create_ike: using signature for peer -->NODE_ES<--
ikev2 "-->HOST_ES<--" passive transport esp proto gre inet from -->HOST-US<--- to -->NODE_ES<-- local -->HOST-US<--- peer -->NODE_ES<-- ikesa enc aes-256 prf hmac-sha2-256,hmac-sha2-384,hmac-sha2-512,hmac-sha1 auth hmac-sha2-256 group ecp256 childsa enc aes-256 auth hmac-sha2-256 group ecp256 esn,noesn srcid -->HOSTNAME-US<---@-->CA<--- ikelifetime 3600 lifetime 1200 bytes 536870912 signature
/etc/iked.conf: loaded 1 configuration rules
ca_privkey_serialize: type RSA_KEY length 1193
ca_pubkey_serialize: type RSA_KEY length 270
ca_privkey_to_method: type RSA_KEY method RSA_SIG
ca_getkey: received private key type RSA_KEY length 1193
ca_getkey: received public key type RSA_KEY length 270
ca_dispatch_parent: config reset
ca_reload: loaded ca file ca.crt
ca_reload: /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN=-->CA<---
ca_reload: loaded 1 ca certificate
ca_reload: loaded cert file -->CERT-FR<---.crt
ca_reload: loaded cert file -->CERT-US<---.crt
ca_validate_cert: /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN=-->CERT-FR<--- ok
ca_validate_cert: /C=US/ST=Texas/L=Dallas/O=Telecom Lobby/OU=VPNC/CN=-->CERT-US<--- ok
ca_reload: local cert type X509_CERT
config_getocsp: ocsp_url none tolerate 0 maxage -1
ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
config_getpolicy: received policy
config_getpfkey: received pfkey fd 3
config_getcompile: compilation done
config_getsocket: received socket fd 4
config_getsocket: received socket fd 5
config_getsocket: received socket fd 6
config_getsocket: received socket fd 7
config_getstatic: dpd_check_interval 15
config_getstatic: no enforcesingleikesa
config_getstatic: no fragmentation
config_getstatic: mobike
config_getstatic: nattport 4500
policy_lookup: setting policy '-->HOST_ES<--'
spi=0xc870f2a5b428b6b1: recv IKE_SA_INIT req 0 peer -->NODE_ES<--:500 local -->HOST-US<---:500, 1056 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0x0000000000000000
ikev2_policy2id: srcid UFQDN/-->HOSTNAME-US<---@-->CA<--- length 33
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 1056 response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 832
ikev2_pld_sa: more 2 reserved 0 length 352 proposal #1 protoid IKE spisize 0 xforms 37 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_384_192
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_512_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id AES_XCBC_96
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id AES_CMAC_96
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P256R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P384R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P512R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_sa: more 0 reserved 0 length 476 proposal #2 protoid IKE spisize 0 xforms 45 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P256R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P384R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P512R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 72
ikev2_pld_ke: dh group ECP_256 reserved 0
fb4e28c8 2dc256a8 01f96855 47b989b8 bfe51d02 98dfc830 9a1926c2 ce43da18
825173f8 868e8e93 a0e15479 6648f94d df9bfcff 265f2894 369fac99 1c5390d1
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
fbb057f9 39f8991c 6147e3d5 efab770e aa42ca1c 570af11f f8af87db 2135edae
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
5b9719db 93af37fd d1506d29 77b4314f e99b3ba1
ikev2_nat_detection: peer source 0xc870f2a5b428b6b1 0x0000000000000000 -->NODE_ES<--:500
5b9719db 93af37fd d1506d29 77b4314f e99b3ba1
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
26dbd4cc e1365f1a 20cc721b 776e76b4 d97f93c2
ikev2_nat_detection: peer destination 0xc870f2a5b428b6b1 0x0000000000000000 -->HOST-US<---:500
26dbd4cc e1365f1a 20cc721b 776e76b4 d97f93c2
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 16
ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS
00020003 00040005
ikev2_pld_notify: signature hash SHA2_256 (2)
ikev2_pld_notify: signature hash SHA2_384 (3)
ikev2_pld_notify: signature hash SHA2_512 (4)
ikev2_pld_notify: signature hash <UNKNOWN:5> (5)
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 256)
proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 1 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 4
proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 2 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 0
policy_lookup: setting policy '-->HOST_ES<--'
spi=0xc870f2a5b428b6b1: sa_state: INIT -> SA_INIT
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 256)
proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 1 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 4
proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 2 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 0
proposals_negotiate: score 1: ENCR AES_CBC 256
proposals_negotiate: score 1: PRF HMAC_SHA2_256
proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
proposals_negotiate: score 1: DH ECP_256
sa_stateok: SA_INIT flags 0x0000, require 0x0000
sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
spi=0xc870f2a5b428b6b1: ikev2_sa_keys: DHSECRET with 32 bytes
4a83aa63 4ac034c7 be328bea f0eac5da d117ba41 eea32330 17b36200 19c5f7a5
ikev2_sa_keys: SKEYSEED with 32 bytes
c4449822 30e6c834 83caec16 7409dd2f 83984206 86a748a0 39d8af89 397b054d
spi=0xc870f2a5b428b6b1: ikev2_sa_keys: S with 80 bytes
fbb057f9 39f8991c 6147e3d5 efab770e aa42ca1c 570af11f f8af87db 2135edae
8ab04bee 544dc638 9aacd0c4 4d2fd141 ce030fa4 47db06b6 0e3b4e35 80fc8e00
c870f2a5 b428b6b1 f2df80a5 dd2f5b33
ikev2_prfplus: T1 with 32 bytes
0db03dbc 96a38ba0 78a1e472 bc6ecfea 3e2e3db1 5303eb1c 4d14f919 f5802901
ikev2_prfplus: T2 with 32 bytes
a173a0d8 7f060aa8 6c812231 b5920ecf 35779516 081d2946 3b73d58d 9b537b02
ikev2_prfplus: T3 with 32 bytes
2a141ed7 5f9fb6d1 fee06cb4 31d31075 199b0d7a e982b976 946fc8df 202e4359
ikev2_prfplus: T4 with 32 bytes
d54043e1 b34d9d11 bd38c5bb 207083ac 7adbb8f3 4c83c0da 6b069ac6 2714666d
ikev2_prfplus: T5 with 32 bytes
e871e73a 1ab8c048 bfa5428b db4aed8a 5d7f022c f9aa7551 6ea70a97 ab2d2e6b
ikev2_prfplus: T6 with 32 bytes
c76d3292 1f9fe008 4e1dc370 4f0c01fb 52379853 a70af25e 538d84af b61de39c
ikev2_prfplus: T7 with 32 bytes
0bd325e9 cf9d2036 467fd529 b454e0fb 040953f5 0015ee19 59b2dad5 b0a062dd
ikev2_prfplus: Tn with 224 bytes
0db03dbc 96a38ba0 78a1e472 bc6ecfea 3e2e3db1 5303eb1c 4d14f919 f5802901
a173a0d8 7f060aa8 6c812231 b5920ecf 35779516 081d2946 3b73d58d 9b537b02
2a141ed7 5f9fb6d1 fee06cb4 31d31075 199b0d7a e982b976 946fc8df 202e4359
d54043e1 b34d9d11 bd38c5bb 207083ac 7adbb8f3 4c83c0da 6b069ac6 2714666d
e871e73a 1ab8c048 bfa5428b db4aed8a 5d7f022c f9aa7551 6ea70a97 ab2d2e6b
c76d3292 1f9fe008 4e1dc370 4f0c01fb 52379853 a70af25e 538d84af b61de39c
0bd325e9 cf9d2036 467fd529 b454e0fb 040953f5 0015ee19 59b2dad5 b0a062dd
ikev2_sa_keys: SK_d with 32 bytes
0db03dbc 96a38ba0 78a1e472 bc6ecfea 3e2e3db1 5303eb1c 4d14f919 f5802901
ikev2_sa_keys: SK_ai with 32 bytes
a173a0d8 7f060aa8 6c812231 b5920ecf 35779516 081d2946 3b73d58d 9b537b02
ikev2_sa_keys: SK_ar with 32 bytes
2a141ed7 5f9fb6d1 fee06cb4 31d31075 199b0d7a e982b976 946fc8df 202e4359
ikev2_sa_keys: SK_ei with 32 bytes
d54043e1 b34d9d11 bd38c5bb 207083ac 7adbb8f3 4c83c0da 6b069ac6 2714666d
ikev2_sa_keys: SK_er with 32 bytes
e871e73a 1ab8c048 bfa5428b db4aed8a 5d7f022c f9aa7551 6ea70a97 ab2d2e6b
ikev2_sa_keys: SK_pi with 32 bytes
c76d3292 1f9fe008 4e1dc370 4f0c01fb 52379853 a70af25e 538d84af b61de39c
ikev2_sa_keys: SK_pr with 32 bytes
0bd325e9 cf9d2036 467fd529 b454e0fb 040953f5 0015ee19 59b2dad5 b0a062dd
ikev2_add_proposals: length 44
ikev2_next_payload: length 48 nextpayload KE
ikev2_next_payload: length 72 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload NOTIFY
ikev2_nat_detection: local source 0xc870f2a5b428b6b1 0xf2df80a5dd2f5b33 -->HOST-US<---:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_nat_detection: local destination 0xc870f2a5b428b6b1 0xf2df80a5dd2f5b33 -->NODE_ES<--:500
ikev2_next_payload: length 28 nextpayload CERTREQ
ikev2_add_certreq: type X509_CERT length 21
ikev2_next_payload: length 25 nextpayload NOTIFY
ikev2_next_payload: length 14 nextpayload NONE
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 279 response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 72
ikev2_pld_ke: dh group ECP_256 reserved 0
2213a051 4f8b600e 0a6113ef 4f8843e9 dfa82f90 afc341ce 1d22f142 cc1c99a6
d1aafd33 fa14c441 f55bbe7d ed87c6e0 7f53d608 68d9943e 8fa2bc83 05a734da
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
8ab04bee 544dc638 9aacd0c4 4d2fd141 ce030fa4 47db06b6 0e3b4e35 80fc8e00
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
e7c537c7 188717a7 e9730252 796a3ed3 a42caf24
ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
6c1a6db7 e62f6a24 2a3d9f69 b3a85e82 d19ab215
ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical 0x00 length 25
ikev2_pld_certreq: type X509_CERT length 20
d240096d 782460df c9e68072 dc0bc444 6fab51ba
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14
ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS
00020003 0004
spi=0xc870f2a5b428b6b1: send IKE_SA_INIT res 0 peer -->NODE_ES<--:500 local -->HOST-US<---:500, 279 bytes
config_free_proposals: free 0x5a932127300
config_free_proposals: free 0x5a8ff545680
spi=0xc870f2a5b428b6b1: recv IKE_AUTH req 1 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 1792 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1792 response 0
ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 1764
ikev2_msg_decrypt: IV length 16
282989b4 f635471e 33d87b37 39081a33
ikev2_msg_decrypt: encrypted payload length 1728
2640dec6 2fc56d29 7db8e661 28ebb336 17a8f4cd 25a3ccfa 89e7ad66 64271f1d
ee4b3c4a 4b055e9b 09bf7ea2 78ff9f14 fecee886 354a66d3 d329f3ac 9276d27d
5673866d b272db95 55fa1240 24d9667a 5f6791ba 735d8837 c78c897d 07878af2
2c894a02 6a92528b 1ab6d0b4 6d1b85b5 3c8e096d 1bf1db5a 2405220a 5fb2701a
0dcbd992 d60cfaf1 76892665 917d4166 05d3aba3 ffc0fb65 454b0050 2a4c0783
fbceafc6 3e22cbe8 ef581b17 818c9fcb aec89edf bf785db7 979c10eb 16fac875
947460ad 472a85bf 06195076 92acc85b 949ee718 ce6e0f1d a98d2ba1 afe878a6
56c364ea 24838380 def824c9 e7cb8f82 5acb4846 9881b961 db6c5505 aff63119
484b2cc3 00baf748 83df503c 07737489 3d9b4855 a9094b86 a5b9c293 6d926302
61ed258a c7e99cbe 9afc82e1 62057d0f 5c1b2b4b f1a76bf9 c1b1dd34 b3ecacc2
47e14e80 aed04925 1f2bf477 e407c499 8357ed81 ef14dfb0 3e58bc3c 2145e5f6
65290b01 9fa26624 8a90d1aa ba04eeae 32d8d6c3 a5c10920 f76765d0 646440fd
006638a5 382bd6ed 5b01507e d0d6e493 70c2d33d d0e2c500 8fc86ca2 c3500c18
56320694 3069a66f d088ea6b 714cf2ac 1ef54157 6f42f331 15c4a990 0a3da535
94b91ca5 98f7a486 ce5a5d9b 3e269676 6bda0fb6 4e7c0110 efdc7ef0 1800e448
718ace5f f525542a 974f4eb2 b77a1595 7702680f 65b7408e 0a961dc3 8b50f1f4
fa0ccd1e 2e418e50 8ec2c389 26ceb8a4 505c8f24 629abddd 9630b741 809c4648
b3956f53 fb21be31 73aeb039 1df4e5bf cbe5c7c0 c6c96210 43d990b9 bcded92b
9a290630 fdb14255 4323f14d 33de0794 5a52f486 a8298e5c ea529b2a 5ddc4b78
4a8b8b42 5cb333b6 5feb538d ac7e6bff d1b4dade da1c5df9 fdbc9f19 485bf678
2307e38e e1b7d2ff 6e2e833d b58f9f23 1a1678b6 0d96461b 063b2f4c e24c8ebf
3493fcd5 a3c5834f a4973f39 605e00aa 6bff7e25 29bd5988 c5d20a16 2b017456
1c8849b3 2ade4068 1e625767 a4ca2c2c 0d461c46 71dd1427 05df97cf bd5c1b2a
e82d10d1 d51af789 1d8032a0 0fb77c3b 451c20fb f6a3a1fb 728124ca d2c9fd11
ec89d1b2 ba45c49a bfe0a932 703d5b3e 17a9c49c 0d0eb141 0bc41f45 1a4ac38a
1cec485b da65cd3d 42f15867 659589e8 ba8a9347 8bb44672 e686731b 478c83e9
c7e83057 24e5044b 5f5198a5 3d295aec 44f6460b c8ee15f0 69c5281b 1cfebf8e
7ac337ae ef0fff4a 4d0bbfba 494c3a2c e37ecae0 f683e5c7 b854efd3 0d08c6b4
9a926bc7 cbaf03c5 0ef8a358 669df5bf c65bc600 73afeeeb 8136b4a7 fecf5c73
523d5823 8a6519ad afb1e36e a56f2d04 7633cf23 e46c45b3 2b5e9ffa d293379a
6f8faf1b fec85884 ea5848f7 300d7694 6b073fe4 11fb7d20 a7597cfc a8f502de
b053ab34 6abf4177 bbb7f934 69e4b438 3d6c0524 c7b46d60 03807a8c a5f190a3
54f2d9c8 d8e20705 0ec86bdf 28f7c74e 9b9dcaf9 2cd6ea07 9d11e1f6 62d86cda
a2ae7491 c5eedc6b 8b8dad17 e2f42164 a2be7565 4d246839 f47b5442 76d63104
d71f6319 6b48af35 e3c78e0d 0a8f160a 6ea2119e ed5b0eea a9f22e0e 499115d6
8f322757 495c597a 8b43bcbc 5282df1c aa2ca71a a8d00f4b 61859a5f b567e0b3
18ca7aab fd0c8571 7bb0b869 2a48f6ba 1ba0b386 c72ead0a 5f6cbe74 eac0e03f
afc12dfa 219f768f 553712ce e3b88cd5 99a0f875 8ca3070a 5a4021c2 5a4193e3
57b3140d d075f597 5c2a9dff 28c6db78 46dbec18 f5fc5200 5216bc7f 449ac561
c7450ea9 8e55600d 67c99564 3129b8e1 69d5a885 09b8a534 21c66d74 449f9948
fc5c83e0 c3109d36 20e2a758 98aaa30a cf9cfb08 ba3682b3 d0a82d94 11f85003
34731fef 7dfe17d8 4dba31a7 1a6a027f 8d64b030 0b92dbb0 32bbbe1f b28f00c1
c4a54916 7f334169 6a7e7894 1e1eb7b9 f94f42c3 41d3a29c 53aa32e8 b323cb60
c9af3487 dcca9bde 1baf3559 76890f71 f2e69b12 7c111d4b 6dac1a05 cd6314d3
21221e3b d4c19cae cd7c285a 94e6b091 7b69f797 68af4edc b9fc4f31 78bf4163
9b48e930 3e64b51d 5cd4bfd9 fdfcbe45 d0b701a5 0c355bc6 076f3ae6 7b769911
94f1fcd4 2488fd7f 7748460f 1d0f4bc9 6be99fde 093d6f1e 3b0c952d 5383d552
1b7ba7fd 228207f0 c91c2367 31b30a4d 00f0ee8b ecb0e84f 318a55e6 27bd12ed
fff0a1f8 ca1405b8 04fd9bc8 ac106125 1a69a988 2a123fef cf5d7eb8 ba53dba2
91c1d600 c822fdc4 c15120ce ee36dee5 0d1c4429 c7f49de8 9f65d727 8098da2d
cd480ebf e52eda13 ad012ef8 2816108e cf93e240 f01db967 381c81e5 338480fb
991b2027 b4fe6b2e b6b70868 864c4a07 237a7763 01e09d8c ec2e659c 151a4c55
2f2cf3a1 07ed3d86 edd4e937 d815b5e3 0f8bd824 aaa856a2 4347ca43 a457a2be
3dd87202 b73ae12c 70a0bd29 a6df51d7 7b071066 a3af80be 83e1cda9 85b127c2
ikev2_msg_decrypt: integrity checksum length 16
54a8929d dd562669 086ebe95 9c8b1df7
ikev2_msg_decrypt: integrity check succeeded
54a8929d dd562669 086ebe95 9c8b1df7
ikev2_msg_decrypt: decrypted payload length 1728/1728 padding 11
25000021 03000000 696e6472 61406361 2e74656c 65636f6d 6c6f6262 792e636f
6d290004 42043082 04393082 0321a003 02010202 082fc4d9 c96de04c b3300d06
092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652 311a3018
06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014 06035504
070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54 656c6563
6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06 03550403
0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130 32303930
39353333 335a170d 32323032 30393039 35333333 5a30818a 310b3009 06035504
06130245 53311230 10060355 04080c09 43617461 6c756e79 61311b30 19060355
04070c12 73616e74 20506572 65206465 20526962 65733116 30140603 55040a0c
0d54656c 65636f6d 204c6f62 6279310d 300b0603 55040b0c 0456504e 43312330
21060355 04030c1a 52542d30 312e6361 742e7465 6c65636f 6d6c6f62 62792e63
6f6d3082 0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282
010100a3 db48a4b0 40b55682 81326f75 39065825 9ea9852b 6eeaa601 c4c692fa
80b16e5e bbcf8072 947ac073 f9b8e372 87cfbc6d 4002f200 d6daf70c 040b1a3f
1a8dfae5 3df72d9a d249803e a1a6b1dc 2f43a6f5 6b930198 a10b79e4 4acbf30f
68aa8f3e 7f06a0cb 17283584 502629de 0bc50868 75202485 56bab2fe d1c4ca7a
ee08c458 74618b80 d82d0fd8 f95e4444 b6d445b7 223e6529 459e672b be640500
3ddfec49 1e6192e6 6c0e57cf 937f3728 c29cb9c7 d9bce970 aa0370fb 7e19e3f7
150b2d2d 706c32e0 986d78bc 0b25eeff fe27707e 1bd36caa c844fafd 792795cb
8b919b40 d9906ed7 dccc1192 b1d18453 6d567b6b a9f5cbed b27899a5 cd7514c1
eaea1b02 03010001 a381a430 81a13013 0603551d 25040c30 0a06082b 06010505
07030230 1d060355 1d0e0416 0414d277 dc485c0f 9c282246 c877c363 d3883d07
ed9d301f 0603551d 23041830 1680142a c5939e9b 0361a9a9 b61eb388 3d40c58e
e44f5030 24060355 1d11041d 301b8119 696e6472 61406361 2e74656c 65636f6d
6c6f6262 792e636f 6d302406 09608648 0186f842 010d0417 16154765 6e657261
74656420 62792052 6f757465 724f5330 0d06092a 864886f7 0d01010b 05000382
01010056 c2f37bdf fba9a57a 17b5dcd9 062632b3 5bd7cd5e 0182b1e4 fb23bba8
8d2b0005 a406253c c28dea45 91ea8961 99b38e2b 30816fb9 3ad824f0 b9992412
dc584ec1 a3f52bc1 0a9a198f da49baf6 40d3ac5d 136095cd 7ed56814 3413d831
8e782e4c 4d1c1c82 e0ecb3ae 46254ee7 4f840f39 fcb19fde 7e5d94ad 05ac9caf
376ed1d5 e6bd774a 45cd4b20 26cc2e37 163c029c 33a41a2a 8f0f1ef8 f799327b
4c4265af ef9ab66c 11f73fcf 2d1724b7 acb365d9 7e922035 d1e7a807 f5020ce6
da69dc25 55824ce4 1c28e334 5583d13c f1a79f1e 248fe4ff dd32fa34 0d0e870d
a3654381 4118362c 99b00024 570a5104 3058d09a e9a66d6e 294a297e 805c506d
ce832b26 00000800 00400027 00005504 d240096d 782460df c9e68072 dc0bc444
6fab51ba d240096d 782460df c9e68072 dc0bc444 6fab51ba 3b6a7f0c 2f567b94
1954764f bfae24cd 40d9ea01 a467a75b d9f8d81b 482a9316 39c96dc0 98337349
2f000118 0e000000 0f300d06 092a8648 86f70d01 010b0500 71a25162 15fdcfdb
a41cd95f 479f455c 0a672e88 26c09274 32a82937 c6fdc8b2 ee4b45f0 2320509d
ae992a39 2ccbc568 28ca972b 57cb6b6b 73bbc1d6 11fa2eeb f4a9e4af 3a834f0d
16f9442a a9f241a5 3bc2ebb9 c9817533 c138e7c9 4ecdd9a5 ae2e771d 4ae9a5f3
8e34fb38 c55761a2 718b1489 df0cfedf 0f3acad3 a937f528 e04a65e0 ba7d2221
242fbe2e 32dae8f7 0dac46b0 4ac0971b aa4db8da 4c318e9d 6ccf600f 186eeaac
0bd2b238 e825396c 2f84219a a51ef78c c09cb366 37ddba31 538f814f 80eb4059
5d242e85 9e4c74a0 bd219e6f 2bf423a1 be2a7523 bfeb7768 d55a14dd 2aa9c1d3
de19fc52 6c546417 4d042a7f f0df7cb1 e93bbb48 213c382a 29000010 01000000
00010000 00030000 21000008 00004007 2c000064 00000060 01030409 cd21dd16
0300000c 0100000c 800e0080 0300000c 0100000c 800e00c0 0300000c 0100000c
800e0100 03000008 0300000c 03000008 0300000d 03000008 0300000e 03000008
03000002 03000008 03000005 00000008 05000000 2d000018 01000000 072f0010
0000ffff 00000000 ffffffff 29000018 01000000 072f0010 0000ffff 9b8af71b
9b8af71b 29000008 0000400c 29000018 0000400e 2a029003 00b70a85 105cb394
07f03ae0 29000008 00004021 00000008 00004024 bbe09fe6 cfef20a1 f1b1150b
ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 33
ikev2_pld_id: id UFQDN/-->HOSTNAME-ES<---@-->CA<--- length 29
ikev2_pld_payloads: decrypted payload CERT nextpayload NOTIFY critical 0x00 length 1090
ikev2_pld_cert: type X509_CERT length 1085
30820439 30820321 a0030201 0202082f c4d9c96d e04cb330 0d06092a 864886f7
0d01010b 05003081 86310b30 09060355 04061302 4652311a 30180603 5504080c
11536569 6e652d53 61696e74 2d44656e 69733116 30140603 5504070c 0d417562
65727669 6c6c6965 72733116 30140603 55040a0c 0d54656c 65636f6d 204c6f62
6279310d 300b0603 55040b0c 0456504e 43311c30 1a060355 04030c13 63612e74
656c6563 6f6d6c6f 6262792e 636f6d30 1e170d32 31303230 39303935 3333335a
170d3232 30323039 30393533 33335a30 818a310b 30090603 55040613 02455331
12301006 03550408 0c094361 74616c75 6e796131 1b301906 03550407 0c127361
6e742050 65726520 64652052 69626573 31163014 06035504 0a0c0d54 656c6563
6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 23302106 03550403
0c1a5254 2d30312e 6361742e 74656c65 636f6d6c 6f626279 2e636f6d 30820122
300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 02820101 00a3db48
a4b040b5 56828132 6f753906 58259ea9 852b6eea a601c4c6 92fa80b1 6e5ebbcf
8072947a c073f9b8 e37287cf bc6d4002 f200d6da f70c040b 1a3f1a8d fae53df7
2d9ad249 803ea1a6 b1dc2f43 a6f56b93 0198a10b 79e44acb f30f68aa 8f3e7f06
a0cb1728 35845026 29de0bc5 08687520 248556ba b2fed1c4 ca7aee08 c4587461
8b80d82d 0fd8f95e 4444b6d4 45b7223e 6529459e 672bbe64 05003ddf ec491e61
92e66c0e 57cf937f 3728c29c b9c7d9bc e970aa03 70fb7e19 e3f7150b 2d2d706c
32e0986d 78bc0b25 eefffe27 707e1bd3 6caac844 fafd7927 95cb8b91 9b40d990
6ed7dccc 1192b1d1 84536d56 7b6ba9f5 cbedb278 99a5cd75 14c1eaea 1b020301
0001a381 a43081a1 30130603 551d2504 0c300a06 082b0601 05050703 02301d06
03551d0e 04160414 d277dc48 5c0f9c28 2246c877 c363d388 3d07ed9d 301f0603
551d2304 18301680 142ac593 9e9b0361 a9a9b61e b3883d40 c58ee44f 50302406
03551d11 041d301b 8119696e 64726140 63612e74 656c6563 6f6d6c6f 6262792e
636f6d30 24060960 86480186 f842010d 04171615 47656e65 72617465 64206279
20526f75 7465724f 53300d06 092a8648 86f70d01 010b0500 03820101 0056c2f3
7bdffba9 a57a17b5 dcd90626 32b35bd7 cd5e0182 b1e4fb23 bba88d2b 0005a406
253cc28d ea4591ea 896199b3 8e2b3081 6fb93ad8 24f0b999 2412dc58 4ec1a3f5
2bc10a9a 198fda49 baf640d3 ac5d1360 95cd7ed5 68143413 d8318e78 2e4c4d1c
1c82e0ec b3ae4625 4ee74f84 0f39fcb1 9fde7e5d 94ad05ac 9caf376e d1d5e6bd
774a45cd 4b2026cc 2e37163c 029c33a4 1a2a8f0f 1ef8f799 327b4c42 65afef9a
b66c11f7 3fcf2d17 24b7acb3 65d97e92 2035d1e7 a807f502 0ce6da69 dc255582
4ce41c28 e3345583 d13cf1a7 9f1e248f e4ffdd32 fa340d0e 870da365 43814118
362c99b0 0024570a 51043058 d09ae9a6 6d6e294a 297e805c 506dce83 2b
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CERTREQ critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT
ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical 0x00 length 85
ikev2_pld_certreq: type X509_CERT length 80
d240096d 782460df c9e68072 dc0bc444 6fab51ba d240096d 782460df c9e68072
dc0bc444 6fab51ba 3b6a7f0c 2f567b94 1954764f bfae24cd 40d9ea01 a467a75b
d9f8d81b 482a9316 39c96dc0 98337349
ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 280
ikev2_pld_auth: method SIG length 272
0f300d06 092a8648 86f70d01 010b0500 71a25162 15fdcfdb a41cd95f 479f455c
0a672e88 26c09274 32a82937 c6fdc8b2 ee4b45f0 2320509d ae992a39 2ccbc568
28ca972b 57cb6b6b 73bbc1d6 11fa2eeb f4a9e4af 3a834f0d 16f9442a a9f241a5
3bc2ebb9 c9817533 c138e7c9 4ecdd9a5 ae2e771d 4ae9a5f3 8e34fb38 c55761a2
718b1489 df0cfedf 0f3acad3 a937f528 e04a65e0 ba7d2221 242fbe2e 32dae8f7
0dac46b0 4ac0971b aa4db8da 4c318e9d 6ccf600f 186eeaac 0bd2b238 e825396c
2f84219a a51ef78c c09cb366 37ddba31 538f814f 80eb4059 5d242e85 9e4c74a0
bd219e6f 2bf423a1 be2a7523 bfeb7768 d55a14dd 2aa9c1d3 de19fc52 6c546417
4d042a7f f0df7cb1 e93bbb48 213c382a
ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 length 16
ikev2_pld_cp: type REQUEST length 8
00010000 00030000
ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 100
ikev2_pld_sa: more 0 reserved 0 length 96 proposal #1 protoid ESP spisize 4 xforms 9 spi 0xcd21dd16
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_384_192
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_512_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id AES_XCBC_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->HOST-US<--- end -->HOST-US<---
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 24
ikev2_pld_notify: protoid NONE spisize 0 type ADDITIONAL_IP6_ADDRESS
2a029003 00b70a85 105cb394 07f03ae0
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type EAP_ONLY_AUTHENTICATION
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type IKEV2_MESSAGE_ID_SYNC_SUPPORTED
ikev2_handle_notifies: mobike enabled
sa_stateok: SA_INIT flags 0x0000, require 0x0000
spi=0xc870f2a5b428b6b1: sa_state: SA_INIT -> AUTH_REQUEST
policy_lookup: peerid '-->HOSTNAME-ES<---@-->CA<---'
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 256 <-> 256)
proposals_match: xform 1 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 4
policy_lookup: setting policy '-->HOST_ES<--'
ikev2_policy2id: srcid UFQDN/-->HOSTNAME-US<---@-->CA<--- length 33
sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_msg_auth: responder auth data length 343
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 21202220 00000000 00000117 22000030
0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 03000008
0300000c 00000008 04000013 28000048 00130000 2213a051 4f8b600e 0a6113ef
4f8843e9 dfa82f90 afc341ce 1d22f142 cc1c99a6 d1aafd33 fa14c441 f55bbe7d
ed87c6e0 7f53d608 68d9943e 8fa2bc83 05a734da 29000024 8ab04bee 544dc638
9aacd0c4 4d2fd141 ce030fa4 47db06b6 0e3b4e35 80fc8e00 2900001c 00004004
e7c537c7 188717a7 e9730252 796a3ed3 a42caf24 2600001c 00004005 6c1a6db7
e62f6a24 2a3d9f69 b3a85e82 d19ab215 29000019 04d24009 6d782460 dfc9e680
72dc0bc4 446fab51 ba000000 0e000040 2f000200 030004fb b057f939 f8991c61
47e3d5ef ab770eaa 42ca1c57 0af11ff8 af87db21 35edae0f 65e22c0f 7ba67ec5
f3b84c4f 45977277 cd60a97f d01d4298 cfd7c331 490e33
ca_setauth: switching SIG_ANY to SIG
ca_setauth: auth length 343
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 256)
proposals_match: xform 1 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
proposals_negotiate: score 4
proposals_negotiate: score 1: ENCR AES_CBC 256
proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
proposals_negotiate: score 2: ESN NONE
sa_stateflags: 0x0024 -> 0x0024 certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
config_free_proposals: free 0x5a9541fef80
ca_getreq: found CA /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN=-->CA<---
ca_x509_subjectaltname_do: did not find subjectAltName in certificate
ca_getreq: found local certificate /C=US/ST=Texas/L=Dallas/O=Telecom Lobby/OU=VPNC/CN=-->CERT-US<---
_dsa_sign_encode: signature scheme 0 selected
_dsa_sign_encode: signature scheme 0 selected
_dsa_sign_encode: signature scheme 0 selected
ca_setauth: auth length 272
ca_validate_pubkey: could not open public key pubkeys/ufqdn/-->HOSTNAME-ES<---@-->CA<---
ca_validate_cert: /C=ES/ST=Catalunya/L=sant Pere de Ribes/O=Telecom Lobby/OU=VPNC/CN=-->HOST_ES<-- ok
ikev2_getimsgdata: imsg 22 rspi 0xf2df80a5dd2f5b33 ispi 0xc870f2a5b428b6b1 initiator 0 sa valid type 4 data length 1065
ikev2_dispatch_cert: cert type X509_CERT length 1065, ok
sa_stateflags: 0x0024 -> 0x0025 cert,certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_getimsgdata: imsg 28 rspi 0xf2df80a5dd2f5b33 ispi 0xc870f2a5b428b6b1 initiator 0 sa valid type 14 data length 272
ikev2_dispatch_cert: AUTH type 14 len 272
sa_stateflags: 0x0025 -> 0x002d cert,certreq,auth,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_getimsgdata: imsg 23 rspi 0xf2df80a5dd2f5b33 ispi 0xc870f2a5b428b6b1 initiator 0 sa valid type 4 data length 1085
ikev2_msg_auth: initiator auth data length 1120
c870f2a5 b428b6b1 00000000 00000000 21202208 00000000 00000420 22000340
02000160 01010025 0300000c 0100000c 800e0080 0300000c 0100000c 800e00c0
0300000c 0100000c 800e0100 0300000c 01000017 800e0080 0300000c 01000017
800e00c0 0300000c 01000017 800e0100 0300000c 0100000d 800e0080 0300000c
0100000d 800e00c0 0300000c 0100000d 800e0100 0300000c 01000018 800e0080
0300000c 01000018 800e00c0 0300000c 01000018 800e0100 03000008 01000003
03000008 0300000c 03000008 0300000d 03000008 0300000e 03000008 03000002
03000008 03000005 03000008 03000008 03000008 02000005 03000008 02000006
03000008 02000007 03000008 02000004 03000008 02000008 03000008 02000002
03000008 04000013 03000008 04000014 03000008 04000015 03000008 0400001c
03000008 0400001d 03000008 0400001e 03000008 0400001f 03000008 0400000f
03000008 04000010 03000008 04000011 03000008 04000012 00000008 0400000e
000001dc 0201002d 0300000c 01000014 800e0080 0300000c 01000014 800e00c0
0300000c 01000014 800e0100 0300000c 01000010 800e0080 0300000c 01000010
800e00c0 0300000c 01000010 800e0100 0300000c 0100001b 800e0080 0300000c
0100001b 800e00c0 0300000c 0100001b 800e0100 0300000c 01000013 800e0080
0300000c 01000013 800e00c0 0300000c 01000013 800e0100 0300000c 01000012
800e0080 0300000c 01000012 800e00c0 0300000c 01000012 800e0100 0300000c
0100000e 800e0080 0300000c 0100000e 800e00c0 0300000c 0100000e 800e0100
0300000c 0100000f 800e0080 0300000c 0100000f 800e00c0 0300000c 0100000f
800e0100 0300000c 01000019 800e0080 0300000c 01000019 800e00c0 0300000c
01000019 800e0100 0300000c 0100001a 800e0080 0300000c 0100001a 800e00c0
0300000c 0100001a 800e0100 03000008 02000005 03000008 02000006 03000008
02000007 03000008 02000004 03000008 02000008 03000008 02000002 03000008
04000013 03000008 04000014 03000008 04000015 03000008 0400001c 03000008
0400001d 03000008 0400001e 03000008 0400001f 03000008 0400000f 03000008
04000010 03000008 04000011 03000008 04000012 00000008 0400000e 28000048
00130000 fb4e28c8 2dc256a8 01f96855 47b989b8 bfe51d02 98dfc830 9a1926c2
ce43da18 825173f8 868e8e93 a0e15479 6648f94d df9bfcff 265f2894 369fac99
1c5390d1 29000024 fbb057f9 39f8991c 6147e3d5 efab770e aa42ca1c 570af11f
f8af87db 2135edae 2900001c 00004004 5b9719db 93af37fd d1506d29 77b4314f
e99b3ba1 2900001c 00004005 26dbd4cc e1365f1a 20cc721b 776e76b4 d97f93c2
29000008 0000402e 29000010 0000402f 00020003 00040005 00000008 00004016
8ab04bee 544dc638 9aacd0c4 4d2fd141 ce030fa4 47db06b6 0e3b4e35 80fc8e00
403b497c 4a0d0e5f fe6ed31d a73a1254 d614ad46 17edb761 8297f711 a392cd2a
ikev2_msg_authverify: method SIG keylen 1085 type X509_CERT
_dsa_verify_init: signature scheme 0 selected
ikev2_msg_authverify: authentication successful
spi=0xc870f2a5b428b6b1: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_dispatch_cert: peer certificate is valid
sa_stateflags: 0x003d -> 0x003f cert,certvalid,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
spi=0xc870f2a5b428b6b1: sa_state: AUTH_SUCCESS -> VALID
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
ikev2_sa_tag: (0)
ikev2_childsa_negotiate: proposal 1
ikev2_childsa_negotiate: key material length 128
ikev2_prfplus: T1 with 32 bytes
83d5aea1 7b9d8e9d ed5dec4e 98014a68 6061640a 0cb3b8e1 08d434ec 73fda0e1
ikev2_prfplus: T2 with 32 bytes
ada9ecd8 8df6b3e8 70876ed7 c15ac445 c312e014 68d52b74 f34309a7 3c258859
ikev2_prfplus: T3 with 32 bytes
204947a0 28353211 2f785ea8 7630cf0b 5aca6258 d50b3ee6 cfa05415 2a0a74be
ikev2_prfplus: T4 with 32 bytes
e9dbc08b 1f79a9e3 7b1a1819 0aa5c10b fb473ff2 ae5b795b 4d77c92e 90b54df0
ikev2_prfplus: Tn with 128 bytes
83d5aea1 7b9d8e9d ed5dec4e 98014a68 6061640a 0cb3b8e1 08d434ec 73fda0e1
ada9ecd8 8df6b3e8 70876ed7 c15ac445 c312e014 68d52b74 f34309a7 3c258859
204947a0 28353211 2f785ea8 7630cf0b 5aca6258 d50b3ee6 cfa05415 2a0a74be
e9dbc08b 1f79a9e3 7b1a1819 0aa5c10b fb473ff2 ae5b795b 4d77c92e 90b54df0
pfkey_sa_getspi: spi 0x50e4e0d2
pfkey_sa_init: new spi 0x50e4e0d2
ikev2_next_payload: length 37 nextpayload CERT
ikev2_next_payload: length 1070 nextpayload AUTH
ikev2_next_payload: length 280 nextpayload CP
ikev2_next_payload: length 8 nextpayload NOTIFY
ikev2_add_notify: done
ikev2_next_payload: length 8 nextpayload NOTIFY
ikev2_add_notify: done
ikev2_next_payload: length 8 nextpayload SA
ikev2_add_proposals: length 40
ikev2_next_payload: length 44 nextpayload TSi
ikev2_next_payload: length 24 nextpayload TSr
ikev2_next_payload: length 24 nextpayload NONE
ikev2_next_payload: length 1540 nextpayload IDr
ikev2_msg_encrypt: decrypted length 1503
25000025 03000000 73617261 73776174 69406361 2e74656c 65636f6d 6c6f6262
792e636f 6d270004 2e043082 04253082 030da003 02010202 082d419f 457a3999
7e300d06 092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652
311a3018 06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014
06035504 070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54
656c6563 6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06
03550403 0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130
32313230 39313934 355a170d 32323032 31323039 31393435 5a307331 0b300906
03550406 13025553 310e300c 06035504 080c0554 65786173 310f300d 06035504
070c0644 616c6c61 73311630 14060355 040a0c0d 54656c65 636f6d20 4c6f6262
79310d30 0b060355 040b0c04 56504e43 311c301a 06035504 030c1375 732e7465
6c65636f 6d6c6f62 62792e63 6f6d3082 0122300d 06092a86 4886f70d 01010105
00038201 0f003082 010a0282 010100c7 84ffdbc6 ca9aab05 55975ce7 484c5f8b
5417aa70 0ac36cd1 e397ed2e e4eef84c 596f06c3 c5fa2144 26587d21 cefc5efc
87bda9d6 ab329460 9275ff9c 40792a2b 4873e34a 6c797f37 4c14f906 b9bf6a5b
fef940de 51b065be 749b0274 50bbc0e2 762254fa b93ae31d 51d15d6f 390cdd31
12cfea40 fea65853 323bf49a 99bbe29d e6dc6c42 a43889f7 d125f105 68c9a35c
afb594ef 78bc12e7 ac8186ac 32f2b242 b0931f67 b67c3509 108e50c8 57c14a6f
99adddbb 8ff09f38 c1344641 15cc086b 0a7f3656 c52914e9 284774ce 82aac909
39d5e327 b0cdbf3c 22f8644c ec88f1a1 e44be4ac 5dc761cb be9bd51b 5b757c1e
1eebc42a 00337ed0 c1f90476 f6447502 03010001 a381a830 81a53013 0603551d
25040c30 0a06082b 06010505 07030230 1d060355 1d0e0416 041403e0 e5527553
00f35eb7 ff71c90b cd94778d a6c4301f 0603551d 23041830 1680142a c5939e9b
0361a9a9 b61eb388 3d40c58e e44f5030 28060355 1d110421 301f811d 73617261
73776174 69406361 2e74656c 65636f6d 6c6f6262 792e636f 6d302406 09608648
0186f842 010d0417 16154765 6e657261 74656420 62792052 6f757465 724f5330
0d06092a 864886f7 0d01010b 05000382 01010028 d73860f9 b6fe28fc e31f9381
6f2e3957 0762ef66 5d53ae0d 1c248650 83c845d7 4f3166a9 199a034d b37d826e
06c893f2 97848d79 3c2cb200 fb35ecfd 38dffe92 6862680a 61453918 2c17b83a
7b118f89 550aab8f ce59d05a 1aa2182c 5aa39c9a a04e88a5 0faac7cf aab46b51
e223be57 c3bbaa72 7546c67b b30062c4 db14e86c 058ad002 13e38ee4 d586b2bc
9d640bc4 21d6ec33 cbc3a066 df6bcb65 a5df7292 12a519e1 71784460 0b99a4e0
0234a29e 245440f2 1cfb1128 2b680441 a12e3da2 3ee16467 b6f1ede2 0e2259ae
0235c1f0 feb64808 4db676d5 3cbf1451 214948d2 99288835 9c46d2b0 e98b0fac
ca745b4a 3882e778 2f85e8eb 8fc5e406 736b8a2f 0001180e 0000000f 300d0609
2a864886 f70d0101 0b050048 38dd0031 679b58e6 3198f12b 36790423 7c44ad15
55062882 53eb88f0 98f81065 60f1cb6d 3e5b19a3 77c526c7 70a37722 29f59bf0
827ce545 6869bf34 fd54e8da 1d6e0d4a c7ab5ca1 d35fc212 b29e10c1 67da905f
62ccc153 a311ec70 06d76408 1dac7f9c 17146925 3af25e99 a50f834f 04dc7234
841be95e 86df2d9c 2caefb11 3e93a20a 8d270359 52b871a5 8ab383a8 0063a6e2
c800be60 dee87f89 692209e2 a3cea439 a82224af e96617ed 88a4e8c8 1dce4521
aa8e6033 36c0e628 aad05fb9 79beba3b abf0451d 5ee45b43 2316de10 389d9c2d
15d9284a c3ddd1b6 ced8d74e 6d860332 57162dda 6434342f 04284f3a 6c6bc5c6
b4d8b4c3 deb06260 911d4429 00000802 00000029 00000800 00400721 00000800
00400c2c 00002c00 00002801 03040350 e4e0d203 00000c01 00000c80 0e010003
00000803 00000c00 00000805 0000002d 00001801 00000007 2f001000 00ffff51
2c202f51 2c202f00 00001801 00000007 2f001000 00ffff9b 8af71b9b 8af71b
ikev2_msg_encrypt: padded length 1504
25000025 03000000 73617261 73776174 69406361 2e74656c 65636f6d 6c6f6262
792e636f 6d270004 2e043082 04253082 030da003 02010202 082d419f 457a3999
7e300d06 092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652
311a3018 06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014
06035504 070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54
656c6563 6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06
03550403 0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130
32313230 39313934 355a170d 32323032 31323039 31393435 5a307331 0b300906
03550406 13025553 310e300c 06035504 080c0554 65786173 310f300d 06035504
070c0644 616c6c61 73311630 14060355 040a0c0d 54656c65 636f6d20 4c6f6262
79310d30 0b060355 040b0c04 56504e43 311c301a 06035504 030c1375 732e7465
6c65636f 6d6c6f62 62792e63 6f6d3082 0122300d 06092a86 4886f70d 01010105
00038201 0f003082 010a0282 010100c7 84ffdbc6 ca9aab05 55975ce7 484c5f8b
5417aa70 0ac36cd1 e397ed2e e4eef84c 596f06c3 c5fa2144 26587d21 cefc5efc
87bda9d6 ab329460 9275ff9c 40792a2b 4873e34a 6c797f37 4c14f906 b9bf6a5b
fef940de 51b065be 749b0274 50bbc0e2 762254fa b93ae31d 51d15d6f 390cdd31
12cfea40 fea65853 323bf49a 99bbe29d e6dc6c42 a43889f7 d125f105 68c9a35c
afb594ef 78bc12e7 ac8186ac 32f2b242 b0931f67 b67c3509 108e50c8 57c14a6f
99adddbb 8ff09f38 c1344641 15cc086b 0a7f3656 c52914e9 284774ce 82aac909
39d5e327 b0cdbf3c 22f8644c ec88f1a1 e44be4ac 5dc761cb be9bd51b 5b757c1e
1eebc42a 00337ed0 c1f90476 f6447502 03010001 a381a830 81a53013 0603551d
25040c30 0a06082b 06010505 07030230 1d060355 1d0e0416 041403e0 e5527553
00f35eb7 ff71c90b cd94778d a6c4301f 0603551d 23041830 1680142a c5939e9b
0361a9a9 b61eb388 3d40c58e e44f5030 28060355 1d110421 301f811d 73617261
73776174 69406361 2e74656c 65636f6d 6c6f6262 792e636f 6d302406 09608648
0186f842 010d0417 16154765 6e657261 74656420 62792052 6f757465 724f5330
0d06092a 864886f7 0d01010b 05000382 01010028 d73860f9 b6fe28fc e31f9381
6f2e3957 0762ef66 5d53ae0d 1c248650 83c845d7 4f3166a9 199a034d b37d826e
06c893f2 97848d79 3c2cb200 fb35ecfd 38dffe92 6862680a 61453918 2c17b83a
7b118f89 550aab8f ce59d05a 1aa2182c 5aa39c9a a04e88a5 0faac7cf aab46b51
e223be57 c3bbaa72 7546c67b b30062c4 db14e86c 058ad002 13e38ee4 d586b2bc
9d640bc4 21d6ec33 cbc3a066 df6bcb65 a5df7292 12a519e1 71784460 0b99a4e0
0234a29e 245440f2 1cfb1128 2b680441 a12e3da2 3ee16467 b6f1ede2 0e2259ae
0235c1f0 feb64808 4db676d5 3cbf1451 214948d2 99288835 9c46d2b0 e98b0fac
ca745b4a 3882e778 2f85e8eb 8fc5e406 736b8a2f 0001180e 0000000f 300d0609
2a864886 f70d0101 0b050048 38dd0031 679b58e6 3198f12b 36790423 7c44ad15
55062882 53eb88f0 98f81065 60f1cb6d 3e5b19a3 77c526c7 70a37722 29f59bf0
827ce545 6869bf34 fd54e8da 1d6e0d4a c7ab5ca1 d35fc212 b29e10c1 67da905f
62ccc153 a311ec70 06d76408 1dac7f9c 17146925 3af25e99 a50f834f 04dc7234
841be95e 86df2d9c 2caefb11 3e93a20a 8d270359 52b871a5 8ab383a8 0063a6e2
c800be60 dee87f89 692209e2 a3cea439 a82224af e96617ed 88a4e8c8 1dce4521
aa8e6033 36c0e628 aad05fb9 79beba3b abf0451d 5ee45b43 2316de10 389d9c2d
15d9284a c3ddd1b6 ced8d74e 6d860332 57162dda 6434342f 04284f3a 6c6bc5c6
b4d8b4c3 deb06260 911d4429 00000802 00000029 00000800 00400721 00000800
00400c2c 00002c00 00002801 03040350 e4e0d203 00000c01 00000c80 0e010003
00000803 00000c00 00000805 0000002d 00001801 00000007 2f001000 00ffff51
2c202f51 2c202f00 00001801 00000007 2f001000 00ffff9b 8af71b9b 8af71b00
ikev2_msg_encrypt: length 1504, padding 0, output length 1536
7ff1a8ea afd7c75d 04856811 3cb768e0 a5beb593 6f4e064c f5b4d246 2e420a00
40726193 cd22693a a16e690d 0c618a56 95ec3190 94ad4094 861c1d8e 0c6cd80e
30012f5a 54e5726e b90af238 fc89de8f fa49211b d537b00a c74d2b76 eab44858
64556ac2 49ac3aed 1fedf547 293034d9 5720e4b6 e0ec3a0a dd079e87 e57ea852
915faed2 f08769ae abeba225 cab58ae1 f37db0e9 26799545 1c567644 56cfa02a
4fe566f0 25d3dfd1 bb4284a8 c8d664ee bc2480fd 07a55302 bc5c7f00 50649002
ef3387c9 f9f9117f b20b1876 549668ea 682276c9 e22a07c7 15457a8b 4d201e28
1618553c b66101eb 372f082f 8a32014a 60058d8d e62503d0 4d04312b 2d91be1d
64a9299f 761b168b 32f21339 0ca59c66 552cdd40 09c7819c 9d3f0fea 37cd0145
97264fdd 91511f67 56f5e4e1 574a7651 877a934f ab732db4 c57f8110 86258a5c
83ca131c 250e4af0 4f37070d 80e052af c7f229ff 43fcfd86 b7dcf4ed a481a90a
f2b7b6b3 cd0f4e45 6ba21aa5 838786d2 e82f723a e5a7b741 e99fb521 880a39da
860e05cc 7f3a133d 6c6e2813 41b6d6f9 7082eee0 073a630b b07e35c3 8aa11708
4b3e0adb d274c12f 35a53783 a8bd0afb 8abb9a58 bee67d71 4394259a 23f37076
120bef82 17144995 edc21c7f 628fe780 c951c173 02091175 bf6f5158 9fc29465
9d019736 c0ecfc64 7a6ba117 0c1fcad6 84316d93 c57b61cf 88ef136d 652f5c88
140ad285 6cf20c40 ca4534b3 dd9b1711 bd68cf01 a1e35205 c027e56b bbd9ac26
5a243cce 764b6138 84b6fa34 8a8731c7 61a613ba ad6f31b4 b085e7be 6e574c6d
748801cd 7906e85c 8a66329d 8948e688 93fef048 19968212 a895b4e7 241f21f5
6b28fc07 0277e1f6 92b35cc9 70f818d9 10fcd24f b20623e5 2e9fe64b 185ee1c9
44d6f7f6 b6acabf6 3348548a c891bdb9 98413b90 9ebbeb3d 816ee802 34a21900
f99e273c a61aa967 71fbebd1 a1570046 56eb4f74 edb8f879 7735d5cf 765f4f30
1e0dbf65 11257b7a 40e221a0 562a0151 92a2c1ae 141ea28c d0f06549 b2f3ef4f
84476513 7bcc2254 72fdffb2 cce1568a 95c3f994 3dcd5740 b25b7d2c f1b57223
e0a65192 8eec875d d613ddd8 b3a1ff8f f408c0a5 21a30d0f daf956e1 f2d257e7
e3643d9f 03562e92 d1769f9c b6d3ee0e 60454033 a79f88d9 8be80e9d 78229616
2cbea059 44921f7b f5728a9c 0b615e5f 51113d61 53003714 eaadacef e5b9ac3f
ee48908f c8893ef1 dee7de2f b58739df d368ce61 7deac339 4965e9bc 58cd1fa3
865b3bd3 453f3095 23db7b24 929112c2 ecd999fa 0516f5aa 67daaace 66fec9c8
76cae89c ed4ca2e6 3c5a61d4 42b77dc7 5fda3326 7c32a825 b90af1f3 8df3d7d2
479decd6 ed07435e 69d9da1f c655f1a9 418b03c3 05f8727c c28910dd b0ca62f6
f83c1ccc 04a805a0 389b4162 1da56acb e6be9e6e b644cd7b 8d8422da 6dd4a0cb
ecca809b da4f2cf4 fd96a5d2 1e15c189 8e7f4e32 32ee1d47 0f0e4fbc dc7ec75c
bcbdb974 f7979bef 4efdab1f 6d66ce5a caa03313 fd4ca295 6ec64370 5469f8de
978295a2 a7b83cd3 2ae7965a 938ac9ba f2969e5b 2870d1b5 c7c9744f 577f9163
c38c57cd feac3244 cde6c706 4a900738 a702df1e 918264bf 76117e2c 45c78dcb
51a392c5 ebbf040c c9c19aaf 92684f2c 3e6d2ed5 6867e356 76946ab7 51b93841
3a04b3bc 283ca2ba b0b6dcdc c1e4ff71 4237f650 bbf0ebe5 1e74bebe 6fcb9ef2
08519453 c798b5ae 6fbb4ec0 8a36066f dcf7586c 683aecb5 28fc5379 12dc1a56
1fe57b65 70a86bd9 19a040cc acd3dc6b e55c284e 4686d410 764247ea 83f5606a
ac623293 6c4307fd e7e3efd6 a806ac4a 215212d4 1471efef 784b7a0b 0e755b38
11287e0a 3df8ebc4 be05ec3f c3f7206c 25c54b8b efb88b5c fd4b35e1 3f5f281b
4031af96 056554e0 817a25db e8d7912b ae378659 65bc1fd0 9b870474 78f4f0cc
f0d1ea91 f944eb6c 66744a93 d35c55d5 fba3b74b 0399b35f d8118c91 eb96472e
4df4eef9 c99075f6 36c1528f 19328de6 de8503c1 1f86f34e 41e2ad1b cf8eb068
385277f2 1027f1c3 710907c4 38253d83 10e77343 6f60b54f accc7dc9 db7ed987
6ab58ee3 a35f4e29 b963fbc2 a5eaa5a7 b6923406 572c0fbe 5ae353ab 94d91d67
c21c1be8 6bc6d845 e764e413 e3926306 00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 1568
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 2e202320 00000001 00000620 24000604
7ff1a8ea afd7c75d 04856811 3cb768e0 a5beb593 6f4e064c f5b4d246 2e420a00
40726193 cd22693a a16e690d 0c618a56 95ec3190 94ad4094 861c1d8e 0c6cd80e
30012f5a 54e5726e b90af238 fc89de8f fa49211b d537b00a c74d2b76 eab44858
64556ac2 49ac3aed 1fedf547 293034d9 5720e4b6 e0ec3a0a dd079e87 e57ea852
915faed2 f08769ae abeba225 cab58ae1 f37db0e9 26799545 1c567644 56cfa02a
4fe566f0 25d3dfd1 bb4284a8 c8d664ee bc2480fd 07a55302 bc5c7f00 50649002
ef3387c9 f9f9117f b20b1876 549668ea 682276c9 e22a07c7 15457a8b 4d201e28
1618553c b66101eb 372f082f 8a32014a 60058d8d e62503d0 4d04312b 2d91be1d
64a9299f 761b168b 32f21339 0ca59c66 552cdd40 09c7819c 9d3f0fea 37cd0145
97264fdd 91511f67 56f5e4e1 574a7651 877a934f ab732db4 c57f8110 86258a5c
83ca131c 250e4af0 4f37070d 80e052af c7f229ff 43fcfd86 b7dcf4ed a481a90a
f2b7b6b3 cd0f4e45 6ba21aa5 838786d2 e82f723a e5a7b741 e99fb521 880a39da
860e05cc 7f3a133d 6c6e2813 41b6d6f9 7082eee0 073a630b b07e35c3 8aa11708
4b3e0adb d274c12f 35a53783 a8bd0afb 8abb9a58 bee67d71 4394259a 23f37076
120bef82 17144995 edc21c7f 628fe780 c951c173 02091175 bf6f5158 9fc29465
9d019736 c0ecfc64 7a6ba117 0c1fcad6 84316d93 c57b61cf 88ef136d 652f5c88
140ad285 6cf20c40 ca4534b3 dd9b1711 bd68cf01 a1e35205 c027e56b bbd9ac26
5a243cce 764b6138 84b6fa34 8a8731c7 61a613ba ad6f31b4 b085e7be 6e574c6d
748801cd 7906e85c 8a66329d 8948e688 93fef048 19968212 a895b4e7 241f21f5
6b28fc07 0277e1f6 92b35cc9 70f818d9 10fcd24f b20623e5 2e9fe64b 185ee1c9
44d6f7f6 b6acabf6 3348548a c891bdb9 98413b90 9ebbeb3d 816ee802 34a21900
f99e273c a61aa967 71fbebd1 a1570046 56eb4f74 edb8f879 7735d5cf 765f4f30
1e0dbf65 11257b7a 40e221a0 562a0151 92a2c1ae 141ea28c d0f06549 b2f3ef4f
84476513 7bcc2254 72fdffb2 cce1568a 95c3f994 3dcd5740 b25b7d2c f1b57223
e0a65192 8eec875d d613ddd8 b3a1ff8f f408c0a5 21a30d0f daf956e1 f2d257e7
e3643d9f 03562e92 d1769f9c b6d3ee0e 60454033 a79f88d9 8be80e9d 78229616
2cbea059 44921f7b f5728a9c 0b615e5f 51113d61 53003714 eaadacef e5b9ac3f
ee48908f c8893ef1 dee7de2f b58739df d368ce61 7deac339 4965e9bc 58cd1fa3
865b3bd3 453f3095 23db7b24 929112c2 ecd999fa 0516f5aa 67daaace 66fec9c8
76cae89c ed4ca2e6 3c5a61d4 42b77dc7 5fda3326 7c32a825 b90af1f3 8df3d7d2
479decd6 ed07435e 69d9da1f c655f1a9 418b03c3 05f8727c c28910dd b0ca62f6
f83c1ccc 04a805a0 389b4162 1da56acb e6be9e6e b644cd7b 8d8422da 6dd4a0cb
ecca809b da4f2cf4 fd96a5d2 1e15c189 8e7f4e32 32ee1d47 0f0e4fbc dc7ec75c
bcbdb974 f7979bef 4efdab1f 6d66ce5a caa03313 fd4ca295 6ec64370 5469f8de
978295a2 a7b83cd3 2ae7965a 938ac9ba f2969e5b 2870d1b5 c7c9744f 577f9163
c38c57cd feac3244 cde6c706 4a900738 a702df1e 918264bf 76117e2c 45c78dcb
51a392c5 ebbf040c c9c19aaf 92684f2c 3e6d2ed5 6867e356 76946ab7 51b93841
3a04b3bc 283ca2ba b0b6dcdc c1e4ff71 4237f650 bbf0ebe5 1e74bebe 6fcb9ef2
08519453 c798b5ae 6fbb4ec0 8a36066f dcf7586c 683aecb5 28fc5379 12dc1a56
1fe57b65 70a86bd9 19a040cc acd3dc6b e55c284e 4686d410 764247ea 83f5606a
ac623293 6c4307fd e7e3efd6 a806ac4a 215212d4 1471efef 784b7a0b 0e755b38
11287e0a 3df8ebc4 be05ec3f c3f7206c 25c54b8b efb88b5c fd4b35e1 3f5f281b
4031af96 056554e0 817a25db e8d7912b ae378659 65bc1fd0 9b870474 78f4f0cc
f0d1ea91 f944eb6c 66744a93 d35c55d5 fba3b74b 0399b35f d8118c91 eb96472e
4df4eef9 c99075f6 36c1528f 19328de6 de8503c1 1f86f34e 41e2ad1b cf8eb068
385277f2 1027f1c3 710907c4 38253d83 10e77343 6f60b54f accc7dc9 db7ed987
6ab58ee3 a35f4e29 b963fbc2 a5eaa5a7 b6923406 572c0fbe 5ae353ab 94d91d67
c21c1be8 6bc6d845 e764e413 e3926306 00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
30e79f7f ab81894a 42cb568b 642b8af6 761d35fa 65c0d308 c6e3fff7 81c202b7
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1568 response 1
ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1540
ikev2_msg_decrypt: IV length 16
7ff1a8ea afd7c75d 04856811 3cb768e0
ikev2_msg_decrypt: encrypted payload length 1504
a5beb593 6f4e064c f5b4d246 2e420a00 40726193 cd22693a a16e690d 0c618a56
95ec3190 94ad4094 861c1d8e 0c6cd80e 30012f5a 54e5726e b90af238 fc89de8f
fa49211b d537b00a c74d2b76 eab44858 64556ac2 49ac3aed 1fedf547 293034d9
5720e4b6 e0ec3a0a dd079e87 e57ea852 915faed2 f08769ae abeba225 cab58ae1
f37db0e9 26799545 1c567644 56cfa02a 4fe566f0 25d3dfd1 bb4284a8 c8d664ee
bc2480fd 07a55302 bc5c7f00 50649002 ef3387c9 f9f9117f b20b1876 549668ea
682276c9 e22a07c7 15457a8b 4d201e28 1618553c b66101eb 372f082f 8a32014a
60058d8d e62503d0 4d04312b 2d91be1d 64a9299f 761b168b 32f21339 0ca59c66
552cdd40 09c7819c 9d3f0fea 37cd0145 97264fdd 91511f67 56f5e4e1 574a7651
877a934f ab732db4 c57f8110 86258a5c 83ca131c 250e4af0 4f37070d 80e052af
c7f229ff 43fcfd86 b7dcf4ed a481a90a f2b7b6b3 cd0f4e45 6ba21aa5 838786d2
e82f723a e5a7b741 e99fb521 880a39da 860e05cc 7f3a133d 6c6e2813 41b6d6f9
7082eee0 073a630b b07e35c3 8aa11708 4b3e0adb d274c12f 35a53783 a8bd0afb
8abb9a58 bee67d71 4394259a 23f37076 120bef82 17144995 edc21c7f 628fe780
c951c173 02091175 bf6f5158 9fc29465 9d019736 c0ecfc64 7a6ba117 0c1fcad6
84316d93 c57b61cf 88ef136d 652f5c88 140ad285 6cf20c40 ca4534b3 dd9b1711
bd68cf01 a1e35205 c027e56b bbd9ac26 5a243cce 764b6138 84b6fa34 8a8731c7
61a613ba ad6f31b4 b085e7be 6e574c6d 748801cd 7906e85c 8a66329d 8948e688
93fef048 19968212 a895b4e7 241f21f5 6b28fc07 0277e1f6 92b35cc9 70f818d9
10fcd24f b20623e5 2e9fe64b 185ee1c9 44d6f7f6 b6acabf6 3348548a c891bdb9
98413b90 9ebbeb3d 816ee802 34a21900 f99e273c a61aa967 71fbebd1 a1570046
56eb4f74 edb8f879 7735d5cf 765f4f30 1e0dbf65 11257b7a 40e221a0 562a0151
92a2c1ae 141ea28c d0f06549 b2f3ef4f 84476513 7bcc2254 72fdffb2 cce1568a
95c3f994 3dcd5740 b25b7d2c f1b57223 e0a65192 8eec875d d613ddd8 b3a1ff8f
f408c0a5 21a30d0f daf956e1 f2d257e7 e3643d9f 03562e92 d1769f9c b6d3ee0e
60454033 a79f88d9 8be80e9d 78229616 2cbea059 44921f7b f5728a9c 0b615e5f
51113d61 53003714 eaadacef e5b9ac3f ee48908f c8893ef1 dee7de2f b58739df
d368ce61 7deac339 4965e9bc 58cd1fa3 865b3bd3 453f3095 23db7b24 929112c2
ecd999fa 0516f5aa 67daaace 66fec9c8 76cae89c ed4ca2e6 3c5a61d4 42b77dc7
5fda3326 7c32a825 b90af1f3 8df3d7d2 479decd6 ed07435e 69d9da1f c655f1a9
418b03c3 05f8727c c28910dd b0ca62f6 f83c1ccc 04a805a0 389b4162 1da56acb
e6be9e6e b644cd7b 8d8422da 6dd4a0cb ecca809b da4f2cf4 fd96a5d2 1e15c189
8e7f4e32 32ee1d47 0f0e4fbc dc7ec75c bcbdb974 f7979bef 4efdab1f 6d66ce5a
caa03313 fd4ca295 6ec64370 5469f8de 978295a2 a7b83cd3 2ae7965a 938ac9ba
f2969e5b 2870d1b5 c7c9744f 577f9163 c38c57cd feac3244 cde6c706 4a900738
a702df1e 918264bf 76117e2c 45c78dcb 51a392c5 ebbf040c c9c19aaf 92684f2c
3e6d2ed5 6867e356 76946ab7 51b93841 3a04b3bc 283ca2ba b0b6dcdc c1e4ff71
4237f650 bbf0ebe5 1e74bebe 6fcb9ef2 08519453 c798b5ae 6fbb4ec0 8a36066f
dcf7586c 683aecb5 28fc5379 12dc1a56 1fe57b65 70a86bd9 19a040cc acd3dc6b
e55c284e 4686d410 764247ea 83f5606a ac623293 6c4307fd e7e3efd6 a806ac4a
215212d4 1471efef 784b7a0b 0e755b38 11287e0a 3df8ebc4 be05ec3f c3f7206c
25c54b8b efb88b5c fd4b35e1 3f5f281b 4031af96 056554e0 817a25db e8d7912b
ae378659 65bc1fd0 9b870474 78f4f0cc f0d1ea91 f944eb6c 66744a93 d35c55d5
fba3b74b 0399b35f d8118c91 eb96472e 4df4eef9 c99075f6 36c1528f 19328de6
de8503c1 1f86f34e 41e2ad1b cf8eb068 385277f2 1027f1c3 710907c4 38253d83
10e77343 6f60b54f accc7dc9 db7ed987 6ab58ee3 a35f4e29 b963fbc2 a5eaa5a7
b6923406 572c0fbe 5ae353ab 94d91d67 c21c1be8 6bc6d845 e764e413 e3926306
ikev2_msg_decrypt: integrity checksum length 16
30e79f7f ab81894a 42cb568b 642b8af6
ikev2_msg_decrypt: integrity check succeeded
30e79f7f ab81894a 42cb568b 642b8af6
ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 0
25000025 03000000 73617261 73776174 69406361 2e74656c 65636f6d 6c6f6262
792e636f 6d270004 2e043082 04253082 030da003 02010202 082d419f 457a3999
7e300d06 092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652
311a3018 06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014
06035504 070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54
656c6563 6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06
03550403 0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130
32313230 39313934 355a170d 32323032 31323039 31393435 5a307331 0b300906
03550406 13025553 310e300c 06035504 080c0554 65786173 310f300d 06035504
070c0644 616c6c61 73311630 14060355 040a0c0d 54656c65 636f6d20 4c6f6262
79310d30 0b060355 040b0c04 56504e43 311c301a 06035504 030c1375 732e7465
6c65636f 6d6c6f62 62792e63 6f6d3082 0122300d 06092a86 4886f70d 01010105
00038201 0f003082 010a0282 010100c7 84ffdbc6 ca9aab05 55975ce7 484c5f8b
5417aa70 0ac36cd1 e397ed2e e4eef84c 596f06c3 c5fa2144 26587d21 cefc5efc
87bda9d6 ab329460 9275ff9c 40792a2b 4873e34a 6c797f37 4c14f906 b9bf6a5b
fef940de 51b065be 749b0274 50bbc0e2 762254fa b93ae31d 51d15d6f 390cdd31
12cfea40 fea65853 323bf49a 99bbe29d e6dc6c42 a43889f7 d125f105 68c9a35c
afb594ef 78bc12e7 ac8186ac 32f2b242 b0931f67 b67c3509 108e50c8 57c14a6f
99adddbb 8ff09f38 c1344641 15cc086b 0a7f3656 c52914e9 284774ce 82aac909
39d5e327 b0cdbf3c 22f8644c ec88f1a1 e44be4ac 5dc761cb be9bd51b 5b757c1e
1eebc42a 00337ed0 c1f90476 f6447502 03010001 a381a830 81a53013 0603551d
25040c30 0a06082b 06010505 07030230 1d060355 1d0e0416 041403e0 e5527553
00f35eb7 ff71c90b cd94778d a6c4301f 0603551d 23041830 1680142a c5939e9b
0361a9a9 b61eb388 3d40c58e e44f5030 28060355 1d110421 301f811d 73617261
73776174 69406361 2e74656c 65636f6d 6c6f6262 792e636f 6d302406 09608648
0186f842 010d0417 16154765 6e657261 74656420 62792052 6f757465 724f5330
0d06092a 864886f7 0d01010b 05000382 01010028 d73860f9 b6fe28fc e31f9381
6f2e3957 0762ef66 5d53ae0d 1c248650 83c845d7 4f3166a9 199a034d b37d826e
06c893f2 97848d79 3c2cb200 fb35ecfd 38dffe92 6862680a 61453918 2c17b83a
7b118f89 550aab8f ce59d05a 1aa2182c 5aa39c9a a04e88a5 0faac7cf aab46b51
e223be57 c3bbaa72 7546c67b b30062c4 db14e86c 058ad002 13e38ee4 d586b2bc
9d640bc4 21d6ec33 cbc3a066 df6bcb65 a5df7292 12a519e1 71784460 0b99a4e0
0234a29e 245440f2 1cfb1128 2b680441 a12e3da2 3ee16467 b6f1ede2 0e2259ae
0235c1f0 feb64808 4db676d5 3cbf1451 214948d2 99288835 9c46d2b0 e98b0fac
ca745b4a 3882e778 2f85e8eb 8fc5e406 736b8a2f 0001180e 0000000f 300d0609
2a864886 f70d0101 0b050048 38dd0031 679b58e6 3198f12b 36790423 7c44ad15
55062882 53eb88f0 98f81065 60f1cb6d 3e5b19a3 77c526c7 70a37722 29f59bf0
827ce545 6869bf34 fd54e8da 1d6e0d4a c7ab5ca1 d35fc212 b29e10c1 67da905f
62ccc153 a311ec70 06d76408 1dac7f9c 17146925 3af25e99 a50f834f 04dc7234
841be95e 86df2d9c 2caefb11 3e93a20a 8d270359 52b871a5 8ab383a8 0063a6e2
c800be60 dee87f89 692209e2 a3cea439 a82224af e96617ed 88a4e8c8 1dce4521
aa8e6033 36c0e628 aad05fb9 79beba3b abf0451d 5ee45b43 2316de10 389d9c2d
15d9284a c3ddd1b6 ced8d74e 6d860332 57162dda 6434342f 04284f3a 6c6bc5c6
b4d8b4c3 deb06260 911d4429 00000802 00000029 00000800 00400721 00000800
00400c2c 00002c00 00002801 03040350 e4e0d203 00000c01 00000c80 0e010003
00000803 00000c00 00000805 0000002d 00001801 00000007 2f001000 00ffff51
2c202f51 2c202f00 00001801 00000007 2f001000 00ffff9b 8af71b9b 8af71b00
ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 37
ikev2_pld_id: id UFQDN/-->HOSTNAME-US<---@-->CA<--- length 33
ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 length 1070
ikev2_pld_cert: type X509_CERT length 1065
30820425 3082030d a0030201 0202082d 419f457a 39997e30 0d06092a 864886f7
0d01010b 05003081 86310b30 09060355 04061302 4652311a 30180603 5504080c
11536569 6e652d53 61696e74 2d44656e 69733116 30140603 5504070c 0d417562
65727669 6c6c6965 72733116 30140603 55040a0c 0d54656c 65636f6d 204c6f62
6279310d 300b0603 55040b0c 0456504e 43311c30 1a060355 04030c13 63612e74
656c6563 6f6d6c6f 6262792e 636f6d30 1e170d32 31303231 32303931 3934355a
170d3232 30323132 30393139 34355a30 73310b30 09060355 04061302 5553310e
300c0603 5504080c 05546578 6173310f 300d0603 5504070c 0644616c 6c617331
16301406 0355040a 0c0d5465 6c65636f 6d204c6f 62627931 0d300b06 0355040b
0c045650 4e43311c 301a0603 5504030c 1375732e 74656c65 636f6d6c 6f626279
2e636f6d 30820122 300d0609 2a864886 f70d0101 01050003 82010f00 3082010a
02820101 00c784ff dbc6ca9a ab055597 5ce7484c 5f8b5417 aa700ac3 6cd1e397
ed2ee4ee f84c596f 06c3c5fa 21442658 7d21cefc 5efc87bd a9d6ab32 94609275
ff9c4079 2a2b4873 e34a6c79 7f374c14 f906b9bf 6a5bfef9 40de51b0 65be749b
027450bb c0e27622 54fab93a e31d51d1 5d6f390c dd3112cf ea40fea6 5853323b
f49a99bb e29de6dc 6c42a438 89f7d125 f10568c9 a35cafb5 94ef78bc 12e7ac81
86ac32f2 b242b093 1f67b67c 3509108e 50c857c1 4a6f99ad ddbb8ff0 9f38c134
464115cc 086b0a7f 3656c529 14e92847 74ce82aa c90939d5 e327b0cd bf3c22f8
644cec88 f1a1e44b e4ac5dc7 61cbbe9b d51b5b75 7c1e1eeb c42a0033 7ed0c1f9
0476f644 75020301 0001a381 a83081a5 30130603 551d2504 0c300a06 082b0601
05050703 02301d06 03551d0e 04160414 03e0e552 755300f3 5eb7ff71 c90bcd94
778da6c4 301f0603 551d2304 18301680 142ac593 9e9b0361 a9a9b61e b3883d40
c58ee44f 50302806 03551d11 0421301f 811d7361 72617377 61746940 63612e74
656c6563 6f6d6c6f 6262792e 636f6d30 24060960 86480186 f842010d 04171615
47656e65 72617465 64206279 20526f75 7465724f 53300d06 092a8648 86f70d01
010b0500 03820101 0028d738 60f9b6fe 28fce31f 93816f2e 39570762 ef665d53
ae0d1c24 865083c8 45d74f31 66a9199a 034db37d 826e06c8 93f29784 8d793c2c
b200fb35 ecfd38df fe926862 680a6145 39182c17 b83a7b11 8f89550a ab8fce59
d05a1aa2 182c5aa3 9c9aa04e 88a50faa c7cfaab4 6b51e223 be57c3bb aa727546
c67bb300 62c4db14 e86c058a d00213e3 8ee4d586 b2bc9d64 0bc421d6 ec33cbc3
a066df6b cb65a5df 729212a5 19e17178 44600b99 a4e00234 a29e2454 40f21cfb
11282b68 0441a12e 3da23ee1 6467b6f1 ede20e22 59ae0235 c1f0feb6 48084db6
76d53cbf 14512149 48d29928 88359c46 d2b0e98b 0facca74 5b4a3882 e7782f85
e8eb8fc5 e406736b 8a
ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 280
ikev2_pld_auth: method SIG length 272
0f300d06 092a8648 86f70d01 010b0500 4838dd00 31679b58 e63198f1 2b367904
237c44ad 15550628 8253eb88 f098f810 6560f1cb 6d3e5b19 a377c526 c770a377
2229f59b f0827ce5 456869bf 34fd54e8 da1d6e0d 4ac7ab5c a1d35fc2 12b29e10
c167da90 5f62ccc1 53a311ec 7006d764 081dac7f 9c171469 253af25e 99a50f83
4f04dc72 34841be9 5e86df2d 9c2caefb 113e93a2 0a8d2703 5952b871 a58ab383
a80063a6 e2c800be 60dee87f 89692209 e2a3cea4 39a82224 afe96617 ed88a4e8
c81dce45 21aa8e60 3336c0e6 28aad05f b979beba 3babf045 1d5ee45b 432316de
10389d9c 2d15d928 4ac3ddd1 b6ced8d7 4e6d8603 3257162d da643434 2f04284f
3a6c6bc5 c6b4d8b4 c3deb062 60911d44
ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_cp: type REPLY length 0
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0x50e4e0d2
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->NODE_ES<-- end -->NODE_ES<--
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->HOST-US<--- end -->HOST-US<---
spi=0xc870f2a5b428b6b1: send IKE_AUTH res 1 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 1568 bytes, NAT-T
pfkey_sa_add: update spi 0x50e4e0d2
ikev2_childsa_enable: loaded CHILD SA spi 0x50e4e0d2
pfkey_sa_add: add spi 0xcd21dd16
ikev2_childsa_enable: loaded CHILD SA spi 0xcd21dd16
ikev2_childsa_enable: loaded flow 0x5a9867fe000
ikev2_childsa_enable: loaded flow 0x5a987582c00
ikev2_childsa_enable: remember SA peer -->NODE_ES<--:4500
spi=0xc870f2a5b428b6b1: ikev2_childsa_enable: loaded SPIs: 0x50e4e0d2, 0xcd21dd16
spi=0xc870f2a5b428b6b1: ikev2_childsa_enable: loaded flows: ESP--->HOST-US<---/32=-->NODE_ES<--/32(47)
spi=0xc870f2a5b428b6b1: sa_state: VALID -> ESTABLISHED from -->NODE_ES<--:4500 to -->HOST-US<---:4500 policy '-->HOST_ES<--'
spi=0xc870f2a5b428b6b1: established peer -->NODE_ES<--:4500[UFQDN/-->HOSTNAME-ES<---@-->CA<---] local -->HOST-US<---:4500[UFQDN/-->HOSTNAME-US<---@-->CA<---] policy '-->HOST_ES<--' as responder
pfkey_sa_lookup: last_used 1614669104
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669119
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669134
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669149
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669164
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669179
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669194
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669210
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669224
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669239
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669254
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669270
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669284
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669300
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669315
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669330
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669344
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669360
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669375
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669390
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
ikev2_ike_sa_alive: IKE SA 0x5a9044b67d0 ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 last received 300 second(s) ago
ikev2_ike_sa_alive: sending alive check
ikev2_next_payload: length 52 nextpayload NONE
ikev2_msg_encrypt: decrypted length 4
00000400
ikev2_msg_encrypt: padded length 16
00000400 a1ad8c2c 1946be46 830e7b0b
ikev2_msg_encrypt: length 5, padding 11, output length 48
2b312d0f 68b36c6c e309b44d 7dab37a5 d607cdf8 b4cfd029 38df9bd7 aa230b8b
00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 80
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 2e202500 00000000 00000050 00000034
2b312d0f 68b36c6c e309b44d 7dab37a5 d607cdf8 b4cfd029 38df9bd7 aa230b8b
00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
9b0ad9d9 503ed019 3966542a 639c15c5 610fbbf4 45293d65 faf1930d 30ba78e5
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x00 msgid 0 length 80 response 0
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
2b312d0f 68b36c6c e309b44d 7dab37a5
ikev2_msg_decrypt: encrypted payload length 16
d607cdf8 b4cfd029 38df9bd7 aa230b8b
ikev2_msg_decrypt: integrity checksum length 16
9b0ad9d9 503ed019 3966542a 639c15c5
ikev2_msg_decrypt: integrity check succeeded
9b0ad9d9 503ed019 3966542a 639c15c5
ikev2_msg_decrypt: decrypted payload length 16/16 padding 11
00000400 a1ad8c2c 1946be46 830e7b0b
spi=0xc870f2a5b428b6b1: send INFORMATIONAL req 0 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, NAT-T
spi=0xc870f2a5b428b6b1: recv INFORMATIONAL res 0 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x28 msgid 0 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
098e5e89 f21396b3 7612b01f 54ab5af5
ikev2_msg_decrypt: encrypted payload length 16
3c9c6aea c37f1ea7 24026fb9 68f21ae9
ikev2_msg_decrypt: integrity checksum length 16
f297a53b fc7d61e4 32e22f80 3684f269
ikev2_msg_decrypt: integrity check succeeded
f297a53b fc7d61e4 32e22f80 3684f269
ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
08e4f8bc d6e2f6c3 debca410 7ebe3b0f
pfkey_sa_lookup: last_used 1614669405
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669420
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669435
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669450
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669465
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669480
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669495
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669510
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669525
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669540
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669555
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669570
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669585
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669600
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669615
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669630
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669645
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669660
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669675
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669690
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
ikev2_ike_sa_alive: IKE SA 0x5a9044b67d0 ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 last received 300 second(s) ago
ikev2_ike_sa_alive: sending alive check
ikev2_next_payload: length 52 nextpayload NONE
ikev2_msg_encrypt: decrypted length 4
00000400
ikev2_msg_encrypt: padded length 16
00000400 e895a15d 7af30ca3 8baf180b
ikev2_msg_encrypt: length 5, padding 11, output length 48
e10b0852 75f0a9c8 176d6c73 9c47558d 5d065fbf ddbb52db ab936e1b 38ceda57
00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 80
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 2e202500 00000001 00000050 00000034
e10b0852 75f0a9c8 176d6c73 9c47558d 5d065fbf ddbb52db ab936e1b 38ceda57
00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
b740fda4 24d90007 1d26d512 49c7972e cf5bf202 cd20bb12 03a71190 3ce82d57
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x00 msgid 1 length 80 response 0
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
e10b0852 75f0a9c8 176d6c73 9c47558d
ikev2_msg_decrypt: encrypted payload length 16
5d065fbf ddbb52db ab936e1b 38ceda57
ikev2_msg_decrypt: integrity checksum length 16
b740fda4 24d90007 1d26d512 49c7972e
ikev2_msg_decrypt: integrity check succeeded
b740fda4 24d90007 1d26d512 49c7972e
ikev2_msg_decrypt: decrypted payload length 16/16 padding 11
00000400 e895a15d 7af30ca3 8baf180b
spi=0xc870f2a5b428b6b1: send INFORMATIONAL req 1 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, NAT-T
spi=0xc870f2a5b428b6b1: recv INFORMATIONAL res 1 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x28 msgid 1 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
3af2f89c 87965512 cb06ef0b f03caad7
ikev2_msg_decrypt: encrypted payload length 16
2f22f16c 78053499 877b65da 8391ba92
ikev2_msg_decrypt: integrity checksum length 16
b5d4e613 9e412724 0fccc221 49fc1ad9
ikev2_msg_decrypt: integrity check succeeded
b5d4e613 9e412724 0fccc221 49fc1ad9
ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
00088f46 8b1ae3d0 94218323 4519900f
pfkey_sa_lookup: last_used 1614669705
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669720
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669735
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669750
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669765
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669780
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669795
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669810
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669826
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669840
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669855
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669870
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669885
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669899
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 2 second(s) ago
pfkey_sa_lookup: last_used 1614669915
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669931
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614669945
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669960
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669975
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614669989
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 2 second(s) ago
ikev2_ike_sa_alive: IKE SA 0x5a9044b67d0 ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 last received 300 second(s) ago
ikev2_ike_sa_alive: sending alive check
ikev2_next_payload: length 52 nextpayload NONE
ikev2_msg_encrypt: decrypted length 4
00000400
ikev2_msg_encrypt: padded length 16
00000400 9d0e58d0 25a63b09 3ff7560b
ikev2_msg_encrypt: length 5, padding 11, output length 48
aeff7c47 9c79483b 0d1a9747 93c39522 ba8da05f 0c294394 44ef8b03 84471b09
00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 80
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 2e202500 00000002 00000050 00000034
aeff7c47 9c79483b 0d1a9747 93c39522 ba8da05f 0c294394 44ef8b03 84471b09
00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
0765f1e9 2136aef6 fcb4dfbe 2f459d77 1e23825b 0cc83fc2 2fb4f9f8 70c171cb
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x00 msgid 2 length 80 response 0
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
aeff7c47 9c79483b 0d1a9747 93c39522
ikev2_msg_decrypt: encrypted payload length 16
ba8da05f 0c294394 44ef8b03 84471b09
ikev2_msg_decrypt: integrity checksum length 16
0765f1e9 2136aef6 fcb4dfbe 2f459d77
ikev2_msg_decrypt: integrity check succeeded
0765f1e9 2136aef6 fcb4dfbe 2f459d77
ikev2_msg_decrypt: decrypted payload length 16/16 padding 11
00000400 9d0e58d0 25a63b09 3ff7560b
spi=0xc870f2a5b428b6b1: send INFORMATIONAL req 2 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, NAT-T
spi=0xc870f2a5b428b6b1: recv INFORMATIONAL res 2 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x28 msgid 2 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
bb18234b c5209d86 cab8e1b8 984a1ece
ikev2_msg_decrypt: encrypted payload length 16
e3259382 97db3f63 c34057e3 15ea1413
ikev2_msg_decrypt: integrity checksum length 16
e2f2f174 3ba4468a 16b45c95 729d837a
ikev2_msg_decrypt: integrity check succeeded
e2f2f174 3ba4468a 16b45c95 729d837a
ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
79f4de00 742e3c58 e1b6d904 e359250f
pfkey_sa_lookup: last_used 1614670006
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670019
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 2 second(s) ago
pfkey_sa_lookup: last_used 1614670036
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670051
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670065
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614670081
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670096
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670111
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670126
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670141
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670156
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_process: SA 0x50e4e0d2 is expired, pending rekeying
ikev2_send_create_child_sa: rekeying ESP spi 0xcd21dd16
ikev2_add_notify: done
ikev2_next_payload: length 8 nextpayload SA
config_free_proposals: free 0x5a9867f8000
pfkey_sa_getspi: spi 0x72f660e2
pfkey_sa_init: new spi 0x72f660e2
ikev2_add_proposals: length 56
ikev2_next_payload: length 60 nextpayload NONCE
ikev2_send_create_child_sa: enable PFS
ikev2_next_payload: length 36 nextpayload KE
ikev2_next_payload: length 72 nextpayload TSi
ikev2_next_payload: length 24 nextpayload TSr
ikev2_next_payload: length 24 nextpayload NOTIFY
ikev2_next_payload: length 12 nextpayload NONE
ikev2_next_payload: length 276 nextpayload NOTIFY
ikev2_msg_encrypt: decrypted length 236
21000008 00004007 2800003c 00000038 01030405 72f660e2 03000008 0300000c
0300000c 0100000c 800e0100 03000008 04000013 03000008 05000001 00000008
05000000 22000024 0b2cc600 bc36fef6 d85c7b9c 97b2e249 2a72453a c6378de7
17d708f3 9986cb41 2c000048 00130000 0c9f34bb 6a8613f1 7b11b8f3 ee313c82
bd5de5fb c04e87fc f3494bf9 e7451173 64318c0b ada04af1 9f7232a8 849000ac
932d27a6 be4c36c0 ee7369c2 990458b0 2d000018 01000000 072f0010 0000ffff
9b8af71b 9b8af71b 29000018 01000000 072f0010 0000ffff 512c202f 512c202f
0000000c 03044009 50e4e0d2
ikev2_msg_encrypt: padded length 240
21000008 00004007 2800003c 00000038 01030405 72f660e2 03000008 0300000c
0300000c 0100000c 800e0100 03000008 04000013 03000008 05000001 00000008
05000000 22000024 0b2cc600 bc36fef6 d85c7b9c 97b2e249 2a72453a c6378de7
17d708f3 9986cb41 2c000048 00130000 0c9f34bb 6a8613f1 7b11b8f3 ee313c82
bd5de5fb c04e87fc f3494bf9 e7451173 64318c0b ada04af1 9f7232a8 849000ac
932d27a6 be4c36c0 ee7369c2 990458b0 2d000018 01000000 072f0010 0000ffff
9b8af71b 9b8af71b 29000018 01000000 072f0010 0000ffff 512c202f 512c202f
0000000c 03044009 50e4e0d2 23d9b303
ikev2_msg_encrypt: length 237, padding 3, output length 272
9b19b441 8be31824 8fcf386f c5fdfbf8 de756819 fa06af94 ffab7cf5 c34a5cb9
f4844390 40907313 1201a314 f4b7702b 03d9b0cb f6938ff9 f460c551 1ec06c01
6b2abc03 8434baa6 e89c503b b3252c15 3c95ce24 a63c4963 fec095a6 ae3b230f
b4dcd83b 91b461fe 02289ab9 f9e6bc01 b0c543e5 b354a5ce bdfb6718 bd87b019
72854b1c 08f7fd02 744698cb 11024f01 dddaf26e d785a037 de3091e2 619b9334
ee5c95d6 bad6dcbc 502cd96e 44cca3b0 6e339ae9 77be5a60 78dd46c6 48b94d38
839415dd 34f5e351 024cee34 035577fe 281d3b01 0f2342f9 589705ca 0b9ff7cc
ace0e94d 3eda4cc2 1ba8b896 014390b9 f1ac616f f738c1c0 431e4cab 75edaa68
00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 304
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 2e202400 00000003 00000130 29000114
9b19b441 8be31824 8fcf386f c5fdfbf8 de756819 fa06af94 ffab7cf5 c34a5cb9
f4844390 40907313 1201a314 f4b7702b 03d9b0cb f6938ff9 f460c551 1ec06c01
6b2abc03 8434baa6 e89c503b b3252c15 3c95ce24 a63c4963 fec095a6 ae3b230f
b4dcd83b 91b461fe 02289ab9 f9e6bc01 b0c543e5 b354a5ce bdfb6718 bd87b019
72854b1c 08f7fd02 744698cb 11024f01 dddaf26e d785a037 de3091e2 619b9334
ee5c95d6 bad6dcbc 502cd96e 44cca3b0 6e339ae9 77be5a60 78dd46c6 48b94d38
839415dd 34f5e351 024cee34 035577fe 281d3b01 0f2342f9 589705ca 0b9ff7cc
ace0e94d 3eda4cc2 1ba8b896 014390b9 f1ac616f f738c1c0 431e4cab 75edaa68
00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
a564b06e d741f47e 79ea50fd 27e6de1c 94dc42c9 5dffdc5d b9b1b2bd be00a9a6
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange CREATE_CHILD_SA flags 0x00 msgid 3 length 304 response 0
ikev2_pld_payloads: payload SK nextpayload NOTIFY critical 0x00 length 276
ikev2_msg_decrypt: IV length 16
9b19b441 8be31824 8fcf386f c5fdfbf8
ikev2_msg_decrypt: encrypted payload length 240
de756819 fa06af94 ffab7cf5 c34a5cb9 f4844390 40907313 1201a314 f4b7702b
03d9b0cb f6938ff9 f460c551 1ec06c01 6b2abc03 8434baa6 e89c503b b3252c15
3c95ce24 a63c4963 fec095a6 ae3b230f b4dcd83b 91b461fe 02289ab9 f9e6bc01
b0c543e5 b354a5ce bdfb6718 bd87b019 72854b1c 08f7fd02 744698cb 11024f01
dddaf26e d785a037 de3091e2 619b9334 ee5c95d6 bad6dcbc 502cd96e 44cca3b0
6e339ae9 77be5a60 78dd46c6 48b94d38 839415dd 34f5e351 024cee34 035577fe
281d3b01 0f2342f9 589705ca 0b9ff7cc ace0e94d 3eda4cc2 1ba8b896 014390b9
f1ac616f f738c1c0 431e4cab 75edaa68
ikev2_msg_decrypt: integrity checksum length 16
a564b06e d741f47e 79ea50fd 27e6de1c
ikev2_msg_decrypt: integrity check succeeded
a564b06e d741f47e 79ea50fd 27e6de1c
ikev2_msg_decrypt: decrypted payload length 240/240 padding 3
21000008 00004007 2800003c 00000038 01030405 72f660e2 03000008 0300000c
0300000c 0100000c 800e0100 03000008 04000013 03000008 05000001 00000008
05000000 22000024 0b2cc600 bc36fef6 d85c7b9c 97b2e249 2a72453a c6378de7
17d708f3 9986cb41 2c000048 00130000 0c9f34bb 6a8613f1 7b11b8f3 ee313c82
bd5de5fb c04e87fc f3494bf9 e7451173 64318c0b ada04af1 9f7232a8 849000ac
932d27a6 be4c36c0 ee7369c2 990458b0 2d000018 01000000 072f0010 0000ffff
9b8af71b 9b8af71b 29000018 01000000 072f0010 0000ffff 512c202f 512c202f
0000000c 03044009 50e4e0d2 23d9b303
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
ikev2_pld_payloads: decrypted payload SA nextpayload NONCE critical 0x00 length 60
ikev2_pld_sa: more 0 reserved 0 length 56 proposal #1 protoid ESP spisize 4 xforms 5 spi 0x72f660e2
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload NONCE nextpayload KE critical 0x00 length 36
0b2cc600 bc36fef6 d85c7b9c 97b2e249 2a72453a c6378de7 17d708f3 9986cb41
ikev2_pld_payloads: decrypted payload KE nextpayload TSi critical 0x00 length 72
ikev2_pld_ke: dh group ECP_256 reserved 0
0c9f34bb 6a8613f1 7b11b8f3 ee313c82 bd5de5fb c04e87fc f3494bf9 e7451173
64318c0b ada04af1 9f7232a8 849000ac 932d27a6 be4c36c0 ee7369c2 990458b0
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->HOST-US<--- end -->HOST-US<---
ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->NODE_ES<-- end -->NODE_ES<--
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 12
ikev2_pld_notify: protoid ESP spisize 4 type REKEY_SA
50e4e0d2
spi=0xc870f2a5b428b6b1: send CREATE_CHILD_SA req 3 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 304 bytes, NAT-T
spi=0xc870f2a5b428b6b1: recv CREATE_CHILD_SA res 3 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange CREATE_CHILD_SA flags 0x28 msgid 3 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload NOTIFY critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
f0330e71 1ca719b2 11c706d3 8e74ff52
ikev2_msg_decrypt: encrypted payload length 16
9aa48498 9152ec11 a1321ebe 262e1c76
ikev2_msg_decrypt: integrity checksum length 16
717c939c 28dbd813 708ad9da 61a3defe
ikev2_msg_decrypt: integrity check succeeded
717c939c 28dbd813 708ad9da 61a3defe
ikev2_msg_decrypt: decrypted payload length 16/16 padding 7
00000008 0000000e ed803db5 5ab03507
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type NO_PROPOSAL_CHOSEN
ikev2_init_create_child_sa: no proposal specified
pfkey_sa_lookup: last_used 1614670171
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_process: SA 0xcd21dd16 is expired, pending rekeying
pfkey_process: SA 0xcd21dd16 is expired, pending rekeying
pfkey_sa_lookup: last_used 1614670186
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
pfkey_process: SA 0xcd21dd16 is expired, pending deletion
pfkey_process: acquire request (peer -->NODE_ES<--)
pfkey_process: flow out from -->HOST-US<---/255.255.255.255 to -->NODE_ES<--/255.255.255.255 via -->NODE_ES<--
ikev2_child_sa_acquire: flow wasn't found
pfkey_sa_lookup: last_used 1614670201
ikev2_ike_sa_alive: incoming CHILD SA spi 0x50e4e0d2 last used 0 second(s) ago
spi=0xc870f2a5b428b6b1: recv INFORMATIONAL req 2 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x08 msgid 2 length 80 response 0
ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
8c87aeac 8fc555ba c6b7aa49 9ceb4468
ikev2_msg_decrypt: encrypted payload length 16
0b2fcbaf 102c6cfb 4c2b5095 7e770c09
ikev2_msg_decrypt: integrity checksum length 16
918adecd 4ffa503a 4db392e0 5a144c50
ikev2_msg_decrypt: integrity check succeeded
918adecd 4ffa503a 4db392e0 5a144c50
ikev2_msg_decrypt: decrypted payload length 16/16 padding 7
00000008 01000000 33a40e78 fa036607
ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE critical 0x00 length 8
ikev2_pld_delete: proto IKE spisize 0 nspi 0
ikev2_next_payload: length 4 nextpayload NONE
ikev2_next_payload: length 52 nextpayload NONE
ikev2_msg_encrypt: decrypted length 4
00000004
ikev2_msg_encrypt: padded length 16
00000004 def17d0c 56e9d3ed 8a341c0b
ikev2_msg_encrypt: length 5, padding 11, output length 48
d546de2a 455c665e 381669aa 5de37429 466b682e 45825b85 e861c0be 42439b80
00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 80
c870f2a5 b428b6b1 f2df80a5 dd2f5b33 2e202520 00000002 00000050 00000034
d546de2a 455c665e 381669aa 5de37429 466b682e 45825b85 e861c0be 42439b80
00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
a0babe4e 7861e19a e0b86310 5dedacc6 f2db6289 ba443935 83dc37c5 1807baed
ikev2_pld_parse: header ispi 0xc870f2a5b428b6b1 rspi 0xf2df80a5dd2f5b33 nextpayload SK version 0x20 exchange INFORMATIONAL flags 0x20 msgid 2 length 80 response 1
ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00 length 52
ikev2_msg_decrypt: IV length 16
d546de2a 455c665e 381669aa 5de37429
ikev2_msg_decrypt: encrypted payload length 16
466b682e 45825b85 e861c0be 42439b80
ikev2_msg_decrypt: integrity checksum length 16
a0babe4e 7861e19a e0b86310 5dedacc6
ikev2_msg_decrypt: integrity check succeeded
a0babe4e 7861e19a e0b86310 5dedacc6
ikev2_msg_decrypt: decrypted payload length 16/16 padding 11
00000004 def17d0c 56e9d3ed 8a341c0b
spi=0xc870f2a5b428b6b1: send INFORMATIONAL res 2 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 80 bytes, NAT-T
spi=0xc870f2a5b428b6b1: ikev2_ikesa_recv_delete: received delete
spi=0xc870f2a5b428b6b1: sa_state: ESTABLISHED -> CLOSED from -->NODE_ES<--:4500 to -->HOST-US<---:4500 policy '-->HOST_ES<--'
ikev2_recv: closing SA
spi=0xc870f2a5b428b6b1: sa_free: received delete
config_free_proposals: free 0x5a932127f00
config_free_proposals: free 0x5a8ff545e00
config_free_childsas: free 0x5a9044b8900
config_free_childsas: free 0x5a9867f7600
pfkey_reply: message: No such process
pfkey_sa_lookup: message: No such process
sa_free_flows: free 0x5a9867fe000
sa_free_flows: free 0x5a987582c00
policy_lookup: setting policy '-->HOST_ES<--'
spi=0x0469346daf3de27d: recv IKE_SA_INIT req 0 peer -->NODE_ES<--:500 local -->HOST-US<---:500, 1056 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0x0469346daf3de27d rspi 0x0000000000000000
ikev2_policy2id: srcid UFQDN/-->HOSTNAME-US<---@-->CA<--- length 33
ikev2_pld_parse: header ispi 0x0469346daf3de27d rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 1056 response 0
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 832
ikev2_pld_sa: more 2 reserved 0 length 352 proposal #1 protoid IKE spisize 0 xforms 37 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CTR
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_384_192
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_512_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id AES_XCBC_96
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id AES_CMAC_96
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P256R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P384R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P512R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_sa: more 0 reserved 0 length 476 proposal #2 protoid IKE spisize 0 xforms 45 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_16
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_8
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id CAMELLIA_CCM_12
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P256R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P384R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id BRAINPOOL_P512R1
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 72
ikev2_pld_ke: dh group ECP_256 reserved 0
1d7e318b 838e8797 aba3010d 3739e240 84dbfd09 5567a715 7e8ea13a 16bd8693
d56d97e1 7b683f88 057b66d5 64f10592 3bfa482b 28216145 09de4ff5 36f7e3cd
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
cbba93f2 c39b68d3 8fdec633 369fb0f0 766b97d8 ac6c7175 4edfc408 ec3c8805
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
2cae4948 7eb54c08 73046c2c 4f162702 662f6758
ikev2_nat_detection: peer source 0x0469346daf3de27d 0x0000000000000000 -->NODE_ES<--:500
2cae4948 7eb54c08 73046c2c 4f162702 662f6758
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
e284914c eab8f0ba 6dd9e5f7 778e6b29 cbade815
ikev2_nat_detection: peer destination 0x0469346daf3de27d 0x0000000000000000 -->HOST-US<---:500
e284914c eab8f0ba 6dd9e5f7 778e6b29 cbade815
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 16
ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS
00020003 00040005
ikev2_pld_notify: signature hash SHA2_256 (2)
ikev2_pld_notify: signature hash SHA2_384 (3)
ikev2_pld_notify: signature hash SHA2_512 (4)
ikev2_pld_notify: signature hash <UNKNOWN:5> (5)
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 256)
proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 1 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 4
proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 2 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 0
policy_lookup: setting policy '-->HOST_ES<--'
spi=0x0469346daf3de27d: sa_state: INIT -> SA_INIT
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 256)
proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 1 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 4
proposals_match: xform 2 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 2 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 0
proposals_negotiate: score 1: ENCR AES_CBC 256
proposals_negotiate: score 1: PRF HMAC_SHA2_256
proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
proposals_negotiate: score 1: DH ECP_256
sa_stateok: SA_INIT flags 0x0000, require 0x0000
sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
spi=0x0469346daf3de27d: ikev2_sa_keys: DHSECRET with 32 bytes
85400aed ec698cf4 f9781c41 acd9a6d7 75e4d15e f9fa70ad bd5fee34 358b8bb0
ikev2_sa_keys: SKEYSEED with 32 bytes
f568d3a3 a960b4dd 50be9f34 098162f1 56c40230 5dc51757 1bc82b2a abe3bdd5
spi=0x0469346daf3de27d: ikev2_sa_keys: S with 80 bytes
cbba93f2 c39b68d3 8fdec633 369fb0f0 766b97d8 ac6c7175 4edfc408 ec3c8805
88dca6c3 8051bf74 ed54bf43 c12ef3cc 80f294df 76395ef3 20bd7fe9 3e6e3208
0469346d af3de27d 0d2bd80b 33716e8b
ikev2_prfplus: T1 with 32 bytes
c0ae9a37 129b2cc3 0d83006c 2afb01f8 2b5c8ebd 67585b2b ddc9bb61 ea2eb6fa
ikev2_prfplus: T2 with 32 bytes
9ec450df 74326293 a9c587d3 7f6e23e0 0d5654d3 edcea7df dd366711 3874724a
ikev2_prfplus: T3 with 32 bytes
a4d3ba72 8b8beb78 56bc8f78 66f22302 2500b7e8 8d916586 32118690 d751a61d
ikev2_prfplus: T4 with 32 bytes
3c0bf6e0 1445f394 39b7ae35 f41d6c19 42c81809 b8d01ade f24232df f9c40182
ikev2_prfplus: T5 with 32 bytes
25d402ae 439bb7b1 ff22d407 fdcce54e 696a2d22 579d56c4 58a032ed 239e5311
ikev2_prfplus: T6 with 32 bytes
bc6f8ff9 675d15f0 c797d786 a9ce9941 8c19fbd8 e3d1d1a2 56a70d82 e8343dfe
ikev2_prfplus: T7 with 32 bytes
61816249 6c0b01dd 2778ee58 f1b82251 6174bf7f 0f71c813 b059405a 11561fb4
ikev2_prfplus: Tn with 224 bytes
c0ae9a37 129b2cc3 0d83006c 2afb01f8 2b5c8ebd 67585b2b ddc9bb61 ea2eb6fa
9ec450df 74326293 a9c587d3 7f6e23e0 0d5654d3 edcea7df dd366711 3874724a
a4d3ba72 8b8beb78 56bc8f78 66f22302 2500b7e8 8d916586 32118690 d751a61d
3c0bf6e0 1445f394 39b7ae35 f41d6c19 42c81809 b8d01ade f24232df f9c40182
25d402ae 439bb7b1 ff22d407 fdcce54e 696a2d22 579d56c4 58a032ed 239e5311
bc6f8ff9 675d15f0 c797d786 a9ce9941 8c19fbd8 e3d1d1a2 56a70d82 e8343dfe
61816249 6c0b01dd 2778ee58 f1b82251 6174bf7f 0f71c813 b059405a 11561fb4
ikev2_sa_keys: SK_d with 32 bytes
c0ae9a37 129b2cc3 0d83006c 2afb01f8 2b5c8ebd 67585b2b ddc9bb61 ea2eb6fa
ikev2_sa_keys: SK_ai with 32 bytes
9ec450df 74326293 a9c587d3 7f6e23e0 0d5654d3 edcea7df dd366711 3874724a
ikev2_sa_keys: SK_ar with 32 bytes
a4d3ba72 8b8beb78 56bc8f78 66f22302 2500b7e8 8d916586 32118690 d751a61d
ikev2_sa_keys: SK_ei with 32 bytes
3c0bf6e0 1445f394 39b7ae35 f41d6c19 42c81809 b8d01ade f24232df f9c40182
ikev2_sa_keys: SK_er with 32 bytes
25d402ae 439bb7b1 ff22d407 fdcce54e 696a2d22 579d56c4 58a032ed 239e5311
ikev2_sa_keys: SK_pi with 32 bytes
bc6f8ff9 675d15f0 c797d786 a9ce9941 8c19fbd8 e3d1d1a2 56a70d82 e8343dfe
ikev2_sa_keys: SK_pr with 32 bytes
61816249 6c0b01dd 2778ee58 f1b82251 6174bf7f 0f71c813 b059405a 11561fb4
ikev2_add_proposals: length 44
ikev2_next_payload: length 48 nextpayload KE
ikev2_next_payload: length 72 nextpayload NONCE
ikev2_next_payload: length 36 nextpayload NOTIFY
ikev2_nat_detection: local source 0x0469346daf3de27d 0x0d2bd80b33716e8b -->HOST-US<---:500
ikev2_next_payload: length 28 nextpayload NOTIFY
ikev2_nat_detection: local destination 0x0469346daf3de27d 0x0d2bd80b33716e8b -->NODE_ES<--:500
ikev2_next_payload: length 28 nextpayload CERTREQ
ikev2_add_certreq: type X509_CERT length 21
ikev2_next_payload: length 25 nextpayload NOTIFY
ikev2_next_payload: length 14 nextpayload NONE
ikev2_pld_parse: header ispi 0x0469346daf3de27d rspi 0x0d2bd80b33716e8b nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 279 response 1
ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48
ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 72
ikev2_pld_ke: dh group ECP_256 reserved 0
ed32cc33 a1c1f3e4 c329be29 204ed03e 6e9e1876 83f5091a 473e6760 1094d7b0
bd194dab ae9679cd 8cbd9274 c5fe49ff 7052d6af 0a88ce33 9572aea8 88f00245
ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36
88dca6c3 8051bf74 ed54bf43 c12ef3cc 80f294df 76395ef3 20bd7fe9 3e6e3208
ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP
53c4df3b fb1245a1 7e79116a f711383f 30f19a17
ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28
ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP
df418d07 a3ae1d49 debedc53 f3a64f26 bcb0aeee
ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical 0x00 length 25
ikev2_pld_certreq: type X509_CERT length 20
d240096d 782460df c9e68072 dc0bc444 6fab51ba
ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14
ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS
00020003 0004
spi=0x0469346daf3de27d: send IKE_SA_INIT res 0 peer -->NODE_ES<--:500 local -->HOST-US<---:500, 279 bytes
config_free_proposals: free 0x5a9867f8480
config_free_proposals: free 0x5a932127e00
spi=0x0469346daf3de27d: recv IKE_AUTH req 1 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 1792 bytes, policy '-->HOST_ES<--'
ikev2_recv: ispi 0x0469346daf3de27d rspi 0x0d2bd80b33716e8b
ikev2_recv: updated SA to peer -->NODE_ES<--:4500 local -->HOST-US<---:4500
ikev2_pld_parse: header ispi 0x0469346daf3de27d rspi 0x0d2bd80b33716e8b nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1792 response 0
ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 1764
ikev2_msg_decrypt: IV length 16
3ab9b7a7 c53cf175 201483ab f719c3a6
ikev2_msg_decrypt: encrypted payload length 1728
71d82e3d bcb3dd1e 44dc8360 f0895157 68d711b0 ca25d1ab 1f4b5139 a8104ab7
c2be9030 d3e9a339 93f6815e 398e0f83 748a4438 f1b6abe4 d800d343 30e1045c
24b0d620 a0b3cfa1 8602f509 e9896b1b 4fc27cf5 567abd71 7bd6f3f2 0faaf017
933c0cdf 217310f0 befdcacd 47aa9be7 7f7d4d73 f8ab43c9 42c99821 157f5d1f
2a712831 df96db60 109ab5f9 777426cc 120300f9 96ef0585 4f66398c 8679e11f
19f91412 01aede10 c2cbadba 788def8e 7472bb67 fcecb977 43358063 c803aa43
4c7eec63 67174a5b 95298973 1cdbf33f af02e173 fbd843ea 724ae857 0397351c
414d3ecc c356404e 017886f3 efd3d705 756ea808 cdb13e9a 3b70164e e39b72cb
f21e90d3 057a30d6 332629fb c2c36fd9 139856de e5d53aa8 74f6889b 5e544fb2
338b4ff7 fa49f74c fd06315c d6af3e23 4a0de970 1f39bf8d b3b5a42a 257c070e
f02f2bd6 605d8674 be9ea508 741c6a3a c23d6909 4a81a7c0 98fd3a4b 35ddca23
387afc0b a41d0dac 72ee952f dda2f04d 859de283 f313650f 91d7c50d 6a69f26b
2669e1b9 95a59413 cbe0b04c a2078bcf 74959f9a e3574a85 77900304 a3db1f8c
2632d613 56b7eaf1 ce0e1410 734c3dfd 69fe77bd 254f8fda d02ce9cd e9998073
fa830760 c13abe96 7739d21b 0abea39c f5fed6ad 321f5552 1c1c9d60 12f37ecd
a5fa8639 fe9c143c c569662e c43c7d0b 6c022d91 082cac99 8254b0ba 24efd0b0
403563a5 b231753b 06be7854 f617041b 29db3522 8db13e8e efbe2efb 21dae244
7482f6ed 2021d15f 65a76008 db2ecdf5 ec6892c2 848f2a3f aa8edbaf b0878023
f9bfeb10 212697c5 f03795e2 5d825d5c 02a05fcc b94432c4 4962d965 541d276c
30a45d5e bc0b3fe2 b4313eac 580abb6f dcf22073 29bc017f 66f92975 a4fba0dd
934686b4 0c621a27 b1aa24da 659b7dac 257bdd5d ea9db2d4 543def3d cf4c4b95
c1ea4e89 74896b1d b61631b5 065770cf 36a08d83 b495f9a5 ba192af7 ba95d0c0
a0efed4f e196a322 d93d81fa abae05c0 3ed56901 e768c57c 01c3cfc9 3b267a73
5f045fd9 290174a9 166a7a67 5bfceff2 a5c0597d 2f1f5620 e8baf8d2 b71cfab8
cf140db2 0488b436 3fc76e9e 33db4b45 e91af648 a0ae6649 02f7a64e 37a9ff78
7f3212db 31b5b73c 76e5d814 7a4026ba 7ba63260 4b2dfd8b cbee49fc 00f1e1af
0d62610a a27da1c8 0f929d90 7ac69c4d 02f5f356 f69b6b2d c61b184d 09da245a
de61234d 90f3dfc1 cfd0af21 7b3a96fe 5bc01aa3 07027abd f22a9278 5c3e207f
7a78e6d6 efef3282 fc5af681 15376f9e 07fbf5e8 51134e94 b2b8fb55 3fb35dac
3c49f912 ac2ea153 3a9c60b8 deec62e4 6ad4584e c698805f 1fa53d22 9df0cb1b
f423324e 5ba20f55 9fc7ca00 af2cc899 3ebb7913 dd14e96c 3f2472a6 46ce9f74
932e1feb 27d39e82 7593424b 4156eb36 2bd310d8 4b6cc863 2f6eea99 e32e8ca3
93fe8c8d b8989222 c711f912 fba1bb80 3f29cac2 7f892e28 f0d3d9d5 0c2b061b
60bc4e58 e52f1c73 7b3b7ff9 542af3a2 d4169b5e cf8216ca e2c27fba 10f5b675
8c81ecd9 231d93e6 8b623c7a d53395dd 6c8d7876 2ca4efd4 027f8d12 6bfc2fd7
7a5cf053 a1ad5a76 83a930f7 12b18be2 d50504f7 76c93069 c30073fa 0204c9a7
cc914e1d 2a6fae68 47b07be4 edd90a77 e7872f7c 4c8ad7cb 0b2a7cf2 93902db9
223c3ca7 e1496ce0 0ef60190 bdf6ce3a 61d82a7f aca26b7f 673b53f3 228a498c
85173dd6 bb9bbcea c4247ac3 26388787 ad54d753 64838d89 e826e9fd 35a67efe
b91b4483 f958eb75 96707c1b 15166416 f09fb78e 219ea573 67fc41c1 dc91de52
b43e1670 1180d875 225cd178 413f0b8b 3a7040ad 025b32a9 0d0c963a 619b63cc
4e951dca 5ec10255 02c21d35 263530e6 41886b97 7a1576da 4b005653 bbf08ddb
3437ab92 7a722fca 443d694f 483727dd a09db561 9e5bf560 59b73398 4d08a40a
1ad3ea2b 74c9269e bc40a341 61f2be10 bf44b364 f11cac30 2a235274 1d74937d
b2c3e153 e96416db b40bcc54 1c255b2d 29756931 e51fa664 1dca0619 f3fd7f07
9b0bd10f a92cd047 486eef2e 810bd369 5aab61a6 c5f4d29c c1de5152 0931665a
2c9895a7 1ba78dd0 dcd5f914 8073e2c7 20a605f2 10192081 618c3e7a b3696a46
f3988a31 1c26b357 c349172a d2492de4 09637abc 9fa8c2aa d4c89c0b 427cad75
9870d979 8d80ba03 85fb2521 75c58605 3aa85740 327f8da5 26b8fc5b 56747315
e9b77fb4 9afc646f 311e2c81 260b5944 a3f40565 b6f1801b 07eda7f7 c98c65fc
a70b4fdf 08e22c56 27ce1ca1 ee033bc6 b1573f7f 35297b78 5b7723bb 47d00a25
fdd2eae8 d25985e5 04e47e93 a21aae6d 3268e947 6493a5bb c9138fea d23e6d23
13d14119 66cfc6c1 5ec52cbb f3cb965a 8a2c6d37 4a62f6d9 d9819009 26a22ec0
6f0b8b00 fddd4990 c01577e3 5e109ddc a0fc4e89 4066939d c00b5ec7 bd12dc57
ikev2_msg_decrypt: integrity checksum length 16
6a56e16d e7e0cfa1 b3581be5 41028f95
ikev2_msg_decrypt: integrity check succeeded
6a56e16d e7e0cfa1 b3581be5 41028f95
ikev2_msg_decrypt: decrypted payload length 1728/1728 padding 11
25000021 03000000 696e6472 61406361 2e74656c 65636f6d 6c6f6262 792e636f
6d290004 42043082 04393082 0321a003 02010202 082fc4d9 c96de04c b3300d06
092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652 311a3018
06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014 06035504
070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54 656c6563
6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06 03550403
0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130 32303930
39353333 335a170d 32323032 30393039 35333333 5a30818a 310b3009 06035504
06130245 53311230 10060355 04080c09 43617461 6c756e79 61311b30 19060355
04070c12 73616e74 20506572 65206465 20526962 65733116 30140603 55040a0c
0d54656c 65636f6d 204c6f62 6279310d 300b0603 55040b0c 0456504e 43312330
21060355 04030c1a 52542d30 312e6361 742e7465 6c65636f 6d6c6f62 62792e63
6f6d3082 0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282
010100a3 db48a4b0 40b55682 81326f75 39065825 9ea9852b 6eeaa601 c4c692fa
80b16e5e bbcf8072 947ac073 f9b8e372 87cfbc6d 4002f200 d6daf70c 040b1a3f
1a8dfae5 3df72d9a d249803e a1a6b1dc 2f43a6f5 6b930198 a10b79e4 4acbf30f
68aa8f3e 7f06a0cb 17283584 502629de 0bc50868 75202485 56bab2fe d1c4ca7a
ee08c458 74618b80 d82d0fd8 f95e4444 b6d445b7 223e6529 459e672b be640500
3ddfec49 1e6192e6 6c0e57cf 937f3728 c29cb9c7 d9bce970 aa0370fb 7e19e3f7
150b2d2d 706c32e0 986d78bc 0b25eeff fe27707e 1bd36caa c844fafd 792795cb
8b919b40 d9906ed7 dccc1192 b1d18453 6d567b6b a9f5cbed b27899a5 cd7514c1
eaea1b02 03010001 a381a430 81a13013 0603551d 25040c30 0a06082b 06010505
07030230 1d060355 1d0e0416 0414d277 dc485c0f 9c282246 c877c363 d3883d07
ed9d301f 0603551d 23041830 1680142a c5939e9b 0361a9a9 b61eb388 3d40c58e
e44f5030 24060355 1d11041d 301b8119 696e6472 61406361 2e74656c 65636f6d
6c6f6262 792e636f 6d302406 09608648 0186f842 010d0417 16154765 6e657261
74656420 62792052 6f757465 724f5330 0d06092a 864886f7 0d01010b 05000382
01010056 c2f37bdf fba9a57a 17b5dcd9 062632b3 5bd7cd5e 0182b1e4 fb23bba8
8d2b0005 a406253c c28dea45 91ea8961 99b38e2b 30816fb9 3ad824f0 b9992412
dc584ec1 a3f52bc1 0a9a198f da49baf6 40d3ac5d 136095cd 7ed56814 3413d831
8e782e4c 4d1c1c82 e0ecb3ae 46254ee7 4f840f39 fcb19fde 7e5d94ad 05ac9caf
376ed1d5 e6bd774a 45cd4b20 26cc2e37 163c029c 33a41a2a 8f0f1ef8 f799327b
4c4265af ef9ab66c 11f73fcf 2d1724b7 acb365d9 7e922035 d1e7a807 f5020ce6
da69dc25 55824ce4 1c28e334 5583d13c f1a79f1e 248fe4ff dd32fa34 0d0e870d
a3654381 4118362c 99b00024 570a5104 3058d09a e9a66d6e 294a297e 805c506d
ce832b26 00000800 00400027 00005504 d240096d 782460df c9e68072 dc0bc444
6fab51ba d240096d 782460df c9e68072 dc0bc444 6fab51ba 3b6a7f0c 2f567b94
1954764f bfae24cd 40d9ea01 a467a75b d9f8d81b 482a9316 39c96dc0 98337349
2f000118 0e000000 0f300d06 092a8648 86f70d01 010b0500 90c6695a d9d6c62c
3e505609 b65cbd2e dddc6748 2000e932 8feb7562 6aa9cc0f fc3b450b c7ade4c3
5bb244b8 dde138d9 b426d18b 4b223f57 c6e1b9a0 ca823b9f 91baf1b6 f60e4478
1ebc7b0c 620f7125 566bee11 f722a9a8 67ac1750 bec0d809 6a8c81f5 3bf1543c
971d19e7 dcc64da6 f0561c20 625bad51 82df9602 0ccadab0 a724e075 23dbf1a7
6a7fe64a ed7eaf53 0af9801a ff12cbc2 81c8a736 d2666ea9 fdf3a1d4 2a189db4
f9e7b176 bb77295b 60a1de4c 0bceb1ec d2e18a19 661dddd2 39708878 7b6703b8
8d48f246 4f62cc89 287a3075 064101b4 6211f38b 63bcaa56 116f9002 4c0c2310
727cac08 0d69c4dd 11841c97 0f9ba3ed f33fdacf 1ae431a3 29000010 01000000
00010000 00030000 21000008 00004007 2c000064 00000060 01030409 c977da0e
0300000c 0100000c 800e0080 0300000c 0100000c 800e00c0 0300000c 0100000c
800e0100 03000008 0300000c 03000008 0300000d 03000008 0300000e 03000008
03000002 03000008 03000005 00000008 05000000 2d000018 01000000 072f0010
0000ffff 00000000 ffffffff 29000018 01000000 072f0010 0000ffff 9b8af71b
9b8af71b 29000008 0000400c 29000018 0000400e 2a029003 00b70a85 105cb394
07f03ae0 29000008 00004021 00000008 00004024 39d1f768 e83c6b61 ae20470b
ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 33
ikev2_pld_id: id UFQDN/-->HOSTNAME-ES<---@-->CA<--- length 29
ikev2_pld_payloads: decrypted payload CERT nextpayload NOTIFY critical 0x00 length 1090
ikev2_pld_cert: type X509_CERT length 1085
30820439 30820321 a0030201 0202082f c4d9c96d e04cb330 0d06092a 864886f7
0d01010b 05003081 86310b30 09060355 04061302 4652311a 30180603 5504080c
11536569 6e652d53 61696e74 2d44656e 69733116 30140603 5504070c 0d417562
65727669 6c6c6965 72733116 30140603 55040a0c 0d54656c 65636f6d 204c6f62
6279310d 300b0603 55040b0c 0456504e 43311c30 1a060355 04030c13 63612e74
656c6563 6f6d6c6f 6262792e 636f6d30 1e170d32 31303230 39303935 3333335a
170d3232 30323039 30393533 33335a30 818a310b 30090603 55040613 02455331
12301006 03550408 0c094361 74616c75 6e796131 1b301906 03550407 0c127361
6e742050 65726520 64652052 69626573 31163014 06035504 0a0c0d54 656c6563
6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 23302106 03550403
0c1a5254 2d30312e 6361742e 74656c65 636f6d6c 6f626279 2e636f6d 30820122
300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 02820101 00a3db48
a4b040b5 56828132 6f753906 58259ea9 852b6eea a601c4c6 92fa80b1 6e5ebbcf
8072947a c073f9b8 e37287cf bc6d4002 f200d6da f70c040b 1a3f1a8d fae53df7
2d9ad249 803ea1a6 b1dc2f43 a6f56b93 0198a10b 79e44acb f30f68aa 8f3e7f06
a0cb1728 35845026 29de0bc5 08687520 248556ba b2fed1c4 ca7aee08 c4587461
8b80d82d 0fd8f95e 4444b6d4 45b7223e 6529459e 672bbe64 05003ddf ec491e61
92e66c0e 57cf937f 3728c29c b9c7d9bc e970aa03 70fb7e19 e3f7150b 2d2d706c
32e0986d 78bc0b25 eefffe27 707e1bd3 6caac844 fafd7927 95cb8b91 9b40d990
6ed7dccc 1192b1d1 84536d56 7b6ba9f5 cbedb278 99a5cd75 14c1eaea 1b020301
0001a381 a43081a1 30130603 551d2504 0c300a06 082b0601 05050703 02301d06
03551d0e 04160414 d277dc48 5c0f9c28 2246c877 c363d388 3d07ed9d 301f0603
551d2304 18301680 142ac593 9e9b0361 a9a9b61e b3883d40 c58ee44f 50302406
03551d11 041d301b 8119696e 64726140 63612e74 656c6563 6f6d6c6f 6262792e
636f6d30 24060960 86480186 f842010d 04171615 47656e65 72617465 64206279
20526f75 7465724f 53300d06 092a8648 86f70d01 010b0500 03820101 0056c2f3
7bdffba9 a57a17b5 dcd90626 32b35bd7 cd5e0182 b1e4fb23 bba88d2b 0005a406
253cc28d ea4591ea 896199b3 8e2b3081 6fb93ad8 24f0b999 2412dc58 4ec1a3f5
2bc10a9a 198fda49 baf640d3 ac5d1360 95cd7ed5 68143413 d8318e78 2e4c4d1c
1c82e0ec b3ae4625 4ee74f84 0f39fcb1 9fde7e5d 94ad05ac 9caf376e d1d5e6bd
774a45cd 4b2026cc 2e37163c 029c33a4 1a2a8f0f 1ef8f799 327b4c42 65afef9a
b66c11f7 3fcf2d17 24b7acb3 65d97e92 2035d1e7 a807f502 0ce6da69 dc255582
4ce41c28 e3345583 d13cf1a7 9f1e248f e4ffdd32 fa340d0e 870da365 43814118
362c99b0 0024570a 51043058 d09ae9a6 6d6e294a 297e805c 506dce83 2b
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CERTREQ critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT
ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical 0x00 length 85
ikev2_pld_certreq: type X509_CERT length 80
d240096d 782460df c9e68072 dc0bc444 6fab51ba d240096d 782460df c9e68072
dc0bc444 6fab51ba 3b6a7f0c 2f567b94 1954764f bfae24cd 40d9ea01 a467a75b
d9f8d81b 482a9316 39c96dc0 98337349
ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 280
ikev2_pld_auth: method SIG length 272
0f300d06 092a8648 86f70d01 010b0500 90c6695a d9d6c62c 3e505609 b65cbd2e
dddc6748 2000e932 8feb7562 6aa9cc0f fc3b450b c7ade4c3 5bb244b8 dde138d9
b426d18b 4b223f57 c6e1b9a0 ca823b9f 91baf1b6 f60e4478 1ebc7b0c 620f7125
566bee11 f722a9a8 67ac1750 bec0d809 6a8c81f5 3bf1543c 971d19e7 dcc64da6
f0561c20 625bad51 82df9602 0ccadab0 a724e075 23dbf1a7 6a7fe64a ed7eaf53
0af9801a ff12cbc2 81c8a736 d2666ea9 fdf3a1d4 2a189db4 f9e7b176 bb77295b
60a1de4c 0bceb1ec d2e18a19 661dddd2 39708878 7b6703b8 8d48f246 4f62cc89
287a3075 064101b4 6211f38b 63bcaa56 116f9002 4c0c2310 727cac08 0d69c4dd
11841c97 0f9ba3ed f33fdacf 1ae431a3
ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 length 16
ikev2_pld_cp: type REQUEST length 8
00010000 00030000
ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 100
ikev2_pld_sa: more 0 reserved 0 length 96 proposal #1 protoid ESP spisize 4 xforms 9 spi 0xc977da0e
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_384_192
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_512_256
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id AES_XCBC_96
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->HOST-US<--- end -->HOST-US<---
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 24
ikev2_pld_notify: protoid NONE spisize 0 type ADDITIONAL_IP6_ADDRESS
2a029003 00b70a85 105cb394 07f03ae0
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type EAP_ONLY_AUTHENTICATION
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type IKEV2_MESSAGE_ID_SYNC_SUPPORTED
ikev2_handle_notifies: mobike enabled
sa_stateok: SA_INIT flags 0x0000, require 0x0000
spi=0x0469346daf3de27d: sa_state: SA_INIT -> AUTH_REQUEST
policy_lookup: peerid '-->HOSTNAME-ES<---@-->CA<---'
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): PRF HMAC_SHA2_256 (keylength 0 <-> 0)
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 256 <-> 256)
proposals_match: xform 1 <-> 1 (1): DH ECP_256 (keylength 0 <-> 0)
proposals_negotiate: score 4
policy_lookup: setting policy '-->HOST_ES<--'
ikev2_policy2id: srcid UFQDN/-->HOSTNAME-US<---@-->CA<--- length 33
sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_msg_auth: responder auth data length 343
0469346d af3de27d 0d2bd80b 33716e8b 21202220 00000000 00000117 22000030
0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 03000008
0300000c 00000008 04000013 28000048 00130000 ed32cc33 a1c1f3e4 c329be29
204ed03e 6e9e1876 83f5091a 473e6760 1094d7b0 bd194dab ae9679cd 8cbd9274
c5fe49ff 7052d6af 0a88ce33 9572aea8 88f00245 29000024 88dca6c3 8051bf74
ed54bf43 c12ef3cc 80f294df 76395ef3 20bd7fe9 3e6e3208 2900001c 00004004
53c4df3b fb1245a1 7e79116a f711383f 30f19a17 2600001c 00004005 df418d07
a3ae1d49 debedc53 f3a64f26 bcb0aeee 29000019 04d24009 6d782460 dfc9e680
72dc0bc4 446fab51 ba000000 0e000040 2f000200 030004cb ba93f2c3 9b68d38f
dec63336 9fb0f076 6b97d8ac 6c71754e dfc408ec 3c8805f1 6ddc94ea 5f3b4adb
53c1e470 d3b3cb0b 9ed8bf5d ed1fc393 00620e9f 491958
ca_setauth: switching SIG_ANY to SIG
ca_setauth: auth length 343
proposals_match: xform 1 <-> 1 (1): ENCR AES_CBC (keylength 256 <-> 256) 256
proposals_match: xform 1 <-> 1 (1): INTEGR HMAC_SHA2_256_128 (keylength 0 <-> 256)
proposals_match: xform 1 <-> 1 (2): ESN NONE (keylength 0 <-> 0)
proposals_negotiate: score 4
proposals_negotiate: score 1: ENCR AES_CBC 256
proposals_negotiate: score 1: INTEGR HMAC_SHA2_256_128
proposals_negotiate: score 2: ESN NONE
sa_stateflags: 0x0024 -> 0x0024 certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
config_free_proposals: free 0x5a9044b6e00
ca_getreq: found CA /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN=-->CA<---
ca_x509_subjectaltname_do: did not find subjectAltName in certificate
ca_getreq: found local certificate /C=US/ST=Texas/L=Dallas/O=Telecom Lobby/OU=VPNC/CN=-->CERT-US<---
_dsa_sign_encode: signature scheme 0 selected
_dsa_sign_encode: signature scheme 0 selected
_dsa_sign_encode: signature scheme 0 selected
ca_setauth: auth length 272
ca_validate_pubkey: could not open public key pubkeys/ufqdn/-->HOSTNAME-ES<---@-->CA<---
ca_validate_cert: /C=ES/ST=Catalunya/L=sant Pere de Ribes/O=Telecom Lobby/OU=VPNC/CN=-->HOST_ES<-- ok
ikev2_getimsgdata: imsg 22 rspi 0x0d2bd80b33716e8b ispi 0x0469346daf3de27d initiator 0 sa valid type 4 data length 1065
ikev2_dispatch_cert: cert type X509_CERT length 1065, ok
sa_stateflags: 0x0024 -> 0x0025 cert,certreq,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_getimsgdata: imsg 28 rspi 0x0d2bd80b33716e8b ispi 0x0469346daf3de27d initiator 0 sa valid type 14 data length 272
ikev2_dispatch_cert: AUTH type 14 len 272
sa_stateflags: 0x0025 -> 0x002d cert,certreq,auth,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_getimsgdata: imsg 23 rspi 0x0d2bd80b33716e8b ispi 0x0469346daf3de27d initiator 0 sa valid type 4 data length 1085
ikev2_msg_auth: initiator auth data length 1120
0469346d af3de27d 00000000 00000000 21202208 00000000 00000420 22000340
02000160 01010025 0300000c 0100000c 800e0080 0300000c 0100000c 800e00c0
0300000c 0100000c 800e0100 0300000c 01000017 800e0080 0300000c 01000017
800e00c0 0300000c 01000017 800e0100 0300000c 0100000d 800e0080 0300000c
0100000d 800e00c0 0300000c 0100000d 800e0100 0300000c 01000018 800e0080
0300000c 01000018 800e00c0 0300000c 01000018 800e0100 03000008 01000003
03000008 0300000c 03000008 0300000d 03000008 0300000e 03000008 03000002
03000008 03000005 03000008 03000008 03000008 02000005 03000008 02000006
03000008 02000007 03000008 02000004 03000008 02000008 03000008 02000002
03000008 04000013 03000008 04000014 03000008 04000015 03000008 0400001c
03000008 0400001d 03000008 0400001e 03000008 0400001f 03000008 0400000f
03000008 04000010 03000008 04000011 03000008 04000012 00000008 0400000e
000001dc 0201002d 0300000c 01000014 800e0080 0300000c 01000014 800e00c0
0300000c 01000014 800e0100 0300000c 01000010 800e0080 0300000c 01000010
800e00c0 0300000c 01000010 800e0100 0300000c 0100001b 800e0080 0300000c
0100001b 800e00c0 0300000c 0100001b 800e0100 0300000c 01000013 800e0080
0300000c 01000013 800e00c0 0300000c 01000013 800e0100 0300000c 01000012
800e0080 0300000c 01000012 800e00c0 0300000c 01000012 800e0100 0300000c
0100000e 800e0080 0300000c 0100000e 800e00c0 0300000c 0100000e 800e0100
0300000c 0100000f 800e0080 0300000c 0100000f 800e00c0 0300000c 0100000f
800e0100 0300000c 01000019 800e0080 0300000c 01000019 800e00c0 0300000c
01000019 800e0100 0300000c 0100001a 800e0080 0300000c 0100001a 800e00c0
0300000c 0100001a 800e0100 03000008 02000005 03000008 02000006 03000008
02000007 03000008 02000004 03000008 02000008 03000008 02000002 03000008
04000013 03000008 04000014 03000008 04000015 03000008 0400001c 03000008
0400001d 03000008 0400001e 03000008 0400001f 03000008 0400000f 03000008
04000010 03000008 04000011 03000008 04000012 00000008 0400000e 28000048
00130000 1d7e318b 838e8797 aba3010d 3739e240 84dbfd09 5567a715 7e8ea13a
16bd8693 d56d97e1 7b683f88 057b66d5 64f10592 3bfa482b 28216145 09de4ff5
36f7e3cd 29000024 cbba93f2 c39b68d3 8fdec633 369fb0f0 766b97d8 ac6c7175
4edfc408 ec3c8805 2900001c 00004004 2cae4948 7eb54c08 73046c2c 4f162702
662f6758 2900001c 00004005 e284914c eab8f0ba 6dd9e5f7 778e6b29 cbade815
29000008 0000402e 29000010 0000402f 00020003 00040005 00000008 00004016
88dca6c3 8051bf74 ed54bf43 c12ef3cc 80f294df 76395ef3 20bd7fe9 3e6e3208
56f39dad 220d5ae2 c33f92bd 19235e6c 0badc3a7 c1f34783 de32597f 7a92cc45
ikev2_msg_authverify: method SIG keylen 1085 type X509_CERT
_dsa_verify_init: signature scheme 0 selected
ikev2_msg_authverify: authentication successful
spi=0x0469346daf3de27d: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
ikev2_dispatch_cert: peer certificate is valid
sa_stateflags: 0x003d -> 0x003f cert,certvalid,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa)
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
spi=0x0469346daf3de27d: sa_state: AUTH_SUCCESS -> VALID
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa
ikev2_sa_tag: (0)
ikev2_childsa_negotiate: proposal 1
ikev2_childsa_negotiate: key material length 128
ikev2_prfplus: T1 with 32 bytes
ae53d4df 824b8c24 5b85f124 31b5b4fe 052e8952 cb9e4ef0 9743531c 2e0948e9
ikev2_prfplus: T2 with 32 bytes
969881ea e031275d e508f818 c4179caf 14b504b0 09c1ff7d f0aa6c86 ba90f279
ikev2_prfplus: T3 with 32 bytes
99b1a9d8 45e7d499 d1c33ca9 63d625bb 1467fd16 2218ef2d e9f06e68 aac608af
ikev2_prfplus: T4 with 32 bytes
c37cbce8 5c53098a 0bb8bcd6 25539cef 99bab221 b5d6647e ba75fc3f 0c1e4e26
ikev2_prfplus: Tn with 128 bytes
ae53d4df 824b8c24 5b85f124 31b5b4fe 052e8952 cb9e4ef0 9743531c 2e0948e9
969881ea e031275d e508f818 c4179caf 14b504b0 09c1ff7d f0aa6c86 ba90f279
99b1a9d8 45e7d499 d1c33ca9 63d625bb 1467fd16 2218ef2d e9f06e68 aac608af
c37cbce8 5c53098a 0bb8bcd6 25539cef 99bab221 b5d6647e ba75fc3f 0c1e4e26
pfkey_sa_getspi: spi 0x15c92cc6
pfkey_sa_init: new spi 0x15c92cc6
ikev2_next_payload: length 37 nextpayload CERT
ikev2_next_payload: length 1070 nextpayload AUTH
ikev2_next_payload: length 280 nextpayload CP
ikev2_next_payload: length 8 nextpayload NOTIFY
ikev2_add_notify: done
ikev2_next_payload: length 8 nextpayload NOTIFY
ikev2_add_notify: done
ikev2_next_payload: length 8 nextpayload SA
ikev2_add_proposals: length 40
ikev2_next_payload: length 44 nextpayload TSi
ikev2_next_payload: length 24 nextpayload TSr
ikev2_next_payload: length 24 nextpayload NONE
ikev2_next_payload: length 1540 nextpayload IDr
ikev2_msg_encrypt: decrypted length 1503
25000025 03000000 73617261 73776174 69406361 2e74656c 65636f6d 6c6f6262
792e636f 6d270004 2e043082 04253082 030da003 02010202 082d419f 457a3999
7e300d06 092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652
311a3018 06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014
06035504 070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54
656c6563 6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06
03550403 0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130
32313230 39313934 355a170d 32323032 31323039 31393435 5a307331 0b300906
03550406 13025553 310e300c 06035504 080c0554 65786173 310f300d 06035504
070c0644 616c6c61 73311630 14060355 040a0c0d 54656c65 636f6d20 4c6f6262
79310d30 0b060355 040b0c04 56504e43 311c301a 06035504 030c1375 732e7465
6c65636f 6d6c6f62 62792e63 6f6d3082 0122300d 06092a86 4886f70d 01010105
00038201 0f003082 010a0282 010100c7 84ffdbc6 ca9aab05 55975ce7 484c5f8b
5417aa70 0ac36cd1 e397ed2e e4eef84c 596f06c3 c5fa2144 26587d21 cefc5efc
87bda9d6 ab329460 9275ff9c 40792a2b 4873e34a 6c797f37 4c14f906 b9bf6a5b
fef940de 51b065be 749b0274 50bbc0e2 762254fa b93ae31d 51d15d6f 390cdd31
12cfea40 fea65853 323bf49a 99bbe29d e6dc6c42 a43889f7 d125f105 68c9a35c
afb594ef 78bc12e7 ac8186ac 32f2b242 b0931f67 b67c3509 108e50c8 57c14a6f
99adddbb 8ff09f38 c1344641 15cc086b 0a7f3656 c52914e9 284774ce 82aac909
39d5e327 b0cdbf3c 22f8644c ec88f1a1 e44be4ac 5dc761cb be9bd51b 5b757c1e
1eebc42a 00337ed0 c1f90476 f6447502 03010001 a381a830 81a53013 0603551d
25040c30 0a06082b 06010505 07030230 1d060355 1d0e0416 041403e0 e5527553
00f35eb7 ff71c90b cd94778d a6c4301f 0603551d 23041830 1680142a c5939e9b
0361a9a9 b61eb388 3d40c58e e44f5030 28060355 1d110421 301f811d 73617261
73776174 69406361 2e74656c 65636f6d 6c6f6262 792e636f 6d302406 09608648
0186f842 010d0417 16154765 6e657261 74656420 62792052 6f757465 724f5330
0d06092a 864886f7 0d01010b 05000382 01010028 d73860f9 b6fe28fc e31f9381
6f2e3957 0762ef66 5d53ae0d 1c248650 83c845d7 4f3166a9 199a034d b37d826e
06c893f2 97848d79 3c2cb200 fb35ecfd 38dffe92 6862680a 61453918 2c17b83a
7b118f89 550aab8f ce59d05a 1aa2182c 5aa39c9a a04e88a5 0faac7cf aab46b51
e223be57 c3bbaa72 7546c67b b30062c4 db14e86c 058ad002 13e38ee4 d586b2bc
9d640bc4 21d6ec33 cbc3a066 df6bcb65 a5df7292 12a519e1 71784460 0b99a4e0
0234a29e 245440f2 1cfb1128 2b680441 a12e3da2 3ee16467 b6f1ede2 0e2259ae
0235c1f0 feb64808 4db676d5 3cbf1451 214948d2 99288835 9c46d2b0 e98b0fac
ca745b4a 3882e778 2f85e8eb 8fc5e406 736b8a2f 0001180e 0000000f 300d0609
2a864886 f70d0101 0b0500a1 ad203756 08e8bf95 a644250c a72c2e08 95b40311
23aa0f57 ddede788 a7c5d57c c8a5e852 13be661d 049db647 ddccac99 acbeab37
1d0a6b61 1a7084fb 5550d19e 4b84ad40 6048bc9d 8bdc8aba f646d800 177a3c34
54729a77 0e95bc75 4706eacc be9418da 5c62cd75 e6402f6f 7b7f67b9 9b45cd0a
54e193fe 2128d002 c65341ac 683194c8 493ab0d2 3e96a269 37ec086b 53b68378
20fd3a63 af3e9e99 f817ed57 256aa7cf f3d80bfd 41dec827 bf61ddaa b5fef960
3c364f16 1736a468 3089621e 1f75e5c1 b505c190 c36d9e37 87bcd3d6 e267447f
5e32b121 5e70bcf0 4319b6a5 f7704241 490269fe cd62e256 df4f191f 32581803
f2167696 e366dbd1 81b12829 00000802 00000029 00000800 00400721 00000800
00400c2c 00002c00 00002801 03040315 c92cc603 00000c01 00000c80 0e010003
00000803 00000c00 00000805 0000002d 00001801 00000007 2f001000 00ffff51
2c202f51 2c202f00 00001801 00000007 2f001000 00ffff9b 8af71b9b 8af71b
ikev2_msg_encrypt: padded length 1504
25000025 03000000 73617261 73776174 69406361 2e74656c 65636f6d 6c6f6262
792e636f 6d270004 2e043082 04253082 030da003 02010202 082d419f 457a3999
7e300d06 092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652
311a3018 06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014
06035504 070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54
656c6563 6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06
03550403 0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130
32313230 39313934 355a170d 32323032 31323039 31393435 5a307331 0b300906
03550406 13025553 310e300c 06035504 080c0554 65786173 310f300d 06035504
070c0644 616c6c61 73311630 14060355 040a0c0d 54656c65 636f6d20 4c6f6262
79310d30 0b060355 040b0c04 56504e43 311c301a 06035504 030c1375 732e7465
6c65636f 6d6c6f62 62792e63 6f6d3082 0122300d 06092a86 4886f70d 01010105
00038201 0f003082 010a0282 010100c7 84ffdbc6 ca9aab05 55975ce7 484c5f8b
5417aa70 0ac36cd1 e397ed2e e4eef84c 596f06c3 c5fa2144 26587d21 cefc5efc
87bda9d6 ab329460 9275ff9c 40792a2b 4873e34a 6c797f37 4c14f906 b9bf6a5b
fef940de 51b065be 749b0274 50bbc0e2 762254fa b93ae31d 51d15d6f 390cdd31
12cfea40 fea65853 323bf49a 99bbe29d e6dc6c42 a43889f7 d125f105 68c9a35c
afb594ef 78bc12e7 ac8186ac 32f2b242 b0931f67 b67c3509 108e50c8 57c14a6f
99adddbb 8ff09f38 c1344641 15cc086b 0a7f3656 c52914e9 284774ce 82aac909
39d5e327 b0cdbf3c 22f8644c ec88f1a1 e44be4ac 5dc761cb be9bd51b 5b757c1e
1eebc42a 00337ed0 c1f90476 f6447502 03010001 a381a830 81a53013 0603551d
25040c30 0a06082b 06010505 07030230 1d060355 1d0e0416 041403e0 e5527553
00f35eb7 ff71c90b cd94778d a6c4301f 0603551d 23041830 1680142a c5939e9b
0361a9a9 b61eb388 3d40c58e e44f5030 28060355 1d110421 301f811d 73617261
73776174 69406361 2e74656c 65636f6d 6c6f6262 792e636f 6d302406 09608648
0186f842 010d0417 16154765 6e657261 74656420 62792052 6f757465 724f5330
0d06092a 864886f7 0d01010b 05000382 01010028 d73860f9 b6fe28fc e31f9381
6f2e3957 0762ef66 5d53ae0d 1c248650 83c845d7 4f3166a9 199a034d b37d826e
06c893f2 97848d79 3c2cb200 fb35ecfd 38dffe92 6862680a 61453918 2c17b83a
7b118f89 550aab8f ce59d05a 1aa2182c 5aa39c9a a04e88a5 0faac7cf aab46b51
e223be57 c3bbaa72 7546c67b b30062c4 db14e86c 058ad002 13e38ee4 d586b2bc
9d640bc4 21d6ec33 cbc3a066 df6bcb65 a5df7292 12a519e1 71784460 0b99a4e0
0234a29e 245440f2 1cfb1128 2b680441 a12e3da2 3ee16467 b6f1ede2 0e2259ae
0235c1f0 feb64808 4db676d5 3cbf1451 214948d2 99288835 9c46d2b0 e98b0fac
ca745b4a 3882e778 2f85e8eb 8fc5e406 736b8a2f 0001180e 0000000f 300d0609
2a864886 f70d0101 0b0500a1 ad203756 08e8bf95 a644250c a72c2e08 95b40311
23aa0f57 ddede788 a7c5d57c c8a5e852 13be661d 049db647 ddccac99 acbeab37
1d0a6b61 1a7084fb 5550d19e 4b84ad40 6048bc9d 8bdc8aba f646d800 177a3c34
54729a77 0e95bc75 4706eacc be9418da 5c62cd75 e6402f6f 7b7f67b9 9b45cd0a
54e193fe 2128d002 c65341ac 683194c8 493ab0d2 3e96a269 37ec086b 53b68378
20fd3a63 af3e9e99 f817ed57 256aa7cf f3d80bfd 41dec827 bf61ddaa b5fef960
3c364f16 1736a468 3089621e 1f75e5c1 b505c190 c36d9e37 87bcd3d6 e267447f
5e32b121 5e70bcf0 4319b6a5 f7704241 490269fe cd62e256 df4f191f 32581803
f2167696 e366dbd1 81b12829 00000802 00000029 00000800 00400721 00000800
00400c2c 00002c00 00002801 03040315 c92cc603 00000c01 00000c80 0e010003
00000803 00000c00 00000805 0000002d 00001801 00000007 2f001000 00ffff51
2c202f51 2c202f00 00001801 00000007 2f001000 00ffff9b 8af71b9b 8af71b00
ikev2_msg_encrypt: length 1504, padding 0, output length 1536
a6a752d6 e1549dcb 49518dc4 2b8d34d4 08bb2cd7 f12a36be 5c422dd3 e99f461e
228d49be 4e182aaa 185c2dcc b8ca6c0c da007f8e 2a14a761 6505d770 297e7ae4
5ca1777c 115d5b31 ef514716 48ddd96f 97ddca65 014ea722 c4189519 54662d86
f352874a e1275f05 33f0fc33 d34a757e bf5a0b6c c7631a6f 0aee4ffc a64988b6
e7bfe1f5 f8363fa6 7d380965 f2c2d676 ac8e986d 8cac825a d0d3956b 6780cc02
8119d49d fb23e24a 30baf8e6 39be476a 4c33ddd7 14c5b78c c4ae9bce 193c73d9
f050ed08 11b4a90c 18163ce6 71204a91 ba92ea6c f4cb678a 7d41bcd7 24d19d69
b0cdced0 5c515973 387a27b9 ed9ad001 e1603ff6 c0a267b7 034d3a7e 02e87540
3a948da4 81d9b501 58bffb9c 084a903c 8ff0d7fc e6b6d3eb 33dbfcfd 470a77bb
d841a227 747ef48c 6d7be20d 6288c86c 4fb6cdd1 cfaf759b fe307b1f 5afd176b
a24ead98 b6d78f69 90d47367 ccfe4a12 e6f9b094 ce7352d5 b29440a7 d469de4c
c77c77b1 ab394f6f e3650a7c 6ecb5db0 7950742b be1e1043 2f9bd579 48e0a728
2b82cfe1 e7739ed3 e61c2706 2620fd58 be3850ac 88e162aa 1b4980ae e427bf48
bc1d5714 faf96f43 b4833c11 74e97043 e2dc4467 792cbde6 36a1f262 35f54774
3dec4326 00e022dd 9e503582 602c901f e844c261 89758816 1847c837 a3c34f7b
09ca99ec ed06abf0 ad2ef504 48bdffb3 e70b8b01 2ea40183 15ddd188 ad06e908
ef4dfdaf ad464c0a 99e422d9 d5170ca3 a594c5fe a0aedb03 abf692b8 81869972
7be78c86 4f0aa5a7 40d27ed8 78b2861a eddd59cd 35e71df1 ebcb924f 461e3934
78be8780 310b9d6a 9c282c6e b5d7d14f 6f266343 0eb98bc4 c7354a59 139a2f85
5f2c2cc1 88f074cd 276382a2 d64a8de7 78469b84 b14f391a fee90b6f c6bdb3b4
ccb0be6b f2ebd711 aff0201f 55e9b28d 58e016d9 6a6a1cde fdf3ccee 6bb0b1af
041cdf00 1f561499 b0192a8e 1fee1f3d e0448ebf 9b356ae4 a5de9d96 04f76ef1
2e2e34a4 f61f27a1 ff6d0855 ac365be3 91786828 5a751dfa 8035d9bf 882ea2a6
5aa10d66 676a9855 89a7477f d445ac29 f92766f2 300122bf 6b8b2ef0 153158e3
02bbf851 c56917ed f920111f ad17825f 002ea8e1 8ace0476 6ae6b050 5869f5f6
eb670675 33986715 e7fa9337 531a9dd5 c45f50e4 af5ff151 57b00392 e6fadbfe
b56c92e0 436c1705 577c2e9c ee60963d 5fe47a08 32dd8dcf 661a9758 2b5f5ea9
b56beb56 e416fcec da6a7d81 efbc62f4 22430986 4366aa7e e07549cb 107e98eb
3a413d1c 0b77c190 228751e8 41000cf8 aaae72e2 efc0fb53 9627893f dc0f7b31
ed690696 f33fedd9 9ece214a 5746fbc3 9bed46ef 8f491bfe 2cb25481 f24f2be8
864de508 7b1c183e a5e36104 bc281366 0166fa76 99ebe3bb fb57e763 8d1b142e
66c558b7 6621791f c5377dad 95fb9c5e daa3e0fe 47685067 3893ff36 36e93f44
b0f81e71 f5a13673 62fbb537 3ddf5938 51b795ad 5dc43086 c7358435 c6613977
09a150f8 060b206a 55bd6962 a1bde382 4610c59f 47506c76 0a9de946 dc4fc0d9
5f4f0793 1a6cdbc4 4446c3c9 124e40c1 be0368f7 4ba84114 6cf632f0 ae1d4a11
b2178d11 a1dcf03d 09a6f49c cdd66215 3c7cba51 8393427d 32fd356c 9a0c6cfb
bd920a47 8daa8348 e80a1c46 3e2011a1 afed128c 2fefd140 c67558a3 f8588e41
1b9e191c a3e55328 ff19e330 4effaebe 457243d9 9d5beff1 896f8057 469a526e
99930122 ba7529ce 3125e5a5 e5056a46 3ff6e6a1 aca6fa04 62a4a38f 5b9b5e4e
caad06db c5c9603b 4f7f2994 88bae7fe e71962db b8636ad7 d90fa90c ba85b59f
015d6052 34777c2b df56913c b48a52b1 4685de6b 4673a9dd a07d3712 6bc3c190
03c9a944 889038bd 4b38b2fc bc282452 a4a19498 cfd76ab4 22f3054f 7b99a552
9ee49438 0072ed29 10739caf 751dbe65 0c839186 e25624ce 0704103a 94e1df67
233da2a5 c3512fa2 1d42638f 2a59b0ba 95124798 8ea8f4f0 f59638a7 c480d079
8c94e51c 326c40e9 33bb781a c3632955 ddc8a71b 7d5a4aa7 732ddedc dd01930f
d44b1032 2f40163b 2d8e0a46 90a61964 efac2e7c 810d1e1d bc41ee23 c368f7bb
dfb401d4 0b91b1ab 9a6a6821 46d83131 7e8183c7 d2d16b35 79e1963e 9d8b6702
75d339ea c92005b2 c7fdf71f d6db09ec 00000000 00000000 00000000 00000000
ikev2_msg_integr: message length 1568
0469346d af3de27d 0d2bd80b 33716e8b 2e202320 00000001 00000620 24000604
a6a752d6 e1549dcb 49518dc4 2b8d34d4 08bb2cd7 f12a36be 5c422dd3 e99f461e
228d49be 4e182aaa 185c2dcc b8ca6c0c da007f8e 2a14a761 6505d770 297e7ae4
5ca1777c 115d5b31 ef514716 48ddd96f 97ddca65 014ea722 c4189519 54662d86
f352874a e1275f05 33f0fc33 d34a757e bf5a0b6c c7631a6f 0aee4ffc a64988b6
e7bfe1f5 f8363fa6 7d380965 f2c2d676 ac8e986d 8cac825a d0d3956b 6780cc02
8119d49d fb23e24a 30baf8e6 39be476a 4c33ddd7 14c5b78c c4ae9bce 193c73d9
f050ed08 11b4a90c 18163ce6 71204a91 ba92ea6c f4cb678a 7d41bcd7 24d19d69
b0cdced0 5c515973 387a27b9 ed9ad001 e1603ff6 c0a267b7 034d3a7e 02e87540
3a948da4 81d9b501 58bffb9c 084a903c 8ff0d7fc e6b6d3eb 33dbfcfd 470a77bb
d841a227 747ef48c 6d7be20d 6288c86c 4fb6cdd1 cfaf759b fe307b1f 5afd176b
a24ead98 b6d78f69 90d47367 ccfe4a12 e6f9b094 ce7352d5 b29440a7 d469de4c
c77c77b1 ab394f6f e3650a7c 6ecb5db0 7950742b be1e1043 2f9bd579 48e0a728
2b82cfe1 e7739ed3 e61c2706 2620fd58 be3850ac 88e162aa 1b4980ae e427bf48
bc1d5714 faf96f43 b4833c11 74e97043 e2dc4467 792cbde6 36a1f262 35f54774
3dec4326 00e022dd 9e503582 602c901f e844c261 89758816 1847c837 a3c34f7b
09ca99ec ed06abf0 ad2ef504 48bdffb3 e70b8b01 2ea40183 15ddd188 ad06e908
ef4dfdaf ad464c0a 99e422d9 d5170ca3 a594c5fe a0aedb03 abf692b8 81869972
7be78c86 4f0aa5a7 40d27ed8 78b2861a eddd59cd 35e71df1 ebcb924f 461e3934
78be8780 310b9d6a 9c282c6e b5d7d14f 6f266343 0eb98bc4 c7354a59 139a2f85
5f2c2cc1 88f074cd 276382a2 d64a8de7 78469b84 b14f391a fee90b6f c6bdb3b4
ccb0be6b f2ebd711 aff0201f 55e9b28d 58e016d9 6a6a1cde fdf3ccee 6bb0b1af
041cdf00 1f561499 b0192a8e 1fee1f3d e0448ebf 9b356ae4 a5de9d96 04f76ef1
2e2e34a4 f61f27a1 ff6d0855 ac365be3 91786828 5a751dfa 8035d9bf 882ea2a6
5aa10d66 676a9855 89a7477f d445ac29 f92766f2 300122bf 6b8b2ef0 153158e3
02bbf851 c56917ed f920111f ad17825f 002ea8e1 8ace0476 6ae6b050 5869f5f6
eb670675 33986715 e7fa9337 531a9dd5 c45f50e4 af5ff151 57b00392 e6fadbfe
b56c92e0 436c1705 577c2e9c ee60963d 5fe47a08 32dd8dcf 661a9758 2b5f5ea9
b56beb56 e416fcec da6a7d81 efbc62f4 22430986 4366aa7e e07549cb 107e98eb
3a413d1c 0b77c190 228751e8 41000cf8 aaae72e2 efc0fb53 9627893f dc0f7b31
ed690696 f33fedd9 9ece214a 5746fbc3 9bed46ef 8f491bfe 2cb25481 f24f2be8
864de508 7b1c183e a5e36104 bc281366 0166fa76 99ebe3bb fb57e763 8d1b142e
66c558b7 6621791f c5377dad 95fb9c5e daa3e0fe 47685067 3893ff36 36e93f44
b0f81e71 f5a13673 62fbb537 3ddf5938 51b795ad 5dc43086 c7358435 c6613977
09a150f8 060b206a 55bd6962 a1bde382 4610c59f 47506c76 0a9de946 dc4fc0d9
5f4f0793 1a6cdbc4 4446c3c9 124e40c1 be0368f7 4ba84114 6cf632f0 ae1d4a11
b2178d11 a1dcf03d 09a6f49c cdd66215 3c7cba51 8393427d 32fd356c 9a0c6cfb
bd920a47 8daa8348 e80a1c46 3e2011a1 afed128c 2fefd140 c67558a3 f8588e41
1b9e191c a3e55328 ff19e330 4effaebe 457243d9 9d5beff1 896f8057 469a526e
99930122 ba7529ce 3125e5a5 e5056a46 3ff6e6a1 aca6fa04 62a4a38f 5b9b5e4e
caad06db c5c9603b 4f7f2994 88bae7fe e71962db b8636ad7 d90fa90c ba85b59f
015d6052 34777c2b df56913c b48a52b1 4685de6b 4673a9dd a07d3712 6bc3c190
03c9a944 889038bd 4b38b2fc bc282452 a4a19498 cfd76ab4 22f3054f 7b99a552
9ee49438 0072ed29 10739caf 751dbe65 0c839186 e25624ce 0704103a 94e1df67
233da2a5 c3512fa2 1d42638f 2a59b0ba 95124798 8ea8f4f0 f59638a7 c480d079
8c94e51c 326c40e9 33bb781a c3632955 ddc8a71b 7d5a4aa7 732ddedc dd01930f
d44b1032 2f40163b 2d8e0a46 90a61964 efac2e7c 810d1e1d bc41ee23 c368f7bb
dfb401d4 0b91b1ab 9a6a6821 46d83131 7e8183c7 d2d16b35 79e1963e 9d8b6702
75d339ea c92005b2 c7fdf71f d6db09ec 00000000 00000000 00000000 00000000
ikev2_msg_integr: integrity checksum length 16
619120f7 dd187aa4 9edaaf0d 901701c4 875b992f af439f91 a7fc3c59 1920b751
ikev2_pld_parse: header ispi 0x0469346daf3de27d rspi 0x0d2bd80b33716e8b nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1568 response 1
ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1540
ikev2_msg_decrypt: IV length 16
a6a752d6 e1549dcb 49518dc4 2b8d34d4
ikev2_msg_decrypt: encrypted payload length 1504
08bb2cd7 f12a36be 5c422dd3 e99f461e 228d49be 4e182aaa 185c2dcc b8ca6c0c
da007f8e 2a14a761 6505d770 297e7ae4 5ca1777c 115d5b31 ef514716 48ddd96f
97ddca65 014ea722 c4189519 54662d86 f352874a e1275f05 33f0fc33 d34a757e
bf5a0b6c c7631a6f 0aee4ffc a64988b6 e7bfe1f5 f8363fa6 7d380965 f2c2d676
ac8e986d 8cac825a d0d3956b 6780cc02 8119d49d fb23e24a 30baf8e6 39be476a
4c33ddd7 14c5b78c c4ae9bce 193c73d9 f050ed08 11b4a90c 18163ce6 71204a91
ba92ea6c f4cb678a 7d41bcd7 24d19d69 b0cdced0 5c515973 387a27b9 ed9ad001
e1603ff6 c0a267b7 034d3a7e 02e87540 3a948da4 81d9b501 58bffb9c 084a903c
8ff0d7fc e6b6d3eb 33dbfcfd 470a77bb d841a227 747ef48c 6d7be20d 6288c86c
4fb6cdd1 cfaf759b fe307b1f 5afd176b a24ead98 b6d78f69 90d47367 ccfe4a12
e6f9b094 ce7352d5 b29440a7 d469de4c c77c77b1 ab394f6f e3650a7c 6ecb5db0
7950742b be1e1043 2f9bd579 48e0a728 2b82cfe1 e7739ed3 e61c2706 2620fd58
be3850ac 88e162aa 1b4980ae e427bf48 bc1d5714 faf96f43 b4833c11 74e97043
e2dc4467 792cbde6 36a1f262 35f54774 3dec4326 00e022dd 9e503582 602c901f
e844c261 89758816 1847c837 a3c34f7b 09ca99ec ed06abf0 ad2ef504 48bdffb3
e70b8b01 2ea40183 15ddd188 ad06e908 ef4dfdaf ad464c0a 99e422d9 d5170ca3
a594c5fe a0aedb03 abf692b8 81869972 7be78c86 4f0aa5a7 40d27ed8 78b2861a
eddd59cd 35e71df1 ebcb924f 461e3934 78be8780 310b9d6a 9c282c6e b5d7d14f
6f266343 0eb98bc4 c7354a59 139a2f85 5f2c2cc1 88f074cd 276382a2 d64a8de7
78469b84 b14f391a fee90b6f c6bdb3b4 ccb0be6b f2ebd711 aff0201f 55e9b28d
58e016d9 6a6a1cde fdf3ccee 6bb0b1af 041cdf00 1f561499 b0192a8e 1fee1f3d
e0448ebf 9b356ae4 a5de9d96 04f76ef1 2e2e34a4 f61f27a1 ff6d0855 ac365be3
91786828 5a751dfa 8035d9bf 882ea2a6 5aa10d66 676a9855 89a7477f d445ac29
f92766f2 300122bf 6b8b2ef0 153158e3 02bbf851 c56917ed f920111f ad17825f
002ea8e1 8ace0476 6ae6b050 5869f5f6 eb670675 33986715 e7fa9337 531a9dd5
c45f50e4 af5ff151 57b00392 e6fadbfe b56c92e0 436c1705 577c2e9c ee60963d
5fe47a08 32dd8dcf 661a9758 2b5f5ea9 b56beb56 e416fcec da6a7d81 efbc62f4
22430986 4366aa7e e07549cb 107e98eb 3a413d1c 0b77c190 228751e8 41000cf8
aaae72e2 efc0fb53 9627893f dc0f7b31 ed690696 f33fedd9 9ece214a 5746fbc3
9bed46ef 8f491bfe 2cb25481 f24f2be8 864de508 7b1c183e a5e36104 bc281366
0166fa76 99ebe3bb fb57e763 8d1b142e 66c558b7 6621791f c5377dad 95fb9c5e
daa3e0fe 47685067 3893ff36 36e93f44 b0f81e71 f5a13673 62fbb537 3ddf5938
51b795ad 5dc43086 c7358435 c6613977 09a150f8 060b206a 55bd6962 a1bde382
4610c59f 47506c76 0a9de946 dc4fc0d9 5f4f0793 1a6cdbc4 4446c3c9 124e40c1
be0368f7 4ba84114 6cf632f0 ae1d4a11 b2178d11 a1dcf03d 09a6f49c cdd66215
3c7cba51 8393427d 32fd356c 9a0c6cfb bd920a47 8daa8348 e80a1c46 3e2011a1
afed128c 2fefd140 c67558a3 f8588e41 1b9e191c a3e55328 ff19e330 4effaebe
457243d9 9d5beff1 896f8057 469a526e 99930122 ba7529ce 3125e5a5 e5056a46
3ff6e6a1 aca6fa04 62a4a38f 5b9b5e4e caad06db c5c9603b 4f7f2994 88bae7fe
e71962db b8636ad7 d90fa90c ba85b59f 015d6052 34777c2b df56913c b48a52b1
4685de6b 4673a9dd a07d3712 6bc3c190 03c9a944 889038bd 4b38b2fc bc282452
a4a19498 cfd76ab4 22f3054f 7b99a552 9ee49438 0072ed29 10739caf 751dbe65
0c839186 e25624ce 0704103a 94e1df67 233da2a5 c3512fa2 1d42638f 2a59b0ba
95124798 8ea8f4f0 f59638a7 c480d079 8c94e51c 326c40e9 33bb781a c3632955
ddc8a71b 7d5a4aa7 732ddedc dd01930f d44b1032 2f40163b 2d8e0a46 90a61964
efac2e7c 810d1e1d bc41ee23 c368f7bb dfb401d4 0b91b1ab 9a6a6821 46d83131
7e8183c7 d2d16b35 79e1963e 9d8b6702 75d339ea c92005b2 c7fdf71f d6db09ec
ikev2_msg_decrypt: integrity checksum length 16
619120f7 dd187aa4 9edaaf0d 901701c4
ikev2_msg_decrypt: integrity check succeeded
619120f7 dd187aa4 9edaaf0d 901701c4
ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 0
25000025 03000000 73617261 73776174 69406361 2e74656c 65636f6d 6c6f6262
792e636f 6d270004 2e043082 04253082 030da003 02010202 082d419f 457a3999
7e300d06 092a8648 86f70d01 010b0500 30818631 0b300906 03550406 13024652
311a3018 06035504 080c1153 65696e65 2d536169 6e742d44 656e6973 31163014
06035504 070c0d41 75626572 76696c6c 69657273 31163014 06035504 0a0c0d54
656c6563 6f6d204c 6f626279 310d300b 06035504 0b0c0456 504e4331 1c301a06
03550403 0c136361 2e74656c 65636f6d 6c6f6262 792e636f 6d301e17 0d323130
32313230 39313934 355a170d 32323032 31323039 31393435 5a307331 0b300906
03550406 13025553 310e300c 06035504 080c0554 65786173 310f300d 06035504
070c0644 616c6c61 73311630 14060355 040a0c0d 54656c65 636f6d20 4c6f6262
79310d30 0b060355 040b0c04 56504e43 311c301a 06035504 030c1375 732e7465
6c65636f 6d6c6f62 62792e63 6f6d3082 0122300d 06092a86 4886f70d 01010105
00038201 0f003082 010a0282 010100c7 84ffdbc6 ca9aab05 55975ce7 484c5f8b
5417aa70 0ac36cd1 e397ed2e e4eef84c 596f06c3 c5fa2144 26587d21 cefc5efc
87bda9d6 ab329460 9275ff9c 40792a2b 4873e34a 6c797f37 4c14f906 b9bf6a5b
fef940de 51b065be 749b0274 50bbc0e2 762254fa b93ae31d 51d15d6f 390cdd31
12cfea40 fea65853 323bf49a 99bbe29d e6dc6c42 a43889f7 d125f105 68c9a35c
afb594ef 78bc12e7 ac8186ac 32f2b242 b0931f67 b67c3509 108e50c8 57c14a6f
99adddbb 8ff09f38 c1344641 15cc086b 0a7f3656 c52914e9 284774ce 82aac909
39d5e327 b0cdbf3c 22f8644c ec88f1a1 e44be4ac 5dc761cb be9bd51b 5b757c1e
1eebc42a 00337ed0 c1f90476 f6447502 03010001 a381a830 81a53013 0603551d
25040c30 0a06082b 06010505 07030230 1d060355 1d0e0416 041403e0 e5527553
00f35eb7 ff71c90b cd94778d a6c4301f 0603551d 23041830 1680142a c5939e9b
0361a9a9 b61eb388 3d40c58e e44f5030 28060355 1d110421 301f811d 73617261
73776174 69406361 2e74656c 65636f6d 6c6f6262 792e636f 6d302406 09608648
0186f842 010d0417 16154765 6e657261 74656420 62792052 6f757465 724f5330
0d06092a 864886f7 0d01010b 05000382 01010028 d73860f9 b6fe28fc e31f9381
6f2e3957 0762ef66 5d53ae0d 1c248650 83c845d7 4f3166a9 199a034d b37d826e
06c893f2 97848d79 3c2cb200 fb35ecfd 38dffe92 6862680a 61453918 2c17b83a
7b118f89 550aab8f ce59d05a 1aa2182c 5aa39c9a a04e88a5 0faac7cf aab46b51
e223be57 c3bbaa72 7546c67b b30062c4 db14e86c 058ad002 13e38ee4 d586b2bc
9d640bc4 21d6ec33 cbc3a066 df6bcb65 a5df7292 12a519e1 71784460 0b99a4e0
0234a29e 245440f2 1cfb1128 2b680441 a12e3da2 3ee16467 b6f1ede2 0e2259ae
0235c1f0 feb64808 4db676d5 3cbf1451 214948d2 99288835 9c46d2b0 e98b0fac
ca745b4a 3882e778 2f85e8eb 8fc5e406 736b8a2f 0001180e 0000000f 300d0609
2a864886 f70d0101 0b0500a1 ad203756 08e8bf95 a644250c a72c2e08 95b40311
23aa0f57 ddede788 a7c5d57c c8a5e852 13be661d 049db647 ddccac99 acbeab37
1d0a6b61 1a7084fb 5550d19e 4b84ad40 6048bc9d 8bdc8aba f646d800 177a3c34
54729a77 0e95bc75 4706eacc be9418da 5c62cd75 e6402f6f 7b7f67b9 9b45cd0a
54e193fe 2128d002 c65341ac 683194c8 493ab0d2 3e96a269 37ec086b 53b68378
20fd3a63 af3e9e99 f817ed57 256aa7cf f3d80bfd 41dec827 bf61ddaa b5fef960
3c364f16 1736a468 3089621e 1f75e5c1 b505c190 c36d9e37 87bcd3d6 e267447f
5e32b121 5e70bcf0 4319b6a5 f7704241 490269fe cd62e256 df4f191f 32581803
f2167696 e366dbd1 81b12829 00000802 00000029 00000800 00400721 00000800
00400c2c 00002c00 00002801 03040315 c92cc603 00000c01 00000c80 0e010003
00000803 00000c00 00000805 0000002d 00001801 00000007 2f001000 00ffff51
2c202f51 2c202f00 00001801 00000007 2f001000 00ffff9b 8af71b9b 8af71b00
ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 37
ikev2_pld_id: id UFQDN/-->HOSTNAME-US<---@-->CA<--- length 33
ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 length 1070
ikev2_pld_cert: type X509_CERT length 1065
30820425 3082030d a0030201 0202082d 419f457a 39997e30 0d06092a 864886f7
0d01010b 05003081 86310b30 09060355 04061302 4652311a 30180603 5504080c
11536569 6e652d53 61696e74 2d44656e 69733116 30140603 5504070c 0d417562
65727669 6c6c6965 72733116 30140603 55040a0c 0d54656c 65636f6d 204c6f62
6279310d 300b0603 55040b0c 0456504e 43311c30 1a060355 04030c13 63612e74
656c6563 6f6d6c6f 6262792e 636f6d30 1e170d32 31303231 32303931 3934355a
170d3232 30323132 30393139 34355a30 73310b30 09060355 04061302 5553310e
300c0603 5504080c 05546578 6173310f 300d0603 5504070c 0644616c 6c617331
16301406 0355040a 0c0d5465 6c65636f 6d204c6f 62627931 0d300b06 0355040b
0c045650 4e43311c 301a0603 5504030c 1375732e 74656c65 636f6d6c 6f626279
2e636f6d 30820122 300d0609 2a864886 f70d0101 01050003 82010f00 3082010a
02820101 00c784ff dbc6ca9a ab055597 5ce7484c 5f8b5417 aa700ac3 6cd1e397
ed2ee4ee f84c596f 06c3c5fa 21442658 7d21cefc 5efc87bd a9d6ab32 94609275
ff9c4079 2a2b4873 e34a6c79 7f374c14 f906b9bf 6a5bfef9 40de51b0 65be749b
027450bb c0e27622 54fab93a e31d51d1 5d6f390c dd3112cf ea40fea6 5853323b
f49a99bb e29de6dc 6c42a438 89f7d125 f10568c9 a35cafb5 94ef78bc 12e7ac81
86ac32f2 b242b093 1f67b67c 3509108e 50c857c1 4a6f99ad ddbb8ff0 9f38c134
464115cc 086b0a7f 3656c529 14e92847 74ce82aa c90939d5 e327b0cd bf3c22f8
644cec88 f1a1e44b e4ac5dc7 61cbbe9b d51b5b75 7c1e1eeb c42a0033 7ed0c1f9
0476f644 75020301 0001a381 a83081a5 30130603 551d2504 0c300a06 082b0601
05050703 02301d06 03551d0e 04160414 03e0e552 755300f3 5eb7ff71 c90bcd94
778da6c4 301f0603 551d2304 18301680 142ac593 9e9b0361 a9a9b61e b3883d40
c58ee44f 50302806 03551d11 0421301f 811d7361 72617377 61746940 63612e74
656c6563 6f6d6c6f 6262792e 636f6d30 24060960 86480186 f842010d 04171615
47656e65 72617465 64206279 20526f75 7465724f 53300d06 092a8648 86f70d01
010b0500 03820101 0028d738 60f9b6fe 28fce31f 93816f2e 39570762 ef665d53
ae0d1c24 865083c8 45d74f31 66a9199a 034db37d 826e06c8 93f29784 8d793c2c
b200fb35 ecfd38df fe926862 680a6145 39182c17 b83a7b11 8f89550a ab8fce59
d05a1aa2 182c5aa3 9c9aa04e 88a50faa c7cfaab4 6b51e223 be57c3bb aa727546
c67bb300 62c4db14 e86c058a d00213e3 8ee4d586 b2bc9d64 0bc421d6 ec33cbc3
a066df6b cb65a5df 729212a5 19e17178 44600b99 a4e00234 a29e2454 40f21cfb
11282b68 0441a12e 3da23ee1 6467b6f1 ede20e22 59ae0235 c1f0feb6 48084db6
76d53cbf 14512149 48d29928 88359c46 d2b0e98b 0facca74 5b4a3882 e7782f85
e8eb8fc5 e406736b 8a
ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 280
ikev2_pld_auth: method SIG length 272
0f300d06 092a8648 86f70d01 010b0500 a1ad2037 5608e8bf 95a64425 0ca72c2e
0895b403 1123aa0f 57ddede7 88a7c5d5 7cc8a5e8 5213be66 1d049db6 47ddccac
99acbeab 371d0a6b 611a7084 fb5550d1 9e4b84ad 406048bc 9d8bdc8a baf646d8
00177a3c 3454729a 770e95bc 754706ea ccbe9418 da5c62cd 75e6402f 6f7b7f67
b99b45cd 0a54e193 fe2128d0 02c65341 ac683194 c8493ab0 d23e96a2 6937ec08
6b53b683 7820fd3a 63af3e9e 99f817ed 57256aa7 cff3d80b fd41dec8 27bf61dd
aab5fef9 603c364f 161736a4 68308962 1e1f75e5 c1b505c1 90c36d9e 3787bcd3
d6e26744 7f5e32b1 215e70bc f04319b6 a5f77042 41490269 fecd62e2 56df4f19
1f325818 03f21676 96e366db d181b128
ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_cp: type REPLY length 0
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8
ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44
ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0x15c92cc6
ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128
ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->NODE_ES<-- end -->NODE_ES<--
ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24
ikev2_pld_tss: count 1 length 16
ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport 0 endport 65535
ikev2_pld_ts: start -->HOST-US<--- end -->HOST-US<---
spi=0x0469346daf3de27d: send IKE_AUTH res 1 peer -->NODE_ES<--:4500 local -->HOST-US<---:4500, 1568 bytes, NAT-T
pfkey_sa_add: update spi 0x15c92cc6
ikev2_childsa_enable: loaded CHILD SA spi 0x15c92cc6
pfkey_sa_add: add spi 0xc977da0e
ikev2_childsa_enable: loaded CHILD SA spi 0xc977da0e
ikev2_childsa_enable: loaded flow 0x5a9867fe400
ikev2_childsa_enable: loaded flow 0x5a9cf4ec000
ikev2_childsa_enable: remember SA peer -->NODE_ES<--:4500
spi=0x0469346daf3de27d: ikev2_childsa_enable: loaded SPIs: 0x15c92cc6, 0xc977da0e
spi=0x0469346daf3de27d: ikev2_childsa_enable: loaded flows: ESP--->HOST-US<---/32=-->NODE_ES<--/32(47)
spi=0x0469346daf3de27d: sa_state: VALID -> ESTABLISHED from -->NODE_ES<--:4500 to -->HOST-US<---:4500 policy '-->HOST_ES<--'
spi=0x0469346daf3de27d: established peer -->NODE_ES<--:4500[UFQDN/-->HOSTNAME-ES<---@-->CA<---] local -->HOST-US<---:4500[UFQDN/-->HOSTNAME-US<---@-->CA<---] policy '-->HOST_ES<--' as responder
pfkey_sa_lookup: last_used 1614670222
ikev2_ike_sa_alive: incoming CHILD SA spi 0x15c92cc6 last used 0 second(s) ago
pfkey_sa_lookup: last_used 1614670236
ikev2_ike_sa_alive: incoming CHILD SA spi 0x15c92cc6 last used 1 second(s) ago
pfkey_sa_lookup: last_used 1614670252
ikev2_ike_sa_alive: incoming CHILD SA spi 0x15c92cc6 last used 0 second(s) ago
Here you are the debug of the PTP between ES and US.
I've obtained it using:
/sbin/iked -dvvv 2>&1 | /usr/bin/tee /root/iked_debug.txt
Thank you.
PS: in this debug connection drop one time.
On Mon, Mar 1, 2021 at 12:13 PM Stuart Henderson <stu@spacehopper.org>
wrote:
> Lots of information here but none of it is useful to look into the problem
> from the iked side. An iked verbose log _showing the error_ is really what
> is needed to do anything else.
>
>
> On 2021/03/01 12:05, Riccardo Giuntoli wrote:
> > Ok. I've reduced the strongswan configuration. By the way when
> connecting to an OpenIKED as
> > initiator I've got a lot of errors. Now I've got a couple of scripts
> that control the PTP IPSEC
> > IKE2 connections and I can work, but I'm preparing an ISP based upon
> IPSEC and it's very
> > important to me got a solution.
> > What I can add is that I've searched in *BSD based router/firewall
> distribution like OPNsense
> > and what I've found is that they don't use OpenIKED but strongswan.
> Strongswan seems to be the
> > piece of software more tunable. Now this is my configuration:
>
> Not surprising it is more tunable, it is nearly 20x the code size ;)
>
> > ca XXX
> > cacert=/etc/ipsec.d/cacerts/ca.XXX.crt
> > auto=add
> >
> > conn %default
> > keyexchange=ikev2
> > auto=start
> > reauth=no
> > dpdaction=clear
> > closeaction=clear
> > type=transport
> >
> > conn telecomlobby-jp
> > left=%defaultroute
> > leftsourceip=%config4
> > leftauth=pubkey
> > leftid=%indra@ca.XXX
> > leftprotoport=gre
> > leftupdown=/config/ipsec/ESJP-updown.sh
> >
> > right=YYY
> > rightsubnet=YYY
> > rightauth=pubkey
> > rightid=%jp.XXX
> > rightcert=/etc/ipsec.d/certs/jp.XXX.crt
> > rightprotoport=gre
> >
> > This is my updown:
> >
> > #!/bin/bash
> >
> > set -o nounset
> > set -o errexit
> >
> > TUN_IFACE="tun2"
> >
> > case "${PLUTO_VERB}" in
> > up-host)
> > echo "Putting interface ${TUN_IFACE} up"
> > ifconfig $TUN_IFACE up
> > echo "Disabling IPsec policy (SPD) for ${TUN_IFACE}"
> > sysctl -w "net.ipv4.conf.${TUN_IFACE}.disable_policy=1"
> > echo "Accepting gre keepalive"
> > sysctl -w "net.ipv4.conf.${TUN_IFACE}.accept_local=1"
> > ;;
> > down-host)
> > ifconfig $TUN_IFACE down
> > ;;
> > esac
> >
> > And this is my crontab script in the linux box that control the endpoint
> on the GRE interface:
> >
> > #!/bin/bash
> > ROUTER_IP=YYY
> > IPSEC="telecomlobby-jp"
> > GRE="tun2"
> >
> > PING_RESULT=$(/usr/bin/fping -I$GRE $ROUTER_IP 2>&1)
> > ALIVE="alive"
> > STATUS=$(/usr/sbin/ipsec status $IPSEC)
> > ESTABLISHED="INSTALLED"
> >
> > if [[ "$PING_RESULT" != *"$ALIVE"* ]]; then
> > if [[ "$STATUS" == *"$ESTABLISHED"* ]]; then
> > /usr/sbin/ipsec stroke down-nb $IPSEC
> > /usr/sbin/ipsec up $IPSEC
> > else
> > /usr/sbin/ipsec up $IPSEC
> > fi
> > fi
> >
> > This is the OpenBSD part:
> >
> > set dpd_check_interval 15
> > #set cert_partial_chain
> >
> > ikev2 "RT-01.cat.telecomlobby.com" passive transport \
> > proto gre \
> > from XXX to ZZZ \
> > local jp.telecomlobby.com peer any \
> > ikesa auth hmac-sha2-256 enc aes-256 group ecp256 \
> > childsa auth hmac-sha2-256 enc aes-256 group ecp256 \
> > srcid "shiva@ca.telecomlobby.com" \
> > ikelifetime 86400 lifetime 3600
> >
> > Next there is some control about the other side public address because
> it is a dynamic one:
> >
> > # Global Configuration
> >
> > init-state auto
> >
> > JPES_up = "gre1.link.up"
> > newip = '( "[[ $(dig +short @8.8.8.8 cat-01.ZZZ) != $(ifconfig gre1 |
> grep tunnel | cut -d ' '
> > -f5;exit;}\') ]]" every 126)'
> >
> > # States
> >
> > state auto {
> > if (! $JPES_up) {
> > run "logger -t ifstated '(auto) US-ES down'"
> > set-state JPES_down
> > }
> > }
> >
> >
> > state JPES_down {
> > run "mail -s 'JPES down' root@localhost"
> > run "logger JPES down"
> > if ($newip) {
> > run "/root/Bin/change_endpoint.sh gre1"
> > run "rcctl restart ospfd"
> > }
> > }
> >
> > root@shiva:/root/Bin# cat change_endpoint.sh
>
> >
>
> >
>
> > #!/bin/ksh
> >
> > NEWIP=$(dig +short @8.8.8.8 cat-01.ZZZ)
> > OLDIP=$(ifconfig $1 | grep tunnel | cut -d ' ' -f5)
> >
> > echo "updating PF"
> > sed -i 's/$OLDIP/$NEWIP/g' /etc/pf.conf
> > pfctl -f /etc/pf.conf
> > echo "updating IKED"
> > sed -i 's/$OLDIP/$NEWIP/g' /etc/iked.conf
> > ipsecctl -f /etc/iked.conf
> > echo "updating GRE"
> > sed -i 's/$OLDIP/$NEWIP/g' /etc/hostname.$1
> > ifconfig $1 destroy
> > sh /etc/netstart $1
> >
> > Connection simply drop, in log you can appreciate in the charon side:
> >
> > Mar 1 10:27:06 06[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50065}
> > Mar 1 10:28:05 14[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50066}
> > Mar 1 10:28:05 09[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50067}
> > Mar 1 10:29:05 13[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50068}
> > Mar 1 10:29:05 11[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50069}
> > Mar 1 10:30:05 06[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50070}
> > Mar 1 10:30:05 08[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50071}
> > Mar 1 10:31:06 08[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50072}
> > Mar 1 10:31:06 14[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50073}
> > Mar 1 10:32:05 08[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50074}
> > Mar 1 10:32:05 05[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50075}
> > Mar 1 10:33:06 09[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50076}
> > Mar 1 10:33:06 14[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50077}
> > Mar 1 10:34:05 07[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50078}
> > Mar 1 10:34:05 09[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50079}
> > Mar 1 10:35:06 13[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50080}
> > Mar 1 10:35:06 15[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50081}
> > Mar 1 10:36:05 15[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50083}
> > Mar 1 10:36:05 12[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50084}
> > Mar 1 10:37:06 13[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50085}
> > Mar 1 10:37:06 08[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50086}
> > Mar 1 10:38:05 13[IKE] <telecomlobby-uk|841> establishing CHILD_SA
> telecomlobby-uk{50087}
> > Mar 1 10:38:05 12[IKE] <telecomlobby-jp|842> establishing CHILD_SA
> telecomlobby-jp{50088}
> >
> > has you can see those are two of the three PTP.
> >
> > If you want I've got a pcap or access but in private.
> >
> > Nice regards,
> >
> >
> >
> >
> > On Mon, Feb 22, 2021 at 8:06 PM Tobias Heider <tobias.heider@stusta.de>
> wrote:
> >
> > On Mon, Feb 22, 2021 at 03:59:53PM +0100, Riccardo Giuntoli wrote:
> > > Ok. In the log you can appreciate.
> > >
> > > UK-HOST one OpenBSD machine connected to three openbsd, one
> mikrotik and
> > > one VyOS. The VyOS is CAT-HOST
> > >
> > > Kind regards
> >
> > The log looks fine but it doesn't seem to contain the error message
> you
> > sent earlier.
> > Can you try reproducing the bug and then send a log containing the
> error
> > message and everything that happened before?
> >
> > >
> > >
> > > On Mon, Feb 22, 2021 at 12:02 PM Stuart Henderson <
> stu@spacehopper.org>
> > > wrote:
> > >
> > > > On 2021-02-22, Riccardo Giuntoli <taglio@gmail.com> wrote:
> > > > > Ok I've got the same error on three different OpenBSD, tell me
> what error
> > > > > do you want or if you want an access.
> > > >
> > > > It would be a good start to run iked in the foreground with iked
> -vvd and
> > > > show the log from there.
> > > >
> > > >
> > > >
> > >
> > > --
> > > Name: Riccardo Giuntoli
> > > Email: taglio@gmail.com
> > > Location: sant Pere de Ribes, BCN, Spain
> > > PGP Key: 0x67123739
> > > PGP Fingerprint: CE75 16B5 D855 842FAB54 FB5C DDC6 4640 6712 3739
> > > Key server: hkp://wwwkeys.eu.pgp.net
> >
> > > create_ike: using signature for peer --FR--
> > > create_ike: using signature for peer
> > > ikev2 "--CAT-HOST--" passive transport esp proto gre inet from
> --UK-- to --CAT-- local
> > --UK-- peer any ikesa enc aes-256 prf
> hmac-sha2-256,hmac-sha2-384,hmac-sha2-512,hmac-sha1
> > auth hmac-sha2-256 group ecp256 childsa enc aes-256 auth
> hmac-sha2-256 group ecp256
> > esn,noesn srcid --UK-ID-- ikelifetime 86400 lifetime 3600 bytes
> 536870912 signature
> > > /etc/iked.conf: loaded 4 configuration rules
> > > ca_privkey_serialize: type RSA_KEY length 1191
> > > ca_pubkey_serialize: type RSA_KEY length 270
> > > ca_privkey_to_method: type RSA_KEY method RSA_SIG
> > > ca_getkey: received private key type RSA_KEY length 1191
> > > ca_getkey: received public key type RSA_KEY length 270
> > > ca_dispatch_parent: config reset
> > > ca_reload: loaded ca file ca.crt
> > > ca_reload: /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom
> Lobby/OU=VPNC/CN=
> > --CA-HOST--
> > > ca_reload: loaded 1 ca certificate
> > > ca_reload: loaded cert file --FR-HOST--.crt
> > > ca_reload: loaded cert file --UK-HOST--.crt
> > > config_getpolicy: received policy
> > > config_getpolicy: received policy
> > > config_getpolicy: received policy
> > > config_getpolicy: received policy
> > > config_getpfkey: received pfkey fd 3
> > > config_getcompile: compilation done
> > > config_getsocket: received socket fd 4
> > > config_getsocket: received socket fd 5
> > > config_getsocket: received socket fd 6
> > > config_getsocket: received socket fd 7
> > > config_getstatic: dpd_check_interval 15
> > > config_getstatic: no enforcesingleikesa
> > > config_getstatic: no fragmentation
> > > config_getstatic: mobike
> > > config_getstatic: nattport 4500
> > > ca_validate_cert:
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN=
> > --FR-HOST-- ok
> > > ca_validate_cert: /C=UK/ST=England/L=London/O=Telecom
> Lobby/OU=VPNC/CN=--UK-HOST-- ok
> > > ca_reload: local cert type X509_CERT
> > > config_getocsp: ocsp_url none tolerate 0 maxage -1
> > > ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
> > > ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xc5881d3ed32f5801: recv INFORMATIONAL req 4428 peer
> --FR--:500 local --UK--:500, 96
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xc5881d3ed32f5801 rspi 0xfcad33aa65954d8e
> > > ikev2_init_recv: unknown SA
> > > ikev2_init_ike_sa: initiating "--FR-HOST--"
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_add_proposals: length 68
> > > ikev2_next_payload: length 72 nextpayload KE
> > > ikev2_next_payload: length 104 nextpayload NONCE
> > > ikev2_next_payload: length 36 nextpayload NOTIFY
> > > ikev2_nat_detection: local source 0xf2043da59221143f
> 0x0000000000000000 --UK--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_nat_detection: local destination 0xf2043da59221143f
> 0x0000000000000000 --FR--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_next_payload: length 14 nextpayload NONE
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x0000000000000000 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 310
> response 0
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 72
> > > ikev2_pld_sa: more 0 reserved 0 length 68 proposal #1 protoid IKE
> spisize 0 xforms 7 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id HMAC_SHA1
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 104
> > > ikev2_pld_ke: dh group ECP_384 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > spi=0xf2043da59221143f: send IKE_SA_INIT req 0 peer --FR--:500
> local --UK--:500, 310
> > bytes
> > > spi=0xf2043da59221143f: sa_state: INIT -> SA_INIT
> > > ikev2_init_ike_sa: initiating "--US-HOST--"
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_add_proposals: length 36
> > > ikev2_next_payload: length 40 nextpayload KE
> > > ikev2_next_payload: length 136 nextpayload NONCE
> > > ikev2_next_payload: length 36 nextpayload NOTIFY
> > > ikev2_nat_detection: local source 0x22cd85777285bb53
> 0x0000000000000000 --UK--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_nat_detection: local destination 0x22cd85777285bb53
> 0x0000000000000000
> > --US-IP--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_next_payload: length 14 nextpayload NONE
> > > ikev2_pld_parse: header ispi 0x22cd85777285bb53 rspi
> 0x0000000000000000 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 310
> response 0
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 40
> > > ikev2_pld_sa: more 0 reserved 0 length 36 proposal #1 protoid IKE
> spisize 0 xforms 3 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 136
> > > ikev2_pld_ke: dh group BRAINPOOL_P512R1 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > spi=0x22cd85777285bb53: send IKE_SA_INIT req 0 peer --US-IP--:500
> local --UK--:500, 310
> > bytes
> > > spi=0x22cd85777285bb53: sa_state: INIT -> SA_INIT
> > > ikev2_init_ike_sa: initiating "--JP-HOST--"
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_add_proposals: length 36
> > > ikev2_next_payload: length 40 nextpayload KE
> > > ikev2_next_payload: length 136 nextpayload NONCE
> > > ikev2_next_payload: length 36 nextpayload NOTIFY
> > > ikev2_nat_detection: local source 0x67cb9c572ac8b67e
> 0x0000000000000000 --UK--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_nat_detection: local destination 0x67cb9c572ac8b67e
> 0x0000000000000000
> > --JP-IP--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_next_payload: length 14 nextpayload NONE
> > > ikev2_pld_parse: header ispi 0x67cb9c572ac8b67e rspi
> 0x0000000000000000 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 310
> response 0
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 40
> > > ikev2_pld_sa: more 0 reserved 0 length 36 proposal #1 protoid IKE
> spisize 0 xforms 3 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 136
> > > ikev2_pld_ke: dh group BRAINPOOL_P512R1 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > spi=0x67cb9c572ac8b67e: send IKE_SA_INIT req 0 peer --JP-IP--:500
> local --UK--:500, 310
> > bytes
> > > spi=0x67cb9c572ac8b67e: sa_state: INIT -> SA_INIT
> > > spi=0xf2043da59221143f: recv IKE_SA_INIT res 0 peer --FR--:500
> local --UK--:500, 213
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 213
> response 1
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 48
> > > ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_384
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 104
> > > ikev2_pld_ke: dh group ECP_384 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload CERTREQ critical
> 0x00 length 28
> > > ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00
> length 5
> > > ikev2_pld_certreq: type X509_CERT length 0
> > > ikev2_pld_certreq: invalid length 0
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > sa_stateflags: 0x0000 -> 0x0004 certreq (required 0x0009 cert,auth)
> > > proposals_negotiate: score 4
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0009 cert,auth
> > > spi=0xf2043da59221143f: ikev2_sa_keys: DHSECRET with 48 bytes
> > > ikev2_sa_keys: SKEYSEED with 32 bytes
> > > spi=0xf2043da59221143f: ikev2_sa_keys: S with 72 bytes
> > > ikev2_prfplus: T1 with 32 bytes
> > > ikev2_prfplus: T2 with 32 bytes
> > > ikev2_prfplus: T3 with 32 bytes
> > > ikev2_prfplus: T4 with 32 bytes
> > > ikev2_prfplus: T5 with 32 bytes
> > > ikev2_prfplus: T6 with 32 bytes
> > > ikev2_prfplus: T7 with 32 bytes
> > > ikev2_prfplus: Tn with 224 bytes
> > > ikev2_sa_keys: SK_d with 32 bytes
> > > ikev2_sa_keys: SK_ai with 32 bytes
> > > ikev2_sa_keys: SK_ar with 32 bytes
> > > ikev2_sa_keys: SK_ei with 32 bytes
> > > ikev2_sa_keys: SK_er with 32 bytes
> > > ikev2_sa_keys: SK_pi with 32 bytes
> > > ikev2_sa_keys: SK_pr with 32 bytes
> > > ikev2_msg_auth: initiator auth data length 366
> > > ca_setauth: switching SIG to RSA_SIG(*)
> > > ca_setauth: auth length 366
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0009 cert,auth
> > > config_free_proposals: free 0x3c27ccfe800
> > > ca_getreq: found CA
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN
> > =--CA-HOST--
> > > ca_x509_subjectaltname_do: did not find subjectAltName in
> certificate
> > > ca_getreq: found local certificate
> /C=UK/ST=England/L=London/O=Telecom Lobby/OU=VPNC/CN=
> > --UK-HOST--
> > > ca_setauth: auth length 256
> > > ikev2_getimsgdata: imsg 22 rspi 0x1f43bd64d771a4e5 ispi
> 0xf2043da59221143f initiator 1 sa
> > valid type 4 data length 1064
> > > ikev2_dispatch_cert: cert type X509_CERT length 1064, ok
> > > sa_stateflags: 0x0004 -> 0x0005 cert,certreq (required 0x0009
> cert,auth)
> > > sa_stateok: SA_INIT flags 0x0001, require 0x0009 cert,auth
> > > ikev2_getimsgdata: imsg 28 rspi 0x1f43bd64d771a4e5 ispi
> 0xf2043da59221143f initiator 1 sa
> > valid type 1 data length 256
> > > ikev2_dispatch_cert: AUTH type 1 len 256
> > > sa_stateflags: 0x0005 -> 0x000d cert,certreq,auth (required 0x0009
> cert,auth)
> > > sa_stateok: SA_INIT flags 0x0009, require 0x0009 cert,auth
> > > ikev2_next_payload: length 35 nextpayload CERT
> > > ikev2_next_payload: length 1069 nextpayload CERTREQ
> > > ikev2_add_certreq: type X509_CERT length 21
> > > ikev2_next_payload: length 25 nextpayload AUTH
> > > ikev2_next_payload: length 264 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload SA
> > > pfkey_sa_getspi: spi 0x8f3bad08
> > > pfkey_sa_init: new spi 0x8f3bad08
> > > ikev2_add_proposals: length 48
> > > ikev2_next_payload: length 52 nextpayload TSi
> > > ikev2_next_payload: length 24 nextpayload TSr
> > > ikev2_next_payload: length 24 nextpayload NONE
> > > ikev2_next_payload: length 1540 nextpayload IDi
> > > ikev2_msg_encrypt: decrypted length 1501
> > > ikev2_msg_encrypt: padded length 1504
> > > ikev2_msg_encrypt: length 1502, padding 2, output length 1536
> > > ikev2_msg_integr: message length 1568
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1568
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00
> length 1540
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 1504
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 2
> > > ikev2_pld_payloads: decrypted payload IDi nextpayload CERT
> critical 0x00 length 35
> > > ikev2_pld_id: id UFQDN/--UK-ID-- length 31
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ
> critical 0x00 length 1069
> > > ikev2_pld_cert: type X509_CERT length 1064
> > > ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH
> critical 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY
> critical 0x00 length 264
> > > ikev2_pld_auth: method RSA_SIG length 256
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 52
> > > ikev2_pld_sa: more 0 reserved 0 length 48 proposal #1 protoid ESP
> spisize 4 xforms 4 spi
> > 0x8f3bad08
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --FR-- end --FR--
> > > spi=0xf2043da59221143f: send IKE_AUTH req 1 peer --FR--:500 local
> --UK--:500, 1568 bytes
> > > spi=0xf2043da59221143f: recv IKE_AUTH res 1 peer --FR--:500 local
> --UK--:500, 1552 bytes,
> > policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1552
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload CERT critical 0x00
> length 1524
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 1488
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 1488/1488 padding 8
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload IDr
> critical 0x00 length 1084
> > > ikev2_pld_cert: type X509_CERT length 1079
> > > ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH
> critical 0x00 length 31
> > > ikev2_pld_id: id UFQDN/uma@--CA-HOST-- length 27
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload TSi
> critical 0x00 length 264
> > > ikev2_pld_auth: method RSA_SIG length 256
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload SA critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --FR-- end --FR--
> > > ikev2_pld_payloads: decrypted payload SA nextpayload NOTIFY
> critical 0x00 length 44
> > > ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi
> > 0x066d9db6
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > spi=0xf2043da59221143f: sa_state: SA_INIT -> AUTH_REQUEST
> > > proposals_negotiate: score 4
> > > sa_stateflags: 0x000d -> 0x002d cert,certreq,auth,sa (required
> 0x0032
> > certvalid,authvalid,sa)
> > > config_free_proposals: free 0x3c27ccfe580
> > > ca_validate_pubkey: could not open public key pubkeys/ufqdn/uma@
> --CA-HOST--
> > > ca_validate_cert:
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN=
> > --FR-HOST-- ok
> > > ikev2_getimsgdata: imsg 23 rspi 0x1f43bd64d771a4e5 ispi
> 0xf2043da59221143f initiator 1 sa
> > valid type 4 data length 1079
> > > ikev2_msg_auth: responder auth data length 277
> > > ikev2_msg_authverify: method RSA_SIG keylen 1079 type X509_CERT
> > > ikev2_msg_authverify: authentication successful
> > > spi=0xf2043da59221143f: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> > > sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa
> (required 0x0032
> > certvalid,authvalid,sa)
> > > ikev2_dispatch_cert: peer certificate is valid
> > > sa_stateflags: 0x003d -> 0x003f
> cert,certvalid,certreq,auth,authvalid,sa (required 0x0032
> > certvalid,authvalid,sa)
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > spi=0xf2043da59221143f: sa_state: AUTH_SUCCESS -> VALID
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > ikev2_sa_tag: (0)
> > > ikev2_childsa_negotiate: proposal 1
> > > ikev2_childsa_negotiate: key material length 128
> > > ikev2_prfplus: T1 with 32 bytes
> > > ikev2_prfplus: T2 with 32 bytes
> > > ikev2_prfplus: T3 with 32 bytes
> > > ikev2_prfplus: T4 with 32 bytes
> > > ikev2_prfplus: Tn with 128 bytes
> > > pfkey_sa_add: add spi 0x066d9db6
> > > ikev2_childsa_enable: loaded CHILD SA spi 0x066d9db6
> > > pfkey_sa_add: update spi 0x8f3bad08
> > > ikev2_childsa_enable: loaded CHILD SA spi 0x8f3bad08
> > > ikev2_childsa_enable: loaded flow 0x3c27dfd9800
> > > ikev2_childsa_enable: loaded flow 0x3c27dfda000
> > > ikev2_childsa_enable: remember SA peer --FR--:500
> > > spi=0xf2043da59221143f: ikev2_childsa_enable: loaded SPIs:
> 0x066d9db6, 0x8f3bad08
> > > spi=0xf2043da59221143f: ikev2_childsa_enable: loaded flows:
> ESP---UK--/32=--FR--/32(47)
> > > spi=0xf2043da59221143f: sa_state: VALID -> ESTABLISHED from
> --FR--:500 to --UK--:500
> > policy '--FR-HOST--'
> > > spi=0xf2043da59221143f: established peer --FR--:500[UFQDN/uma@--CA-HOST--]
> local
> > --UK--:500[UFQDN/--UK-ID--] policy '--FR-HOST--' as initiator
> > > spi=0x22cd85777285bb53: recv IKE_SA_INIT res 0 peer --US-IP--:500
> local --UK--:500, 335
> > bytes, policy '--US-HOST--'
> > > ikev2_recv: ispi 0x22cd85777285bb53 rspi 0x84c59f1c8f60d03f
> > > ikev2_recv: updated SA to peer --US-IP--:500 local --UK--:500
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_pld_parse: header ispi 0x22cd85777285bb53 rspi
> 0x84c59f1c8f60d03f nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 335
> response 1
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 40
> > > ikev2_pld_sa: more 0 reserved 0 length 36 proposal #1 protoid IKE
> spisize 0 xforms 3 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 136
> > > ikev2_pld_ke: dh group BRAINPOOL_P512R1 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_nat_detection: peer source 0x22cd85777285bb53
> 0x84c59f1c8f60d03f --US-IP--:500
> > > ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_nat_detection: peer destination 0x22cd85777285bb53
> 0x84c59f1c8f60d03f --UK--:500
> > > ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical
> 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > ikev2_pld_notify: signature hash SHA2_256 (2)
> > > ikev2_pld_notify: signature hash SHA2_384 (3)
> > > ikev2_pld_notify: signature hash SHA2_512 (4)
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > sa_stateflags: 0x0000 -> 0x0004 certreq (required 0x0009 cert,auth)
> > > proposals_negotiate: score 3
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0009 cert,auth
> > > spi=0x22cd85777285bb53: ikev2_sa_keys: DHSECRET with 64 bytes
> > > ikev2_sa_keys: SKEYSEED with 64 bytes
> > > spi=0x22cd85777285bb53: ikev2_sa_keys: S with 80 bytes
> > > ikev2_prfplus: T1 with 64 bytes
> > > ikev2_prfplus: T2 with 64 bytes
> > > ikev2_prfplus: T3 with 64 bytes
> > > ikev2_prfplus: T4 with 64 bytes
> > > ikev2_prfplus: T5 with 64 bytes
> > > ikev2_prfplus: Tn with 320 bytes
> > > ikev2_sa_keys: SK_d with 64 bytes
> > > ikev2_sa_keys: SK_ei with 36 bytes
> > > ikev2_sa_keys: SK_er with 36 bytes
> > > ikev2_sa_keys: SK_pi with 64 bytes
> > > ikev2_sa_keys: SK_pr with 64 bytes
> > > ikev2_msg_auth: initiator auth data length 406
> > > ca_setauth: switching SIG_ANY to SIG
> > > ca_setauth: auth length 406
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0009 cert,auth
> > > config_free_proposals: free 0x3c27dfd8300
> > > ca_getreq: found CA
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN
> > =--CA-HOST--
> > > ca_x509_subjectaltname_do: did not find subjectAltName in
> certificate
> > > ca_getreq: found local certificate
> /C=UK/ST=England/L=London/O=Telecom Lobby/OU=VPNC/CN=
> > --UK-HOST--
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > ca_setauth: auth length 272
> > > ikev2_getimsgdata: imsg 22 rspi 0x84c59f1c8f60d03f ispi
> 0x22cd85777285bb53 initiator 1 sa
> > valid type 4 data length 1064
> > > ikev2_dispatch_cert: cert type X509_CERT length 1064, ok
> > > sa_stateflags: 0x0004 -> 0x0005 cert,certreq (required 0x0009
> cert,auth)
> > > sa_stateok: SA_INIT flags 0x0001, require 0x0009 cert,auth
> > > ikev2_getimsgdata: imsg 28 rspi 0x84c59f1c8f60d03f ispi
> 0x22cd85777285bb53 initiator 1 sa
> > valid type 14 data length 272
> > > ikev2_dispatch_cert: AUTH type 14 len 272
> > > sa_stateflags: 0x0005 -> 0x000d cert,certreq,auth (required 0x0009
> cert,auth)
> > > sa_stateok: SA_INIT flags 0x0009, require 0x0009 cert,auth
> > > ikev2_next_payload: length 35 nextpayload CERT
> > > ikev2_next_payload: length 1069 nextpayload CERTREQ
> > > ikev2_add_certreq: type X509_CERT length 21
> > > ikev2_next_payload: length 25 nextpayload AUTH
> > > ikev2_next_payload: length 280 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload SA
> > > pfkey_sa_getspi: spi 0xfc41aa70
> > > pfkey_sa_init: new spi 0xfc41aa70
> > > ikev2_add_proposals: length 40
> > > ikev2_next_payload: length 44 nextpayload TSi
> > > ikev2_next_payload: length 24 nextpayload TSr
> > > ikev2_next_payload: length 24 nextpayload NONE
> > > ikev2_next_payload: length 1534 nextpayload IDi
> > > ikev2_msg_encrypt: decrypted length 1509
> > > ikev2_msg_encrypt: padded length 1510
> > > ikev2_msg_encrypt: length 1510, padding 0, output length 1530
> > > ikev2_msg_integr: message length 1562
> > > ikev2_msg_integr: integrity checksum length 12
> > > ikev2_pld_parse: header ispi 0x22cd85777285bb53 rspi
> 0x84c59f1c8f60d03f nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1562
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00
> length 1534
> > > ikev2_msg_decrypt: IV length 8
> > > ikev2_msg_decrypt: encrypted payload length 1510
> > > ikev2_msg_decrypt: integrity checksum length 12
> > > ikev2_msg_decrypt: AAD length 32
> > > ikev2_msg_decrypt: decrypted payload length 1510/1510 padding 0
> > > ikev2_pld_payloads: decrypted payload IDi nextpayload CERT
> critical 0x00 length 35
> > > ikev2_pld_id: id UFQDN/--UK-ID-- length 31
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ
> critical 0x00 length 1069
> > > ikev2_pld_cert: type X509_CERT length 1064
> > > ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH
> critical 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY
> critical 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 44
> > > ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi
> > 0xfc41aa70
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CHACHA20_POLY1305
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --US-IP-- end --US-IP--
> > > spi=0x22cd85777285bb53: send IKE_AUTH req 1 peer --US-IP--:500
> local --UK--:500, 1562
> > bytes
> > > spi=0x22cd85777285bb53: recv IKE_AUTH res 1 peer --US-IP--:500
> local --UK--:500, 1532
> > bytes, policy '--US-HOST--'
> > > ikev2_recv: ispi 0x22cd85777285bb53 rspi 0x84c59f1c8f60d03f
> > > ikev2_recv: updated SA to peer --US-IP--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0x22cd85777285bb53 rspi
> 0x84c59f1c8f60d03f nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1532
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00
> length 1504
> > > ikev2_msg_decrypt: IV length 8
> > > ikev2_msg_decrypt: encrypted payload length 1480
> > > ikev2_msg_decrypt: integrity checksum length 12
> > > ikev2_msg_decrypt: AAD length 32
> > > ikev2_msg_decrypt: decrypted payload length 1480/1480 padding 0
> > > ikev2_pld_payloads: decrypted payload IDr nextpayload CERT
> critical 0x00 length 37
> > > ikev2_pld_id: id UFQDN/saraswati@--CA-HOST-- length 33
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH
> critical 0x00 length 1070
> > > ikev2_pld_cert: type X509_CERT length 1065
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY
> critical 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 36
> > > ikev2_pld_sa: more 0 reserved 0 length 32 proposal #1 protoid ESP
> spisize 4 xforms 2 spi
> > 0xd1bfd520
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CHACHA20_POLY1305
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id ESN
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --US-IP-- end --US-IP--
> > > spi=0x22cd85777285bb53: sa_state: SA_INIT -> AUTH_REQUEST
> > > proposals_negotiate: score 2
> > > sa_stateflags: 0x000d -> 0x002d cert,certreq,auth,sa (required
> 0x0032
> > certvalid,authvalid,sa)
> > > config_free_proposals: free 0x3c27dfd8980
> > > ca_validate_pubkey: could not open public key
> pubkeys/ufqdn/saraswati@--CA-HOST--
> > > ca_validate_cert: /C=US/ST=Texas/L=Dallas/O=Telecom
> Lobby/OU=VPNC/CN=--US-HOST-- ok
> > > ikev2_getimsgdata: imsg 23 rspi 0x84c59f1c8f60d03f ispi
> 0x22cd85777285bb53 initiator 1 sa
> > valid type 4 data length 1065
> > > ikev2_msg_auth: responder auth data length 431
> > > ikev2_msg_authverify: method SIG keylen 1065 type X509_CERT
> > > _dsa_verify_init: signature scheme 0 selected
> > > ikev2_msg_authverify: authentication successful
> > > spi=0x22cd85777285bb53: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> > > sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa
> (required 0x0032
> > certvalid,authvalid,sa)
> > > ikev2_dispatch_cert: peer certificate is valid
> > > sa_stateflags: 0x003d -> 0x003f
> cert,certvalid,certreq,auth,authvalid,sa (required 0x0032
> > certvalid,authvalid,sa)
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > spi=0x22cd85777285bb53: sa_state: AUTH_SUCCESS -> VALID
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > ikev2_sa_tag: (0)
> > > ikev2_childsa_negotiate: proposal 1
> > > ikev2_childsa_negotiate: key material length 72
> > > ikev2_prfplus: T1 with 64 bytes
> > > ikev2_prfplus: T2 with 64 bytes
> > > ikev2_prfplus: Tn with 128 bytes
> > > pfkey_sa_add: add spi 0xd1bfd520
> > > ikev2_childsa_enable: loaded CHILD SA spi 0xd1bfd520
> > > pfkey_sa_add: update spi 0xfc41aa70
> > > ikev2_childsa_enable: loaded CHILD SA spi 0xfc41aa70
> > > ikev2_childsa_enable: loaded flow 0x3c2c0b8f800
> > > ikev2_childsa_enable: loaded flow 0x3c27dfda400
> > > ikev2_childsa_enable: remember SA peer --US-IP--:500
> > > spi=0x22cd85777285bb53: ikev2_childsa_enable: loaded SPIs:
> 0xd1bfd520, 0xfc41aa70
> > > spi=0x22cd85777285bb53: ikev2_childsa_enable: loaded flows:
> ESP---UK--/32=--US-IP--/32
> > (47)
> > > spi=0x22cd85777285bb53: sa_state: VALID -> ESTABLISHED from
> --US-IP--:500 to --UK--:500
> > policy '--US-HOST--'
> > > spi=0x22cd85777285bb53: established peer
> --US-IP--:500[UFQDN/saraswati@--CA-HOST--] local
> > --UK--:500[UFQDN/--UK-ID--] policy '--US-HOST--' as initiator
> > > spi=0x67cb9c572ac8b67e: recv IKE_SA_INIT res 0 peer --JP-IP--:500
> local --UK--:500, 335
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x67cb9c572ac8b67e rspi 0x2c3aab6ceed004e7
> > > ikev2_recv: updated SA to peer --JP-IP--:500 local --UK--:500
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_pld_parse: header ispi 0x67cb9c572ac8b67e rspi
> 0x2c3aab6ceed004e7 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 335
> response 1
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 40
> > > ikev2_pld_sa: more 0 reserved 0 length 36 proposal #1 protoid IKE
> spisize 0 xforms 3 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 136
> > > ikev2_pld_ke: dh group BRAINPOOL_P512R1 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_nat_detection: peer source 0x67cb9c572ac8b67e
> 0x2c3aab6ceed004e7 --JP-IP--:500
> > > ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_nat_detection: peer destination 0x67cb9c572ac8b67e
> 0x2c3aab6ceed004e7 --UK--:500
> > > ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical
> 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > ikev2_pld_notify: signature hash SHA2_256 (2)
> > > ikev2_pld_notify: signature hash SHA2_384 (3)
> > > ikev2_pld_notify: signature hash SHA2_512 (4)
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > sa_stateflags: 0x0000 -> 0x0004 certreq (required 0x0009 cert,auth)
> > > proposals_negotiate: score 3
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0009 cert,auth
> > > spi=0x67cb9c572ac8b67e: ikev2_sa_keys: DHSECRET with 64 bytes
> > > ikev2_sa_keys: SKEYSEED with 64 bytes
> > > spi=0x67cb9c572ac8b67e: ikev2_sa_keys: S with 80 bytes
> > > ikev2_prfplus: T1 with 64 bytes
> > > ikev2_prfplus: T2 with 64 bytes
> > > ikev2_prfplus: T3 with 64 bytes
> > > ikev2_prfplus: T4 with 64 bytes
> > > ikev2_prfplus: T5 with 64 bytes
> > > ikev2_prfplus: Tn with 320 bytes
> > > ikev2_sa_keys: SK_d with 64 bytes
> > > ikev2_sa_keys: SK_ei with 36 bytes
> > > ikev2_sa_keys: SK_er with 36 bytes
> > > ikev2_sa_keys: SK_pi with 64 bytes
> > > ikev2_sa_keys: SK_pr with 64 bytes
> > > ikev2_msg_auth: initiator auth data length 406
> > > ca_setauth: switching SIG_ANY to SIG
> > > ca_setauth: auth length 406
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0009 cert,auth
> > > config_free_proposals: free 0x3c2a56dad00
> > > ca_getreq: found CA
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN
> > =--CA-HOST--
> > > ca_x509_subjectaltname_do: did not find subjectAltName in
> certificate
> > > ca_getreq: found local certificate
> /C=UK/ST=England/L=London/O=Telecom Lobby/OU=VPNC/CN=
> > --UK-HOST--
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > ca_setauth: auth length 272
> > > ikev2_getimsgdata: imsg 22 rspi 0x2c3aab6ceed004e7 ispi
> 0x67cb9c572ac8b67e initiator 1 sa
> > valid type 4 data length 1064
> > > ikev2_dispatch_cert: cert type X509_CERT length 1064, ok
> > > sa_stateflags: 0x0004 -> 0x0005 cert,certreq (required 0x0009
> cert,auth)
> > > sa_stateok: SA_INIT flags 0x0001, require 0x0009 cert,auth
> > > ikev2_getimsgdata: imsg 28 rspi 0x2c3aab6ceed004e7 ispi
> 0x67cb9c572ac8b67e initiator 1 sa
> > valid type 14 data length 272
> > > ikev2_dispatch_cert: AUTH type 14 len 272
> > > sa_stateflags: 0x0005 -> 0x000d cert,certreq,auth (required 0x0009
> cert,auth)
> > > sa_stateok: SA_INIT flags 0x0009, require 0x0009 cert,auth
> > > ikev2_next_payload: length 35 nextpayload CERT
> > > ikev2_next_payload: length 1069 nextpayload CERTREQ
> > > ikev2_add_certreq: type X509_CERT length 21
> > > ikev2_next_payload: length 25 nextpayload AUTH
> > > ikev2_next_payload: length 280 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload SA
> > > pfkey_sa_getspi: spi 0x4701e9b5
> > > pfkey_sa_init: new spi 0x4701e9b5
> > > ikev2_add_proposals: length 40
> > > ikev2_next_payload: length 44 nextpayload TSi
> > > ikev2_next_payload: length 24 nextpayload TSr
> > > ikev2_next_payload: length 24 nextpayload NONE
> > > ikev2_next_payload: length 1534 nextpayload IDi
> > > ikev2_msg_encrypt: decrypted length 1509
> > > ikev2_msg_encrypt: padded length 1510
> > > ikev2_msg_encrypt: length 1510, padding 0, output length 1530
> > > ikev2_msg_integr: message length 1562
> > > ikev2_msg_integr: integrity checksum length 12
> > > ikev2_pld_parse: header ispi 0x67cb9c572ac8b67e rspi
> 0x2c3aab6ceed004e7 nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1562
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00
> length 1534
> > > ikev2_msg_decrypt: IV length 8
> > > ikev2_msg_decrypt: encrypted payload length 1510
> > > ikev2_msg_decrypt: integrity checksum length 12
> > > ikev2_msg_decrypt: AAD length 32
> > > ikev2_msg_decrypt: decrypted payload length 1510/1510 padding 0
> > > ikev2_pld_payloads: decrypted payload IDi nextpayload CERT
> critical 0x00 length 35
> > > ikev2_pld_id: id UFQDN/--UK-ID-- length 31
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ
> critical 0x00 length 1069
> > > ikev2_pld_cert: type X509_CERT length 1064
> > > ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH
> critical 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY
> critical 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 44
> > > ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi
> > 0x4701e9b5
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CHACHA20_POLY1305
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --JP-IP-- end --JP-IP--
> > > spi=0x67cb9c572ac8b67e: send IKE_AUTH req 1 peer --JP-IP--:500
> local --UK--:500, 1562
> > bytes
> > > spi=0x67cb9c572ac8b67e: recv IKE_AUTH res 1 peer --JP-IP--:500
> local --UK--:500, 1527
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x67cb9c572ac8b67e rspi 0x2c3aab6ceed004e7
> > > ikev2_recv: updated SA to peer --JP-IP--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0x67cb9c572ac8b67e rspi
> 0x2c3aab6ceed004e7 nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1527
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00
> length 1499
> > > ikev2_msg_decrypt: IV length 8
> > > ikev2_msg_decrypt: encrypted payload length 1475
> > > ikev2_msg_decrypt: integrity checksum length 12
> > > ikev2_msg_decrypt: AAD length 32
> > > ikev2_msg_decrypt: decrypted payload length 1475/1475 padding 0
> > > ikev2_pld_payloads: decrypted payload IDr nextpayload CERT
> critical 0x00 length 33
> > > ikev2_pld_id: id UFQDN/shiva@--CA-HOST-- length 29
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH
> critical 0x00 length 1069
> > > ikev2_pld_cert: type X509_CERT length 1064
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY
> critical 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 36
> > > ikev2_pld_sa: more 0 reserved 0 length 32 proposal #1 protoid ESP
> spisize 4 xforms 2 spi
> > 0xb1bffe2d
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CHACHA20_POLY1305
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id ESN
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --JP-IP-- end --JP-IP--
> > > spi=0x67cb9c572ac8b67e: sa_state: SA_INIT -> AUTH_REQUEST
> > > proposals_negotiate: score 2
> > > sa_stateflags: 0x000d -> 0x002d cert,certreq,auth,sa (required
> 0x0032
> > certvalid,authvalid,sa)
> > > config_free_proposals: free 0x3c31292ac00
> > > ca_validate_pubkey: could not open public key pubkeys/ufqdn/shiva@
> --CA-HOST--
> > > ca_validate_cert: /C=JP/ST=Tokyo/L=Heiwajima/O=Telecom
> Lobby/OU=VPNC/CN=--JP-HOST-- ok
> > > ikev2_getimsgdata: imsg 23 rspi 0x2c3aab6ceed004e7 ispi
> 0x67cb9c572ac8b67e initiator 1 sa
> > valid type 4 data length 1064
> > > ikev2_msg_auth: responder auth data length 431
> > > ikev2_msg_authverify: method SIG keylen 1064 type X509_CERT
> > > _dsa_verify_init: signature scheme 0 selected
> > > ikev2_msg_authverify: authentication successful
> > > spi=0x67cb9c572ac8b67e: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> > > sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa
> (required 0x0032
> > certvalid,authvalid,sa)
> > > ikev2_dispatch_cert: peer certificate is valid
> > > sa_stateflags: 0x003d -> 0x003f
> cert,certvalid,certreq,auth,authvalid,sa (required 0x0032
> > certvalid,authvalid,sa)
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > spi=0x67cb9c572ac8b67e: sa_state: AUTH_SUCCESS -> VALID
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > sa_stateok: VALID flags 0x0032, require 0x0032
> certvalid,authvalid,sa
> > > ikev2_sa_tag: (0)
> > > ikev2_childsa_negotiate: proposal 1
> > > ikev2_childsa_negotiate: key material length 72
> > > ikev2_prfplus: T1 with 64 bytes
> > > ikev2_prfplus: T2 with 64 bytes
> > > ikev2_prfplus: Tn with 128 bytes
> > > pfkey_sa_add: add spi 0xb1bffe2d
> > > ikev2_childsa_enable: loaded CHILD SA spi 0xb1bffe2d
> > > pfkey_sa_add: update spi 0x4701e9b5
> > > ikev2_childsa_enable: loaded CHILD SA spi 0x4701e9b5
> > > ikev2_childsa_enable: loaded flow 0x3c2eec20c00
> > > ikev2_childsa_enable: loaded flow 0x3c324182000
> > > ikev2_childsa_enable: remember SA peer --JP-IP--:500
> > > spi=0x67cb9c572ac8b67e: ikev2_childsa_enable: loaded SPIs:
> 0xb1bffe2d, 0x4701e9b5
> > > spi=0x67cb9c572ac8b67e: ikev2_childsa_enable: loaded flows:
> ESP---UK--/32=--JP-IP--/32
> > (47)
> > > spi=0x67cb9c572ac8b67e: sa_state: VALID -> ESTABLISHED from
> --JP-IP--:500 to --UK--:500
> > policy '--JP-HOST--'
> > > spi=0x67cb9c572ac8b67e: established peer --JP-IP--:500[UFQDN/shiva@--CA-HOST--]
> local
> > --UK--:500[UFQDN/--UK-ID--] policy '--JP-HOST--' as initiator
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xc5881d3ed32f5801: recv INFORMATIONAL req 4428 peer
> --FR--:500 local --UK--:500, 96
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xc5881d3ed32f5801 rspi 0xfcad33aa65954d8e
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xc5881d3ed32f5801: recv INFORMATIONAL req 4428 peer
> --FR--:500 local --UK--:500, 96
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xc5881d3ed32f5801 rspi 0xfcad33aa65954d8e
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xc5881d3ed32f5801: recv INFORMATIONAL req 4428 peer
> --FR--:500 local --UK--:500, 96
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xc5881d3ed32f5801 rspi 0xfcad33aa65954d8e
> > > ikev2_init_recv: unknown SA
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 0 peer --FR--:500
> local --UK--:500, 112
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 0 length 112
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 84
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 48
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 48/48 padding 47
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 0 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 0 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003184
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003184
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003183
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 3
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003183
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 3
> second(s) ago
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xb3a689d63d247dd3: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xb3a689d63d247dd3 rspi 0x3ec4e46becafef14
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xf94ce3fc2e48f7f2: recv IKE_SA_INIT req 0 peer --CAT--:500
> local --UK--:500, 1056
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xf94ce3fc2e48f7f2 rspi 0x0000000000000000
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_pld_parse: header ispi 0xf94ce3fc2e48f7f2 rspi
> 0x0000000000000000 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 1056
> response 0
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 832
> > > ikev2_pld_sa: more 2 reserved 0 length 352 proposal #1 protoid IKE
> spisize 0 xforms 37
> > spi 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_384_192
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_512_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA1_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> AES_XCBC_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> AES_CMAC_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P256R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P384R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> > > ikev2_pld_sa: more 0 reserved 0 length 476 proposal #2 protoid IKE
> spisize 0 xforms 45
> > spi 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P256R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P384R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 72
> > > ikev2_pld_ke: dh group ECP_256 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_nat_detection: peer source 0xf94ce3fc2e48f7f2
> 0x0000000000000000 --CAT--:500
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_nat_detection: peer destination 0xf94ce3fc2e48f7f2
> 0x0000000000000000 --UK--:500
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> FRAGMENTATION_SUPPORTED
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 16
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > ikev2_pld_notify: signature hash SHA2_256 (2)
> > > ikev2_pld_notify: signature hash SHA2_384 (3)
> > > ikev2_pld_notify: signature hash SHA2_512 (4)
> > > ikev2_pld_notify: signature hash <UNKNOWN:5> (5)
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED
> > > proposals_negotiate: score 4
> > > proposals_negotiate: score 0
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xf94ce3fc2e48f7f2: sa_state: INIT -> SA_INIT
> > > proposals_negotiate: score 4
> > > proposals_negotiate: score 0
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0000
> > > sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
> > > spi=0xf94ce3fc2e48f7f2: ikev2_sa_keys: DHSECRET with 32 bytes
> > > ikev2_sa_keys: SKEYSEED with 32 bytes
> > > spi=0xf94ce3fc2e48f7f2: ikev2_sa_keys: S with 80 bytes
> > > ikev2_prfplus: T1 with 32 bytes
> > > ikev2_prfplus: T2 with 32 bytes
> > > ikev2_prfplus: T3 with 32 bytes
> > > ikev2_prfplus: T4 with 32 bytes
> > > ikev2_prfplus: T5 with 32 bytes
> > > ikev2_prfplus: T6 with 32 bytes
> > > ikev2_prfplus: T7 with 32 bytes
> > > ikev2_prfplus: Tn with 224 bytes
> > > ikev2_sa_keys: SK_d with 32 bytes
> > > ikev2_sa_keys: SK_ai with 32 bytes
> > > ikev2_sa_keys: SK_ar with 32 bytes
> > > ikev2_sa_keys: SK_ei with 32 bytes
> > > ikev2_sa_keys: SK_er with 32 bytes
> > > ikev2_sa_keys: SK_pi with 32 bytes
> > > ikev2_sa_keys: SK_pr with 32 bytes
> > > ikev2_add_proposals: length 44
> > > ikev2_next_payload: length 48 nextpayload KE
> > > ikev2_next_payload: length 72 nextpayload NONCE
> > > ikev2_next_payload: length 36 nextpayload NOTIFY
> > > ikev2_nat_detection: local source 0xf94ce3fc2e48f7f2
> 0x1d51ac7d723a726d --UK--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_nat_detection: local destination 0xf94ce3fc2e48f7f2
> 0x1d51ac7d723a726d --CAT--:500
> > > ikev2_next_payload: length 28 nextpayload CERTREQ
> > > ikev2_add_certreq: type X509_CERT length 21
> > > ikev2_next_payload: length 25 nextpayload NOTIFY
> > > ikev2_next_payload: length 14 nextpayload NONE
> > > ikev2_pld_parse: header ispi 0xf94ce3fc2e48f7f2 rspi
> 0x1d51ac7d723a726d nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 279
> response 1
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 48
> > > ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 72
> > > ikev2_pld_ke: dh group ECP_256 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical
> 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > spi=0xf94ce3fc2e48f7f2: send IKE_SA_INIT res 0 peer --CAT--:500
> local --UK--:500, 279
> > bytes
> > > config_free_proposals: free 0x3c31292ae80
> > > config_free_proposals: free 0x3c31292a880
> > > spi=0xf94ce3fc2e48f7f2: recv IKE_AUTH req 1 peer --CAT--:4500
> local --UK--:4500, 1792
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xf94ce3fc2e48f7f2 rspi 0x1d51ac7d723a726d
> > > ikev2_recv: updated SA to peer --CAT--:4500 local --UK--:4500
> > > ikev2_pld_parse: header ispi 0xf94ce3fc2e48f7f2 rspi
> 0x1d51ac7d723a726d nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1792
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00
> length 1764
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 1728
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 1728/1728 padding 11
> > > ikev2_pld_payloads: decrypted payload IDi nextpayload CERT
> critical 0x00 length 33
> > > ikev2_pld_id: id UFQDN/indra@--CA-HOST-- length 29
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload NOTIFY
> critical 0x00 length 1090
> > > ikev2_pld_cert: type X509_CERT length 1085
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CERTREQ
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT
> > > ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH
> critical 0x00 length 85
> > > ikev2_pld_certreq: type X509_CERT length 80
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical
> 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY
> critical 0x00 length 16
> > > ikev2_pld_cp: type REQUEST length 8
> > > ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
> > > ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 100
> > > ikev2_pld_sa: more 0 reserved 0 length 96 proposal #1 protoid ESP
> spisize 4 xforms 9 spi
> > 0xc9f9084d
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_384_192
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_512_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA1_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> AES_XCBC_96
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 24
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> ADDITIONAL_IP6_ADDRESS
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> EAP_ONLY_AUTHENTICATION
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> IKEV2_MESSAGE_ID_SYNC_SUPPORTED
> > > ikev2_handle_notifies: mobike enabled
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0000
> > > spi=0xf94ce3fc2e48f7f2: sa_state: SA_INIT -> AUTH_REQUEST
> > > policy_lookup: peerid 'indra@--CA-HOST--'
> > > proposals_negotiate: score 4
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_msg_auth: responder auth data length 343
> > > ca_setauth: switching SIG_ANY to SIG
> > > ca_setauth: auth length 343
> > > proposals_negotiate: score 4
> > > sa_stateflags: 0x0024 -> 0x0024 certreq,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > config_free_proposals: free 0x3c31292a480
> > > ca_getreq: found CA
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN
> > =--CA-HOST--
> > > ca_x509_subjectaltname_do: did not find subjectAltName in
> certificate
> > > ca_getreq: found local certificate
> /C=UK/ST=England/L=London/O=Telecom Lobby/OU=VPNC/CN=
> > --UK-HOST--
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > ca_setauth: auth length 272
> > > ca_validate_pubkey: could not open public key pubkeys/ufqdn/indra@
> --CA-HOST--
> > > ca_validate_cert: /C=ES/ST=Catalunya/L=sant Pere de
> Ribes/O=Telecom Lobby/OU=VPNC/CN=
> > --CAT-HOST-- ok
> > > ikev2_getimsgdata: imsg 22 rspi 0x1d51ac7d723a726d ispi
> 0xf94ce3fc2e48f7f2 initiator 0 sa
> > valid type 4 data length 1064
> > > ikev2_dispatch_cert: cert type X509_CERT length 1064, ok
> > > sa_stateflags: 0x0024 -> 0x0025 cert,certreq,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_getimsgdata: imsg 28 rspi 0x1d51ac7d723a726d ispi
> 0xf94ce3fc2e48f7f2 initiator 0 sa
> > valid type 14 data length 272
> > > ikev2_dispatch_cert: AUTH type 14 len 272
> > > sa_stateflags: 0x0025 -> 0x002d cert,certreq,auth,sa (required
> 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_getimsgdata: imsg 23 rspi 0x1d51ac7d723a726d ispi
> 0xf94ce3fc2e48f7f2 initiator 0 sa
> > valid type 4 data length 1085
> > > ikev2_msg_auth: initiator auth data length 1120
> > > ikev2_msg_authverify: method SIG keylen 1085 type X509_CERT
> > > _dsa_verify_init: signature scheme 0 selected
> > > ikev2_msg_authverify: authentication successful
> > > spi=0xf94ce3fc2e48f7f2: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> > > sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa
> (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_dispatch_cert: peer certificate is valid
> > > sa_stateflags: 0x003d -> 0x003f
> cert,certvalid,certreq,auth,authvalid,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > sa_stateok: VALID flags 0x003b, require 0x003b
> cert,certvalid,auth,authvalid,sa
> > > spi=0xf94ce3fc2e48f7f2: sa_state: AUTH_SUCCESS -> VALID
> > > sa_stateok: VALID flags 0x003b, require 0x003b
> cert,certvalid,auth,authvalid,sa
> > > sa_stateok: VALID flags 0x003b, require 0x003b
> cert,certvalid,auth,authvalid,sa
> > > ikev2_sa_tag: (0)
> > > ikev2_childsa_negotiate: proposal 1
> > > ikev2_childsa_negotiate: key material length 128
> > > ikev2_prfplus: T1 with 32 bytes
> > > ikev2_prfplus: T2 with 32 bytes
> > > ikev2_prfplus: T3 with 32 bytes
> > > ikev2_prfplus: T4 with 32 bytes
> > > ikev2_prfplus: Tn with 128 bytes
> > > pfkey_sa_getspi: spi 0xba75d84f
> > > pfkey_sa_init: new spi 0xba75d84f
> > > ikev2_next_payload: length 35 nextpayload CERT
> > > ikev2_next_payload: length 1069 nextpayload AUTH
> > > ikev2_next_payload: length 280 nextpayload CP
> > > ikev2_next_payload: length 8 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload SA
> > > ikev2_add_proposals: length 40
> > > ikev2_next_payload: length 44 nextpayload TSi
> > > ikev2_next_payload: length 24 nextpayload TSr
> > > ikev2_next_payload: length 24 nextpayload NONE
> > > ikev2_next_payload: length 1540 nextpayload IDr
> > > ikev2_msg_encrypt: decrypted length 1500
> > > ikev2_msg_encrypt: padded length 1504
> > > ikev2_msg_encrypt: length 1501, padding 3, output length 1536
> > > ikev2_msg_integr: message length 1568
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf94ce3fc2e48f7f2 rspi
> 0x1d51ac7d723a726d nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1568
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00
> length 1540
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 1504
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 3
> > > ikev2_pld_payloads: decrypted payload IDr nextpayload CERT
> critical 0x00 length 35
> > > ikev2_pld_id: id UFQDN/--UK-ID-- length 31
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH
> critical 0x00 length 1069
> > > ikev2_pld_cert: type X509_CERT length 1064
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical
> 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_cp: type REPLY length 0
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 44
> > > ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi
> > 0xba75d84f
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --CAT-- end --CAT--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > spi=0xf94ce3fc2e48f7f2: send IKE_AUTH res 1 peer --CAT--:4500
> local --UK--:4500, 1568
> > bytes, NAT-T
> > > pfkey_sa_add: update spi 0xba75d84f
> > > ikev2_childsa_enable: loaded CHILD SA spi 0xba75d84f
> > > pfkey_sa_add: add spi 0xc9f9084d
> > > ikev2_childsa_enable: loaded CHILD SA spi 0xc9f9084d
> > > ikev2_childsa_enable: loaded flow 0x3c324182800
> > > ikev2_childsa_enable: loaded flow 0x3c2eec20400
> > > ikev2_childsa_enable: remember SA peer --CAT--:4500
> > > spi=0xf94ce3fc2e48f7f2: ikev2_childsa_enable: loaded SPIs:
> 0xba75d84f, 0xc9f9084d
> > > spi=0xf94ce3fc2e48f7f2: ikev2_childsa_enable: loaded flows:
> ESP---UK--/32=--CAT--/32(47)
> > > spi=0xf94ce3fc2e48f7f2: sa_state: VALID -> ESTABLISHED from
> --CAT--:4500 to --UK--:4500
> > policy '--CAT-HOST--'
> > > spi=0xf94ce3fc2e48f7f2: established peer --CAT--:4500[UFQDN/indra@--CA-HOST--]
> local
> > --UK--:4500[UFQDN/--UK-ID--] policy '--CAT-HOST--' as responder
> > > pfkey_sa_lookup: last_used 1614003186
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003186
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 0
> second(s) ago
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xc5881d3ed32f5801: recv INFORMATIONAL req 4428 peer
> --FR--:500 local --UK--:500, 96
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xc5881d3ed32f5801 rspi 0xfcad33aa65954d8e
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xb3a689d63d247dd3: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xb3a689d63d247dd3 rspi 0x3ec4e46becafef14
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xc5881d3ed32f5801: recv INFORMATIONAL req 4429 peer
> --FR--:500 local --UK--:500, 240
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xc5881d3ed32f5801 rspi 0xfcad33aa65954d8e
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xb3a689d63d247dd3: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xb3a689d63d247dd3 rspi 0x3ec4e46becafef14
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 1 peer --FR--:500
> local --UK--:500, 128
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 1 length 128
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 100
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 64
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 64/64 padding 63
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 1 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 1 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003199
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003199
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003198
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 3
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003198
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 3
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003201
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003201
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003201
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 0
> second(s) ago
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xb3a689d63d247dd3: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xb3a689d63d247dd3 rspi 0x3ec4e46becafef14
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 2 peer --FR--:500
> local --UK--:500, 144
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 2 length 144
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 116
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 80
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 80/80 padding 79
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 2 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 2 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003214
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003214
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003216
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003216
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003216
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003216
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003216
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 0
> second(s) ago
> > > ikev2_init_ike_sa: "--FR-HOST--" is already active
> > > ikev2_init_ike_sa: "--US-HOST--" is already active
> > > ikev2_init_ike_sa: "--JP-HOST--" is already active
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 3 peer --FR--:500
> local --UK--:500, 112
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 3 length 112
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 84
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 48
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 48/48 padding 47
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 3 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 3 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003229
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003229
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003231
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003231
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003231
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003231
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003231
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 0
> second(s) ago
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xb3a689d63d247dd3: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xb3a689d63d247dd3 rspi 0x3ec4e46becafef14
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 4 peer --FR--:500
> local --UK--:500, 128
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 4 length 128
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 100
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 64
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 64/64 padding 63
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 4 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 4 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003244
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003245
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003246
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003246
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003246
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003246
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003246
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 0
> second(s) ago
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 5 peer --FR--:500
> local --UK--:500, 96
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 5 length 96
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 68
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 32
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 32/32 padding 31
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 5 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 5 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003259
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003259
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003261
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003261
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003261
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003261
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003261
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 0
> second(s) ago
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0xb3a689d63d247dd3: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xb3a689d63d247dd3 rspi 0x3ec4e46becafef14
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 6 peer --FR--:500
> local --UK--:500, 96
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 6 length 96
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 68
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 32
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 32/32 padding 31
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 6 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 6 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003275
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003275
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003276
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003276
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003276
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003276
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003275
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > ikev2_init_ike_sa: "--FR-HOST--" is already active
> > > ikev2_init_ike_sa: "--US-HOST--" is already active
> > > ikev2_init_ike_sa: "--JP-HOST--" is already active
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 7 peer --FR--:500
> local --UK--:500, 112
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 7 length 112
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 84
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 48
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 48/48 padding 47
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 7 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 7 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003290
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003290
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003291
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003291
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003291
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003291
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003290
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 8 peer --FR--:500
> local --UK--:500, 144
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 8 length 144
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 116
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 80
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 80/80 padding 79
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 8 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 8 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003305
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003305
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003306
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003306
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003306
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003306
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003305
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 9 peer --FR--:500
> local --UK--:500, 160
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 9 length 160
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 132
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 96
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 96/96 padding 95
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 9 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 9 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003319
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003320
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003321
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003321
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003321
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003321
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003320
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 10 peer --FR--:500
> local --UK--:500, 96
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 10 length 96
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 68
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 32
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 32/32 padding 31
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 10 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 10 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003334
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003335
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003336
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003336
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003336
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003336
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003335
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > policy_lookup: setting policy '--JP-HOST--'
> > > spi=0x52b68ffd0ebb1984: recv INFORMATIONAL req 93 peer
> --JP-IP--:500 local --UK--:500, 57
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x52b68ffd0ebb1984 rspi 0xebcdfe906b83921a
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--JP-HOST--'
> > > spi=0x52b68ffd0ebb1984: recv INFORMATIONAL req 93 peer
> --JP-IP--:500 local --UK--:500, 57
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x52b68ffd0ebb1984 rspi 0xebcdfe906b83921a
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--JP-HOST--'
> > > spi=0x52b68ffd0ebb1984: recv INFORMATIONAL req 93 peer
> --JP-IP--:500 local --UK--:500, 57
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x52b68ffd0ebb1984 rspi 0xebcdfe906b83921a
> > > ikev2_init_recv: unknown SA
> > > ikev2_init_ike_sa: "--FR-HOST--" is already active
> > > ikev2_init_ike_sa: "--US-HOST--" is already active
> > > ikev2_init_ike_sa: "--JP-HOST--" is already active
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 11 peer --FR--:500
> local --UK--:500, 96
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 11 length 96
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 68
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 32
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 32/32 padding 31
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 11 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 11 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003349
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003350
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003351
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003351
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003350
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xba75d84f last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003351
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003350
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > policy_lookup: setting policy '--JP-HOST--'
> > > spi=0x52b68ffd0ebb1984: recv INFORMATIONAL req 93 peer
> --JP-IP--:500 local --UK--:500, 57
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x52b68ffd0ebb1984 rspi 0xebcdfe906b83921a
> > > ikev2_init_recv: unknown SA
> > > spi=0xf94ce3fc2e48f7f2: recv INFORMATIONAL req 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0xf94ce3fc2e48f7f2 rspi 0x1d51ac7d723a726d
> > > ikev2_recv: updated SA to peer --CAT--:4500 local --UK--:4500
> > > ikev2_pld_parse: header ispi 0xf94ce3fc2e48f7f2 rspi
> 0x1d51ac7d723a726d nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x08 msgid 2 length 80
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload DELETE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 7
> > > ikev2_pld_payloads: decrypted payload DELETE nextpayload NONE
> critical 0x00 length 8
> > > ikev2_pld_delete: proto IKE spisize 0 nspi 0
> > > ikev2_next_payload: length 4 nextpayload NONE
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 4
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 5, padding 11, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf94ce3fc2e48f7f2 rspi
> 0x1d51ac7d723a726d nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x20 msgid 2 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 11
> > > spi=0xf94ce3fc2e48f7f2: send INFORMATIONAL res 2 peer --CAT--:4500
> local --UK--:4500, 80
> > bytes, NAT-T
> > > spi=0xf94ce3fc2e48f7f2: ikev2_ikesa_recv_delete: received delete
> > > spi=0xf94ce3fc2e48f7f2: sa_state: ESTABLISHED -> CLOSED from
> --CAT--:4500 to --UK--:4500
> > policy '--CAT-HOST--'
> > > ikev2_recv: closing SA
> > > spi=0xf94ce3fc2e48f7f2: sa_free: received delete
> > > config_free_proposals: free 0x3c27ccfe800
> > > config_free_proposals: free 0x3c31292a600
> > > config_free_childsas: free 0x3c2db888f00
> > > config_free_childsas: free 0x3c300bf3e00
> > > sa_free_flows: free 0x3c324182800
> > > sa_free_flows: free 0x3c2eec20400
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0x87993e0d839b617f: recv IKE_SA_INIT req 0 peer --CAT--:500
> local --UK--:500, 1056
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0x87993e0d839b617f rspi 0x0000000000000000
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > ikev2_pld_parse: header ispi 0x87993e0d839b617f rspi
> 0x0000000000000000 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 1056
> response 0
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 832
> > > ikev2_pld_sa: more 2 reserved 0 length 352 proposal #1 protoid IKE
> spisize 0 xforms 37
> > spi 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CTR
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_384_192
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_512_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA1_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> AES_XCBC_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> AES_CMAC_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P256R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P384R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> > > ikev2_pld_sa: more 0 reserved 0 length 476 proposal #2 protoid IKE
> spisize 0 xforms 45
> > spi 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_16
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_GCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> AES_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_8
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id
> CAMELLIA_CCM_12
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_512
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P256R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P384R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id
> BRAINPOOL_P512R1
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 72
> > > ikev2_pld_ke: dh group ECP_256 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_nat_detection: peer source 0x87993e0d839b617f
> 0x0000000000000000 --CAT--:500
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_nat_detection: peer destination 0x87993e0d839b617f
> 0x0000000000000000 --UK--:500
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> FRAGMENTATION_SUPPORTED
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 16
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > ikev2_pld_notify: signature hash SHA2_256 (2)
> > > ikev2_pld_notify: signature hash SHA2_384 (3)
> > > ikev2_pld_notify: signature hash SHA2_512 (4)
> > > ikev2_pld_notify: signature hash <UNKNOWN:5> (5)
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED
> > > proposals_negotiate: score 4
> > > proposals_negotiate: score 0
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > spi=0x87993e0d839b617f: sa_state: INIT -> SA_INIT
> > > proposals_negotiate: score 4
> > > proposals_negotiate: score 0
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0000
> > > sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 )
> > > spi=0x87993e0d839b617f: ikev2_sa_keys: DHSECRET with 32 bytes
> > > ikev2_sa_keys: SKEYSEED with 32 bytes
> > > spi=0x87993e0d839b617f: ikev2_sa_keys: S with 80 bytes
> > > ikev2_prfplus: T1 with 32 bytes
> > > ikev2_prfplus: T2 with 32 bytes
> > > ikev2_prfplus: T3 with 32 bytes
> > > ikev2_prfplus: T4 with 32 bytes
> > > ikev2_prfplus: T5 with 32 bytes
> > > ikev2_prfplus: T6 with 32 bytes
> > > ikev2_prfplus: T7 with 32 bytes
> > > ikev2_prfplus: Tn with 224 bytes
> > > ikev2_sa_keys: SK_d with 32 bytes
> > > ikev2_sa_keys: SK_ai with 32 bytes
> > > ikev2_sa_keys: SK_ar with 32 bytes
> > > ikev2_sa_keys: SK_ei with 32 bytes
> > > ikev2_sa_keys: SK_er with 32 bytes
> > > ikev2_sa_keys: SK_pi with 32 bytes
> > > ikev2_sa_keys: SK_pr with 32 bytes
> > > ikev2_add_proposals: length 44
> > > ikev2_next_payload: length 48 nextpayload KE
> > > ikev2_next_payload: length 72 nextpayload NONCE
> > > ikev2_next_payload: length 36 nextpayload NOTIFY
> > > ikev2_nat_detection: local source 0x87993e0d839b617f
> 0xbd5bf5ce26784624 --UK--:500
> > > ikev2_next_payload: length 28 nextpayload NOTIFY
> > > ikev2_nat_detection: local destination 0x87993e0d839b617f
> 0xbd5bf5ce26784624 --CAT--:500
> > > ikev2_next_payload: length 28 nextpayload CERTREQ
> > > ikev2_add_certreq: type X509_CERT length 21
> > > ikev2_next_payload: length 25 nextpayload NOTIFY
> > > ikev2_next_payload: length 14 nextpayload NONE
> > > ikev2_pld_parse: header ispi 0x87993e0d839b617f rspi
> 0xbd5bf5ce26784624 nextpayload SA
> > version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 279
> response 1
> > > ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length
> 48
> > > ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE
> spisize 0 xforms 4 spi
> > 0
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id
> HMAC_SHA2_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type DH id ECP_256
> > > ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00
> length 72
> > > ikev2_pld_ke: dh group ECP_256 reserved 0
> > > ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00
> length 36
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_SOURCE_IP
> > > ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical
> 0x00 length 28
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> NAT_DETECTION_DESTINATION_IP
> > > ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical
> 0x00 length 25
> > > ikev2_pld_certreq: type X509_CERT length 20
> > > ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00
> length 14
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> SIGNATURE_HASH_ALGORITHMS
> > > spi=0x87993e0d839b617f: send IKE_SA_INIT res 0 peer --CAT--:500
> local --UK--:500, 279
> > bytes
> > > config_free_proposals: free 0x3c2ef864700
> > > config_free_proposals: free 0x3c2a56da100
> > > spi=0x87993e0d839b617f: recv IKE_AUTH req 1 peer --CAT--:4500
> local --UK--:4500, 1792
> > bytes, policy '--CAT-HOST--'
> > > ikev2_recv: ispi 0x87993e0d839b617f rspi 0xbd5bf5ce26784624
> > > ikev2_recv: updated SA to peer --CAT--:4500 local --UK--:4500
> > > ikev2_pld_parse: header ispi 0x87993e0d839b617f rspi
> 0xbd5bf5ce26784624 nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 1792
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00
> length 1764
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 1728
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 1728/1728 padding 11
> > > ikev2_pld_payloads: decrypted payload IDi nextpayload CERT
> critical 0x00 length 33
> > > ikev2_pld_id: id UFQDN/indra@--CA-HOST-- length 29
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload NOTIFY
> critical 0x00 length 1090
> > > ikev2_pld_cert: type X509_CERT length 1085
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CERTREQ
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT
> > > ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH
> critical 0x00 length 85
> > > ikev2_pld_certreq: type X509_CERT length 80
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical
> 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY
> critical 0x00 length 16
> > > ikev2_pld_cp: type REQUEST length 8
> > > ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0
> > > ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 100
> > > ikev2_pld_sa: more 0 reserved 0 length 96 proposal #1 protoid ESP
> spisize 4 xforms 9 spi
> > 0xc0567d8f
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_384_192
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_512_256
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA1_96
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> AES_XCBC_96
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 24
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> ADDITIONAL_IP6_ADDRESS
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> EAP_ONLY_AUTHENTICATION
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type
> IKEV2_MESSAGE_ID_SYNC_SUPPORTED
> > > ikev2_handle_notifies: mobike enabled
> > > sa_stateok: SA_INIT flags 0x0000, require 0x0000
> > > spi=0x87993e0d839b617f: sa_state: SA_INIT -> AUTH_REQUEST
> > > policy_lookup: peerid 'indra@--CA-HOST--'
> > > proposals_negotiate: score 4
> > > policy_lookup: setting policy '--CAT-HOST--'
> > > ikev2_policy2id: srcid UFQDN/--UK-ID-- length 31
> > > sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_msg_auth: responder auth data length 343
> > > ca_setauth: switching SIG_ANY to SIG
> > > ca_setauth: auth length 343
> > > proposals_negotiate: score 4
> > > sa_stateflags: 0x0024 -> 0x0024 certreq,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > config_free_proposals: free 0x3c2ef864180
> > > ca_getreq: found CA
> /C=FR/ST=Seine-Saint-Denis/L=Aubervilliers/O=Telecom Lobby/OU=VPNC/CN
> > =--CA-HOST--
> > > ca_x509_subjectaltname_do: did not find subjectAltName in
> certificate
> > > ca_getreq: found local certificate
> /C=UK/ST=England/L=London/O=Telecom Lobby/OU=VPNC/CN=
> > --UK-HOST--
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > _dsa_sign_encode: signature scheme 0 selected
> > > ca_setauth: auth length 272
> > > ca_validate_pubkey: could not open public key pubkeys/ufqdn/indra@
> --CA-HOST--
> > > ca_validate_cert: /C=ES/ST=Catalunya/L=sant Pere de
> Ribes/O=Telecom Lobby/OU=VPNC/CN=
> > --CAT-HOST-- ok
> > > ikev2_getimsgdata: imsg 22 rspi 0xbd5bf5ce26784624 ispi
> 0x87993e0d839b617f initiator 0 sa
> > valid type 4 data length 1064
> > > ikev2_dispatch_cert: cert type X509_CERT length 1064, ok
> > > sa_stateflags: 0x0024 -> 0x0025 cert,certreq,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_getimsgdata: imsg 28 rspi 0xbd5bf5ce26784624 ispi
> 0x87993e0d839b617f initiator 0 sa
> > valid type 14 data length 272
> > > ikev2_dispatch_cert: AUTH type 14 len 272
> > > sa_stateflags: 0x0025 -> 0x002d cert,certreq,auth,sa (required
> 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_getimsgdata: imsg 23 rspi 0xbd5bf5ce26784624 ispi
> 0x87993e0d839b617f initiator 0 sa
> > valid type 4 data length 1085
> > > ikev2_msg_auth: initiator auth data length 1120
> > > ikev2_msg_authverify: method SIG keylen 1085 type X509_CERT
> > > _dsa_verify_init: signature scheme 0 selected
> > > ikev2_msg_authverify: authentication successful
> > > spi=0x87993e0d839b617f: sa_state: AUTH_REQUEST -> AUTH_SUCCESS
> > > sa_stateflags: 0x002d -> 0x003d cert,certreq,auth,authvalid,sa
> (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > ikev2_dispatch_cert: peer certificate is valid
> > > sa_stateflags: 0x003d -> 0x003f
> cert,certvalid,certreq,auth,authvalid,sa (required 0x003b
> > cert,certvalid,auth,authvalid,sa)
> > > sa_stateok: VALID flags 0x003b, require 0x003b
> cert,certvalid,auth,authvalid,sa
> > > spi=0x87993e0d839b617f: sa_state: AUTH_SUCCESS -> VALID
> > > sa_stateok: VALID flags 0x003b, require 0x003b
> cert,certvalid,auth,authvalid,sa
> > > sa_stateok: VALID flags 0x003b, require 0x003b
> cert,certvalid,auth,authvalid,sa
> > > ikev2_sa_tag: (0)
> > > ikev2_childsa_negotiate: proposal 1
> > > ikev2_childsa_negotiate: key material length 128
> > > ikev2_prfplus: T1 with 32 bytes
> > > ikev2_prfplus: T2 with 32 bytes
> > > ikev2_prfplus: T3 with 32 bytes
> > > ikev2_prfplus: T4 with 32 bytes
> > > ikev2_prfplus: Tn with 128 bytes
> > > pfkey_sa_getspi: spi 0x41a9644f
> > > pfkey_sa_init: new spi 0x41a9644f
> > > ikev2_next_payload: length 35 nextpayload CERT
> > > ikev2_next_payload: length 1069 nextpayload AUTH
> > > ikev2_next_payload: length 280 nextpayload CP
> > > ikev2_next_payload: length 8 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload NOTIFY
> > > ikev2_add_notify: done
> > > ikev2_next_payload: length 8 nextpayload SA
> > > ikev2_add_proposals: length 40
> > > ikev2_next_payload: length 44 nextpayload TSi
> > > ikev2_next_payload: length 24 nextpayload TSr
> > > ikev2_next_payload: length 24 nextpayload NONE
> > > ikev2_next_payload: length 1540 nextpayload IDr
> > > ikev2_msg_encrypt: decrypted length 1500
> > > ikev2_msg_encrypt: padded length 1504
> > > ikev2_msg_encrypt: length 1501, padding 3, output length 1536
> > > ikev2_msg_integr: message length 1568
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0x87993e0d839b617f rspi
> 0xbd5bf5ce26784624 nextpayload SK
> > version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1568
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00
> length 1540
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 1504
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 3
> > > ikev2_pld_payloads: decrypted payload IDr nextpayload CERT
> critical 0x00 length 35
> > > ikev2_pld_id: id UFQDN/--UK-ID-- length 31
> > > ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH
> critical 0x00 length 1069
> > > ikev2_pld_cert: type X509_CERT length 1064
> > > ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical
> 0x00 length 280
> > > ikev2_pld_auth: method SIG length 272
> > > ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_cp: type REPLY length 0
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type USE_TRANSPORT_MODE
> > > ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA
> critical 0x00 length 8
> > > ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED
> > > ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical
> 0x00 length 44
> > > ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP
> spisize 4 xforms 3 spi
> > 0x41a9644f
> > > ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC
> > > ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4
> > > ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id
> HMAC_SHA2_256_128
> > > ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE
> > > ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical
> 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --CAT-- end --CAT--
> > > ikev2_pld_payloads: decrypted payload TSr nextpayload NONE
> critical 0x00 length 24
> > > ikev2_pld_tss: count 1 length 16
> > > ikev2_pld_tss: type IPV4_ADDR_RANGE protoid 47 length 16 startport
> 0 endport 65535
> > > ikev2_pld_ts: start --UK-- end --UK--
> > > spi=0x87993e0d839b617f: send IKE_AUTH res 1 peer --CAT--:4500
> local --UK--:4500, 1568
> > bytes, NAT-T
> > > pfkey_sa_add: update spi 0x41a9644f
> > > ikev2_childsa_enable: loaded CHILD SA spi 0x41a9644f
> > > pfkey_sa_add: add spi 0xc0567d8f
> > > ikev2_childsa_enable: loaded CHILD SA spi 0xc0567d8f
> > > ikev2_childsa_enable: loaded flow 0x3c324182400
> > > ikev2_childsa_enable: loaded flow 0x3c2eec20000
> > > ikev2_childsa_enable: remember SA peer --CAT--:4500
> > > spi=0x87993e0d839b617f: ikev2_childsa_enable: loaded SPIs:
> 0x41a9644f, 0xc0567d8f
> > > spi=0x87993e0d839b617f: ikev2_childsa_enable: loaded flows:
> ESP---UK--/32=--CAT--/32(47)
> > > spi=0x87993e0d839b617f: sa_state: VALID -> ESTABLISHED from
> --CAT--:4500 to --UK--:4500
> > policy '--CAT-HOST--'
> > > spi=0x87993e0d839b617f: established peer --CAT--:4500[UFQDN/indra@--CA-HOST--]
> local
> > --UK--:4500[UFQDN/--UK-ID--] policy '--CAT-HOST--' as responder
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 12 peer --FR--:500
> local --UK--:500, 112
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 12 length 112
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 84
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 48
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 48/48 padding 47
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 12 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 12 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003365
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003365
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003366
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003366
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003366
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003365
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > policy_lookup: setting policy '--JP-HOST--'
> > > spi=0x52b68ffd0ebb1984: recv INFORMATIONAL req 93 peer
> --JP-IP--:500 local --UK--:500, 57
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x52b68ffd0ebb1984 rspi 0xebcdfe906b83921a
> > > ikev2_init_recv: unknown SA
> > > pfkey_sa_lookup: last_used 1614003379
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x41a9644f last used 1
> second(s) ago
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 13 peer --FR--:500
> local --UK--:500, 128
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 13 length 128
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 100
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 64
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 64/64 padding 63
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 13 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 13 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003380
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003380
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003381
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003381
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003381
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003380
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > policy_lookup: setting policy '--US-HOST--'
> > > spi=0xe6cf431822ad3dc9: recv INFORMATIONAL req 53 peer
> --US-IP--:500 local --UK--:500, 57
> > bytes, policy '--US-HOST--'
> > > ikev2_recv: ispi 0xe6cf431822ad3dc9 rspi 0x338f3945413a685a
> > > ikev2_init_recv: unknown SA
> > > pfkey_sa_lookup: last_used 1614003392
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x41a9644f last used 3
> second(s) ago
> > > spi=0xf2043da59221143f: recv INFORMATIONAL req 14 peer --FR--:500
> local --UK--:500, 160
> > bytes, policy '--FR-HOST--'
> > > ikev2_recv: ispi 0xf2043da59221143f rspi 0x1f43bd64d771a4e5
> > > ikev2_recv: updated SA to peer --FR--:500 local --UK--:500
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x00 msgid 14 length 160
> response 0
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 132
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 96
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 96/96 padding 95
> > > ikev2_next_payload: length 52 nextpayload NONE
> > > ikev2_msg_encrypt: decrypted length 0
> > > ikev2_msg_encrypt: padded length 16
> > > ikev2_msg_encrypt: length 1, padding 15, output length 48
> > > ikev2_msg_integr: message length 80
> > > ikev2_msg_integr: integrity checksum length 16
> > > ikev2_pld_parse: header ispi 0xf2043da59221143f rspi
> 0x1f43bd64d771a4e5 nextpayload SK
> > version 0x20 exchange INFORMATIONAL flags 0x28 msgid 14 length 80
> response 1
> > > ikev2_pld_payloads: payload SK nextpayload NONE critical 0x00
> length 52
> > > ikev2_msg_decrypt: IV length 16
> > > ikev2_msg_decrypt: encrypted payload length 16
> > > ikev2_msg_decrypt: integrity checksum length 16
> > > ikev2_msg_decrypt: integrity check succeeded
> > > ikev2_msg_decrypt: decrypted payload length 16/16 padding 15
> > > spi=0xf2043da59221143f: send INFORMATIONAL res 14 peer --FR--:500
> local --UK--:500, 80
> > bytes
> > > pfkey_sa_lookup: last_used 1614003394
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0x066d9db6 last used 1
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003394
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x8f3bad08 last used 1
> second(s) ago
> > > policy_lookup: setting policy '--US-HOST--'
> > > spi=0xe6cf431822ad3dc9: recv INFORMATIONAL req 53 peer
> --US-IP--:500 local --UK--:500, 57
> > bytes, policy '--US-HOST--'
> > > ikev2_recv: ispi 0xe6cf431822ad3dc9 rspi 0x338f3945413a685a
> > > ikev2_init_recv: unknown SA
> > > pfkey_sa_lookup: last_used 1614003396
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xd1bfd520 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003396
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0xfc41aa70 last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003396
> > > ikev2_ike_sa_alive: outgoing CHILD SA spi 0xb1bffe2d last used 0
> second(s) ago
> > > pfkey_sa_lookup: last_used 1614003395
> > > ikev2_ike_sa_alive: incoming CHILD SA spi 0x4701e9b5 last used 1
> second(s) ago
> > > policy_lookup: setting policy '--US-HOST--'
> > > spi=0xe6cf431822ad3dc9: recv INFORMATIONAL req 53 peer
> --US-IP--:500 local --UK--:500, 57
> > bytes, policy '--US-HOST--'
> > > ikev2_recv: ispi 0xe6cf431822ad3dc9 rspi 0x338f3945413a685a
> > > ikev2_init_recv: unknown SA
> > > policy_lookup: setting policy '--JP-HOST--'
> > > spi=0x52b68ffd0ebb1984: recv INFORMATIONAL req 93 peer
> --JP-IP--:500 local --UK--:500, 57
> > bytes, policy '--JP-HOST--'
> > > ikev2_recv: ispi 0x52b68ffd0ebb1984 rspi 0xebcdfe906b83921a
> > > ikev2_init_recv: unknown SA
> > > ca exiting, pid 842
> > > control exiting, pid 64161
> > > ikev2 exiting, pid 15623
> > > parent terminating
> >
> >
> >
> >
> > --
> > Name: Riccardo Giuntoli
> > Email: taglio@gmail.com
> > Location: sant Pere de Ribes, BCN, Spain
> > PGP Key: 0x67123739
> > PGP Fingerprint: CE75 16B5 D855 842FAB54 FB5C DDC6 4640 6712 3739
> > Key server: hkp://wwwkeys.eu.pgp.net
>
--
Name: Riccardo Giuntoli
Email: taglio@gmail.com
Location: sant Pere de Ribes, BCN, Spain
PGP Key: 0x67123739
PGP Fingerprint: CE75 16B5 D855 842FAB54 FB5C DDC6 4640 6712 3739
Key server: hkp://wwwkeys.eu.pgp.net
No comments:
Post a Comment