[Openswan Users] Checkpoint <->Openswan tunnels stop forwarding
Ben Martel
benm at ingenitech.co.nz
Wed Apr 13 05:00:08 EDT 2011
Hi all,
I have a problem whereby successful tunnels are created between a Linux
host and a Checkpoint Firewall but after a period of time the tunnels
stop forwarding traffic. The offending end appears to the be the remote
Checkpoint device.
We have wound the lifetimes down very low in order to force the problem
to occur more often in the hope of finding what the cause is. Any ideas
anyone?
Below is the output of 'ipsec barf' when the tunnels are no longer
forwarding.
~benm
Wed Apr 13 20:49:47 NZST 2011
+ _________________________ version
+ ipsec --version
Linux Openswan U2.6.21/K2.6.18-194.32.1.el5 (netkey)
See `ipsec --copyright' for copyright information.
+ _________________________ /proc/version
+ cat /proc/version
Linux version 2.6.18-194.32.1.el5 (mockbuild at builder10.centos.org) (gcc
version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Wed Jan 5 17:53:09 EST
2011
+ _________________________ /proc/net/ipsec_eroute
+ test -r /proc/net/ipsec_eroute
+ _________________________ netstat-rn
+ netstat -nr
+ head -n 100
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt
Iface
172.30.1.0 0.0.0.0 255.255.255.0 U 0 0 0
eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0
eth0
0.0.0.0 172.30.1.1 0.0.0.0 UG 0 0 0
eth0
+ _________________________ /proc/net/ipsec_spi
+ test -r /proc/net/ipsec_spi
+ _________________________ /proc/net/ipsec_spigrp
+ test -r /proc/net/ipsec_spigrp
+ _________________________ /proc/net/ipsec_tncfg
+ test -r /proc/net/ipsec_tncfg
+ _________________________ /proc/net/pfkey
+ test -r /proc/net/pfkey
+ cat /proc/net/pfkey
sk RefCnt Rmem Wmem User Inode
+ _________________________ ip-xfrm-state
+ ip xfrm state
+ _________________________ ip-xfrm-policy
+ ip xfrm policy
src 172.30.1.0/24 dst 202.12.0.64/26
dir out priority 2342
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid 0 mode transport
src 172.30.1.0/24 dst 202.12.0.128/26
dir out priority 2342
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid 0 mode transport
src 172.30.1.0/24 dst 202.12.0.192/26
dir out priority 2342
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid 0 mode transport
src ::/0 dst ::/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src ::/0 dst ::/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
+ _________________________ /proc/crypto
+ test -r /proc/crypto
+ cat /proc/crypto
name : deflate
driver : deflate-generic
module : deflate
priority : 0
type : compression
name : tnepres
driver : tnepres-generic
module : serpent
priority : 0
type : cipher
blocksize : 16
min keysize : 0
max keysize : 32
name : serpent
driver : serpent-generic
module : serpent
priority : 0
type : cipher
blocksize : 16
min keysize : 0
max keysize : 32
name : blowfish
driver : blowfish-generic
module : blowfish
priority : 0
type : cipher
blocksize : 8
min keysize : 4
max keysize : 56
name : twofish
driver : twofish-generic
module : twofish
priority : 0
type : cipher
blocksize : 16
min keysize : 16
max keysize : 32
name : md5
driver : md5-generic
module : md5
priority : 0
type : digest
blocksize : 64
digestsize : 16
name : sha256
driver : sha256-generic
module : sha256
priority : 0
type : digest
blocksize : 64
digestsize : 32
name : sha512
driver : sha512-generic
module : sha512
priority : 0
type : digest
blocksize : 128
digestsize : 64
name : sha384
driver : sha384-generic
module : sha512
priority : 0
type : digest
blocksize : 128
digestsize : 48
name : des3_ede
driver : des3_ede-generic
module : des
priority : 0
type : cipher
blocksize : 8
min keysize : 24
max keysize : 24
name : des
driver : des-generic
module : des
priority : 0
type : cipher
blocksize : 8
min keysize : 8
max keysize : 8
name : aes
driver : aes-generic
module : aes_generic
priority : 100
type : cipher
blocksize : 16
min keysize : 16
max keysize : 32
name : aes
driver : aes-i586
module : aes_i586
priority : 200
type : cipher
blocksize : 16
min keysize : 16
max keysize : 32
name : crc32c
driver : crc32c-generic
module : kernel
priority : 0
type : digest
blocksize : 32
digestsize : 4
name : sha1
driver : sha1-generic
module : kernel
priority : 0
type : digest
blocksize : 64
digestsize : 20
+ __________________________/proc/sys/net/core/xfrm-star
/usr/libexec/ipsec/barf: line 191:
__________________________/proc/sys/net/core/xfrm-star: No such file or
directory
+ for i in '/proc/sys/net/core/xfrm_*'
+ echo -n '/proc/sys/net/core/xfrm_acq_expires: '
/proc/sys/net/core/xfrm_acq_expires: + cat
/proc/sys/net/core/xfrm_acq_expires
30
+ for i in '/proc/sys/net/core/xfrm_*'
+ echo -n '/proc/sys/net/core/xfrm_aevent_etime: '
/proc/sys/net/core/xfrm_aevent_etime: + cat
/proc/sys/net/core/xfrm_aevent_etime
10
+ for i in '/proc/sys/net/core/xfrm_*'
+ echo -n '/proc/sys/net/core/xfrm_aevent_rseqth: '
/proc/sys/net/core/xfrm_aevent_rseqth: + cat
/proc/sys/net/core/xfrm_aevent_rseqth
2
+ for i in '/proc/sys/net/core/xfrm_*'
+ echo -n '/proc/sys/net/core/xfrm_larval_drop: '
/proc/sys/net/core/xfrm_larval_drop: + cat
/proc/sys/net/core/xfrm_larval_drop
0
+ _________________________ /proc/sys/net/ipsec-star
+ test -d /proc/sys/net/ipsec
+ _________________________ ipsec/status
+ ipsec auto --status
000 using kernel interface: netkey
000 interface lo/lo ::1
000 interface lo/lo 127.0.0.1
000 interface lo/lo 127.0.0.1
000 interface eth0/eth0 172.30.1.7
000 interface eth0/eth0 172.30.1.7
000 %myid = (none)
000 debug
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+
pfkey+nattraversal+x509
000
000 virtual_private (%priv):
000 - allowed 0 subnets:
000 - disallowed 0 subnets:
000 WARNING: Either virtual_private= was not specified, or there was a
syntax
000 error in that line. 'left/rightsubnet=%priv' will not work!
000
000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64,
keysizemax=64
000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192,
keysizemax=192
000 algorithm ESP encrypt: id=6, name=ESP_CAST, ivlen=8, keysizemin=40,
keysizemax=128
000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8,
keysizemin=40, keysizemax=448
000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0,
keysizemax=0
000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128,
keysizemax=256
000 algorithm ESP encrypt: id=13, name=ESP_AES_CTR, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=14, name=ESP_AES_CCM_A, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=15, name=ESP_AES_CCM_B, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=16, name=ESP_AES_CCM_C, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=18, name=ESP_AES_GCM_A, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=19, name=ESP_AES_GCM_B, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=20, name=ESP_AES_GCM_C, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8,
keysizemin=128, keysizemax=256
000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5,
keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1,
keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256,
keysizemin=256, keysizemax=256
000 algorithm ESP auth attr: id=8, name=AUTH_ALGORITHM_HMAC_RIPEMD,
keysizemin=160, keysizemax=160
000 algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_AES_CBC,
keysizemin=128, keysizemax=128
000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0,
keysizemax=0
000
000 algorithm IKE encrypt: id=0, name=(null), blocksize=16,
keydeflen=131
000 algorithm IKE encrypt: id=3, name=OAKLEY_BLOWFISH_CBC, blocksize=8,
keydeflen=128
000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8,
keydeflen=192
000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16,
keydeflen=128
000 algorithm IKE encrypt: id=65004, name=OAKLEY_SERPENT_CBC,
blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=65005, name=OAKLEY_TWOFISH_CBC,
blocksize=16, keydeflen=128
000 algorithm IKE encrypt: id=65289, name=OAKLEY_TWOFISH_CBC_SSH,
blocksize=16, keydeflen=128
000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
000 algorithm IKE hash: id=4, name=OAKLEY_SHA2_256, hashsize=32
000 algorithm IKE hash: id=6, name=OAKLEY_SHA2_512, hashsize=64
000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
000
000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,6,36}
trans={0,6,1080} attrs={0,6,1440}
000
000 "nzta-subnet128":
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.128/26; prospective erouted;
eroute owner: #0
000 "nzta-subnet128": myip=unset; hisip=unset;
000 "nzta-subnet128": ike_life: 7200s; ipsec_life: 600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "nzta-subnet128": policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 24,26; interface:
eth0;
000 "nzta-subnet128": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "nzta-subnet128": IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1024(2), AES_CBC(7)_128-MD5(1)-MODP1536(5),
AES_CBC(7)_128-MD5(1)-MODP1024(2); flags=-strict
000 "nzta-subnet128": IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-2, AES_CBC(7)_128-MD5(1)_128-5,
AES_CBC(7)_128-MD5(1)_128-2,
000 "nzta-subnet128": ESP algorithms wanted: AES(12)_256-SHA1(2);
flags=-strict
000 "nzta-subnet128": ESP algorithms loaded: AES(12)_256-SHA1(2)_160
000 "nzta-subnet192":
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.192/26; prospective erouted;
eroute owner: #0
000 "nzta-subnet192": myip=unset; hisip=unset;
000 "nzta-subnet192": ike_life: 7200s; ipsec_life: 600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "nzta-subnet192": policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 24,26; interface:
eth0;
000 "nzta-subnet192": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "nzta-subnet192": IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1024(2), AES_CBC(7)_128-MD5(1)-MODP1536(5),
AES_CBC(7)_128-MD5(1)-MODP1024(2); flags=-strict
000 "nzta-subnet192": IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-2, AES_CBC(7)_128-MD5(1)_128-5,
AES_CBC(7)_128-MD5(1)_128-2,
000 "nzta-subnet192": ESP algorithms wanted: AES(12)_256-SHA1(2);
flags=-strict
000 "nzta-subnet192": ESP algorithms loaded: AES(12)_256-SHA1(2)_160
000 "nzta-subnet64":
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.64/26; prospective erouted;
eroute owner: #0
000 "nzta-subnet64": myip=unset; hisip=unset;
000 "nzta-subnet64": ike_life: 7200s; ipsec_life: 600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "nzta-subnet64": policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 24,26; interface:
eth0;
000 "nzta-subnet64": newest ISAKMP SA: #1; newest IPsec SA: #0;
000 "nzta-subnet64": IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1024(2), AES_CBC(7)_128-MD5(1)-MODP1536(5),
AES_CBC(7)_128-MD5(1)-MODP1024(2); flags=-strict
000 "nzta-subnet64": IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-2, AES_CBC(7)_128-MD5(1)_128-5,
AES_CBC(7)_128-MD5(1)_128-2,
000 "nzta-subnet64": IKE algorithm newest: AES_CBC_256-SHA1-MODP1024
000 "nzta-subnet64": ESP algorithms wanted: AES(12)_256-SHA1(2);
flags=-strict
000 "nzta-subnet64": ESP algorithms loaded: AES(12)_256-SHA1(2)_160
000
000 #1: "nzta-subnet64":500 STATE_MAIN_I4 (ISAKMP SA established);
EVENT_SA_REPLACE in 5305s; newest ISAKMP; nodpd; idle; import:admin
initiate
000
+ _________________________ ifconfig-a
+ ifconfig -a
eth0 Link encap:Ethernet HWaddr 00:50:56:81:0E:57
inet addr:172.30.1.7 Bcast:172.30.1.255 Mask:255.255.255.0
inet6 addr: fe80::250:56ff:fe81:e57/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:31350267 errors:326 dropped:0 overruns:0 frame:0
TX packets:5763310 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2686451067 (2.5 GiB) TX bytes:1049706924 (1001.0
MiB)
Interrupt:59 Base address:0x2024
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:16 errors:0 dropped:0 overruns:0 frame:0
TX packets:16 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:3184 (3.1 KiB) TX bytes:3184 (3.1 KiB)
sit0 Link encap:IPv6-in-IPv4
NOARP MTU:1480 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
+ _________________________ ip-addr-list
+ ip addr list
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
qlen 1000
link/ether 00:50:56:81:0e:57 brd ff:ff:ff:ff:ff:ff
inet 172.30.1.7/24 brd 172.30.1.255 scope global eth0
inet6 fe80::250:56ff:fe81:e57/64 scope link
valid_lft forever preferred_lft forever
3: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
+ _________________________ ip-route-list
+ ip route list
172.30.1.0/24 dev eth0 proto kernel scope link src 172.30.1.7
169.254.0.0/16 dev eth0 scope link
default via 172.30.1.1 dev eth0
+ _________________________ ip-rule-list
+ ip rule list
0: from all lookup 255
32766: from all lookup main
32767: from all lookup default
+ _________________________ ipsec_verify
+ ipsec verify --nocolour
Checking your system to see if IPsec got installed and started
correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.6.21/K2.6.18-194.32.1.el5 (netkey)
Checking for IPsec support in kernel [OK]
NETKEY detected, testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Checking for RSA private key (/etc/ipsec.secrets) [OK]
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing [OK]
Checking for 'ip' command [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption DNS checks:
Looking for TXT in forward dns zone: vps-itelematics007.maxnet.net.nz
[MISSING]
Does the machine have at least one non-private address? [FAILED]
+ _________________________ mii-tool
+ '[' -x /sbin/mii-tool ']'
+ /sbin/mii-tool -v
SIOCGMIIPHY on 'eth0' failed: Operation not supported
no MII interfaces found
+ _________________________ ipsec/directory
+ ipsec --directory
/usr/libexec/ipsec
+ _________________________ hostname/fqdn
+ hostname --fqdn
vps-itelematics007.maxnet.net.nz
+ _________________________ hostname/ipaddress
+ hostname --ip-address
127.0.0.1
+ _________________________ uptime
+ uptime
20:49:47 up 55 days, 23:02, 1 user, load average: 0.00, 0.00, 0.00
+ _________________________ ps
+ ps alxwf
+ egrep -i 'ppid|pluto|ipsec|klips'
F UID PID PPID PRI NI VSZ RSS WCHAN STAT TTY TIME
COMMAND
4 0 27505 25917 25 0 4584 1136 - R+ pts/0 0:00
\_ /bin/sh /usr/libexec/ipsec/barf
1 0 26769 1 20 0 2500 416 wait S pts/0 0:00
/bin/sh /usr/libexec/ipsec/_plutorun --debug all raw crypt parsing
emitting control lifecycle klips dns oppo controlmore x509 pfkey
nattraversal --uniqueids yes --force_busy no --nocrsend no
--strictcrlpolicy no --nat_traversal yes --keep_alive --protostack
netkey --force_keepalive no --disable_port_floating no --virtual_private
--crlcheckinterval 0 --ocspuri --nhelpers 0 --dump --opts --stderrlog
--wait no --pre --post --log daemon.error --plutorestartoncrash true
--pid /var/run/pluto/pluto.pid
1 0 26770 26769 20 0 2500 564 wait S pts/0 0:00 \_
/bin/sh /usr/libexec/ipsec/_plutorun --debug all raw crypt parsing
emitting control lifecycle klips dns oppo controlmore x509 pfkey
nattraversal --uniqueids yes --force_busy no --nocrsend no
--strictcrlpolicy no --nat_traversal yes --keep_alive --protostack
netkey --force_keepalive no --disable_port_floating no --virtual_private
--crlcheckinterval 0 --ocspuri --nhelpers 0 --dump --opts --stderrlog
--wait no --pre --post --log daemon.error --plutorestartoncrash true
--pid /var/run/pluto/pluto.pid
4 0 26771 26770 15 0 5844 3184 - S pts/0 0:00 |
\_ /usr/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets
--ipsecdir /etc/ipsec.d --debug-all --debug-raw --debug-crypt
--debug-parsing --debug-emitting --debug-control --debug-lifecycle
--debug-klips --debug-dns --debug-oppo --debug-controlmore --debug-x509
--debug-pfkey --debug-nattraversal --use-netkey --uniqueids
--nat_traversal --nhelpers 0
0 0 26791 26771 25 0 1688 292 - S pts/0 0:00 |
\_ _pluto_adns -d
4 0 26772 26769 25 0 2500 952 pipe_w S pts/0 0:00 \_
/bin/sh /usr/libexec/ipsec/_plutoload --wait no --post
4 0 26773 1 21 0 1744 500 pipe_w S pts/0 0:00
logger -s -p daemon.error -t ipsec__plutorun
+ _________________________ ipsec/showdefaults
+ ipsec showdefaults
routephys=eth0
routevirt=none
routeaddr=172.30.1.7
routenexthop=172.30.1.1
+ _________________________ ipsec/conf
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor
#< /etc/ipsec.conf 1
# /etc/ipsec.conf - Openswan IPsec configuration file
#
# Manual: ipsec.conf.5
#
# Please place your own config files in /etc/ipsec.d/ ending in .conf
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# Debug-logging controls: "none" for (almost) none, "all" for
lots.
klipsdebug=all
#plutodebug="control parsing"
#plutodebug="none"
plutodebug="all"
# For Red Hat Enterprise Linux and Fedora, leave
protostack=netkey
protostack=netkey
nat_traversal=yes
#virtual_private=
oe=off
# Enable this if you see "failed to find any available worker"
nhelpers=0
#You may put your configuration (.conf) file in the "/etc/ipsec.d/" and
uncomment this.
#< /etc/ipsec.d/nzta.conf 1
#
# NZTA tunnel for use to access web services to talk
# to LandData
#
#
conn nzta-subnet64
type = tunnel
authby = secret
# NAT'd outside address is 202.89.35.19
#left = 202.89.35.19 202.89.35.19
left = 172.30.1.7
leftid = 202.89.35.19
leftnexthop = %defaultroute
leftsubnet = 172.30.1.0/24
right = 202.12.0.29
rightsubnet = 202.12.0.64/26
#rightid = 202.12.0.29
esp = aes256-sha1
ike = aes256-sha1-modp1024,aes128-md5
keyexchange = ike
ikelifetime = 120m
keylife = 10m
auto = start
pfs = no
conn nzta-subnet128
type = tunnel
authby = secret
# NAT'd outside address is 202.89.35.19
#left = 202.89.35.19 202.89.35.19
left = 172.30.1.7
leftid = 202.89.35.19
leftnexthop = %defaultroute
leftsubnet = 172.30.1.0/24
right = 202.12.0.29
rightsubnet = 202.12.0.128/26
#rightid = 202.12.0.29
esp = aes256-sha1
ike = aes256-sha1-modp1024,aes128-md5
keyexchange = ike
ikelifetime = 120m
keylife = 10m
auto = start
pfs = no
conn nzta-subnet192
type = tunnel
authby = secret
# NAT'd outside address is 202.89.35.19
#left = 202.89.35.19 202.89.35.19
left = 172.30.1.7
leftid = 202.89.35.19
leftnexthop = %defaultroute
leftsubnet = 172.30.1.0/24
right = 202.12.0.29
rightsubnet = 202.12.0.192/26
#rightid = 202.12.0.29
esp = aes256-sha1
ike = aes256-sha1-modp1024,aes128-md5
keyexchange = ike
ikelifetime = 120m
keylife = 10m
auto = start
pfs = no
#> /etc/ipsec.conf 27
+ _________________________ ipsec/secrets
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor
#< /etc/ipsec.secrets 1
#< /etc/ipsec.d/nzta.secrets 1
#NZTA
172.30.1.7 202.12.0.29: PSK "[sums to 1224...]"
202.89.35.19 202.12.0.29: PSK "[sums to 1224...]"
#> /etc/ipsec.secrets 2
+ _________________________ ipsec/listall
+ ipsec auto --listall
000
000 List of Public Keys:
000
000 List of Pre-shared secrets (from /etc/ipsec.secrets)
000 3: PSK 202.12.0.29 202.89.35.19
000 2: PSK 202.12.0.29 172.30.1.7
+ '[' /etc/ipsec.d/policies ']'
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/block
+ base=block
+ _________________________ ipsec/policies/block
+ cat /etc/ipsec.d/policies/block
# This file defines the set of CIDRs (network/mask-length) to which
# communication should never be allowed.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear
+ base=clear
+ _________________________ ipsec/policies/clear
+ cat /etc/ipsec.d/policies/clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# root name servers should be in the clear
192.58.128.30/32
198.41.0.4/32
192.228.79.201/32
192.33.4.12/32
128.8.10.90/32
192.203.230.10/32
192.5.5.241/32
192.112.36.4/32
128.63.2.53/32
192.36.148.17/32
193.0.14.129/32
199.7.83.42/32
202.12.27.33/32
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/clear-or-private
+ base=clear-or-private
+ _________________________ ipsec/policies/clear-or-private
+ cat /etc/ipsec.d/policies/clear-or-private
# This file defines the set of CIDRs (network/mask-length) to which
# we will communicate in the clear, or, if the other side initiates
IPSEC,
# using encryption. This behaviour is also called "Opportunistic
Responder".
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private
+ base=private
+ _________________________ ipsec/policies/private
+ cat /etc/ipsec.d/policies/private
# This file defines the set of CIDRs (network/mask-length) to which
# communication should always be private (i.e. encrypted).
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $
#
+ for policy in '$POLICIES/*'
++ basename /etc/ipsec.d/policies/private-or-clear
+ base=private-or-clear
+ _________________________ ipsec/policies/private-or-clear
+ cat /etc/ipsec.d/policies/private-or-clear
# This file defines the set of CIDRs (network/mask-length) to which
# communication should be private, if possible, but in the clear
otherwise.
#
# If the target has a TXT (later IPSECKEY) record that specifies
# authentication material, we will require private (i.e. encrypted)
# communications. If no such record is found, communications will be
# in the clear.
#
# See /usr/share/doc/openswan/policygroups.html for details.
#
# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $
#
0.0.0.0/0
+ _________________________ ipsec/ls-libdir
+ ls -l /usr/libexec/ipsec
total 2272
-rwxr-xr-x 1 root root 5996 Feb 17 2010 _copyright
-rwxr-xr-x 1 root root 2379 Feb 17 2010 _include
-rwxr-xr-x 1 root root 1475 Feb 17 2010 _keycensor
-rwxr-xr-x 1 root root 10028 Feb 17 2010 _pluto_adns
-rwxr-xr-x 1 root root 2632 Feb 17 2010 _plutoload
-rwxr-xr-x 1 root root 7627 Feb 17 2010 _plutorun
-rwxr-xr-x 1 root root 12771 Feb 17 2010 _realsetup
-rwxr-xr-x 1 root root 1975 Feb 17 2010 _secretcensor
-rwxr-xr-x 1 root root 8567 Feb 17 2010 _startklips
-rwxr-xr-x 1 root root 8567 Feb 17 2010 _startklips.old
-rwxr-xr-x 1 root root 5923 Feb 17 2010 _startnetkey
-rwxr-xr-x 1 root root 4880 Feb 17 2010 _updown
-rwxr-xr-x 1 root root 14030 Feb 17 2010 _updown.klips
-rwxr-xr-x 1 root root 14030 Feb 17 2010 _updown.klips.old
-rwxr-xr-x 1 root root 11798 Feb 17 2010 _updown.mast
-rwxr-xr-x 1 root root 11798 Feb 17 2010 _updown.mast.old
-rwxr-xr-x 1 root root 8534 Feb 17 2010 _updown.netkey
-rwxr-xr-x 1 root root 191872 Feb 17 2010 addconn
-rwxr-xr-x 1 root root 6129 Feb 17 2010 auto
-rwxr-xr-x 1 root root 10758 Feb 17 2010 barf
-rwxr-xr-x 1 root root 90060 Feb 17 2010 eroute
-rwxr-xr-x 1 root root 20184 Feb 17 2010 ikeping
-rwxr-xr-x 1 root root 69776 Feb 17 2010 klipsdebug
-rwxr-xr-x 1 root root 2591 Feb 17 2010 look
-rwxr-xr-x 1 root root 2174 Feb 17 2010 newhostkey
-rwxr-xr-x 1 root root 60812 Feb 17 2010 pf_key
-rwxr-xr-x 1 root root 1016208 Feb 17 2010 pluto
-rwxr-xr-x 1 root root 10176 Feb 17 2010 ranbits
-rwxr-xr-x 1 root root 22932 Feb 17 2010 rsasigkey
-rwxr-xr-x 1 root root 766 Feb 17 2010 secrets
lrwxrwxrwx 1 root root 30 Apr 16 2010 setup ->
../../../etc/rc.d/init.d/ipsec
-rwxr-xr-x 1 root root 1054 Feb 17 2010 showdefaults
-rwxr-xr-x 1 root root 178916 Feb 17 2010 showhostkey
-rwxr-xr-x 1 root root 22716 Feb 17 2010 showpolicy
-rwxr-xr-x 1 root root 152392 Feb 17 2010 spi
-rwxr-xr-x 1 root root 77308 Feb 17 2010 spigrp
-rwxr-xr-x 1 root root 69864 Feb 17 2010 tncfg
-rwxr-xr-x 1 root root 12526 Feb 17 2010 verify
-rwxr-xr-x 1 root root 51112 Feb 17 2010 whack
+ _________________________ ipsec/ls-execdir
+ ls -l /usr/libexec/ipsec
total 2272
-rwxr-xr-x 1 root root 5996 Feb 17 2010 _copyright
-rwxr-xr-x 1 root root 2379 Feb 17 2010 _include
-rwxr-xr-x 1 root root 1475 Feb 17 2010 _keycensor
-rwxr-xr-x 1 root root 10028 Feb 17 2010 _pluto_adns
-rwxr-xr-x 1 root root 2632 Feb 17 2010 _plutoload
-rwxr-xr-x 1 root root 7627 Feb 17 2010 _plutorun
-rwxr-xr-x 1 root root 12771 Feb 17 2010 _realsetup
-rwxr-xr-x 1 root root 1975 Feb 17 2010 _secretcensor
-rwxr-xr-x 1 root root 8567 Feb 17 2010 _startklips
-rwxr-xr-x 1 root root 8567 Feb 17 2010 _startklips.old
-rwxr-xr-x 1 root root 5923 Feb 17 2010 _startnetkey
-rwxr-xr-x 1 root root 4880 Feb 17 2010 _updown
-rwxr-xr-x 1 root root 14030 Feb 17 2010 _updown.klips
-rwxr-xr-x 1 root root 14030 Feb 17 2010 _updown.klips.old
-rwxr-xr-x 1 root root 11798 Feb 17 2010 _updown.mast
-rwxr-xr-x 1 root root 11798 Feb 17 2010 _updown.mast.old
-rwxr-xr-x 1 root root 8534 Feb 17 2010 _updown.netkey
-rwxr-xr-x 1 root root 191872 Feb 17 2010 addconn
-rwxr-xr-x 1 root root 6129 Feb 17 2010 auto
-rwxr-xr-x 1 root root 10758 Feb 17 2010 barf
-rwxr-xr-x 1 root root 90060 Feb 17 2010 eroute
-rwxr-xr-x 1 root root 20184 Feb 17 2010 ikeping
-rwxr-xr-x 1 root root 69776 Feb 17 2010 klipsdebug
-rwxr-xr-x 1 root root 2591 Feb 17 2010 look
-rwxr-xr-x 1 root root 2174 Feb 17 2010 newhostkey
-rwxr-xr-x 1 root root 60812 Feb 17 2010 pf_key
-rwxr-xr-x 1 root root 1016208 Feb 17 2010 pluto
-rwxr-xr-x 1 root root 10176 Feb 17 2010 ranbits
-rwxr-xr-x 1 root root 22932 Feb 17 2010 rsasigkey
-rwxr-xr-x 1 root root 766 Feb 17 2010 secrets
lrwxrwxrwx 1 root root 30 Apr 16 2010 setup ->
../../../etc/rc.d/init.d/ipsec
-rwxr-xr-x 1 root root 1054 Feb 17 2010 showdefaults
-rwxr-xr-x 1 root root 178916 Feb 17 2010 showhostkey
-rwxr-xr-x 1 root root 22716 Feb 17 2010 showpolicy
-rwxr-xr-x 1 root root 152392 Feb 17 2010 spi
-rwxr-xr-x 1 root root 77308 Feb 17 2010 spigrp
-rwxr-xr-x 1 root root 69864 Feb 17 2010 tncfg
-rwxr-xr-x 1 root root 12526 Feb 17 2010 verify
-rwxr-xr-x 1 root root 51112 Feb 17 2010 whack
+ _________________________ /proc/net/dev
+ cat /proc/net/dev
Inter-| Receive |
Transmit
face |bytes packets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed
lo: 3184 16 0 0 0 0 0 0
3184 16 0 0 0 0 0 0
eth0:2686452556 31350284 326 0 0 0 0 0
1049710560 5763325 0 0 0 0 0 0
sit0: 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0
+ _________________________ /proc/net/route
+ cat /proc/net/route
Iface Destination Gateway Flags RefCnt Use Metric
Mask MTU Window IRTT
eth0 00011EAC 00000000 0001 0 0 0
00FFFFFF 0 0 0
eth0 0000FEA9 00000000 0001 0 0 0
0000FFFF 0 0 0
eth0 00000000 01011EAC 0003 0 0 0
00000000 0 0 0
+ _________________________ /proc/sys/net/ipv4/ip_no_pmtu_disc
+ cat /proc/sys/net/ipv4/ip_no_pmtu_disc
0
+ _________________________ /proc/sys/net/ipv4/ip_forward
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________ /proc/sys/net/ipv4/tcp_ecn
+ cat /proc/sys/net/ipv4/tcp_ecn
0
+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter lo/rp_filter
all/rp_filter:0
default/rp_filter:1
eth0/rp_filter:1
lo/rp_filter:0
+ _________________________ /proc/sys/net/ipv4/conf/star-star-redirects
+ cd /proc/sys/net/ipv4/conf
+ egrep '^' all/accept_redirects all/secure_redirects all/send_redirects
default/accept_redirects default/secure_redirects default/send_redirects
eth0/accept_redirects eth0/secure_redirects eth0/send_redirects
lo/accept_redirects lo/secure_redirects lo/send_redirects
all/accept_redirects:0
all/secure_redirects:1
all/send_redirects:0
default/accept_redirects:0
default/secure_redirects:1
default/send_redirects:0
eth0/accept_redirects:0
eth0/secure_redirects:1
eth0/send_redirects:0
lo/accept_redirects:0
lo/secure_redirects:1
lo/send_redirects:0
+ _________________________ /proc/sys/net/ipv4/tcp_window_scaling
+ cat /proc/sys/net/ipv4/tcp_window_scaling
1
+ _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale
+ cat /proc/sys/net/ipv4/tcp_adv_win_scale
2
+ _________________________ uname-a
+ uname -a
Linux vps-itelematics007.maxnet.net.nz 2.6.18-194.32.1.el5 #1 SMP Wed
Jan 5 17:53:09 EST 2011 i686 i686 i386 GNU/Linux
+ _________________________ config-built-with
+ test -r /proc/config_built_with
+ _________________________ distro-release
+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release
+ test -f /etc/redhat-release
+ cat /etc/redhat-release
CentOS release 5.5 (Final)
+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release
+ test -f /etc/debian-release
+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release
+ test -f /etc/SuSE-release
+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release
+ test -f /etc/mandrake-release
+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release
+ test -f /etc/mandriva-release
+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release
+ test -f /etc/gentoo-release
+ _________________________ /proc/net/ipsec_version
+ test -r /proc/net/ipsec_version
+ test -r /proc/net/pfkey
++ uname -r
+ echo 'NETKEY (2.6.18-194.32.1.el5) support detected '
NETKEY (2.6.18-194.32.1.el5) support detected
+ _________________________ iptables
+ test -r /sbin/iptables
+ iptables -L -v -n
Chain INPUT (policy ACCEPT 1039K packets, 97M bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 28198 packets, 2464K bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 1109K packets, 226M bytes)
pkts bytes target prot opt in out source
destination
+ _________________________ iptables-nat
+ iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 6444 packets, 435K bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 276 packets, 23413 bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 276 packets, 23413 bytes)
pkts bytes target prot opt in out source
destination
+ _________________________ iptables-mangle
+ iptables -t mangle -L -v -n
Chain PREROUTING (policy ACCEPT 8671K packets, 629M bytes)
pkts bytes target prot opt in out source
destination
Chain INPUT (policy ACCEPT 1089K packets, 119M bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 28198 packets, 2464K bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 1155K packets, 234M bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 1184K packets, 237M bytes)
pkts bytes target prot opt in out source
destination
+ _________________________ /proc/modules
+ test -f /proc/modules
+ cat /proc/modules
ah6 10433 0 - Live 0xf8c0f000
ah4 10305 0 - Live 0xf8c0b000
esp6 12225 0 - Live 0xf8be6000
esp4 12353 0 - Live 0xf8b99000
xfrm4_tunnel 6593 0 - Live 0xf8b4c000
xfrm4_mode_tunnel 6849 0 - Live 0xf8b35000
xfrm4_mode_transport 6209 0 - Live 0xf8b32000
xfrm6_mode_transport 6337 0 - Live 0xf8b2c000
xfrm6_mode_tunnel 6721 0 - Live 0xf8b1d000
ipcomp 11465 0 - Live 0xf8b19000
ipcomp6 11977 0 - Live 0xf8ac6000
xfrm6_tunnel 11233 1 ipcomp6, Live 0xf8b0d000
af_key 40785 0 - Live 0xf8b21000
iptable_nat 11077 0 - Live 0xf8c47000
ip_nat 21101 1 iptable_nat, Live 0xf8c4e000
ip_conntrack 53281 2 iptable_nat,ip_nat, Live 0xf8c58000
nfnetlink 10713 2 ip_nat,ip_conntrack, Live 0xf8c43000
krng 6081 1 - Live 0xf8c40000
ansi_cprng 9669 0 - Live 0xf8c3c000
chainiv 9153 0 - Live 0xf8c38000
rng 7753 3 krng,ansi_cprng,chainiv, Live 0xf8c27000
authenc 10433 0 - Live 0xf8c34000
hmac 8769 0 - Live 0xf8c30000
cryptomgr 7617 0 - Live 0xf8c24000
iptable_filter 7105 0 - Live 0xf8b9e000
iptable_mangle 6849 0 - Live 0xf8b4f000
ip_tables 17029 3 iptable_nat,iptable_filter,iptable_mangle, Live
0xf8c2a000
deflate 7873 0 - Live 0xf8bee000
zlib_deflate 21977 1 deflate, Live 0xf8c1d000
ccm 13505 0 - Live 0xf8bf8000
serpent 29249 0 - Live 0xf8c14000
blowfish 12609 0 - Live 0xf8bf3000
twofish 46017 0 - Live 0xf8bfe000
ecb 7617 0 - Live 0xf8b52000
xcbc 9920 0 - Live 0xf8bea000
crypto_hash 6337 2 hmac,xcbc, Live 0xf8bc2000
cbc 8257 0 - Live 0xf8be2000
md5 8257 0 - Live 0xf8bc6000
sha256 15297 0 - Live 0xf8bdd000
sha512 13121 0 - Live 0xf8bd8000
des 20417 0 - Live 0xf8ba1000
aes_generic 31745 0 - Live 0xf8bb9000
testmgr_cipher 6849 0 - Live 0xf8b2f000
testmgr 52337 1 testmgr_cipher, Live 0xf8bca000
crypto_blkcipher 17601 6 chainiv,authenc,ccm,ecb,cbc,testmgr, Live
0xf8bb3000
aes_i586 37057 0 - Live 0xf8ba8000
xfrm6_esp 9537 1 esp6, Live 0xf8b48000
xfrm4_esp 9793 1 esp4, Live 0xf8b39000
aead 11841 5 esp6,esp4,authenc,ccm,testmgr, Live 0xf8b44000
crypto_algapi 22849 13
krng,ansi_cprng,chainiv,authenc,hmac,cryptomgr,ccm,ecb,xcbc,cbc,testmgr,
crypto_blkcipher,aead, Live 0xf8b3d000
tunnel4 7365 1 xfrm4_tunnel, Live 0xf8b11000
tunnel6 7365 1 xfrm6_tunnel, Live 0xf8b0a000
ip6t_REJECT 9409 1 - Live 0xf8b06000
xt_tcpudp 7105 6 - Live 0xf8af3000
ip6table_filter 6849 1 - Live 0xf8ac3000
ip6_tables 18053 1 ip6table_filter, Live 0xf8aed000
x_tables 17349 5 iptable_nat,ip_tables,ip6t_REJECT,xt_tcpudp,ip6_tables,
Live 0xf8ae7000
ipv6 270561 34
ah6,esp6,xfrm6_mode_transport,ipcomp6,xfrm6_tunnel,xfrm6_esp,tunnel6,ip6
t_REJECT, Live 0xf8b55000
xfrm_nalgo 13381 7 ah6,ah4,esp6,esp4,xfrm6_esp,xfrm4_esp,ipv6, Live
0xf8abe000
crypto_api 12609 12
ah6,ah4,esp6,esp4,rng,authenc,ccm,testmgr,crypto_blkcipher,aead,crypto_a
lgapi,xfrm_nalgo, Live 0xf8aac000
vsock 54048 0 - Live 0xf8af7000 (U)
vmci 37668 1 vsock, Live 0xf8aca000 (U)
vmmemctl 16220 0 - Live 0xf8ab9000 (U)
acpiphp 27089 0 - Live 0xf8ab1000
dm_multipath 25421 0 - Live 0xf8a53000
scsi_dh 12097 1 dm_multipath, Live 0xf8a62000
video 21193 0 - Live 0xf8a5b000
backlight 10049 1 video, Live 0xf8a2c000
sbs 18533 0 - Live 0xf8a47000
power_meter 16461 0 - Live 0xf8a4d000
hwmon 7365 1 power_meter, Live 0xf8a01000
i2c_ec 9025 1 sbs, Live 0xf8a43000
dell_wmi 8401 0 - Live 0xf8a30000
wmi 12137 1 dell_wmi, Live 0xf8a3f000
button 10705 0 - Live 0xf8a0b000
battery 13637 0 - Live 0xf8a3a000
asus_acpi 19289 0 - Live 0xf8a34000
ac 9157 0 - Live 0xf8a28000
pvscsi 20260 0 - Live 0xf89b9000 (U)
lp 15849 0 - Live 0xf89fc000
vmxnet 23428 0 - Live 0xf8a04000 (U)
sg 36573 0 - Live 0xf8a1e000
floppy 57125 0 - Live 0xf8a0f000
pcspkr 7105 0 - Live 0xf893d000
i2c_piix4 13133 0 - Live 0xf89bf000
i2c_core 24001 2 i2c_ec,i2c_piix4, Live 0xf89f5000
parport_pc 29157 1 - Live 0xf89c4000
serio_raw 10693 0 - Live 0xf8914000
parport 37513 2 lp,parport_pc, Live 0xf89ea000
mii 9409 0 - Live 0xf891c000
ide_cd 40161 0 - Live 0xf89df000
cdrom 36577 1 ide_cd, Live 0xf8986000
dm_raid45 67145 0 - Live 0xf89cd000
dm_message 6977 1 dm_raid45, Live 0xf8861000
dm_region_hash 15681 1 dm_raid45, Live 0xf896e000
dm_mem_cache 9537 1 dm_raid45, Live 0xf8918000
dm_snapshot 23653 0 - Live 0xf8961000
dm_zero 6209 0 - Live 0xf8873000
dm_mirror 24393 0 - Live 0xf8936000
dm_log 14657 3 dm_raid45,dm_region_hash,dm_mirror, Live 0xf8879000
dm_mod 63225 11
dm_multipath,dm_raid45,dm_snapshot,dm_zero,dm_mirror,dm_log, Live
0xf8975000
ata_piix 23621 0 - Live 0xf890d000
libata 157317 1 ata_piix, Live 0xf8991000
mptspi 23497 2 - Live 0xf8906000
mptscsih 36545 1 mptspi, Live 0xf882c000
mptbase 83717 2 mptspi,mptscsih, Live 0xf8920000
scsi_transport_spi 26305 1 mptspi, Live 0xf8859000
sd_mod 25281 3 - Live 0xf8851000
scsi_mod 141973 8
scsi_dh,pvscsi,sg,libata,mptspi,mptscsih,scsi_transport_spi,sd_mod, Live
0xf88c1000
ext3 125513 2 - Live 0xf88e6000
jbd 57321 1 ext3, Live 0xf8864000
uhci_hcd 25549 0 - Live 0xf8849000
ohci_hcd 25065 0 - Live 0xf8841000
ehci_hcd 33869 0 - Live 0xf8837000
+ _________________________ /proc/meminfo
+ cat /proc/meminfo
MemTotal: 2075464 kB
MemFree: 1533644 kB
Buffers: 146400 kB
Cached: 341584 kB
SwapCached: 8 kB
Active: 448316 kB
Inactive: 55860 kB
HighTotal: 1179584 kB
HighFree: 816736 kB
LowTotal: 895880 kB
LowFree: 716908 kB
SwapTotal: 524280 kB
SwapFree: 524272 kB
Dirty: 92 kB
Writeback: 0 kB
AnonPages: 16152 kB
Mapped: 11948 kB
Slab: 27092 kB
PageTables: 1028 kB
NFS_Unstable: 0 kB
Bounce: 0 kB
CommitLimit: 1562012 kB
Committed_AS: 59144 kB
VmallocTotal: 114680 kB
VmallocUsed: 4456 kB
VmallocChunk: 110104 kB
HugePages_Total: 0
HugePages_Free: 0
HugePages_Rsvd: 0
Hugepagesize: 4096 kB
+ _________________________ /proc/net/ipsec-ls
+ test -f /proc/net/ipsec_version
+ _________________________ usr/src/linux/.config
+ test -f /proc/config.gz
++ uname -r
+ test -f /lib/modules/2.6.18-194.32.1.el5/build/.config
++ uname -r
+ cat /lib/modules/2.6.18-194.32.1.el5/build/.config
+ egrep
'CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_H
W_RANDOM|CONFIG_CRYPTO_DEV|_XFRM'
CONFIG_XFRM=y
CONFIG_XFRM_NALGO=m
CONFIG_XFRM_USER=y
CONFIG_NET_KEY=m
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
# CONFIG_IP_FIB_TRIE is not set
CONFIG_IP_FIB_HASH=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_FWMARK=y
CONFIG_IP_ROUTE_MULTIPATH=y
# CONFIG_IP_ROUTE_MULTIPATH_CACHED is not set
CONFIG_IP_ROUTE_VERBOSE=y
# CONFIG_IP_PNP is not set
CONFIG_IP_MROUTE=y
CONFIG_IP_PIMSM_V1=y
CONFIG_IP_PIMSM_V2=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=m
CONFIG_INET_IPCOMP=m
CONFIG_INET_XFRM_TUNNEL=m
CONFIG_INET_TUNNEL=m
CONFIG_INET_XFRM_MODE_TRANSPORT=m
CONFIG_INET_XFRM_MODE_TUNNEL=m
CONFIG_INET_DIAG=m
CONFIG_INET_TCP_DIAG=m
CONFIG_INET_LRO=y
CONFIG_IP_VS=m
# CONFIG_IP_VS_DEBUG is not set
CONFIG_IP_VS_TAB_BITS=12
CONFIG_IP_VS_PROTO_TCP=y
CONFIG_IP_VS_PROTO_UDP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=m
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=m
CONFIG_IP_VS_LBLCR=m
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=m
CONFIG_IP_VS_SED=m
CONFIG_IP_VS_NQ=m
CONFIG_IP_VS_FTP=m
CONFIG_IPV6=m
CONFIG_IPV6_PRIVACY=y
CONFIG_IPV6_ROUTER_PREF=y
CONFIG_IPV6_ROUTE_INFO=y
CONFIG_IPV6_OPTIMISTIC_DAD=y
CONFIG_INET6_AH=m
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=m
CONFIG_INET6_XFRM_TUNNEL=m
CONFIG_INET6_TUNNEL=m
CONFIG_INET6_XFRM_MODE_TRANSPORT=m
CONFIG_INET6_XFRM_MODE_TUNNEL=m
CONFIG_IPV6_TUNNEL=m
# CONFIG_IPV6_SUBTREES is not set
CONFIG_IPV6_MULTIPLE_TABLES=y
CONFIG_IPV6_ROUTE_FWMARK=y
CONFIG_IP_NF_CONNTRACK=m
CONFIG_IP_NF_CT_ACCT=y
CONFIG_IP_NF_CONNTRACK_MARK=y
CONFIG_IP_NF_CONNTRACK_SECMARK=y
CONFIG_IP_NF_CONNTRACK_EVENTS=y
CONFIG_IP_NF_CONNTRACK_NETLINK=m
CONFIG_IP_NF_CT_PROTO_SCTP=m
CONFIG_IP_NF_FTP=m
CONFIG_IP_NF_IRC=m
CONFIG_IP_NF_NETBIOS_NS=m
CONFIG_IP_NF_TFTP=m
CONFIG_IP_NF_AMANDA=m
CONFIG_IP_NF_PPTP=m
CONFIG_IP_NF_H323=m
CONFIG_IP_NF_SIP=m
CONFIG_IP_NF_QUEUE=m
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_IPRANGE=m
CONFIG_IP_NF_MATCH_TOS=m
CONFIG_IP_NF_MATCH_RECENT=m
CONFIG_IP_NF_MATCH_ECN=m
CONFIG_IP_NF_MATCH_DSCP=m
CONFIG_IP_NF_MATCH_AH=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_MATCH_OWNER=m
CONFIG_IP_NF_MATCH_ADDRTYPE=m
CONFIG_IP_NF_MATCH_HASHLIMIT=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_ULOG=m
CONFIG_IP_NF_TARGET_TCPMSS=m
CONFIG_IP_NF_NAT=m
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_REDIRECT=m
CONFIG_IP_NF_TARGET_NETMAP=m
CONFIG_IP_NF_TARGET_SAME=m
CONFIG_IP_NF_NAT_SNMP_BASIC=m
CONFIG_IP_NF_NAT_IRC=m
CONFIG_IP_NF_NAT_FTP=m
CONFIG_IP_NF_NAT_TFTP=m
CONFIG_IP_NF_NAT_AMANDA=m
CONFIG_IP_NF_NAT_PPTP=m
CONFIG_IP_NF_NAT_H323=m
CONFIG_IP_NF_NAT_SIP=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_TOS=m
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_DSCP=m
CONFIG_IP_NF_TARGET_TTL=m
CONFIG_IP_NF_TARGET_CLUSTERIP=m
CONFIG_IP_NF_RAW=m
CONFIG_IP_NF_ARPTABLES=m
CONFIG_IP_NF_ARPFILTER=m
CONFIG_IP_NF_ARP_MANGLE=m
CONFIG_IP6_NF_QUEUE=m
CONFIG_IP6_NF_IPTABLES=m
CONFIG_IP6_NF_MATCH_RT=m
CONFIG_IP6_NF_MATCH_OPTS=m
CONFIG_IP6_NF_MATCH_FRAG=m
CONFIG_IP6_NF_MATCH_HL=m
CONFIG_IP6_NF_MATCH_OWNER=m
CONFIG_IP6_NF_MATCH_IPV6HEADER=m
CONFIG_IP6_NF_MATCH_AH=m
CONFIG_IP6_NF_MATCH_EUI64=m
CONFIG_IP6_NF_FILTER=m
CONFIG_IP6_NF_TARGET_LOG=m
CONFIG_IP6_NF_TARGET_REJECT=m
CONFIG_IP6_NF_MANGLE=m
CONFIG_IP6_NF_TARGET_HL=m
CONFIG_IP6_NF_RAW=m
CONFIG_IP_DCCP=m
CONFIG_INET_DCCP_DIAG=m
CONFIG_IP_DCCP_ACKVEC=y
CONFIG_IP_DCCP_CCID2=m
CONFIG_IP_DCCP_CCID3=m
CONFIG_IP_DCCP_TFRC_LIB=m
# CONFIG_IP_DCCP_DEBUG is not set
CONFIG_IP_SCTP=m
# CONFIG_IPX is not set
CONFIG_IPW2100=m
CONFIG_IPW2100_MONITOR=y
# CONFIG_IPW2100_DEBUG is not set
CONFIG_IPW2200=m
CONFIG_IPW2200_MONITOR=y
CONFIG_IPW2200_RADIOTAP=y
CONFIG_IPW2200_PROMISCUOUS=y
CONFIG_IPW2200_QOS=y
# CONFIG_IPW2200_DEBUG is not set
CONFIG_IPPP_FILTER=y
CONFIG_IPMI_HANDLER=m
CONFIG_IPMI_PANIC_EVENT=y
CONFIG_IPMI_PANIC_STRING=y
CONFIG_IPMI_DEVICE_INTERFACE=m
CONFIG_IPMI_SI=m
CONFIG_IPMI_WATCHDOG=m
CONFIG_IPMI_POWEROFF=m
CONFIG_HW_RANDOM=y
CONFIG_HW_RANDOM_INTEL=m
CONFIG_HW_RANDOM_AMD=m
CONFIG_HW_RANDOM_GEODE=m
CONFIG_HW_RANDOM_VIA=m
CONFIG_SECURITY_NETWORK_XFRM=y
CONFIG_CRYPTO_DEV_PADLOCK=m
CONFIG_CRYPTO_DEV_PADLOCK_AES=y
+ _________________________ etc/syslog.conf
+ _________________________ etc/syslog-ng/syslog-ng.conf
+ cat /etc/syslog-ng/syslog-ng.conf
cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory
+ cat /etc/syslog.conf
cat: /etc/syslog.conf: No such file or directory
+ _________________________ etc/resolv.conf
+ cat /etc/resolv.conf
search maxnet.net.nz
nameserver 123.100.67.135
nameserver 123.100.67.136
+ _________________________ lib/modules-ls
+ ls -ltr /lib/modules
total 20
drwxr-xr-x 6 root root 4096 Feb 4 2010 2.6.18-164.el5
drwxr-xr-x 6 root root 4096 Feb 5 2010 2.6.18-164.11.1.el5
drwxr-xr-x 6 root root 4096 Mar 29 2010 2.6.18-164.15.1.el5
drwxr-xr-x 6 root root 4096 Feb 16 22:45 2.6.18-194.32.1.el5
+ _________________________ /proc/ksyms-netif_rx
+ test -r /proc/ksyms
+ test -r /proc/kallsyms
+ egrep netif_rx /proc/kallsyms
c05c043c T __netif_rx_schedule
c05c17e9 T netif_rx
c05c2ce2 T netif_rx_ni
c05c17e9 U netif_rx [xfrm6_esp]
c05c17e9 U netif_rx [xfrm4_esp]
c05c17e9 U netif_rx [ipv6]
c05c17e9 U netif_rx [vmxnet]
+ _________________________ lib/modules-netif_rx
+ modulegoo kernel/net/ipv4/ipip.o netif_rx
+ set +x
2.6.18-164.11.1.el5:
2.6.18-164.15.1.el5:
2.6.18-164.el5:
2.6.18-194.32.1.el5:
+ _________________________ kern.debug
+ test -f /var/log/kern.debug
+ _________________________ klog
+ sed -n '4834,$p' /var/log/syslog.1
+ egrep -i 'ipsec|klips|pluto'
+ case "$1" in
+ cat
Apr 13 20:34:44 vps-itelematics007 ipsec_setup: Starting Openswan IPsec
U2.6.21/K2.6.18-194.32.1.el5...
Apr 13 20:34:44 vps-itelematics007 ipsec_setup: Using NETKEY(XFRM) stack
Apr 13 20:34:44 vps-itelematics007 ipsec_setup: ...Openswan IPsec
started
Apr 13 20:34:44 vps-itelematics007 ipsec_setup:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec_setup:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec_setup:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 pluto: adjusting ipsec.d to
/etc/ipsec.d
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun: adjusting ipsec.d to
/etc/ipsec.d
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 added connection
description "nzta-subnet64"
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 added connection
description "nzta-subnet128"
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 added connection
description "nzta-subnet192"
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 104 "nzta-subnet64"
#1: STATE_MAIN_I1: initiate
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 003
"nzta-subnet128": pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 117 "nzta-subnet128"
#3: STATE_QUICK_I1: initiate
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 003
"nzta-subnet192": pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 117 "nzta-subnet192"
#4: STATE_QUICK_I1: initiate
+ _________________________ plog
+ sed -n '694836,$p' /var/log/auth.log.1
+ egrep -i pluto
+ case "$1" in
+ cat
Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun: Starting Pluto
subsystem...
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: nss directory
plutomain: /etc/ipsec.d
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: NSS Initialized
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Starting Pluto
(Openswan Version 2.6.21; Vendor ID OE~q\177kZNr}Wk) pid:26771
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Setting NAT-Traversal
port-4500 floating to on
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: port floating
activation criteria nat_t=1/port_float=1
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: including
NAT-Traversal patch (Version 0.6c)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | inserting event
EVENT_REINIT_SECRET, timeout in 3600 seconds
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_AES_CBC: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]:
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]:
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: no helpers will be
started, all cryptographic operations will be done inline
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Using Linux 2.6 IPsec
interface code on 2.6.18-194.32.1.el5 (experimental code)
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | process 26771
listening for PF_KEY_V2 on file descriptor 12
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | finish_pfkey_msg:
K_SADB_REGISTER message 1 for AH
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | 02 07 00 02 02 00
00 00 01 00 00 00 93 68 00 00
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | pfkey_get:
K_SADB_REGISTER message 1
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | AH registered with
kernel.
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | finish_pfkey_msg:
K_SADB_REGISTER message 2 for ESP
Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | 02 07 00 03 02 00
00 00 02 00 00 00 93 68 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | pfkey_get:
K_SADB_REGISTER message 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
alg_init():memset(0x7ebd80, 0, 2016) memset(0x7ec560, 0, 2048)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19
sadb_supported_len=56
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=251
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14,
satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0,
ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14,
satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14,
satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14,
satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14,
satype=3, alg_id=8, alg_ivlen=0, alg_minbits=160, alg_maxbits=160,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=9
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=14,
satype=3, alg_id=9, alg_ivlen=0, alg_minbits=128, alg_maxbits=128,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19
sadb_supported_len=80
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=11
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15,
satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0,
ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15,
satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0,
ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15,
satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15,
satype=3, alg_id=6, alg_ivlen=8, alg_minbits=40, alg_maxbits=128, res=0,
ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15,
satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0,
ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15,
satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=252
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15,
satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=253
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15,
satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=13
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[14], exttype=15,
satype=3, alg_id=13, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=19
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=15
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: Ok (ret=0)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP registered with
kernel.
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | finish_pfkey_msg:
K_SADB_REGISTER message 3 for IPCOMP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 02 07 00 09 02 00
00 00 03 00 00 00 93 68 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | pfkey_get:
K_SADB_REGISTER message 3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPCOMP registered
with kernel.
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/cacerts': /home/benm
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/aacerts': /home/benm
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/ocspcerts': /home/benm
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/crls'
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_LOG_DAILY, timeout in 12315 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_REINIT_SECRET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_SHA1")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d14a0, "OAKLEY_GROUP_MODP1024")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
modp_getbyname("modp1024")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=2 modp_id=2, cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=md5eklen=128 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_MD5")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=5, cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=2, cnt=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Added new connection
nzta-subnet64 with policy PSK+ENCRYPT+TUNNEL+IKEv2ALLOW
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | from whack: got
--esp=aes256-sha1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1410, "ESP_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7ce0e8, "AUTH_ALGORITHM_HMAC_SHA1")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_esp_add()
ealg=12 aalg=2 cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp string values:
AES(12)_256-SHA1(2); flags=-strict
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike (phase1)
algorihtm values: AES_CBC(7)_256-SHA1(2)-MODP1024(2),
AES_CBC(7)_128-MD5(1)-MODP1536(5), AES_CBC(7)_128-MD5(1)-MODP1024(2);
flags=-strict
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.89.35.19 is 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.12.0.29 is 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: added connection
description "nzta-subnet64"
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.64/26
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike_life: 7200s;
ipsec_life: 600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_SHA1")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d14a0, "OAKLEY_GROUP_MODP1024")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
modp_getbyname("modp1024")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=2 modp_id=2, cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=md5eklen=128 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_MD5")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=5, cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=2, cnt=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Added new connection
nzta-subnet128 with policy PSK+ENCRYPT+TUNNEL+IKEv2ALLOW
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | from whack: got
--esp=aes256-sha1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1410, "ESP_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7ce0e8, "AUTH_ALGORITHM_HMAC_SHA1")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_esp_add()
ealg=12 aalg=2 cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp string values:
AES(12)_256-SHA1(2); flags=-strict
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike (phase1)
algorihtm values: AES_CBC(7)_256-SHA1(2)-MODP1024(2),
AES_CBC(7)_128-MD5(1)-MODP1536(5), AES_CBC(7)_128-MD5(1)-MODP1024(2);
flags=-strict
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.89.35.19 is 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.12.0.29 is 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: added connection
description "nzta-subnet128"
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.128/26
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike_life: 7200s;
ipsec_life: 600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_SHA1")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d14a0, "OAKLEY_GROUP_MODP1024")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
modp_getbyname("modp1024")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=2 modp_id=2, cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=md5eklen=128 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_MD5")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("md5")=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=5, cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=2, cnt=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Added new connection
nzta-subnet192 with policy PSK+ENCRYPT+TUNNEL+IKEv2ALLOW
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | from whack: got
--esp=aes256-sha1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256 aklen=0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1410, "ESP_AES")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7ce0e8, "AUTH_ALGORITHM_HMAC_SHA1")
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_esp_add()
ealg=12 aalg=2 cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp string values:
AES(12)_256-SHA1(2); flags=-strict
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike (phase1)
algorihtm values: AES_CBC(7)_256-SHA1(2)-MODP1024(2),
AES_CBC(7)_128-MD5(1)-MODP1536(5), AES_CBC(7)_128-MD5(1)-MODP1024(2);
flags=-strict
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.89.35.19 is 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.12.0.29 is 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: added connection
description "nzta-subnet192"
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.192/26
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike_life: 7200s;
ipsec_life: 600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: listening for IKE
messages
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | found lo with address
127.0.0.1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | found eth0 with
address 172.30.1.7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface
eth0/eth0 172.30.1.7:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface
eth0/eth0 172.30.1.7:4500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface lo/lo
127.0.0.1:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface lo/lo
127.0.0.1:4500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | found lo with address
0000:0000:0000:0000:0000:0000:0000:0001
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface lo/lo
::1:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | connect_to_host_pair:
172.30.1.7:500 202.12.0.29:500 -> hp:none
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | find_host_pair:
comparing to 172.30.1.7:500 202.12.0.29:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | connect_to_host_pair:
172.30.1.7:500 202.12.0.29:500 -> hp:nzta-subnet192
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | find_host_pair:
comparing to 172.30.1.7:500 202.12.0.29:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | connect_to_host_pair:
172.30.1.7:500 202.12.0.29:500 -> hp:nzta-subnet128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: loading secrets from
"/etc/ipsec.secrets"
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: loading secrets from
"/etc/ipsec.d/nzta.secrets"
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834da28) 1: 172.30.1.7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834da28) 1: 202.12.0.29
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Processing PSK at
line 3: passed
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834db58) 1: 202.89.35.19
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834db58) 1: 202.12.0.29
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Processing PSK at
line 3: passed
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" unrouted: NULL; eroute owner: NULL
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet64 (kind=CK_PERMANENT)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" unrouted: NULL; eroute owner: NULL
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet64 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)}
and state: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | request to add a
prospective erouted policy with netkey kernel --- experimental
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
prepare-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 641
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subn:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):et64'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
P:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):LUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='1:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):72.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTO:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):COL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT=':
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):202.12.0.64/26' PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO_:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updow:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):n:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
route-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 639
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):64'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLU:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):TO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCO:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):L='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='20:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):2.12.0.64/26' PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.25:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):5.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_ST:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):ACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updown:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" unrouted: NULL; eroute owner: NULL
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet128 (kind=CK_PERMANENT)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" unrouted: NULL; eroute owner: NULL
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet128 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)}
and state: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | request to add a
prospective erouted policy with netkey kernel --- experimental
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
prepare-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 644
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subn:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):et128'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET=':
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):172.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OCOL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT=:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):'202.12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='2:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):55.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLU:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):TO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _up:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):down:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
route-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 642
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):128'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PL:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):UTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='17:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):2.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOC:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='2:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):02.12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):_STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updo:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):wn:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" unrouted: NULL; eroute owner: NULL
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet192 (kind=CK_PERMANENT)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" unrouted: NULL; eroute owner: NULL
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet192 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)}
and state: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | request to add a
prospective erouted policy with netkey kernel --- experimental
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
prepare-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 644
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subn:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):et192'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET=':
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):172.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OCOL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT=:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):'202.12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='2:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):55.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLU:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):TO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _up:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):down:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
route-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 642
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):192'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PL:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):UTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='17:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):2.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOC:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='2:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):02.12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):_STACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updo:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):wn:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#1 at 0x834dca0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 00 00 00 00
00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #1 on chain 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Queuing pending Quick
Mode with 202.12.0.29 "nzta-subnet64"
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
initiating Main Mode
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 00 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_IDPROT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags: none
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_ISAKMP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ISAKMP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_T
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
KEY_IKE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_LIFE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7200
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [7 is
OAKLEY_AES_CBC]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_HASH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
OAKLEY_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_AUTHENTICATION_METHOD
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_PRESHARED_KEY]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_GROUP_DESCRIPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
OAKLEY_GROUP_MODP1024]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ISAKMP): 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ISAKMP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_T
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
KEY_IKE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_LIFE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7200
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [7 is
OAKLEY_AES_CBC]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_HASH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is OAKLEY_MD5]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_AUTHENTICATION_METHOD
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_PRESHARED_KEY]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_GROUP_DESCRIPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [5 is
OAKLEY_GROUP_MODP1536]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ISAKMP): 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ISAKMP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
KEY_IKE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_LIFE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7200
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [7 is
OAKLEY_AES_CBC]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_HASH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is OAKLEY_MD5]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_AUTHENTICATION_METHOD
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_PRESHARED_KEY]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_GROUP_DESCRIPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
OAKLEY_GROUP_MODP1024]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ISAKMP): 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 116
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 12 raw bytes
of Vendor ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Vendor ID 4f 45 7e
71 7f 6b 5a 4e 72 7d 57 6b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [Dead Peer Detection]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID af ca d7 13 68
a1 f1 c9 6b 86 96 fc 77 57 01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nat traversal
enabled: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nat add vid. port: 1
nonike: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [RFC 3947]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID 4a 13 1c 81 07
03 58 45 5c 57 28 f2 0e 95 45 2f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-03]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID 7d 94 19 a6 53
10 ca 6f 2c 17 9d 92 15 52 9d 56
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-02_n]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID 90 cb 80 91 3e
bb 69 6e 08 63 81 b5 ec 42 7b 1f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-02]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_VID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID cd 60 46 43 35
df 21 f8 7c fd b2 fc 68 b6 a4 48
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-00]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID 44 85 15 2d 18
b6 bb cd 0b e8 a8 46 95 79 dd cc
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 292
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 292 bytes for
main_outI1 through eth0:500 to 202.12.0.29:500 (using #1)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 00 00 00 00 00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 10 02 00 00 00
00 00 00 00 01 24 0d 00 00 80
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 01 00 00 00 74 00 01 00 03
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 03 00 00 24 00 01
00 00 80 0b 00 01 80 0c 1c 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 01 00 07 80 02
00 02 80 03 00 01 80 04 00 02
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 0e 01 00 03 00
00 24 01 01 00 00 80 0b 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 0c 1c 20 80 01
00 07 80 02 00 01 80 03 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 04 00 05 80 0e
00 80 00 00 00 24 02 01 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 0b 00 01 80 0c
1c 20 80 01 00 07 80 02 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 03 00 01 80 04
00 02 80 0e 00 80 0d 00 00 10
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 4f 45 7e 71 7f 6b
5a 4e 72 7d 57 6b 0d 00 00 14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af ca d7 13 68 a1
f1 c9 6b 86 96 fc 77 57 01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0d 00 00 14 4a 13
1c 81 07 03 58 45 5c 57 28 f2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0e 95 45 2f 0d 00
00 14 7d 94 19 a6 53 10 ca 6f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2c 17 9d 92 15 52
9d 56 0d 00 00 14 90 cb 80 91
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 3e bb 69 6e 08 63
81 b5 ec 42 7b 1f 0d 00 00 14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cd 60 46 43 35 df
21 f8 7c fd b2 fc 68 b6 a4 48
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 14 44 85
15 2d 18 b6 bb cd 0b e8 a8 46
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 95 79 dd cc
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 84 bytes
from 202.12.0.29:500 on eth0 (port=500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 10 02 00 00 00
00 00 00 00 00 54 00 00 00 38
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 01 00 00 00 2c 01 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 24 01 01
00 00 80 0b 00 01 80 0c 1c 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 01 00 07 80 02
00 02 80 03 00 01 80 04 00 02
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 0e 01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_IDPROT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags: none
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 84
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing
version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object not
found
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 00 00 00 00
00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #1, provided msgid 00000000 vs 00000000
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #1
found, in STATE_MAIN_I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 56
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 44
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_ISAKMP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ISAKMP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
KEY_IKE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_LIFE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7200
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_ENCRYPTION_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [7 is
OAKLEY_AES_CBC]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
ike_alg_enc_ok(ealg=7,key_len=0): blocksize=16, keyminlen=128,
keydeflen=128, keymaxlen=256, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_HASH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is OAKLEY_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_AUTHENTICATION_METHOD
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
OAKLEY_PRESHARED_KEY]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | started looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | actually looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: key type
PPK_PSK(202.89.35.19) to type PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
202.89.35.19 to 202.89.35.19 / 202.12.0.29 -> 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: match=12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | best_match 0>12
best=0x834db58 (line=3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: key type
PPK_PSK(202.89.35.19) to type PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
172.30.1.7 to 202.89.35.19 / 202.12.0.29 -> 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: match=4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | concluding with
best_match=12 best=0x834db58 (lineno=3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_GROUP_DESCRIPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
OAKLEY_GROUP_MODP1024]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
OAKLEY_KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
ike_alg_enc_ok(ealg=7,key_len=256): blocksize=16, keyminlen=128,
keydeflen=128, keymaxlen=256, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Oakley Transform 1
accepted
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sender checking
NAT-t: 1 and 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_kenonce op id: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Local DH secret:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 2f 35 08
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Public DH value
sent(computed in NSS):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 27 91 28 24 02 71
98 10 bf 01 a6 1b 83 6a 75 1f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 20 4f 84 8d 02 56
fb e5 d0 64 bb e0 b2 3a 9f fb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | d1 b2 2c 23 43 8b
ce 6f ac 41 18 3c 63 6f d2 5d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | b0 57 d3 e0 46 f4
0d d6 2d 00 65 d6 28 11 c4 bb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 86 98 46 05 13 75
8e 0e 49 e9 34 ba db 46 0a 6c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 38 90 f7 0c 72 af
42 34 ca 11 54 aa 21 42 43 09
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 26 12 4c 7a 3a 3e
74 ec 6a b1 60 28 12 26 df 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 95 ee a2 a7 ab 41
f9 5c db 44 b5 d9 35 e5 2b 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Local DH public
value (pointer):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 88 27 35 08
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 27 eb 7c d2 2c fc
d1 3b 45 60 c2 15 51 4d 0d 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: packet from
202.12.0.29:500: pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | main inR1_outI2:
calculated ke+nonce, sending I2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_KE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_IDPROT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags: none
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | saving DH priv (local
secret) and pub key into state struc
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Key
Exchange Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 128 raw
bytes of keyex value into ISAKMP Key Exchange Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value 27 91 28
24 02 71 98 10 bf 01 a6 1b 83 6a 75 1f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value 20 4f 84
8d 02 56 fb e5 d0 64 bb e0 b2 3a 9f fb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value d1 b2 2c
23 43 8b ce 6f ac 41 18 3c 63 6f d2 5d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value b0 57 d3
e0 46 f4 0d d6 2d 00 65 d6 28 11 c4 bb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value 86 98 46
05 13 75 8e 0e 49 e9 34 ba db 46 0a 6c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value 38 90 f7
0c 72 af 42 34 ca 11 54 aa 21 42 43 09
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value 26 12 4c
7a 3a 3e 74 ec 6a b1 60 28 12 26 df 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value 95 ee a2
a7 ab 41 f9 5c db 44 b5 d9 35 e5 2b 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Key Exchange Payload: 132
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni 27 eb 7c d2 2c
fc d1 3b 45 60 c2 15 51 4d 0d 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 180
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 00 00 00 00
00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #1 on chain 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 180 bytes for
STATE_MAIN_I1 through eth0:500 to 202.12.0.29:500 (using #1)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 04 10 02 00 00 00
00 00 00 00 00 b4 0a 00 00 84
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 27 91 28 24 02 71
98 10 bf 01 a6 1b 83 6a 75 1f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 20 4f 84 8d 02 56
fb e5 d0 64 bb e0 b2 3a 9f fb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | d1 b2 2c 23 43 8b
ce 6f ac 41 18 3c 63 6f d2 5d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | b0 57 d3 e0 46 f4
0d d6 2d 00 65 d6 28 11 c4 bb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 86 98 46 05 13 75
8e 0e 49 e9 34 ba db 46 0a 6c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 38 90 f7 0c 72 af
42 34 ca 11 54 aa 21 42 43 09
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 26 12 4c 7a 3a 3e
74 ec 6a b1 60 28 12 26 df 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 95 ee a2 a7 ab 41
f9 5c db 44 b5 d9 35 e5 2b 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 14 27 eb
7c d2 2c fc d1 3b 45 60 c2 15
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 51 4d 0d 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
STATE_MAIN_I2: sent MI2, expecting MR2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_INLINE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 184 bytes
from 202.12.0.29:500 on eth0 (port=500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 04 10 02 00 00 00
00 00 00 00 00 b8 0a 00 00 84
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ef 34 37 0f 47 80
52 14 47 7c 97 c0 42 21 fd 1d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6c 81 51 34 90 47
b2 92 cc 25 25 82 79 fc d9 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 4d 8c 33 2f 85 4f
15 fb 6d 01 64 3d b9 82 44 f0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c7 34 53 12 44 3c
cf c4 4e 29 c8 6e 02 83 15 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 50 f1 7c 05 05 23
97 a8 89 87 61 76 6a 4a c5 dd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0c bf 03 46 48 77
9e 05 0b 89 52 95 3b 93 e7 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5d a1 c4 31 98 e2
01 98 e8 36 75 69 07 63 e5 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | de aa 7a cf e0 e8
cc c9 3c 7f ea a3 69 ab 29 e6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 18 0b 70
6c ff a0 0a 9e 80 f0 58 db 19
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 71 cb a9 a5 d4 75
f0 9e
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_KE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_IDPROT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags: none
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 184
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing
version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #1, provided msgid 00000000 vs 00000000
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #1
found, in STATE_MAIN_I2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x10(ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Key
Exchange Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 132
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_IDPROT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH public value
received:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ef 34 37 0f 47 80
52 14 47 7c 97 c0 42 21 fd 1d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6c 81 51 34 90 47
b2 92 cc 25 25 82 79 fc d9 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 4d 8c 33 2f 85 4f
15 fb 6d 01 64 3d b9 82 44 f0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c7 34 53 12 44 3c
cf c4 4e 29 c8 6e 02 83 15 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 50 f1 7c 05 05 23
97 a8 89 87 61 76 6a 4a c5 dd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0c bf 03 46 48 77
9e 05 0b 89 52 95 3b 93 e7 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5d a1 c4 31 98 e2
01 98 e8 36 75 69 07 63 e5 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | de aa 7a cf e0 e8
cc c9 3c 7f ea a3 69 ab 29 e6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | started looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | actually looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: key type
PPK_PSK(202.89.35.19) to type PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
202.89.35.19 to 202.89.35.19 / 202.12.0.29 -> 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: match=12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | best_match 0>12
best=0x834db58 (line=3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: key type
PPK_PSK(202.89.35.19) to type PPK_PSK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
172.30.1.7 to 202.89.35.19 / 202.12.0.29 -> 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: match=4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | concluding with
best_match=12 best=0x834db58 (lineno=3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parent1 type: 7
group: 2 len: 2680
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Coying DH pub key
pointer to be sent to a thread helper
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
compute dh+iv op id: 3765321
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: ef 34 37
0f 47 80 52 14 47 7c 97 c0 42 21 fd 1d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: 6c 81 51
34 90 47 b2 92 cc 25 25 82 79 fc d9 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: 4d 8c 33
2f 85 4f 15 fb 6d 01 64 3d b9 82 44 f0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: c7 34 53
12 44 3c cf c4 4e 29 c8 6e 02 83 15 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: 50 f1 7c
05 05 23 97 a8 89 87 61 76 6a 4a c5 dd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: 0c bf 03
46 48 77 9e 05 0b 89 52 95 3b 93 e7 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: 5d a1 c4
31 98 e2 01 98 e8 36 75 69 07 63 e5 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g: de aa 7a
cf e0 e8 cc c9 3c 7f ea a3 69 ab 29 e6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Started DH
shared-secret computation in NSS:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | calc_dh_shared():
time elapsed (OAKLEY_GROUP_MODP1024): 2406 usec
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH shared-secret
pointer:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 42 35 08
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: skeyid inputs
(pss+NI+NR+shared) hasher: oakley_sha
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | shared-secret: 08
42 35 08
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ni: 27 eb 7c d2 2c
fc d1 3b 45 60 c2 15 51 4d 0d 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nr: 0b 70 6c ff a0
0a 9e 80 f0 58 db 19 71 cb a9 a5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nr: d4 75 f0 9e
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: st_skeyid in
skeyid_preshared():
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 50 ac 35 08
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Started key
computation
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed key skeyid_d
with length =20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value: 41 d1 b2 05
d3 92 98 3f d6 0b 78 82 f1 4a ed 1d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value: 98 ad 75 e7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed key skeyid_a
with length =20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value: 04 11 ca 2b
7d 4b 0b 69 cf c7 ec 77 90 89 50 e2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value: cd 15 44 0a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: enc keysize=32
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed key enc_key
with length =32
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value: cc 4c 13 0c
92 e5 d1 0f 94 4e 50 be db df 28 0d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value: b9 38 d6 0a
ac dc 84 78 35 b6 3b 13 76 86 a3 d1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Freed 25-39
symkeys
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
skeyid_d_chunk
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
skeyid_a_chunk
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
skeyid_e_chunk
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
enc_key_chunk
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: 27 91 28 24
02 71 98 10 bf 01 a6 1b 83 6a 75 1f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: 20 4f 84 8d
02 56 fb e5 d0 64 bb e0 b2 3a 9f fb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: d1 b2 2c 23
43 8b ce 6f ac 41 18 3c 63 6f d2 5d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: b0 57 d3 e0
46 f4 0d d6 2d 00 65 d6 28 11 c4 bb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: 86 98 46 05
13 75 8e 0e 49 e9 34 ba db 46 0a 6c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: 38 90 f7 0c
72 af 42 34 ca 11 54 aa 21 42 43 09
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: 26 12 4c 7a
3a 3e 74 ec 6a b1 60 28 12 26 df 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i: 95 ee a2 a7
ab 41 f9 5c db 44 b5 d9 35 e5 2b 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: ef 34 37 0f
47 80 52 14 47 7c 97 c0 42 21 fd 1d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: 6c 81 51 34
90 47 b2 92 cc 25 25 82 79 fc d9 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: 4d 8c 33 2f
85 4f 15 fb 6d 01 64 3d b9 82 44 f0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: c7 34 53 12
44 3c cf c4 4e 29 c8 6e 02 83 15 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: 50 f1 7c 05
05 23 97 a8 89 87 61 76 6a 4a c5 dd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: 0c bf 03 46
48 77 9e 05 0b 89 52 95 3b 93 e7 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: 5d a1 c4 31
98 e2 01 98 e8 36 75 69 07 63 e5 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r: de aa 7a cf
e0 e8 cc c9 3c 7f ea a3 69 ab 29 e6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: end of key
computation
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: packet from
202.12.0.29:500: pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | main inR2_outI3:
calculated DH, sending R1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | thinking about
whether to send my certificate:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | I have RSA key:
OAKLEY_PRESHARED_KEY cert.type: CERT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sendcert:
CERT_ALWAYSSEND and I did not get a certificate request
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | so do not send
cert.
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | I did not send a
certificate because digital signatures are not being used. (PSK)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | I am not sending a
certificate request
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of my identity into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | my identity ca 59 23
13
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | hashing 124 bytes of
SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 raw bytes
of HASH_I into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH_I 5b 49 0f 69
4e 51 82 ec f6 94 43 5b 0d 81 0f 82
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH_I 6a 40 f6 7b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 00 00 0c 01 00
00 00 ca 59 23 13 00 00 00 18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5b 49 0f 69 4e 51
82 ec f6 94 43 5b 0d 81 0f 82
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6a 40 f6 7b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | f0 70 ee b1 f8 3d
e4 b7 ed 32 d8 5c a3 46 c6 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 7d ce cc db
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 12 zero
bytes of encryption padding into ISAKMP Message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 89 95 fc d1
72 0a 8e d7 91 7d be 9f ee 1c ff 07
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 76 bytes for
STATE_MAIN_I2 through eth0:500 to 202.12.0.29:500 (using #1)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 05 10 02 01 00 00
00 00 00 00 00 4c 72 58 62 84
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 41 d8 e8 c1 a6 b6
c7 9c 1f f0 92 aa 90 21 c9 9e
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0a 85 ef 9e a8 ff
58 f3 de c0 45 e9 89 95 fc d1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 72 0a 8e d7 91 7d
be 9f ee 1c ff 07
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
STATE_MAIN_I3: sent MI3, expecting MR3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_INLINE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 76 bytes
from 202.12.0.29:500 on eth0 (port=500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 05 10 02 01 00 00
00 00 00 00 00 4c e6 c4 8f 56
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 79 4b 96 84 68 6d
c2 ae 40 51 4a 00 0b 84 c0 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 72 fc 96 05 65
92 17 da 92 79 e1 99 9a 7a 94
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 57 8b f3 40 a3 95
37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_IDPROT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 00 00
00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 76
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing
version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #1, provided msgid 00000000 vs 00000000
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #1
found, in STATE_MAIN_I3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 48 bytes
using algorithm OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 00 00 0c 01 00
00 00 ca 0c 00 1d 00 00 00 18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 62 78 ca 75 4f 61
b6 b4 5c 93 eb 13 ec ce d9 76
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c0 ad e0 3c 00 00
00 00 00 00 00 00 00 00 00 0b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 99 9a 7a 94
57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x120 opt: 0x2080
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 12
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI specific A: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI specific B: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ca 0c 00
1d 00 00 00 18 62 78 ca 75
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x2080
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
Main mode peer ID is ID_IPV4_ADDR: '202.12.0.29'
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | hashing 124 bytes of
SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | authentication
succeeded
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_REPLACE, timeout in 6207 seconds for #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_REINIT_SECRET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=aes_256 prf=oakley_sha group=modp1024}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unqueuing pending
Quick Mode with 202.12.0.29 "nzta-subnet64" import:admin initiate
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | duplicating state
object #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#2 at 0x8361b98
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #2 on chain 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1
msgid:9cb93a4e proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_nonce op id: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5a 71 6f 7c 3a 8d
12 4c d2 1a 34 11 5b 14 f1 86
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: packet from
202.12.0.29:500: pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | quick outI1:
calculated ke+nonce, sending I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 4e 3a
b9 9c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_IPSEC_ESP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | netlink_get_spi:
allocated 0x2414019f for esp.0 at 172.30.1.7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of SPI into ISAKMP Proposal Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI 24 14 01 9f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ESP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
ESP_AES
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
ENCAPSULATION_MODE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
ENCAPSULATION_MODE_TUNNEL]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
SA_LIFE_TYPE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 600
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
AUTH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
AUTH_ALGORITHM_HMAC_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ESP): 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni 5a 71 6f 7c 3a
8d 12 4c d2 1a 34 11 5b 14 f1 86
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network ac 1e
01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask ff ff ff
00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network ca 0c
00 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask ff ff ff
c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(1) computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 85 33 3f 2c 03 13
1d 87 73 d1 fc 50 f8 76 1c da
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c7 17 fe 47
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | last Phase 1 IV: 99
9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | b5 00 cf d9 8e 9e
8f 94 60 38 4f 7d 28 6a 29 e3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8f 20 63 a3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 00 00 18 85 33
3f 2c 03 13 1d 87 73 d1 fc 50
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | f8 76 1c da c7 17
fe 47 0a 00 00 34 00 00 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 28 00 03 04 01 24 14 01 9f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 1c 00 0c
00 00 80 04 00 01 80 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 02 02 58 80 05
00 02 80 06 01 00 05 00 00 14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5a 71 6f 7c 3a 8d
12 4c d2 1a 34 11 5b 14 f1 86
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 05 00 00 10 04 00
00 00 ac 1e 01 00 ff ff ff 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 10 04 00
00 00 ca 0c 00 40 ff ff ff c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | b5 00 cf d9 8e 9e
8f 94 60 38 4f 7d 28 6a 29 e3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8f 20 63 a3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 128 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 9c e1 16 a2
59 a5 bd b6 29 a9 37 e3 20 4a ce 39
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 156
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 156 bytes for
quick_outI1 through eth0:500 to 202.12.0.29:500 (using #2)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 4e 3a
b9 9c 00 00 00 9c 99 4f d5 5c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 79 56 31 0e f3 c1
07 e3 88 80 73 d6 c5 b6 85 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | d1 78 c7 f4 5e 8d
b6 97 c4 14 e3 8e e5 73 7e 31
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af 7d db b4 ca e3
e2 e1 15 f2 0e 11 4c 22 d1 8a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1e a3 50 33 2e ed
da 78 6b d7 7c d0 e3 6a cd 37
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff be da 96 67 5a
de 13 dc 9a 61 28 92 89 00 eb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 7c 15 fc cd ef e0
23 01 3f 97 57 9f d2 6b d0 be
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 7c b8 56 3d a5 5d
95 60 fc 5b 5a f4 9c e1 16 a2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 59 a5 bd b6 29 a9
37 e3 20 4a ce 39
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | duplicating state
object #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#3 at 0x8362118
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #3 on chain 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1
msgid:3a64426a proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_nonce op id: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9a ec 25 dc 9b 1d
f2 b5 c7 bc e4 c1 64 e9 56 05
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128":
pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | quick outI1:
calculated ke+nonce, sending I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 6a 42
64 3a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_IPSEC_ESP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | netlink_get_spi:
allocated 0x8ee723cb for esp.0 at 172.30.1.7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of SPI into ISAKMP Proposal Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI 8e e7 23 cb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ESP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
ESP_AES
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
ENCAPSULATION_MODE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
ENCAPSULATION_MODE_TUNNEL]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
SA_LIFE_TYPE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 600
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
AUTH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
AUTH_ALGORITHM_HMAC_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ESP): 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni 9a ec 25 dc 9b
1d f2 b5 c7 bc e4 c1 64 e9 56 05
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network ac 1e
01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask ff ff ff
00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network ca 0c
00 80
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask ff ff ff
c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(1) computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 4a d6 9b 90 cf b4
49 66 b3 dd c2 38 06 5f 17 a7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 60 01 33 e6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | last Phase 1 IV: 99
9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ac 57 95 d4 c5 ed
2e 22 58 b2 5f 4e 2d 65 c6 ec
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c3 53 7c 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 00 00 18 4a d6
9b 90 cf b4 49 66 b3 dd c2 38
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 06 5f 17 a7 60 01
33 e6 0a 00 00 34 00 00 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 28 00 03 04 01 8e e7 23 cb
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 1c 00 0c
00 00 80 04 00 01 80 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 02 02 58 80 05
00 02 80 06 01 00 05 00 00 14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9a ec 25 dc 9b 1d
f2 b5 c7 bc e4 c1 64 e9 56 05
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 05 00 00 10 04 00
00 00 ac 1e 01 00 ff ff ff 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 10 04 00
00 00 ca 0c 00 80 ff ff ff c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ac 57 95 d4 c5 ed
2e 22 58 b2 5f 4e 2d 65 c6 ec
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c3 53 7c 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 128 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: b6 26 f9 70
d2 0c 37 2a 2d 02 2c 99 9e dc 64 df
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 156
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 156 bytes for
quick_outI1 through eth0:500 to 202.12.0.29:500 (using #3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 6a 42
64 3a 00 00 00 9c c5 35 8b 18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a1 3c 34 57 dd 94
53 98 be ea 26 a9 11 bb f2 87
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 60 7a 87 19 65 c9
3f 43 14 be 8a ba 0b 4a d3 59
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2e 31 d2 32 c1 c8
9f 59 0e 4d 81 f5 a5 46 0a 60
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5a cf 6f d0 0e 86
df 1c 7f 30 d9 4c 7d 1d a6 dd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1a c5 97 78 2d 95
c9 05 10 2e a5 8a 84 9c f0 68
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 48 d1 96 68 2f 27
a5 8e f6 7b 89 77 7d e2 c0 6b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 78 c4 84 66 31 a7
67 27 5f 09 e0 03 b6 26 f9 70
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | d2 0c 37 2a 2d 02
2c 99 9e dc 64 df
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 172 bytes
from 202.12.0.29:500 on eth0 (port=500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 4e 3a
b9 9c 00 00 00 ac 8b f6 7d f2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 61 f9 8f 8b 98 8b
40 cb e5 a9 92 65 17 e9 ca f7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ca df f4 f8 06
0c b0 49 3d 57 fe af c0 fe af
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 96 82 a2 36 ef dc
53 2b cd bd 4a 1c a5 92 ef 78
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0a 80 e3 10 c9 e6
35 57 3c af 29 2d 44 2c 56 8c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8c 30 a8 10 a7 87
a8 0b c7 4d 9d c3 cc 3c 39 43
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 65 d3 8c ef 9b 82
8b 37 01 b1 59 45 cf dd 1d d7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2c ee 96 63 a2 ba
2d 97 e8 4f f2 b8 6d cc cf 9e
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2c 98 14 7b cd 52
51 68 4f f2 af bd 14 69 e0 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 43 80 e0 ed 6f 84
44 28 71 f4 a6 a8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 4e 3a
b9 9c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 172
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing
version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #3, provided msgid 4e3ab99c vs 6a42643a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #2, provided msgid 4e3ab99c vs 4e3ab99c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #2
found, in STATE_QUICK_I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 144 bytes
using algorithm OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 00 00 18 78 e7
aa b2 53 f0 cb f7 f2 42 ca d8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 21 ea 51 06 ef 3c
da a4 0a 00 00 34 00 00 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 28 01 03 04 01 31 fd c4 37
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 1c 01 0c
00 00 80 04 00 01 80 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 02 02 58 80 05
00 02 80 06 01 00 05 00 00 18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 44 94 2c da 61 4a
8a 1e 55 f5 d0 42 55 c8 5c fd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 41 e5 3d 45 05 00
00 10 04 00 00 00 ac 1e 01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ff ff 00 00 00
00 10 04 00 00 00 ca 0c 00 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ff ff c0 00 00
00 00 00 00 00 00 00 00 00 0b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 14 69 e0 3d
43 80 e0 ed 6f 84 44 28 71 f4 a6 a8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ac 1e 01
00 ff ff ff 00 00 00 00 10 04 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ca 0c 00
40 ff ff ff c0 00 00 00 00 00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 4e 3a
b9 9c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(2) computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 78 e7 aa b2 53 f0
cb f7 f2 42 ca d8 21 ea 51 06
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ef 3c da a4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_IPSEC_ESP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parsing 4 raw bytes
of ISAKMP Proposal Payload into SPI
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI 31 fd c4 37
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ESP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
ESP_AES
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
ENCAPSULATION_MODE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
ENCAPSULATION_MODE_TUNNEL]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
SA_LIFE_TYPE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 600
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
AUTH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
AUTH_ALGORITHM_HMAC_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,256): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client is subnet
172.30.1.0/24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client
protocol/port is 0/0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client is subnet
202.12.0.64/26
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client
protocol/port is 0/0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed: 92
eb 81 64 ea 34 41 86 3a 03 fc 37 e0 09 5c 76
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed: 4c
df 11 f5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP enc)=32
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP auth)=52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP KEYMAT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | KEYMAT computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9d c5 62 05 74 37
e3 bc 7d be 42 17 17 42 22 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 b9 df 6b 7e 56
c7 4b 70 80 fd 2c 51 30 8e c7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 87 44 fd f1 e6 9d
e9 cf 33 91 bd aa da ef aa 9f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8a 4d 33 25
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Peer KEYMAT
computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c5 d6 4f 1a 17 97
5d 1d 45 18 47 ea 37 15 2a 9f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8d 46 45 fa 8e 33
df ba 91 43 59 98 80 c7 b2 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | d7 f9 9f d5 7b be
17 cf 68 45 83 b2 53 df b7 60
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1f 2e 24 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | install_ipsec_sa()
for #2: inbound and outbound
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" prospective erouted: self; eroute owner: self
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet64 (kind=CK_PERMANENT)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: c5 d6 4f
1a 17 97 5d 1d 45 18 47 ea 37 15 2a 9f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 8d 46 45
fa 8e 33 df ba 91 43 59 98 80 c7 b2 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: d7 f9
9f d5 7b be 17 cf 68 45 83 b2 53 df b7 60
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 1f 2e
24 36
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up outoing SA,
ref=0/4294901761
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 9d c5 62
05 74 37 e3 bc 7d be 42 17 17 42 22 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: a8 b9 df
6b 7e 56 c7 4b 70 80 fd 2c 51 30 8e c7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 87 44
fd f1 e6 9d e9 cf 33 91 bd aa da ef aa 9f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 8a 4d
33 25
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | add inbound eroute
202.12.0.64/26:0 --0-> 172.30.1.0/24:0 => tun.10000 at 172.30.1.7
(raw_eroute)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up incoming SA,
ref=0/4294901761
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sr for #2:
prospective erouted
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" prospective erouted: self; eroute owner: self
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet64 (next: none) ero:nzta-subnet64 esr:{(nil)}
ro:nzta-subnet64 rosr:{(nil)} and state: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eroute_connection
replace eroute 172.30.1.0/24:0 --0-> 202.12.0.64/26:0 =>
tun.0 at 202.12.0.29 (raw_eroute)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
up-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing up-client:
2>&1 PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME='' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 662
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64':
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL=':
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202.1:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 400):2.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64' PLUTO_PEER_CLIENT_MASK='255.255.2:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):55.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_STACK:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 560):='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH_USER:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):NAME=''
ipsec _updown:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
instance "nzta-subnet64", setting eroute_owner
{spd=0x8345f60,sr=0x8345f60} to #2 (was #0) (newest_ipsec_sa=#0)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 18 92 eb
81 64 ea 34 41 86 3a 03 fc 37
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | e0 09 5c 76 4c df
11 f5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 14 69 e0 3d 43 80
e0 ed 6f 84 44 28 71 f4 a6 a8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 32 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: d1 4f da 2f
73 c1 37 48 db 25 15 53 14 b2 75 cd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 60
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inR1_outI2: instance
nzta-subnet64[0], setting newest_ipsec_sa to #2 (was #0) (spd.eroute=#2)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 60 bytes for
STATE_QUICK_I1 through eth0:500 to 202.12.0.29:500 (using #2)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 4e 3a
b9 9c 00 00 00 3c 2c 56 dc 7d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 69 15 6c c4 bf 2f
1a 2f e7 ae d6 9e d1 4f da 2f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 73 c1 37 48 db 25
15 53 14 b2 75 cd
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_EXPIRE, timeout in 600 seconds for #2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_PENDING_PHASE2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0x31fdc437 <0x2414019f xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none
DPD=none}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 172 bytes
from 202.12.0.29:500 on eth0 (port=500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 6a 42
64 3a 00 00 00 ac cb 50 bc fa
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 86 13 66 bb 2d 20
98 e5 96 bb d2 43 d8 bc db 23
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6c ec 06 06 65 d8
a9 ca 8e a1 cf db a3 1d 88 97
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 50 4b 19 1a b2 7b
93 5a 3d d4 99 70 36 a8 f2 0b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2d 43 ec cd a0 a6
f8 05 8c e8 f6 e3 6f f3 0a f1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6d 80 ef f2 59 3e
99 e5 90 9b c7 96 7d 1f bb b4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 40 a0 55 8e eb b1
e6 90 23 cc 5b 8b d7 20 b9 99
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9a fa 40 f4 6b ae
a5 a8 f7 f8 98 7d 88 83 20 17
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0b 41 d5 7f 15 ab
ff ef 1e fe 73 49 87 bc 8e e5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ed 7f 4f d3 a1 60
94 fa 69 7f 44 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 6a 42
64 3a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 172
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing
version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #3, provided msgid 6a42643a vs 6a42643a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #3
found, in STATE_QUICK_I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 144 bytes
using algorithm OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 00 00 18 12 f7
bb 7e 6a 0a 34 c3 60 96 6b 1d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ad 9a bb 90 ef 50
20 c9 0a 00 00 34 00 00 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 28 01 03 04 01 2a 8f 08 f0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 1c 01 0c
00 00 80 04 00 01 80 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 02 02 58 80 05
00 02 80 06 01 00 05 00 00 18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 67 eb 00 0c e5 21
f3 eb d1 39 c2 ae 1a da 13 10
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 19 e5 5f 0c 05 00
00 10 04 00 00 00 ac 1e 01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ff ff 00 00 00
00 10 04 00 00 00 ca 0c 00 80
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ff ff c0 00 00
00 00 00 00 00 00 00 00 00 0b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 87 bc 8e e5
ed 7f 4f d3 a1 60 94 fa 69 7f 44 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ac 1e 01
00 ff ff ff 00 00 00 00 10 04 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ca 0c 00
80 ff ff ff c0 00 00 00 00 00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: 6a 42
64 3a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(2) computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 12 f7 bb 7e 6a 0a
34 c3 60 96 6b 1d ad 9a bb 90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ef 50 20 c9
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_IPSEC_ESP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parsing 4 raw bytes
of ISAKMP Proposal Payload into SPI
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI 2a 8f 08 f0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ESP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
ESP_AES
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
ENCAPSULATION_MODE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
ENCAPSULATION_MODE_TUNNEL]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
SA_LIFE_TYPE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 600
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
AUTH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
AUTH_ALGORITHM_HMAC_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,256): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client is subnet
172.30.1.0/24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client
protocol/port is 0/0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client is subnet
202.12.0.128/26
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client
protocol/port is 0/0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed: b8
63 67 5f 03 4c 18 7b ca bb 40 66 c3 b8 7e 3c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed: ae
4f e3 db
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP enc)=32
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP auth)=52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP KEYMAT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | KEYMAT computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 02 13 e4 e4 01 f3
b7 3c c0 59 9d be 6d 9c d8 c7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0a 75 ac e4 6d 42
8a 42 d7 d8 d6 47 ee 75 7d f1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 7c 8d 23 1a fc 9e
6a 67 e3 3b 04 a7 b7 e3 06 66
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 10 90 9b af
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Peer KEYMAT
computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8c 5a 59 73 69 18
de c6 10 8f 1a 10 8c aa 9d 04
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eb b1 cf 3f f9 63
9b 54 c0 06 89 bd d0 d8 2a 35
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9b 0f fa 39 70 2a
d1 7a 6e 05 d3 f0 09 d9 18 b6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | f1 f4 7b 45
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | install_ipsec_sa()
for #3: inbound and outbound
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" prospective erouted: self; eroute owner: self
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet128 (kind=CK_PERMANENT)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 8c 5a 59
73 69 18 de c6 10 8f 1a 10 8c aa 9d 04
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: eb b1 cf
3f f9 63 9b 54 c0 06 89 bd d0 d8 2a 35
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 9b 0f
fa 39 70 2a d1 7a 6e 05 d3 f0 09 d9 18 b6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: f1 f4
7b 45
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up outoing SA,
ref=0/4294901761
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 02 13 e4
e4 01 f3 b7 3c c0 59 9d be 6d 9c d8 c7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 0a 75 ac
e4 6d 42 8a 42 d7 d8 d6 47 ee 75 7d f1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 7c 8d
23 1a fc 9e 6a 67 e3 3b 04 a7 b7 e3 06 66
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 10 90
9b af
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | add inbound eroute
202.12.0.128/26:0 --0-> 172.30.1.0/24:0 => tun.10000 at 172.30.1.7
(raw_eroute)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up incoming SA,
ref=0/4294901761
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sr for #3:
prospective erouted
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" prospective erouted: self; eroute owner: self
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet128 (next: none) ero:nzta-subnet128 esr:{(nil)}
ro:nzta-subnet128 rosr:{(nil)} and state: 3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eroute_connection
replace eroute 172.30.1.0/24:0 --0-> 202.12.0.128/26:0 =>
tun.0 at 202.12.0.29 (raw_eroute)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
up-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing up-client:
2>&1 PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME='' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 665
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.3:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):0.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL=:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):'0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202.:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.25:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):5.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_ST:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):ACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_U:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):SERNAME=''
ipsec _updown:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
instance "nzta-subnet128", setting eroute_owner
{spd=0x834b1b8,sr=0x834b1b8} to #3 (was #0) (newest_ipsec_sa=#0)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 18 b8 63
67 5f 03 4c 18 7b ca bb 40 66
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c3 b8 7e 3c ae 4f
e3 db
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 87 bc 8e e5 ed 7f
4f d3 a1 60 94 fa 69 7f 44 ee
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 32 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 78 df a5 d1
7e f5 b6 32 fa e1 cf 4b c9 94 9d 95
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 60
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inR1_outI2: instance
nzta-subnet128[0], setting newest_ipsec_sa to #3 (was #0)
(spd.eroute=#3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 60 bytes for
STATE_QUICK_I1 through eth0:500 to 202.12.0.29:500 (using #3)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 6a 42
64 3a 00 00 00 3c 5a 20 b7 ad
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 05 55 48 9e 14 d9
24 05 ab 93 29 ca 78 df a5 d1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 7e f5 b6 32 fa e1
cf 4b c9 94 9d 95
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_EXPIRE, timeout in 600 seconds for #3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_PENDING_PHASE2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0x2a8f08f0 <0x8ee723cb xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none
DPD=none}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | duplicating state
object #1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#4 at 0x8358aa0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #4 on chain 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1
msgid:05b5d8bb proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_nonce op id: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 56 80 df 22 37 28
1b e6 a8 f3 f6 e3 5b e3 0b 92
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192":
pluto_do_crypto: helper (-1) is exiting
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | quick outI1:
calculated ke+nonce, sending I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: bb d8
b5 05
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_IPSEC_ESP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | netlink_get_spi:
allocated 0x834313d for esp.0 at 172.30.1.7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of SPI into ISAKMP Proposal Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI 08 34 31 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ESP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
ESP_AES
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
ENCAPSULATION_MODE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
ENCAPSULATION_MODE_TUNNEL]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
SA_LIFE_TYPE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 600
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
AUTH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
AUTH_ALGORITHM_HMAC_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ESP): 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni 56 80 df 22 37
28 1b e6 a8 f3 f6 e3 5b e3 0b 92
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network ac 1e
01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask ff ff ff
00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network ca 0c
00 c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask ff ff ff
c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(1) computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 74 63 1d 4d ed 58
7b e9 d8 9b 98 8e cd af 24 a9
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 83 78 e4 cf
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | last Phase 1 IV: 99
9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c9 9c 8e 32 c0 6d
3e 53 4d 74 44 07 61 cf 8c 53
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 85 58 e8 d8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 00 00 18 74 63
1d 4d ed 58 7b e9 d8 9b 98 8e
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cd af 24 a9 83 78
e4 cf 0a 00 00 34 00 00 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 28 00 03 04 01 08 34 31 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 1c 00 0c
00 00 80 04 00 01 80 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 02 02 58 80 05
00 02 80 06 01 00 05 00 00 14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 56 80 df 22 37 28
1b e6 a8 f3 f6 e3 5b e3 0b 92
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 05 00 00 10 04 00
00 00 ac 1e 01 00 ff ff ff 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 10 04 00
00 00 ca 0c 00 c0 ff ff ff c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c9 9c 8e 32 c0 6d
3e 53 4d 74 44 07 61 cf 8c 53
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 85 58 e8 d8
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 128
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 128 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 06 96 31 98
4c 53 98 6e ff 8b 77 ee c7 cb 24 1b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 156
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 156 bytes for
quick_outI1 through eth0:500 to 202.12.0.29:500 (using #4)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 bb d8
b5 05 00 00 00 9c 2d 85 d8 d6
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5a 1d 1a 79 4b 53
fc 83 83 08 4d b5 86 c4 e5 b0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 47 a7 2d de 89 b9
ef 4d a4 ea c1 a6 6d 7c ea 92
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | df 83 49 9f 77 58
b4 60 7a 36 2b 8d b5 f6 48 76
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | da b2 90 d2 b4 38
98 81 b7 44 5a f9 c4 83 be ef
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 5b 58 9e 3f 7e 6c
53 63 fb 35 9f 61 04 11 23 0d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8b 0f 94 e1 ef 2e
47 0d b4 a6 59 ef 32 04 85 66
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ed d6 d8 87 2c 10
0b 29 44 36 a6 1f 06 96 31 98
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 4c 53 98 6e ff 8b
77 ee c7 cb 24 1b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 172 bytes
from 202.12.0.29:500 on eth0 (port=500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 bb d8
b5 05 00 00 00 ac c2 e8 85 3d
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6a e6 72 6f b9 d6
c6 5d 18 82 bd c4 c7 0a cb 45
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 8b 7a 2a 86 83 0b
5b b3 43 68 90 0d e4 d2 42 5a
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 38 cb 28 86 d5
08 c2 f5 8c eb 49 c7 c0 6a 44
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 4a 11 fb 51 0c 07
87 d4 9e 75 50 01 12 23 1f 50
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | dd d1 98 2a 7a 87
81 99 b5 e7 a5 a5 ff 63 45 d9
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 3e 26 6c 5b 78 e3
19 d6 10 83 ed 46 31 be 5e 93
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 57 29 61 6b f8 de
45 fa 00 b0 dc 98 1f 1a 1d 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 96 88 ef 68 2b 53
3d 70 9b 55 75 6a 6d 0b 3b 67
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 67 b6 08 1f 93 25
e4 7c 63 c5 5d d7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: bb d8
b5 05
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 172
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing
version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #4, provided msgid bbd8b505 vs bbd8b505
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #4
found, in STATE_QUICK_I1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 144 bytes
using algorithm OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 01 00 00 18 50 97
23 69 d0 88 8b 45 e2 8a 00 f5
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | f0 d4 90 14 d0 ef
66 b7 0a 00 00 34 00 00 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 01 00 00
00 28 01 03 04 01 b7 e2 1a 6c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 1c 01 0c
00 00 80 04 00 01 80 01 00 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 80 02 02 58 80 05
00 02 80 06 01 00 05 00 00 18
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | f5 e3 2e 47 c4 a0
cb 39 09 56 73 63 24 6e 32 bf
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 18 1a fd 71 05 00
00 10 04 00 00 00 ac 1e 01 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ff ff 00 00 00
00 10 04 00 00 00 ca 0c 00 c0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ff ff ff c0 00 00
00 00 00 00 00 00 00 00 00 0b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 6d 0b 3b 67
67 b6 08 1f 93 25 e4 7c 63 c5 5d d7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_SA
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONCE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_ID
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ac 1e 01
00 ff ff ff 00 00 00 00 10 04 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 16
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ID type:
ID_IPV4_ADDR_SUBNET
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Protocol ID: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | port: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | obj: ca 0c 00
c0 ff ff ff c0 00 00 00 00 00 00 00 00
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_QUICK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | message ID: bb d8
b5 05
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(2) computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 50 97 23 69 d0 88
8b 45 e2 8a 00 f5 f0 d4 90 14
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | d0 ef 66 b7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPsec DOI SIT:
SIT_IDENTITY_ONLY
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 40
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | proposal number: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | protocol ID:
PROTO_IPSEC_ESP
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | number of
transforms: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parsing 4 raw bytes
of ISAKMP Proposal Payload into SPI
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI b7 e2 1a 6c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ESP):
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length: 28
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform number:
1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | transform ID:
ESP_AES
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
ENCAPSULATION_MODE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
ENCAPSULATION_MODE_TUNNEL]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_TYPE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [1 is
SA_LIFE_TYPE_SECONDS]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
SA_LIFE_DURATION
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 600
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
AUTH_ALGORITHM
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | [2 is
AUTH_ALGORITHM_HMAC_SHA1]
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | af+type:
KEY_LENGTH
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | length/value: 256
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,256): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client is subnet
172.30.1.0/24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client
protocol/port is 0/0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client is subnet
202.12.0.192/26
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client
protocol/port is 0/0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed: ed
ff 94 bb 25 c2 ac 00 5d 7c e2 64 0d 51 95 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed: 91
b6 81 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP enc)=32
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP auth)=52
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP KEYMAT
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | KEYMAT computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 72 d4 9e dc 6c 25
44 04 7e e8 ec de 49 50 ac 6b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 13 d8 08 41 99 89
4d 98 fa 86 f9 3c 2b 63 9b 6f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | df c6 9a 71 be 5e
82 a5 98 91 2c 88 5a 84 ed 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9b 68 b9 66
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Peer KEYMAT
computed:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6c fb aa 0e 2e 38
26 d0 29 a2 69 7e 93 54 17 35
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 38 99 ba 63 0d 96
fd b5 18 6e 0a 95 19 18 78 61
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 98 69 a7 de aa 8d
fa b2 ce c9 70 be c8 81 32 b3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 9f df 57 96
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | install_ipsec_sa()
for #4: inbound and outbound
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" prospective erouted: self; eroute owner: self
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet192 (kind=CK_PERMANENT)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 6c fb aa
0e 2e 38 26 d0 29 a2 69 7e 93 54 17 35
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 38 99 ba
63 0d 96 fd b5 18 6e 0a 95 19 18 78 61
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 98 69
a7 de aa 8d fa b2 ce c9 70 be c8 81 32 b3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 9f df
57 96
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up outoing SA,
ref=0/4294901761
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 72 d4 9e
dc 6c 25 44 04 7e e8 ec de 49 50 ac 6b
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey: 13 d8 08
41 99 89 4d 98 fa 86 f9 3c 2b 63 9b 6f
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: df c6
9a 71 be 5e 82 a5 98 91 2c 88 5a 84 ed 01
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey: 9b 68
b9 66
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | add inbound eroute
202.12.0.192/26:0 --0-> 172.30.1.0/24:0 => tun.10000 at 172.30.1.7
(raw_eroute)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up incoming SA,
ref=0/4294901761
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sr for #4:
prospective erouted
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" prospective erouted: self; eroute owner: self
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet192 (next: none) ero:nzta-subnet192 esr:{(nil)}
ro:nzta-subnet192 rosr:{(nil)} and state: 4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eroute_connection
replace eroute 172.30.1.0/24:0 --0-> 202.12.0.192/26:0 =>
tun.0 at 202.12.0.29 (raw_eroute)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
up-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing up-client:
2>&1 PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME='' ipsec _updown
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 665
chars long
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 80):'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.3:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):0.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL=:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):'0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202.:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.25:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):5.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_ST:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):ACK='netkey' PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_U:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):SERNAME=''
ipsec _updown:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
instance "nzta-subnet192", setting eroute_owner
{spd=0x834c360,sr=0x834c360} to #4 (was #0) (newest_ipsec_sa=#0)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 00 00 00 18 ed ff
94 bb 25 c2 ac 00 5d 7c e2 64
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 0d 51 95 01 91 b6
81 c4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 6d 0b 3b 67 67 b6
08 1f 93 25 e4 7c 63 c5 5d d7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 24
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 32 using
OAKLEY_AES_CBC
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV: 20 b6 92 c9
38 07 c5 e9 af 7f 95 63 da 94 c3 0c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 60
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inR1_outI2: instance
nzta-subnet192[0], setting newest_ipsec_sa to #4 (was #0)
(spd.eroute=#4)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 60 bytes for
STATE_QUICK_I1 through eth0:500 to 202.12.0.29:500 (using #4)
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 08 10 20 01 bb d8
b5 05 00 00 00 3c 00 40 db d7
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | c2 ae 8a c5 0b 99
9c 5c 1f 8a 91 6f 20 b6 92 c9
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 38 07 c5 e9 af 7f
95 63 da 94 c3 0c
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_EXPIRE, timeout in 600 seconds for #4
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_PENDING_PHASE2
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0xb7e21a6c <0x0834313d xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none
DPD=none}
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2a8f08f0 at 202.12.0.29
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.8ee723cb at 172.30.1.7
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.b7e21a6c at 202.12.0.29
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.834313d at 172.30.1.7
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.31fdc437 at 202.12.0.29
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2414019f at 172.30.1.7
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2a8f08f0 at 202.12.0.29
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.8ee723cb at 172.30.1.7
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.b7e21a6c at 202.12.0.29
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.834313d at 172.30.1.7
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.31fdc437 at 202.12.0.29
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2414019f at 172.30.1.7
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds
Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds
Apr 13 20:35:02 vps-itelematics007 pluto[26771]: |
Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 102 seconds
Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 102 seconds
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: |
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -1 seconds
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 480 seconds
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: |
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -3 seconds
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 357 seconds
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: |
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -2 seconds
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 235 seconds
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: |
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -2 seconds
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 113 seconds
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | event added after
event EVENT_SA_EXPIRE for #2
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | next event
EVENT_SA_EXPIRE in 113 seconds for #4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next event
EVENT_SA_EXPIRE in -2 seconds for #4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | handling event
EVENT_SA_EXPIRE
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in -2 seconds
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
IPsec SA expired (LATEST!)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting state #4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_INFO
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | message ID: 39 59
ce 47
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_D
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH(1) into ISAKMP Hash Payload
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Delete
Payload:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | protocol ID: 3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | number of SPIs: 1
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of delete payload into ISAKMP Delete Payload
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete payload 08 34
31 3d
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Delete Payload: 16
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | HASH(1) computed:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ee fa 87 db 6f 71
b8 a2 44 e5 03 3e 5f 8a db 8b
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 74 01 e2 ff
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | last Phase 1 IV: 99
9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | bc 36 29 ca 51 cf
dd 68 d2 47 51 12 94 75 5c 85
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 7e a6 0e 36
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 0c 00 00 18 ee fa
87 db 6f 71 b8 a2 44 e5 03 3e
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 5f 8a db 8b 74 01
e2 ff 00 00 00 10 00 00 00 01
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 03 04 00 01 08 34
31 3d
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | bc 36 29 ca 51 cf
dd 68 d2 47 51 12 94 75 5c 85
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 7e a6 0e 36
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | unpadded size is: 40
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next IV: 8a 92 a9 10
de bc 37 9a 10 b3 01 41 2c 54 7f 76
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | sending 76 bytes for
delete notify through eth0:500 to 202.12.0.29:500 (using #1)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 08 10 05 01 39 59
ce 47 00 00 00 4c de f6 fc 3b
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 53 e0 70 eb f1 a3
9d 5c f7 b5 59 83 af 0a b6 1e
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 85 7b a8 e8 71 e4
50 86 1c d8 37 91 8a 92 a9 10
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | de bc 37 9a 10 b3
01 41 2c 54 7f 76
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting event for #4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | no suspended
cryptographic state for 4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | command executing
down-client
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | executing
down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME='' ipsec _updown
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | popen(): cmd is 667
chars long
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet1:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 80):92'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLU:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
160):TO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 240):.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCO:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 320):L='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='20:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
400):2.12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
480):255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO_:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
560):STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
640):_USERNAME='' ipsec _updown:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | request to replace
with shunt a prospective erouted policy with netkey kernel ---
experimental
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.b7e21a6c at 202.12.0.29
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete inbound eroute
202.12.0.192/26:0 --0-> 172.30.1.0/24:0 => unk255.10000 at 172.30.1.7
(raw_eroute)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.834313d at 172.30.1.7
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | handling event
EVENT_SA_EXPIRE
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in -2 seconds
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
IPsec SA expired (LATEST!)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting state #3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_INFO
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | message ID: 97 1c
28 50
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_D
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH(1) into ISAKMP Hash Payload
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Delete
Payload:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | protocol ID: 3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | number of SPIs: 1
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of delete payload into ISAKMP Delete Payload
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete payload 8e e7
23 cb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Delete Payload: 16
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | HASH(1) computed:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 9c 14 6c c5 95 c3
a6 16 dc e8 0a 6c 4c 8a 39 f4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 43 1f 87 1d
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | last Phase 1 IV: 99
9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 90 32 31 e5 57 93
97 f3 61 49 77 dc 86 cd 3e 3c
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 08 f6 99 d0
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 0c 00 00 18 9c 14
6c c5 95 c3 a6 16 dc e8 0a 6c
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 4c 8a 39 f4 43 1f
87 1d 00 00 00 10 00 00 00 01
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 03 04 00 01 8e e7
23 cb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 90 32 31 e5 57 93
97 f3 61 49 77 dc 86 cd 3e 3c
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 08 f6 99 d0
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | unpadded size is: 40
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next IV: 0f ea 70 50
56 c4 89 9c a8 7f 8f d4 89 9b 6d b4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | sending 76 bytes for
delete notify through eth0:500 to 202.12.0.29:500 (using #1)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 08 10 05 01 97 1c
28 50 00 00 00 4c bc 66 8d d3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 82 56 d2 0a 0b df
19 bd 41 24 e3 44 ec 96 6b 60
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 0c 2c 57 b0 88 02
35 88 4b 26 23 df 0f ea 70 50
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 56 c4 89 9c a8 7f
8f d4 89 9b 6d b4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting event for #3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | no suspended
cryptographic state for 3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | command executing
down-client
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | executing
down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME='' ipsec _updown
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | popen(): cmd is 667
chars long
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet1:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 80):28'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLU:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
160):TO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 240):.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCO:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 320):L='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='20:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
400):2.12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
480):255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO_:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
560):STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
640):_USERNAME='' ipsec _updown:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | request to replace
with shunt a prospective erouted policy with netkey kernel ---
experimental
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.2a8f08f0 at 202.12.0.29
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete inbound eroute
202.12.0.128/26:0 --0-> 172.30.1.0/24:0 => unk255.10000 at 172.30.1.7
(raw_eroute)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.8ee723cb at 172.30.1.7
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | handling event
EVENT_SA_EXPIRE
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | event after this is
EVENT_PENDING_PHASE2 in 5 seconds
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
IPsec SA expired (LATEST!)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting state #2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | initiator cookie:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | responder cookie:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 6b d7 b6 36 bc b8
4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_HASH
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ISAKMP version:
ISAKMP Version 1.0 (rfc2407)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | exchange type:
ISAKMP_XCHG_INFO
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | flags:
ISAKMP_FLAG_ENCRYPTION
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | message ID: bd 01
ef cb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_D
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH(1) into ISAKMP Hash Payload
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Delete
Payload:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next payload type:
ISAKMP_NEXT_NONE
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | DOI:
ISAKMP_DOI_IPSEC
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | protocol ID: 3
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | SPI size: 4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | number of SPIs: 1
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of delete payload into ISAKMP Delete Payload
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete payload 24 14
01 9f
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Delete Payload: 16
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | HASH(1) computed:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a9 dc e7 64 0b 6c
6c 24 0d 5e 56 dc 09 e0 35 34
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 84 af 89 63
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | last Phase 1 IV: 99
9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94 57 8b f3 40 a3 95 37 06 9c 55 04 d2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 init start
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 final end
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 38 80 83 d8 e2 6f
70 6d 41 af d1 23 ea ce 94 cb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 27 01 45 ed
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 0c 00 00 18 a9 dc
e7 64 0b 6c 6c 24 0d 5e 56 dc
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 09 e0 35 34 84 af
89 63 00 00 00 10 00 00 00 01
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 03 04 00 01 24 14
01 9f
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | IV:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 38 80 83 d8 e2 6f
70 6d 41 af d1 23 ea ce 94 cb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 27 01 45 ed
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | unpadded size is: 40
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: enter
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: exit
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next IV: e5 b8 8f 2b
a4 b6 bf de 37 c0 5c 56 c5 35 f1 eb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | sending 76 bytes for
delete notify through eth0:500 to 202.12.0.29:500 (using #1)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a8 dd 33 ac 9b 1c
d9 c4 6b d7 b6 36 bc b8 4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 08 10 05 01 bd 01
ef cb 00 00 00 4c 88 ef 47 1c
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 26 11 a3 b2 4f ed
da b0 46 4e e5 be 87 2b 28 e9
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | 90 7c 5f 84 72 89
87 d7 2f 65 63 9a e5 b8 8f 2b
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | a4 b6 bf de 37 c0
5c 56 c5 35 f1 eb
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting event for #2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | no suspended
cryptographic state for 2
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ICOOKIE: a8 dd 33 ac
9b 1c d9 c4
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | RCOOKIE: 6b d7 b6 36
bc b8 4f 20
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | state hash entry 27
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | command executing
down-client
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | executing
down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME='' ipsec _updown
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | popen(): cmd is 664
chars long
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 0):2>&1
PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet6:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 80):4'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUT:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
160):O_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 240):30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 320):='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
400):.12.0.64/26' PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 480):.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STA:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 560):CK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH_US:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 640):ERNAME=''
ipsec _updown:
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | request to replace
with shunt a prospective erouted policy with netkey kernel ---
experimental
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.31fdc437 at 202.12.0.29
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete inbound eroute
202.12.0.64/26:0 --0-> 172.30.1.0/24:0 => unk255.10000 at 172.30.1.7
(raw_eroute)
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | raw_eroute result=1
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.2414019f at 172.30.1.7
Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 5 seconds
Apr 13 20:44:48 vps-itelematics007 pluto[26771]: |
Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 4 seconds
Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 4 seconds
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: |
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 0 seconds
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | event after this is
EVENT_REINIT_SECRET in 2992 seconds
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds
Apr 13 20:45:20 vps-itelematics007 pluto[26771]: |
Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 92 seconds
Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 92 seconds
Apr 13 20:45:53 vps-itelematics007 pluto[26771]: |
Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 59 seconds
Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 59 seconds
Apr 13 20:46:25 vps-itelematics007 pluto[26771]: |
Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 27 seconds
Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 27 seconds
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: |
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -1 seconds
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | event after this is
EVENT_REINIT_SECRET in 2871 seconds
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds
Apr 13 20:46:58 vps-itelematics007 pluto[26771]: |
Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 115 seconds
Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 115 seconds
Apr 13 20:47:31 vps-itelematics007 pluto[26771]: |
Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 82 seconds
Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 82 seconds
Apr 13 20:48:03 vps-itelematics007 pluto[26771]: |
Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 50 seconds
Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 50 seconds
Apr 13 20:48:36 vps-itelematics007 pluto[26771]: |
Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 17 seconds
Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 17 seconds
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: |
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 0 seconds
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | *time to handle event
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | event after this is
EVENT_REINIT_SECRET in 2751 seconds
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | event added at head
of queue
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked
Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds
Apr 13 20:49:08 vps-itelematics007 pluto[26771]: |
Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | *received kernel
message
Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message
Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 105 seconds
Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 105 seconds
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | *received whack
message
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds
Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds
+ _________________________ date
+ date
Wed Apr 13 20:49:48 NZST 2011
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20110413/7a3a03c2/attachment-0001.html
More information about the Users
mailing list