[Openswan Users] Checkpoint <->Openswan tunnels stop forwarding

Ben Martel benm at ingenitech.co.nz
Wed Apr 13 05:00:08 EDT 2011


Hi all,

 

I have a problem whereby successful tunnels are created between a Linux
host and a Checkpoint Firewall but after a period of time the tunnels
stop forwarding traffic. The offending end appears to the be the remote
Checkpoint device.

 

We have wound the lifetimes down very low in order to force the problem
to occur more often in the hope of finding what the cause is.  Any ideas
anyone? 

 

Below is the output of 'ipsec barf' when the tunnels are no longer
forwarding.

 

  ~benm

 

Wed Apr 13 20:49:47 NZST 2011

+ _________________________ version

+ ipsec --version

Linux Openswan U2.6.21/K2.6.18-194.32.1.el5 (netkey)

See `ipsec --copyright' for copyright information.

+ _________________________ /proc/version

+ cat /proc/version

Linux version 2.6.18-194.32.1.el5 (mockbuild at builder10.centos.org) (gcc
version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Wed Jan 5 17:53:09 EST
2011

+ _________________________ /proc/net/ipsec_eroute

+ test -r /proc/net/ipsec_eroute

+ _________________________ netstat-rn

+ netstat -nr

+ head -n 100

Kernel IP routing table

Destination     Gateway         Genmask         Flags   MSS Window  irtt
Iface

172.30.1.0      0.0.0.0         255.255.255.0   U         0 0          0
eth0

169.254.0.0     0.0.0.0         255.255.0.0     U         0 0          0
eth0

0.0.0.0         172.30.1.1      0.0.0.0         UG        0 0          0
eth0

+ _________________________ /proc/net/ipsec_spi

+ test -r /proc/net/ipsec_spi

+ _________________________ /proc/net/ipsec_spigrp

+ test -r /proc/net/ipsec_spigrp

+ _________________________ /proc/net/ipsec_tncfg

+ test -r /proc/net/ipsec_tncfg

+ _________________________ /proc/net/pfkey

+ test -r /proc/net/pfkey

+ cat /proc/net/pfkey

sk       RefCnt Rmem   Wmem   User   Inode

+ _________________________ ip-xfrm-state

+ ip xfrm state

+ _________________________ ip-xfrm-policy

+ ip xfrm policy

src 172.30.1.0/24 dst 202.12.0.64/26 

        dir out priority 2342 

        tmpl src 0.0.0.0 dst 0.0.0.0

                proto esp reqid 0 mode transport

src 172.30.1.0/24 dst 202.12.0.128/26 

        dir out priority 2342 

        tmpl src 0.0.0.0 dst 0.0.0.0

                proto esp reqid 0 mode transport

src 172.30.1.0/24 dst 202.12.0.192/26 

        dir out priority 2342 

        tmpl src 0.0.0.0 dst 0.0.0.0

                proto esp reqid 0 mode transport

src ::/0 dst ::/0 

        dir in priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir in priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir in priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir in priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir in priority 0 

src ::/0 dst ::/0 

        dir out priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir out priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir out priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir out priority 0 

src 0.0.0.0/0 dst 0.0.0.0/0 

        dir out priority 0 

+ _________________________ /proc/crypto

+ test -r /proc/crypto

+ cat /proc/crypto

name         : deflate

driver       : deflate-generic

module       : deflate

priority     : 0

type         : compression

 

name         : tnepres

driver       : tnepres-generic

module       : serpent

priority     : 0

type         : cipher

blocksize    : 16

min keysize  : 0

max keysize  : 32

 

name         : serpent

driver       : serpent-generic

module       : serpent

priority     : 0

type         : cipher

blocksize    : 16

min keysize  : 0

max keysize  : 32

 

name         : blowfish

driver       : blowfish-generic

module       : blowfish

priority     : 0

type         : cipher

blocksize    : 8

min keysize  : 4

max keysize  : 56

 

name         : twofish

driver       : twofish-generic

module       : twofish

priority     : 0

type         : cipher

blocksize    : 16

min keysize  : 16

max keysize  : 32

 

name         : md5

driver       : md5-generic

module       : md5

priority     : 0

type         : digest

blocksize    : 64

digestsize   : 16

 

name         : sha256

driver       : sha256-generic

module       : sha256

priority     : 0

type         : digest

blocksize    : 64

digestsize   : 32

 

name         : sha512

driver       : sha512-generic

module       : sha512

priority     : 0

type         : digest

blocksize    : 128

digestsize   : 64

 

name         : sha384

driver       : sha384-generic

module       : sha512

priority     : 0

type         : digest

blocksize    : 128

digestsize   : 48

 

name         : des3_ede

driver       : des3_ede-generic

module       : des

priority     : 0

type         : cipher

blocksize    : 8

min keysize  : 24

max keysize  : 24

 

name         : des

driver       : des-generic

module       : des

priority     : 0

type         : cipher

blocksize    : 8

min keysize  : 8

max keysize  : 8

 

name         : aes

driver       : aes-generic

module       : aes_generic

priority     : 100

type         : cipher

blocksize    : 16

min keysize  : 16

max keysize  : 32

 

name         : aes

driver       : aes-i586

module       : aes_i586

priority     : 200

type         : cipher

blocksize    : 16

min keysize  : 16

max keysize  : 32

 

name         : crc32c

driver       : crc32c-generic

module       : kernel

priority     : 0

type         : digest

blocksize    : 32

digestsize   : 4

 

name         : sha1

driver       : sha1-generic

module       : kernel

priority     : 0

type         : digest

blocksize    : 64

digestsize   : 20

 

+ __________________________/proc/sys/net/core/xfrm-star

/usr/libexec/ipsec/barf: line 191:
__________________________/proc/sys/net/core/xfrm-star: No such file or
directory

+ for i in '/proc/sys/net/core/xfrm_*'

+ echo -n '/proc/sys/net/core/xfrm_acq_expires: '

/proc/sys/net/core/xfrm_acq_expires: + cat
/proc/sys/net/core/xfrm_acq_expires

30

+ for i in '/proc/sys/net/core/xfrm_*'

+ echo -n '/proc/sys/net/core/xfrm_aevent_etime: '

/proc/sys/net/core/xfrm_aevent_etime: + cat
/proc/sys/net/core/xfrm_aevent_etime

10

+ for i in '/proc/sys/net/core/xfrm_*'

+ echo -n '/proc/sys/net/core/xfrm_aevent_rseqth: '

/proc/sys/net/core/xfrm_aevent_rseqth: + cat
/proc/sys/net/core/xfrm_aevent_rseqth

2

+ for i in '/proc/sys/net/core/xfrm_*'

+ echo -n '/proc/sys/net/core/xfrm_larval_drop: '

/proc/sys/net/core/xfrm_larval_drop: + cat
/proc/sys/net/core/xfrm_larval_drop

0

+ _________________________ /proc/sys/net/ipsec-star

+ test -d /proc/sys/net/ipsec

+ _________________________ ipsec/status

+ ipsec auto --status

000 using kernel interface: netkey

000 interface lo/lo ::1

000 interface lo/lo 127.0.0.1

000 interface lo/lo 127.0.0.1

000 interface eth0/eth0 172.30.1.7

000 interface eth0/eth0 172.30.1.7

000 %myid = (none)

000 debug
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+
pfkey+nattraversal+x509

000  

000 virtual_private (%priv):

000 - allowed 0 subnets: 

000 - disallowed 0 subnets: 

000 WARNING: Either virtual_private= was not specified, or there was a
syntax 

000          error in that line. 'left/rightsubnet=%priv' will not work!

000  

000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64,
keysizemax=64

000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192,
keysizemax=192

000 algorithm ESP encrypt: id=6, name=ESP_CAST, ivlen=8, keysizemin=40,
keysizemax=128

000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8,
keysizemin=40, keysizemax=448

000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0,
keysizemax=0

000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128,
keysizemax=256

000 algorithm ESP encrypt: id=13, name=ESP_AES_CTR, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=14, name=ESP_AES_CCM_A, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=15, name=ESP_AES_CCM_B, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=16, name=ESP_AES_CCM_C, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=18, name=ESP_AES_GCM_A, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=19, name=ESP_AES_GCM_B, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=20, name=ESP_AES_GCM_C, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8,
keysizemin=128, keysizemax=256

000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5,
keysizemin=128, keysizemax=128

000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1,
keysizemin=160, keysizemax=160

000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256,
keysizemin=256, keysizemax=256

000 algorithm ESP auth attr: id=8, name=AUTH_ALGORITHM_HMAC_RIPEMD,
keysizemin=160, keysizemax=160

000 algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_AES_CBC,
keysizemin=128, keysizemax=128

000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0,
keysizemax=0

000  

000 algorithm IKE encrypt: id=0, name=(null), blocksize=16,
keydeflen=131

000 algorithm IKE encrypt: id=3, name=OAKLEY_BLOWFISH_CBC, blocksize=8,
keydeflen=128

000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8,
keydeflen=192

000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16,
keydeflen=128

000 algorithm IKE encrypt: id=65004, name=OAKLEY_SERPENT_CBC,
blocksize=16, keydeflen=128

000 algorithm IKE encrypt: id=65005, name=OAKLEY_TWOFISH_CBC,
blocksize=16, keydeflen=128

000 algorithm IKE encrypt: id=65289, name=OAKLEY_TWOFISH_CBC_SSH,
blocksize=16, keydeflen=128

000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16

000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20

000 algorithm IKE hash: id=4, name=OAKLEY_SHA2_256, hashsize=32

000 algorithm IKE hash: id=6, name=OAKLEY_SHA2_512, hashsize=64

000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024

000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536

000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048

000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072

000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096

000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144

000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192

000  

000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,6,36}
trans={0,6,1080} attrs={0,6,1440} 

000  

000 "nzta-subnet128":
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.128/26; prospective erouted;
eroute owner: #0

000 "nzta-subnet128":     myip=unset; hisip=unset;

000 "nzta-subnet128":   ike_life: 7200s; ipsec_life: 600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0

000 "nzta-subnet128":   policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 24,26; interface:
eth0; 

000 "nzta-subnet128":   newest ISAKMP SA: #0; newest IPsec SA: #0; 

000 "nzta-subnet128":   IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1024(2), AES_CBC(7)_128-MD5(1)-MODP1536(5),
AES_CBC(7)_128-MD5(1)-MODP1024(2); flags=-strict

000 "nzta-subnet128":   IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-2, AES_CBC(7)_128-MD5(1)_128-5,
AES_CBC(7)_128-MD5(1)_128-2, 

000 "nzta-subnet128":   ESP algorithms wanted: AES(12)_256-SHA1(2);
flags=-strict

000 "nzta-subnet128":   ESP algorithms loaded: AES(12)_256-SHA1(2)_160

000 "nzta-subnet192":
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.192/26; prospective erouted;
eroute owner: #0

000 "nzta-subnet192":     myip=unset; hisip=unset;

000 "nzta-subnet192":   ike_life: 7200s; ipsec_life: 600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0

000 "nzta-subnet192":   policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 24,26; interface:
eth0; 

000 "nzta-subnet192":   newest ISAKMP SA: #0; newest IPsec SA: #0; 

000 "nzta-subnet192":   IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1024(2), AES_CBC(7)_128-MD5(1)-MODP1536(5),
AES_CBC(7)_128-MD5(1)-MODP1024(2); flags=-strict

000 "nzta-subnet192":   IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-2, AES_CBC(7)_128-MD5(1)_128-5,
AES_CBC(7)_128-MD5(1)_128-2, 

000 "nzta-subnet192":   ESP algorithms wanted: AES(12)_256-SHA1(2);
flags=-strict

000 "nzta-subnet192":   ESP algorithms loaded: AES(12)_256-SHA1(2)_160

000 "nzta-subnet64":
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.64/26; prospective erouted;
eroute owner: #0

000 "nzta-subnet64":     myip=unset; hisip=unset;

000 "nzta-subnet64":   ike_life: 7200s; ipsec_life: 600s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0

000 "nzta-subnet64":   policy:
PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 24,26; interface:
eth0; 

000 "nzta-subnet64":   newest ISAKMP SA: #1; newest IPsec SA: #0; 

000 "nzta-subnet64":   IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1024(2), AES_CBC(7)_128-MD5(1)-MODP1536(5),
AES_CBC(7)_128-MD5(1)-MODP1024(2); flags=-strict

000 "nzta-subnet64":   IKE algorithms found:
AES_CBC(7)_256-SHA1(2)_160-2, AES_CBC(7)_128-MD5(1)_128-5,
AES_CBC(7)_128-MD5(1)_128-2, 

000 "nzta-subnet64":   IKE algorithm newest: AES_CBC_256-SHA1-MODP1024

000 "nzta-subnet64":   ESP algorithms wanted: AES(12)_256-SHA1(2);
flags=-strict

000 "nzta-subnet64":   ESP algorithms loaded: AES(12)_256-SHA1(2)_160

000  

000 #1: "nzta-subnet64":500 STATE_MAIN_I4 (ISAKMP SA established);
EVENT_SA_REPLACE in 5305s; newest ISAKMP; nodpd; idle; import:admin
initiate

000  

+ _________________________ ifconfig-a

+ ifconfig -a

eth0      Link encap:Ethernet  HWaddr 00:50:56:81:0E:57  

          inet addr:172.30.1.7  Bcast:172.30.1.255  Mask:255.255.255.0

          inet6 addr: fe80::250:56ff:fe81:e57/64 Scope:Link

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:31350267 errors:326 dropped:0 overruns:0 frame:0

          TX packets:5763310 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:1000 

          RX bytes:2686451067 (2.5 GiB)  TX bytes:1049706924 (1001.0
MiB)

          Interrupt:59 Base address:0x2024 

 

lo        Link encap:Local Loopback  

          inet addr:127.0.0.1  Mask:255.0.0.0

          inet6 addr: ::1/128 Scope:Host

          UP LOOPBACK RUNNING  MTU:16436  Metric:1

          RX packets:16 errors:0 dropped:0 overruns:0 frame:0

          TX packets:16 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0 

          RX bytes:3184 (3.1 KiB)  TX bytes:3184 (3.1 KiB)

 

sit0      Link encap:IPv6-in-IPv4  

          NOARP  MTU:1480  Metric:1

          RX packets:0 errors:0 dropped:0 overruns:0 frame:0

          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0 

          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

 

+ _________________________ ip-addr-list

+ ip addr list

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue 

    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00

    inet 127.0.0.1/8 scope host lo

    inet6 ::1/128 scope host 

       valid_lft forever preferred_lft forever

2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
qlen 1000

    link/ether 00:50:56:81:0e:57 brd ff:ff:ff:ff:ff:ff

    inet 172.30.1.7/24 brd 172.30.1.255 scope global eth0

    inet6 fe80::250:56ff:fe81:e57/64 scope link 

       valid_lft forever preferred_lft forever

3: sit0: <NOARP> mtu 1480 qdisc noop 

    link/sit 0.0.0.0 brd 0.0.0.0

+ _________________________ ip-route-list

+ ip route list

172.30.1.0/24 dev eth0  proto kernel  scope link  src 172.30.1.7 

169.254.0.0/16 dev eth0  scope link 

default via 172.30.1.1 dev eth0 

+ _________________________ ip-rule-list

+ ip rule list

0:      from all lookup 255 

32766:  from all lookup main 

32767:  from all lookup default 

+ _________________________ ipsec_verify

+ ipsec verify --nocolour

Checking your system to see if IPsec got installed and started
correctly:

Version check and ipsec on-path                                 [OK]

Linux Openswan U2.6.21/K2.6.18-194.32.1.el5 (netkey)

Checking for IPsec support in kernel                            [OK]

NETKEY detected, testing for disabled ICMP send_redirects       [OK]

NETKEY detected, testing for disabled ICMP accept_redirects     [OK]

Checking for RSA private key (/etc/ipsec.secrets)               [OK]

Checking that pluto is running                                  [OK]

Two or more interfaces found, checking IP forwarding            [OK]

Checking NAT and MASQUERADEing                                  [OK]

Checking for 'ip' command                                       [OK]

Checking for 'iptables' command                                 [OK]

 

Opportunistic Encryption DNS checks:

   Looking for TXT in forward dns zone: vps-itelematics007.maxnet.net.nz
[MISSING]

   Does the machine have at least one non-private address?      [FAILED]

+ _________________________ mii-tool

+ '[' -x /sbin/mii-tool ']'

+ /sbin/mii-tool -v

SIOCGMIIPHY on 'eth0' failed: Operation not supported

no MII interfaces found

+ _________________________ ipsec/directory

+ ipsec --directory

/usr/libexec/ipsec

+ _________________________ hostname/fqdn

+ hostname --fqdn

vps-itelematics007.maxnet.net.nz

+ _________________________ hostname/ipaddress

+ hostname --ip-address

127.0.0.1

+ _________________________ uptime

+ uptime

20:49:47 up 55 days, 23:02,  1 user,  load average: 0.00, 0.00, 0.00

+ _________________________ ps

+ ps alxwf

+ egrep -i 'ppid|pluto|ipsec|klips'

F   UID   PID  PPID PRI  NI    VSZ   RSS WCHAN  STAT TTY        TIME
COMMAND

4     0 27505 25917  25   0   4584  1136 -      R+   pts/0      0:00
\_ /bin/sh /usr/libexec/ipsec/barf

1     0 26769     1  20   0   2500   416 wait   S    pts/0      0:00
/bin/sh /usr/libexec/ipsec/_plutorun --debug all raw crypt parsing
emitting control lifecycle klips dns oppo controlmore x509 pfkey
nattraversal --uniqueids yes --force_busy no --nocrsend no
--strictcrlpolicy no --nat_traversal yes --keep_alive  --protostack
netkey --force_keepalive no --disable_port_floating no --virtual_private
--crlcheckinterval 0 --ocspuri  --nhelpers 0 --dump  --opts  --stderrlog
--wait no --pre  --post  --log daemon.error --plutorestartoncrash true
--pid /var/run/pluto/pluto.pid

1     0 26770 26769  20   0   2500   564 wait   S    pts/0      0:00  \_
/bin/sh /usr/libexec/ipsec/_plutorun --debug all raw crypt parsing
emitting control lifecycle klips dns oppo controlmore x509 pfkey
nattraversal --uniqueids yes --force_busy no --nocrsend no
--strictcrlpolicy no --nat_traversal yes --keep_alive  --protostack
netkey --force_keepalive no --disable_port_floating no --virtual_private
--crlcheckinterval 0 --ocspuri  --nhelpers 0 --dump  --opts  --stderrlog
--wait no --pre  --post  --log daemon.error --plutorestartoncrash true
--pid /var/run/pluto/pluto.pid

4     0 26771 26770  15   0   5844  3184 -      S    pts/0      0:00  |
\_ /usr/libexec/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets
--ipsecdir /etc/ipsec.d --debug-all --debug-raw --debug-crypt
--debug-parsing --debug-emitting --debug-control --debug-lifecycle
--debug-klips --debug-dns --debug-oppo --debug-controlmore --debug-x509
--debug-pfkey --debug-nattraversal --use-netkey --uniqueids
--nat_traversal --nhelpers 0

0     0 26791 26771  25   0   1688   292 -      S    pts/0      0:00  |
\_ _pluto_adns -d

4     0 26772 26769  25   0   2500   952 pipe_w S    pts/0      0:00  \_
/bin/sh /usr/libexec/ipsec/_plutoload --wait no --post 

4     0 26773     1  21   0   1744   500 pipe_w S    pts/0      0:00
logger -s -p daemon.error -t ipsec__plutorun

+ _________________________ ipsec/showdefaults

+ ipsec showdefaults

routephys=eth0

routevirt=none

routeaddr=172.30.1.7

routenexthop=172.30.1.1

+ _________________________ ipsec/conf

+ ipsec _include /etc/ipsec.conf

+ ipsec _keycensor

 

#< /etc/ipsec.conf 1

# /etc/ipsec.conf - Openswan IPsec configuration file

#

# Manual:     ipsec.conf.5

#

# Please place your own config files in /etc/ipsec.d/ ending in .conf

 

version 2.0     # conforms to second version of ipsec.conf specification

 

# basic configuration

config setup

        # Debug-logging controls:  "none" for (almost) none, "all" for
lots.

        klipsdebug=all

        #plutodebug="control parsing"

        #plutodebug="none"

        plutodebug="all"

 

        # For Red Hat Enterprise Linux and Fedora, leave
protostack=netkey

        protostack=netkey

        nat_traversal=yes

        #virtual_private=

        oe=off

        # Enable this if you see "failed to find any available worker"

        nhelpers=0

 

#You may put your configuration (.conf) file in the "/etc/ipsec.d/" and
uncomment this.

 

#< /etc/ipsec.d/nzta.conf 1

#

#  NZTA tunnel for use to access web services to talk 

#  to LandData

#

#

 

conn nzta-subnet64

    type        = tunnel

    authby      = secret

 

     # NAT'd outside address is 202.89.35.19

     #left        = 202.89.35.19  202.89.35.19

     left        = 172.30.1.7

     leftid      = 202.89.35.19

     leftnexthop = %defaultroute

     leftsubnet  = 172.30.1.0/24

 

     right       = 202.12.0.29

     rightsubnet = 202.12.0.64/26

     #rightid     = 202.12.0.29

 

     esp         = aes256-sha1

 

     ike         = aes256-sha1-modp1024,aes128-md5

     keyexchange = ike

     ikelifetime = 120m 

     keylife     = 10m

 

     auto        = start

     pfs         = no

 

conn nzta-subnet128

     type        = tunnel

     authby      = secret

 

     # NAT'd outside address is 202.89.35.19

     #left        = 202.89.35.19  202.89.35.19

     left        = 172.30.1.7

     leftid      = 202.89.35.19

     leftnexthop = %defaultroute

     leftsubnet  = 172.30.1.0/24

 

     right       = 202.12.0.29

     rightsubnet = 202.12.0.128/26

     #rightid     = 202.12.0.29

 

     esp         = aes256-sha1

 

     ike         = aes256-sha1-modp1024,aes128-md5

     keyexchange = ike

     ikelifetime = 120m

     keylife     = 10m

 

     auto        = start

     pfs         = no

 

conn nzta-subnet192

     type        = tunnel

     authby      = secret

 

     # NAT'd outside address is 202.89.35.19

     #left        = 202.89.35.19  202.89.35.19

     left        = 172.30.1.7

     leftid      = 202.89.35.19

     leftnexthop = %defaultroute

     leftsubnet  = 172.30.1.0/24

 

     right       = 202.12.0.29

     rightsubnet = 202.12.0.192/26

     #rightid     = 202.12.0.29

 

     esp         = aes256-sha1

 

     ike         = aes256-sha1-modp1024,aes128-md5

     keyexchange = ike

     ikelifetime = 120m

     keylife     = 10m

 

     auto        = start

     pfs         = no

 

 

#> /etc/ipsec.conf 27

+ _________________________ ipsec/secrets

+ ipsec _include /etc/ipsec.secrets

+ ipsec _secretcensor

 

#< /etc/ipsec.secrets 1

 

#< /etc/ipsec.d/nzta.secrets 1

#NZTA 

172.30.1.7 202.12.0.29: PSK "[sums to 1224...]"

202.89.35.19 202.12.0.29: PSK "[sums to 1224...]"

 

#> /etc/ipsec.secrets 2

+ _________________________ ipsec/listall

+ ipsec auto --listall

000  

000 List of Public Keys:

000  

000 List of Pre-shared secrets (from /etc/ipsec.secrets)

000     3: PSK 202.12.0.29 202.89.35.19

000     2: PSK 202.12.0.29 172.30.1.7

+ '[' /etc/ipsec.d/policies ']'

+ for policy in '$POLICIES/*'

++ basename /etc/ipsec.d/policies/block

+ base=block

+ _________________________ ipsec/policies/block

+ cat /etc/ipsec.d/policies/block

# This file defines the set of CIDRs (network/mask-length) to which

# communication should never be allowed.

#

# See /usr/share/doc/openswan/policygroups.html for details.

#

# $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $

#

 

+ for policy in '$POLICIES/*'

++ basename /etc/ipsec.d/policies/clear

+ base=clear

+ _________________________ ipsec/policies/clear

+ cat /etc/ipsec.d/policies/clear

# This file defines the set of CIDRs (network/mask-length) to which

# communication should always be in the clear.

#

# See /usr/share/doc/openswan/policygroups.html for details.

#

 

# root name servers should be in the clear

192.58.128.30/32

198.41.0.4/32

192.228.79.201/32

192.33.4.12/32

128.8.10.90/32

192.203.230.10/32

192.5.5.241/32

192.112.36.4/32

128.63.2.53/32

192.36.148.17/32

193.0.14.129/32

199.7.83.42/32

202.12.27.33/32

+ for policy in '$POLICIES/*'

++ basename /etc/ipsec.d/policies/clear-or-private

+ base=clear-or-private

+ _________________________ ipsec/policies/clear-or-private

+ cat /etc/ipsec.d/policies/clear-or-private

# This file defines the set of CIDRs (network/mask-length) to which

# we will communicate in the clear, or, if the other side initiates
IPSEC,

# using encryption.  This behaviour is also called "Opportunistic
Responder".

#

# See /usr/share/doc/openswan/policygroups.html for details.

#

# $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $

#

+ for policy in '$POLICIES/*'

++ basename /etc/ipsec.d/policies/private

+ base=private

+ _________________________ ipsec/policies/private

+ cat /etc/ipsec.d/policies/private

# This file defines the set of CIDRs (network/mask-length) to which

# communication should always be private (i.e. encrypted).

# See /usr/share/doc/openswan/policygroups.html for details.

#

# $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $

#

+ for policy in '$POLICIES/*'

++ basename /etc/ipsec.d/policies/private-or-clear

+ base=private-or-clear

+ _________________________ ipsec/policies/private-or-clear

+ cat /etc/ipsec.d/policies/private-or-clear

# This file defines the set of CIDRs (network/mask-length) to which

# communication should be private, if possible, but in the clear
otherwise.

#

# If the target has a TXT (later IPSECKEY) record that specifies

# authentication material, we will require private (i.e. encrypted)

# communications.  If no such record is found, communications will be

# in the clear.

#

# See /usr/share/doc/openswan/policygroups.html for details.

#

# $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $

#

 

0.0.0.0/0

+ _________________________ ipsec/ls-libdir

+ ls -l /usr/libexec/ipsec

total 2272

-rwxr-xr-x 1 root root    5996 Feb 17  2010 _copyright

-rwxr-xr-x 1 root root    2379 Feb 17  2010 _include

-rwxr-xr-x 1 root root    1475 Feb 17  2010 _keycensor

-rwxr-xr-x 1 root root   10028 Feb 17  2010 _pluto_adns

-rwxr-xr-x 1 root root    2632 Feb 17  2010 _plutoload

-rwxr-xr-x 1 root root    7627 Feb 17  2010 _plutorun

-rwxr-xr-x 1 root root   12771 Feb 17  2010 _realsetup

-rwxr-xr-x 1 root root    1975 Feb 17  2010 _secretcensor

-rwxr-xr-x 1 root root    8567 Feb 17  2010 _startklips

-rwxr-xr-x 1 root root    8567 Feb 17  2010 _startklips.old

-rwxr-xr-x 1 root root    5923 Feb 17  2010 _startnetkey

-rwxr-xr-x 1 root root    4880 Feb 17  2010 _updown

-rwxr-xr-x 1 root root   14030 Feb 17  2010 _updown.klips

-rwxr-xr-x 1 root root   14030 Feb 17  2010 _updown.klips.old

-rwxr-xr-x 1 root root   11798 Feb 17  2010 _updown.mast

-rwxr-xr-x 1 root root   11798 Feb 17  2010 _updown.mast.old

-rwxr-xr-x 1 root root    8534 Feb 17  2010 _updown.netkey

-rwxr-xr-x 1 root root  191872 Feb 17  2010 addconn

-rwxr-xr-x 1 root root    6129 Feb 17  2010 auto

-rwxr-xr-x 1 root root   10758 Feb 17  2010 barf

-rwxr-xr-x 1 root root   90060 Feb 17  2010 eroute

-rwxr-xr-x 1 root root   20184 Feb 17  2010 ikeping

-rwxr-xr-x 1 root root   69776 Feb 17  2010 klipsdebug

-rwxr-xr-x 1 root root    2591 Feb 17  2010 look

-rwxr-xr-x 1 root root    2174 Feb 17  2010 newhostkey

-rwxr-xr-x 1 root root   60812 Feb 17  2010 pf_key

-rwxr-xr-x 1 root root 1016208 Feb 17  2010 pluto

-rwxr-xr-x 1 root root   10176 Feb 17  2010 ranbits

-rwxr-xr-x 1 root root   22932 Feb 17  2010 rsasigkey

-rwxr-xr-x 1 root root     766 Feb 17  2010 secrets

lrwxrwxrwx 1 root root      30 Apr 16  2010 setup ->
../../../etc/rc.d/init.d/ipsec

-rwxr-xr-x 1 root root    1054 Feb 17  2010 showdefaults

-rwxr-xr-x 1 root root  178916 Feb 17  2010 showhostkey

-rwxr-xr-x 1 root root   22716 Feb 17  2010 showpolicy

-rwxr-xr-x 1 root root  152392 Feb 17  2010 spi

-rwxr-xr-x 1 root root   77308 Feb 17  2010 spigrp

-rwxr-xr-x 1 root root   69864 Feb 17  2010 tncfg

-rwxr-xr-x 1 root root   12526 Feb 17  2010 verify

-rwxr-xr-x 1 root root   51112 Feb 17  2010 whack

+ _________________________ ipsec/ls-execdir

+ ls -l /usr/libexec/ipsec

total 2272

-rwxr-xr-x 1 root root    5996 Feb 17  2010 _copyright

-rwxr-xr-x 1 root root    2379 Feb 17  2010 _include

-rwxr-xr-x 1 root root    1475 Feb 17  2010 _keycensor

-rwxr-xr-x 1 root root   10028 Feb 17  2010 _pluto_adns

-rwxr-xr-x 1 root root    2632 Feb 17  2010 _plutoload

-rwxr-xr-x 1 root root    7627 Feb 17  2010 _plutorun

-rwxr-xr-x 1 root root   12771 Feb 17  2010 _realsetup

-rwxr-xr-x 1 root root    1975 Feb 17  2010 _secretcensor

-rwxr-xr-x 1 root root    8567 Feb 17  2010 _startklips

-rwxr-xr-x 1 root root    8567 Feb 17  2010 _startklips.old

-rwxr-xr-x 1 root root    5923 Feb 17  2010 _startnetkey

-rwxr-xr-x 1 root root    4880 Feb 17  2010 _updown

-rwxr-xr-x 1 root root   14030 Feb 17  2010 _updown.klips

-rwxr-xr-x 1 root root   14030 Feb 17  2010 _updown.klips.old

-rwxr-xr-x 1 root root   11798 Feb 17  2010 _updown.mast

-rwxr-xr-x 1 root root   11798 Feb 17  2010 _updown.mast.old

-rwxr-xr-x 1 root root    8534 Feb 17  2010 _updown.netkey

-rwxr-xr-x 1 root root  191872 Feb 17  2010 addconn

-rwxr-xr-x 1 root root    6129 Feb 17  2010 auto

-rwxr-xr-x 1 root root   10758 Feb 17  2010 barf

-rwxr-xr-x 1 root root   90060 Feb 17  2010 eroute

-rwxr-xr-x 1 root root   20184 Feb 17  2010 ikeping

-rwxr-xr-x 1 root root   69776 Feb 17  2010 klipsdebug

-rwxr-xr-x 1 root root    2591 Feb 17  2010 look

-rwxr-xr-x 1 root root    2174 Feb 17  2010 newhostkey

-rwxr-xr-x 1 root root   60812 Feb 17  2010 pf_key

-rwxr-xr-x 1 root root 1016208 Feb 17  2010 pluto

-rwxr-xr-x 1 root root   10176 Feb 17  2010 ranbits

-rwxr-xr-x 1 root root   22932 Feb 17  2010 rsasigkey

-rwxr-xr-x 1 root root     766 Feb 17  2010 secrets

lrwxrwxrwx 1 root root      30 Apr 16  2010 setup ->
../../../etc/rc.d/init.d/ipsec

-rwxr-xr-x 1 root root    1054 Feb 17  2010 showdefaults

-rwxr-xr-x 1 root root  178916 Feb 17  2010 showhostkey

-rwxr-xr-x 1 root root   22716 Feb 17  2010 showpolicy

-rwxr-xr-x 1 root root  152392 Feb 17  2010 spi

-rwxr-xr-x 1 root root   77308 Feb 17  2010 spigrp

-rwxr-xr-x 1 root root   69864 Feb 17  2010 tncfg

-rwxr-xr-x 1 root root   12526 Feb 17  2010 verify

-rwxr-xr-x 1 root root   51112 Feb 17  2010 whack

+ _________________________ /proc/net/dev

+ cat /proc/net/dev

Inter-|   Receive                                                |
Transmit

face |bytes    packets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed

    lo:    3184      16    0    0    0     0          0         0
3184      16    0    0    0     0       0          0

  eth0:2686452556 31350284  326    0    0     0          0         0
1049710560 5763325    0    0    0     0       0          0

  sit0:       0       0    0    0    0     0          0         0
0       0    0    0    0     0       0          0

+ _________________________ /proc/net/route

+ cat /proc/net/route

Iface   Destination     Gateway         Flags   RefCnt  Use     Metric
Mask            MTU     Window  IRTT


eth0    00011EAC        00000000        0001    0       0       0
00FFFFFF        0       0       0


eth0    0000FEA9        00000000        0001    0       0       0
0000FFFF        0       0       0


eth0    00000000        01011EAC        0003    0       0       0
00000000        0       0       0


+ _________________________ /proc/sys/net/ipv4/ip_no_pmtu_disc

+ cat /proc/sys/net/ipv4/ip_no_pmtu_disc

0

+ _________________________ /proc/sys/net/ipv4/ip_forward

+ cat /proc/sys/net/ipv4/ip_forward

1

+ _________________________ /proc/sys/net/ipv4/tcp_ecn

+ cat /proc/sys/net/ipv4/tcp_ecn

0

+ _________________________ /proc/sys/net/ipv4/conf/star-rp_filter

+ cd /proc/sys/net/ipv4/conf

+ egrep '^' all/rp_filter default/rp_filter eth0/rp_filter lo/rp_filter

all/rp_filter:0

default/rp_filter:1

eth0/rp_filter:1

lo/rp_filter:0

+ _________________________ /proc/sys/net/ipv4/conf/star-star-redirects

+ cd /proc/sys/net/ipv4/conf

+ egrep '^' all/accept_redirects all/secure_redirects all/send_redirects
default/accept_redirects default/secure_redirects default/send_redirects
eth0/accept_redirects eth0/secure_redirects eth0/send_redirects
lo/accept_redirects lo/secure_redirects lo/send_redirects

all/accept_redirects:0

all/secure_redirects:1

all/send_redirects:0

default/accept_redirects:0

default/secure_redirects:1

default/send_redirects:0

eth0/accept_redirects:0

eth0/secure_redirects:1

eth0/send_redirects:0

lo/accept_redirects:0

lo/secure_redirects:1

lo/send_redirects:0

+ _________________________ /proc/sys/net/ipv4/tcp_window_scaling

+ cat /proc/sys/net/ipv4/tcp_window_scaling

1

+ _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale

+ cat /proc/sys/net/ipv4/tcp_adv_win_scale

2

+ _________________________ uname-a

+ uname -a

Linux vps-itelematics007.maxnet.net.nz 2.6.18-194.32.1.el5 #1 SMP Wed
Jan 5 17:53:09 EST 2011 i686 i686 i386 GNU/Linux

+ _________________________ config-built-with

+ test -r /proc/config_built_with

+ _________________________ distro-release

+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release

+ test -f /etc/redhat-release

+ cat /etc/redhat-release

CentOS release 5.5 (Final)

+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release

+ test -f /etc/debian-release

+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release

+ test -f /etc/SuSE-release

+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release

+ test -f /etc/mandrake-release

+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release

+ test -f /etc/mandriva-release

+ for distro in /etc/redhat-release /etc/debian-release
/etc/SuSE-release /etc/mandrake-release /etc/mandriva-release
/etc/gentoo-release

+ test -f /etc/gentoo-release

+ _________________________ /proc/net/ipsec_version

+ test -r /proc/net/ipsec_version

+ test -r /proc/net/pfkey

++ uname -r

+ echo 'NETKEY (2.6.18-194.32.1.el5) support detected '

NETKEY (2.6.18-194.32.1.el5) support detected 

+ _________________________ iptables

+ test -r /sbin/iptables

+ iptables -L -v -n

Chain INPUT (policy ACCEPT 1039K packets, 97M bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain FORWARD (policy ACCEPT 28198 packets, 2464K bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain OUTPUT (policy ACCEPT 1109K packets, 226M bytes)

pkts bytes target     prot opt in     out     source
destination         

+ _________________________ iptables-nat

+ iptables -t nat -L -v -n

Chain PREROUTING (policy ACCEPT 6444 packets, 435K bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain POSTROUTING (policy ACCEPT 276 packets, 23413 bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain OUTPUT (policy ACCEPT 276 packets, 23413 bytes)

pkts bytes target     prot opt in     out     source
destination         

+ _________________________ iptables-mangle

+ iptables -t mangle -L -v -n

Chain PREROUTING (policy ACCEPT 8671K packets, 629M bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain INPUT (policy ACCEPT 1089K packets, 119M bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain FORWARD (policy ACCEPT 28198 packets, 2464K bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain OUTPUT (policy ACCEPT 1155K packets, 234M bytes)

pkts bytes target     prot opt in     out     source
destination         

 

Chain POSTROUTING (policy ACCEPT 1184K packets, 237M bytes)

pkts bytes target     prot opt in     out     source
destination         

+ _________________________ /proc/modules

+ test -f /proc/modules

+ cat /proc/modules

ah6 10433 0 - Live 0xf8c0f000

ah4 10305 0 - Live 0xf8c0b000

esp6 12225 0 - Live 0xf8be6000

esp4 12353 0 - Live 0xf8b99000

xfrm4_tunnel 6593 0 - Live 0xf8b4c000

xfrm4_mode_tunnel 6849 0 - Live 0xf8b35000

xfrm4_mode_transport 6209 0 - Live 0xf8b32000

xfrm6_mode_transport 6337 0 - Live 0xf8b2c000

xfrm6_mode_tunnel 6721 0 - Live 0xf8b1d000

ipcomp 11465 0 - Live 0xf8b19000

ipcomp6 11977 0 - Live 0xf8ac6000

xfrm6_tunnel 11233 1 ipcomp6, Live 0xf8b0d000

af_key 40785 0 - Live 0xf8b21000

iptable_nat 11077 0 - Live 0xf8c47000

ip_nat 21101 1 iptable_nat, Live 0xf8c4e000

ip_conntrack 53281 2 iptable_nat,ip_nat, Live 0xf8c58000

nfnetlink 10713 2 ip_nat,ip_conntrack, Live 0xf8c43000

krng 6081 1 - Live 0xf8c40000

ansi_cprng 9669 0 - Live 0xf8c3c000

chainiv 9153 0 - Live 0xf8c38000

rng 7753 3 krng,ansi_cprng,chainiv, Live 0xf8c27000

authenc 10433 0 - Live 0xf8c34000

hmac 8769 0 - Live 0xf8c30000

cryptomgr 7617 0 - Live 0xf8c24000

iptable_filter 7105 0 - Live 0xf8b9e000

iptable_mangle 6849 0 - Live 0xf8b4f000

ip_tables 17029 3 iptable_nat,iptable_filter,iptable_mangle, Live
0xf8c2a000

deflate 7873 0 - Live 0xf8bee000

zlib_deflate 21977 1 deflate, Live 0xf8c1d000

ccm 13505 0 - Live 0xf8bf8000

serpent 29249 0 - Live 0xf8c14000

blowfish 12609 0 - Live 0xf8bf3000

twofish 46017 0 - Live 0xf8bfe000

ecb 7617 0 - Live 0xf8b52000

xcbc 9920 0 - Live 0xf8bea000

crypto_hash 6337 2 hmac,xcbc, Live 0xf8bc2000

cbc 8257 0 - Live 0xf8be2000

md5 8257 0 - Live 0xf8bc6000

sha256 15297 0 - Live 0xf8bdd000

sha512 13121 0 - Live 0xf8bd8000

des 20417 0 - Live 0xf8ba1000

aes_generic 31745 0 - Live 0xf8bb9000

testmgr_cipher 6849 0 - Live 0xf8b2f000

testmgr 52337 1 testmgr_cipher, Live 0xf8bca000

crypto_blkcipher 17601 6 chainiv,authenc,ccm,ecb,cbc,testmgr, Live
0xf8bb3000

aes_i586 37057 0 - Live 0xf8ba8000

xfrm6_esp 9537 1 esp6, Live 0xf8b48000

xfrm4_esp 9793 1 esp4, Live 0xf8b39000

aead 11841 5 esp6,esp4,authenc,ccm,testmgr, Live 0xf8b44000

crypto_algapi 22849 13
krng,ansi_cprng,chainiv,authenc,hmac,cryptomgr,ccm,ecb,xcbc,cbc,testmgr,
crypto_blkcipher,aead, Live 0xf8b3d000

tunnel4 7365 1 xfrm4_tunnel, Live 0xf8b11000

tunnel6 7365 1 xfrm6_tunnel, Live 0xf8b0a000

ip6t_REJECT 9409 1 - Live 0xf8b06000

xt_tcpudp 7105 6 - Live 0xf8af3000

ip6table_filter 6849 1 - Live 0xf8ac3000

ip6_tables 18053 1 ip6table_filter, Live 0xf8aed000

x_tables 17349 5 iptable_nat,ip_tables,ip6t_REJECT,xt_tcpudp,ip6_tables,
Live 0xf8ae7000

ipv6 270561 34
ah6,esp6,xfrm6_mode_transport,ipcomp6,xfrm6_tunnel,xfrm6_esp,tunnel6,ip6
t_REJECT, Live 0xf8b55000

xfrm_nalgo 13381 7 ah6,ah4,esp6,esp4,xfrm6_esp,xfrm4_esp,ipv6, Live
0xf8abe000

crypto_api 12609 12
ah6,ah4,esp6,esp4,rng,authenc,ccm,testmgr,crypto_blkcipher,aead,crypto_a
lgapi,xfrm_nalgo, Live 0xf8aac000

vsock 54048 0 - Live 0xf8af7000 (U)

vmci 37668 1 vsock, Live 0xf8aca000 (U)

vmmemctl 16220 0 - Live 0xf8ab9000 (U)

acpiphp 27089 0 - Live 0xf8ab1000

dm_multipath 25421 0 - Live 0xf8a53000

scsi_dh 12097 1 dm_multipath, Live 0xf8a62000

video 21193 0 - Live 0xf8a5b000

backlight 10049 1 video, Live 0xf8a2c000

sbs 18533 0 - Live 0xf8a47000

power_meter 16461 0 - Live 0xf8a4d000

hwmon 7365 1 power_meter, Live 0xf8a01000

i2c_ec 9025 1 sbs, Live 0xf8a43000

dell_wmi 8401 0 - Live 0xf8a30000

wmi 12137 1 dell_wmi, Live 0xf8a3f000

button 10705 0 - Live 0xf8a0b000

battery 13637 0 - Live 0xf8a3a000

asus_acpi 19289 0 - Live 0xf8a34000

ac 9157 0 - Live 0xf8a28000

pvscsi 20260 0 - Live 0xf89b9000 (U)

lp 15849 0 - Live 0xf89fc000

vmxnet 23428 0 - Live 0xf8a04000 (U)

sg 36573 0 - Live 0xf8a1e000

floppy 57125 0 - Live 0xf8a0f000

pcspkr 7105 0 - Live 0xf893d000

i2c_piix4 13133 0 - Live 0xf89bf000

i2c_core 24001 2 i2c_ec,i2c_piix4, Live 0xf89f5000

parport_pc 29157 1 - Live 0xf89c4000

serio_raw 10693 0 - Live 0xf8914000

parport 37513 2 lp,parport_pc, Live 0xf89ea000

mii 9409 0 - Live 0xf891c000

ide_cd 40161 0 - Live 0xf89df000

cdrom 36577 1 ide_cd, Live 0xf8986000

dm_raid45 67145 0 - Live 0xf89cd000

dm_message 6977 1 dm_raid45, Live 0xf8861000

dm_region_hash 15681 1 dm_raid45, Live 0xf896e000

dm_mem_cache 9537 1 dm_raid45, Live 0xf8918000

dm_snapshot 23653 0 - Live 0xf8961000

dm_zero 6209 0 - Live 0xf8873000

dm_mirror 24393 0 - Live 0xf8936000

dm_log 14657 3 dm_raid45,dm_region_hash,dm_mirror, Live 0xf8879000

dm_mod 63225 11
dm_multipath,dm_raid45,dm_snapshot,dm_zero,dm_mirror,dm_log, Live
0xf8975000

ata_piix 23621 0 - Live 0xf890d000

libata 157317 1 ata_piix, Live 0xf8991000

mptspi 23497 2 - Live 0xf8906000

mptscsih 36545 1 mptspi, Live 0xf882c000

mptbase 83717 2 mptspi,mptscsih, Live 0xf8920000

scsi_transport_spi 26305 1 mptspi, Live 0xf8859000

sd_mod 25281 3 - Live 0xf8851000

scsi_mod 141973 8
scsi_dh,pvscsi,sg,libata,mptspi,mptscsih,scsi_transport_spi,sd_mod, Live
0xf88c1000

ext3 125513 2 - Live 0xf88e6000

jbd 57321 1 ext3, Live 0xf8864000

uhci_hcd 25549 0 - Live 0xf8849000

ohci_hcd 25065 0 - Live 0xf8841000

ehci_hcd 33869 0 - Live 0xf8837000

+ _________________________ /proc/meminfo

+ cat /proc/meminfo

MemTotal:      2075464 kB

MemFree:       1533644 kB

Buffers:        146400 kB

Cached:         341584 kB

SwapCached:          8 kB

Active:         448316 kB

Inactive:        55860 kB

HighTotal:     1179584 kB

HighFree:       816736 kB

LowTotal:       895880 kB

LowFree:        716908 kB

SwapTotal:      524280 kB

SwapFree:       524272 kB

Dirty:              92 kB

Writeback:           0 kB

AnonPages:       16152 kB

Mapped:          11948 kB

Slab:            27092 kB

PageTables:       1028 kB

NFS_Unstable:        0 kB

Bounce:              0 kB

CommitLimit:   1562012 kB

Committed_AS:    59144 kB

VmallocTotal:   114680 kB

VmallocUsed:      4456 kB

VmallocChunk:   110104 kB

HugePages_Total:     0

HugePages_Free:      0

HugePages_Rsvd:      0

Hugepagesize:     4096 kB

+ _________________________ /proc/net/ipsec-ls

+ test -f /proc/net/ipsec_version

+ _________________________ usr/src/linux/.config

+ test -f /proc/config.gz

++ uname -r

+ test -f /lib/modules/2.6.18-194.32.1.el5/build/.config

++ uname -r

+ cat /lib/modules/2.6.18-194.32.1.el5/build/.config

+ egrep
'CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_H
W_RANDOM|CONFIG_CRYPTO_DEV|_XFRM'

CONFIG_XFRM=y

CONFIG_XFRM_NALGO=m

CONFIG_XFRM_USER=y

CONFIG_NET_KEY=m

CONFIG_INET=y

CONFIG_IP_MULTICAST=y

CONFIG_IP_ADVANCED_ROUTER=y

# CONFIG_IP_FIB_TRIE is not set

CONFIG_IP_FIB_HASH=y

CONFIG_IP_MULTIPLE_TABLES=y

CONFIG_IP_ROUTE_FWMARK=y

CONFIG_IP_ROUTE_MULTIPATH=y

# CONFIG_IP_ROUTE_MULTIPATH_CACHED is not set

CONFIG_IP_ROUTE_VERBOSE=y

# CONFIG_IP_PNP is not set

CONFIG_IP_MROUTE=y

CONFIG_IP_PIMSM_V1=y

CONFIG_IP_PIMSM_V2=y

CONFIG_INET_AH=m

CONFIG_INET_ESP=m

CONFIG_INET_IPCOMP=m

CONFIG_INET_XFRM_TUNNEL=m

CONFIG_INET_TUNNEL=m

CONFIG_INET_XFRM_MODE_TRANSPORT=m

CONFIG_INET_XFRM_MODE_TUNNEL=m

CONFIG_INET_DIAG=m

CONFIG_INET_TCP_DIAG=m

CONFIG_INET_LRO=y

CONFIG_IP_VS=m

# CONFIG_IP_VS_DEBUG is not set

CONFIG_IP_VS_TAB_BITS=12

CONFIG_IP_VS_PROTO_TCP=y

CONFIG_IP_VS_PROTO_UDP=y

CONFIG_IP_VS_PROTO_ESP=y

CONFIG_IP_VS_PROTO_AH=y

CONFIG_IP_VS_RR=m

CONFIG_IP_VS_WRR=m

CONFIG_IP_VS_LC=m

CONFIG_IP_VS_WLC=m

CONFIG_IP_VS_LBLC=m

CONFIG_IP_VS_LBLCR=m

CONFIG_IP_VS_DH=m

CONFIG_IP_VS_SH=m

CONFIG_IP_VS_SED=m

CONFIG_IP_VS_NQ=m

CONFIG_IP_VS_FTP=m

CONFIG_IPV6=m

CONFIG_IPV6_PRIVACY=y

CONFIG_IPV6_ROUTER_PREF=y

CONFIG_IPV6_ROUTE_INFO=y

CONFIG_IPV6_OPTIMISTIC_DAD=y

CONFIG_INET6_AH=m

CONFIG_INET6_ESP=m

CONFIG_INET6_IPCOMP=m

CONFIG_INET6_XFRM_TUNNEL=m

CONFIG_INET6_TUNNEL=m

CONFIG_INET6_XFRM_MODE_TRANSPORT=m

CONFIG_INET6_XFRM_MODE_TUNNEL=m

CONFIG_IPV6_TUNNEL=m

# CONFIG_IPV6_SUBTREES is not set

CONFIG_IPV6_MULTIPLE_TABLES=y

CONFIG_IPV6_ROUTE_FWMARK=y

CONFIG_IP_NF_CONNTRACK=m

CONFIG_IP_NF_CT_ACCT=y

CONFIG_IP_NF_CONNTRACK_MARK=y

CONFIG_IP_NF_CONNTRACK_SECMARK=y

CONFIG_IP_NF_CONNTRACK_EVENTS=y

CONFIG_IP_NF_CONNTRACK_NETLINK=m

CONFIG_IP_NF_CT_PROTO_SCTP=m

CONFIG_IP_NF_FTP=m

CONFIG_IP_NF_IRC=m

CONFIG_IP_NF_NETBIOS_NS=m

CONFIG_IP_NF_TFTP=m

CONFIG_IP_NF_AMANDA=m

CONFIG_IP_NF_PPTP=m

CONFIG_IP_NF_H323=m

CONFIG_IP_NF_SIP=m

CONFIG_IP_NF_QUEUE=m

CONFIG_IP_NF_IPTABLES=m

CONFIG_IP_NF_MATCH_IPRANGE=m

CONFIG_IP_NF_MATCH_TOS=m

CONFIG_IP_NF_MATCH_RECENT=m

CONFIG_IP_NF_MATCH_ECN=m

CONFIG_IP_NF_MATCH_DSCP=m

CONFIG_IP_NF_MATCH_AH=m

CONFIG_IP_NF_MATCH_TTL=m

CONFIG_IP_NF_MATCH_OWNER=m

CONFIG_IP_NF_MATCH_ADDRTYPE=m

CONFIG_IP_NF_MATCH_HASHLIMIT=m

CONFIG_IP_NF_FILTER=m

CONFIG_IP_NF_TARGET_REJECT=m

CONFIG_IP_NF_TARGET_LOG=m

CONFIG_IP_NF_TARGET_ULOG=m

CONFIG_IP_NF_TARGET_TCPMSS=m

CONFIG_IP_NF_NAT=m

CONFIG_IP_NF_NAT_NEEDED=y

CONFIG_IP_NF_TARGET_MASQUERADE=m

CONFIG_IP_NF_TARGET_REDIRECT=m

CONFIG_IP_NF_TARGET_NETMAP=m

CONFIG_IP_NF_TARGET_SAME=m

CONFIG_IP_NF_NAT_SNMP_BASIC=m

CONFIG_IP_NF_NAT_IRC=m

CONFIG_IP_NF_NAT_FTP=m

CONFIG_IP_NF_NAT_TFTP=m

CONFIG_IP_NF_NAT_AMANDA=m

CONFIG_IP_NF_NAT_PPTP=m

CONFIG_IP_NF_NAT_H323=m

CONFIG_IP_NF_NAT_SIP=m

CONFIG_IP_NF_MANGLE=m

CONFIG_IP_NF_TARGET_TOS=m

CONFIG_IP_NF_TARGET_ECN=m

CONFIG_IP_NF_TARGET_DSCP=m

CONFIG_IP_NF_TARGET_TTL=m

CONFIG_IP_NF_TARGET_CLUSTERIP=m

CONFIG_IP_NF_RAW=m

CONFIG_IP_NF_ARPTABLES=m

CONFIG_IP_NF_ARPFILTER=m

CONFIG_IP_NF_ARP_MANGLE=m

CONFIG_IP6_NF_QUEUE=m

CONFIG_IP6_NF_IPTABLES=m

CONFIG_IP6_NF_MATCH_RT=m

CONFIG_IP6_NF_MATCH_OPTS=m

CONFIG_IP6_NF_MATCH_FRAG=m

CONFIG_IP6_NF_MATCH_HL=m

CONFIG_IP6_NF_MATCH_OWNER=m

CONFIG_IP6_NF_MATCH_IPV6HEADER=m

CONFIG_IP6_NF_MATCH_AH=m

CONFIG_IP6_NF_MATCH_EUI64=m

CONFIG_IP6_NF_FILTER=m

CONFIG_IP6_NF_TARGET_LOG=m

CONFIG_IP6_NF_TARGET_REJECT=m

CONFIG_IP6_NF_MANGLE=m

CONFIG_IP6_NF_TARGET_HL=m

CONFIG_IP6_NF_RAW=m

CONFIG_IP_DCCP=m

CONFIG_INET_DCCP_DIAG=m

CONFIG_IP_DCCP_ACKVEC=y

CONFIG_IP_DCCP_CCID2=m

CONFIG_IP_DCCP_CCID3=m

CONFIG_IP_DCCP_TFRC_LIB=m

# CONFIG_IP_DCCP_DEBUG is not set

CONFIG_IP_SCTP=m

# CONFIG_IPX is not set

CONFIG_IPW2100=m

CONFIG_IPW2100_MONITOR=y

# CONFIG_IPW2100_DEBUG is not set

CONFIG_IPW2200=m

CONFIG_IPW2200_MONITOR=y

CONFIG_IPW2200_RADIOTAP=y

CONFIG_IPW2200_PROMISCUOUS=y

CONFIG_IPW2200_QOS=y

# CONFIG_IPW2200_DEBUG is not set

CONFIG_IPPP_FILTER=y

CONFIG_IPMI_HANDLER=m

CONFIG_IPMI_PANIC_EVENT=y

CONFIG_IPMI_PANIC_STRING=y

CONFIG_IPMI_DEVICE_INTERFACE=m

CONFIG_IPMI_SI=m

CONFIG_IPMI_WATCHDOG=m

CONFIG_IPMI_POWEROFF=m

CONFIG_HW_RANDOM=y

CONFIG_HW_RANDOM_INTEL=m

CONFIG_HW_RANDOM_AMD=m

CONFIG_HW_RANDOM_GEODE=m

CONFIG_HW_RANDOM_VIA=m

CONFIG_SECURITY_NETWORK_XFRM=y

CONFIG_CRYPTO_DEV_PADLOCK=m

CONFIG_CRYPTO_DEV_PADLOCK_AES=y

+ _________________________ etc/syslog.conf

+ _________________________ etc/syslog-ng/syslog-ng.conf

+ cat /etc/syslog-ng/syslog-ng.conf

cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory

+ cat /etc/syslog.conf

cat: /etc/syslog.conf: No such file or directory

+ _________________________ etc/resolv.conf

+ cat /etc/resolv.conf

search maxnet.net.nz

nameserver 123.100.67.135

nameserver 123.100.67.136

+ _________________________ lib/modules-ls

+ ls -ltr /lib/modules

total 20

drwxr-xr-x 6 root root 4096 Feb  4  2010 2.6.18-164.el5

drwxr-xr-x 6 root root 4096 Feb  5  2010 2.6.18-164.11.1.el5

drwxr-xr-x 6 root root 4096 Mar 29  2010 2.6.18-164.15.1.el5

drwxr-xr-x 6 root root 4096 Feb 16 22:45 2.6.18-194.32.1.el5

+ _________________________ /proc/ksyms-netif_rx

+ test -r /proc/ksyms

+ test -r /proc/kallsyms

+ egrep netif_rx /proc/kallsyms

c05c043c T __netif_rx_schedule

c05c17e9 T netif_rx

c05c2ce2 T netif_rx_ni

c05c17e9 U netif_rx     [xfrm6_esp]

c05c17e9 U netif_rx     [xfrm4_esp]

c05c17e9 U netif_rx     [ipv6]

c05c17e9 U netif_rx     [vmxnet]

+ _________________________ lib/modules-netif_rx

+ modulegoo kernel/net/ipv4/ipip.o netif_rx

+ set +x

2.6.18-164.11.1.el5: 

2.6.18-164.15.1.el5: 

2.6.18-164.el5: 

2.6.18-194.32.1.el5: 

+ _________________________ kern.debug

+ test -f /var/log/kern.debug

+ _________________________ klog

+ sed -n '4834,$p' /var/log/syslog.1

+ egrep -i 'ipsec|klips|pluto'

+ case "$1" in

+ cat

Apr 13 20:34:44 vps-itelematics007 ipsec_setup: Starting Openswan IPsec
U2.6.21/K2.6.18-194.32.1.el5...

Apr 13 20:34:44 vps-itelematics007 ipsec_setup: Using NETKEY(XFRM) stack

Apr 13 20:34:44 vps-itelematics007 ipsec_setup: ...Openswan IPsec
started

Apr 13 20:34:44 vps-itelematics007 ipsec_setup:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec_setup:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec_setup:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 pluto: adjusting ipsec.d to
/etc/ipsec.d

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun: adjusting ipsec.d to
/etc/ipsec.d

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun:
/usr/libexec/ipsec/addconn Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 added connection
description "nzta-subnet64"

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 added connection
description "nzta-subnet128"

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 Non-fips mode
set in /proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 002 added connection
description "nzta-subnet192"

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 104 "nzta-subnet64"
#1: STATE_MAIN_I1: initiate

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 003
"nzta-subnet128": pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 117 "nzta-subnet128"
#3: STATE_QUICK_I1: initiate

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 003
"nzta-subnet192": pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 ipsec__plutorun: 117 "nzta-subnet192"
#4: STATE_QUICK_I1: initiate

+ _________________________ plog

+ sed -n '694836,$p' /var/log/auth.log.1

+ egrep -i pluto

+ case "$1" in

+ cat

Apr 13 20:34:44 vps-itelematics007 ipsec__plutorun: Starting Pluto
subsystem...

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: nss directory
plutomain: /etc/ipsec.d

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: NSS Initialized

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Starting Pluto
(Openswan Version 2.6.21; Vendor ID OE~q\177kZNr}Wk) pid:26771

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Setting NAT-Traversal
port-4500 floating to on

Apr 13 20:34:44 vps-itelematics007 pluto[26771]:    port floating
activation criteria nat_t=1/port_float=1

Apr 13 20:34:44 vps-itelematics007 pluto[26771]:    including
NAT-Traversal patch (Version 0.6c)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | inserting event
EVENT_REINIT_SECRET, timeout in 3600 seconds

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_SERPENT_CBC: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_AES_CBC: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]:
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]:
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: no helpers will be
started, all cryptographic operations will be done inline

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: Using Linux 2.6 IPsec
interface code on 2.6.18-194.32.1.el5 (experimental code)

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | process 26771
listening for PF_KEY_V2 on file descriptor 12

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | finish_pfkey_msg:
K_SADB_REGISTER message 1 for AH 

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: |   02 07 00 02  02 00
00 00  01 00 00 00  93 68 00 00

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | pfkey_get:
K_SADB_REGISTER message 1

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | AH registered with
kernel.

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: | finish_pfkey_msg:
K_SADB_REGISTER message 2 for ESP 

Apr 13 20:34:44 vps-itelematics007 pluto[26771]: |   02 07 00 03  02 00
00 00  02 00 00 00  93 68 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | pfkey_get:
K_SADB_REGISTER message 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
alg_init():memset(0x7ebd80, 0, 2016) memset(0x7ec560, 0, 2048) 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19
sadb_supported_len=56

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=251

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14,
satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0,
ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14,
satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14,
satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14,
satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14,
satype=3, alg_id=8, alg_ivlen=0, alg_minbits=160, alg_maxbits=160,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=14, alg_id=9

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=14,
satype=3, alg_id=9, alg_ivlen=0, alg_minbits=128, alg_maxbits=128,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19
sadb_supported_len=80

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=11

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15,
satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0,
ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15,
satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0,
ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15,
satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15,
satype=3, alg_id=6, alg_ivlen=8, alg_minbits=40, alg_maxbits=128, res=0,
ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15,
satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0,
ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15,
satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=252

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15,
satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=253

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15,
satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=13

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[14], exttype=15,
satype=3, alg_id=13, alg_ivlen=8, alg_minbits=128, alg_maxbits=256,
res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=19

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=15

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_add():satype=3, exttype=15, alg_id=16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: Ok (ret=0)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
WARNING: enc alg=0 not found in constants.c:oakley_enc_names  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_add(): ERROR:
Algorithm already exists

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: ike_alg_register_enc():
Activating <NULL>: FAILED (ret=-17)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP registered with
kernel.

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | finish_pfkey_msg:
K_SADB_REGISTER message 3 for IPCOMP 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   02 07 00 09  02 00
00 00  03 00 00 00  93 68 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | pfkey_get:
K_SADB_REGISTER message 3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IPCOMP registered
with kernel.

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/cacerts': /home/benm

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/aacerts': /home/benm

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/ocspcerts': /home/benm

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Could not change to
directory '/etc/ipsec.d/crls'

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_LOG_DAILY, timeout in 12315 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_REINIT_SECRET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_SHA1")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d14a0, "OAKLEY_GROUP_MODP1024")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
modp_getbyname("modp1024")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=2 modp_id=2, cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=md5eklen=128  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_MD5")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("md5")=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=5, cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=2, cnt=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Added new connection
nzta-subnet64 with policy PSK+ENCRYPT+TUNNEL+IKEv2ALLOW

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | from whack: got
--esp=aes256-sha1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1410, "ESP_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7ce0e8, "AUTH_ALGORITHM_HMAC_SHA1")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_esp_add()
ealg=12 aalg=2 cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp string values:
AES(12)_256-SHA1(2); flags=-strict

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike (phase1)
algorihtm values: AES_CBC(7)_256-SHA1(2)-MODP1024(2),
AES_CBC(7)_128-MD5(1)-MODP1536(5), AES_CBC(7)_128-MD5(1)-MODP1024(2);
flags=-strict

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.89.35.19 is 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.12.0.29 is 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: added connection
description "nzta-subnet64"

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.64/26

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike_life: 7200s;
ipsec_life: 600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_SHA1")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d14a0, "OAKLEY_GROUP_MODP1024")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
modp_getbyname("modp1024")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=2 modp_id=2, cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=md5eklen=128  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_MD5")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("md5")=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=5, cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=2, cnt=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Added new connection
nzta-subnet128 with policy PSK+ENCRYPT+TUNNEL+IKEv2ALLOW

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | from whack: got
--esp=aes256-sha1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1410, "ESP_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7ce0e8, "AUTH_ALGORITHM_HMAC_SHA1")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_esp_add()
ealg=12 aalg=2 cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp string values:
AES(12)_256-SHA1(2); flags=-strict

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike (phase1)
algorihtm values: AES_CBC(7)_256-SHA1(2)-MODP1024(2),
AES_CBC(7)_128-MD5(1)-MODP1536(5), AES_CBC(7)_128-MD5(1)-MODP1024(2);
flags=-strict

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.89.35.19 is 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.12.0.29 is 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: added connection
description "nzta-subnet128"

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.128/26

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike_life: 7200s;
ipsec_life: 600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_SHA1")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d14a0, "OAKLEY_GROUP_MODP1024")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
modp_getbyname("modp1024")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=2 modp_id=2, cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=md5eklen=128  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1480, "OAKLEY_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_ppfixi ()
calling enum_search(0x7d1480, "OAKLEY_AES_CBC")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1490, "OAKLEY_MD5")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("md5")=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=5, cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_ike_add()
ealg=7 aalg=1 modp_id=2, cnt=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Added new connection
nzta-subnet192 with policy PSK+ENCRYPT+TUNNEL+IKEv2ALLOW

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | from whack: got
--esp=aes256-sha1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_parse_str()
ealg_buf=aes aalg_buf=sha1eklen=256  aklen=0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7d1410, "ESP_AES")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
ealg_getbyname("aes")=12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | enum_search_prefix ()
calling enum_search(0x7ce0e8, "AUTH_ALGORITHM_HMAC_SHA1")

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: Non-fips mode set in
/proc/sys/crypto/fips_enabled

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parser_alg_info_add()
aalg_getbyname("sha1")=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | __alg_info_esp_add()
ealg=12 aalg=2 cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp string values:
AES(12)_256-SHA1(2); flags=-strict

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike (phase1)
algorihtm values: AES_CBC(7)_256-SHA1(2)-MODP1024(2),
AES_CBC(7)_128-MD5(1)-MODP1536(5), AES_CBC(7)_128-MD5(1)-MODP1024(2);
flags=-strict

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.89.35.19 is 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | counting wild cards
for 202.12.0.29 is 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | alg_info_addref()
alg_info->ref_cnt=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: added connection
description "nzta-subnet192"

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
172.30.1.0/24===172.30.1.7<172.30.1.7>[202.89.35.19,+S=C]---172.30.1.1..
.202.12.0.29<202.12.0.29>[+S=C]===202.12.0.192/26

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ike_life: 7200s;
ipsec_life: 600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
policy: PSK+ENCRYPT+TUNNEL+IKEv2ALLOW

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: listening for IKE
messages

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | found lo with address
127.0.0.1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | found eth0 with
address 172.30.1.7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface
eth0/eth0 172.30.1.7:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface
eth0/eth0 172.30.1.7:4500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface lo/lo
127.0.0.1:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface lo/lo
127.0.0.1:4500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | found lo with address
0000:0000:0000:0000:0000:0000:0000:0001

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: adding interface lo/lo
::1:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | connect_to_host_pair:
172.30.1.7:500 202.12.0.29:500 -> hp:none 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | find_host_pair:
comparing to 172.30.1.7:500 202.12.0.29:500 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | connect_to_host_pair:
172.30.1.7:500 202.12.0.29:500 -> hp:nzta-subnet192 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | find_host_pair:
comparing to 172.30.1.7:500 202.12.0.29:500 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | connect_to_host_pair:
172.30.1.7:500 202.12.0.29:500 -> hp:nzta-subnet128 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: loading secrets from
"/etc/ipsec.secrets"

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: loading secrets from
"/etc/ipsec.d/nzta.secrets"

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834da28) 1: 172.30.1.7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834da28) 1: 202.12.0.29

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Processing PSK at
line 3: passed

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834db58) 1: 202.89.35.19

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | id type added to
secret(0x834db58) 1: 202.12.0.29

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Processing PSK at
line 3: passed

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" unrouted: NULL; eroute owner: NULL

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet64 (kind=CK_PERMANENT)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" unrouted: NULL; eroute owner: NULL

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet64 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)}
and state: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | request to add a
prospective erouted policy with netkey kernel --- experimental

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
prepare-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 641
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subn:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):et64'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
P:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):LUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='1:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):72.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTO:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):COL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT=':

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):202.12.0.64/26' PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO_:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):STACK='netkey'  PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updow:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):n:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
route-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 639
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):64'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLU:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):TO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCO:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):L='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='20:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):2.12.0.64/26' PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.25:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):5.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_ST:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):ACK='netkey'  PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updown:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" unrouted: NULL; eroute owner: NULL

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet128 (kind=CK_PERMANENT)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" unrouted: NULL; eroute owner: NULL

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet128 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)}
and state: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | request to add a
prospective erouted policy with netkey kernel --- experimental

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
prepare-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 644
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subn:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):et128'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET=':

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):172.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OCOL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT=:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):'202.12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='2:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):55.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLU:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):TO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _up:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):down:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
route-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 642
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):128'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PL:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):UTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='17:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):2.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOC:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='2:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):02.12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):_STACK='netkey'  PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updo:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):wn:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" unrouted: NULL; eroute owner: NULL

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet192 (kind=CK_PERMANENT)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" unrouted: NULL; eroute owner: NULL

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet192 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)}
and state: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | request to add a
prospective erouted policy with netkey kernel --- experimental

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
prepare-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
prepare-client: 2>&1 PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 644
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subn:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):et192'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET=':

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):172.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OCOL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT=:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):'202.12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='2:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):55.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLU:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):TO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _up:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):down:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
route-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing
route-client: 2>&1 PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'   ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 642
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='route-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):192'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PL:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):UTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='17:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):2.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOC:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):OL='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='2:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):02.12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
480):.255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):_STACK='netkey'  PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+IKEv2ALLOW'
ipsec _updo:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):wn:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#1 at 0x834dca0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  00 00 00 00
00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #1 on chain 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Queuing pending Quick
Mode with 202.12.0.29 "nzta-subnet64"

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
initiating Main Mode

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 00  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_IDPROT

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags: none

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_ISAKMP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ISAKMP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_T

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
KEY_IKE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
OAKLEY_LIFE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7200

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [7 is
OAKLEY_AES_CBC]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_HASH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [2 is
OAKLEY_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
OAKLEY_PRESHARED_KEY]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_GROUP_DESCRIPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [2 is
OAKLEY_GROUP_MODP1024]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ISAKMP): 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ISAKMP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_T

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
KEY_IKE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
OAKLEY_LIFE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7200

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [7 is
OAKLEY_AES_CBC]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_HASH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is OAKLEY_MD5]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
OAKLEY_PRESHARED_KEY]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_GROUP_DESCRIPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [5 is
OAKLEY_GROUP_MODP1536]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ISAKMP): 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ISAKMP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
KEY_IKE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
OAKLEY_LIFE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7200

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [7 is
OAKLEY_AES_CBC]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_HASH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is OAKLEY_MD5]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
OAKLEY_PRESHARED_KEY]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_GROUP_DESCRIPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [2 is
OAKLEY_GROUP_MODP1024]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ISAKMP): 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 116

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 12 raw bytes
of Vendor ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Vendor ID  4f 45 7e
71  7f 6b 5a 4e  72 7d 57 6b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [Dead Peer Detection]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID  af ca d7 13  68
a1 f1 c9  6b 86 96 fc  77 57 01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nat traversal
enabled: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nat add vid. port: 1
nonike: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [RFC 3947]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID  4a 13 1c 81  07
03 58 45  5c 57 28 f2  0e 95 45 2f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-03]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID  7d 94 19 a6  53
10 ca 6f  2c 17 9d 92  15 52 9d 56

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-02_n]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID  90 cb 80 91  3e
bb 69 6e  08 63 81 b5  ec 42 7b 1f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-02]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_VID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID  cd 60 46 43  35
df 21 f8  7c fd b2 fc  68 b6 a4 48

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_vendorid():
sending [draft-ietf-ipsec-nat-t-ike-00]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Vendor
ID Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of V_ID into ISAKMP Vendor ID Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | V_ID  44 85 15 2d  18
b6 bb cd  0b e8 a8 46  95 79 dd cc

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Vendor ID Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 292

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 292 bytes for
main_outI1 through eth0:500 to 202.12.0.29:500 (using #1)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  00 00 00 00  00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 10 02 00  00 00
00 00  00 00 01 24  0d 00 00 80

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 01  00 00 00 74  00 01 00 03

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   03 00 00 24  00 01
00 00  80 0b 00 01  80 0c 1c 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 01 00 07  80 02
00 02  80 03 00 01  80 04 00 02

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 0e 01 00  03 00
00 24  01 01 00 00  80 0b 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 0c 1c 20  80 01
00 07  80 02 00 01  80 03 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 04 00 05  80 0e
00 80  00 00 00 24  02 01 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 0b 00 01  80 0c
1c 20  80 01 00 07  80 02 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 03 00 01  80 04
00 02  80 0e 00 80  0d 00 00 10

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   4f 45 7e 71  7f 6b
5a 4e  72 7d 57 6b  0d 00 00 14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   af ca d7 13  68 a1
f1 c9  6b 86 96 fc  77 57 01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0d 00 00 14  4a 13
1c 81  07 03 58 45  5c 57 28 f2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0e 95 45 2f  0d 00
00 14  7d 94 19 a6  53 10 ca 6f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   2c 17 9d 92  15 52
9d 56  0d 00 00 14  90 cb 80 91

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   3e bb 69 6e  08 63
81 b5  ec 42 7b 1f  0d 00 00 14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   cd 60 46 43  35 df
21 f8  7c fd b2 fc  68 b6 a4 48

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 14  44 85
15 2d  18 b6 bb cd  0b e8 a8 46

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   95 79 dd cc

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 84 bytes
from 202.12.0.29:500 on eth0 (port=500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 10 02 00  00 00
00 00  00 00 00 54  00 00 00 38

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 01  00 00 00 2c  01 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 24  01 01
00 00  80 0b 00 01  80 0c 1c 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 01 00 07  80 02
00 02  80 03 00 01  80 04 00 02

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 0e 01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_IDPROT

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags: none

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 84

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  processing
version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object not
found

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  00 00 00 00
00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #1, provided msgid 00000000 vs 00000000

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #1
found, in STATE_MAIN_I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 56

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 44

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_ISAKMP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ISAKMP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
KEY_IKE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
OAKLEY_LIFE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7200

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_ENCRYPTION_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [7 is
OAKLEY_AES_CBC]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
ike_alg_enc_ok(ealg=7,key_len=0): blocksize=16, keyminlen=128,
keydeflen=128, keymaxlen=256, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_HASH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [2 is OAKLEY_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_AUTHENTICATION_METHOD

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
OAKLEY_PRESHARED_KEY]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | started looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | actually looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: key type
PPK_PSK(202.89.35.19) to type PPK_PSK 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
202.89.35.19 to 202.89.35.19 / 202.12.0.29 -> 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: match=12 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | best_match 0>12
best=0x834db58 (line=3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: key type
PPK_PSK(202.89.35.19) to type PPK_PSK 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
172.30.1.7 to 202.89.35.19 / 202.12.0.29 -> 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: match=4 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | concluding with
best_match=12 best=0x834db58 (lineno=3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_GROUP_DESCRIPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [2 is
OAKLEY_GROUP_MODP1024]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
Oakley attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
OAKLEY_KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
ike_alg_enc_ok(ealg=7,key_len=256): blocksize=16, keyminlen=128,
keydeflen=128, keymaxlen=256, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Oakley Transform 1
accepted

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sender checking
NAT-t: 1 and 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_kenonce op id: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Local DH secret:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 2f 35 08

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Public DH value
sent(computed in NSS):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   27 91 28 24  02 71
98 10  bf 01 a6 1b  83 6a 75 1f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   20 4f 84 8d  02 56
fb e5  d0 64 bb e0  b2 3a 9f fb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   d1 b2 2c 23  43 8b
ce 6f  ac 41 18 3c  63 6f d2 5d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   b0 57 d3 e0  46 f4
0d d6  2d 00 65 d6  28 11 c4 bb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   86 98 46 05  13 75
8e 0e  49 e9 34 ba  db 46 0a 6c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   38 90 f7 0c  72 af
42 34  ca 11 54 aa  21 42 43 09

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   26 12 4c 7a  3a 3e
74 ec  6a b1 60 28  12 26 df 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   95 ee a2 a7  ab 41
f9 5c  db 44 b5 d9  35 e5 2b 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Local DH public
value (pointer):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   88 27 35 08

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   27 eb 7c d2  2c fc
d1 3b  45 60 c2 15  51 4d 0d 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: packet from
202.12.0.29:500: pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | main inR1_outI2:
calculated ke+nonce, sending I2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_KE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_IDPROT

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags: none

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | saving DH priv (local
secret) and pub key into state struc

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Key
Exchange Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 128 raw
bytes of keyex value into ISAKMP Key Exchange Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  27 91 28
24  02 71 98 10  bf 01 a6 1b  83 6a 75 1f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  20 4f 84
8d  02 56 fb e5  d0 64 bb e0  b2 3a 9f fb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  d1 b2 2c
23  43 8b ce 6f  ac 41 18 3c  63 6f d2 5d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  b0 57 d3
e0  46 f4 0d d6  2d 00 65 d6  28 11 c4 bb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  86 98 46
05  13 75 8e 0e  49 e9 34 ba  db 46 0a 6c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  38 90 f7
0c  72 af 42 34  ca 11 54 aa  21 42 43 09

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  26 12 4c
7a  3a 3e 74 ec  6a b1 60 28  12 26 df 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | keyex value  95 ee a2
a7  ab 41 f9 5c  db 44 b5 d9  35 e5 2b 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Key Exchange Payload: 132

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni  27 eb 7c d2  2c
fc d1 3b  45 60 c2 15  51 4d 0d 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 180

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  00 00 00 00
00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #1 on chain 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
transition from state STATE_MAIN_I1 to state STATE_MAIN_I2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 180 bytes for
STATE_MAIN_I1 through eth0:500 to 202.12.0.29:500 (using #1)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   04 10 02 00  00 00
00 00  00 00 00 b4  0a 00 00 84

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   27 91 28 24  02 71
98 10  bf 01 a6 1b  83 6a 75 1f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   20 4f 84 8d  02 56
fb e5  d0 64 bb e0  b2 3a 9f fb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   d1 b2 2c 23  43 8b
ce 6f  ac 41 18 3c  63 6f d2 5d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   b0 57 d3 e0  46 f4
0d d6  2d 00 65 d6  28 11 c4 bb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   86 98 46 05  13 75
8e 0e  49 e9 34 ba  db 46 0a 6c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   38 90 f7 0c  72 af
42 34  ca 11 54 aa  21 42 43 09

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   26 12 4c 7a  3a 3e
74 ec  6a b1 60 28  12 26 df 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   95 ee a2 a7  ab 41
f9 5c  db 44 b5 d9  35 e5 2b 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 14  27 eb
7c d2  2c fc d1 3b  45 60 c2 15

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   51 4d 0d 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
STATE_MAIN_I2: sent MI2, expecting MR2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_INLINE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 184 bytes
from 202.12.0.29:500 on eth0 (port=500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   04 10 02 00  00 00
00 00  00 00 00 b8  0a 00 00 84

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ef 34 37 0f  47 80
52 14  47 7c 97 c0  42 21 fd 1d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6c 81 51 34  90 47
b2 92  cc 25 25 82  79 fc d9 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   4d 8c 33 2f  85 4f
15 fb  6d 01 64 3d  b9 82 44 f0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c7 34 53 12  44 3c
cf c4  4e 29 c8 6e  02 83 15 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   50 f1 7c 05  05 23
97 a8  89 87 61 76  6a 4a c5 dd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0c bf 03 46  48 77
9e 05  0b 89 52 95  3b 93 e7 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5d a1 c4 31  98 e2
01 98  e8 36 75 69  07 63 e5 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   de aa 7a cf  e0 e8
cc c9  3c 7f ea a3  69 ab 29 e6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 18  0b 70
6c ff  a0 0a 9e 80  f0 58 db 19

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   71 cb a9 a5  d4 75
f0 9e

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_KE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_IDPROT

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags: none

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 184

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  processing
version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #1, provided msgid 00000000 vs 00000000

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #1
found, in STATE_MAIN_I2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x10(ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Key
Exchange Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 132

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_IDPROT

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH public value
received:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ef 34 37 0f  47 80
52 14  47 7c 97 c0  42 21 fd 1d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6c 81 51 34  90 47
b2 92  cc 25 25 82  79 fc d9 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   4d 8c 33 2f  85 4f
15 fb  6d 01 64 3d  b9 82 44 f0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c7 34 53 12  44 3c
cf c4  4e 29 c8 6e  02 83 15 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   50 f1 7c 05  05 23
97 a8  89 87 61 76  6a 4a c5 dd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0c bf 03 46  48 77
9e 05  0b 89 52 95  3b 93 e7 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5d a1 c4 31  98 e2
01 98  e8 36 75 69  07 63 e5 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   de aa 7a cf  e0 e8
cc c9  3c 7f ea a3  69 ab 29 e6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | started looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | actually looking for
secret for 202.89.35.19->202.12.0.29 of kind PPK_PSK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: key type
PPK_PSK(202.89.35.19) to type PPK_PSK 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
202.89.35.19 to 202.89.35.19 / 202.12.0.29 -> 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 3: match=12 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | best_match 0>12
best=0x834db58 (line=3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: key type
PPK_PSK(202.89.35.19) to type PPK_PSK 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 1: compared key
202.12.0.29 to 202.89.35.19 / 202.12.0.29 -> 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | 2: compared key
172.30.1.7 to 202.89.35.19 / 202.12.0.29 -> 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | line 2: match=4 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | concluding with
best_match=12 best=0x834db58 (lineno=3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parent1 type: 7
group: 2 len: 2680 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Coying DH pub key
pointer to be sent to a thread helper

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
compute dh+iv op id: 3765321

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   ef 34 37
0f  47 80 52 14  47 7c 97 c0  42 21 fd 1d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   6c 81 51
34  90 47 b2 92  cc 25 25 82  79 fc d9 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   4d 8c 33
2f  85 4f 15 fb  6d 01 64 3d  b9 82 44 f0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   c7 34 53
12  44 3c cf c4  4e 29 c8 6e  02 83 15 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   50 f1 7c
05  05 23 97 a8  89 87 61 76  6a 4a c5 dd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   0c bf 03
46  48 77 9e 05  0b 89 52 95  3b 93 e7 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   5d a1 c4
31  98 e2 01 98  e8 36 75 69  07 63 e5 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer's g:   de aa 7a
cf  e0 e8 cc c9  3c 7f ea a3  69 ab 29 e6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Started DH
shared-secret computation in NSS: 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | calc_dh_shared():
time elapsed (OAKLEY_GROUP_MODP1024): 2406 usec

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH shared-secret
pointer:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 42 35 08

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: skeyid inputs
(pss+NI+NR+shared) hasher: oakley_sha

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | shared-secret:   08
42 35 08

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ni:   27 eb 7c d2  2c
fc d1 3b  45 60 c2 15  51 4d 0d 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nr:   0b 70 6c ff  a0
0a 9e 80  f0 58 db 19  71 cb a9 a5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | nr:   d4 75 f0 9e

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: st_skeyid in
skeyid_preshared(): 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   50 ac 35 08

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Started key
computation 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed key skeyid_d
with length =20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value:   41 d1 b2 05
d3 92 98 3f  d6 0b 78 82  f1 4a ed 1d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value:   98 ad 75 e7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed key skeyid_a
with length =20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value:   04 11 ca 2b
7d 4b 0b 69  cf c7 ec 77  90 89 50 e2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value:   cd 15 44 0a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: enc keysize=32 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed key enc_key
with length =32

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value:   cc 4c 13 0c
92 e5 d1 0f  94 4e 50 be  db df 28 0d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | value:   b9 38 d6 0a
ac dc 84 78  35 b6 3b 13  76 86 a3 d1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: Freed 25-39
symkeys 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
skeyid_d_chunk 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
skeyid_a_chunk 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
skeyid_e_chunk 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: copied
enc_key_chunk 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  27 91 28 24
02 71 98 10  bf 01 a6 1b  83 6a 75 1f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  20 4f 84 8d
02 56 fb e5  d0 64 bb e0  b2 3a 9f fb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  d1 b2 2c 23
43 8b ce 6f  ac 41 18 3c  63 6f d2 5d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  b0 57 d3 e0
46 f4 0d d6  2d 00 65 d6  28 11 c4 bb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  86 98 46 05
13 75 8e 0e  49 e9 34 ba  db 46 0a 6c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  38 90 f7 0c
72 af 42 34  ca 11 54 aa  21 42 43 09

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  26 12 4c 7a
3a 3e 74 ec  6a b1 60 28  12 26 df 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_i:  95 ee a2 a7
ab 41 f9 5c  db 44 b5 d9  35 e5 2b 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  ef 34 37 0f
47 80 52 14  47 7c 97 c0  42 21 fd 1d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  6c 81 51 34
90 47 b2 92  cc 25 25 82  79 fc d9 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  4d 8c 33 2f
85 4f 15 fb  6d 01 64 3d  b9 82 44 f0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  c7 34 53 12
44 3c cf c4  4e 29 c8 6e  02 83 15 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  50 f1 7c 05
05 23 97 a8  89 87 61 76  6a 4a c5 dd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  0c bf 03 46
48 77 9e 05  0b 89 52 95  3b 93 e7 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  5d a1 c4 31
98 e2 01 98  e8 36 75 69  07 63 e5 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | DH_r:  de aa 7a cf
e0 e8 cc c9  3c 7f ea a3  69 ab 29 e6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: end of key
computation 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: packet from
202.12.0.29:500: pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | main inR2_outI3:
calculated DH, sending R1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | thinking about
whether to send my certificate:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   I have RSA key:
OAKLEY_PRESHARED_KEY cert.type: CERT_NONE 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   sendcert:
CERT_ALWAYSSEND and I did not get a certificate request 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   so do not send
cert.

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | I did not send a
certificate because digital signatures are not being used. (PSK)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  I am not sending a
certificate request

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of my identity into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | my identity  ca 59 23
13

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | hashing 124 bytes of
SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 raw bytes
of HASH_I into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH_I  5b 49 0f 69
4e 51 82 ec  f6 94 43 5b  0d 81 0f 82

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH_I  6a 40 f6 7b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 00 00 0c  01 00
00 00  ca 59 23 13  00 00 00 18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5b 49 0f 69  4e 51
82 ec  f6 94 43 5b  0d 81 0f 82

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6a 40 f6 7b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   f0 70 ee b1  f8 3d
e4 b7  ed 32 d8 5c  a3 46 c6 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   7d ce cc db

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 12 zero
bytes of encryption padding into ISAKMP Message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  89 95 fc d1
72 0a 8e d7  91 7d be 9f  ee 1c ff 07

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
transition from state STATE_MAIN_I2 to state STATE_MAIN_I3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 76 bytes for
STATE_MAIN_I2 through eth0:500 to 202.12.0.29:500 (using #1)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   05 10 02 01  00 00
00 00  00 00 00 4c  72 58 62 84

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   41 d8 e8 c1  a6 b6
c7 9c  1f f0 92 aa  90 21 c9 9e

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0a 85 ef 9e  a8 ff
58 f3  de c0 45 e9  89 95 fc d1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   72 0a 8e d7  91 7d
be 9f  ee 1c ff 07

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
STATE_MAIN_I3: sent MI3, expecting MR3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_INLINE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 76 bytes
from 202.12.0.29:500 on eth0 (port=500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   05 10 02 01  00 00
00 00  00 00 00 4c  e6 c4 8f 56

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   79 4b 96 84  68 6d
c2 ae  40 51 4a 00  0b 84 c0 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 72 fc 96  05 65
92 17  da 92 79 e1  99 9a 7a 94

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   57 8b f3 40  a3 95
37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_IDPROT

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  00 00
00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 76

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  processing
version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #1, provided msgid 00000000 vs 00000000

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #1
found, in STATE_MAIN_I3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 48 bytes
using algorithm OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 00 00 0c  01 00
00 00  ca 0c 00 1d  00 00 00 18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   62 78 ca 75  4f 61
b6 b4  5c 93 eb 13  ec ce d9 76

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c0 ad e0 3c  00 00
00 00  00 00 00 00  00 00 00 0b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  99 9a 7a 94
57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x120 opt: 0x2080

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 12

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI specific A: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI specific B: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ca 0c 00
1d  00 00 00 18  62 78 ca 75

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x2080

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
Main mode peer ID is ID_IPV4_ADDR: '202.12.0.29'

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | hashing 124 bytes of
SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | authentication
succeeded

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
transition from state STATE_MAIN_I3 to state STATE_MAIN_I4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_REPLACE, timeout in 6207 seconds for #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_REINIT_SECRET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #1:
STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=aes_256 prf=oakley_sha group=modp1024}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unqueuing pending
Quick Mode with 202.12.0.29 "nzta-subnet64" import:admin initiate

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | duplicating state
object #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#2 at 0x8361b98

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #2 on chain 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1
msgid:9cb93a4e proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_nonce op id: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5a 71 6f 7c  3a 8d
12 4c  d2 1a 34 11  5b 14 f1 86

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: packet from
202.12.0.29:500: pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | quick outI1:
calculated ke+nonce, sending I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  4e 3a
b9 9c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_IPSEC_ESP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | netlink_get_spi:
allocated 0x2414019f for esp.0 at 172.30.1.7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of SPI into ISAKMP Proposal Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI  24 14 01 9f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ESP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
ESP_AES

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
ENCAPSULATION_MODE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
ENCAPSULATION_MODE_TUNNEL]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
SA_LIFE_TYPE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 600

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
AUTH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [2 is
AUTH_ALGORITHM_HMAC_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ESP): 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni  5a 71 6f 7c  3a
8d 12 4c  d2 1a 34 11  5b 14 f1 86

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network  ac 1e
01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask  ff ff ff
00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network  ca 0c
00 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask  ff ff ff
c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(1) computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   85 33 3f 2c  03 13
1d 87  73 d1 fc 50  f8 76 1c da

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c7 17 fe 47

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | last Phase 1 IV:  99
9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   b5 00 cf d9  8e 9e
8f 94  60 38 4f 7d  28 6a 29 e3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8f 20 63 a3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 00 00 18  85 33
3f 2c  03 13 1d 87  73 d1 fc 50

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   f8 76 1c da  c7 17
fe 47  0a 00 00 34  00 00 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 28  00 03 04 01  24 14 01 9f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 1c  00 0c
00 00  80 04 00 01  80 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 02 02 58  80 05
00 02  80 06 01 00  05 00 00 14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5a 71 6f 7c  3a 8d
12 4c  d2 1a 34 11  5b 14 f1 86

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   05 00 00 10  04 00
00 00  ac 1e 01 00  ff ff ff 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 10  04 00
00 00  ca 0c 00 40  ff ff ff c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   b5 00 cf d9  8e 9e
8f 94  60 38 4f 7d  28 6a 29 e3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8f 20 63 a3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 128 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  9c e1 16 a2
59 a5 bd b6  29 a9 37 e3  20 4a ce 39

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 156

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 156 bytes for
quick_outI1 through eth0:500 to 202.12.0.29:500 (using #2)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  4e 3a
b9 9c  00 00 00 9c  99 4f d5 5c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   79 56 31 0e  f3 c1
07 e3  88 80 73 d6  c5 b6 85 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   d1 78 c7 f4  5e 8d
b6 97  c4 14 e3 8e  e5 73 7e 31

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   af 7d db b4  ca e3
e2 e1  15 f2 0e 11  4c 22 d1 8a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   1e a3 50 33  2e ed
da 78  6b d7 7c d0  e3 6a cd 37

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff be da 96  67 5a
de 13  dc 9a 61 28  92 89 00 eb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   7c 15 fc cd  ef e0
23 01  3f 97 57 9f  d2 6b d0 be

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   7c b8 56 3d  a5 5d
95 60  fc 5b 5a f4  9c e1 16 a2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   59 a5 bd b6  29 a9
37 e3  20 4a ce 39

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | duplicating state
object #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#3 at 0x8362118

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #3 on chain 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1
msgid:3a64426a proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_nonce op id: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9a ec 25 dc  9b 1d
f2 b5  c7 bc e4 c1  64 e9 56 05

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128":
pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | quick outI1:
calculated ke+nonce, sending I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  6a 42
64 3a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_IPSEC_ESP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | netlink_get_spi:
allocated 0x8ee723cb for esp.0 at 172.30.1.7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of SPI into ISAKMP Proposal Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI  8e e7 23 cb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ESP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
ESP_AES

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
ENCAPSULATION_MODE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
ENCAPSULATION_MODE_TUNNEL]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
SA_LIFE_TYPE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 600

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
AUTH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [2 is
AUTH_ALGORITHM_HMAC_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ESP): 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni  9a ec 25 dc  9b
1d f2 b5  c7 bc e4 c1  64 e9 56 05

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network  ac 1e
01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask  ff ff ff
00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network  ca 0c
00 80

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask  ff ff ff
c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(1) computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   4a d6 9b 90  cf b4
49 66  b3 dd c2 38  06 5f 17 a7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   60 01 33 e6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | last Phase 1 IV:  99
9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ac 57 95 d4  c5 ed
2e 22  58 b2 5f 4e  2d 65 c6 ec

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c3 53 7c 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 00 00 18  4a d6
9b 90  cf b4 49 66  b3 dd c2 38

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   06 5f 17 a7  60 01
33 e6  0a 00 00 34  00 00 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 28  00 03 04 01  8e e7 23 cb

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 1c  00 0c
00 00  80 04 00 01  80 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 02 02 58  80 05
00 02  80 06 01 00  05 00 00 14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9a ec 25 dc  9b 1d
f2 b5  c7 bc e4 c1  64 e9 56 05

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   05 00 00 10  04 00
00 00  ac 1e 01 00  ff ff ff 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 10  04 00
00 00  ca 0c 00 80  ff ff ff c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ac 57 95 d4  c5 ed
2e 22  58 b2 5f 4e  2d 65 c6 ec

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c3 53 7c 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 128 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  b6 26 f9 70
d2 0c 37 2a  2d 02 2c 99  9e dc 64 df

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 156

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 156 bytes for
quick_outI1 through eth0:500 to 202.12.0.29:500 (using #3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  6a 42
64 3a  00 00 00 9c  c5 35 8b 18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a1 3c 34 57  dd 94
53 98  be ea 26 a9  11 bb f2 87

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   60 7a 87 19  65 c9
3f 43  14 be 8a ba  0b 4a d3 59

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   2e 31 d2 32  c1 c8
9f 59  0e 4d 81 f5  a5 46 0a 60

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5a cf 6f d0  0e 86
df 1c  7f 30 d9 4c  7d 1d a6 dd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   1a c5 97 78  2d 95
c9 05  10 2e a5 8a  84 9c f0 68

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   48 d1 96 68  2f 27
a5 8e  f6 7b 89 77  7d e2 c0 6b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   78 c4 84 66  31 a7
67 27  5f 09 e0 03  b6 26 f9 70

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   d2 0c 37 2a  2d 02
2c 99  9e dc 64 df

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 172 bytes
from 202.12.0.29:500 on eth0 (port=500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  4e 3a
b9 9c  00 00 00 ac  8b f6 7d f2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   61 f9 8f 8b  98 8b
40 cb  e5 a9 92 65  17 e9 ca f7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ca df f4  f8 06
0c b0  49 3d 57 fe  af c0 fe af

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   96 82 a2 36  ef dc
53 2b  cd bd 4a 1c  a5 92 ef 78

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0a 80 e3 10  c9 e6
35 57  3c af 29 2d  44 2c 56 8c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8c 30 a8 10  a7 87
a8 0b  c7 4d 9d c3  cc 3c 39 43

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   65 d3 8c ef  9b 82
8b 37  01 b1 59 45  cf dd 1d d7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   2c ee 96 63  a2 ba
2d 97  e8 4f f2 b8  6d cc cf 9e

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   2c 98 14 7b  cd 52
51 68  4f f2 af bd  14 69 e0 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   43 80 e0 ed  6f 84
44 28  71 f4 a6 a8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  4e 3a
b9 9c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 172

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  processing
version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #3, provided msgid 4e3ab99c vs 6a42643a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #2, provided msgid 4e3ab99c vs 4e3ab99c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #2
found, in STATE_QUICK_I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 144 bytes
using algorithm OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 00 00 18  78 e7
aa b2  53 f0 cb f7  f2 42 ca d8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   21 ea 51 06  ef 3c
da a4  0a 00 00 34  00 00 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 28  01 03 04 01  31 fd c4 37

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 1c  01 0c
00 00  80 04 00 01  80 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 02 02 58  80 05
00 02  80 06 01 00  05 00 00 18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   44 94 2c da  61 4a
8a 1e  55 f5 d0 42  55 c8 5c fd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   41 e5 3d 45  05 00
00 10  04 00 00 00  ac 1e 01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ff ff 00  00 00
00 10  04 00 00 00  ca 0c 00 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ff ff c0  00 00
00 00  00 00 00 00  00 00 00 0b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  14 69 e0 3d
43 80 e0 ed  6f 84 44 28  71 f4 a6 a8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ac 1e 01
00  ff ff ff 00  00 00 00 10  04 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ca 0c 00
40  ff ff ff c0  00 00 00 00  00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  4e 3a
b9 9c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(2) computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   78 e7 aa b2  53 f0
cb f7  f2 42 ca d8  21 ea 51 06

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ef 3c da a4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_IPSEC_ESP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parsing 4 raw bytes
of ISAKMP Proposal Payload into SPI

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI  31 fd c4 37

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ESP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
ESP_AES

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
ENCAPSULATION_MODE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
ENCAPSULATION_MODE_TUNNEL]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
SA_LIFE_TYPE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 600

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
AUTH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [2 is
AUTH_ALGORITHM_HMAC_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,256): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client is subnet
172.30.1.0/24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client
protocol/port is 0/0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client is subnet
202.12.0.64/26

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client
protocol/port is 0/0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed:  92
eb 81 64  ea 34 41 86  3a 03 fc 37  e0 09 5c 76

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed:  4c
df 11 f5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP enc)=32

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP auth)=52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP KEYMAT 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   KEYMAT computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9d c5 62 05  74 37
e3 bc  7d be 42 17  17 42 22 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 b9 df 6b  7e 56
c7 4b  70 80 fd 2c  51 30 8e c7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   87 44 fd f1  e6 9d
e9 cf  33 91 bd aa  da ef aa 9f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8a 4d 33 25

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   Peer KEYMAT
computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c5 d6 4f 1a  17 97
5d 1d  45 18 47 ea  37 15 2a 9f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8d 46 45 fa  8e 33
df ba  91 43 59 98  80 c7 b2 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   d7 f9 9f d5  7b be
17 cf  68 45 83 b2  53 df b7 60

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   1f 2e 24 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | install_ipsec_sa()
for #2: inbound and outbound

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" prospective erouted: self; eroute owner: self

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet64 (kind=CK_PERMANENT)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  c5 d6 4f
1a  17 97 5d 1d  45 18 47 ea  37 15 2a 9f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  8d 46 45
fa  8e 33 df ba  91 43 59 98  80 c7 b2 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  d7 f9
9f d5  7b be 17 cf  68 45 83 b2  53 df b7 60

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  1f 2e
24 36

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up outoing SA,
ref=0/4294901761

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  9d c5 62
05  74 37 e3 bc  7d be 42 17  17 42 22 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  a8 b9 df
6b  7e 56 c7 4b  70 80 fd 2c  51 30 8e c7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  87 44
fd f1  e6 9d e9 cf  33 91 bd aa  da ef aa 9f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  8a 4d
33 25

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | add inbound eroute
202.12.0.64/26:0 --0-> 172.30.1.0/24:0 => tun.10000 at 172.30.1.7
(raw_eroute)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up incoming SA,
ref=0/4294901761

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sr for #2:
prospective erouted

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet64" prospective erouted: self; eroute owner: self

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet64 (next: none) ero:nzta-subnet64 esr:{(nil)}
ro:nzta-subnet64 rosr:{(nil)} and state: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eroute_connection
replace eroute 172.30.1.0/24:0 --0-> 202.12.0.64/26:0 =>
tun.0 at 202.12.0.29 (raw_eroute)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
up-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing up-client:
2>&1 PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME=''  ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 662
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64':

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL=':

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202.1:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 400):2.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64' PLUTO_PEER_CLIENT_MASK='255.255.2:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):55.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA=''
PLUTO_STACK:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 560):='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH_USER:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):NAME=''
ipsec _updown:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
instance "nzta-subnet64", setting eroute_owner
{spd=0x8345f60,sr=0x8345f60} to #2 (was #0) (newest_ipsec_sa=#0)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 18  92 eb
81 64  ea 34 41 86  3a 03 fc 37

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   e0 09 5c 76  4c df
11 f5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   14 69 e0 3d  43 80
e0 ed  6f 84 44 28  71 f4 a6 a8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 32 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  d1 4f da 2f
73 c1 37 48  db 25 15 53  14 b2 75 cd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 60

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inR1_outI2: instance
nzta-subnet64[0], setting newest_ipsec_sa to #2 (was #0) (spd.eroute=#2)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
transition from state STATE_QUICK_I1 to state STATE_QUICK_I2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 60 bytes for
STATE_QUICK_I1 through eth0:500 to 202.12.0.29:500 (using #2)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  4e 3a
b9 9c  00 00 00 3c  2c 56 dc 7d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   69 15 6c c4  bf 2f
1a 2f  e7 ae d6 9e  d1 4f da 2f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   73 c1 37 48  db 25
15 53  14 b2 75 cd

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_EXPIRE, timeout in 600 seconds for #2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_PENDING_PHASE2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0x31fdc437 <0x2414019f xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none
DPD=none}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 172 bytes
from 202.12.0.29:500 on eth0 (port=500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  6a 42
64 3a  00 00 00 ac  cb 50 bc fa

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   86 13 66 bb  2d 20
98 e5  96 bb d2 43  d8 bc db 23

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6c ec 06 06  65 d8
a9 ca  8e a1 cf db  a3 1d 88 97

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   50 4b 19 1a  b2 7b
93 5a  3d d4 99 70  36 a8 f2 0b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   2d 43 ec cd  a0 a6
f8 05  8c e8 f6 e3  6f f3 0a f1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6d 80 ef f2  59 3e
99 e5  90 9b c7 96  7d 1f bb b4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   40 a0 55 8e  eb b1
e6 90  23 cc 5b 8b  d7 20 b9 99

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9a fa 40 f4  6b ae
a5 a8  f7 f8 98 7d  88 83 20 17

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0b 41 d5 7f  15 ab
ff ef  1e fe 73 49  87 bc 8e e5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ed 7f 4f d3  a1 60
94 fa  69 7f 44 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  6a 42
64 3a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 172

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  processing
version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #3, provided msgid 6a42643a vs 6a42643a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #3
found, in STATE_QUICK_I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 144 bytes
using algorithm OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 00 00 18  12 f7
bb 7e  6a 0a 34 c3  60 96 6b 1d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ad 9a bb 90  ef 50
20 c9  0a 00 00 34  00 00 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 28  01 03 04 01  2a 8f 08 f0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 1c  01 0c
00 00  80 04 00 01  80 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 02 02 58  80 05
00 02  80 06 01 00  05 00 00 18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   67 eb 00 0c  e5 21
f3 eb  d1 39 c2 ae  1a da 13 10

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   19 e5 5f 0c  05 00
00 10  04 00 00 00  ac 1e 01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ff ff 00  00 00
00 10  04 00 00 00  ca 0c 00 80

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ff ff c0  00 00
00 00  00 00 00 00  00 00 00 0b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  87 bc 8e e5
ed 7f 4f d3  a1 60 94 fa  69 7f 44 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ac 1e 01
00  ff ff ff 00  00 00 00 10  04 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ca 0c 00
80  ff ff ff c0  00 00 00 00  00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  6a 42
64 3a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(2) computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   12 f7 bb 7e  6a 0a
34 c3  60 96 6b 1d  ad 9a bb 90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ef 50 20 c9

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_IPSEC_ESP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parsing 4 raw bytes
of ISAKMP Proposal Payload into SPI

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI  2a 8f 08 f0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ESP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
ESP_AES

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
ENCAPSULATION_MODE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
ENCAPSULATION_MODE_TUNNEL]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
SA_LIFE_TYPE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 600

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
AUTH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [2 is
AUTH_ALGORITHM_HMAC_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,256): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client is subnet
172.30.1.0/24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client
protocol/port is 0/0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client is subnet
202.12.0.128/26

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client
protocol/port is 0/0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed:  b8
63 67 5f  03 4c 18 7b  ca bb 40 66  c3 b8 7e 3c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed:  ae
4f e3 db

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP enc)=32

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP auth)=52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP KEYMAT 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   KEYMAT computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   02 13 e4 e4  01 f3
b7 3c  c0 59 9d be  6d 9c d8 c7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0a 75 ac e4  6d 42
8a 42  d7 d8 d6 47  ee 75 7d f1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   7c 8d 23 1a  fc 9e
6a 67  e3 3b 04 a7  b7 e3 06 66

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   10 90 9b af

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   Peer KEYMAT
computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8c 5a 59 73  69 18
de c6  10 8f 1a 10  8c aa 9d 04

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   eb b1 cf 3f  f9 63
9b 54  c0 06 89 bd  d0 d8 2a 35

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9b 0f fa 39  70 2a
d1 7a  6e 05 d3 f0  09 d9 18 b6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   f1 f4 7b 45

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | install_ipsec_sa()
for #3: inbound and outbound

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" prospective erouted: self; eroute owner: self

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet128 (kind=CK_PERMANENT)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  8c 5a 59
73  69 18 de c6  10 8f 1a 10  8c aa 9d 04

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  eb b1 cf
3f  f9 63 9b 54  c0 06 89 bd  d0 d8 2a 35

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  9b 0f
fa 39  70 2a d1 7a  6e 05 d3 f0  09 d9 18 b6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  f1 f4
7b 45

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up outoing SA,
ref=0/4294901761

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  02 13 e4
e4  01 f3 b7 3c  c0 59 9d be  6d 9c d8 c7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  0a 75 ac
e4  6d 42 8a 42  d7 d8 d6 47  ee 75 7d f1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  7c 8d
23 1a  fc 9e 6a 67  e3 3b 04 a7  b7 e3 06 66

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  10 90
9b af

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | add inbound eroute
202.12.0.128/26:0 --0-> 172.30.1.0/24:0 => tun.10000 at 172.30.1.7
(raw_eroute)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up incoming SA,
ref=0/4294901761

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sr for #3:
prospective erouted

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet128" prospective erouted: self; eroute owner: self

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet128 (next: none) ero:nzta-subnet128 esr:{(nil)}
ro:nzta-subnet128 rosr:{(nil)} and state: 3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eroute_connection
replace eroute 172.30.1.0/24:0 --0-> 202.12.0.128/26:0 =>
tun.0 at 202.12.0.29 (raw_eroute)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
up-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing up-client:
2>&1 PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME=''  ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 665
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.3:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):0.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL=:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):'0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202.:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.25:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):5.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_ST:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):ACK='netkey'  PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_U:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):SERNAME=''
ipsec _updown:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
instance "nzta-subnet128", setting eroute_owner
{spd=0x834b1b8,sr=0x834b1b8} to #3 (was #0) (newest_ipsec_sa=#0)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 18  b8 63
67 5f  03 4c 18 7b  ca bb 40 66

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c3 b8 7e 3c  ae 4f
e3 db

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   87 bc 8e e5  ed 7f
4f d3  a1 60 94 fa  69 7f 44 ee

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 32 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  78 df a5 d1
7e f5 b6 32  fa e1 cf 4b  c9 94 9d 95

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 60

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inR1_outI2: instance
nzta-subnet128[0], setting newest_ipsec_sa to #3 (was #0)
(spd.eroute=#3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
transition from state STATE_QUICK_I1 to state STATE_QUICK_I2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 60 bytes for
STATE_QUICK_I1 through eth0:500 to 202.12.0.29:500 (using #3)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  6a 42
64 3a  00 00 00 3c  5a 20 b7 ad

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   05 55 48 9e  14 d9
24 05  ab 93 29 ca  78 df a5 d1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   7e f5 b6 32  fa e1
cf 4b  c9 94 9d 95

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_EXPIRE, timeout in 600 seconds for #3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_PENDING_PHASE2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0x2a8f08f0 <0x8ee723cb xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none
DPD=none}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | duplicating state
object #1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | creating state object
#4 at 0x8358aa0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting state
object #4 on chain 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1
msgid:05b5d8bb proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | helper -1 doing
build_nonce op id: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Generated nonce:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   56 80 df 22  37 28
1b e6  a8 f3 f6 e3  5b e3 0b 92

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192":
pluto_do_crypto: helper (-1) is  exiting 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | quick outI1:
calculated ke+nonce, sending I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  bb d8
b5 05

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
initial trans_cnt=90

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
will return p_new->protoid=3, p_new->trans_cnt=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | kernel_alg_db_new()
trans[0]: transid=12, attr_cnt=2, attrs[0].type=5, attrs[0].val=2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | returning new
proposal from esp_info

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 has 1
valid proposals

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | out_sa pcn: 0 pn: 0<1
valid_count: 1 trans_cnt: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****emit ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_IPSEC_ESP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | netlink_get_spi:
allocated 0x834313d for esp.0 at 172.30.1.7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of SPI into ISAKMP Proposal Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI  08 34 31 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****emit ISAKMP
Transform Payload (ESP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
ESP_AES

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
ENCAPSULATION_MODE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
ENCAPSULATION_MODE_TUNNEL]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [1 is
SA_LIFE_TYPE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 600

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
AUTH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |     [2 is
AUTH_ALGORITHM_HMAC_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******emit ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Transform Payload (ESP): 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Proposal Payload: 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Security Association Payload: 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 16 raw bytes
of Ni into ISAKMP Nonce Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | Ni  56 80 df 22  37
28 1b e6  a8 f3 f6 e3  5b e3 0b 92

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Nonce Payload: 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network  ac 1e
01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask  ff ff ff
00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client network into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client network  ca 0c
00 c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of client mask into ISAKMP Identification Payload (IPsec DOI)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | client mask  ff ff ff
c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Identification Payload (IPsec DOI): 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(1) computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   74 63 1d 4d  ed 58
7b e9  d8 9b 98 8e  cd af 24 a9

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   83 78 e4 cf

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | last Phase 1 IV:  99
9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c9 9c 8e 32  c0 6d
3e 53  4d 74 44 07  61 cf 8c 53

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   85 58 e8 d8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 00 00 18  74 63
1d 4d  ed 58 7b e9  d8 9b 98 8e

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   cd af 24 a9  83 78
e4 cf  0a 00 00 34  00 00 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 28  00 03 04 01  08 34 31 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 1c  00 0c
00 00  80 04 00 01  80 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 02 02 58  80 05
00 02  80 06 01 00  05 00 00 14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   56 80 df 22  37 28
1b e6  a8 f3 f6 e3  5b e3 0b 92

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   05 00 00 10  04 00
00 00  ac 1e 01 00  ff ff ff 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 10  04 00
00 00  ca 0c 00 c0  ff ff ff c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c9 9c 8e 32  c0 6d
3e 53  4d 74 44 07  61 cf 8c 53

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   85 58 e8 d8

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 128

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 128 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  06 96 31 98
4c 53 98 6e  ff 8b 77 ee  c7 cb 24 1b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 156

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 156 bytes for
quick_outI1 through eth0:500 to 202.12.0.29:500 (using #4)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  bb d8
b5 05  00 00 00 9c  2d 85 d8 d6

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5a 1d 1a 79  4b 53
fc 83  83 08 4d b5  86 c4 e5 b0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   47 a7 2d de  89 b9
ef 4d  a4 ea c1 a6  6d 7c ea 92

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   df 83 49 9f  77 58
b4 60  7a 36 2b 8d  b5 f6 48 76

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   da b2 90 d2  b4 38
98 81  b7 44 5a f9  c4 83 be ef

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   5b 58 9e 3f  7e 6c
53 63  fb 35 9f 61  04 11 23 0d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8b 0f 94 e1  ef 2e
47 0d  b4 a6 59 ef  32 04 85 66

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ed d6 d8 87  2c 10
0b 29  44 36 a6 1f  06 96 31 98

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   4c 53 98 6e  ff 8b
77 ee  c7 cb 24 1b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_RETRANSMIT in 10 seconds for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *received 172 bytes
from 202.12.0.29:500 on eth0 (port=500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  bb d8
b5 05  00 00 00 ac  c2 e8 85 3d

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6a e6 72 6f  b9 d6
c6 5d  18 82 bd c4  c7 0a cb 45

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   8b 7a 2a 86  83 0b
5b b3  43 68 90 0d  e4 d2 42 5a

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 38 cb 28  86 d5
08 c2  f5 8c eb 49  c7 c0 6a 44

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   4a 11 fb 51  0c 07
87 d4  9e 75 50 01  12 23 1f 50

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   dd d1 98 2a  7a 87
81 99  b5 e7 a5 a5  ff 63 45 d9

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   3e 26 6c 5b  78 e3
19 d6  10 83 ed 46  31 be 5e 93

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   57 29 61 6b  f8 de
45 fa  00 b0 dc 98  1f 1a 1d 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   96 88 ef 68  2b 53
3d 70  9b 55 75 6a  6d 0b 3b 67

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   67 b6 08 1f  93 25
e4 7c  63 c5 5d d7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **parse ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  bb d8
b5 05

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 172

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |  processing
version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 peer and cookies
match on #4, provided msgid bbd8b505 vs bbd8b505

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | v1 state object #4
found, in STATE_QUICK_I1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | received encrypted
packet from 202.12.0.29:500

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypting 144 bytes
using algorithm OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | decrypted:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   01 00 00 18  50 97
23 69  d0 88 8b 45  e2 8a 00 f5

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   f0 d4 90 14  d0 ef
66 b7  0a 00 00 34  00 00 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 01  00 00
00 28  01 03 04 01  b7 e2 1a 6c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 1c  01 0c
00 00  80 04 00 01  80 01 00 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   80 02 02 58  80 05
00 02  80 06 01 00  05 00 00 18

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   f5 e3 2e 47  c4 a0
cb 39  09 56 73 63  24 6e 32 bf

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   18 1a fd 71  05 00
00 10  04 00 00 00  ac 1e 01 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ff ff 00  00 00
00 10  04 00 00 00  ca 0c 00 c0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   ff ff ff c0  00 00
00 00  00 00 00 00  00 00 00 0b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  6d 0b 3b 67
67 b6 08 1f  93 25 e4 7c  63 c5 5d d7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_SA

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x2(ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Security Association Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONCE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x400(ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP Nonce
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_ID

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ac 1e 01
00  ff ff ff 00  00 00 00 10  04 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | got payload
0x20(ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***parse ISAKMP
Identification Payload (IPsec DOI):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 16

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ID type:
ID_IPV4_ADDR_SUBNET

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    Protocol ID: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    port: 0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |      obj:   ca 0c 00
c0  ff ff ff c0  00 00 00 00  00 00 00 00

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | removing 12 bytes of
padding

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_QUICK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    message ID:  bb d8
b5 05

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(2) computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   50 97 23 69  d0 88
8b 45  e2 8a 00 f5  f0 d4 90 14

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   d0 ef 66 b7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse IPsec DOI
SIT:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    IPsec DOI SIT:
SIT_IDENTITY_ONLY

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ****parse ISAKMP
Proposal Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 40

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    proposal number: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    protocol ID:
PROTO_IPSEC_ESP

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    number of
transforms: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | parsing 4 raw bytes
of ISAKMP Proposal Payload into SPI

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | SPI  b7 e2 1a 6c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | *****parse ISAKMP
Transform Payload (ESP):

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length: 28

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform number:
1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    transform ID:
ESP_AES

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
ENCAPSULATION_MODE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
ENCAPSULATION_MODE_TUNNEL]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_TYPE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [1 is
SA_LIFE_TYPE_SECONDS]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
SA_LIFE_DURATION

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 600

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
AUTH_ALGORITHM

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    [2 is
AUTH_ALGORITHM_HMAC_SHA1]

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ******parse ISAKMP
IPsec DOI attribute:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    af+type:
KEY_LENGTH

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    length/value: 256

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,256): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client is subnet
172.30.1.0/24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | our client
protocol/port is 0/0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client is subnet
202.12.0.192/26

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | peer client
protocol/port is 0/0

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH into ISAKMP Hash Payload

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed:  ed
ff 94 bb  25 c2 ac 00  5d 7c e2 64  0d 51 95 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | HASH(3) computed:  91
b6 81 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP enc)=32

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
compute_proto_keymat:needed_len (after ESP auth)=52

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | ESP KEYMAT 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   KEYMAT computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   72 d4 9e dc  6c 25
44 04  7e e8 ec de  49 50 ac 6b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   13 d8 08 41  99 89
4d 98  fa 86 f9 3c  2b 63 9b 6f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   df c6 9a 71  be 5e
82 a5  98 91 2c 88  5a 84 ed 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9b 68 b9 66

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   Peer KEYMAT
computed:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6c fb aa 0e  2e 38
26 d0  29 a2 69 7e  93 54 17 35

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   38 99 ba 63  0d 96
fd b5  18 6e 0a 95  19 18 78 61

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   98 69 a7 de  aa 8d
fa b2  ce c9 70 be  c8 81 32 b3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   9f df 57 96

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | install_ipsec_sa()
for #4: inbound and outbound

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" prospective erouted: self; eroute owner: self

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | could_route called
for nzta-subnet192 (kind=CK_PERMANENT)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  6c fb aa
0e  2e 38 26 d0  29 a2 69 7e  93 54 17 35

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  38 99 ba
63  0d 96 fd b5  18 6e 0a 95  19 18 78 61

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  98 69
a7 de  aa 8d fa b2  ce c9 70 be  c8 81 32 b3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  9f df
57 96

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up outoing SA,
ref=0/4294901761

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | looking for alg with
transid: 12 keylen: 256 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 11
keylen: 0 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 2
keylen: 8 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 3
keylen: 24 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 0 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | checking transid: 12
keylen: 16 auth: 2 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_info():transid=12, auth=2, ei=0x7da428, enckeylen=32,
authkeylen=20, encryptalg=12, authalg=3

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  72 d4 9e
dc  6c 25 44 04  7e e8 ec de  49 50 ac 6b

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp enckey:  13 d8 08
41  99 89 4d 98  fa 86 f9 3c  2b 63 9b 6f

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  df c6
9a 71  be 5e 82 a5  98 91 2c 88  5a 84 ed 01

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | esp authkey:  9b 68
b9 66

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | add inbound eroute
202.12.0.192/26:0 --0-> 172.30.1.0/24:0 => tun.10000 at 172.30.1.7
(raw_eroute)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | set up incoming SA,
ref=0/4294901761

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sr for #4:
prospective erouted

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route owner of
"nzta-subnet192" prospective erouted: self; eroute owner: self

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute with
c: nzta-subnet192 (next: none) ero:nzta-subnet192 esr:{(nil)}
ro:nzta-subnet192 rosr:{(nil)} and state: 4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | eroute_connection
replace eroute 172.30.1.0/24:0 --0-> 202.12.0.192/26:0 =>
tun.0 at 202.12.0.29 (raw_eroute)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | command executing
up-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | executing up-client:
2>&1 PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME=''  ipsec _updown

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | popen(): cmd is 665
chars long

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='up-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(  80):'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
160):_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.3:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 240):0.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL=:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 320):'0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202.:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
400):12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.25:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 480):5.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_ST:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd(
560):ACK='netkey'  PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_U:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | cmd( 640):SERNAME=''
ipsec _updown:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
firewall_notified: true

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | route_and_eroute:
instance "nzta-subnet192", setting eroute_owner
{spd=0x834c360,sr=0x834c360} to #4 (was #0) (newest_ipsec_sa=#0)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   00 00 00 18  ed ff
94 bb  25 c2 ac 00  5d 7c e2 64

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   0d 51 95 01  91 b6
81 c4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   6d 0b 3b 67  67 b6
08 1f  93 25 e4 7c  63 c5 5d d7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | unpadded size is: 24

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | encrypting 32 using
OAKLEY_AES_CBC

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next IV:  20 b6 92 c9
38 07 c5 e9  af 7f 95 63  da 94 c3 0c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 60

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inR1_outI2: instance
nzta-subnet192[0], setting newest_ipsec_sa to #4 (was #0)
(spd.eroute=#4)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | complete state
transition with STF_OK

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
transition from state STATE_QUICK_I1 to state STATE_QUICK_I2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | deleting event for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending reply packet
to 202.12.0.29:500 (from port 500)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | sending 60 bytes for
STATE_QUICK_I1 through eth0:500 to 202.12.0.29:500 (using #4)

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   08 10 20 01  bb d8
b5 05  00 00 00 3c  00 40 db d7

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   c2 ae 8a c5  0b 99
9c 5c  1f 8a 91 6f  20 b6 92 c9

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: |   38 07 c5 e9  af 7f
95 63  da 94 c3 0c

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_SA_EXPIRE, timeout in 600 seconds for #4

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | event added after
event EVENT_PENDING_PHASE2

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0xb7e21a6c <0x0834313d xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none
DPD=none}

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | modecfg pull: noquirk
policy:push not-client

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | phase 1 is done,
looking for phase 2 to unpend

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:34:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 119 seconds

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |  

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2a8f08f0 at 202.12.0.29

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.8ee723cb at 172.30.1.7

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.b7e21a6c at 202.12.0.29

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.834313d at 172.30.1.7

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.31fdc437 at 202.12.0.29

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2414019f at 172.30.1.7

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |  

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2a8f08f0 at 202.12.0.29

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.8ee723cb at 172.30.1.7

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.b7e21a6c at 202.12.0.29

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.834313d at 172.30.1.7

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.31fdc437 at 202.12.0.29

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | get
esp.2414019f at 172.30.1.7

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds

Apr 13 20:35:01 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 103 seconds

Apr 13 20:35:02 vps-itelematics007 pluto[26771]: |  

Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 102 seconds

Apr 13 20:35:02 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 102 seconds

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: |  

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -1 seconds

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 480 seconds

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:36:45 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: |  

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -3 seconds

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 357 seconds

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:38:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: |  

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -2 seconds

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 235 seconds

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:40:50 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: |  

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -2 seconds

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in 113 seconds

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | event added after
event EVENT_SA_EXPIRE for #2

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:42:52 vps-itelematics007 pluto[26771]: | next event
EVENT_SA_EXPIRE in 113 seconds for #4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |  

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next event
EVENT_SA_EXPIRE in -2 seconds for #4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | handling event
EVENT_SA_EXPIRE

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in -2 seconds

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet192

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: "nzta-subnet192" #4:
IPsec SA expired (LATEST!)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting state #4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_INFO

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    message ID:  39 59
ce 47

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_D

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH(1) into ISAKMP Hash Payload

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Delete
Payload:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    protocol ID: 3

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    number of SPIs: 1

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of delete payload into ISAKMP Delete Payload

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete payload  08 34
31 3d

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Delete Payload: 16

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | HASH(1) computed:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   ee fa 87 db  6f 71
b8 a2  44 e5 03 3e  5f 8a db 8b

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   74 01 e2 ff

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | last Phase 1 IV:  99
9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   bc 36 29 ca  51 cf
dd 68  d2 47 51 12  94 75 5c 85

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   7e a6 0e 36

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   0c 00 00 18  ee fa
87 db  6f 71 b8 a2  44 e5 03 3e

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   5f 8a db 8b  74 01
e2 ff  00 00 00 10  00 00 00 01

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   03 04 00 01  08 34
31 3d

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   bc 36 29 ca  51 cf
dd 68  d2 47 51 12  94 75 5c 85

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   7e a6 0e 36

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | unpadded size is: 40

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next IV:  8a 92 a9 10
de bc 37 9a  10 b3 01 41  2c 54 7f 76

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | sending 76 bytes for
delete notify through eth0:500 to 202.12.0.29:500 (using #1)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   08 10 05 01  39 59
ce 47  00 00 00 4c  de f6 fc 3b

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   53 e0 70 eb  f1 a3
9d 5c  f7 b5 59 83  af 0a b6 1e

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   85 7b a8 e8  71 e4
50 86  1c d8 37 91  8a 92 a9 10

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   de bc 37 9a  10 b3
01 41  2c 54 7f 76

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting event for #4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | no suspended
cryptographic state for 4 

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | command executing
down-client

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | executing
down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet192' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.192/26'
PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME=''  ipsec _updown

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | popen(): cmd is 667
chars long

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet1:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(  80):92'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLU:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
160):TO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 240):.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCO:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 320):L='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='20:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
400):2.12.0.192/26' PLUTO_PEER_CLIENT_NET='202.12.0.192'
PLUTO_PEER_CLIENT_MASK='255.:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
480):255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO_:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
560):STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
640):_USERNAME=''  ipsec _updown:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | request to replace
with shunt a prospective erouted policy with netkey kernel ---
experimental

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.b7e21a6c at 202.12.0.29

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete inbound eroute
202.12.0.192/26:0 --0-> 172.30.1.0/24:0 => unk255.10000 at 172.30.1.7
(raw_eroute)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.834313d at 172.30.1.7

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | handling event
EVENT_SA_EXPIRE

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | event after this is
EVENT_SA_EXPIRE in -2 seconds

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet128

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: "nzta-subnet128" #3:
IPsec SA expired (LATEST!)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting state #3

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_INFO

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    message ID:  97 1c
28 50

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_D

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH(1) into ISAKMP Hash Payload

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Delete
Payload:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    protocol ID: 3

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    number of SPIs: 1

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of delete payload into ISAKMP Delete Payload

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete payload  8e e7
23 cb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Delete Payload: 16

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | HASH(1) computed:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   9c 14 6c c5  95 c3
a6 16  dc e8 0a 6c  4c 8a 39 f4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   43 1f 87 1d

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | last Phase 1 IV:  99
9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   90 32 31 e5  57 93
97 f3  61 49 77 dc  86 cd 3e 3c

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   08 f6 99 d0

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   0c 00 00 18  9c 14
6c c5  95 c3 a6 16  dc e8 0a 6c

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   4c 8a 39 f4  43 1f
87 1d  00 00 00 10  00 00 00 01

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   03 04 00 01  8e e7
23 cb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   90 32 31 e5  57 93
97 f3  61 49 77 dc  86 cd 3e 3c

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   08 f6 99 d0

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | unpadded size is: 40

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next IV:  0f ea 70 50
56 c4 89 9c  a8 7f 8f d4  89 9b 6d b4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | sending 76 bytes for
delete notify through eth0:500 to 202.12.0.29:500 (using #1)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   08 10 05 01  97 1c
28 50  00 00 00 4c  bc 66 8d d3

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   82 56 d2 0a  0b df
19 bd  41 24 e3 44  ec 96 6b 60

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   0c 2c 57 b0  88 02
35 88  4b 26 23 df  0f ea 70 50

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   56 c4 89 9c  a8 7f
8f d4  89 9b 6d b4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting event for #3

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | no suspended
cryptographic state for 3 

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | command executing
down-client

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | executing
down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet128' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.128/26'
PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME=''  ipsec _updown

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | popen(): cmd is 667
chars long

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet1:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(  80):28'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLU:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
160):TO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 240):.30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCO:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 320):L='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='20:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
400):2.12.0.128/26' PLUTO_PEER_CLIENT_NET='202.12.0.128'
PLUTO_PEER_CLIENT_MASK='255.:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
480):255.255.192' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0'
PLUTO_PEER_CA='' PLUTO_:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
560):STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
640):_USERNAME=''  ipsec _updown:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | request to replace
with shunt a prospective erouted policy with netkey kernel ---
experimental

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.2a8f08f0 at 202.12.0.29

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete inbound eroute
202.12.0.128/26:0 --0-> 172.30.1.0/24:0 => unk255.10000 at 172.30.1.7
(raw_eroute)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.8ee723cb at 172.30.1.7

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | handling event
EVENT_SA_EXPIRE

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | event after this is
EVENT_PENDING_PHASE2 in 5 seconds

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | processing connection
nzta-subnet64

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: "nzta-subnet64" #2:
IPsec SA expired (LATEST!)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting state #2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | **emit ISAKMP
Message:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    initiator cookie:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    responder cookie:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   6b d7 b6 36  bc b8
4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_HASH

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    ISAKMP version:
ISAKMP Version 1.0 (rfc2407)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    exchange type:
ISAKMP_XCHG_INFO

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    flags:
ISAKMP_FLAG_ENCRYPTION

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    message ID:  bd 01
ef cb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Hash
Payload:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_D

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 20 zero
bytes of HASH(1) into ISAKMP Hash Payload

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Hash Payload: 24

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ***emit ISAKMP Delete
Payload:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    next payload type:
ISAKMP_NEXT_NONE

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    DOI:
ISAKMP_DOI_IPSEC

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    protocol ID: 3

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    SPI size: 4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |    number of SPIs: 1

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 4 raw bytes
of delete payload into ISAKMP Delete Payload

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete payload  24 14
01 9f

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Delete Payload: 16

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | HASH(1) computed:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a9 dc e7 64  0b 6c
6c 24  0d 5e 56 dc  09 e0 35 34

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   84 af 89 63

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | last Phase 1 IV:  99
9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | current Phase 1 IV:
99 9a 7a 94  57 8b f3 40  a3 95 37 06  9c 55 04 d2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 init start

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS: sha1 final end

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | computed Phase 2 IV:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   38 80 83 d8  e2 6f
70 6d  41 af d1 23  ea ce 94 cb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   27 01 45 ed

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   0c 00 00 18  a9 dc
e7 64  0b 6c 6c 24  0d 5e 56 dc

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   09 e0 35 34  84 af
89 63  00 00 00 10  00 00 00 01

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   03 04 00 01  24 14
01 9f

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | IV:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   38 80 83 d8  e2 6f
70 6d  41 af d1 23  ea ce 94 cb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   27 01 45 ed

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | unpadded size is: 40

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting 8 zero bytes
of encryption padding into ISAKMP Message

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | encrypting 48 using
OAKLEY_AES_CBC

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: enter

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | NSS do_aes: exit

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next IV:  e5 b8 8f 2b
a4 b6 bf de  37 c0 5c 56  c5 35 f1 eb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | emitting length of
ISAKMP Message: 76

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | sending 76 bytes for
delete notify through eth0:500 to 202.12.0.29:500 (using #1)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a8 dd 33 ac  9b 1c
d9 c4  6b d7 b6 36  bc b8 4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   08 10 05 01  bd 01
ef cb  00 00 00 4c  88 ef 47 1c

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   26 11 a3 b2  4f ed
da b0  46 4e e5 be  87 2b 28 e9

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   90 7c 5f 84  72 89
87 d7  2f 65 63 9a  e5 b8 8f 2b

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: |   a4 b6 bf de  37 c0
5c 56  c5 35 f1 eb

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | deleting event for #2

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | no suspended
cryptographic state for 2 

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | ICOOKIE:  a8 dd 33 ac
9b 1c d9 c4

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | RCOOKIE:  6b d7 b6 36
bc b8 4f 20

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | state hash entry 27

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | command executing
down-client

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | executing
down-client: 2>&1 PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet64' PLUTO_INTERFACE='eth0'
PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUTO_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.30.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0'
PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_PEER='202.12.0.29'
PLUTO_PEER_ID='202.12.0.29' PLUTO_PEER_CLIENT='202.12.0.64/26'
PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255.255.192' PLUTO_PEER_PORT='0'
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW'
PLUTO_XAUTH_USERNAME=''  ipsec _updown

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | popen(): cmd is 664
chars long

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(   0):2>&1
PLUTO_VERB='down-client' PLUTO_VERSION='2.0'
PLUTO_CONNECTION='nzta-subnet6:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(  80):4'
PLUTO_INTERFACE='eth0' PLUTO_NEXT_HOP='172.30.1.1' PLUTO_ME='172.30.1.7'
PLUT:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
160):O_MY_ID='202.89.35.19' PLUTO_MY_CLIENT='172.30.1.0/24'
PLUTO_MY_CLIENT_NET='172.:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 240):30.1.0'
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0'
PLUTO_MY_PROTOCOL:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 320):='0'
PLUTO_PEER='202.12.0.29' PLUTO_PEER_ID='202.12.0.29'
PLUTO_PEER_CLIENT='202:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd(
400):.12.0.64/26' PLUTO_PEER_CLIENT_NET='202.12.0.64'
PLUTO_PEER_CLIENT_MASK='255.255:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 480):.255.192'
PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STA:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 560):CK='netkey'
PLUTO_CONN_POLICY='PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW' PLUTO_XAUTH_US:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | cmd( 640):ERNAME=''
ipsec _updown:

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | request to replace
with shunt a prospective erouted policy with netkey kernel ---
experimental

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.31fdc437 at 202.12.0.29

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete inbound eroute
202.12.0.64/26:0 --0-> 172.30.1.0/24:0 => unk255.10000 at 172.30.1.7
(raw_eroute)

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | raw_eroute result=1 

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | delete
esp.2414019f at 172.30.1.7

Apr 13 20:44:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 5 seconds

Apr 13 20:44:48 vps-itelematics007 pluto[26771]: |  

Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 4 seconds

Apr 13 20:44:48 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 4 seconds

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: |  

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 0 seconds

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | event after this is
EVENT_REINIT_SECRET in 2992 seconds

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:44:52 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds

Apr 13 20:45:20 vps-itelematics007 pluto[26771]: |  

Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 92 seconds

Apr 13 20:45:20 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 92 seconds

Apr 13 20:45:53 vps-itelematics007 pluto[26771]: |  

Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 59 seconds

Apr 13 20:45:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 59 seconds

Apr 13 20:46:25 vps-itelematics007 pluto[26771]: |  

Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 27 seconds

Apr 13 20:46:25 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 27 seconds

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: |  

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in -1 seconds

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | event after this is
EVENT_REINIT_SECRET in 2871 seconds

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:46:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds

Apr 13 20:46:58 vps-itelematics007 pluto[26771]: |  

Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 115 seconds

Apr 13 20:46:58 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 115 seconds

Apr 13 20:47:31 vps-itelematics007 pluto[26771]: |  

Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 82 seconds

Apr 13 20:47:31 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 82 seconds

Apr 13 20:48:03 vps-itelematics007 pluto[26771]: |  

Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 50 seconds

Apr 13 20:48:03 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 50 seconds

Apr 13 20:48:36 vps-itelematics007 pluto[26771]: |  

Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 17 seconds

Apr 13 20:48:36 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 17 seconds

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: |  

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 0 seconds

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | *time to handle event

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | handling event
EVENT_PENDING_PHASE2

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | event after this is
EVENT_REINIT_SECRET in 2751 seconds

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | inserting event
EVENT_PENDING_PHASE2, timeout in 120 seconds

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | event added at head
of queue

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet192" checked

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet128" checked

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | pending review:
connection "nzta-subnet64" checked

Apr 13 20:48:53 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 120 seconds

Apr 13 20:49:08 vps-itelematics007 pluto[26771]: |  

Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | *received kernel
message

Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | netlink_get:
XFRM_MSG_ACQUIRE message

Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 105 seconds

Apr 13 20:49:08 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 105 seconds

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |  

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |  

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_enc_ok(12,0): alg_id=12, alg_ivlen=8, alg_minbits=128,
alg_maxbits=256, res=0, ret=1

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: |  

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | *received whack
message

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | * processed 0
messages from cryptographic helpers 

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds

Apr 13 20:49:47 vps-itelematics007 pluto[26771]: | next event
EVENT_PENDING_PHASE2 in 66 seconds

+ _________________________ date

+ date

Wed Apr 13 20:49:48 NZST 2011

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20110413/7a3a03c2/attachment-0001.html 


More information about the Users mailing list