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE' PLUTO_MY_SOURCEIP='192.168.0.1' ipsec _updown
> Feb 4 09:00:29 vpn pluto[15879]: | route_and_eroute: firewall_notified: true
> Feb 4 09:00:29 vpn pluto[15879]: | route_and_eroute: instance "**********", setting eroute_owner {spd=0x88386d4,sr=0x88386d4} to #2 (was #0) (newest_ipsec_sa=#0)
> Feb 4 09:00:29 vpn pluto[15879]: | encrypting:
> Feb 4 09:00:29 vpn pluto[15879]: | 00 00 00 18 e2 64 dc 3a 25 c8 1d 3b d3 0b 5b 84
> Feb 4 09:00:29 vpn pluto[15879]: | ba 0e 9e 16 46 f0 35 3e
> Feb 4 09:00:29 vpn pluto[15879]: | IV:
> Feb 4 09:00:29 vpn pluto[15879]: | 10 94 3f 1b ae 3f a2 b1
> Feb 4 09:00:29 vpn pluto[15879]: | encrypting using OAKLEY_3DES_CBC
> Feb 4 09:00:29 vpn pluto[15879]: | next IV: a6 14 c4 b3 01 a1 d0 28
> Feb 4 09:00:29 vpn pluto[15879]: | emitting length of ISAKMP Message: 52
> Feb 4 09:00:29 vpn pluto[15879]: | inR1_outI2: instance **********[0], setting newest_ipsec_sa to #2 (was #0) (spd.eroute=#2)
> Feb 4 09:00:29 vpn pluto[15879]: | complete state transition with STF_OK
> Feb 4 09:00:29 vpn pluto[15879]: "**********" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
> Feb 4 09:00:29 vpn pluto[15879]: | sending reply packet to 79.207.134.254:500 (from port=500)
> Feb 4 09:00:29 vpn pluto[15879]: | sending 52 bytes for STATE_QUICK_I1 through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:00:29 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:29 vpn pluto[15879]: | 08 10 20 01 fb 28 72 f0 00 00 00 34 ac fd cf 67
> Feb 4 09:00:29 vpn pluto[15879]: | 32 ba 64 98 61 97 59 92 01 07 1c 21 a6 14 c4 b3
> Feb 4 09:00:29 vpn pluto[15879]: | 01 a1 d0 28
> Feb 4 09:00:29 vpn pluto[15879]: | inserting event EVENT_SA_REPLACE, timeout in 27931 seconds for #2
> Feb 4 09:00:29 vpn pluto[15879]: "**********" #2: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0xd3b1a629 <0xda4ae1f5 xfrm=AES_0-HMAC_SHA1 NATD=none DPD=none}
> Feb 4 09:00:29 vpn pluto[15879]: | modecfg pull: noquirk policy:push not-client
> Feb 4 09:00:29 vpn pluto[15879]: | phase 1 is done, looking for phase 1 to unpend
> Feb 4 09:00:29 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 103 seconds
> Feb 4 09:00:57 vpn pluto[15879]: |
> Feb 4 09:00:57 vpn pluto[15879]: | *received kernel message
> Feb 4 09:00:57 vpn pluto[15879]: | netlink_get: XFRM_MSG_ACQUIRE message
> Feb 4 09:00:57 vpn pluto[15879]: | add bare shunt 0x883a7d8 192.168.0.1/32:0 -0-> 192.168.1.1/32:0 => %hold 0 %acquire-netlink
> Feb 4 09:00:57 vpn pluto[15879]: | initiate on demand from 192.168.0.1:0 to 192.168.1.1:0 proto=0 state: fos_start because: acquire
> Feb 4 09:00:57 vpn pluto[15879]: | find_connection: looking for policy for connection: 192.168.0.1:0/0 -> 192.168.1.1:0/0
> Feb 4 09:00:57 vpn pluto[15879]: | find_connection: conn "**********" has compatible peers: 192.168.0.0/24 -> 192.168.1.0/24 [pri: 12632077]
> Feb 4 09:00:57 vpn pluto[15879]: | find_connection: comparing best "**********" [pri:12632077]{0x8838690} (child none) to "**********" [pri:12632077]{0x8838690} (child none)
> Feb 4 09:00:57 vpn pluto[15879]: | find_connection: concluding with "**********" [pri:12632077]{0x8838690} kind=CK_PERMANENT
> Feb 4 09:00:57 vpn pluto[15879]: | assign hold, routing was erouted, needs to be erouted
> Feb 4 09:00:57 vpn pluto[15879]: | delete narrow %hold eroute 192.168.0.1/32:0 --0-> 192.168.1.1/32:0 => %hold (raw_eroute)
> Feb 4 09:00:57 vpn pluto[15879]: | delete bare shunt 0x883a7d8 192.168.0.1/32:0 -0-> 192.168.1.1/32:0 => %hold 0 %acquire-netlink
> Feb 4 09:00:57 vpn pluto[15879]: | duplicating state object #1
> Feb 4 09:00:57 vpn pluto[15879]: | creating state object #3 at 0x883ab70
> Feb 4 09:00:57 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:57 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:57 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:57 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:57 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:57 vpn pluto[15879]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #3
> Feb 4 09:00:57 vpn pluto[15879]: "**********" #3: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE {using isakmp#1}
> Feb 4 09:00:57 vpn pluto[15879]: | 0: w->pcw_dead: 0 w->pcw_work: 0 cnt: 1
> Feb 4 09:00:57 vpn pluto[15879]: | asking helper 0 to do build_kenonce op on seq: 3
> Feb 4 09:00:57 vpn pluto[15887]: ! helper 0 doing build_kenonce op id: 3
> Feb 4 09:00:57 vpn pluto[15879]: | inserting event EVENT_CRYPTO_FAILED, timeout in 300 seconds for #3
> Feb 4 09:00:57 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 75 seconds
> Feb 4 09:00:57 vpn pluto[15887]: ! Local DH secret:
> Feb 4 09:00:57 vpn pluto[15887]: ! 0f fe 7f 45 e7 3f 26 9f 8a 97 8a 9d 27 b8 26 39
> Feb 4 09:00:57 vpn pluto[15887]: ! a6 51 62 37 b6 4f 71 d9 ae a5 73 27 dc c7 d8 1b
> Feb 4 09:00:57 vpn pluto[15887]: ! Public DH value sent:
> Feb 4 09:00:57 vpn pluto[15887]: ! 40 80 c9 ad 22 51 b4 19 25 e9 ab 7c 9f 87 4d f5
> Feb 4 09:00:57 vpn pluto[15887]: ! bf 68 18 06 af b9 7f c4 ac 9e 2d 98 84 6c 28 d6
> Feb 4 09:00:57 vpn pluto[15887]: ! 2a ff 17 5a 8f 48 d3 c1 80 04 41 44 df 61 ed 93
> Feb 4 09:00:57 vpn pluto[15887]: ! 47 cb 98 d6 90 37 38 37 cf c6 89 ec 65 01 c2 2b
> Feb 4 09:00:57 vpn pluto[15887]: ! 3f e7 6d 59 3e d9 58 36 30 9f 06 d6 5d ea 4d b9
> Feb 4 09:00:57 vpn pluto[15887]: ! aa 53 64 fc e6 93 1a b4 c8 e0 ab bd a7 34 8c a3
> Feb 4 09:00:57 vpn pluto[15887]: ! e4 c9 17 a6 c1 7a d9 ff 78 f0 8c ea d0 66 3b d1
> Feb 4 09:00:57 vpn pluto[15887]: ! 63 24 ca 87 ff 98 4c d5 ca 43 2e 36 23 02 c0 b2
> Feb 4 09:00:57 vpn pluto[15887]: ! Generated nonce:
> Feb 4 09:00:57 vpn pluto[15887]: ! 59 08 b3 16 94 aa 99 19 e7 24 7e 06 00 f1 8b 29
> Feb 4 09:00:57 vpn pluto[15879]: | helper 0 has work (cnt now 0)
> Feb 4 09:00:57 vpn pluto[15879]: | helper 0 replies to sequence 3
> Feb 4 09:00:57 vpn pluto[15879]: | calling callback function 0x806d7e0
> Feb 4 09:00:57 vpn pluto[15879]: | quick outI1: calculated ke+nonce, sending I1
> Feb 4 09:00:57 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:57 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:00:57 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:57 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:57 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:57 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:57 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:57 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_QUICK
> Feb 4 09:00:57 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:57 vpn pluto[15879]: | message ID: 95 28 95 16
> Feb 4 09:00:57 vpn pluto[15879]: | ***emit ISAKMP Hash Payload:
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_SA
> Feb 4 09:00:57 vpn pluto[15879]: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Hash Payload: 24
> Feb 4 09:00:57 vpn pluto[15879]: | empty esp_info, returning empty
> Feb 4 09:00:57 vpn pluto[15879]: | ***emit ISAKMP Security Association Payload:
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONCE
> Feb 4 09:00:57 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:57 vpn pluto[15879]: | ****emit IPsec DOI SIT:
> Feb 4 09:00:57 vpn pluto[15879]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
> Feb 4 09:00:57 vpn pluto[15879]: | out_sa pcn: 0 has 1 valid proposals
> Feb 4 09:00:57 vpn pluto[15879]: | out_sa pcn: 0 pn: 0<1 valid_count: 1
> Feb 4 09:00:57 vpn pluto[15879]: | ****emit ISAKMP Proposal Payload:
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:57 vpn pluto[15879]: | proposal number: 0
> Feb 4 09:00:57 vpn pluto[15879]: | protocol ID: PROTO_IPSEC_ESP
> Feb 4 09:00:57 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:00:57 vpn pluto[15879]: | number of transforms: 4
> Feb 4 09:00:57 vpn pluto[15879]: | netlink_get_spi: allocated 0x18af5fd5 for esp.0 at 84.154.56.62
> Feb 4 09:00:57 vpn pluto[15879]: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload
> Feb 4 09:00:57 vpn pluto[15879]: | SPI 18 af 5f d5
> Feb 4 09:00:57 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_T
> Feb 4 09:00:57 vpn pluto[15879]: | transform number: 0
> Feb 4 09:00:57 vpn pluto[15879]: | transform ID: ESP_AES
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:57 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:57 vpn pluto[15879]: | [2 is AUTH_ALGORITHM_HMAC_SHA1]
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:57 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_T
> Feb 4 09:00:57 vpn pluto[15879]: | transform number: 1
> Feb 4 09:00:57 vpn pluto[15879]: | transform ID: ESP_AES
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:57 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is AUTH_ALGORITHM_HMAC_MD5]
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:57 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_T
> Feb 4 09:00:57 vpn pluto[15879]: | transform number: 2
> Feb 4 09:00:57 vpn pluto[15879]: | transform ID: ESP_3DES
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:57 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:57 vpn pluto[15879]: | [2 is AUTH_ALGORITHM_HMAC_SHA1]
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:57 vpn pluto[15879]: | *****emit ISAKMP Transform Payload (ESP):
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:57 vpn pluto[15879]: | transform number: 3
> Feb 4 09:00:57 vpn pluto[15879]: | transform ID: ESP_3DES
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:57 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:57 vpn pluto[15879]: | ******emit ISAKMP IPsec DOI attribute:
> Feb 4 09:00:57 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:57 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:57 vpn pluto[15879]: | [1 is AUTH_ALGORITHM_HMAC_MD5]
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Transform Payload (ESP): 28
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Proposal Payload: 124
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Security Association Payload: 136
> Feb 4 09:00:57 vpn pluto[15879]: | ***emit ISAKMP Nonce Payload:
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_KE
> Feb 4 09:00:57 vpn pluto[15879]: | emitting 16 raw bytes of Ni into ISAKMP Nonce Payload
> Feb 4 09:00:57 vpn pluto[15879]: | Ni 59 08 b3 16 94 aa 99 19 e7 24 7e 06 00 f1 8b 29
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Nonce Payload: 20
> Feb 4 09:00:57 vpn pluto[15879]: | ***emit ISAKMP Key Exchange Payload:
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:57 vpn pluto[15879]: | emitting 128 raw bytes of keyex value into ISAKMP Key Exchange Payload
> Feb 4 09:00:57 vpn pluto[15879]: | keyex value 40 80 c9 ad 22 51 b4 19 25 e9 ab 7c 9f 87 4d f5
> Feb 4 09:00:57 vpn pluto[15879]: | bf 68 18 06 af b9 7f c4 ac 9e 2d 98 84 6c 28 d6
> Feb 4 09:00:57 vpn pluto[15879]: | 2a ff 17 5a 8f 48 d3 c1 80 04 41 44 df 61 ed 93
> Feb 4 09:00:57 vpn pluto[15879]: | 47 cb 98 d6 90 37 38 37 cf c6 89 ec 65 01 c2 2b
> Feb 4 09:00:57 vpn pluto[15879]: | 3f e7 6d 59 3e d9 58 36 30 9f 06 d6 5d ea 4d b9
> Feb 4 09:00:57 vpn pluto[15879]: | aa 53 64 fc e6 93 1a b4 c8 e0 ab bd a7 34 8c a3
> Feb 4 09:00:57 vpn pluto[15879]: | e4 c9 17 a6 c1 7a d9 ff 78 f0 8c ea d0 66 3b d1
> Feb 4 09:00:57 vpn pluto[15879]: | 63 24 ca 87 ff 98 4c d5 ca 43 2e 36 23 02 c0 b2
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Key Exchange Payload: 132
> Feb 4 09:00:57 vpn pluto[15879]: | ***emit ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:57 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:57 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:57 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:57 vpn pluto[15879]: | port: 0
> Feb 4 09:00:57 vpn pluto[15879]: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:57 vpn pluto[15879]: | client network c0 a8 00 00
> Feb 4 09:00:57 vpn pluto[15879]: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:57 vpn pluto[15879]: | client mask ff ff ff 00
> Feb 4 09:00:57 vpn pluto[15879]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
> Feb 4 09:00:58 vpn pluto[15879]: | ***emit ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:58 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:58 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:58 vpn pluto[15879]: | port: 0
> Feb 4 09:00:58 vpn pluto[15879]: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:58 vpn pluto[15879]: | client network c0 a8 01 00
> Feb 4 09:00:58 vpn pluto[15879]: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI)
> Feb 4 09:00:58 vpn pluto[15879]: | client mask ff ff ff 00
> Feb 4 09:00:58 vpn pluto[15879]: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16
> Feb 4 09:00:58 vpn pluto[15879]: | HASH(1) computed:
> Feb 4 09:00:58 vpn pluto[15879]: | 4e 0d bc 09 89 a1 3b 53 7f a9 f2 21 90 f4 d8 ee
> Feb 4 09:00:58 vpn pluto[15879]: | f7 f2 0d 80
> Feb 4 09:00:58 vpn pluto[15879]: | last Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:58 vpn pluto[15879]: | current Phase 1 IV: 9b 97 c2 66 86 12 6f 4a
> Feb 4 09:00:58 vpn pluto[15879]: | computed Phase 2 IV:
> Feb 4 09:00:58 vpn pluto[15879]: | b2 d9 f2 02 45 26 06 54 16 38 be e5 59 e2 85 66
> Feb 4 09:00:58 vpn pluto[15879]: | e3 a0 c0 ae
> Feb 4 09:00:58 vpn pluto[15879]: | encrypting:
> Feb 4 09:00:58 vpn pluto[15879]: | 01 00 00 18 4e 0d bc 09 89 a1 3b 53 7f a9 f2 21
> Feb 4 09:00:58 vpn pluto[15879]: | 90 f4 d8 ee f7 f2 0d 80 0a 00 00 88 00 00 00 01
> Feb 4 09:00:58 vpn pluto[15879]: | 00 00 00 01 00 00 00 7c 00 03 04 04 18 af 5f d5
> Feb 4 09:00:58 vpn pluto[15879]: | 03 00 00 1c 00 0c 00 00 80 03 00 02 80 04 00 01
> Feb 4 09:00:58 vpn pluto[15879]: | 80 01 00 01 80 02 70 80 80 05 00 02 03 00 00 1c
> Feb 4 09:00:58 vpn pluto[15879]: | 01 0c 00 00 80 03 00 02 80 04 00 01 80 01 00 01
> Feb 4 09:00:58 vpn pluto[15879]: | 80 02 70 80 80 05 00 01 03 00 00 1c 02 03 00 00
> Feb 4 09:00:58 vpn pluto[15879]: | 80 03 00 02 80 04 00 01 80 01 00 01 80 02 70 80
> Feb 4 09:00:58 vpn pluto[15879]: | 80 05 00 02 00 00 00 1c 03 03 00 00 80 03 00 02
> Feb 4 09:00:58 vpn pluto[15879]: | 80 04 00 01 80 01 00 01 80 02 70 80 80 05 00 01
> Feb 4 09:00:58 vpn pluto[15879]: | 04 00 00 14 59 08 b3 16 94 aa 99 19 e7 24 7e 06
> Feb 4 09:00:58 vpn pluto[15879]: | 00 f1 8b 29 05 00 00 84 40 80 c9 ad 22 51 b4 19
> Feb 4 09:00:58 vpn pluto[15879]: | 25 e9 ab 7c 9f 87 4d f5 bf 68 18 06 af b9 7f c4
> Feb 4 09:00:58 vpn pluto[15879]: | ac 9e 2d 98 84 6c 28 d6 2a ff 17 5a 8f 48 d3 c1
> Feb 4 09:00:58 vpn pluto[15879]: | 80 04 41 44 df 61 ed 93 47 cb 98 d6 90 37 38 37
> Feb 4 09:00:58 vpn pluto[15879]: | cf c6 89 ec 65 01 c2 2b 3f e7 6d 59 3e d9 58 36
> Feb 4 09:00:58 vpn pluto[15879]: | 30 9f 06 d6 5d ea 4d b9 aa 53 64 fc e6 93 1a b4
> Feb 4 09:00:58 vpn pluto[15879]: | c8 e0 ab bd a7 34 8c a3 e4 c9 17 a6 c1 7a d9 ff
> Feb 4 09:00:58 vpn pluto[15879]: | 78 f0 8c ea d0 66 3b d1 63 24 ca 87 ff 98 4c d5
> Feb 4 09:00:58 vpn pluto[15879]: | ca 43 2e 36 23 02 c0 b2 05 00 00 10 04 00 00 00
> Feb 4 09:00:58 vpn pluto[15879]: | c0 a8 00 00 ff ff ff 00 00 00 00 10 04 00 00 00
> Feb 4 09:00:58 vpn pluto[15879]: | c0 a8 01 00 ff ff ff 00
> Feb 4 09:00:58 vpn pluto[15879]: | IV:
> Feb 4 09:00:58 vpn pluto[15879]: | b2 d9 f2 02 45 26 06 54 16 38 be e5 59 e2 85 66
> Feb 4 09:00:58 vpn pluto[15879]: | e3 a0 c0 ae
> Feb 4 09:00:58 vpn pluto[15879]: | encrypting using OAKLEY_3DES_CBC
> Feb 4 09:00:58 vpn pluto[15879]: | next IV: d3 6a 21 ef 55 eb c9 f2
> Feb 4 09:00:58 vpn pluto[15879]: | emitting length of ISAKMP Message: 372
> Feb 4 09:00:58 vpn pluto[15879]: | sending 372 bytes for quick_outI1 through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:00:58 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:58 vpn pluto[15879]: | 08 10 20 01 95 28 95 16 00 00 01 74 3f 76 39 2e
> Feb 4 09:00:58 vpn pluto[15879]: | e4 0f 79 29 79 a2 9e 7b 84 ab e9 69 21 de 9a 0a
> Feb 4 09:00:58 vpn pluto[15879]: | d6 3c 19 08 91 d2 ec d5 fb 76 f8 90 45 ea 80 46
> Feb 4 09:00:58 vpn pluto[15879]: | 9a 3a d0 1e d3 04 d8 27 a4 af b2 ea 79 62 78 3d
> Feb 4 09:00:58 vpn pluto[15879]: | 9e 53 c5 c2 26 04 03 64 31 41 8a a0 60 a2 87 e1
> Feb 4 09:00:58 vpn pluto[15879]: | 3c e5 39 0a 3d 75 b8 d4 36 aa c7 9e 75 26 2b 8e
> Feb 4 09:00:58 vpn pluto[15879]: | 77 b1 43 b3 ea 50 6c eb 5d 64 70 08 cc a2 6c ce
> Feb 4 09:00:58 vpn pluto[15879]: | 67 f1 29 f3 bb 66 0b 93 c9 f3 52 7c 58 77 6e f7
> Feb 4 09:00:58 vpn pluto[15879]: | 0b b6 2d f5 c6 97 4a 55 fa a8 c4 50 9d 4f 3a f5
> Feb 4 09:00:58 vpn pluto[15879]: | 81 79 d2 c9 9e d9 c1 76 7b a3 bc b8 05 a5 b5 17
> Feb 4 09:00:58 vpn pluto[15879]: | b3 dd 96 00 09 13 4c 03 c0 4d 79 aa 87 2e 2e c1
> Feb 4 09:00:58 vpn pluto[15879]: | cf 6d f4 4c 63 0b 29 aa ae 0c 80 4a 87 2f 76 cc
> Feb 4 09:00:58 vpn pluto[15879]: | 90 ad e5 47 9b 1c bd 00 83 84 d7 96 af bc 45 31
> Feb 4 09:00:58 vpn pluto[15879]: | 37 0c d8 73 e3 27 e8 6e c3 1f 3f b5 38 c5 bd 24
> Feb 4 09:00:58 vpn pluto[15879]: | 39 38 28 38 df c6 37 b0 ee b0 b1 73 93 31 42 7b
> Feb 4 09:00:58 vpn pluto[15879]: | cc 0b b0 fa 81 b1 b8 da 16 3f 0f f4 21 c4 c9 33
> Feb 4 09:00:58 vpn pluto[15879]: | 4f 6a 60 12 ec 01 b4 a4 2f da 3c b1 31 bb 48 3d
> Feb 4 09:00:58 vpn pluto[15879]: | d4 f7 c5 b2 cf fa 8c f4 d2 21 89 09 e0 0a 10 bf
> Feb 4 09:00:58 vpn pluto[15879]: | 64 be 0f 1f 20 b2 c2 dc 20 e0 77 06 22 ea d9 56
> Feb 4 09:00:58 vpn pluto[15879]: | 2d b2 1f a9 63 b6 af 0b a6 20 a5 95 b2 41 30 bd
> Feb 4 09:00:58 vpn pluto[15879]: | f2 fc ee 26 94 07 ae b4 43 c9 ea a4 fd ef 6c 6a
> Feb 4 09:00:58 vpn pluto[15879]: | 08 80 1b 37 90 36 de 72 7d 68 c2 91 d3 6a 21 ef
> Feb 4 09:00:58 vpn pluto[15879]: | 55 eb c9 f2
> Feb 4 09:00:58 vpn pluto[15879]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #3
> Feb 4 09:00:58 vpn pluto[15879]: | next event EVENT_RETRANSMIT in 10 seconds for #3
> Feb 4 09:00:58 vpn pluto[15879]: |
> Feb 4 09:00:58 vpn pluto[15879]: | *received 316 bytes from 79.207.134.254:500 on ppp0 (port=500)
> Feb 4 09:00:58 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:58 vpn pluto[15879]: | 08 10 20 01 95 28 95 16 00 00 01 3c 70 50 99 df
> Feb 4 09:00:58 vpn pluto[15879]: | a2 36 f0 b3 31 44 75 af 2e 38 36 19 ab c4 f4 cf
> Feb 4 09:00:58 vpn pluto[15879]: | e5 30 7e 69 9e da d8 d0 2c 3f 7f 5c 69 ff 49 2a
> Feb 4 09:00:58 vpn pluto[15879]: | 15 ad 95 6f 8d 5f 6d 77 20 44 6b 68 14 c4 1f 5e
> Feb 4 09:00:58 vpn pluto[15879]: | 6b f1 bb bf 4a 3d 94 0b 20 82 98 cf dd 26 03 be
> Feb 4 09:00:58 vpn pluto[15879]: | f4 dd 81 e8 ec 55 04 bf 4e 61 5b a2 bd 10 03 be
> Feb 4 09:00:58 vpn pluto[15879]: | 89 1a 5f ba 2d 03 f5 3a ae 80 04 83 2a 6f cd f7
> Feb 4 09:00:58 vpn pluto[15879]: | cc 51 1f 65 81 82 99 b7 71 58 83 d5 fb 0d 13 83
> Feb 4 09:00:58 vpn pluto[15879]: | ed b8 0a 26 8f 30 7d f5 07 79 84 c7 94 cf bc 6a
> Feb 4 09:00:58 vpn pluto[15879]: | a5 97 38 36 07 60 7e e0 d7 4a d5 0d 25 d9 26 14
> Feb 4 09:00:58 vpn pluto[15879]: | 87 55 bb 70 8c 5f c7 86 ac bf 8c 08 3f 76 a8 a9
> Feb 4 09:00:58 vpn pluto[15879]: | ac 90 c9 ac 70 dc bb 09 b9 6b f6 cc 3f 1f 92 d0
> Feb 4 09:00:58 vpn pluto[15879]: | ae 21 1e 39 21 d3 d8 cd 32 19 e9 19 e7 52 d1 ff
> Feb 4 09:00:58 vpn pluto[15879]: | 8c 09 55 9d 95 9f 4c 47 1d a1 dd 5b 93 61 94 38
> Feb 4 09:00:58 vpn pluto[15879]: | 8c b8 b3 08 0c 04 c0 1e 0d 56 2a 97 0b dc 4d b3
> Feb 4 09:00:58 vpn pluto[15879]: | e4 dc a4 49 33 7b 76 50 0b d4 74 f3 ae 8a bd df
> Feb 4 09:00:58 vpn pluto[15879]: | ff 28 16 51 5b 0f d3 17 2d b9 d0 e5 38 eb fa 96
> Feb 4 09:00:58 vpn pluto[15879]: | 65 b8 51 8b 5c 0d 36 31 2b 95 68 73 d4 78 46 d0
> Feb 4 09:00:58 vpn pluto[15879]: | 31 85 06 07 41 79 4a 37 be 30 e6 7a
> Feb 4 09:00:58 vpn pluto[15879]: | **parse ISAKMP Message:
> Feb 4 09:00:58 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:58 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:58 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:58 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:58 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:58 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_QUICK
> Feb 4 09:00:58 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:58 vpn pluto[15879]: | message ID: 95 28 95 16
> Feb 4 09:00:58 vpn pluto[15879]: | length: 316
> Feb 4 09:00:58 vpn pluto[15879]: | processing packet with exchange type=ISAKMP_XCHG_QUICK (32)
> Feb 4 09:00:58 vpn pluto[15879]: | ICOOKIE: 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:58 vpn pluto[15879]: | RCOOKIE: 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:58 vpn pluto[15879]: | peer: 4f cf 86 fe
> Feb 4 09:00:58 vpn pluto[15879]: | state hash entry 30
> Feb 4 09:00:58 vpn pluto[15879]: | peer and cookies match on #3, provided msgid 95289516 vs 95289516
> Feb 4 09:00:58 vpn pluto[15879]: | state object #3 found, in STATE_QUICK_I1
> Feb 4 09:00:58 vpn pluto[15879]: | processing connection **********
> Feb 4 09:00:58 vpn pluto[15879]: | received encrypted packet from 79.207.134.254:500
> Feb 4 09:00:58 vpn pluto[15879]: | decrypting 288 bytes using algorithm OAKLEY_3DES_CBC
> Feb 4 09:00:58 vpn pluto[15879]: | decrypted:
> Feb 4 09:00:58 vpn pluto[15879]: | 01 00 00 18 25 ed db 9c 4f cb e3 6b 87 99 01 31
> Feb 4 09:00:58 vpn pluto[15879]: | 5a 2e b6 4e 86 16 8d e4 0a 00 00 34 00 00 00 01
> Feb 4 09:00:58 vpn pluto[15879]: | 00 00 00 01 00 00 00 28 01 03 04 01 e2 3b 5f d7
> Feb 4 09:00:58 vpn pluto[15879]: | 00 00 00 1c 00 0c 00 00 80 05 00 02 80 03 00 02
> Feb 4 09:00:58 vpn pluto[15879]: | 80 01 00 01 80 02 70 80 80 04 00 01 04 00 00 14
> Feb 4 09:00:58 vpn pluto[15879]: | 20 dc fc 58 e6 36 67 24 cb c8 38 0e 41 cb 16 67
> Feb 4 09:00:58 vpn pluto[15879]: | 05 00 00 84 7e cf 29 ce 01 c3 40 d8 58 c4 b8 37
> Feb 4 09:00:58 vpn pluto[15879]: | ff c2 c5 79 32 1d b6 6f 16 86 98 96 b6 00 fd e7
> Feb 4 09:00:58 vpn pluto[15879]: | 2a aa b4 4e f8 ea de 2f cf e6 d3 54 f7 02 53 b0
> Feb 4 09:00:58 vpn pluto[15879]: | b2 57 1a c4 a4 01 5d 62 dc 82 fa d5 40 f2 10 77
> Feb 4 09:00:58 vpn pluto[15879]: | 34 98 97 73 50 ef 45 09 37 79 c1 d3 36 6b f0 16
> Feb 4 09:00:58 vpn pluto[15879]: | 92 17 98 54 58 70 7f 59 b2 09 d9 16 c6 a6 7c dc
> Feb 4 09:00:58 vpn pluto[15879]: | 45 a1 6c 3b be a9 b6 7d 7e 0c 3d 14 32 f4 22 27
> Feb 4 09:00:58 vpn pluto[15879]: | eb 85 a3 fc e7 3a 26 4b 4f 94 51 46 b7 32 11 e7
> Feb 4 09:00:58 vpn pluto[15879]: | cf 86 7d fa 05 00 00 10 04 00 00 00 c0 a8 00 00
> Feb 4 09:00:58 vpn pluto[15879]: | ff ff ff 00 0b 00 00 10 04 00 00 00 c0 a8 01 00
> Feb 4 09:00:58 vpn pluto[15879]: | ff ff ff 00 00 00 00 18 00 00 00 01 03 04 60 00
> Feb 4 09:00:58 vpn pluto[15879]: | 18 af 5f d5 80 01 00 01 80 02 0e 10 00 00 00 00
> Feb 4 09:00:58 vpn pluto[15879]: | next IV: 41 79 4a 37 be 30 e6 7a
> Feb 4 09:00:58 vpn pluto[15879]: | np=8 and sd=0x80eae50
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Hash Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_SA
> Feb 4 09:00:58 vpn pluto[15879]: | length: 24
> Feb 4 09:00:58 vpn pluto[15879]: | np=1 and sd=0x80eadc0
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Security Association Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONCE
> Feb 4 09:00:58 vpn pluto[15879]: | length: 52
> Feb 4 09:00:58 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:58 vpn pluto[15879]: | np=10 and sd=0x80eae68
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Nonce Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_KE
> Feb 4 09:00:58 vpn pluto[15879]: | length: 20
> Feb 4 09:00:58 vpn pluto[15879]: | np=4 and sd=0x80eae14
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Key Exchange Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:58 vpn pluto[15879]: | length: 132
> Feb 4 09:00:58 vpn pluto[15879]: | np=5 and sd=(nil)
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_ID
> Feb 4 09:00:58 vpn pluto[15879]: | length: 16
> Feb 4 09:00:58 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:58 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:58 vpn pluto[15879]: | port: 0
> Feb 4 09:00:58 vpn pluto[15879]: | np=5 and sd=(nil)
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Identification Payload (IPsec DOI):
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_N
> Feb 4 09:00:58 vpn pluto[15879]: | length: 16
> Feb 4 09:00:58 vpn pluto[15879]: | ID type: ID_IPV4_ADDR_SUBNET
> Feb 4 09:00:58 vpn pluto[15879]: | Protocol ID: 0
> Feb 4 09:00:58 vpn pluto[15879]: | port: 0
> Feb 4 09:00:58 vpn pluto[15879]: | np=11 and sd=0x80eae74
> Feb 4 09:00:58 vpn pluto[15879]: | ***parse ISAKMP Notification Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:58 vpn pluto[15879]: | length: 24
> Feb 4 09:00:58 vpn pluto[15879]: | DOI: ISAKMP_DOI_IPSEC
> Feb 4 09:00:58 vpn pluto[15879]: | protocol ID: 3
> Feb 4 09:00:58 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:00:58 vpn pluto[15879]: | Notify Message Type: IPSEC_RESPONDER_LIFETIME
> Feb 4 09:00:58 vpn pluto[15879]: | removing 4 bytes of padding
> Feb 4 09:00:58 vpn pluto[15879]: "**********" #3: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME
> Feb 4 09:00:58 vpn pluto[15879]: | info: 18 af 5f d5 80 01 00 01 80 02 0e 10
> Feb 4 09:00:58 vpn pluto[15879]: | **emit ISAKMP Message:
> Feb 4 09:00:58 vpn pluto[15879]: | initiator cookie:
> Feb 4 09:00:58 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf
> Feb 4 09:00:58 vpn pluto[15879]: | responder cookie:
> Feb 4 09:00:58 vpn pluto[15879]: | 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_HASH
> Feb 4 09:00:58 vpn pluto[15879]: | ISAKMP version: ISAKMP Version 1.0
> Feb 4 09:00:58 vpn pluto[15879]: | exchange type: ISAKMP_XCHG_QUICK
> Feb 4 09:00:58 vpn pluto[15879]: | flags: ISAKMP_FLAG_ENCRYPTION
> Feb 4 09:00:58 vpn pluto[15879]: | message ID: 95 28 95 16
> Feb 4 09:00:58 vpn pluto[15879]: | HASH(2) computed:
> Feb 4 09:00:58 vpn pluto[15879]: | 25 ed db 9c 4f cb e3 6b 87 99 01 31 5a 2e b6 4e
> Feb 4 09:00:58 vpn pluto[15879]: | 86 16 8d e4
> Feb 4 09:00:58 vpn pluto[15879]: | ****parse IPsec DOI SIT:
> Feb 4 09:00:58 vpn pluto[15879]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
> Feb 4 09:00:58 vpn pluto[15879]: | ****parse ISAKMP Proposal Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:58 vpn pluto[15879]: | length: 40
> Feb 4 09:00:58 vpn pluto[15879]: | proposal number: 1
> Feb 4 09:00:58 vpn pluto[15879]: | protocol ID: PROTO_IPSEC_ESP
> Feb 4 09:00:58 vpn pluto[15879]: | SPI size: 4
> Feb 4 09:00:58 vpn pluto[15879]: | number of transforms: 1
> Feb 4 09:00:58 vpn pluto[15879]: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI
> Feb 4 09:00:58 vpn pluto[15879]: | SPI e2 3b 5f d7
> Feb 4 09:00:58 vpn pluto[15879]: | *****parse ISAKMP Transform Payload (ESP):
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:58 vpn pluto[15879]: | length: 28
> Feb 4 09:00:58 vpn pluto[15879]: | transform number: 0
> Feb 4 09:00:58 vpn pluto[15879]: | transform ID: ESP_AES
> Feb 4 09:00:58 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:58 vpn pluto[15879]: | af+type: AUTH_ALGORITHM
> Feb 4 09:00:58 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:58 vpn pluto[15879]: | [2 is AUTH_ALGORITHM_HMAC_SHA1]
> Feb 4 09:00:58 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:58 vpn pluto[15879]: | af+type: GROUP_DESCRIPTION
> Feb 4 09:00:58 vpn pluto[15879]: | length/value: 2
> Feb 4 09:00:58 vpn pluto[15879]: | [2 is OAKLEY_GROUP_MODP1024]
> Feb 4 09:00:58 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:58 vpn pluto[15879]: | af+type: SA_LIFE_TYPE
> Feb 4 09:00:58 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:58 vpn pluto[15879]: | [1 is SA_LIFE_TYPE_SECONDS]
> Feb 4 09:00:58 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:58 vpn pluto[15879]: | af+type: SA_LIFE_DURATION
> Feb 4 09:00:58 vpn pluto[15879]: | length/value: 28800
> Feb 4 09:00:58 vpn pluto[15879]: | ******parse ISAKMP IPsec DOI attribute:
> Feb 4 09:00:58 vpn pluto[15879]: | af+type: ENCAPSULATION_MODE
> Feb 4 09:00:58 vpn pluto[15879]: | length/value: 1
> Feb 4 09:00:58 vpn pluto[15879]: | [1 is ENCAPSULATION_MODE_TUNNEL]
> Feb 4 09:00:58 vpn pluto[15879]: | DH public value received:
> Feb 4 09:00:58 vpn pluto[15879]: | 7e cf 29 ce 01 c3 40 d8 58 c4 b8 37 ff c2 c5 79
> Feb 4 09:00:58 vpn pluto[15879]: | 32 1d b6 6f 16 86 98 96 b6 00 fd e7 2a aa b4 4e
> Feb 4 09:00:58 vpn pluto[15879]: | f8 ea de 2f cf e6 d3 54 f7 02 53 b0 b2 57 1a c4
> Feb 4 09:00:58 vpn pluto[15879]: | a4 01 5d 62 dc 82 fa d5 40 f2 10 77 34 98 97 73
> Feb 4 09:00:58 vpn pluto[15879]: | 50 ef 45 09 37 79 c1 d3 36 6b f0 16 92 17 98 54
> Feb 4 09:00:58 vpn pluto[15879]: | 58 70 7f 59 b2 09 d9 16 c6 a6 7c dc 45 a1 6c 3b
> Feb 4 09:00:58 vpn pluto[15879]: | be a9 b6 7d 7e 0c 3d 14 32 f4 22 27 eb 85 a3 fc
> Feb 4 09:00:58 vpn pluto[15879]: | e7 3a 26 4b 4f 94 51 46 b7 32 11 e7 cf 86 7d fa
> Feb 4 09:00:58 vpn pluto[15879]: | started looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:58 vpn pluto[15879]: | actually looking for secret for @************************->@********** of kind PPK_PSK
> Feb 4 09:00:58 vpn pluto[15879]: | 1: compared PSK @********** to @************************ / @********** -> 2
> Feb 4 09:00:58 vpn pluto[15879]: | 2: compared PSK @************************ to @************************ / @********** -> 6
> Feb 4 09:00:58 vpn pluto[15879]: | best_match 0>6 best=0x8838018 (line=11)
> Feb 4 09:00:58 vpn pluto[15879]: | concluding with best_match=6 best=0x8838018 (lineno=11)
> Feb 4 09:00:58 vpn pluto[15879]: | calc_dh_shared(): time elapsed (OAKLEY_GROUP_MODP1024): 58026 usec
> Feb 4 09:00:58 vpn pluto[15879]: | DH shared secret:
> Feb 4 09:00:58 vpn pluto[15879]: | a7 a4 2f d9 5e 6b db 34 a2 c9 4a 31 86 c1 2d 1a
> Feb 4 09:00:58 vpn pluto[15879]: | bb 7f f6 c8 7a 85 59 24 ef 77 95 8f de 3b bd 4e
> Feb 4 09:00:58 vpn pluto[15879]: | 5a 8f b2 f1 cd 54 8e 0a 30 86 50 d2 ae 8c e8 b5
> Feb 4 09:00:58 vpn pluto[15879]: | 06 ab e9 eb 13 b6 c4 91 84 b7 57 fa 96 07 2a c3
> Feb 4 09:00:58 vpn pluto[15879]: | 2f 9a dd 5e b5 8c 02 7f 99 11 8c 0a ed 5c c9 2b
> Feb 4 09:00:58 vpn pluto[15879]: | f0 ed cf a8 d8 21 67 72 da 5f 97 36 56 87 60 f4
> Feb 4 09:00:58 vpn pluto[15879]: | ff ba df 33 77 8a a2 c9 70 03 52 b4 98 04 7a be
> Feb 4 09:00:58 vpn pluto[15879]: | 41 72 5d 4a 6e 1a b9 33 aa 9f de d1 46 d4 12 02
> Feb 4 09:00:58 vpn pluto[15879]: | our client is subnet 192.168.0.0/24
> Feb 4 09:00:58 vpn pluto[15879]: | our client protocol/port is 0/0
> Feb 4 09:00:58 vpn pluto[15879]: | peer client is subnet 192.168.1.0/24
> Feb 4 09:00:58 vpn pluto[15879]: | peer client protocol/port is 0/0
> Feb 4 09:00:58 vpn pluto[15879]: | ***emit ISAKMP Hash Payload:
> Feb 4 09:00:58 vpn pluto[15879]: | next payload type: ISAKMP_NEXT_NONE
> Feb 4 09:00:58 vpn pluto[15879]: | emitting 20 zero bytes of HASH into ISAKMP Hash Payload
> Feb 4 09:00:58 vpn pluto[15879]: | emitting length of ISAKMP Hash Payload: 24
> Feb 4 09:00:58 vpn pluto[15879]: | HASH(3) computed: 45 91 fc a2 b4 e3 ab 23 75 a9 c9 4b ba 8f 70 ce
> Feb 4 09:00:58 vpn pluto[15879]: | 8e 6b e4 f1
> Feb 4 09:00:58 vpn pluto[15879]: | compute_proto_keymat:needed_len (after ESP enc)=16
> Feb 4 09:00:58 vpn pluto[15879]: | compute_proto_keymat:needed_len (after ESP auth)=36
> Feb 4 09:00:58 vpn pluto[15879]: | KEYMAT computed:
> Feb 4 09:00:58 vpn pluto[15879]: | 40 32 2c 23 dc 45 c1 15 61 e6 10 24 5d 12 50 0b
> Feb 4 09:00:58 vpn pluto[15879]: | c9 51 40 8e c9 07 0f 8d 39 be 9f a9 e7 4c c7 3f
> Feb 4 09:00:58 vpn pluto[15879]: | 66 79 e9 86
> Feb 4 09:00:58 vpn pluto[15879]: | Peer KEYMAT computed:
> Feb 4 09:00:58 vpn pluto[15879]: | d6 a2 28 1f 4e d7 e0 47 9d a7 fe 7b a8 c2 2b 90
> Feb 4 09:00:58 vpn pluto[15879]: | ad 15 b2 81 82 0d 32 ff 05 ee f1 9a 73 22 f8 b5
> Feb 4 09:00:58 vpn pluto[15879]: | d1 4a 1a 2d
> Feb 4 09:00:58 vpn pluto[15879]: | install_ipsec_sa() for #3: inbound and outbound
> Feb 4 09:00:58 vpn pluto[15879]: | route owner of "**********" erouted: self; eroute owner: self
> Feb 4 09:00:58 vpn pluto[15879]: | could_route called for ********** (kind=CK_PERMANENT)
> Feb 4 09:00:58 vpn pluto[15879]: | looking for alg with transid: 12 keylen: 0 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 0
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 0
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 0
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | looking for alg with transid: 12 keylen: 0 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 11 keylen: 0 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 0
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 2 keylen: 8 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 0
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 3 keylen: 24 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 0
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 1
> Feb 4 09:00:58 vpn pluto[15879]: | checking transid: 12 keylen: 16 auth: 2
> Feb 4 09:00:58 vpn pluto[15879]: | sr for #3: erouted
> Feb 4 09:00:58 vpn pluto[15879]: | route owner of "**********" erouted: self; eroute owner: self
> Feb 4 09:00:58 vpn pluto[15879]: | route_and_eroute with c: ********** (next: none) ero:********** esr:{(nil)} ro:********** rosr:{(nil)} and state: 3
> Feb 4 09:00:58 vpn pluto[15879]: | eroute_connection replace eroute 192.168.0.0/24:0 --0-> 192.168.1.0/24:0 => tun.0 at 79.207.134.254 (raw_eroute)
> Feb 4 09:00:58 vpn pluto[15879]: | route_and_eroute: firewall_notified: true
> Feb 4 09:00:58 vpn pluto[15879]: | route_and_eroute: instance "**********", setting eroute_owner {spd=0x88386d4,sr=0x88386d4} to #3 (was #2) (newest_ipsec_sa=#2)
> Feb 4 09:00:58 vpn pluto[15879]: | encrypting:
> Feb 4 09:00:58 vpn pluto[15879]: | 00 00 00 18 45 91 fc a2 b4 e3 ab 23 75 a9 c9 4b
> Feb 4 09:00:58 vpn pluto[15879]: | ba 8f 70 ce 8e 6b e4 f1
> Feb 4 09:00:58 vpn pluto[15879]: | IV:
> Feb 4 09:00:58 vpn pluto[15879]: | 41 79 4a 37 be 30 e6 7a
> Feb 4 09:00:58 vpn pluto[15879]: | encrypting using OAKLEY_3DES_CBC
> Feb 4 09:00:58 vpn pluto[15879]: | next IV: 09 22 a8 04 98 33 ea e2
> Feb 4 09:00:58 vpn pluto[15879]: | emitting length of ISAKMP Message: 52
> Feb 4 09:00:58 vpn pluto[15879]: | inR1_outI2: instance **********[0], setting newest_ipsec_sa to #3 (was #2) (spd.eroute=#3)
> Feb 4 09:00:58 vpn pluto[15879]: | complete state transition with STF_OK
> Feb 4 09:00:58 vpn pluto[15879]: "**********" #3: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
> Feb 4 09:00:58 vpn pluto[15879]: | sending reply packet to 79.207.134.254:500 (from port=500)
> Feb 4 09:00:58 vpn pluto[15879]: | sending 52 bytes for STATE_QUICK_I1 through ppp0:500 to 79.207.134.254:500:
> Feb 4 09:00:58 vpn pluto[15879]: | 51 ec 62 5a c7 55 66 cf 92 51 a3 c6 21 37 23 a1
> Feb 4 09:00:58 vpn pluto[15879]: | 08 10 20 01 95 28 95 16 00 00 00 34 0a 13 a6 9b
> Feb 4 09:00:58 vpn pluto[15879]: | 8f 48 91 5f 21 35 32 31 98 c3 72 04 09 22 a8 04
> Feb 4 09:00:58 vpn pluto[15879]: | 98 33 ea e2
> Feb 4 09:00:58 vpn pluto[15879]: | inserting event EVENT_SA_REPLACE, timeout in 28006 seconds for #3
> Feb 4 09:00:58 vpn pluto[15879]: "**********" #3: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0xe23b5fd7 <0x18af5fd5 xfrm=AES_0-HMAC_SHA1 NATD=none DPD=none}
> Feb 4 09:00:58 vpn pluto[15879]: | modecfg pull: noquirk policy:push not-client
> Feb 4 09:00:58 vpn pluto[15879]: | phase 1 is done, looking for phase 1 to unpend
> Feb 4 09:00:58 vpn pluto[15879]: | next event EVENT_PENDING_PHASE2 in 74 seconds
> ------------------------------------------------------------------------
>
>
>
> ------------------------------- AVM 7270 -------------------------------
> vpncfg {
> connections {
> enabled = yes;
> conn_type = conntype_lan;
> name = "my vpn connection";
> always_renew = no;
> reject_not_encrypted = no;
> dont_filter_netbios = yes;
> localip = 0.0.0.0;
> local_virtualip = 0.0.0.0;
> remoteip = 0.0.0.0;
> remote_virtualip = 0.0.0.0;
> remotehostname = "************************";
> localid {
> fqdn = "**********";
> }
> remoteid {
> fqdn = "************************";
> }
> mode = phase1_mode_aggressive;
> phase1ss = "all/all/all";
> keytype = connkeytype_pre_shared;
> key = "****************************************************************";
> cert_do_server_auth = no;
> use_nat_t = no;
> use_xauth = no;
> use_cfgmode = no;
> phase2localid {
> ipnet {
> ipaddr = 192.168.1.0;
> mask = 255.255.255.0;
> }
> }
> phase2remoteid {
> ipnet {
> ipaddr = 192.168.0.0;
> mask = 255.255.255.0;
> }
> }
> phase2ss = "esp-all-all/ah-none/comp-all/pfs";
> accesslist = "permit ip any 192.168.0.0 255.255.255.0";
> }
> ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500",
> "udp 0.0.0.0:4500 0.0.0.0:4500";
> }
> ------------------------------------------------------------------------
>
>
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>
More information about the Users
mailing list