[Openswan Users] STATE_MAIN_I3: sent MI3, expecting MR3, 002 #1: received 1 malformed payload notifies
Luis Fernando Gramajo
lgramajo at empagua.com
Tue Jun 12 16:47:20 EDT 2012
Paul, thank you, here you go:
| sending 84 bytes for STATE_MAIN_I2 through eth0:500 to PUBLIC-IP:500
(using #1)
| 7f 1f f7 06 0c dd df d9 fa 17 e3 73 cf a0 22 56
| 05 10 02 01 00 00 00 00 00 00 00 54 fa 7c ac 19
| 24 70 c4 52 df 8b b5 3d 1c 58 c7 0e 85 61 98 cc
| dc 8f 84 05 7f 29 ed 19 d5 ba bc 91 a0 25 66 34
| 3e c7 82 14 f6 58 94 00 01 21 af dd de 44 5c ee
| 58 62 33 b0
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
| event added at head of queue
"telefonica/2x0" #1: STATE_MAIN_I3: sent MI3, expecting MR3
| modecfg pull: noquirk policy:push not-client
| phase 1 is done, looking for phase 2 to unpend
| * processed 1 messages from cryptographic helpers
| next event EVENT_RETRANSMIT in 10 seconds for #1
| next event EVENT_RETRANSMIT in 10 seconds for #1
|
| *received 40 bytes from PUBLIC-IP:500 on eth0 (port=500)
| 7f 1f f7 06 0c dd df d9 fa 17 e3 73 cf a0 22 56
| 0b 10 05 00 ee 2f c1 77 00 00 00 28 00 00 00 0c
| 00 00 00 00 01 00 00 10
| **parse ISAKMP Message:
| initiator cookie:
| 7f 1f f7 06 0c dd df d9
| responder cookie:
| fa 17 e3 73 cf a0 22 56
| next payload type: ISAKMP_NEXT_N
| ISAKMP version: ISAKMP Version 1.0 (rfc2407)
| exchange type: ISAKMP_XCHG_INFO
| flags: none
| message ID: ee 2f c1 77
| length: 40
| processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5)
| ICOOKIE: 7f 1f f7 06 0c dd df d9
| RCOOKIE: fa 17 e3 73 cf a0 22 56
| state hash entry 4
| peer and cookies match on #1, provided msgid 00000000 vs 00000000/00000000
| p15 state object #1 found, in STATE_MAIN_I3
| processing connection telefonica/2x0
| got payload 0x800(ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
| ***parse ISAKMP Notification Payload:
| next payload type: ISAKMP_NEXT_NONE
| length: 12
| DOI: ISAKMP_DOI_ISAKMP
| protocol ID: 1
| SPI size: 0
| Notify Message Type: PAYLOAD_MALFORMED
| info:
| processing informational PAYLOAD_MALFORMED (16)
"telefonica/2x0" #1: received 1 malformed payload notifies
| complete state transition with STF_IGNORE
| * processed 0 messages from cryptographic helpers
| next event EVENT_RETRANSMIT in 10 seconds for #1
| next event EVENT_RETRANSMIT in 10 seconds for #1
|
| next event EVENT_RETRANSMIT in 0 seconds for #1
| *time to handle event
| handling event EVENT_RETRANSMIT
| event after this is EVENT_PENDING_DDNS in 44 seconds
| processing connection telefonica/2x0
| handling event EVENT_RETRANSMIT for <invalid> "telefonica/2x0" #1
| sending 84 bytes for EVENT_RETRANSMIT through eth0:500 to
PUBLIC-IP:500 (using #1)
| 7f 1f f7 06 0c dd df d9 fa 17 e3 73 cf a0 22 56
| 05 10 02 01 00 00 00 00 00 00 00 54 fa 7c ac 19
| 24 70 c4 52 df 8b b5 3d 1c 58 c7 0e 85 61 98 cc
| dc 8f 84 05 7f 29 ed 19 d5 ba bc 91 a0 25 66 34
| 3e c7 82 14 f6 58 94 00 01 21 af dd de 44 5c ee
| 58 62 33 b0
| inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #1
| event added at head of queue
| next event EVENT_RETRANSMIT in 20 seconds for #1
|
| *received whack message
terminating all conns with alias='telefonica'
| processing connection telefonica/2x0
"telefonica/2x0": terminating SAs using this connection
| removing pending policy for "none" {0x10c9120}
| processing connection telefonica/2x0
"telefonica/2x0" #1: deleting state (STATE_MAIN_I3)
| deleting event for #1
| deleting state #1
| deleting event for #1
| removing pending policy for "telefonica/1x0" {0x10caa20}
| no suspended cryptographic state for 1
| ICOOKIE: 7f 1f f7 06 0c dd df d9
| RCOOKIE: fa 17 e3 73 cf a0 22 56
| state hash entry 4
| processing connection telefonica/1x0
"telefonica/1x0": terminating SAs using this connection
| * processed 0 messages from cryptographic helpers
| next event EVENT_PENDING_DDNS in 39 seconds
| next event EVENT_PENDING_DDNS in 39 seconds
|
| *received whack message
shutting down
forgetting secrets
| processing connection telefonica/2x0
"telefonica/2x0": deleting connection
| alg_info_delref(0x10c8000) alg_info->ref_cnt=1
| alg_info_delref(0x10c8000) freeing alg_info
| alg_info_delref(0x10c7390) alg_info->ref_cnt=1
| alg_info_delref(0x10c7390) freeing alg_info
| processing connection telefonica/1x0
"telefonica/1x0": deleting connection
| alg_info_delref(0x10c6e70) alg_info->ref_cnt=1
| alg_info_delref(0x10c6e70) freeing alg_info
| alg_info_delref(0x10c6200) alg_info->ref_cnt=1
| alg_info_delref(0x10c6200) freeing alg_info
| crl fetch request list locked by 'free_crl_fetch'
| crl fetch request list unlocked by 'free_crl_fetch'
| crl list locked by 'free_crls'
| crl list unlocked by 'free_crls'
| ocsp cache locked by 'free_ocsp_cache'
| ocsp cache unlocked by 'free_ocsp_cache'
shutting down interface lo/lo ::1:500
shutting down interface lo/lo 127.0.0.1:500
El 12/06/12 13:17, Paul Wouters escribió:
> On Tue, 12 Jun 2012, Luis Fernando Gramajo wrote:
>
>> 108 "telefonica/2x0" #1: STATE_MAIN_I3: sent MI3, expecting MR3
>> 002 "telefonica/2x0" #1: received 1 malformed payload notifies
>
> Post a plutodebug=all log output of that MR3 packet coming in so someone
> can check out what's happening.
>
> Paul
--
Luis Fernando Gramajo P.
Redes y Telecomunicaciones
Sistemas de Información EMPAGUA
More information about the Users
mailing list