Date: Fri, 21 Feb 2003 09:57:46 +1100 From: "Scott Penno" <scott.penno@gennex.com.au> To: <freebsd-questions@freebsd.org> Subject: Re: INVALID-COOKIE msg with racoon Message-ID: <000a01c2d933$7e08f170$0203140a@jupiter>
next in thread | raw e-mail | index | archive | help
Just an update. After some further testing, came to the conclusion that the problem was with the Windows 2000 box. I had the people responsible for the other end replace the box and everything now works fine. Scott. ----- Original Message ----- From: "Scott Penno" <scott.penno@gennex.com.au> To: <freebsd-questions@freebsd.org> Sent: Thursday, January 30, 2003 11:25 PM Subject: INVALID-COOKIE msg with racoon Hi all, Not sure if this is the right forum for this question. If there is somewhere more appropriate, please let me know. So, after a few problems I have racoon up and running. I'm now getting messages when communicating with another host about an invalid cookie (log output attached below). I have only a vague idea about what this means and absolutely no idea about how to identify the problem or resolve it. This end is a box running 5.0-RC1 and the other end is a Windows 2000 box. I can succesfully establish SA's with other hosts from the FreeBSD box and the Windows box can apparently establish SA's with other hosts as well. Any suggestions, much appreciated. Regards, Scott. Foreground mode. 2003-01-30 14:16:27: INFO: main.c:172:main(): @(#)package version freebsd-20021120a 2003-01-30 14:16:27: INFO: main.c:174:main(): @(#)internal version 20001216 sakane@kame.net 2003-01-30 14:16:27: INFO: main.c:175:main(): @(#)This product linked OpenSSL 0.9.6g 9 Aug 2002 (http://www.openssl.org/) 2003-01-30 14:16:27: DEBUG: algorithm.c:610:alg_oakley_dhdef(): hmac(modp1024) 2003-01-30 14:16:27: DEBUG: pfkey.c:2243:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't support it. 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:203:grab_myaddrs(): my interface: a.b.c.d (bge0) 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:203:grab_myaddrs(): my interface: 127.0.0.1 (lo0) 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:468:autoconf_myaddrsport(): configuring default isakmp port. 2003-01-30 14:16:27: DEBUG: grabmyaddr.c:490:autoconf_myaddrsport(): 2 addrs are configured successfully 2003-01-30 14:16:27: INFO: isakmp.c:1358:isakmp_open(): 127.0.0.1[500] used as isakmp port (fd=5) 2003-01-30 14:16:27: INFO: isakmp.c:1358:isakmp_open(): a.b.c.d[500] used as isakmp port (fd=6) 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08: j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08: j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5008: w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: pfkey.c:195:pfkey_handler(): get pfkey X_SPDDUMP message 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80a2c08: j.k.l.m/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5008: w.x.y.z/32[0] a.b.c.d/32[0] proto=any dir=in 2003-01-30 14:16:27: DEBUG: policy.c:184:cmpspidxstrict(): sub:0xbfbff8f0: a.b.c.d/32[0] w.x.y.z/32[0] proto=any dir=out 2003-01-30 14:16:27: DEBUG: policy.c:185:cmpspidxstrict(): db :0x80b5408: a.b.c.d/32[0] j.k.l.m/32[0] proto=any dir=out 2003-01-30 14:17:04: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:04: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000002 2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:04.139186 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 00000000 cookie ebce80ffc9844274->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp1024)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration len=4 value=00000258)))) (vid: len=20) 2003-01-30 14:17:04: DEBUG: remoteconf.c:129:getrmconf(): anonymous configuration selected for w.x.y.z[500]. 2003-01-30 14:17:04: DEBUG: isakmp.c:889:isakmp_ph1begin_r(): === 2003-01-30 14:17:04: INFO: isakmp.c:894:isakmp_ph1begin_r(): respond new phase 1 negotiation: a.b.c.d[500]<=>w.x.y.z[500] 2003-01-30 14:17:04: INFO: isakmp.c:899:isakmp_ph1begin_r(): begin Identity Protection mode. 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=1(sa) 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=13(vid) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: INFO: vendorid.c:128:check_vendorid(): received Vendor ID: MS NT5 ISAKMPOAKLEY 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1117:get_proppair(): total SA len=52 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=2(prop) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1170:get_proppair(): proposal #1 len=44 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=3(trns) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1311:get_transform(): transform #1 len=36 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2003-01-30 14:17:04: DEBUG: algorithm.c:382:alg_oakley_encdef(): encription(3des) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Hash Algorithm, flag=0x8000, lorv=SHA 2003-01-30 14:17:04: DEBUG: algorithm.c:252:alg_oakley_hashdef(): hash(sha1) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2003-01-30 14:17:04: DEBUG: algorithm.c:610:alg_oakley_dhdef(): hmac(modp1024) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Authentication Method, flag=0x8000, lorv=pre-shared key 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Life Type, flag=0x8000, lorv=seconds 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1870:check_attr_isakmp(): type=Life Duration, flag=0x0000, lorv=4 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1213:get_proppair(): pair 1: 2003-01-30 14:17:04: DEBUG: proposal.c:892:print_proppair0(): 0x80a83d0: next=0x0 tnext=0x0 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:1248:get_proppair(): proposal #1: 1 transform 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:322:get_ph1approvalx(): prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:327:get_ph1approvalx(): trns#=1, trns-id=IKE 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Hash Algorithm, flag=0x8000, lorv=SHA 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Group Description, flag=0x8000, lorv=1024-bit MODP group 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Authentication Method, flag=0x8000, lorv=pre-shared key 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Type, flag=0x8000, lorv=seconds 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:491:t2isakmpsa(): type=Life Duration, flag=0x0000, lorv=4 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:338:get_ph1approvalx(): Compared: DB:Peer 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:339:get_ph1approvalx(): (lifetime = 600:600) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:341:get_ph1approvalx(): (lifebyte = 0:0) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:343:get_ph1approvalx(): enctype = 3DES-CBC:3DES-CBC 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:348:get_ph1approvalx(): (encklen = 0:0) 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:350:get_ph1approvalx(): hashtype = SHA:SHA 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:355:get_ph1approvalx(): authmethod = pre-shared key:pre-shared key 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:360:get_ph1approvalx(): dh_group = 1024-bit MODP group:1024-bit MODP group 2003-01-30 14:17:04: DEBUG: ipsec_doi.c:248:get_ph1approval(): an acceptable proposal found. 2003-01-30 14:17:04: DEBUG: algorithm.c:610:alg_oakley_dhdef(): hmac(modp1024) 2003-01-30 14:17:04: DEBUG: isakmp.c:1996:isakmp_newcookie(): new cookie: af50325ecf59c5f7 2003-01-30 14:17:04: DEBUG: isakmp.c:2113:set_isakmp_payload(): add payload of len 52, next type 13 2003-01-30 14:17:04: DEBUG: isakmp.c:2113:set_isakmp_payload(): add payload of len 16, next type 0 2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:04.143131 a.b.c.d:500 -> w.x.y.z:500: isakmp 1.0 msgid 00000000 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 1 ? ident: (sa: doi=ipsec situation=identity (p: #1 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp1024)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration len=4 value=00000258)))) (vid: len=16) 2003-01-30 14:17:04: DEBUG: sockmisc.c:421:sendfromto(): sockname a.b.c.d[500] 2003-01-30 14:17:04: DEBUG: sockmisc.c:423:sendfromto(): send packet from a.b.c.d[500] 2003-01-30 14:17:04: DEBUG: sockmisc.c:425:sendfromto(): send packet to w.x.y.z[500] 2003-01-30 14:17:04: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104 bytes message will be sent to a.b.c.d[500] 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:04: DEBUG: isakmp.c:1449:isakmp_ph1resend(): resend phase1 packet ebce80ffc9844274:af50325ecf59c5f7 2003-01-30 14:17:04: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:04: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:04: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 3757cd15 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:04: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:04.496813 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 3757cd15 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) 2003-01-30 14:17:04: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive Information. 2003-01-30 14:17:04: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:04: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=11(notify) 2003-01-30 14:17:04: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:04: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown notify message, no phase2 handle found. 2003-01-30 14:17:04: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n(): notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274 af50325ecf59c5f7 (size=16). 2003-01-30 14:17:05: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:05: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000002 2003-01-30 14:17:05: DEBUG: sockmisc.c:421:sendfromto(): sockname a.b.c.d[500] 2003-01-30 14:17:05: DEBUG: sockmisc.c:423:sendfromto(): send packet from a.b.c.d[500] 2003-01-30 14:17:05: DEBUG: sockmisc.c:425:sendfromto(): send packet to w.x.y.z[500] 2003-01-30 14:17:05: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104 bytes message will be sent to a.b.c.d[500] 2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:05: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is retransmitted by w.x.y.z[500]. 2003-01-30 14:17:05: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:05: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:05: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 0d1aca76 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:05: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:05.544438 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 0d1aca76 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) 2003-01-30 14:17:05: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive Information. 2003-01-30 14:17:05: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:05: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=11(notify) 2003-01-30 14:17:05: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:05: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown notify message, no phase2 handle found. 2003-01-30 14:17:05: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n(): notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274 af50325ecf59c5f7 (size=16). 2003-01-30 14:17:07: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:07: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:07: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:07: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is retransmitted by w.x.y.z[500]. 2003-01-30 14:17:07: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:07: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:07: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 9d0ce48a 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:07: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:07.559022 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 9d0ce48a cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) 2003-01-30 14:17:07: DEBUG: isakmp_inf.c:115:isakmp_info_recv(): receive Information. 2003-01-30 14:17:07: DEBUG: isakmp.c:1112:isakmp_parsewoh(): begin. 2003-01-30 14:17:07: DEBUG: isakmp.c:1139:isakmp_parsewoh(): seen nptype=11(notify) 2003-01-30 14:17:07: DEBUG: isakmp.c:1178:isakmp_parsewoh(): succeed. 2003-01-30 14:17:07: ERROR: isakmp_inf.c:776:isakmp_info_recv_n(): unknown notify message, no phase2 handle found. 2003-01-30 14:17:07: DEBUG: isakmp_inf.c:798:isakmp_info_recv_n(): notification message 4:INVALID-COOKIE, doi=1 proto_id=1 spi=ebce80ffc9844274 af50325ecf59c5f7 (size=16). 2003-01-30 14:17:11: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:11: DEBUG: isakmp.c:222:isakmp_handler(): 108 bytes message received from w.x.y.z[500] 2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 00000000 00000000 01100200 00000000 0000006c 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000002 2003-01-30 14:17:11: DEBUG: sockmisc.c:421:sendfromto(): sockname a.b.c.d[500] 2003-01-30 14:17:11: DEBUG: sockmisc.c:423:sendfromto(): send packet from a.b.c.d[500] 2003-01-30 14:17:11: DEBUG: sockmisc.c:425:sendfromto(): send packet to w.x.y.z[500] 2003-01-30 14:17:11: DEBUG: sockmisc.c:570:sendfromto(): 1 times of 104 bytes message will be sent to a.b.c.d[500] 2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 01100200 00000000 00000068 0d000038 00000001 00000001 0000002c 01010001 00000024 01010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00000258 00000014 7003cbc1 097dbe9c 2600ba69 83bc8b35 2003-01-30 14:17:11: NOTIFY: isakmp.c:255:isakmp_handler(): the packet is retransmitted by w.x.y.z[500]. 2003-01-30 14:17:11: DEBUG: isakmp.c:221:isakmp_handler(): === 2003-01-30 14:17:11: DEBUG: isakmp.c:222:isakmp_handler(): 56 bytes message received from w.x.y.z[500] 2003-01-30 14:17:11: DEBUG: plog.c:193:plogdump(): ebce80ff c9844274 af50325e cf59c5f7 0b100500 78707fb7 00000038 0000001c 00000001 01100004 ebce80ff c9844274 af50325e cf59c5f7 2003-01-30 14:17:11: DEBUG: isakmp.c:2248:isakmp_printpacket(): begin. 17:11.553946 w.x.y.z:500 -> a.b.c.d:500: isakmp 1.0 msgid 78707fb7 cookie ebce80ffc9844274->af50325ecf59c5f7: phase 2/others ? inf: (n: doi=ipsec proto=isakmp type=INVALID-COOKIE spi=ebce80ffc9844274af50325ecf59c5f7) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?000a01c2d933$7e08f170$0203140a>