Date: Sun, 27 Jul 2008 19:06:33 -0600 From: fbsdq.20.drkshadow@spamgourmet.com To: freebsd-questions@freebsd.org Subject: IPSEC: Connections break after 60K when using racoon Message-ID: <488D1B99.1070902@spamgourmet.com>
next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format. --------------030808050309040608040302 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit I'm having problems trying to set up a VPN. I've followed the instructions in the handbook as exactly as possible many times now, and have determined that racoon is causing connections to die after around 60KB of data has been sent. I base this claim on the fact that I have sent sustained, encrypted traffic with IPSEC using just setkey/ipsec.conf -- that is, everything used up to but excluding racoon. Has anyone encountered the problem? I'm using FreeBSD 7, racoon 0.7, and two VIA C7 boards (1.6GHz) -- tested with and without padlock, though I had the same problem on two intel boxes doing software encryption. Connection by crossover cable or internet has no effect. With the latest testing, both machines had exactly the same hardware and configuration, but again.. I've tried a variety. Aside from the netstat output indicating "xxx outbound packets with no SA available", I don't see anything resembling an error.. and for the output, I can't find any documentation on it, and it all seems to be configured correctly. Help please? Firewall: pf.conf pass in all pass out all ipsec.conf: spdadd 69.146.32.251/32 w.x.y.z/32 ipencap -P out ipsec esp/tunnel/69.146.32.251-w.x.y.z/require; spdadd w.x.y.z/32 69.146.32.251/32 ipencap -P in ipsec esp/tunnel/w.x.y.z-69.146.32.251/require; w.x.y.z is our T1 static IP. 69... is a dynamic IP I was using for testing. Both machines have the same configuration, with IP addresses reversed for the other endpoint. Host A: Internal: 192.168.111.1 External: w.x.y.z --- Host B: External: 69.146.32.251 Internal: 192.168.0.1 Host A: ifconfig gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1280 tunnel inet w.x.y.z --> 69.146.32.251 inet 192.168.111.1 --> 192.168.0.1 netmask 0xffffff00 Host B: ifconfig gif0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1280 tunnel inet 69.146.32.251 --> w.x.y.z inet 192.168.0.1 --> 192.168.111.1 netmask 0xffffff00 <Note that netmask=0xffffffff, as shown in the handbook, has the same results. I'm testing gateway <--> gateway, anyway> racoon.conf: path pre_shared_key "/usr/local/etc/racoon/psk.txt" ; remote anonymous { #exchange_mode main,aggressive,base; exchange_mode main,base; #my_identifier fqdn "server.kame.net"; #certificate_type x509 "foo@kame.net.cert" "foo@kame.net.priv" ; lifetime time 24 hour ; #initial_contact off ; #passive on ; proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key ; dh_group 2 ; } proposal_check strict; } sainfo anonymous { pfs_group 2; lifetime time 12 hour ; encryption_algorithm 3des, cast128, blowfish 448, des, rijndael ; authentication_algorithm hmac_sha1, hmac_md5 ; compression_algorithm deflate ; } psk.txt a.b.c.d myprivky w.x.y.z myprivky Test method: ================================ Host A # ping 192.168.0.1 64 bytes from 192.168.0.1: icmp_seq=2 ttl=64 time=74.516 ms <one ping went through and I killed it -- just to establish a connection> # setkey -D w.x.y.z 69.146.32.251 esp mode=tunnel spi=36840128(0x023222c0) reqid=0(0x00000000) E: 3des-cbc 95afdcdf 8ec36c90 c91388b5 5937999e d6a2db7c 27e5a321 A: hmac-sha1 359d9f19 737936c1 30e211e5 abc887b3 aed79067 seq=0x00000001 replay=4 flags=0x00000000 state=mature created: Jul 28 05:58:02 2008 current: Jul 28 05:58:05 2008 diff: 3(s) hard: 43200(s) soft: 34560(s) last: Jul 28 05:58:02 2008 hard: 0(s) soft: 0(s) current: 160(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 1 hard: 0 soft: 0 sadb_seq=1 pid=3337 refcnt=2 69.146.32.251 w.x.y.z esp mode=tunnel spi=3887055(0x003b4fcf) reqid=0(0x00000000) E: 3des-cbc a732002b 4d9e7dca eacf14b1 9175529f 0157d675 dd9eaa2b A: hmac-sha1 ecdb2d07 ecb1e803 d532d76c be11429f 33c5a5ed seq=0x00000001 replay=4 flags=0x00000000 state=mature created: Jul 28 05:58:02 2008 current: Jul 28 05:58:05 2008 diff: 3(s) hard: 43200(s) soft: 34560(s) last: Jul 28 05:58:02 2008 hard: 0(s) soft: 0(s) current: 124(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 1 hard: 0 soft: 0 sadb_seq=0 pid=3337 refcnt=1 Host B 69.146.32.251 w.x.y.z esp mode=tunnel spi=3887055(0x003b4fcf) reqid=0(0x00000000) E: 3des-cbc a732002b 4d9e7dca eacf14b1 9175529f 0157d675 dd9eaa2b A: hmac-sha1 ecdb2d07 ecb1e803 d532d76c be11429f 33c5a5ed seq=0x00000001 replay=4 flags=0x00000000 state=mature created: Jul 28 05:58:54 2008 current: Jul 28 05:59:28 2008 diff: 34(s) hard: 43200(s) soft: 34560(s) last: Jul 28 05:58:54 2008 hard: 0(s) soft: 0(s) current: 160(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 1 hard: 0 soft: 0 sadb_seq=1 pid=11831 refcnt=2 w.x.y.z 69.146.32.251 esp mode=tunnel spi=36840128(0x023222c0) reqid=0(0x00000000) E: 3des-cbc 95afdcdf 8ec36c90 c91388b5 5937999e d6a2db7c 27e5a321 A: hmac-sha1 359d9f19 737936c1 30e211e5 abc887b3 aed79067 seq=0x00000001 replay=4 flags=0x00000000 state=mature created: Jul 28 05:58:54 2008 current: Jul 28 05:59:28 2008 diff: 34(s) hard: 43200(s) soft: 34560(s) last: Jul 28 05:58:54 2008 hard: 0(s) soft: 0(s) current: 124(bytes) hard: 0(bytes) soft: 0(bytes) allocated: 1 hard: 0 soft: 0 sadb_seq=0 pid=11831 refcnt=1 ========== Host A # dd if=/dev/zero bs=512 count=300 | nc 192.168.0.1 8000 <exits status=141 after about 3 seconds> Host B <ctrl-c, after some wait> 66048 bytes transferred in 50.040368 secs (1320 bytes/sec) ======== # setkey -D <NOTE: DIFFERENCES are shown below from the values above> Host A w.x.y.z 69.146.32.251 seq=0x0000003a diff: 177(s) hard: 43200(s) soft: 34560(s) last: Jul 28 06:00:32 2008 current: 73360(bytes) allocated: 58 69.146.32.251 w.x.y.z seq=0x0000002c diff: 177(s) hard: 43200(s) soft: 34560(s) last: Jul 28 06:00:57 2008 current: 4088(bytes) allocated: 44 Host B 69.146.32.251 w.x.y.z seq=0x0000002c diff: 189(s) hard: 43200(s) soft: 34560(s) last: Jul 28 06:01:49 2008 current: 5672(bytes) allocated: 44 w.x.y.z 69.146.32.251 seq=0x0000003a diff: 189(s) hard: 43200(s) soft: 34560(s) current: 71484(bytes) allocated: 58 ====== # netstat -p ipsec -s <All values zero except:> Host A: 134 outbound packets with no SA available Host B: # netstat -p ipsec -s 19 outbound packets with no SA available 224 mbufs inserted during makespace Racoon debug log: attached, from host B. I've logged on host A in the past and it's approximately the same -- no clear errors. Any help would be appreciated. --------------030808050309040608040302 Content-Type: text/plain; name="racoon-debug.log" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="racoon-debug.log" Foreground mode. 2008-07-28 05:58:46: INFO: @(#)ipsec-tools 0.7 (http://ipsec-tools.sourceforge.net) 2008-07-28 05:58:46: INFO: @(#)This product linked OpenSSL 0.9.8e 23 Feb 2007 (http://www.openssl.org/) 2008-07-28 05:58:46: INFO: Reading configuration from "/usr/local/etc/racoon/racoon.conf" 2008-07-28 05:58:46: DEBUG: call pfkey_send_register for AH 2008-07-28 05:58:46: DEBUG: call pfkey_send_register for ESP 2008-07-28 05:58:46: DEBUG: call pfkey_send_register for IPCOMP 2008-07-28 05:58:46: DEBUG: reading config file /usr/local/etc/racoon/racoon.conf 2008-07-28 05:58:46: DEBUG2: lifetime = 86400 2008-07-28 05:58:46: DEBUG2: lifebyte = 0 2008-07-28 05:58:46: DEBUG2: encklen=0 2008-07-28 05:58:46: DEBUG2: p:1 t:1 2008-07-28 05:58:46: DEBUG2: 3DES-CBC(5) 2008-07-28 05:58:46: DEBUG2: SHA(2) 2008-07-28 05:58:46: DEBUG2: 1024-bit MODP group(2) 2008-07-28 05:58:46: DEBUG2: pre-shared key(1) 2008-07-28 05:58:46: DEBUG2: 2008-07-28 05:58:46: DEBUG: compression algorithm can not be checked because sadb message doesn't support it. 2008-07-28 05:58:46: DEBUG: getsainfo params: loc='ANONYMOUS', rmt='ANONYMOUS', peer='NULL', id=0 2008-07-28 05:58:46: DEBUG: getsainfo pass #2 2008-07-28 05:58:46: DEBUG2: parse successed. 2008-07-28 05:58:46: DEBUG: my interface: 69.146.32.251 (re1) 2008-07-28 05:58:46: DEBUG: my interface: fe80::1%lo0 (lo0) 2008-07-28 05:58:46: DEBUG: my interface: ::1 (lo0) 2008-07-28 05:58:46: DEBUG: my interface: 127.0.0.1 (lo0) 2008-07-28 05:58:46: DEBUG: my interface: 192.168.0.1 (bridge0) 2008-07-28 05:58:46: DEBUG: my interface: 192.168.0.1 (gif0) 2008-07-28 05:58:46: DEBUG: configuring default isakmp port. 2008-07-28 05:58:46: DEBUG: 6 addrs are configured successfully 2008-07-28 05:58:46: INFO: 192.168.0.1[500] used as isakmp port (fd=6) 2008-07-28 05:58:46: ERROR: failed to bind to address 192.168.0.1[500] (Address already in use). 2008-07-28 05:58:46: INFO: 127.0.0.1[500] used as isakmp port (fd=7) 2008-07-28 05:58:46: INFO: ::1[500] used as isakmp port (fd=8) 2008-07-28 05:58:46: INFO: fe80::1%lo0[500] used as isakmp port (fd=9) 2008-07-28 05:58:46: INFO: 69.146.32.251[500] used as isakmp port (fd=10) 2008-07-28 05:58:46: DEBUG: pk_recv: retry[0] recv() 2008-07-28 05:58:46: DEBUG: get pfkey X_SPDDUMP message 2008-07-28 05:58:46: DEBUG2: 02120000 0f000100 01000000 332e0000 03000500 04200000 10020000 ce51cc7a 00000000 00000000 03000600 04200000 10020000 459220fb 00000000 00000000 07001200 02000100 02000000 00000000 28003200 02020000 10020000 ce51cc7a 00000000 00000000 10020000 459220fb 00000000 00000000 2008-07-28 05:58:46: DEBUG: pk_recv: retry[0] recv() 2008-07-28 05:58:46: DEBUG: get pfkey X_SPDDUMP message 2008-07-28 05:58:46: DEBUG2: 02120000 0f000100 00000000 332e0000 03000500 04200000 10020000 459220fb 00000000 00000000 03000600 04200000 10020000 ce51cc7a 00000000 00000000 07001200 02000200 01000000 00000000 28003200 02020000 10020000 459220fb 00000000 00000000 10020000 ce51cc7a 00000000 00000000 2008-07-28 05:58:46: DEBUG: sub:0xbfbfe584: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out 2008-07-28 05:58:46: DEBUG: db :0x2843e078: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: DEBUG: 104 bytes message received from w.x.y.z[500] to 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 00000000 00000000 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2008-07-28 05:58:52: DEBUG: anonymous configuration selected for w.x.y.z[500]. 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: INFO: respond new phase 1 negotiation: 69.146.32.251[500]<=>w.x.y.z[500] 2008-07-28 05:58:52: INFO: begin Identity Protection mode. 2008-07-28 05:58:52: DEBUG: begin. 2008-07-28 05:58:52: DEBUG: seen nptype=1(sa) 2008-07-28 05:58:52: DEBUG: seen nptype=13(vid) 2008-07-28 05:58:52: DEBUG: succeed. 2008-07-28 05:58:52: INFO: received Vendor ID: DPD 2008-07-28 05:58:52: DEBUG: total SA len=52 2008-07-28 05:58:52: DEBUG: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 2008-07-28 05:58:52: DEBUG: begin. 2008-07-28 05:58:52: DEBUG: seen nptype=2(prop) 2008-07-28 05:58:52: DEBUG: succeed. 2008-07-28 05:58:52: DEBUG: proposal #1 len=44 2008-07-28 05:58:52: DEBUG: begin. 2008-07-28 05:58:52: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:52: DEBUG: succeed. 2008-07-28 05:58:52: DEBUG: transform #1 len=36 2008-07-28 05:58:52: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:52: DEBUG: type=Life Duration, flag=0x0000, lorv=4 2008-07-28 05:58:52: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key 2008-07-28 05:58:52: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2008-07-28 05:58:52: DEBUG: hash(sha1) 2008-07-28 05:58:52: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2008-07-28 05:58:52: DEBUG: hmac(modp1024) 2008-07-28 05:58:52: DEBUG: pair 1: 2008-07-28 05:58:52: DEBUG: 0x28439250: next=0x0 tnext=0x0 2008-07-28 05:58:52: DEBUG: proposal #1: 1 transform 2008-07-28 05:58:52: DEBUG: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2008-07-28 05:58:52: DEBUG: trns#=1, trns-id=IKE 2008-07-28 05:58:52: DEBUG: type=Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:52: DEBUG: type=Life Duration, flag=0x0000, lorv=4 2008-07-28 05:58:52: DEBUG: type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2008-07-28 05:58:52: DEBUG: type=Authentication Method, flag=0x8000, lorv=pre-shared key 2008-07-28 05:58:52: DEBUG: type=Hash Algorithm, flag=0x8000, lorv=SHA 2008-07-28 05:58:52: DEBUG: type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2008-07-28 05:58:52: DEBUG: Compared: DB:Peer 2008-07-28 05:58:52: DEBUG: (lifetime = 86400:86400) 2008-07-28 05:58:52: DEBUG: (lifebyte = 0:0) 2008-07-28 05:58:52: DEBUG: enctype = 3DES-CBC:3DES-CBC 2008-07-28 05:58:52: DEBUG: (encklen = 0:0) 2008-07-28 05:58:52: DEBUG: hashtype = SHA:SHA 2008-07-28 05:58:52: DEBUG: authmethod = pre-shared key:pre-shared key 2008-07-28 05:58:52: DEBUG: dh_group = 1024-bit MODP group:1024-bit MODP group 2008-07-28 05:58:52: DEBUG: an acceptable proposal found. 2008-07-28 05:58:52: DEBUG: hmac(modp1024) 2008-07-28 05:58:52: DEBUG: agreed on pre-shared key auth. 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: DEBUG: new cookie: 835e2082f4c50164 2008-07-28 05:58:52: DEBUG: add payload of len 52, next type 13 2008-07-28 05:58:52: DEBUG: add payload of len 16, next type 0 2008-07-28 05:58:52: DEBUG: 104 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 1 times of 104 bytes message will be sent to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 00000014 afcad713 68a1f1c9 6b8696fc 77570100 2008-07-28 05:58:52: DEBUG: resend phase1 packet 48a656d56e438a6c:835e2082f4c50164 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: DEBUG: 180 bytes message received from w.x.y.z[500] to 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 04100200 00000000 000000b4 0a000084 860cc11e 3396b59e bdc7d95e 4e8dc787 9f64d04b 833bc9a1 04fa39c2 07b766a9 6c2a11ab 1056dc46 8649f49a bba1b703 1365d3c5 9400dbc3 644d6fea c03ab75a dfe13d83 419bae91 6c26272b 51ae2c77 70220a0c c5a73019 682b238f 09f6d741 a7868ed1 935b016b d5cdb435 814d052e fdd25b7a 02c0c9c4 7b4b1791 ea7ca5b0 00000014 ecf1de20 b7694a17 2f111e8c 2fd72b05 2008-07-28 05:58:52: DEBUG: begin. 2008-07-28 05:58:52: DEBUG: seen nptype=4(ke) 2008-07-28 05:58:52: DEBUG: seen nptype=10(nonce) 2008-07-28 05:58:52: DEBUG: succeed. 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: DEBUG: compute DH's private. 2008-07-28 05:58:52: DEBUG: 54c75c82 5136519f f877aeec ebb7c4ab 5f29b2cb 43e28eb2 a5bcd9b2 890fff4a 0f65f836 2cb652f2 72d5ea99 f9991742 942b8bff 0b7ec1e6 2c6b52e4 5c5995ca 47c105d9 b7d27c3c 92d6fd00 952a441f 70f4c0f5 3c0d1d3c 48ce6ddd 4e714f17 05b6dbbe 8ed7f521 cd79e172 188513a5 e60343b0 d2723dbb 5226ecae d49c0306 2008-07-28 05:58:52: DEBUG: compute DH's public. 2008-07-28 05:58:52: DEBUG: a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f 175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57 17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2 4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4 2008-07-28 05:58:52: DEBUG: add payload of len 128, next type 10 2008-07-28 05:58:52: DEBUG: add payload of len 16, next type 0 2008-07-28 05:58:52: DEBUG: 180 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 1 times of 180 bytes message will be sent to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 04100200 00000000 000000b4 0a000084 a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f 175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57 17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2 4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4 00000014 b9f44059 1a7b59be c98244f3 c5c28b01 2008-07-28 05:58:52: DEBUG: resend phase1 packet 48a656d56e438a6c:835e2082f4c50164 2008-07-28 05:58:52: DEBUG: compute DH's shared. 2008-07-28 05:58:52: DEBUG: b3733178 54b3e2a5 fd94e055 40082381 4883ba2f 3ed448af bd17d2ed e6fac2a1 4303de72 eac71402 4bd15a32 298717c6 8bd0d2ab 6fbd6b1b a452e007 ad737428 b7830511 85b3229f 94e6cd0a a11360d5 78cccb77 a9383e41 9d97eeea f1d2711b 6600a36a ee1eb94b 79e6ba38 827d8d99 69d9b5b6 dd4a5255 4bd863dd c334c995 2008-07-28 05:58:52: DEBUG: the psk found. 2008-07-28 05:58:52: DEBUG2: psk: 2008-07-28 05:58:52: DEBUG2: 57654172 6556504e 2008-07-28 05:58:52: DEBUG: nonce 1: 2008-07-28 05:58:52: DEBUG: ecf1de20 b7694a17 2f111e8c 2fd72b05 2008-07-28 05:58:52: DEBUG: nonce 2: 2008-07-28 05:58:52: DEBUG: b9f44059 1a7b59be c98244f3 c5c28b01 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: SKEYID computed: 2008-07-28 05:58:52: DEBUG: c968ee2a 423d0906 7aad37a3 ad8cd133 74165e67 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: SKEYID_d computed: 2008-07-28 05:58:52: DEBUG: e02b177e d824ef2b 2a12dfd2 7d294998 2307907d 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: SKEYID_a computed: 2008-07-28 05:58:52: DEBUG: 6a9fb4e1 d21e4532 77840eab cc168404 d34ac8de 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: SKEYID_e computed: 2008-07-28 05:58:52: DEBUG: 64170adb d30f0338 9872f25f 29ca89a2 db18052b 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: hash(sha1) 2008-07-28 05:58:52: DEBUG: len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...) 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: compute intermediate encryption key K1 2008-07-28 05:58:52: DEBUG: 00 2008-07-28 05:58:52: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: compute intermediate encryption key K2 2008-07-28 05:58:52: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 2008-07-28 05:58:52: DEBUG: 22321fe2 49601e19 c116a048 066fb0ed f194fc29 2008-07-28 05:58:52: DEBUG: final encryption key computed: 2008-07-28 05:58:52: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:52: DEBUG: hash(sha1) 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: IV computed: 2008-07-28 05:58:52: DEBUG: 75d611fc 2b7a9477 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: DEBUG: 68 bytes message received from w.x.y.z[500] to 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 05100201 00000000 00000044 3949ccbe b6702aa8 0e81b968 7c0db561 482aa93c d8b2b7f1 d724632f 6b377f83 b56e89e3 36fcdaf2 2008-07-28 05:58:52: DEBUG: begin decryption. 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: IV was saved for next processing: 2008-07-28 05:58:52: DEBUG: b56e89e3 36fcdaf2 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: with key: 2008-07-28 05:58:52: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:52: DEBUG: decrypted payload by IV: 2008-07-28 05:58:52: DEBUG: 75d611fc 2b7a9477 2008-07-28 05:58:52: DEBUG: decrypted payload, but not trimed. 2008-07-28 05:58:52: DEBUG: 0800000c 011101f4 ce51cc7a 00000018 68131787 dc799fc2 9de084af 51dbb9a7 81ec8548 ac89c903 2008-07-28 05:58:52: DEBUG: padding len=4 2008-07-28 05:58:52: DEBUG: skip to trim padding. 2008-07-28 05:58:52: DEBUG: decrypted. 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 05100201 00000000 00000044 0800000c 011101f4 ce51cc7a 00000018 68131787 dc799fc2 9de084af 51dbb9a7 81ec8548 ac89c903 2008-07-28 05:58:52: DEBUG: begin. 2008-07-28 05:58:52: DEBUG: seen nptype=5(id) 2008-07-28 05:58:52: DEBUG: seen nptype=8(hash) 2008-07-28 05:58:52: DEBUG: succeed. 2008-07-28 05:58:52: DEBUG: HASH received: 2008-07-28 05:58:52: DEBUG: 68131787 dc799fc2 9de084af 51dbb9a7 81ec8548 2008-07-28 05:58:52: DEBUG: HASH with: 2008-07-28 05:58:52: DEBUG: 860cc11e 3396b59e bdc7d95e 4e8dc787 9f64d04b 833bc9a1 04fa39c2 07b766a9 6c2a11ab 1056dc46 8649f49a bba1b703 1365d3c5 9400dbc3 644d6fea c03ab75a dfe13d83 419bae91 6c26272b 51ae2c77 70220a0c c5a73019 682b238f 09f6d741 a7868ed1 935b016b d5cdb435 814d052e fdd25b7a 02c0c9c4 7b4b1791 ea7ca5b0 a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f 175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57 17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2 4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4 48a656d5 6e438a6c 835e2082 f4c50164 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 ce51cc7a 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: HASH (resp) computed: 2008-07-28 05:58:52: DEBUG: 68131787 dc799fc2 9de084af 51dbb9a7 81ec8548 2008-07-28 05:58:52: DEBUG: HASH for PSK validated. 2008-07-28 05:58:52: DEBUG: peer's ID 2008-07-28 05:58:52: DEBUG: 011101f4 ce51cc7a 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:52: DEBUG: use ID type of IPv4_address 2008-07-28 05:58:52: DEBUG: generate HASH_R 2008-07-28 05:58:52: DEBUG: HASH with: 2008-07-28 05:58:52: DEBUG: a32e23d9 334afdbc 70eed448 3a61f250 d5d0d695 6f198b96 c953f9ad 6650f67f 175047eb cde00bb7 1946e215 b4d1cc9e ecca0fcf 3c8af1d4 a3ee855a 81065b57 17511179 3c9d912f 2e3cef94 e8da7690 12297c18 cd3a19fb 7b282782 49cce2d2 4e864e80 34d4f02f 8e1d8adc 48ae9546 f6ef395b f51eb8f5 f07c50ff 40cceaf4 860cc11e 3396b59e bdc7d95e 4e8dc787 9f64d04b 833bc9a1 04fa39c2 07b766a9 6c2a11ab 1056dc46 8649f49a bba1b703 1365d3c5 9400dbc3 644d6fea c03ab75a dfe13d83 419bae91 6c26272b 51ae2c77 70220a0c c5a73019 682b238f 09f6d741 a7868ed1 935b016b d5cdb435 814d052e fdd25b7a 02c0c9c4 7b4b1791 ea7ca5b0 835e2082 f4c50164 48a656d5 6e438a6c 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 459220fb 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: HASH (resp) computed: 2008-07-28 05:58:52: DEBUG: b89239ea d6e714bc b554cec7 07ea030e a3a5eb9b 2008-07-28 05:58:52: DEBUG: add payload of len 8, next type 8 2008-07-28 05:58:52: DEBUG: add payload of len 20, next type 0 2008-07-28 05:58:52: DEBUG: begin encryption. 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: pad length = 4 2008-07-28 05:58:52: DEBUG: 0800000c 011101f4 459220fb 00000018 b89239ea d6e714bc b554cec7 07ea030e a3a5eb9b a6d19903 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: with key: 2008-07-28 05:58:52: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:52: DEBUG: encrypted payload by IV: 2008-07-28 05:58:52: DEBUG: b56e89e3 36fcdaf2 2008-07-28 05:58:52: DEBUG: save IV for next: 2008-07-28 05:58:52: DEBUG: 76737915 8b38ae42 2008-07-28 05:58:52: DEBUG: encrypted. 2008-07-28 05:58:52: DEBUG: 68 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 1 times of 68 bytes message will be sent to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 05100201 00000000 00000044 d85b53f6 88714dc6 1d87da51 fa37e765 c3dd8001 01b9f56f 1774c162 e4a7864e 76737915 8b38ae42 2008-07-28 05:58:52: DEBUG: compute IV for phase2 2008-07-28 05:58:52: DEBUG: phase1 last IV: 2008-07-28 05:58:52: DEBUG: 76737915 8b38ae42 8e4d7ed3 2008-07-28 05:58:52: DEBUG: hash(sha1) 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: phase2 IV computed: 2008-07-28 05:58:52: DEBUG: 7e7b50f3 051b6b7b 2008-07-28 05:58:52: DEBUG: HASH with: 2008-07-28 05:58:52: DEBUG: 8e4d7ed3 0000001c 00000001 01106002 48a656d5 6e438a6c 835e2082 f4c50164 2008-07-28 05:58:52: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:52: DEBUG: HASH computed: 2008-07-28 05:58:52: DEBUG: b7972a50 7bbce940 b5da9e09 23b05b78 1d5cac19 2008-07-28 05:58:52: DEBUG: begin encryption. 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: pad length = 4 2008-07-28 05:58:52: DEBUG: 0b000018 b7972a50 7bbce940 b5da9e09 23b05b78 1d5cac19 0000001c 00000001 01106002 48a656d5 6e438a6c 835e2082 f4c50164 b2c7e403 2008-07-28 05:58:52: DEBUG: encryption(3des) 2008-07-28 05:58:52: DEBUG: with key: 2008-07-28 05:58:52: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:52: DEBUG: encrypted payload by IV: 2008-07-28 05:58:52: DEBUG: 7e7b50f3 051b6b7b 2008-07-28 05:58:52: DEBUG: save IV for next: 2008-07-28 05:58:52: DEBUG: d6cba77b 5ac2a34e 2008-07-28 05:58:52: DEBUG: encrypted. 2008-07-28 05:58:52: DEBUG: 84 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: sockname 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 05:58:52: DEBUG: send packet to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 1 times of 84 bytes message will be sent to w.x.y.z[500] 2008-07-28 05:58:52: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08100501 8e4d7ed3 00000054 be1b0d21 cb9eecf9 a7a14926 02b0b9be 27d4dc34 2feae4cd c4652a64 f5496085 179491d6 1deb5146 3490ba75 02f534e3 d6cba77b 5ac2a34e 2008-07-28 05:58:52: DEBUG: sendto Information notify. 2008-07-28 05:58:52: DEBUG: IV freed 2008-07-28 05:58:52: INFO: ISAKMP-SA established 69.146.32.251[500]-w.x.y.z[500] spi:48a656d56e438a6c:835e2082f4c50164 2008-07-28 05:58:52: DEBUG: === 2008-07-28 05:58:53: DEBUG: === 2008-07-28 05:58:53: DEBUG: 564 bytes message received from w.x.y.z[500] to 69.146.32.251[500] 2008-07-28 05:58:53: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 00000234 84550bd5 6e47b2bd d37509e7 ed9224a8 341c41cf 0b4045a1 a4cf202e 81719170 2d79e609 ad956fa9 29b097a3 8ec88b07 67d1ae0b 15b20b1c 5d270bb3 896b3f08 fab86b48 a4462c9e d9048908 e616d7bb 85003694 f420d4d3 4a36613f 2f5a3891 efaeac09 92e98197 49429313 ea4bf456 359749aa a454743d 21fda7fa f3ca4019 f40c31b1 98c2f3a6 3db19efd 4e4b803e 8538e60d 23fdb9ec 3b7093c7 3355a215 81c5e992 a151f376 83b78832 5c76454c a4808747 01dd9ced c0f07cdc 634bac7e 395b9d36 876f5f12 a0b76f60 da12ea24 85fa0333 c40c0e4a e77cd847 12fac3bc 4c4afe6f 93042920 d736eae4 81bdb711 4cfcf0ff fed79678 ae99c248 390de523 712a31dd 5a614bdf e6adeecb 04da3375 3cb202f7 e50b5bf7 2210ba3e 75b9a7b2 af4dd2d3 95a1189a ce78906d da13387b c256fbe0 429d640b 7eb235d0 9ce6373a ff502590 33867363 66a7fdeb 6fb9acb3 eba69bb9 bf857584 bf913af2 5710400e 93f9c8e1 5a554937 19776b23 449fe66b 4b588b13 6084e8a5 e0f651e5 f306d1ad 1bce5736 0cc3eda5 2d1a2012 10fbb2d3 afe3bf2d 75748f66 08592abb 762d8b7b 8a15d9dd ab88f30b 5f5abb86 253d7890 a8f4ca3d 3e61cd30 382f9234 e3ede772 ec2fae87 0bd2192b a08274a9 8fae6d51 44792842 c7cf0973 b699912b dcd85fe9 1bd14ef7 012883da ae02f627 aac7d171 a330eef5 4f86824a d490302d 6b3c398c 72ebe41d 39f7e986 52943cd8 a29b9ad3 12e14984 71aa67fb 2008-07-28 05:58:53: DEBUG: compute IV for phase2 2008-07-28 05:58:53: DEBUG: phase1 last IV: 2008-07-28 05:58:53: DEBUG: 76737915 8b38ae42 c383cb43 2008-07-28 05:58:53: DEBUG: hash(sha1) 2008-07-28 05:58:53: DEBUG: encryption(3des) 2008-07-28 05:58:53: DEBUG: phase2 IV computed: 2008-07-28 05:58:53: DEBUG: 1050d01c 76f25c67 2008-07-28 05:58:53: DEBUG: === 2008-07-28 05:58:53: INFO: respond new phase 2 negotiation: 69.146.32.251[0]<=>w.x.y.z[0] 2008-07-28 05:58:53: DEBUG: begin decryption. 2008-07-28 05:58:53: DEBUG: encryption(3des) 2008-07-28 05:58:53: DEBUG: IV was saved for next processing: 2008-07-28 05:58:53: DEBUG: 12e14984 71aa67fb 2008-07-28 05:58:53: DEBUG: encryption(3des) 2008-07-28 05:58:53: DEBUG: with key: 2008-07-28 05:58:53: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:53: DEBUG: decrypted payload by IV: 2008-07-28 05:58:53: DEBUG: 1050d01c 76f25c67 2008-07-28 05:58:53: DEBUG: decrypted payload, but not trimed. 2008-07-28 05:58:53: DEBUG: 01000018 c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a 0a000148 00000001 00000001 0000013c 0103040a 003b4fcf 0300001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 02030000 80010001 8002a8c0 80040001 80050001 80030002 03000020 03060000 80010001 8002a8c0 80040001 80060080 80050002 80030002 03000020 04060000 80010001 8002a8c0 80040001 80060080 80050001 80030002 03000020 05070000 80010001 8002a8c0 80040001 800601c0 80050002 80030002 03000020 06070000 80010001 8002a8c0 80040001 800601c0 80050001 80030002 0300001c 07020000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 08020000 80010001 8002a8c0 80040001 80050001 80030002 03000020 090c0000 80010001 8002a8c0 80040001 80060080 80050002 80030002 00000020 0a0c0000 80010001 8002a8c0 80040001 80060080 80050001 80030002 04000014 a4898266 1b522452 f9401bbf db67f809 05000084 b1aff46d 35278f9f ccf1fd10 c6ce81c5 17feb23d 3d371d6f c8627f19 b2090f6f db4f13ce 6ad2ecd6 cead6274 ea656754 27d61b38 1af4c0d5 45adcfb9 0e3a6ab0 f39c1c59 b4603f6f 2bee85f7 2148ef51 d6d6c55d caab505d 1b22cc81 7b5db7f8 fc6b7194 04fe901e b6e3b97e 1d65eef2 3297c7a0 51a18155 2027933e bffdbf3c 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb efeaa690 f59cb307 2008-07-28 05:58:53: DEBUG: padding len=8 2008-07-28 05:58:53: DEBUG: skip to trim padding. 2008-07-28 05:58:53: DEBUG: decrypted. 2008-07-28 05:58:53: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 00000234 01000018 c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a 0a000148 00000001 00000001 0000013c 0103040a 003b4fcf 0300001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 02030000 80010001 8002a8c0 80040001 80050001 80030002 03000020 03060000 80010001 8002a8c0 80040001 80060080 80050002 80030002 03000020 04060000 80010001 8002a8c0 80040001 80060080 80050001 80030002 03000020 05070000 80010001 8002a8c0 80040001 800601c0 80050002 80030002 03000020 06070000 80010001 8002a8c0 80040001 800601c0 80050001 80030002 0300001c 07020000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 08020000 80010001 8002a8c0 80040001 80050001 80030002 03000020 090c0000 80010001 8002a8c0 80040001 80060080 80050002 80030002 00000020 0a0c0000 80010001 8002a8c0 80040001 80060080 80050001 80030002 04000014 a4898266 1b522452 f9401bbf db67f809 05000084 b1aff46d 35278f9f ccf1fd10 c6ce81c5 17feb23d 3d371d6f c8627f19 b2090f6f db4f13ce 6ad2ecd6 cead6274 ea656754 27d61b38 1af4c0d5 45adcfb9 0e3a6ab0 f39c1c59 b4603f6f 2bee85f7 2148ef51 d6d6c55d caab505d 1b22cc81 7b5db7f8 fc6b7194 04fe901e b6e3b97e 1d65eef2 3297c7a0 51a18155 2027933e bffdbf3c 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb efeaa690 f59cb307 2008-07-28 05:58:53: DEBUG: begin. 2008-07-28 05:58:53: DEBUG: seen nptype=8(hash) 2008-07-28 05:58:53: DEBUG: seen nptype=1(sa) 2008-07-28 05:58:53: DEBUG: seen nptype=10(nonce) 2008-07-28 05:58:53: DEBUG: seen nptype=4(ke) 2008-07-28 05:58:53: DEBUG: seen nptype=5(id) 2008-07-28 05:58:53: DEBUG: seen nptype=5(id) 2008-07-28 05:58:53: DEBUG: succeed. 2008-07-28 05:58:53: DEBUG: received IDci2:2008-07-28 05:58:53: DEBUG: 01040000 ce51cc7a 2008-07-28 05:58:53: DEBUG: received IDcr2:2008-07-28 05:58:53: DEBUG: 01040000 459220fb 2008-07-28 05:58:53: DEBUG: HASH(1) validate:2008-07-28 05:58:53: DEBUG: c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a 2008-07-28 05:58:53: DEBUG: HASH with: 2008-07-28 05:58:53: DEBUG: c383cb43 0a000148 00000001 00000001 0000013c 0103040a 003b4fcf 0300001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 02030000 80010001 8002a8c0 80040001 80050001 80030002 03000020 03060000 80010001 8002a8c0 80040001 80060080 80050002 80030002 03000020 04060000 80010001 8002a8c0 80040001 80060080 80050001 80030002 03000020 05070000 80010001 8002a8c0 80040001 800601c0 80050002 80030002 03000020 06070000 80010001 8002a8c0 80040001 800601c0 80050001 80030002 0300001c 07020000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 08020000 80010001 8002a8c0 80040001 80050001 80030002 03000020 090c0000 80010001 8002a8c0 80040001 80060080 80050002 80030002 00000020 0a0c0000 80010001 8002a8c0 80040001 80060080 80050001 80030002 04000014 a4898266 1b522452 f9401bbf db67f809 05000084 b1aff46d 35278f9f ccf1fd10 c6ce81c5 17feb23d 3d371d6f c8627f19 b2090f6f db4f13ce 6ad2ecd6 cead6274 ea656754 27d61b38 1af4c0d5 45adcfb9 0e3a6ab0 f39c1c59 b4603f6f 2bee85f7 2148ef51 d6d6c55d caab505d 1b22cc81 7b5db7f8 fc6b7194 04fe901e b6e3b97e 1d65eef2 3297c7a0 51a18155 2027933e bffdbf3c 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb 2008-07-28 05:58:53: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:53: DEBUG: HASH computed: 2008-07-28 05:58:53: DEBUG: c6ba0618 c2feac6d ff6a262e e6136d47 f59c5c2a 2008-07-28 05:58:53: DEBUG: anonymous configuration selected for w.x.y.z. 2008-07-28 05:58:53: DEBUG: getsainfo params: loc='69.146.32.251', rmt='w.x.y.z', peer='w.x.y.z', id=0 2008-07-28 05:58:53: DEBUG: getsainfo pass #1 2008-07-28 05:58:53: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0 2008-07-28 05:58:53: DEBUG: getsainfo pass #2 2008-07-28 05:58:53: DEBUG: evaluating sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0 2008-07-28 05:58:53: DEBUG: selected sainfo: loc='ANONYMOUS', rmt='ANONYMOUS', peer='ANY', id=0 2008-07-28 05:58:53: DEBUG: get a src address from ID payload w.x.y.z[0] prefixlen=32 ul_proto=4 2008-07-28 05:58:53: DEBUG: get dst address from ID payload 69.146.32.251[0] prefixlen=32 ul_proto=4 2008-07-28 05:58:53: DEBUG: sub:0xbfbfe308: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in 2008-07-28 05:58:53: DEBUG: db: 0x2843e078: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in 2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: w.x.y.z[0] 2008-07-28 05:58:53: DEBUG: 0x2843e078 masked with /32: w.x.y.z[0] 2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: 69.146.32.251[0] 2008-07-28 05:58:53: DEBUG: 0x2843e078 masked with /32: 69.146.32.251[0] 2008-07-28 05:58:53: DEBUG: sub:0xbfbfe308: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out 2008-07-28 05:58:53: DEBUG: db: 0x2843e078: w.x.y.z/32[0] 69.146.32.251/32[0] proto=4 dir=in 2008-07-28 05:58:53: DEBUG: sub:0xbfbfe308: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out 2008-07-28 05:58:53: DEBUG: db: 0x2843e1a8: 69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out 2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: 69.146.32.251[0] 2008-07-28 05:58:53: DEBUG: 0x2843e1a8 masked with /32: 69.146.32.251[0] 2008-07-28 05:58:53: DEBUG: 0xbfbfe308 masked with /32: w.x.y.z[0] 2008-07-28 05:58:53: DEBUG: 0x2843e1a8 masked with /32: w.x.y.z[0] 2008-07-28 05:58:53: DEBUG: suitable SP found:69.146.32.251/32[0] w.x.y.z/32[0] proto=4 dir=out 2008-07-28 05:58:53: DEBUG: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0) 2008-07-28 05:58:53: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=CAST encklen=128 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=CAST encklen=128 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=BLOWFISH encklen=448 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=BLOWFISH encklen=448 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=DES encklen=0 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=DES encklen=0 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=AES encklen=128 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: total SA len=324 2008-07-28 05:58:53: DEBUG: 00000001 00000001 0000013c 0103040a 003b4fcf 0300001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 02030000 80010001 8002a8c0 80040001 80050001 80030002 03000020 03060000 80010001 8002a8c0 80040001 80060080 80050002 80030002 03000020 04060000 80010001 8002a8c0 80040001 80060080 80050001 80030002 03000020 05070000 80010001 8002a8c0 80040001 800601c0 80050002 80030002 03000020 06070000 80010001 8002a8c0 80040001 800601c0 80050001 80030002 0300001c 07020000 80010001 8002a8c0 80040001 80050002 80030002 0300001c 08020000 80010001 8002a8c0 80040001 80050001 80030002 03000020 090c0000 80010001 8002a8c0 80040001 80060080 80050002 80030002 00000020 0a0c0000 80010001 8002a8c0 80040001 80060080 80050001 80030002 2008-07-28 05:58:53: DEBUG: begin. 2008-07-28 05:58:53: DEBUG: seen nptype=2(prop) 2008-07-28 05:58:53: DEBUG: succeed. 2008-07-28 05:58:53: DEBUG: proposal #1 len=316 2008-07-28 05:58:53: DEBUG: begin. 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: succeed. 2008-07-28 05:58:53: DEBUG: transform #1 len=28 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #2 len=28 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #3 len=32 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #4 len=32 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #5 len=32 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #6 len=32 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #7 len=28 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #8 len=28 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #9 len=32 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: transform #10 len=32 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: pair 1: 2008-07-28 05:58:53: DEBUG: 0x284393a0: next=0x0 tnext=0x284393b0 2008-07-28 05:58:53: DEBUG: 0x284393b0: next=0x0 tnext=0x284393c0 2008-07-28 05:58:53: DEBUG: 0x284393c0: next=0x0 tnext=0x284393d0 2008-07-28 05:58:53: DEBUG: 0x284393d0: next=0x0 tnext=0x284393e0 2008-07-28 05:58:53: DEBUG: 0x284393e0: next=0x0 tnext=0x284393f0 2008-07-28 05:58:53: DEBUG: 0x284393f0: next=0x0 tnext=0x28439400 2008-07-28 05:58:53: DEBUG: 0x28439400: next=0x0 tnext=0x28439410 2008-07-28 05:58:53: DEBUG: 0x28439410: next=0x0 tnext=0x28439420 2008-07-28 05:58:53: DEBUG: 0x28439420: next=0x0 tnext=0x28439430 2008-07-28 05:58:53: DEBUG: 0x28439430: next=0x0 tnext=0x0 2008-07-28 05:58:53: DEBUG: proposal #1: 10 transform 2008-07-28 05:58:53: DEBUG: begin compare proposals. 2008-07-28 05:58:53: DEBUG: pair[1]: 0x284393a0 2008-07-28 05:58:53: DEBUG: 0x284393a0: next=0x0 tnext=0x284393b0 2008-07-28 05:58:53: DEBUG: 0x284393b0: next=0x0 tnext=0x284393c0 2008-07-28 05:58:53: DEBUG: 0x284393c0: next=0x0 tnext=0x284393d0 2008-07-28 05:58:53: DEBUG: 0x284393d0: next=0x0 tnext=0x284393e0 2008-07-28 05:58:53: DEBUG: 0x284393e0: next=0x0 tnext=0x284393f0 2008-07-28 05:58:53: DEBUG: 0x284393f0: next=0x0 tnext=0x28439400 2008-07-28 05:58:53: DEBUG: 0x28439400: next=0x0 tnext=0x28439410 2008-07-28 05:58:53: DEBUG: 0x28439410: next=0x0 tnext=0x28439420 2008-07-28 05:58:53: DEBUG: 0x28439420: next=0x0 tnext=0x28439430 2008-07-28 05:58:53: DEBUG: 0x28439430: next=0x0 tnext=0x0 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=1 trns-id=3DES 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=2 trns-id=3DES 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=3 trns-id=CAST 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=4 trns-id=CAST 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=5 trns-id=BLOWFISH 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=6 trns-id=BLOWFISH 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=448 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=7 trns-id=DES 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=8 trns-id=DES 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=9 trns-id=AES 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: prop#=1 prot-id=ESP spi-size=4 #trns=10 trns#=10 trns-id=AES 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Key Length, flag=0x8000, lorv=128 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: peer's single bundle: 2008-07-28 05:58:53: DEBUG: (proto_id=ESP spisize=4 spi=003b4fcf spi_p=00000000 encmode=Tunnel reqid=0:0) 2008-07-28 05:58:53: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=CAST encklen=128 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=CAST encklen=128 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=BLOWFISH encklen=448 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=BLOWFISH encklen=448 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=DES encklen=0 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=DES encklen=0 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=AES encklen=128 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: my single bundle: 2008-07-28 05:58:53: DEBUG: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0) 2008-07-28 05:58:53: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=3DES encklen=0 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=CAST encklen=128 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=CAST encklen=128 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=BLOWFISH encklen=448 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=BLOWFISH encklen=448 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=DES encklen=0 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=DES encklen=0 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: (trns_id=AES encklen=128 authtype=hmac-sha) 2008-07-28 05:58:53: DEBUG: (trns_id=AES encklen=128 authtype=hmac-md5) 2008-07-28 05:58:53: DEBUG: matched 2008-07-28 05:58:53: DEBUG: === 2008-07-28 05:58:53: DEBUG: call pfkey_send_getspi 2008-07-28 05:58:53: DEBUG: pfkey GETSPI sent: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] 2008-07-28 05:58:53: DEBUG: pfkey getspi sent. 2008-07-28 05:58:53: DEBUG: pk_recv: retry[0] recv() 2008-07-28 05:58:53: DEBUG: get pfkey GETSPI message 2008-07-28 05:58:53: DEBUG2: 02010003 0a000000 c3913ee6 332e0000 02000100 023222c0 40067315 c0a80001 03000500 ff200000 10020000 ce51cc7a 00000000 00000000 03000600 ff200000 10020000 459220fb 00000000 00000000 2008-07-28 05:58:53: DEBUG: pfkey GETSPI succeeded: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] spi=36840128(0x23222c0) 2008-07-28 05:58:53: DEBUG: total SA len=48 2008-07-28 05:58:53: DEBUG: 00000001 00000001 00000028 01030401 00000000 0000001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 2008-07-28 05:58:53: DEBUG: begin. 2008-07-28 05:58:53: DEBUG: seen nptype=2(prop) 2008-07-28 05:58:53: DEBUG: succeed. 2008-07-28 05:58:53: DEBUG: proposal #1 len=40 2008-07-28 05:58:53: DEBUG: begin. 2008-07-28 05:58:53: DEBUG: seen nptype=3(trns) 2008-07-28 05:58:53: DEBUG: succeed. 2008-07-28 05:58:53: DEBUG: transform #1 len=28 2008-07-28 05:58:53: DEBUG: type=SA Life Type, flag=0x8000, lorv=seconds 2008-07-28 05:58:53: DEBUG: type=SA Life Duration, flag=0x8000, lorv=43200 2008-07-28 05:58:53: DEBUG: life duration was in TLV. 2008-07-28 05:58:53: DEBUG: type=Encryption Mode, flag=0x8000, lorv=Tunnel 2008-07-28 05:58:53: DEBUG: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha 2008-07-28 05:58:53: DEBUG: type=Group Description, flag=0x8000, lorv=2 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:53: DEBUG: pair 1: 2008-07-28 05:58:53: DEBUG: 0x284393a0: next=0x0 tnext=0x0 2008-07-28 05:58:53: DEBUG: proposal #1: 1 transform 2008-07-28 05:58:53: DEBUG: hmac(modp1024) 2008-07-28 05:58:54: DEBUG: compute DH's private. 2008-07-28 05:58:54: DEBUG: 4676c5a1 12a93911 096c04fa ec462c85 5fc07b77 98405ea6 d8dee1c1 fb110b7d d96122c6 6d96aa69 2eb96fda 2f22c65d 01a233d0 84695c8f ebcd43cc ebda8265 fb5f02eb 0d94b4cf e24b753c 2a56c27a cb38fdcf 0da08d32 01eeca90 493526a4 5cc85f56 f03595f1 b6b51e0b 860348ac 1e384cc6 c33e458a fa3479b2 38efc600 2008-07-28 05:58:54: DEBUG: compute DH's public. 2008-07-28 05:58:54: DEBUG: b00d6211 ccef6e59 c6e4c673 fca33d40 9a9df177 6f33bc17 e8168ce1 56f8733c 1c5fe2ce 98262923 677d8daa 2b6f33f0 bd5c1b88 ea3a19a6 c629dbd2 a774bbe9 e3a21a47 d313eede 49d0a10d 15ce8d7a d4348347 832ed778 53d0b3ed 7dab2ec9 d06864f4 ffa76ea7 700733b4 fa369b94 805440c2 b33aea30 c728a2e9 318f69c2 2008-07-28 05:58:54: DEBUG: add payload of len 48, next type 10 2008-07-28 05:58:54: DEBUG: add payload of len 16, next type 4 2008-07-28 05:58:54: DEBUG: add payload of len 128, next type 5 2008-07-28 05:58:54: DEBUG: add payload of len 8, next type 5 2008-07-28 05:58:54: DEBUG: add payload of len 8, next type 0 2008-07-28 05:58:54: DEBUG: HASH with: 2008-07-28 05:58:54: DEBUG: c383cb43 a4898266 1b522452 f9401bbf db67f809 0a000034 00000001 00000001 00000028 01030401 023222c0 0000001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 04000014 b79a9537 6a31fce4 88abce34 cfc9b7d2 05000084 b00d6211 ccef6e59 c6e4c673 fca33d40 9a9df177 6f33bc17 e8168ce1 56f8733c 1c5fe2ce 98262923 677d8daa 2b6f33f0 bd5c1b88 ea3a19a6 c629dbd2 a774bbe9 e3a21a47 d313eede 49d0a10d 15ce8d7a d4348347 832ed778 53d0b3ed 7dab2ec9 d06864f4 ffa76ea7 700733b4 fa369b94 805440c2 b33aea30 c728a2e9 318f69c2 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: HASH computed: 2008-07-28 05:58:54: DEBUG: 2bebb3b6 0d0581b9 b059c787 db5d1d24 ea0cf3cb 2008-07-28 05:58:54: DEBUG: add payload of len 20, next type 1 2008-07-28 05:58:54: DEBUG: begin encryption. 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: pad length = 4 2008-07-28 05:58:54: DEBUG: 01000018 2bebb3b6 0d0581b9 b059c787 db5d1d24 ea0cf3cb 0a000034 00000001 00000001 00000028 01030401 023222c0 0000001c 01030000 80010001 8002a8c0 80040001 80050002 80030002 04000014 b79a9537 6a31fce4 88abce34 cfc9b7d2 05000084 b00d6211 ccef6e59 c6e4c673 fca33d40 9a9df177 6f33bc17 e8168ce1 56f8733c 1c5fe2ce 98262923 677d8daa 2b6f33f0 bd5c1b88 ea3a19a6 c629dbd2 a774bbe9 e3a21a47 d313eede 49d0a10d 15ce8d7a d4348347 832ed778 53d0b3ed 7dab2ec9 d06864f4 ffa76ea7 700733b4 fa369b94 805440c2 b33aea30 c728a2e9 318f69c2 0500000c 01040000 ce51cc7a 0000000c 01040000 459220fb 87f8af03 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: with key: 2008-07-28 05:58:54: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:54: DEBUG: encrypted payload by IV: 2008-07-28 05:58:54: DEBUG: 12e14984 71aa67fb 2008-07-28 05:58:54: DEBUG: save IV for next: 2008-07-28 05:58:54: DEBUG: 277dad90 b84f707a 2008-07-28 05:58:54: DEBUG: encrypted. 2008-07-28 05:58:54: DEBUG: 284 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 05:58:54: DEBUG: sockname 69.146.32.251[500] 2008-07-28 05:58:54: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 05:58:54: DEBUG: send packet to w.x.y.z[500] 2008-07-28 05:58:54: DEBUG: 1 times of 284 bytes message will be sent to w.x.y.z[500] 2008-07-28 05:58:54: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 0000011c e5bfa25a 2fb8fd22 303a89da 59925f11 ec4ce857 76171050 d60f39dd cfa7a5ea 73e92dba 555c04d3 e1381802 45e915e3 c017b224 2cb913af 4bf8ad04 d958a3a6 8ab6aad4 2c77c030 c30faafc d58d1c05 f9a5502d 49843125 896ab293 5538a697 4a3103c3 14c3e795 4377ee3f ab750c11 178b33be 6c288bbc e2a16b48 bc2e7981 3465e8fb 5faee773 577b28f1 933b2e79 c5814e25 0e0e61ae a57e6aae 3ad47ca3 77ce247a 619b469c a19e15f1 3a7d2ab3 49bd1590 c26ee888 5199b270 f02fdbe4 1b041d71 3f863c17 e99cea33 73fd01ef d1bbb572 29cc73db 34fea434 fa16ee12 7efd29ac 36c9b6e8 c03bde3a 47527452 3e7b55b6 22566570 277dad90 b84f707a 2008-07-28 05:58:54: DEBUG: resend phase2 packet 48a656d56e438a6c:835e2082f4c50164:0000c383 2008-07-28 05:58:54: DEBUG: === 2008-07-28 05:58:54: DEBUG: 60 bytes message received from w.x.y.z[500] to 69.146.32.251[500] 2008-07-28 05:58:54: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 0000003c 82baf406 4740bf27 add3f3dd cbfb902c e482b2f1 67d86d6d 57bd1701 87a52bca 2008-07-28 05:58:54: DEBUG: begin decryption. 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: IV was saved for next processing: 2008-07-28 05:58:54: DEBUG: 57bd1701 87a52bca 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: with key: 2008-07-28 05:58:54: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 05:58:54: DEBUG: decrypted payload by IV: 2008-07-28 05:58:54: DEBUG: 277dad90 b84f707a 2008-07-28 05:58:54: DEBUG: decrypted payload, but not trimed. 2008-07-28 05:58:54: DEBUG: 00000018 858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b 81b881f4 aca3aa07 2008-07-28 05:58:54: DEBUG: padding len=8 2008-07-28 05:58:54: DEBUG: skip to trim padding. 2008-07-28 05:58:54: DEBUG: decrypted. 2008-07-28 05:58:54: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08102001 c383cb43 0000003c 00000018 858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b 81b881f4 aca3aa07 2008-07-28 05:58:54: DEBUG: begin. 2008-07-28 05:58:54: DEBUG: seen nptype=8(hash) 2008-07-28 05:58:54: DEBUG: succeed. 2008-07-28 05:58:54: DEBUG: HASH(3) validate:2008-07-28 05:58:54: DEBUG: 858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b 2008-07-28 05:58:54: DEBUG: HASH with: 2008-07-28 05:58:54: DEBUG: 00c383cb 43a48982 661b5224 52f9401b bfdb67f8 09b79a95 376a31fc e488abce 34cfc9b7 d2 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: HASH computed: 2008-07-28 05:58:54: DEBUG: 858586cc 041b5a81 4bfdef57 d6e918a0 03f5e94b 2008-07-28 05:58:54: DEBUG: === 2008-07-28 05:58:54: DEBUG: compute DH's shared. 2008-07-28 05:58:54: DEBUG: 4d72478f e939d367 b558837a f8d10b41 e1aa4af4 285e2ade d1b1f081 3d9fbadd 0934df43 e837ad68 e481eefb b4a00188 676bc4da a7b57312 d2f867a3 a41fbe03 8fd73a5b 11a502a7 7160937f a394fe21 22991e5d 31de0734 512bca88 65562f93 1cd5e9ca 47ae0a35 29483d54 a808a6d3 581494a7 46474e34 26025af3 58a0a6db 2008-07-28 05:58:54: DEBUG: KEYMAT compute with 2008-07-28 05:58:54: DEBUG: 4d72478f e939d367 b558837a f8d10b41 e1aa4af4 285e2ade d1b1f081 3d9fbadd 0934df43 e837ad68 e481eefb b4a00188 676bc4da a7b57312 d2f867a3 a41fbe03 8fd73a5b 11a502a7 7160937f a394fe21 22991e5d 31de0734 512bca88 65562f93 1cd5e9ca 47ae0a35 29483d54 a808a6d3 581494a7 46474e34 26025af3 58a0a6db 03023222 c0a48982 661b5224 52f9401b bfdb67f8 09b79a95 376a31fc e488abce 34cfc9b7 d2 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: hmac(sha1) 2008-07-28 05:58:54: DEBUG: encklen=192 authklen=160 2008-07-28 05:58:54: DEBUG: generating 640 bits of key (dupkeymat=4) 2008-07-28 05:58:54: DEBUG: generating K1...K4 for KEYMAT. 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: 95afdcdf 8ec36c90 c91388b5 5937999e d6a2db7c 27e5a321 359d9f19 737936c1 30e211e5 abc887b3 aed79067 0cc54e82 b895c524 0c9787b2 684b9d03 75609ab4 b36d9454 fda5d5d2 d967822a 0e00aaa2 2008-07-28 05:58:54: DEBUG: KEYMAT compute with 2008-07-28 05:58:54: DEBUG: 4d72478f e939d367 b558837a f8d10b41 e1aa4af4 285e2ade d1b1f081 3d9fbadd 0934df43 e837ad68 e481eefb b4a00188 676bc4da a7b57312 d2f867a3 a41fbe03 8fd73a5b 11a502a7 7160937f a394fe21 22991e5d 31de0734 512bca88 65562f93 1cd5e9ca 47ae0a35 29483d54 a808a6d3 581494a7 46474e34 26025af3 58a0a6db 03003b4f cfa48982 661b5224 52f9401b bfdb67f8 09b79a95 376a31fc e488abce 34cfc9b7 d2 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: hmac(sha1) 2008-07-28 05:58:54: DEBUG: encklen=192 authklen=160 2008-07-28 05:58:54: DEBUG: generating 640 bits of key (dupkeymat=4) 2008-07-28 05:58:54: DEBUG: generating K1...K4 for KEYMAT. 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: hmac(hmac_sha1) 2008-07-28 05:58:54: DEBUG: a732002b 4d9e7dca eacf14b1 9175529f 0157d675 dd9eaa2b ecdb2d07 ecb1e803 d532d76c be11429f 33c5a5ed 49c41ccd 45cecd09 7692c101 d544c30e 92caff2c 9a6f1c94 de09b805 9a7b074a 6158f719 2008-07-28 05:58:54: DEBUG: KEYMAT computed. 2008-07-28 05:58:54: DEBUG: call pk_sendupdate 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: hmac(sha1) 2008-07-28 05:58:54: DEBUG: call pfkey_send_update2 2008-07-28 05:58:54: DEBUG: pfkey update sent. 2008-07-28 05:58:54: DEBUG: encryption(3des) 2008-07-28 05:58:54: DEBUG: hmac(sha1) 2008-07-28 05:58:54: DEBUG: call pfkey_send_add2 2008-07-28 05:58:54: DEBUG: pfkey add sent. 2008-07-28 05:58:54: DEBUG: pk_recv: retry[0] recv() 2008-07-28 05:58:54: DEBUG: get pfkey UPDATE message 2008-07-28 05:58:54: DEBUG2: 02020003 14000000 c3913ee6 332e0000 02000100 023222c0 04000303 00000000 02001300 02000000 00000000 00000000 03000500 ff200000 10020000 ce51cc7a 00000000 00000000 03000600 ff200000 10020000 459220fb 00000000 00000000 04000300 00000000 00000000 00000000 c0a80000 00000000 00000000 00000000 04000400 00000000 00000000 00000000 00870000 00000000 00000000 00000000 2008-07-28 05:58:54: DEBUG: pfkey UPDATE succeeded: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] spi=36840128(0x23222c0) 2008-07-28 05:58:54: INFO: IPsec-SA established: ESP/Tunnel w.x.y.z[0]->69.146.32.251[0] spi=36840128(0x23222c0) 2008-07-28 05:58:54: DEBUG: === 2008-07-28 05:58:54: DEBUG: pk_recv: retry[0] recv() 2008-07-28 05:58:54: DEBUG: get pfkey ADD message 2008-07-28 05:58:54: DEBUG2: 02030003 14000000 c3913ee6 332e0000 02000100 003b4fcf 04000303 00000000 02001300 02000000 00000000 00000000 03000500 ff200000 10020000 459220fb 00000000 00000000 03000600 ff200000 10020000 ce51cc7a 00000000 00000000 04000300 00000000 00000000 00000000 c0a80000 00000000 00000000 00000000 04000400 00000000 00000000 00000000 00870000 00000000 00000000 00000000 2008-07-28 05:58:54: INFO: IPsec-SA established: ESP/Tunnel 69.146.32.251[0]->w.x.y.z[0] spi=3887055(0x3b4fcf) 2008-07-28 05:58:54: DEBUG: === 2008-07-28 06:02:20: INFO: caught signal 2 2008-07-28 06:02:20: DEBUG: pk_recv: retry[0] recv() 2008-07-28 06:02:20: DEBUG: get pfkey FLUSH message 2008-07-28 06:02:20: DEBUG2: 02090000 02000000 00000000 332e0000 2008-07-28 06:02:20: DEBUG2: flushing all ph2 handlers... 2008-07-28 06:02:20: DEBUG2: got a ph2 handler to flush... 2008-07-28 06:02:20: DEBUG2: getph1byaddr: start 2008-07-28 06:02:20: DEBUG2: local: 69.146.32.251[0] 2008-07-28 06:02:20: DEBUG2: remote: w.x.y.z[0] 2008-07-28 06:02:20: DEBUG2: p->local: 69.146.32.251[500] 2008-07-28 06:02:20: DEBUG2: p->remote: w.x.y.z[500] 2008-07-28 06:02:20: DEBUG2: matched 2008-07-28 06:02:20: DEBUG: compute IV for phase2 2008-07-28 06:02:20: DEBUG: phase1 last IV: 2008-07-28 06:02:20: DEBUG: 76737915 8b38ae42 89d11331 2008-07-28 06:02:20: DEBUG: hash(sha1) 2008-07-28 06:02:20: DEBUG: encryption(3des) 2008-07-28 06:02:20: DEBUG: phase2 IV computed: 2008-07-28 06:02:20: DEBUG: 90ee1522 a354b8d1 2008-07-28 06:02:20: DEBUG: HASH with: 2008-07-28 06:02:20: DEBUG: 89d11331 00000010 00000001 03040001 023222c0 2008-07-28 06:02:20: DEBUG: hmac(hmac_sha1) 2008-07-28 06:02:20: DEBUG: HASH computed: 2008-07-28 06:02:20: DEBUG: fd5a241e 337d9c1f 458952f3 53a8b4be ca4160c0 2008-07-28 06:02:20: DEBUG: begin encryption. 2008-07-28 06:02:20: DEBUG: encryption(3des) 2008-07-28 06:02:20: DEBUG: pad length = 8 2008-07-28 06:02:20: DEBUG: 0c000018 fd5a241e 337d9c1f 458952f3 53a8b4be ca4160c0 00000010 00000001 03040001 023222c0 ddcbc0c5 a5aed007 2008-07-28 06:02:20: DEBUG: encryption(3des) 2008-07-28 06:02:20: DEBUG: with key: 2008-07-28 06:02:20: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 06:02:20: DEBUG: encrypted payload by IV: 2008-07-28 06:02:20: DEBUG: 90ee1522 a354b8d1 2008-07-28 06:02:20: DEBUG: save IV for next: 2008-07-28 06:02:20: DEBUG: f597d839 4f2382f9 2008-07-28 06:02:20: DEBUG: encrypted. 2008-07-28 06:02:20: DEBUG: 76 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 06:02:20: DEBUG: sockname 69.146.32.251[500] 2008-07-28 06:02:20: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 06:02:20: DEBUG: send packet to w.x.y.z[500] 2008-07-28 06:02:20: DEBUG: 1 times of 76 bytes message will be sent to w.x.y.z[500] 2008-07-28 06:02:20: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08100501 89d11331 0000004c 93510f21 583e31a4 c132490d bff9ac9c c118ba5c 91127bfc 6a95eb5e d84f70e9 d8c815cd 4b948da3 f597d839 4f2382f9 2008-07-28 06:02:20: DEBUG: sendto Information delete. 2008-07-28 06:02:20: DEBUG: IV freed 2008-07-28 06:02:20: DEBUG: an undead schedule has been deleted. 2008-07-28 06:02:20: DEBUG: IV freed 2008-07-28 06:02:21: DEBUG: call pfkey_send_dump 2008-07-28 06:02:21: DEBUG: pk_recv: retry[0] recv() 2008-07-28 06:02:21: DEBUG: compute IV for phase2 2008-07-28 06:02:21: DEBUG: phase1 last IV: 2008-07-28 06:02:21: DEBUG: 76737915 8b38ae42 bffafaa1 2008-07-28 06:02:21: DEBUG: hash(sha1) 2008-07-28 06:02:21: DEBUG: encryption(3des) 2008-07-28 06:02:21: DEBUG: phase2 IV computed: 2008-07-28 06:02:21: DEBUG: ddcd366e 7ee272fc 2008-07-28 06:02:21: DEBUG: HASH with: 2008-07-28 06:02:21: DEBUG: bffafaa1 0000001c 00000001 01100001 48a656d5 6e438a6c 835e2082 f4c50164 2008-07-28 06:02:21: DEBUG: hmac(hmac_sha1) 2008-07-28 06:02:21: DEBUG: HASH computed: 2008-07-28 06:02:21: DEBUG: bcc8943f f5f065e0 2d407673 a927c731 d95da7a0 2008-07-28 06:02:21: DEBUG: begin encryption. 2008-07-28 06:02:21: DEBUG: encryption(3des) 2008-07-28 06:02:21: DEBUG: pad length = 4 2008-07-28 06:02:21: DEBUG: 0c000018 bcc8943f f5f065e0 2d407673 a927c731 d95da7a0 0000001c 00000001 01100001 48a656d5 6e438a6c 835e2082 f4c50164 cde59303 2008-07-28 06:02:21: DEBUG: encryption(3des) 2008-07-28 06:02:21: DEBUG: with key: 2008-07-28 06:02:21: DEBUG: 6d64b34e b5017daa 32825cfd 29128ca0 c47e1cb3 22321fe2 2008-07-28 06:02:21: DEBUG: encrypted payload by IV: 2008-07-28 06:02:21: DEBUG: ddcd366e 7ee272fc 2008-07-28 06:02:21: DEBUG: save IV for next: 2008-07-28 06:02:21: DEBUG: 16a7ea82 126ed5d8 2008-07-28 06:02:21: DEBUG: encrypted. 2008-07-28 06:02:21: DEBUG: 84 bytes from 69.146.32.251[500] to w.x.y.z[500] 2008-07-28 06:02:21: DEBUG: sockname 69.146.32.251[500] 2008-07-28 06:02:21: DEBUG: send packet from 69.146.32.251[500] 2008-07-28 06:02:21: DEBUG: send packet to w.x.y.z[500] 2008-07-28 06:02:21: DEBUG: 1 times of 84 bytes message will be sent to w.x.y.z[500] 2008-07-28 06:02:21: DEBUG: 48a656d5 6e438a6c 835e2082 f4c50164 08100501 bffafaa1 00000054 54474457 93d42ae6 d17f783c bae3331e 69589ea0 170bba8e 65f391c6 dc4c146e 33b46f96 e6afa965 72c54ee8 7ca56698 16a7ea82 126ed5d8 2008-07-28 06:02:21: DEBUG: sendto Information delete. 2008-07-28 06:02:21: DEBUG: IV freed 2008-07-28 06:02:21: DEBUG: an undead schedule has been deleted. 2008-07-28 06:02:21: DEBUG: IV freed 2008-07-28 06:02:21: INFO: racoon shutdown --------------030808050309040608040302--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?488D1B99.1070902>