[Openswan Users] when protostack=mast ==> no connection has been authorized with policy=PSK!!!

Majid Khonji majid at khonji.org
Sat Jun 26 18:55:26 EDT 2010


Dear all,

I just want a solution for the following scenario

server <----------> nat <---> INTERNET <---> nat <---> multiple clients (3G
mobile devices through l2tp)
10.0.0.105  --- 10.0.0.1

It seems that klips & netkey with nat-t  don't support such feature (only
one client supported.

I did the following:
- downloaded a frech kernel 2.6.32
- using openswan 2.6.27: applyed the patches
(0001-SAREF-add-support-for-SA-selection-through-sendmsg.patch
&& 0002-SAREF-implement-IP_IPSEC_BINDREF.patch)
- compile the kernel
- in openswan-2.6.27/Makefile.inc: USE_SAREF_KERNEL=true
- compile & install (modules .. programs)

When i use protostack=mast
I get the following error (when i connect a client)
packet from 10.0.0.1:500: initial Main Mode message received on
10.0.0.105:500 but no connection has been authorized with policy=PSK


I don't know why its so difficult. I need simple working instruction for
this very realistic scenario. Please give me a working configuration or
process


here is my ipsec barf:

majid-server
Sun Jun 27 02:45:36 GST 2010
+ _________________________ version
+
+ ipsec --version
Linux Openswan 2.6.27 (klips)
See `ipsec --copyright' for copyright information.
+ _________________________ /proc/version
+
+ cat /proc/version
Linux version 2.6.32 (root at majid-server) (gcc version 4.4.1 (Ubuntu
4.4.1-4ubuntu9) ) #1 SMP Mon Jun 21 22:59:04 GST 2010
+ _________________________ /proc/net/ipsec_eroute
+
+ test -r /proc/net/ipsec_eroute
+ sort -sg -k 3 /proc/net/ipsec_eroute
+ _________________________ netstat-rn
+
+ netstat -nr
+ head -n 100
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt
Iface
10.0.0.0        0.0.0.0         255.255.255.0   U         0 0          0
eth0
169.254.0.0     0.0.0.0         255.255.0.0     U         0 0          0
eth0
0.0.0.0         10.0.0.1        0.0.0.0         UG        0 0          0
eth0
+ _________________________ /proc/net/ipsec_spi
+
+ test -r /proc/net/ipsec_spi
+ cat /proc/net/ipsec_spi
+ _________________________ /proc/net/ipsec_spigrp
+
+ test -r /proc/net/ipsec_spigrp
+ cat /proc/net/ipsec_spigrp
+ _________________________ /proc/net/ipsec_tncfg
+
+ test -r /proc/net/ipsec_tncfg
+ cat /proc/net/ipsec_tncfg
ipsec0 -> NULL mtu=16260(0) -> 0
ipsec1 -> NULL mtu=0(0) -> 0
+ _________________________ /proc/net/pfkey
+
+ test -r /proc/net/pfkey
+ _________________________ /proc/crypto
+
+ test -r /proc/crypto
+ cat /proc/crypto
name         : deflate
driver       : deflate-generic
module       : deflate
priority     : 0
refcnt       : 1
selftest     : passed
type         : compression

name         : rfc3686(ctr(aes))
driver       : rfc3686(ctr(aes-asm))
module       : ctr
priority     : 200
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 1
min keysize  : 20
max keysize  : 36
ivsize       : 8
geniv        : seqiv

name         : ctr(aes)
driver       : ctr(aes-asm)
module       : ctr
priority     : 200
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 1
min keysize  : 16
max keysize  : 32
ivsize       : 16
geniv        : chainiv

name         : cbc(twofish)
driver       : cbc(twofish-generic)
module       : kernel
priority     : 100
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 16
min keysize  : 16
max keysize  : 32
ivsize       : 16
geniv        : <default>

name         : cbc(camellia)
driver       : cbc(camellia-generic)
module       : kernel
priority     : 100
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 16
min keysize  : 16
max keysize  : 32
ivsize       : 16
geniv        : <default>

name         : camellia
driver       : camellia-generic
module       : camellia
priority     : 100
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 16
min keysize  : 16
max keysize  : 32

name         : cbc(serpent)
driver       : cbc(serpent-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 16
min keysize  : 0
max keysize  : 32
ivsize       : 16
geniv        : <default>

name         : cbc(aes)
driver       : cbc(aes-asm)
module       : kernel
priority     : 200
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 16
min keysize  : 16
max keysize  : 32
ivsize       : 16
geniv        : <default>

name         : cbc(blowfish)
driver       : cbc(blowfish-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 8
min keysize  : 4
max keysize  : 56
ivsize       : 8
geniv        : <default>

name         : cbc(cast5)
driver       : cbc(cast5-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 8
min keysize  : 5
max keysize  : 16
ivsize       : 8
geniv        : <default>

name         : cast5
driver       : cast5-generic
module       : cast5
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 8
min keysize  : 5
max keysize  : 16

name         : cbc(des3_ede)
driver       : cbc(des3_ede-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 8
min keysize  : 24
max keysize  : 24
ivsize       : 8
geniv        : <default>

name         : cbc(des)
driver       : cbc(des-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 8
min keysize  : 8
max keysize  : 8
ivsize       : 8
geniv        : <default>

name         : xcbc(aes)
driver       : xcbc(aes-asm)
module       : xcbc
priority     : 200
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 16
digestsize   : 16

name         : hmac(rmd160)
driver       : hmac(rmd160-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 20

name         : rmd160
driver       : rmd160-generic
module       : rmd160
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 20

name         : hmac(sha256)
driver       : hmac(sha256-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 32

name         : hmac(sha1)
driver       : hmac(sha1-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 20

name         : sha1
driver       : sha1-generic
module       : sha1_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 20

name         : hmac(md5)
driver       : hmac(md5-generic)
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 16

name         : compress_null
driver       : compress_null-generic
module       : crypto_null
priority     : 0
refcnt       : 1
selftest     : passed
type         : compression

name         : digest_null
driver       : digest_null-generic
module       : crypto_null
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 1
digestsize   : 0

name         : ecb(cipher_null)
driver       : ecb-cipher_null
module       : crypto_null
priority     : 100
refcnt       : 1
selftest     : passed
type         : blkcipher
blocksize    : 1
min keysize  : 0
max keysize  : 0
ivsize       : 0
geniv        : <default>

name         : cipher_null
driver       : cipher_null-generic
module       : crypto_null
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 1
min keysize  : 0
max keysize  : 0

name         : tnepres
driver       : tnepres-generic
module       : serpent
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 16
min keysize  : 0
max keysize  : 32

name         : serpent
driver       : serpent-generic
module       : serpent
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 16
min keysize  : 0
max keysize  : 32

name         : blowfish
driver       : blowfish-generic
module       : blowfish
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 8
min keysize  : 4
max keysize  : 56

name         : twofish
driver       : twofish-generic
module       : twofish
priority     : 100
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 16
min keysize  : 16
max keysize  : 32

name         : sha256
driver       : sha256-generic
module       : sha256_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 32

name         : sha224
driver       : sha224-generic
module       : sha256_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 28

name         : sha512
driver       : sha512-generic
module       : sha512_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 128
digestsize   : 64

name         : sha384
driver       : sha384-generic
module       : sha512_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 128
digestsize   : 48

name         : des3_ede
driver       : des3_ede-generic
module       : des_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 8
min keysize  : 24
max keysize  : 24

name         : des
driver       : des-generic
module       : des_generic
priority     : 0
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 8
min keysize  : 8
max keysize  : 8

name         : aes
driver       : aes-asm
module       : aes_x86_64
priority     : 200
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 16
min keysize  : 16
max keysize  : 32

name         : aes
driver       : aes-generic
module       : aes_generic
priority     : 100
refcnt       : 1
selftest     : passed
type         : cipher
blocksize    : 16
min keysize  : 16
max keysize  : 32

name         : stdrng
driver       : krng
module       : kernel
priority     : 200
refcnt       : 1
selftest     : passed
type         : rng
seedsize     : 0

name         : md5
driver       : md5-generic
module       : kernel
priority     : 0
refcnt       : 1
selftest     : passed
type         : shash
blocksize    : 64
digestsize   : 16

+ __________________________/proc/sys/net/core/xfrm-star
/usr/local/libexec/ipsec/barf: 1:
__________________________/proc/sys/net/core/xfrm-star: not found
+ echo -n /proc/sys/net/core/xfrm_acq_expires:
/proc/sys/net/core/xfrm_acq_expires: + cat
/proc/sys/net/core/xfrm_acq_expires
30
+ echo -n /proc/sys/net/core/xfrm_aevent_etime:
/proc/sys/net/core/xfrm_aevent_etime: + cat
/proc/sys/net/core/xfrm_aevent_etime
10
+ echo -n /proc/sys/net/core/xfrm_aevent_rseqth:
/proc/sys/net/core/xfrm_aevent_rseqth: + cat
/proc/sys/net/core/xfrm_aevent_rseqth
2
+ echo -n /proc/sys/net/core/xfrm_larval_drop:
/proc/sys/net/core/xfrm_larval_drop: + cat
/proc/sys/net/core/xfrm_larval_drop
1
+ _________________________ /proc/sys/net/ipsec-star
+
+ test -d /proc/sys/net/ipsec
+ cd /proc/sys/net/ipsec
+ egrep ^ debug_ah debug_eroute debug_esp debug_ipcomp debug_mast
debug_netlink debug_pfkey debug_radij debug_rcv debug_spi debug_tunnel
debug_verbose debug_xform debug_xmit icmp inbound_policy_check pfkey_lossage
tos
debug_ah:0
debug_eroute:0
debug_esp:0
debug_ipcomp:0
debug_mast:0
debug_netlink:0
debug_pfkey:0
debug_radij:0
debug_rcv:0
debug_spi:0
debug_tunnel:0
debug_verbose:0
debug_xform:0
debug_xmit:0
icmp:1
inbound_policy_check:1
pfkey_lossage:0
tos:1
+ _________________________ ipsec/status
+
+ ipsec auto --status
000 using kernel interface: mast
000 interface mast0/eth0 10.0.0.105
000 interface mast0/eth0 10.0.0.105
000 %myid = (none)
000 debug
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfkey+nattraversal+x509
000
000 virtual_private (%priv):
000 - allowed 3 subnets: 10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12
000 - disallowed 1 subnet: 10.0.0.0/24
000
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, keysizemin=192,
keysizemax=192
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, keysizemin=128,
keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5,
keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1,
keysizemin=160, keysizemax=160
000
000 algorithm IKE encrypt: id=3, name=OAKLEY_BLOWFISH_CBC, blocksize=8,
keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8,
keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16,
keydeflen=128
000 algorithm IKE encrypt: id=65004, name=OAKLEY_SERPENT_CBC, blocksize=16,
keydeflen=128
000 algorithm IKE encrypt: id=65005, name=OAKLEY_TWOFISH_CBC, blocksize=16,
keydeflen=128
000 algorithm IKE encrypt: id=65289, name=OAKLEY_TWOFISH_CBC_SSH,
blocksize=16, keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE hash: id=4, name=OAKLEY_SHA2_256, hashsize=32
000 algorithm IKE hash: id=6, name=OAKLEY_SHA2_512, hashsize=64
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000
000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,0,0}
trans={0,0,0} attrs={0,0,0}
000
000
000
+ _________________________ ifconfig-a
+
+ ifconfig -a
eth0      Link encap:Ethernet  HWaddr 00:40:ca:a5:d7:1c
          inet addr:10.0.0.105  Bcast:10.0.0.255  Mask:255.255.255.0
          inet6 addr: fe80::240:caff:fea5:d71c/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:2721 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1782 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:264737 (264.7 KB)  TX bytes:574447 (574.4 KB)
          Interrupt:28 Base address:0xe000

ipsec0    Link encap:UNSPEC  HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          NOARP  MTU:16260  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:15 overruns:0 carrier:0
          collisions:0 txqueuelen:10
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

ipsec1    Link encap:UNSPEC  HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          NOARP  MTU:0  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:4 errors:0 dropped:0 overruns:0 frame:0
          TX packets:4 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:240 (240.0 B)  TX bytes:240 (240.0 B)

mast0     Link encap:UNSPEC  HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          inet addr:10.0.0.105  Mask:255.255.255.255
          UP RUNNING NOARP  MTU:1452  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

+ _________________________ ip-addr-list
+
+ ip addr list
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UNKNOWN qlen 1000
    link/ether 00:40:ca:a5:d7:1c brd ff:ff:ff:ff:ff:ff
    inet 10.0.0.105/24 brd 10.0.0.255 scope global eth0
    inet6 fe80::240:caff:fea5:d71c/64 scope link
       valid_lft forever preferred_lft forever
3: ipsec0: <NOARP> mtu 16260 qdisc pfifo_fast state DOWN qlen 10
    link/void
4: ipsec1: <NOARP> mtu 0 qdisc noop state DOWN qlen 10
    link/void
5: mast0: <NOARP,UP,LOWER_UP> mtu 1452 qdisc pfifo_fast state UNKNOWN qlen
10
    link/[65534]
    inet 10.0.0.105/32 scope global mast0
+ _________________________ ip-route-list
+
+ ip route list
10.0.0.0/24 dev eth0  proto kernel  scope link  src 10.0.0.105  metric 1
169.254.0.0/16 dev eth0  scope link  metric 1000
default via 10.0.0.1 dev eth0  proto static
+ _________________________ ip-rule-list
+
+ ip rule list
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
+ _________________________ ipsec_verify
+
+ ipsec verify --nocolour
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path                             [OK]
Linux Openswan 2.6.27 (klips)
Checking for IPsec support in kernel                         [OK]
KLIPS detected, checking for NAT Traversal support           [OK]
Checking that pluto is running                               [OK]
Pluto listening for IKE on udp 500                           [OK]
Pluto listening for NAT-T on udp 4500                       [OK]
Two or more interfaces found, checking IP forwarding         [FAILED]
Checking for 'ip' command                                   [OK]
Checking for 'iptables' command                             [OK]
Opportunistic Encryption Support                             [DISABLED]
+ _________________________ mii-tool
+
+ [ -x /sbin/mii-tool ]
+ /sbin/mii-tool -v
SIOCGMIIPHY on 'eth0' failed: Operation not supported
no MII interfaces found
+ _________________________ ipsec/directory
+
+ ipsec --directory
/usr/local/lib/ipsec
+ _________________________ hostname/fqdn
+
+ hostname --fqdn
majid-server
+ _________________________ hostname/ipaddress
+
+ hostname --ip-address
127.0.1.1
+ _________________________ uptime
+
+ uptime
 02:45:36 up 30 min,  2 users,  load average: 0.00, 0.01, 0.01
+ _________________________ ps
+
+ ps alxwf
+ egrep -i ppid|pluto|ipsec|klips
F   UID   PID  PPID PRI  NI    VSZ   RSS WCHAN  STAT TTY        TIME COMMAND
4     0  2133  1760  40   0  41388  3996 signal T    pts/0      0:00  |
              \_ vim /etc/ipsec.conf
4     0  4301  1760  40   0   4008   628 wait   S+   pts/0      0:00  |
              \_ /bin/sh /usr/local/libexec/ipsec/barf
0     0  4383  4301  40   0   6064   644 pipe_w S+   pts/0      0:00  |
                  \_ egrep -i ppid|pluto|ipsec|klips
1     0  4100     1  40   0   4008   224 wait   S    pts/0      0:00 /bin/sh
/usr/local/lib/ipsec/_plutorun --debug all raw crypt parsing emitting
control lifecycle klips dns oppo controlmore x509 pfkey natt nattraversal
--uniqueids yes --force_busy no --nocrsend no --strictcrlpolicy no
--nat_traversal yes --keep_alive  --protostack mast --force_keepalive no
--disable_port_floating no --virtual_private %v4:
10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!10.0.0.0/24--crlcheckinterval
0 --ocspuri  --nhelpers  --dump  --opts  --stderrlog
 --wait no --pre  --post  --log daemon.error --plutorestartoncrash true
--pid /var/run/pluto/pluto.pid
1     0  4102  4100  40   0   4008   268 wait   S    pts/0      0:00  \_
/bin/sh /usr/local/lib/ipsec/_plutorun --debug all raw crypt parsing
emitting control lifecycle klips dns oppo controlmore x509 pfkey natt
nattraversal --uniqueids yes --force_busy no --nocrsend no --strictcrlpolicy
no --nat_traversal yes --keep_alive  --protostack mast --force_keepalive no
--disable_port_floating no --virtual_private %v4:
10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!10.0.0.0/24--crlcheckinterval
0 --ocspuri  --nhelpers  --dump  --opts  --stderrlog
 --wait no --pre  --post  --log daemon.error --plutorestartoncrash true
--pid /var/run/pluto/pluto.pid
4     0  4106  4102  40   0   9828  1360 poll_s S    pts/0      0:00  |   \_
/usr/local/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets
--ipsecdir /etc/ipsec.d --debug-all --debug-raw --debug-crypt
--debug-parsing --debug-emitting --debug-control --debug-lifecycle
--debug-klips --debug-dns --debug-oppo --debug-controlmore --debug-x509
--debug-pfkey --debug-natt --debug-nattraversal --use-mast --uniqueids
--nat_traversal --virtual_private %v4:
10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!10.0.0.0/24
1     0  4108  4106  30  10   9836   616 unix_s SN   pts/0      0:00  |
  \_ pluto helper  #  0





1     0  4109  4106  30  10   9836   616 unix_s SN   pts/0      0:00  |
  \_ pluto helper  #  1





1     0  4110  4106  30  10   9836   616 unix_s SN   pts/0      0:00  |
  \_ pluto helper  #  2





0     0  4112  4106  40   0   5928   384 poll_s S    pts/0      0:00  |
  \_ _pluto_adns -d
0     0  4104  4100  40   0   4008   592 pipe_w S    pts/0      0:00  \_
/bin/sh /usr/local/lib/ipsec/_plutoload --wait no --post
0     0  4101     1  40   0   3912   660 pipe_w S    pts/0      0:00 logger
-s -p daemon.error -t ipsec__plutorun
+ _________________________ ipsec/showdefaults
+
+ ipsec showdefaults
ipsec showdefaults: cannot find defaults file `/var/run/pluto/ipsec.info'
+ _________________________ ipsec/conf
+
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor

#< /etc/ipsec.conf 1
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.16 2005/07/26 12:29:45 ken Exp $

# This file:  /usr/share/doc/openswan/ipsec.conf-sample
#
# Manual:     ipsec.conf.5



version 2.0 # conforms to second version of ipsec.conf specification

#include /etc/ipsec.d/l2tp-psk.conf
# basic configuration
config setup
# Do not set debug options to debug configuration issues!
 # plutodebug / klipsdebug = "all", "none" or a combation from below:
# "raw crypt parsing emitting control klips pfkey natt x509 dpd private"
 # eg:
# plutodebug="control parsing"
#
 # enable to get logs per-peer
# plutoopts="--perpeerlog"
#
 # Again: only enable plutodebug or klipsdebug when asked by a developer
#
 # NAT-TRAVERSAL support, see README.NAT-Traversal
nat_traversal=yes
# exclude networks used on server side by adding %v4:!a.b.c.0/24
 virtual_private=%v4:
10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!10.0.0.0/24
 # OE is now off by default. Uncomment and change to on, to enable.
oe=off
 # which IPsec stack to use. netkey,klips,mast,auto or none
#protostack=klips
protostack=mast
 #protostack=netkey
interfaces=%defaultroute

plutodebug=all
 #uniqueids=yes
conn road
type=tunnel
keyingtries=3
 overlapip=yes

left=10.0.0.105
leftid=majid.mooo.com
 leftsubnet=10.0.0.0/24
leftnexthop=%defaultroute
 right=%any
rightnexthop=%defaultroute
 #rightsubnet=192.168.0.0/24
rightsubnet=vhost:%no,%priv
 authby=secret
forceencaps=yes
pfs=no
 #ike=3des-md5;modp1024
# phase2=esp
 #       phase2alg=3des-md5;modp1024
 rekey=no

#
ike=aes128-sha-modp1536,aes128-sha-modp1024,aes128-md5-modp1536,aes128-md5-modp1024,3des-sha-modp1536,3des-sha-modp1024,3des-md5-modp1536,3des-md5-modp1024
#        esp=aes128-sha1,aes128-md5,3des-sha1,3des-md5
#        ikelifetime=1h
#        keylife=8h
#        compress=yes
#        dpddelay=30
#        dpdtimeout=120
#        dpdaction=restart
#dpddelay=40
#dpdtimeout=130
#dpdaction=clear
 auto=add

conn road-l2tp
also=road
leftprotoport=17/1701
 #because Mac clients don't like 1701
rightprotoport=17/1701
#auto=add
conn road-l2tp-mac
also=road
leftprotoport=17/1701
#because Mac clients don't like 1701
 rightprotoport=17/%any
#auto=add
# sample VPN connection
# for more examples, see /etc/ipsec.d/examples/
#conn sample
# # Left security gateway, subnet behind it, nexthop toward right.
# left=10.0.0.1
# leftsubnet=172.16.0.0/24
# leftnexthop=10.22.33.44
# # Right security gateway, subnet behind it, nexthop toward left.
# right=10.12.12.1
# rightsubnet=192.168.0.0/24
# rightnexthop=10.101.102.103
# # To authorize this connection, but not actually start it,
# # at startup, uncomment this.
# auto=start
#
conn block
    auto=ignore
conn private
    auto=ignore
conn private-or-clear
    auto=ignore
conn clear-or-private
    auto=ignore
conn clear
    auto=ignore
conn packetdefault
    auto=ignore
+ _________________________ ipsec/secrets
+
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor

#< /etc/ipsec.secrets 1
# RCSID $Id: ipsec.secrets.proto,v 1.3.6.1 2005/09/28 13:59:14 paul Exp $
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication.  See ipsec_pluto(8) manpage, and HTML documentation.

# RSA private key for this host, authenticating it to any other host
# which knows the public part.  Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "[sums to ef67...]".

10.0.0.105 %any : PSK "[sums to 0c27...]"
+ _________________________ ipsec/listall
+
+ ipsec auto --listall
000
000 List of Public Keys:
000
000 List of Pre-shared secrets (from /etc/ipsec.secrets)
000     11: PSK %any 10.0.0.105
+ [ /etc/ipsec.d/policies ]
+ basename /etc/ipsec.d/policies/block
+ base=block
+ _________________________ ipsec/policies/block
+
+ cat /etc/ipsec.d/policies/block
# This file defines the set of CIDRs (network/mask-length) to which
# communication should never be allowed.
#
# See /usr/local/share/doc/openswan/policygroups.html for details.
#
# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#

+ basename /etc/ipsec.d/policies/clear
+ base=clear
+ _________________________ ipsec/policies/clear
+
+ cat /etc/ipsec.d/policies/clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be in the clear.
#
# See /usr/local/share/doc/openswan/policygroups.html for details.
#

# root name servers should be in the clear
192.58.128.30/32
198.41.0.4/32
192.228.79.201/32
192.33.4.12/32
128.8.10.90/32
192.203.230.10/32
192.5.5.241/32
192.112.36.4/32
128.63.2.53/32
192.36.148.17/32
193.0.14.129/32
199.7.83.42/32
202.12.27.33/32
+ basename /etc/ipsec.d/policies/clear-or-private
+ base=clear-or-private
+ _________________________ ipsec/policies/clear-or-private
+
+ cat /etc/ipsec.d/policies/clear-or-private
# This file defines the set of CIDRs (network/mask-length) to which
# we will communicate in the clear, or, if the other side initiates IPSEC,
# using encryption.  This behaviour is also called "Opportunistic
Responder".
#
# See /usr/local/share/doc/openswan/policygroups.html for details.
#
# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ basename /etc/ipsec.d/policies/private
+ base=private
+ _________________________ ipsec/policies/private
+
+ cat /etc/ipsec.d/policies/private
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be private (i.e. encrypted).
# See /usr/local/share/doc/openswan/policygroups.html for details.
#
# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ basename /etc/ipsec.d/policies/private-or-clear
+ base=private-or-clear
+ _________________________ ipsec/policies/private-or-clear
+
+ cat /etc/ipsec.d/policies/private-or-clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should be private, if possible, but in the clear otherwise.
#
# If the target has a TXT (later IPSECKEY) record that specifies
# authentication material, we will require private (i.e. encrypted)
# communications.  If no such record is found, communications will be
# in the clear.
#
# See /usr/local/share/doc/openswan/policygroups.html for details.
#
# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
#

0.0.0.0/0
+ _________________________ ipsec/ls-libdir
+
+ ls -l /usr/local/lib/ipsec
total 272
-rwxr-xr-x 1 root root 19143 Jun 27 01:40 _copyright
-rwxr-xr-x 1 root root 19143 Jun 21 23:33 _copyright.old
-rwxr-xr-x 1 root root  2379 Jun 27 01:40 _include
-rwxr-xr-x 1 root root  2379 Jun 21 23:33 _include.old
-rwxr-xr-x 1 root root  1475 Jun 27 01:40 _keycensor
-rwxr-xr-x 1 root root  1475 Jun 21 23:33 _keycensor.old
-rwxr-xr-x 1 root root  2632 Jun 27 01:40 _plutoload
-rwxr-xr-x 1 root root  2632 Jun 21 23:33 _plutoload.old
-rwxr-xr-x 1 root root  8221 Jun 27 01:40 _plutorun
-rwxr-xr-x 1 root root  8221 Jun 21 23:33 _plutorun.old
-rwxr-xr-x 1 root root 12940 Jun 27 01:40 _realsetup
-rwxr-xr-x 1 root root 12940 Jun 21 23:33 _realsetup.old
-rwxr-xr-x 1 root root  1975 Jun 27 01:40 _secretcensor
-rwxr-xr-x 1 root root  1975 Jun 21 23:33 _secretcensor.old
-rwxr-xr-x 1 root root  9280 Jun 27 01:40 _startklips
-rwxr-xr-x 1 root root  9280 Jun 21 23:33 _startklips.old
-rwxr-xr-x 1 root root  6042 Jun 27 01:40 _startnetkey
-rwxr-xr-x 1 root root  6042 Jun 21 23:33 _startnetkey.old
-rwxr-xr-x 1 root root  4886 Jun 27 01:40 _updown
-rwxr-xr-x 1 root root 16182 Jun 27 01:40 _updown.klips
-rwxr-xr-x 1 root root 16182 Jun 21 23:33 _updown.klips.old
-rwxr-xr-x 1 root root 13909 Jun 27 01:40 _updown.mast
-rwxr-xr-x 1 root root 13909 Jun 21 23:33 _updown.mast.old
-rwxr-xr-x 1 root root 10951 Jun 27 01:40 _updown.netkey
-rwxr-xr-x 1 root root 10951 Jun 21 23:33 _updown.netkey.old
-rwxr-xr-x 1 root root  4886 Jun 21 23:33 _updown.old
+ _________________________ ipsec/ls-execdir
+
+ ls -l /usr/local/libexec/ipsec
total 10232
-rwxr-xr-x 1 root root   31801 Jun 27 01:40 _pluto_adns
-rwxr-xr-x 1 root root   31801 Jun 21 23:33 _pluto_adns.old
-rwxr-xr-x 1 root root  458190 Jun 27 01:40 addconn
-rwxr-xr-x 1 root root  458190 Jun 21 23:33 addconn.old
-rwxr-xr-x 1 root root    6015 Jun 27 01:40 auto
-rwxr-xr-x 1 root root    6015 Jun 21 23:33 auto.old
-rwxr-xr-x 1 root root   10828 Jun 27 01:40 barf
-rwxr-xr-x 1 root root   10828 Jun 21 23:33 barf.old
-rwxr-xr-x 1 root root  191596 Jun 27 01:40 eroute
-rwxr-xr-x 1 root root  191596 Jun 21 23:33 eroute.old
-rwxr-xr-x 1 root root   62586 Jun 27 01:40 ikeping
-rwxr-xr-x 1 root root   62586 Jun 21 23:33 ikeping.old
-rwxr-xr-x 1 root root  127859 Jun 27 01:40 klipsdebug
-rwxr-xr-x 1 root root  127859 Jun 21 23:33 klipsdebug.old
-rwxr-xr-x 1 root root    2591 Jun 27 01:40 look
-rwxr-xr-x 1 root root    2591 Jun 21 23:33 look.old
-rwxr-xr-x 1 root root    2182 Jun 27 01:40 newhostkey
-rwxr-xr-x 1 root root    2182 Jun 21 23:33 newhostkey.old
-rwxr-xr-x 1 root root  118259 Jun 27 01:40 pf_key
-rwxr-xr-x 1 root root  118259 Jun 21 23:33 pf_key.old
-rwxr-xr-x 1 root root 2688092 Jun 27 01:40 pluto
-rwxr-xr-x 1 root root 2688092 Jun 21 23:33 pluto.old
-rwxr-xr-x 1 root root   22190 Jun 27 01:40 ranbits
-rwxr-xr-x 1 root root   22190 Jun 21 23:33 ranbits.old
-rwxr-xr-x 1 root root   45023 Jun 27 01:40 rsasigkey
-rwxr-xr-x 1 root root   45023 Jun 21 23:33 rsasigkey.old
-rwxr-xr-x 1 root root     766 Jun 27 01:40 secrets
-rwxr-xr-x 1 root root     766 Jun 21 23:33 secrets.old
lrwxrwxrwx 1 root root      17 Jun 27 01:40 setup -> /etc/init.d/ipsec
-rwxr-xr-x 1 root root    1054 Jun 27 01:40 showdefaults
-rwxr-xr-x 1 root root    1054 Jun 21 23:33 showdefaults.old
-rwxr-xr-x 1 root root  540134 Jun 27 01:40 showhostkey
-rwxr-xr-x 1 root root  540134 Jun 21 23:33 showhostkey.old
-rwxr-xr-x 1 root root   70958 Jun 27 01:40 showpolicy
-rwxr-xr-x 1 root root   70958 Jun 21 23:33 showpolicy.old
-rwxr-xr-x 1 root root  332157 Jun 27 01:40 spi
-rwxr-xr-x 1 root root  332157 Jun 21 23:33 spi.old
-rwxr-xr-x 1 root root  162615 Jun 27 01:40 spigrp
-rwxr-xr-x 1 root root  162615 Jun 21 23:33 spigrp.old
-rwxr-xr-x 1 root root  147530 Jun 27 01:40 tncfg
-rwxr-xr-x 1 root root  147530 Jun 21 23:33 tncfg.old
-rwxr-xr-x 1 root root   13452 Jun 27 01:40 verify
-rwxr-xr-x 1 root root   13452 Jun 21 23:33 verify.old
-rwxr-xr-x 1 root root  131606 Jun 27 01:40 whack
-rwxr-xr-x 1 root root  131606 Jun 21 23:33 whack.old
+ _________________________ /proc/net/dev
+
+ cat /proc/net/dev
Inter-|   Receive                                                |  Transmit
 face |bytes    packets errs drop fifo frame compressed multicast|bytes
 packets errs drop fifo colls carrier compressed
    lo:     240       4    0    0    0     0          0         0      240
    4    0    0    0     0       0          0
  eth0:  265057    2723    0    0    0     0          0         0   574821
 1786    0    0    0     0       0          0
ipsec0:       0       0    0    0    0     0          0         0        0
    0    0   15    0     0       0          0
ipsec1:       0       0    0    0    0     0          0         0        0
    0    0    0    0     0       0          0
 mast0:       0       0    0    0    0     0          0         0        0
    0    0    0    0     0       0          0
+ _________________________ /proc/net/route
+
+ cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT

eth0 0000000A 00000000 0001 0 0 1 00FFFFFF 0 0 0

eth0 0000FEA9 00000000 0001 0 0 1000 0000FFFF 0 0 0

eth0 00000000 0100000A 0003 0 0 0 00000000 0 0 0

+ _________________________ /proc/sys/net/ipv4/ip_no_pmtu_disc
+
+ cat /proc/sys/net/ipv4/ip_no_pmtu_disc
0
+ _________________________ /proc/sys/net/ipv4/ip_forward
+
+ cat /proc/sys/net/ipv4/ip_forward
0
+ _________________________ /proc/sys/net/ipv4/tcp_ecn
+
+ cat /proc/sys/net/ipv4/tcp_ecn
2
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+
+ cd /proc/sys/net/ipv4/conf
+ egrep ^ all/rp_filter default/rp_filter eth0/rp_filter ipsec0/rp_filter
ipsec1/rp_filter lo/rp_filter mast0/rp_filter
all/rp_filter:1
default/rp_filter:1
eth0/rp_filter:1
ipsec0/rp_filter:1
ipsec1/rp_filter:1
lo/rp_filter:1
mast0/rp_filter:1
+ _________________________ /proc/sys/net/ipv4/conf/star-star-redirects
+
+ cd /proc/sys/net/ipv4/conf
+ egrep ^ all/accept_redirects all/secure_redirects all/send_redirects
default/accept_redirects default/secure_redirects default/send_redirects
eth0/accept_redirects eth0/secure_redirects eth0/send_redirects
ipsec0/accept_redirects ipsec0/secure_redirects ipsec0/send_redirects
ipsec1/accept_redirects ipsec1/secure_redirects ipsec1/send_redirects
lo/accept_redirects lo/secure_redirects lo/send_redirects
mast0/accept_redirects mast0/secure_redirects mast0/send_redirects
all/accept_redirects:1
all/secure_redirects:1
all/send_redirects:1
default/accept_redirects:1
default/secure_redirects:1
default/send_redirects:1
eth0/accept_redirects:1
eth0/secure_redirects:1
eth0/send_redirects:1
ipsec0/accept_redirects:1
ipsec0/secure_redirects:1
ipsec0/send_redirects:1
ipsec1/accept_redirects:1
ipsec1/secure_redirects:1
ipsec1/send_redirects:1
lo/accept_redirects:1
lo/secure_redirects:1
lo/send_redirects:1
mast0/accept_redirects:1
mast0/secure_redirects:1
mast0/send_redirects:1
+ _________________________ /proc/sys/net/ipv4/tcp_window_scaling
+
+ cat /proc/sys/net/ipv4/tcp_window_scaling
1
+ _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale
+
+ cat /proc/sys/net/ipv4/tcp_adv_win_scale
2
+ _________________________ uname-a
+
+ uname -a
Linux majid-server 2.6.32 #1 SMP Mon Jun 21 22:59:04 GST 2010 x86_64
GNU/Linux
+ _________________________ config-built-with
+
+ test -r /proc/config_built_with
+ _________________________ distro-release
+
+ test -f /etc/redhat-release
+ test -f /etc/debian-release
+ test -f /etc/SuSE-release
+ test -f /etc/mandrake-release
+ test -f /etc/mandriva-release
+ test -f /etc/gentoo-release
+ _________________________ /proc/net/ipsec_version
+
+ test -r /proc/net/ipsec_version
+ cat /proc/net/ipsec_version
Openswan version: 2.6.27
+ _________________________ iptables
+
+ test -r /sbin/iptables
+ iptables -L -v -n
Chain INPUT (policy ACCEPT 2685 packets, 225K bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain OUTPUT (policy ACCEPT 1739 packets, 539K bytes)
 pkts bytes target     prot opt in     out     source
destination
+ _________________________ iptables-nat
+
+ iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 61 packets, 6188 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain POSTROUTING (policy ACCEPT 61 packets, 4659 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain OUTPUT (policy ACCEPT 61 packets, 4659 bytes)
 pkts bytes target     prot opt in     out     source
destination
+ _________________________ iptables-mangle
+
+ iptables -t mangle -L -v -n
Chain PREROUTING (policy ACCEPT 2391 packets, 195K bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain INPUT (policy ACCEPT 2376 packets, 194K bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain OUTPUT (policy ACCEPT 1514 packets, 473K bytes)
 pkts bytes target     prot opt in     out     source
destination

Chain POSTROUTING (policy ACCEPT 1545 packets, 475K bytes)
 pkts bytes target     prot opt in     out     source
destination
+ _________________________ /proc/modules
+
+ test -f /proc/modules
+ cat /proc/modules
ipsec 390781 2 - Live 0xffffffffa0338000
iptable_mangle 3171 0 - Live 0xffffffffa0316000
iptable_nat 4979 0 - Live 0xffffffffa030f000
nf_nat 18662 1 iptable_nat, Live 0xffffffffa0303000
nf_conntrack_ipv4 12548 3 iptable_nat,nf_nat, Live 0xffffffffa02f9000
nf_conntrack 71782 3 iptable_nat,nf_nat,nf_conntrack_ipv4, Live
0xffffffffa02db000
nf_defrag_ipv4 1401 1 nf_conntrack_ipv4, Live 0xffffffffa02d5000
binfmt_misc 7454 1 - Live 0xffffffffa02ce000
deflate 2099 0 - Live 0xffffffffa02c8000
zlib_deflate 21595 1 deflate, Live 0xffffffffa02bd000
ctr 3885 0 - Live 0xffffffffa02b7000
camellia 18252 0 - Live 0xffffffffa02ad000
cast5 15160 0 - Live 0xffffffffa02a4000
ppdev 6059 0 - Live 0xffffffffa029d000
rmd160 8040 0 - Live 0xffffffffa0296000
sha1_generic 2151 0 - Live 0xffffffffa028a000
crypto_null 2838 0 - Live 0xffffffffa0284000
ccm 8197 0 - Live 0xffffffffa027c000
serpent 18309 0 - Live 0xffffffffa0272000
blowfish 7802 0 - Live 0xffffffffa026b000
twofish 5851 0 - Live 0xffffffffa0264000
twofish_common 14615 1 twofish, Live 0xffffffffa025b000
xcbc 2735 0 - Live 0xffffffffa0255000
sha256_generic 10215 0 - Live 0xffffffffa024d000
sha512_generic 4828 0 - Live 0xffffffffa0246000
des_generic 16490 0 - Live 0xffffffffa023c000
cryptd 7138 0 - Live 0xffffffffa0225000
aes_x86_64 7832 0 - Live 0xffffffffa021e000
aes_generic 27527 1 aes_x86_64, Live 0xffffffffa0205000
tunnel4 2797 0 - Live 0xffffffffa01cc000
xfrm_ipcomp 4688 0 - Live 0xffffffffa014f000
tunnel6 2632 0 - Live 0xffffffffa0122000
snd_hda_codec_realtek 273242 1 - Live 0xffffffffa0154000
snd_hda_intel 23609 2 - Live 0xffffffffa0147000
snd_hda_codec 79633 2 snd_hda_codec_realtek,snd_hda_intel, Live
0xffffffffa0126000
snd_hwdep 6606 1 snd_hda_codec, Live 0xffffffffa011e000
snd_pcm_oss 39645 0 - Live 0xffffffffa010d000
snd_mixer_oss 16456 1 snd_pcm_oss, Live 0xffffffffa0055000
snd_pcm 84013 3 snd_hda_intel,snd_hda_codec,snd_pcm_oss, Live
0xffffffffa00ec000
snd_seq_dummy 1734 0 - Live 0xffffffffa003b000
snd_seq_oss 29511 0 - Live 0xffffffffa00e2000
snd_seq_midi 5669 0 - Live 0xffffffffa008f000
snd_rawmidi 22557 1 snd_seq_midi, Live 0xffffffffa00da000
snd_seq_midi_event 6931 2 snd_seq_oss,snd_seq_midi, Live 0xffffffffa0037000
snd_seq 54478 6 snd_seq_dummy,snd_seq_oss,snd_seq_midi,snd_seq_midi_event,
Live 0xffffffffa00ca000
iptable_filter 2679 0 - Live 0xffffffffa0023000
snd_timer 22574 2 snd_pcm,snd_seq, Live 0xffffffffa00c2000
snd_seq_device 6450 5
snd_seq_dummy,snd_seq_oss,snd_seq_midi,snd_rawmidi,snd_seq, Live
0xffffffffa000c000
ohci1394 29447 0 - Live 0xffffffffa0073000
snd 68465 16
snd_hda_codec_realtek,snd_hda_intel,snd_hda_codec,snd_hwdep,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_seq_oss,snd_rawmidi,snd_seq,snd_timer,snd_seq_device,
Live 0xffffffffa00af000
lp 9112 0 - Live 0xffffffffa00a6000
ip_tables 17486 3 iptable_mangle,iptable_nat,iptable_filter, Live
0xffffffffa009f000
soundcore 7860 1 snd, Live 0xffffffffa002c000
i2c_nforce2 5949 0 - Live 0xffffffffa001f000
parport 36303 2 ppdev,lp, Live 0xffffffffa0094000
forcedeth 54516 0 - Live 0xffffffffa007f000
ieee1394 89948 1 ohci1394, Live 0xffffffffa005b000
psmouse 52687 0 - Live 0xffffffffa0046000
snd_page_alloc 8388 2 snd_hda_intel,snd_pcm, Live 0xffffffffa003d000
x_tables 21645 2 iptable_nat,ip_tables, Live 0xffffffffa002f000
serio_raw 4672 0 - Live 0xffffffffa0028000
usb_storage 47423 0 - Live 0xffffffffa0011000
usbhid 38920 0 - Live 0xffffffffa0000000
+ _________________________ /proc/meminfo
+
+ cat /proc/meminfo
MemTotal:        4057136 kB
MemFree:         3619240 kB
Buffers:           27256 kB
Cached:           154816 kB
SwapCached:            0 kB
Active:           159808 kB
Inactive:         130716 kB
Active(anon):     110216 kB
Inactive(anon):        0 kB
Active(file):      49592 kB
Inactive(file):   130716 kB
Unevictable:           0 kB
Mlocked:               0 kB
SwapTotal:       8233304 kB
SwapFree:        8233304 kB
Dirty:                32 kB
Writeback:             0 kB
AnonPages:        108492 kB
Mapped:            31832 kB
Shmem:              1760 kB
Slab:              34724 kB
SReclaimable:      20100 kB
SUnreclaim:        14624 kB
KernelStack:        2712 kB
PageTables:         9428 kB
NFS_Unstable:          0 kB
Bounce:                0 kB
WritebackTmp:          0 kB
CommitLimit:    10261872 kB
Committed_AS:     667972 kB
VmallocTotal:   34359738367 kB
VmallocUsed:       55756 kB
VmallocChunk:   34359680252 kB
HugePages_Total:       0
HugePages_Free:        0
HugePages_Rsvd:        0
HugePages_Surp:        0
Hugepagesize:       2048 kB
DirectMap4k:        7104 kB
DirectMap2M:     4186112 kB
+ _________________________ /proc/net/ipsec-ls
+
+ test -f /proc/net/ipsec_version
+ ls -l /proc/net/ipsec_eroute /proc/net/ipsec_klipsdebug
/proc/net/ipsec_spi /proc/net/ipsec_spigrp /proc/net/ipsec_tncfg
/proc/net/ipsec_version
lrwxrwxrwx 1 root root 16 Jun 27 02:45 /proc/net/ipsec_eroute ->
ipsec/eroute/all
lrwxrwxrwx 1 root root 16 Jun 27 02:45 /proc/net/ipsec_klipsdebug ->
ipsec/klipsdebug
lrwxrwxrwx 1 root root 13 Jun 27 02:45 /proc/net/ipsec_spi -> ipsec/spi/all
lrwxrwxrwx 1 root root 16 Jun 27 02:45 /proc/net/ipsec_spigrp ->
ipsec/spigrp/all
lrwxrwxrwx 1 root root 11 Jun 27 02:45 /proc/net/ipsec_tncfg -> ipsec/tncfg
lrwxrwxrwx 1 root root 13 Jun 27 02:45 /proc/net/ipsec_version ->
ipsec/version
+ _________________________ usr/src/linux/.config
+
+ test -f /proc/config.gz
+ uname -r
+ test -f /lib/modules/2.6.32/build/.config
+ egrep
CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_HW_RANDOM|CONFIG_CRYPTO_DEV|_XFRM
+ uname -r
+ cat /lib/modules/2.6.32/build/.config
CONFIG_IPC_NS=y
CONFIG_XFRM=y
CONFIG_XFRM_USER=m
# CONFIG_XFRM_SUB_POLICY is not set
# CONFIG_XFRM_MIGRATE is not set
# CONFIG_XFRM_STATISTICS is not set
CONFIG_XFRM_IPCOMP=m
CONFIG_NET_KEY=m
# CONFIG_NET_KEY_MIGRATE is not set
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
# CONFIG_IP_FIB_TRIE is not set
CONFIG_IP_FIB_HASH=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_MULTIPATH=y
CONFIG_IP_ROUTE_VERBOSE=y
# CONFIG_IP_PNP is not set
CONFIG_IP_MROUTE=y
CONFIG_IP_PIMSM_V1=y
CONFIG_IP_PIMSM_V2=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=m
CONFIG_INET_IPCOMP=m
CONFIG_INET_XFRM_TUNNEL=m
CONFIG_INET_TUNNEL=m
CONFIG_INET_XFRM_MODE_TRANSPORT=m
CONFIG_INET_XFRM_MODE_TUNNEL=m
CONFIG_INET_XFRM_MODE_BEET=m
CONFIG_INET_IPSEC_SAREF=y
CONFIG_INET_LRO=y
CONFIG_INET_DIAG=y
CONFIG_INET_TCP_DIAG=y
CONFIG_IPV6=y
CONFIG_IPV6_PRIVACY=y
# CONFIG_IPV6_ROUTER_PREF is not set
# CONFIG_IPV6_OPTIMISTIC_DAD is not set
CONFIG_INET6_AH=m
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=m
# CONFIG_IPV6_MIP6 is not set
CONFIG_INET6_XFRM_TUNNEL=m
CONFIG_INET6_TUNNEL=m
CONFIG_INET6_XFRM_MODE_TRANSPORT=m
CONFIG_INET6_XFRM_MODE_TUNNEL=m
CONFIG_INET6_XFRM_MODE_BEET=m
CONFIG_INET6_XFRM_MODE_ROUTEOPTIMIZATION=m
CONFIG_IPV6_SIT=m
CONFIG_IPV6_NDISC_NODETYPE=y
CONFIG_IPV6_TUNNEL=m
CONFIG_IPV6_MULTIPLE_TABLES=y
# CONFIG_IPV6_SUBTREES is not set
# CONFIG_IPV6_MROUTE is not set
CONFIG_IP_VS=m
CONFIG_IP_VS_IPV6=y
# CONFIG_IP_VS_DEBUG is not set
CONFIG_IP_VS_TAB_BITS=12
CONFIG_IP_VS_PROTO_TCP=y
CONFIG_IP_VS_PROTO_UDP=y
CONFIG_IP_VS_PROTO_AH_ESP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=m
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=m
CONFIG_IP_VS_LBLCR=m
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=m
CONFIG_IP_VS_SED=m
CONFIG_IP_VS_NQ=m
CONFIG_IP_VS_FTP=m
CONFIG_IP_NF_QUEUE=m
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_ADDRTYPE=m
CONFIG_IP_NF_MATCH_AH=m
CONFIG_IP_NF_MATCH_ECN=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_ULOG=m
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_NETMAP=m
CONFIG_IP_NF_TARGET_REDIRECT=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_CLUSTERIP=m
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_TTL=m
CONFIG_IP_NF_RAW=m
CONFIG_IP_NF_SECURITY=m
CONFIG_IP_NF_ARPTABLES=m
CONFIG_IP_NF_ARPFILTER=m
CONFIG_IP_NF_ARP_MANGLE=m
CONFIG_IP6_NF_QUEUE=m
CONFIG_IP6_NF_IPTABLES=m
CONFIG_IP6_NF_MATCH_AH=m
CONFIG_IP6_NF_MATCH_EUI64=m
CONFIG_IP6_NF_MATCH_FRAG=m
CONFIG_IP6_NF_MATCH_OPTS=m
CONFIG_IP6_NF_MATCH_HL=m
CONFIG_IP6_NF_MATCH_IPV6HEADER=m
CONFIG_IP6_NF_MATCH_MH=m
CONFIG_IP6_NF_MATCH_RT=m
CONFIG_IP6_NF_TARGET_HL=m
CONFIG_IP6_NF_TARGET_LOG=m
CONFIG_IP6_NF_FILTER=m
CONFIG_IP6_NF_TARGET_REJECT=m
CONFIG_IP6_NF_MANGLE=m
CONFIG_IP6_NF_RAW=m
CONFIG_IP6_NF_SECURITY=m
CONFIG_IP_DCCP=m
CONFIG_INET_DCCP_DIAG=m
# CONFIG_IP_DCCP_CCID2_DEBUG is not set
CONFIG_IP_DCCP_CCID3=y
# CONFIG_IP_DCCP_CCID3_DEBUG is not set
CONFIG_IP_DCCP_CCID3_RTO=100
CONFIG_IP_DCCP_TFRC_LIB=y
# CONFIG_IP_DCCP_DEBUG is not set
CONFIG_IP_SCTP=m
CONFIG_IPX=m
# CONFIG_IPX_INTERN is not set
CONFIG_IPDDP=m
CONFIG_IPDDP_ENCAP=y
CONFIG_IPDDP_DECAP=y
CONFIG_IP1000=m
CONFIG_IPPP_FILTER=y
CONFIG_IPMI_HANDLER=m
# CONFIG_IPMI_PANIC_EVENT is not set
CONFIG_IPMI_DEVICE_INTERFACE=m
CONFIG_IPMI_SI=m
CONFIG_IPMI_WATCHDOG=m
CONFIG_IPMI_POWEROFF=m
CONFIG_HW_RANDOM=y
CONFIG_HW_RANDOM_TIMERIOMEM=m
CONFIG_HW_RANDOM_INTEL=m
CONFIG_HW_RANDOM_AMD=m
CONFIG_HW_RANDOM_VIA=m
CONFIG_HW_RANDOM_VIRTIO=m
CONFIG_IPWIRELESS=m
# CONFIG_SECURITY_NETWORK_XFRM is not set
CONFIG_CRYPTO_DEV_PADLOCK=y
CONFIG_CRYPTO_DEV_PADLOCK_AES=m
CONFIG_CRYPTO_DEV_PADLOCK_SHA=m
CONFIG_CRYPTO_DEV_HIFN_795X=m
CONFIG_CRYPTO_DEV_HIFN_795X_RNG=y
+ _________________________ etc/syslog.conf
+
+ _________________________ etc/syslog-ng/syslog-ng.conf
+
+ cat /etc/syslog-ng/syslog-ng.conf
cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory
+ cat /etc/syslog.conf
cat: /etc/syslog.conf: No such file or directory
+ _________________________ etc/resolv.conf
+
+ cat /etc/resolv.conf
# Generated by NetworkManager
domain du.ae
search du.ae
nameserver 213.132.63.25
nameserver 80.227.2.4
+ _________________________ lib/modules-ls
+
+ ls -ltr /lib/modules
total 16
drwxr-xr-x 3 root root 4096 Jun 21 00:17 2.6.23
drwxr-xr-x 5 root root 4096 Jun 21 15:41 2.6.31-14-generic
drwxr-xr-x 3 root root 4096 Jun 21 22:12 2.6.34
drwxr-xr-x 3 root root 4096 Jun 27 01:48 2.6.32
+ _________________________ fipscheck
+
+ cat /proc/sys/crypto/fips_enabled
0
+ _________________________ /proc/ksyms-netif_rx
+
+ test -r /proc/ksyms
+ test -r /proc/kallsyms
+ egrep netif_rx /proc/kallsyms
ffffffff8143e250 T netif_rx
ffffffff8143e500 T netif_rx_ni
ffffffff8174fd10 r __ksymtab_netif_rx_ni
ffffffff8174fd20 r __ksymtab_netif_rx
ffffffff8175ea80 r __kcrctab_netif_rx_ni
ffffffff8175ea88 r __kcrctab_netif_rx
ffffffff81776f35 r __kstrtab_netif_rx_ni
ffffffff81776f41 r __kstrtab_netif_rx
+ _________________________ lib/modules-netif_rx
+
+ modulegoo kernel/net/ipv4/ipip.o netif_rx
+ set +x
2.6.23:
2.6.31-14-generic:
2.6.32:
2.6.34:
+ _________________________ kern.debug
+
+ test -f /var/log/kern.debug
+ _________________________ klog
+
+ sed -n 9805,$p /var/log/syslog+ egrep -i ipsec|klips|pluto
+ cat
Jun 27 02:30:55 majid-server ipsec_setup: Starting Openswan IPsec 2.6.27...
Jun 27 02:30:55 majid-server ipsec_setup: Using KLIPS/mast stack
Jun 27 02:30:55 majid-server ipsec_setup: KLIPS debug `none'
Jun 27 02:30:55 majid-server ipsec_setup: iptables: No chain/target/match by
that name.
Jun 27 02:30:55 majid-server ipsec_setup: ...Openswan IPsec started
Jun 27 02:30:55 majid-server pluto: adjusting ipsec.d to /etc/ipsec.d
Jun 27 02:30:55 majid-server ipsec__plutorun: adjusting ipsec.d to
/etc/ipsec.d
Jun 27 02:30:55 majid-server ipsec__plutorun: 023 address family
inconsistency in this connection=2 host=2/nexthop=0
Jun 27 02:30:55 majid-server ipsec__plutorun: 037 attempt to load incomplete
connection
Jun 27 02:30:55 majid-server ipsec__plutorun: 023 address family
inconsistency in this connection=2 host=2/nexthop=0
Jun 27 02:30:55 majid-server ipsec__plutorun: 037 attempt to load incomplete
connection
Jun 27 02:30:55 majid-server ipsec__plutorun: 023 address family
inconsistency in this connection=2 host=2/nexthop=0
Jun 27 02:30:55 majid-server ipsec__plutorun: 037 attempt to load incomplete
connection
Jun 27 02:30:55 majid-server ipsec__plutorun: 003 NAT-Traversal: Trying new
style NAT-T
+ _________________________ plog
+
+ sed -n 63203,$p /var/log/auth.log
+ egrep -i pluto
+ cat
Jun 27 02:30:55 majid-server ipsec__plutorun: Starting Pluto subsystem...
Jun 27 02:30:55 majid-server pluto[4106]: Starting Pluto (Openswan Version
2.6.27; Vendor ID OEnTNwILvV~\134) pid:4106
Jun 27 02:30:55 majid-server pluto[4106]: Setting NAT-Traversal port-4500
floating to on
Jun 27 02:30:55 majid-server pluto[4106]:    port floating activation
criteria nat_t=1/port_float=1
Jun 27 02:30:55 majid-server pluto[4106]:    NAT-Traversal support
 [enabled]
Jun 27 02:30:55 majid-server pluto[4106]: | opening /dev/urandom
Jun 27 02:30:55 majid-server pluto[4106]: using /dev/urandom as source of
random entropy
Jun 27 02:30:55 majid-server pluto[4106]: | inserting event
EVENT_REINIT_SECRET, timeout in 3600 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:30:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:30:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_enc(): Activating
OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_enc(): Activating
OAKLEY_TWOFISH_CBC: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_enc(): Activating
OAKLEY_SERPENT_CBC: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_enc(): Activating
OAKLEY_AES_CBC: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_enc(): Activating
OAKLEY_BLOWFISH_CBC: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_hash():
Activating OAKLEY_SHA2_512: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: ike_alg_register_hash():
Activating OAKLEY_SHA2_256: Ok (ret=0)
Jun 27 02:30:55 majid-server pluto[4106]: starting up 3 cryptographic
helpers
Jun 27 02:30:55 majid-server pluto[4106]: started helper pid=4108 (fd:7)
Jun 27 02:30:55 majid-server pluto[4106]: started helper pid=4109 (fd:8)
Jun 27 02:30:55 majid-server pluto[4108]: | opening /dev/urandom
Jun 27 02:30:55 majid-server pluto[4106]: started helper pid=4110 (fd:9)
Jun 27 02:30:55 majid-server pluto[4106]: Using KLIPSng (mast) IPsec
interface code on 2.6.32
Jun 27 02:30:55 majid-server pluto[4106]: | process 4106 listening for
PF_KEY_V2 on file descriptor 10
Jun 27 02:30:55 majid-server pluto[4106]: | finish_pfkey_msg:
K_SADB_REGISTER message 1 for AH
Jun 27 02:30:55 majid-server pluto[4108]: using /dev/urandom as source of
random entropy
Jun 27 02:30:55 majid-server pluto[4109]: | opening /dev/urandom
Jun 27 02:30:55 majid-server pluto[4106]: |   02 07 00 02  02 00 00 00  01
00 00 00  0a 10 00 00
Jun 27 02:30:55 majid-server pluto[4106]: | pfkey_get: K_SADB_REGISTER
message 1
Jun 27 02:30:55 majid-server pluto[4106]: | AH registered with kernel.
Jun 27 02:30:55 majid-server pluto[4106]: | finish_pfkey_msg:
K_SADB_REGISTER message 2 for ESP
Jun 27 02:30:55 majid-server pluto[4106]: |   02 07 00 03  02 00 00 00  02
00 00 00  0a 10 00 00
Jun 27 02:30:55 majid-server pluto[4106]: | pfkey_get: K_SADB_REGISTER
message 2
Jun 27 02:30:55 majid-server pluto[4106]: | alg_init():memset(0x72bd80, 0,
2016) memset(0x72c560, 0, 2048)
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: sadb_msg_len=9 sadb_supported_len=24
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_add():satype=3,
exttype=14, alg_id=3
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=3, alg_ivlen=0,
alg_minbits=160, alg_maxbits=160, res=0, ret=1
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_add():satype=3,
exttype=14, alg_id=2
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0,
alg_minbits=128, alg_maxbits=128, res=0, ret=1
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: sadb_msg_len=9 sadb_supported_len=32
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_add():satype=3,
exttype=15, alg_id=3
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[2], exttype=15, satype=3, alg_id=3, alg_ivlen=64,
alg_minbits=192, alg_maxbits=192, res=0, ret=1
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_add():satype=3,
exttype=15, alg_id=12
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[3], exttype=15, satype=3, alg_id=12, alg_ivlen=128,
alg_minbits=128, alg_maxbits=256, res=0, ret=1
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_add():satype=3,
exttype=15, alg_id=3
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_add(): discarding
already setup satype=3, exttype=15, alg_id=3
Jun 27 02:30:55 majid-server pluto[4106]: | kernel_alg_register_pfkey():
SADB_SATYPE_ESP: alg[4], exttype=15, satype=3, alg_id=3, alg_ivlen=64,
alg_minbits=168, alg_maxbits=168, res=0, ret=0
Jun 27 02:30:55 majid-server pluto[4106]: | ESP registered with kernel.
Jun 27 02:30:55 majid-server pluto[4106]: | finish_pfkey_msg:
K_SADB_REGISTER message 3 for IPCOMP
Jun 27 02:30:55 majid-server pluto[4106]: |   02 07 00 0a  02 00 00 00  03
00 00 00  0a 10 00 00
Jun 27 02:30:55 majid-server pluto[4106]: | pfkey_get: K_SADB_REGISTER
message 3
Jun 27 02:30:55 majid-server pluto[4106]: | IPCOMP registered with kernel.
Jun 27 02:30:55 majid-server pluto[4106]: | finish_pfkey_msg:
K_SADB_REGISTER message 4 for IPIP
Jun 27 02:30:55 majid-server pluto[4106]: |   02 07 00 09  02 00 00 00  04
00 00 00  0a 10 00 00
Jun 27 02:30:55 majid-server pluto[4106]: | pfkey_get: K_SADB_REGISTER
message 4
Jun 27 02:30:55 majid-server pluto[4106]: | IPIP registered with kernel.
Jun 27 02:30:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:30:55 majid-server pluto[4109]: using /dev/urandom as source of
random entropy
Jun 27 02:30:55 majid-server pluto[4106]: Changed path to directory
'/etc/ipsec.d/cacerts'
Jun 27 02:30:55 majid-server pluto[4106]: Changed path to directory
'/etc/ipsec.d/aacerts'
Jun 27 02:30:55 majid-server pluto[4106]: Changed path to directory
'/etc/ipsec.d/ocspcerts'
Jun 27 02:30:55 majid-server pluto[4106]: Changing to directory
'/etc/ipsec.d/crls'
Jun 27 02:30:55 majid-server pluto[4106]:   Warning: empty directory
Jun 27 02:30:55 majid-server pluto[4106]: | inserting event EVENT_LOG_DAILY,
timeout in 77345 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | event added after event
EVENT_REINIT_SECRET
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4109]: ! helper 1 waiting on fd: 9
Jun 27 02:30:55 majid-server pluto[4110]: | opening /dev/urandom
Jun 27 02:30:55 majid-server pluto[4108]: ! helper 0 waiting on fd: 8
Jun 27 02:30:55 majid-server pluto[4110]: using /dev/urandom as source of
random entropy
Jun 27 02:30:55 majid-server pluto[4110]: ! helper 2 waiting on fd: 10
Jun 27 02:30:55 majid-server pluto[4106]: |
Jun 27 02:30:55 majid-server pluto[4106]: | *received whack message
Jun 27 02:30:55 majid-server pluto[4106]: address family inconsistency in
this connection=2 host=2/nexthop=0
Jun 27 02:30:55 majid-server pluto[4106]: attempt to load incomplete
connection
Jun 27 02:30:55 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: |
Jun 27 02:30:55 majid-server pluto[4106]: | *received whack message
Jun 27 02:30:55 majid-server pluto[4106]: address family inconsistency in
this connection=2 host=2/nexthop=0
Jun 27 02:30:55 majid-server pluto[4106]: attempt to load incomplete
connection
Jun 27 02:30:55 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: |
Jun 27 02:30:55 majid-server pluto[4106]: | *received whack message
Jun 27 02:30:55 majid-server pluto[4106]: address family inconsistency in
this connection=2 host=2/nexthop=0
Jun 27 02:30:55 majid-server pluto[4106]: attempt to load incomplete
connection
Jun 27 02:30:55 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: |
Jun 27 02:30:55 majid-server pluto[4106]: | *received whack message
Jun 27 02:30:55 majid-server pluto[4106]: listening for IKE messages
Jun 27 02:30:55 majid-server pluto[4106]: | found lo with address 127.0.0.1
Jun 27 02:30:55 majid-server pluto[4106]: | found eth0 with address
10.0.0.105
Jun 27 02:30:55 majid-server pluto[4106]: | found mast0 with address
10.0.0.105
Jun 27 02:30:55 majid-server pluto[4106]: found mast0 device already present
Jun 27 02:30:55 majid-server pluto[4106]: device mast0 already in use
Jun 27 02:30:55 majid-server pluto[4106]: | useful mast device 0
Jun 27 02:30:55 majid-server pluto[4106]: NAT-Traversal: Trying new style
NAT-T
Jun 27 02:30:55 majid-server pluto[4106]: adding interface mast0/eth0
10.0.0.105:500 (fd=14)
Jun 27 02:30:55 majid-server pluto[4106]: adding interface mast0/eth0
10.0.0.105:4500 (fd=15)
Jun 27 02:30:55 majid-server pluto[4106]: | found lo with address
0000:0000:0000:0000:0000:0000:0000:0001
Jun 27 02:30:55 majid-server pluto[4106]: | useful mast device 0
Jun 27 02:30:55 majid-server pluto[4106]: | useful mast device 0
Jun 27 02:30:55 majid-server pluto[4106]: loading secrets from
"/etc/ipsec.secrets"
Jun 27 02:30:55 majid-server pluto[4106]: | id type added to
secret(0xecbdc0) 1: 10.0.0.105
Jun 27 02:30:55 majid-server pluto[4106]: | id type added to
secret(0xecbdc0) 1: %any
Jun 27 02:30:55 majid-server pluto[4106]: | Processing PSK at line 11:
passed
Jun 27 02:30:55 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:30:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:31:02 majid-server pluto[4106]: |
Jun 27 02:31:02 majid-server pluto[4106]: | *received whack message
Jun 27 02:31:02 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:31:02 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
53 seconds
Jun 27 02:31:02 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
53 seconds
Jun 27 02:31:11 majid-server pluto[4106]: |
Jun 27 02:31:11 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:31:11 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab  00
00 00 00  00 00 00 00
Jun 27 02:31:11 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:31:11 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:31:11 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:31:11 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:31:11 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:31:11 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:31:11 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:31:11 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:31:11 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:31:11 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:31:11 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:31:11 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:31:11 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:31:11 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:31:11 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:31:11 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:31:11 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:31:11 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:31:11 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:31:11 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:31:11 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab
Jun 27 02:31:11 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:31:11 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:31:11 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:31:11 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:31:11 majid-server pluto[4106]: |    flags: none
Jun 27 02:31:11 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 300
Jun 27 02:31:11 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:31:11 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 52
Jun 27 02:31:11 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:31:11 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:31:11 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:31:11 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:31:11 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:11 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:31:11 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:31:11 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 40
Jun 27 02:31:11 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:31:11 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:31:11 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:31:11 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:31:11 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:31:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:11 majid-server pluto[4106]: |    length: 32
Jun 27 02:31:11 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:31:11 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:31:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:11 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:31:11 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:11 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:31:11 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:31:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:11 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:31:11 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:31:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:11 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:31:11 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:11 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:31:11 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:11 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:31:11 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:11 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:31:11 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:31:11 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:31:11 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:11 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:31:11 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:31:11 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:31:11 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
44 seconds
Jun 27 02:31:11 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
44 seconds
Jun 27 02:31:14 majid-server pluto[4106]: |
Jun 27 02:31:14 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:31:14 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab  00
00 00 00  00 00 00 00
Jun 27 02:31:14 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:31:14 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:31:14 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:31:14 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:31:14 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:31:14 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:31:14 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:31:14 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:31:14 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:31:14 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:31:14 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:31:14 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:31:14 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:31:14 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:31:14 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:31:14 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:31:14 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:31:14 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:31:14 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:31:14 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:31:14 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab
Jun 27 02:31:14 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:31:14 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:31:14 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:31:14 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:31:14 majid-server pluto[4106]: |    flags: none
Jun 27 02:31:14 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 300
Jun 27 02:31:14 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:31:14 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 52
Jun 27 02:31:14 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:14 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:31:14 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:31:14 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:31:14 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:31:14 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:14 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:31:14 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:31:14 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 40
Jun 27 02:31:14 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:31:14 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:31:14 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:31:14 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:31:14 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:31:14 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:14 majid-server pluto[4106]: |    length: 32
Jun 27 02:31:14 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:31:14 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:31:14 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:14 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:31:14 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:14 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:14 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:31:14 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:31:14 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:14 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:31:14 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:31:14 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:14 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:31:14 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:14 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:14 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:31:14 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:14 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:14 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:31:14 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:14 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:31:14 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:31:14 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:31:14 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:14 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:31:14 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:31:14 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:31:14 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
41 seconds
Jun 27 02:31:14 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
41 seconds
Jun 27 02:31:17 majid-server pluto[4106]: |
Jun 27 02:31:17 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:31:17 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab  00
00 00 00  00 00 00 00
Jun 27 02:31:17 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:31:17 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:31:17 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:31:17 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:31:17 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:31:17 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:31:17 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:31:17 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:31:17 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:31:17 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:31:17 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:31:17 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:31:17 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:31:17 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:31:17 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:31:17 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:31:17 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:31:17 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:31:17 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:31:17 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:31:17 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab
Jun 27 02:31:17 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:31:17 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:31:17 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:31:17 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:31:17 majid-server pluto[4106]: |    flags: none
Jun 27 02:31:17 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 300
Jun 27 02:31:17 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:31:17 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 52
Jun 27 02:31:17 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:17 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:31:17 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:31:17 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:31:17 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:31:17 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:17 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:31:17 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:31:17 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 40
Jun 27 02:31:17 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:31:17 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:31:17 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:31:17 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:31:17 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:31:17 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:17 majid-server pluto[4106]: |    length: 32
Jun 27 02:31:17 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:31:17 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:31:17 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:17 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:31:17 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:17 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:17 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:31:17 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:31:17 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:17 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:31:17 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:31:17 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:17 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:31:17 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:17 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:17 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:31:17 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:17 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:17 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:31:17 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:17 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:31:17 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:31:17 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:31:17 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:17 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:31:17 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:31:17 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:31:17 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
38 seconds
Jun 27 02:31:17 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
38 seconds
Jun 27 02:31:20 majid-server pluto[4106]: |
Jun 27 02:31:20 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:31:20 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab  00
00 00 00  00 00 00 00
Jun 27 02:31:20 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:31:20 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:31:20 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:31:20 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:31:20 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:31:20 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:31:20 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:31:20 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:31:20 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:31:20 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:31:20 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:31:20 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:31:20 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:31:20 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:31:20 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:31:20 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:31:20 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:31:20 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:31:20 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:31:20 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:31:20 majid-server pluto[4106]: |   47 6b 79 8e  73 45 a0 ab
Jun 27 02:31:20 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:31:20 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:31:20 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:31:20 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:31:20 majid-server pluto[4106]: |    flags: none
Jun 27 02:31:20 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 300
Jun 27 02:31:20 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:31:20 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 52
Jun 27 02:31:20 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:31:20 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 20
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:31:20 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:31:20 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:31:20 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:31:20 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:20 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:31:20 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:31:20 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 40
Jun 27 02:31:20 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:31:20 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:31:20 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:31:20 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:31:20 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:31:20 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:31:20 majid-server pluto[4106]: |    length: 32
Jun 27 02:31:20 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:31:20 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:31:20 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:20 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:31:20 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:20 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:20 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:31:20 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:31:20 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:20 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:31:20 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:31:20 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:20 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:31:20 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:31:20 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:20 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:31:20 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:20 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:31:20 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:31:20 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:31:20 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:31:20 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:31:20 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:31:20 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:31:20 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:31:20 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:31:20 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:31:20 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
35 seconds
Jun 27 02:31:20 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
35 seconds
Jun 27 02:31:55 majid-server pluto[4106]: |
Jun 27 02:31:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:31:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:31:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:31:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 60 seconds
Jun 27 02:31:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:31:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:31:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:32:55 majid-server pluto[4106]: |
Jun 27 02:32:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:32:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:32:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_PHASE2
Jun 27 02:32:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:32:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:32:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:32:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:32:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:32:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:32:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:33:55 majid-server pluto[4106]: |
Jun 27 02:33:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:33:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:33:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:33:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 60 seconds
Jun 27 02:33:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:33:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:33:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:34:55 majid-server pluto[4106]: |
Jun 27 02:34:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:34:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:34:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | event added after event
EVENT_SHUNT_SCAN
Jun 27 02:34:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:34:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:34:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:34:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:34:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:34:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:34:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:35:55 majid-server pluto[4106]: |
Jun 27 02:35:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:35:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:35:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:35:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 60 seconds
Jun 27 02:35:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:35:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:35:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:36:00 majid-server pluto[4106]: |
Jun 27 02:36:00 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:00 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b  00
00 00 00  00 00 00 00
Jun 27 02:36:00 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:00 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:00 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:00 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:00 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:00 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:00 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:00 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:00 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:00 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:00 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:00 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:00 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:00 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:00 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:00 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:00 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:00 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:00 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:00 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:00 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b
Jun 27 02:36:00 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:00 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:00 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:00 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:00 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:00 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:00 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:00 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:00 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:00 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:00 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:00 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:00 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:00 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:00 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:00 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:00 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:00 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:00 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:00 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:00 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:00 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:00 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:00 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:00 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:00 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:00 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:00 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:00 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:00 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:00 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:00 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:00 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:00 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:00 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:00 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:00 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:00 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:00 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:00 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:00 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:00 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:00 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:00 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:00 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:00 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:00 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:00 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:00 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:00 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:00 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:00 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
55 seconds
Jun 27 02:36:00 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
55 seconds
Jun 27 02:36:03 majid-server pluto[4106]: |
Jun 27 02:36:03 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:03 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b  00
00 00 00  00 00 00 00
Jun 27 02:36:03 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:03 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:03 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:03 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:03 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:03 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:03 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:03 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:03 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:03 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:03 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:03 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:03 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:03 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:03 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:03 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:03 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:03 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:03 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:03 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:03 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b
Jun 27 02:36:03 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:03 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:03 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:03 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:03 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:03 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:03 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:03 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:03 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:03 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:03 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:03 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:03 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:03 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:03 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:03 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:03 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:03 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:03 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:03 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:03 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:03 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:03 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:03 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:03 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:03 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:03 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:03 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:03 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:03 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:03 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:03 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:03 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:03 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:03 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:03 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:03 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:03 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:03 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:03 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:03 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:03 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:03 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:03 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:03 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:03 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:03 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:03 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:03 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:03 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:03 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:03 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
52 seconds
Jun 27 02:36:03 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
52 seconds
Jun 27 02:36:06 majid-server pluto[4106]: |
Jun 27 02:36:06 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:06 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b  00
00 00 00  00 00 00 00
Jun 27 02:36:06 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:06 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:06 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:06 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:06 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:06 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:06 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:06 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:06 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:06 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:06 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:06 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:06 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:06 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:06 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:06 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:06 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:06 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:06 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:06 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:06 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b
Jun 27 02:36:06 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:06 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:06 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:06 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:06 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:06 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:06 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:06 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:06 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:06 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:06 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:06 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:06 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:06 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:06 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:06 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:06 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:06 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:06 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:06 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:06 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:06 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:06 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:06 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:06 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:06 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:06 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:06 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:06 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:06 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:06 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:06 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:06 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:06 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:06 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:06 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:06 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:06 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:06 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:06 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:06 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:06 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:06 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:06 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:06 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:06 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:06 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:06 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:06 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:06 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:06 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:06 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
49 seconds
Jun 27 02:36:06 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
49 seconds
Jun 27 02:36:09 majid-server pluto[4106]: |
Jun 27 02:36:09 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:09 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b  00
00 00 00  00 00 00 00
Jun 27 02:36:09 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:09 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:09 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:09 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:09 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:09 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:09 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:09 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:09 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:09 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:09 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:09 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:09 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:09 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:09 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:09 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:09 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:09 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:09 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:09 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:09 majid-server pluto[4106]: |   0d 86 1b 56  85 26 04 5b
Jun 27 02:36:09 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:09 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:09 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:09 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:09 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:09 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:09 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:09 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:09 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:09 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:09 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:09 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:09 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:09 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:09 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:09 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:09 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:09 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:09 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:09 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:09 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:09 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:09 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:09 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:09 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:09 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:09 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:09 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:09 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:09 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:09 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:09 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:09 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:09 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:09 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:09 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:09 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:09 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:09 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:09 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:09 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:09 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:09 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:09 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:09 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:09 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:09 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:09 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:09 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:09 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:09 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:09 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
46 seconds
Jun 27 02:36:09 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
46 seconds
Jun 27 02:36:18 majid-server pluto[4106]: |
Jun 27 02:36:18 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:18 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59  00
00 00 00  00 00 00 00
Jun 27 02:36:18 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:18 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:18 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:18 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:18 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:18 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:18 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:18 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:18 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:18 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:18 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:18 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:18 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:18 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:18 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:18 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:18 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:18 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:18 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:18 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:18 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59
Jun 27 02:36:18 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:18 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:18 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:18 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:18 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:18 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:18 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:18 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:18 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:18 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:18 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:18 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:18 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:18 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:18 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:18 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:18 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:18 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:18 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:18 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:18 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:18 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:18 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:18 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:18 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:18 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:18 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:18 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:18 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:18 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:18 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:18 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:18 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:18 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:18 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:18 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:18 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:18 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:18 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:18 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:18 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:18 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:18 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:18 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
37 seconds
Jun 27 02:36:18 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
37 seconds
Jun 27 02:36:21 majid-server pluto[4106]: |
Jun 27 02:36:21 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:21 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59  00
00 00 00  00 00 00 00
Jun 27 02:36:21 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:21 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:21 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:21 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:21 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:21 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:21 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:21 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:21 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:21 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:21 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:21 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:21 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:21 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:21 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:21 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:21 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:21 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:21 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:21 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:21 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59
Jun 27 02:36:21 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:21 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:21 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:21 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:21 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:21 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:21 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:21 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:21 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:21 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:21 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:21 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:21 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:21 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:21 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:21 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:21 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:21 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:21 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:21 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:21 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:21 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:21 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:21 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:21 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:21 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:21 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:21 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:21 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:21 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:21 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:21 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:21 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:21 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:21 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:21 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:21 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:21 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:21 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:21 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:21 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:21 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:21 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:21 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
34 seconds
Jun 27 02:36:21 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
34 seconds
Jun 27 02:36:24 majid-server pluto[4106]: |
Jun 27 02:36:24 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:24 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59  00
00 00 00  00 00 00 00
Jun 27 02:36:24 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:24 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:24 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:24 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:24 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:24 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:24 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:24 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:24 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:24 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:24 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:24 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:24 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:24 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:24 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:24 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:24 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:24 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:24 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:24 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:24 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59
Jun 27 02:36:24 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:24 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:24 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:24 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:24 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:24 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:24 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:24 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:24 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:24 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:24 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:24 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:24 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:24 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:24 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:24 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:24 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:24 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:24 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:24 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:24 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:24 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:24 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:24 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:24 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:24 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:24 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:24 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:24 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:24 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:24 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:24 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:24 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:24 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:24 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:24 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:24 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:24 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:24 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:24 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:24 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:24 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:24 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:24 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
31 seconds
Jun 27 02:36:24 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
31 seconds
Jun 27 02:36:27 majid-server pluto[4106]: |
Jun 27 02:36:27 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:36:27 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59  00
00 00 00  00 00 00 00
Jun 27 02:36:27 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:36:27 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:36:27 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:36:27 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:36:27 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:36:27 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:36:27 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:36:27 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:36:27 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:36:27 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:36:27 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:36:27 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:36:27 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:36:27 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:36:27 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:36:27 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:36:27 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:36:27 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:36:27 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:36:27 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:36:27 majid-server pluto[4106]: |   d7 74 4a 04  a7 cb 97 59
Jun 27 02:36:27 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:36:27 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:36:27 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:36:27 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:36:27 majid-server pluto[4106]: |    flags: none
Jun 27 02:36:27 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 300
Jun 27 02:36:27 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:36:27 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 52
Jun 27 02:36:27 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:36:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:36:27 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:36:27 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:36:27 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:36:27 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:27 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:36:27 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:36:27 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 40
Jun 27 02:36:27 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:36:27 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:36:27 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:36:27 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:36:27 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:36:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:36:27 majid-server pluto[4106]: |    length: 32
Jun 27 02:36:27 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:36:27 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:36:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:27 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:36:27 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:27 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:36:27 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:36:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:27 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:36:27 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:36:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:27 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:36:27 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:36:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:27 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:36:27 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:36:27 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:36:27 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:36:27 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:36:27 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:36:27 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:36:27 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:36:27 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:36:27 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:36:27 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:36:27 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
28 seconds
Jun 27 02:36:27 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
28 seconds
Jun 27 02:36:55 majid-server pluto[4106]: |
Jun 27 02:36:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:36:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:36:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_PHASE2
Jun 27 02:36:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:36:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:36:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:36:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:36:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:36:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:36:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:37:55 majid-server pluto[4106]: |
Jun 27 02:37:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:37:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:37:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:37:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 60 seconds
Jun 27 02:37:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:37:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:37:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:38:55 majid-server pluto[4106]: |
Jun 27 02:38:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:38:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:38:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | event added after event
EVENT_SHUNT_SCAN
Jun 27 02:38:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:38:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:38:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:38:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:38:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:38:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:38:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:39:55 majid-server pluto[4106]: |
Jun 27 02:39:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:39:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:39:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:39:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 60 seconds
Jun 27 02:39:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:39:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:39:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:40:55 majid-server pluto[4106]: |
Jun 27 02:40:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:40:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:40:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_PHASE2
Jun 27 02:40:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:40:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:40:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:40:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:40:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:40:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:40:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:41:55 majid-server pluto[4106]: |
Jun 27 02:41:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:41:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:41:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:41:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 60 seconds
Jun 27 02:41:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:41:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:41:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:42:55 majid-server pluto[4106]: |
Jun 27 02:42:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:42:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:42:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | event added after event
EVENT_SHUNT_SCAN
Jun 27 02:42:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:42:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:42:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:42:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:42:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:42:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:42:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:43:55 majid-server pluto[4106]: |
Jun 27 02:43:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:43:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:43:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:43:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 60 seconds
Jun 27 02:43:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:43:55 majid-server pluto[4106]: | event added at head of queue
Jun 27 02:43:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:44:55 majid-server pluto[4106]: |
Jun 27 02:44:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
0 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | *time to handle event
Jun 27 02:44:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_DDNS
Jun 27 02:44:55 majid-server pluto[4106]: | event after this is
EVENT_SHUNT_SCAN in 0 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_DDNS, timeout in 60 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_PHASE2
Jun 27 02:44:55 majid-server pluto[4106]: | handling event EVENT_SHUNT_SCAN
Jun 27 02:44:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_PHASE2 in 0 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | inserting event
EVENT_SHUNT_SCAN, timeout in 120 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:44:55 majid-server pluto[4106]: | scanning for shunt eroutes
Jun 27 02:44:55 majid-server pluto[4106]: | handling event
EVENT_PENDING_PHASE2
Jun 27 02:44:55 majid-server pluto[4106]: | event after this is
EVENT_PENDING_DDNS in 60 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Jun 27 02:44:55 majid-server pluto[4106]: | event added after event
EVENT_PENDING_DDNS
Jun 27 02:44:55 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
60 seconds
Jun 27 02:45:02 majid-server pluto[4106]: |
Jun 27 02:45:02 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:02 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53  00
00 00 00  00 00 00 00
Jun 27 02:45:02 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:02 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:02 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:02 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:02 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:02 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:02 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:02 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:02 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:02 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:02 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:02 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:02 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:02 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:02 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:02 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:02 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:02 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:02 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:02 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:02 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53
Jun 27 02:45:02 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:02 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:02 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:02 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:02 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:02 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:02 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:02 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:02 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:02 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:02 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:02 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:02 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:02 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:02 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:02 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:02 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:02 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:02 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:02 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:02 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:02 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:02 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:02 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:02 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:02 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:02 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:02 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:02 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:02 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:02 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:02 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:02 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:02 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:02 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:02 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:02 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:02 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:02 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:02 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:02 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:02 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:02 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:02 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:02 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:02 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:02 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:02 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:02 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:02 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:02 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:02 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
53 seconds
Jun 27 02:45:02 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
53 seconds
Jun 27 02:45:05 majid-server pluto[4106]: |
Jun 27 02:45:05 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:05 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53  00
00 00 00  00 00 00 00
Jun 27 02:45:05 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:05 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:05 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:05 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:05 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:05 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:05 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:05 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:05 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:05 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:05 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:05 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:05 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:05 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:05 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:05 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:05 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:05 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:05 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:05 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:05 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53
Jun 27 02:45:05 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:05 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:05 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:05 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:05 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:05 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:05 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:05 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:05 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:05 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:05 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:05 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:05 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:05 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:05 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:05 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:05 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:05 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:05 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:05 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:05 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:05 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:05 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:05 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:05 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:05 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:05 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:05 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:05 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:05 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:05 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:05 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:05 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:05 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:05 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:05 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:05 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:05 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:05 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:05 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:05 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:05 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:05 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:05 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:05 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:05 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:05 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:05 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:05 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:05 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:05 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:05 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
50 seconds
Jun 27 02:45:05 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
50 seconds
Jun 27 02:45:08 majid-server pluto[4106]: |
Jun 27 02:45:08 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:08 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53  00
00 00 00  00 00 00 00
Jun 27 02:45:08 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:08 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:08 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:08 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:08 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:08 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:08 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:08 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:08 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:08 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:08 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:08 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:08 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:08 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:08 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:08 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:08 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:08 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:08 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:08 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:08 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53
Jun 27 02:45:08 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:08 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:08 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:08 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:08 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:08 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:08 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:08 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:08 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:08 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:08 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:08 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:08 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:08 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:08 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:08 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:08 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:08 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:08 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:08 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:08 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:08 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:08 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:08 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:08 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:08 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:08 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:08 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:08 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:08 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:08 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:08 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:08 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:08 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:08 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:08 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:08 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:08 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:08 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:08 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:08 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:08 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:08 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:08 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:08 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:08 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:08 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:08 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:08 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:08 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:08 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:08 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
47 seconds
Jun 27 02:45:08 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
47 seconds
Jun 27 02:45:11 majid-server pluto[4106]: |
Jun 27 02:45:11 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:11 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53  00
00 00 00  00 00 00 00
Jun 27 02:45:11 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:11 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:11 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:11 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:11 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:11 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:11 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:11 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:11 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:11 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:11 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:11 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:11 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:11 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:11 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:11 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:11 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:11 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:11 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:11 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:11 majid-server pluto[4106]: |   cd 18 62 6d  80 f1 55 53
Jun 27 02:45:11 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:11 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:11 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:11 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:11 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:11 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:11 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:11 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:11 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:11 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:11 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:11 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:11 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:11 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:11 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:11 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:11 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:11 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:11 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:11 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:11 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:11 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:11 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:11 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:11 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:11 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:11 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:11 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:11 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:11 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:11 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:11 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:11 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:11 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:11 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:11 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:11 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:11 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:11 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:11 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:11 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:11 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:11 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:11 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:11 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:11 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:11 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
44 seconds
Jun 27 02:45:11 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
44 seconds
Jun 27 02:45:18 majid-server pluto[4106]: |
Jun 27 02:45:18 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:18 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f  00
00 00 00  00 00 00 00
Jun 27 02:45:18 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:18 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:18 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:18 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:18 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:18 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:18 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:18 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:18 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:18 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:18 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:18 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:18 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:18 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:18 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:18 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:18 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:18 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:18 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:18 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:18 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f
Jun 27 02:45:18 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:18 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:18 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:18 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:18 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:18 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:18 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:18 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:18 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:18 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:18 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:18 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:18 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:18 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:18 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:18 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:18 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:18 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:18 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:18 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:18 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:18 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:18 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:18 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:18 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:18 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:18 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:18 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:18 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:18 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:18 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:18 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:18 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:18 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:18 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:18 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:18 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:18 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:18 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:18 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:18 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:18 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:18 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:18 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:18 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:18 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:18 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
37 seconds
Jun 27 02:45:18 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
37 seconds
Jun 27 02:45:21 majid-server pluto[4106]: |
Jun 27 02:45:21 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:21 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f  00
00 00 00  00 00 00 00
Jun 27 02:45:21 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:21 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:21 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:21 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:21 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:21 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:21 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:21 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:21 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:21 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:21 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:21 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:21 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:21 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:21 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:21 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:21 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:21 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:21 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:21 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:21 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f
Jun 27 02:45:21 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:21 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:21 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:21 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:21 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:21 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:21 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:21 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:21 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:21 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:21 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:21 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:21 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:21 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:21 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:21 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:21 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:21 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:21 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:21 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:21 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:21 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:21 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:21 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:21 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:21 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:21 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:21 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:21 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:21 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:21 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:21 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:21 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:21 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:21 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:21 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:21 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:21 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:21 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:21 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:21 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:21 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:21 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:21 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:21 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:21 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:21 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
34 seconds
Jun 27 02:45:21 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
34 seconds
Jun 27 02:45:24 majid-server pluto[4106]: |
Jun 27 02:45:24 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:24 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f  00
00 00 00  00 00 00 00
Jun 27 02:45:24 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:24 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:24 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:24 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:24 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:24 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:24 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:24 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:24 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:24 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:24 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:24 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:24 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:24 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:24 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:24 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:24 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:24 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:24 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:24 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:24 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f
Jun 27 02:45:24 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:24 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:24 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:24 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:24 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:24 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:24 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:24 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:24 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:24 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:24 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:24 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:24 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:24 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:24 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:24 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:24 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:24 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:24 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:24 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:24 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:24 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:24 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:24 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:24 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:24 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:24 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:24 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:24 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:24 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:24 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:24 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:24 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:24 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:24 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:24 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:24 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:24 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:24 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:24 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:24 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:24 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:24 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:24 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:24 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:24 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:24 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
31 seconds
Jun 27 02:45:24 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
31 seconds
Jun 27 02:45:27 majid-server pluto[4106]: |
Jun 27 02:45:27 majid-server pluto[4106]: | *received 300 bytes from
10.0.0.1:500 on eth0 (port=500)
Jun 27 02:45:27 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f  00
00 00 00  00 00 00 00
Jun 27 02:45:27 majid-server pluto[4106]: |   01 10 02 00  00 00 00 00  00
00 01 2c  0d 00 00 34
Jun 27 02:45:27 majid-server pluto[4106]: |   00 00 00 01  00 00 00 01  00
00 00 28  01 01 00 01
Jun 27 02:45:27 majid-server pluto[4106]: |   00 00 00 20  01 01 00 00  80
0b 00 01  80 0c 0e 10
Jun 27 02:45:27 majid-server pluto[4106]: |   80 01 00 05  80 03 00 01  80
02 00 02  80 04 00 02
Jun 27 02:45:27 majid-server pluto[4106]: |   0d 00 00 14  4a 13 1c 81  07
03 58 45  5c 57 28 f2
Jun 27 02:45:27 majid-server pluto[4106]: |   0e 95 45 2f  0d 00 00 14  4d
f3 79 28  e9 fc 4f d1
Jun 27 02:45:27 majid-server pluto[4106]: |   b3 26 21 70  d5 15 c6 62  0d
00 00 14  8f 8d 83 82
Jun 27 02:45:27 majid-server pluto[4106]: |   6d 24 6b 6f  c7 a8 a6 a4  28
c1 1d e8  0d 00 00 14
Jun 27 02:45:27 majid-server pluto[4106]: |   43 9b 59 f8  ba 67 6c 4c  77
37 ae 22  ea b8 f5 82
Jun 27 02:45:27 majid-server pluto[4106]: |   0d 00 00 14  4d 1e 0e 13  6d
ea fa 34  c4 f3 ea 9f
Jun 27 02:45:27 majid-server pluto[4106]: |   02 ec 72 85  0d 00 00 14  80
d0 bb 3d  ef 54 56 5e
Jun 27 02:45:27 majid-server pluto[4106]: |   e8 46 45 d4  c8 5c e3 ee  0d
00 00 14  99 09 b6 4e
Jun 27 02:45:27 majid-server pluto[4106]: |   ed 93 7c 65  73 de 52 ac  e9
52 fa 6b  0d 00 00 14
Jun 27 02:45:27 majid-server pluto[4106]: |   7d 94 19 a6  53 10 ca 6f  2c
17 9d 92  15 52 9d 56
Jun 27 02:45:27 majid-server pluto[4106]: |   0d 00 00 14  cd 60 46 43  35
df 21 f8  7c fd b2 fc
Jun 27 02:45:27 majid-server pluto[4106]: |   68 b6 a4 48  0d 00 00 14  90
cb 80 91  3e bb 69 6e
Jun 27 02:45:27 majid-server pluto[4106]: |   08 63 81 b5  ec 42 7b 1f  00
00 00 14  af ca d7 13
Jun 27 02:45:27 majid-server pluto[4106]: |   68 a1 f1 c9  6b 86 96 fc  77
57 01 00
Jun 27 02:45:27 majid-server pluto[4106]: | **parse ISAKMP Message:
Jun 27 02:45:27 majid-server pluto[4106]: |    initiator cookie:
Jun 27 02:45:27 majid-server pluto[4106]: |   ea ff d8 72  0c b2 81 9f
Jun 27 02:45:27 majid-server pluto[4106]: |    responder cookie:
Jun 27 02:45:27 majid-server pluto[4106]: |   00 00 00 00  00 00 00 00
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_SA
Jun 27 02:45:27 majid-server pluto[4106]: |    ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Jun 27 02:45:27 majid-server pluto[4106]: |    exchange type:
ISAKMP_XCHG_IDPROT
Jun 27 02:45:27 majid-server pluto[4106]: |    flags: none
Jun 27 02:45:27 majid-server pluto[4106]: |    message ID:  00 00 00 00
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 300
Jun 27 02:45:27 majid-server pluto[4106]: |  processing version=1.0 packet
with exchange type=ISAKMP_XCHG_IDPROT (2)
Jun 27 02:45:27 majid-server pluto[4106]: | got payload 0x2(ISAKMP_NEXT_SA)
needed: 0x2 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Security
Association Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 52
Jun 27 02:45:27 majid-server pluto[4106]: |    DOI: ISAKMP_DOI_IPSEC
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_VID
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: | got payload
0x2000(ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080
Jun 27 02:45:27 majid-server pluto[4106]: | ***parse ISAKMP Vendor ID
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 20
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [RFC 3947] method set to=109
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: ignoring
unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already
using method 110
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already
using method 110
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already
using method 110
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: received
Vendor ID payload [Dead Peer Detection]
Jun 27 02:45:27 majid-server pluto[4106]: | nat-t detected, sending nat-t
VID
Jun 27 02:45:27 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=10.0.0.1:500 policy=none
Jun 27 02:45:27 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 10.0.0.1:500 -> hp:none
Jun 27 02:45:27 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:27 majid-server pluto[4106]: | ****parse IPsec DOI SIT:
Jun 27 02:45:27 majid-server pluto[4106]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY
Jun 27 02:45:27 majid-server pluto[4106]: | ****parse ISAKMP Proposal
Payload:
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 40
Jun 27 02:45:27 majid-server pluto[4106]: |    proposal number: 1
Jun 27 02:45:27 majid-server pluto[4106]: |    protocol ID: PROTO_ISAKMP
Jun 27 02:45:27 majid-server pluto[4106]: |    SPI size: 0
Jun 27 02:45:27 majid-server pluto[4106]: |    number of transforms: 1
Jun 27 02:45:27 majid-server pluto[4106]: | *****parse ISAKMP Transform
Payload (ISAKMP):
Jun 27 02:45:27 majid-server pluto[4106]: |    next payload type:
ISAKMP_NEXT_NONE
Jun 27 02:45:27 majid-server pluto[4106]: |    length: 32
Jun 27 02:45:27 majid-server pluto[4106]: |    transform number: 1
Jun 27 02:45:27 majid-server pluto[4106]: |    transform ID: KEY_IKE
Jun 27 02:45:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:27 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_TYPE
Jun 27 02:45:27 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:27 majid-server pluto[4106]: |    af+type: OAKLEY_LIFE_DURATION
Jun 27 02:45:27 majid-server pluto[4106]: |    length/value: 3600
Jun 27 02:45:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:27 majid-server pluto[4106]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Jun 27 02:45:27 majid-server pluto[4106]: |    length/value: 5
Jun 27 02:45:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:27 majid-server pluto[4106]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD
Jun 27 02:45:27 majid-server pluto[4106]: |    length/value: 1
Jun 27 02:45:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:27 majid-server pluto[4106]: |    af+type:
OAKLEY_HASH_ALGORITHM
Jun 27 02:45:27 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:27 majid-server pluto[4106]: | ******parse ISAKMP Oakley
attribute:
Jun 27 02:45:27 majid-server pluto[4106]: |    af+type:
OAKLEY_GROUP_DESCRIPTION
Jun 27 02:45:27 majid-server pluto[4106]: |    length/value: 2
Jun 27 02:45:27 majid-server pluto[4106]: | find_host_connection2 called
from main_inI1_outR1, me=10.0.0.105:500 him=%any:500 policy=PSK
Jun 27 02:45:27 majid-server pluto[4106]: | find_host_pair_conn
(find_host_connection2): 10.0.0.105:500 %any:500 -> hp:none
Jun 27 02:45:27 majid-server pluto[4106]: | searching for connection with
policy = PSK
Jun 27 02:45:27 majid-server pluto[4106]: | find_host_connection2 returns
empty
Jun 27 02:45:27 majid-server pluto[4106]: packet from 10.0.0.1:500: initial
Main Mode message received on 10.0.0.105:500 but no connection has been
authorized with policy=PSK
Jun 27 02:45:27 majid-server pluto[4106]: | complete state transition with
STF_IGNORE
Jun 27 02:45:27 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:27 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
28 seconds
Jun 27 02:45:27 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
28 seconds
Jun 27 02:45:36 majid-server pluto[4106]: |
Jun 27 02:45:36 majid-server pluto[4106]: | *received whack message
Jun 27 02:45:36 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:36 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
19 seconds
Jun 27 02:45:36 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
19 seconds
Jun 27 02:45:36 majid-server pluto[4106]: |
Jun 27 02:45:36 majid-server pluto[4106]: | *received whack message
Jun 27 02:45:36 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:36 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
19 seconds
Jun 27 02:45:36 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
19 seconds
Jun 27 02:45:36 majid-server pluto[4106]: |
Jun 27 02:45:36 majid-server pluto[4106]: | *received whack message
Jun 27 02:45:36 majid-server pluto[4106]: | * processed 0 messages from
cryptographic helpers
Jun 27 02:45:36 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
19 seconds
Jun 27 02:45:36 majid-server pluto[4106]: | next event EVENT_PENDING_DDNS in
19 seconds
+ _________________________ date
+
+ date
Sun Jun 27 02:45:36 GST 2010

-- 
Regards,

Majid Khonji
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100627/801de011/attachment-0001.html 


More information about the Users mailing list