Here the entire log for an 8 minutes long session (I added === breaks for the 2 minute dead peer detection items). I no longer see the “NO_PROPOSAL_CHOSEN” error but it disconnects regardless. I can try reducing the lifetime but I feel something else is the problem here.
I also trimmed the configs, so this is the profile:
name="ike2" hash-algorithm=sha256 prf-algorithm=sha256 enc-algorithm=aes-256 dh-group=modp2048 lifetime=1d proposal-check=obey nat-traversal=yes dpd-interval=2m dpd-maximum-failures=3
And this is the proposal:
name="ike2-proposal" auth-algorithms=sha256 enc-algorithms=aes-256-cbc lifetime=30m pfs-group=none
And here is the full log:
16:54:36 ipsec ipsecdebug: -> ike2 request, exchange: SA_INIT:0 laptop_ipv6_address[500] 19daf5dfb3e01030:0000000000000000
16:54:36 ipsec ipsecdebug: ike2 respond
16:54:36 ipsec ipsecdebug: payload seen: SA
16:54:36 ipsec ipsecdebug: payload seen: KE
16:54:36 ipsec ipsecdebug: payload seen: NONCE
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: processing payload: SA
16:54:36 ipsec ipsecdebug: IKE Protocol: IKE
16:54:36 ipsec ipsecdebug: proposal #1
16:54:36 ipsec ipsecdebug: enc: aes256-cbc
16:54:36 ipsec ipsecdebug: prf: hmac-sha256
16:54:36 ipsec ipsecdebug: auth: sha256
16:54:36 ipsec ipsecdebug: dh: modp2048
16:54:36 ipsec ipsecdebug: proposal #2
16:54:36 ipsec ipsecdebug: enc: aes256-cbc
16:54:36 ipsec ipsecdebug: prf: hmac-sha256
16:54:36 ipsec ipsecdebug: auth: sha256
16:54:36 ipsec ipsecdebug: dh: ecp256
16:54:36 ipsec ipsecdebug: proposal #3
16:54:36 ipsec ipsecdebug: enc: aes256-cbc
16:54:36 ipsec ipsecdebug: prf: hmac-sha256
16:54:36 ipsec ipsecdebug: auth: sha256
16:54:36 ipsec ipsecdebug: dh: modp1536
16:54:36 ipsec ipsecdebug: proposal #4
16:54:36 ipsec ipsecdebug: enc: aes128-cbc
16:54:36 ipsec ipsecdebug: prf: hmac-sha1
16:54:36 ipsec ipsecdebug: auth: sha1
16:54:36 ipsec ipsecdebug: dh: modp1024
16:54:36 ipsec ipsecdebug: proposal #5
16:54:36 ipsec ipsecdebug: enc: 3des-cbc
16:54:36 ipsec ipsecdebug: prf: hmac-sha1
16:54:36 ipsec ipsecdebug: auth: sha1
16:54:36 ipsec ipsecdebug: dh: modp1024
16:54:36 ipsec ipsecdebug: matched proposal:
16:54:36 ipsec ipsecdebug: proposal #1
16:54:36 ipsec ipsecdebug: enc: aes256-cbc
16:54:36 ipsec ipsecdebug: prf: hmac-sha256
16:54:36 ipsec ipsecdebug: auth: sha256
16:54:36 ipsec ipsecdebug: dh: modp2048
16:54:36 ipsec ipsecdebug: processing payload: KE
16:54:36 ipsec ipsecdebug: ike2 respond finish: request, exchange: SA_INIT:0 laptop_ipv6_address[500] 19daf5dfb3e01030:0000000000000000
16:54:36 ipsec ipsecdebug: processing payload: NONCE
16:54:36 ipsec ipsecdebug: adding payload: SA
16:54:36 ipsec ipsecdebug: adding payload: KE
16:54:36 ipsec ipsecdebug: adding payload: NONCE
16:54:36 ipsec ipsecdebug: adding notify: NAT_DETECTION_SOURCE_IP
16:54:36 ipsec ipsecdebug: adding notify: NAT_DETECTION_DESTINATION_IP
16:54:36 ipsec ipsecdebug: adding notify: IKEV2_FRAGMENTATION_SUPPORTED
16:54:36 ipsec ipsecdebug: adding payload: CERTREQ
16:54:36 ipsec ipsecdebug: <- ike2 reply, exchange: SA_INIT:0 laptop_ipv6_address[500] 19daf5dfb3e01030:7103e19a622b8746
16:54:36 ipsec,info new ike2 SA (R): ipsec_peer1 mikrotik_ipv6_address[500]-laptop_ipv6_address[500] spi:7103e19a622b8746:19daf5dfb3e01030
16:54:36 ipsec,info ipsecdebug: new ike2 SA (R): ipsec_peer1 mikrotik_ipv6_address[500]-laptop_ipv6_address[500] spi:7103e19a622b8746:19daf5dfb3e01030
16:54:36 ipsec ipsecdebug: processing payloads: VID (none found)
16:54:36 ipsec ipsecdebug: processing payloads: NOTIFY
16:54:36 ipsec ipsecdebug: notify: REDIRECT_SUPPORTED
16:54:36 ipsec ipsecdebug: notify: NAT_DETECTION_SOURCE_IP
16:54:36 ipsec ipsecdebug: notify: NAT_DETECTION_DESTINATION_IP
16:54:36 ipsec ipsecdebug: notify: IKEV2_FRAGMENTATION_SUPPORTED
16:54:36 ipsec ipsecdebug: notify: SIGNATURE_HASH_ALGORITHMS
16:54:36 ipsec ipsecdebug: fragmentation negotiated
16:54:36 ipsec ipsecdebug: -> ike2 request, exchange: AUTH:1 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:54:36 ipsec ipsecdebug: peer ports changed: 500 -> 4500
16:54:36 ipsec ipsecdebug: payload seen: SKF
16:54:36 ipsec ipsecdebug: processing payload: ENC (not found)
16:54:36 ipsec ipsecdebug: processing payload: SKF
16:54:36 ipsec ipsecdebug: -> ike2 request, exchange: AUTH:1 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:54:36 ipsec ipsecdebug: payload seen: SKF
16:54:36 ipsec ipsecdebug: processing payload: ENC (not found)
16:54:36 ipsec ipsecdebug: processing payload: SKF
16:54:36 ipsec ipsecdebug: payload seen: ID_I
16:54:36 ipsec ipsecdebug: payload seen: CERT
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: ID_R
16:54:36 ipsec ipsecdebug: payload seen: AUTH
16:54:36 ipsec ipsecdebug: payload seen: CONFIG
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: payload seen: SA
16:54:36 ipsec ipsecdebug: payload seen: TS_I
16:54:36 ipsec ipsecdebug: payload seen: TS_R
16:54:36 ipsec ipsecdebug: payload seen: NOTIFY
16:54:36 ipsec ipsecdebug: processing payloads: NOTIFY
16:54:36 ipsec ipsecdebug: notify: INITIAL_CONTACT
16:54:36 ipsec ipsecdebug: notify: ESP_TFC_PADDING_NOT_SUPPORTED
16:54:36 ipsec ipsecdebug: notify: NON_FIRST_FRAGMENTS_ALSO
16:54:36 ipsec ipsecdebug: notify: MOBIKE_SUPPORTED
16:54:36 ipsec ipsecdebug: ike auth: respond
16:54:36 ipsec ipsecdebug: processing payload: ID_I
16:54:36 ipsec ipsecdebug: ID_I (FQDN): hermes
16:54:36 ipsec ipsecdebug: processing payload: ID_R
16:54:36 ipsec ipsecdebug: ID_R (FQDN): styx
16:54:36 ipsec ipsecdebug: processing payload: AUTH
16:54:36 ipsec ipsecdebug: processing payload: CERT
16:54:36 ipsec ipsecdebug: Certificate:
16:54:36 ipsec ipsecdebug: serialNr: 07:d1:14:05:58:46:4d:5d:f5:8d:3d:a9:95:1c:dd:c3
16:54:36 ipsec ipsecdebug: issuer: <removed>
16:54:36 ipsec ipsecdebug: subject: <CN=hermes>
16:54:36 ipsec ipsecdebug: notBefore: Fri Oct 7 21:23:12 2022
16:54:36 ipsec ipsecdebug: notAfter: Mon Oct 4 21:23:12 2032
16:54:36 ipsec ipsecdebug: selfSigned:0
16:54:36 ipsec ipsecdebug: extensions:
16:54:36 ipsec ipsecdebug: key usage: digital-signature
16:54:36 ipsec ipsecdebug: extended key usage: tls-client
16:54:36 ipsec ipsecdebug: basic constraints: isCa: FALSE
16:54:36 ipsec ipsecdebug: subject key id: 9f:e6:a2:7a:c6:bc:94:bf:01:e5:6f:d6:56:35:31:70:18:ba:b9:b9
16:54:36 ipsec ipsecdebug: authority key id:18:ba:6e:15:d0:4a:17:7a:16:5f:9d:86:22:53:74:34:ea:f1:48:58
16:54:36 ipsec ipsecdebug: subject alternative name:
16:54:36 ipsec ipsecdebug: DNS: hermes
16:54:36 ipsec ipsecdebug: signed with: SHA256+RSA
16:54:36 ipsec ipsecdebug: [RSA-PUBLIC]
16:54:36 ipsec ipsecdebug: modulus: <removed>
16:54:36 ipsec ipsecdebug: publicExponent: 10001
16:54:36 ipsec ipsecdebug: requested server id: styx
16:54:36 ipsec ipsecdebug: processing payloads: NOTIFY
16:54:36 ipsec ipsecdebug: notify: INITIAL_CONTACT
16:54:36 ipsec ipsecdebug: notify: ESP_TFC_PADDING_NOT_SUPPORTED
16:54:36 ipsec ipsecdebug: notify: NON_FIRST_FRAGMENTS_ALSO
16:54:36 ipsec ipsecdebug: notify: MOBIKE_SUPPORTED
16:54:36 ipsec ipsecdebug: processing payload: AUTH
16:54:36 ipsec ipsecdebug: requested auth method: RSA
16:54:36 ipsec ipsecdebug: trust chain:
16:54:36 ipsec ipsecdebug: 0: SKID: 9f:e6:a2:7a:c6:bc:94:bf:01:e5:6f:d6:56:35:31:70:18:ba:b9:b9
16:54:36 ipsec ipsecdebug: AKID: 18:ba:6e:15:d0:4a:17:7a:16:5f:9d:86:22:53:74:34:ea:f1:48:58
16:54:36 ipsec ipsecdebug: 1: SKID: 18:ba:6e:15:d0:4a:17:7a:16:5f:9d:86:22:53:74:34:ea:f1:48:58
16:54:36 ipsec ipsecdebug: AKID: 18:ba:6e:15:d0:4a:17:7a:16:5f:9d:86:22:53:74:34:ea:f1:48:58
16:54:36 ipsec,info,account peer authorized: ipsec_peer1 mikrotik_ipv6_address[4500]-laptop_ipv6_address[4500] spi:7103e19a622b8746:19daf5dfb3e01030
16:54:36 ipsec,info,account ipsecdebug: peer authorized: ipsec_peer1 mikrotik_ipv6_address[4500]-laptop_ipv6_address[4500] spi:7103e19a622b8746:19daf5dfb3e01030
16:54:36 ipsec ipsecdebug: initial contact
16:54:36 ipsec ipsecdebug: processing payloads: NOTIFY
16:54:36 ipsec ipsecdebug: notify: INITIAL_CONTACT
16:54:36 ipsec ipsecdebug: notify: ESP_TFC_PADDING_NOT_SUPPORTED
16:54:36 ipsec ipsecdebug: notify: NON_FIRST_FRAGMENTS_ALSO
16:54:36 ipsec ipsecdebug: notify: MOBIKE_SUPPORTED
16:54:36 ipsec ipsecdebug: peer wants tunnel mode
16:54:36 ipsec ipsecdebug: processing payload: CONFIG
16:54:36 ipsec ipsecdebug: attribute: internal IPv4 address
16:54:36 ipsec ipsecdebug: attribute: internal IPv4 netmask
16:54:36 ipsec ipsecdebug: attribute: internal IPv4 DHCP
16:54:36 ipsec ipsecdebug: attribute: internal IPv4 DNS
16:54:36 ipsec ipsecdebug: attribute: internal IPv6 address
16:54:36 ipsec ipsecdebug: attribute: internal IPv6 DHCP
16:54:36 ipsec ipsecdebug: attribute: internal IPv6 DNS
16:54:36 ipsec ipsecdebug: attribute: internal DNS domain
16:54:36 ipsec,info acquired 10.x.y.z address for laptop_ipv6_address, hermes
16:54:36 ipsec,info ipsecdebug: acquired 10.x.y.z address for laptop_ipv6_address, hermes
16:54:36 ipsec ipsecdebug: processing payload: SA
16:54:36 ipsec ipsecdebug: IKE Protocol: ESP
16:54:36 ipsec ipsecdebug: proposal #1
16:54:36 ipsec ipsecdebug: enc: aes256-cbc
16:54:36 ipsec ipsecdebug: auth: sha256
16:54:36 ipsec ipsecdebug: proposal #2
16:54:36 ipsec ipsecdebug: enc: aes128-cbc
16:54:36 ipsec ipsecdebug: auth: sha1
16:54:36 ipsec ipsecdebug: proposal #3
16:54:36 ipsec ipsecdebug: enc: 3des-cbc
16:54:36 ipsec ipsecdebug: auth: sha1
16:54:36 ipsec ipsecdebug: processing payload: TS_I
16:54:36 ipsec ipsecdebug: 0.0.0.0/0
16:54:36 ipsec ipsecdebug: [::/0]
16:54:36 ipsec ipsecdebug: processing payload: TS_R
16:54:36 ipsec ipsecdebug: 0.0.0.0/0
16:54:36 ipsec ipsecdebug: [::/0]
16:54:36 ipsec ipsecdebug: TSi in tunnel mode replaced with config address: 10.x.y.z
16:54:36 ipsec ipsecdebug: TSr in tunnel mode replaced with split subnet: 0.0.0.0/0
16:54:36 ipsec ipsecdebug: candidate selectors: 0.0.0.0/0 <=> 10.x.y.z
16:54:36 ipsec ipsecdebug: candidate selectors: [::/0] <=> [::/0]
16:54:36 ipsec ipsecdebug: searching for policy for selector: 0.0.0.0/0 <=> 10.x.y.z
16:54:36 ipsec ipsecdebug: generating policy
16:54:36 ipsec ipsecdebug: matched proposal:
16:54:36 ipsec ipsecdebug: proposal #1
16:54:36 ipsec ipsecdebug: enc: aes256-cbc
16:54:36 ipsec ipsecdebug: auth: sha256
16:54:36 ipsec ipsecdebug: ike auth: finish
16:54:36 ipsec ipsecdebug: ID_R (DER DN): CN=styx
16:54:36 ipsec ipsecdebug: adding payload: ID_R
16:54:36 ipsec ipsecdebug: adding payload: AUTH
16:54:36 ipsec ipsecdebug: Certificate:
16:54:36 ipsec ipsecdebug: serialNr: 00:b0:10:82:54:3f:d3:96:36:9a:43:c3:d6:76:78:24:e7
16:54:36 ipsec ipsecdebug: issuer: <removed>
16:54:36 ipsec ipsecdebug: subject: <CN=styx>
16:54:36 ipsec ipsecdebug: notBefore: Sun Dec 23 12:04:05 2018
16:54:36 ipsec ipsecdebug: notAfter: Wed Dec 20 12:04:05 2028
16:54:36 ipsec ipsecdebug: selfSigned:0
16:54:36 ipsec ipsecdebug: extensions:
16:54:36 ipsec ipsecdebug: key usage: digital-signature, key-encipherment
16:54:36 ipsec ipsecdebug: extended key usage: tls-server
16:54:36 ipsec ipsecdebug: basic constraints: isCa: FALSE
16:54:36 ipsec ipsecdebug: subject key id: b6:de:da:f2:e0:72:67:2b:95:38:b6:ad:c4:c2:6b:cd:7a:21:28:53
16:54:36 ipsec ipsecdebug: authority key id:18:ba:6e:15:d0:4a:17:7a:16:5f:9d:86:22:53:74:34:ea:f1:48:58
16:54:36 ipsec ipsecdebug: subject alternative name:
16:54:36 ipsec ipsecdebug: DNS: styx
16:54:36 ipsec ipsecdebug: signed with: SHA256+RSA
16:54:36 ipsec ipsecdebug: [RSA-PUBLIC]
16:54:36 ipsec ipsecdebug: modulus: <removed>
16:54:36 ipsec ipsecdebug: publicExponent: 10001
16:54:36 ipsec ipsecdebug: adding payload: CERT
16:54:36 ipsec ipsecdebug: preparing internal IPv4 address
16:54:36 ipsec ipsecdebug: preparing internal IPv4 netmask
16:54:36 ipsec ipsecdebug: preparing internal IPv6 subnet
16:54:36 ipsec ipsecdebug: preparing internal IPv4 DNS
16:54:36 ipsec ipsecdebug: adding payload: CONFIG
16:54:36 ipsec ipsecdebug: initiator selector: 10.x.y.z
16:54:36 ipsec ipsecdebug: adding payload: TS_I
16:54:36 ipsec ipsecdebug: responder selector: 0.0.0.0/0
16:54:36 ipsec ipsecdebug: adding payload: TS_R
16:54:36 ipsec ipsecdebug: adding payload: SA
16:54:36 ipsec ipsecdebug: <- ike2 reply, exchange: AUTH:1 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:54:36 ipsec ipsecdebug: fragmenting into 2 chunks
16:54:36 ipsec ipsecdebug: adding payload: SKF
16:54:36 ipsec ipsecdebug: adding payload: SKF
16:54:36 ipsec ipsecdebug: IPsec-SA established: laptop_ipv6_address[4500]->mikrotik_ipv6_address[4500] spi=0x39c0e3
16:54:36 ipsec ipsecdebug: IPsec-SA established: mikrotik_ipv6_address[4500]->laptop_ipv6_address[4500] spi=0x111be35
= = = = = = = = = = = = = = = = = = = = = = = = = = =
16:56:36 ipsec ipsecdebug: sending dpd packet
16:56:36 ipsec ipsecdebug: <- ike2 request, exchange: INFORMATIONAL:0 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:56:36 ipsec ipsecdebug: -> ike2 reply, exchange: INFORMATIONAL:0 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:56:36 ipsec ipsecdebug: payload seen: ENC
16:56:36 ipsec ipsecdebug: processing payload: ENC
16:56:36 ipsec ipsecdebug: respond: info
16:56:36 ipsec ipsecdebug: reply ignored
= = = = = = = = = = = = = = = = = = = = = = = = = = =
16:58:36 ipsec ipsecdebug: sending dpd packet
16:58:36 ipsec ipsecdebug: <- ike2 request, exchange: INFORMATIONAL:1 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:58:36 ipsec ipsecdebug: -> ike2 reply, exchange: INFORMATIONAL:1 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
16:58:36 ipsec ipsecdebug: payload seen: ENC
16:58:36 ipsec ipsecdebug: processing payload: ENC
16:58:36 ipsec ipsecdebug: respond: info
16:58:36 ipsec ipsecdebug: reply ignored
= = = = = = = = = = = = = = = = = = = = = = = = = = =
17:00:36 ipsec ipsecdebug: sending dpd packet
17:00:36 ipsec ipsecdebug: <- ike2 request, exchange: INFORMATIONAL:2 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:00:36 ipsec ipsecdebug: -> ike2 reply, exchange: INFORMATIONAL:2 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:00:36 ipsec ipsecdebug: payload seen: ENC
17:00:36 ipsec ipsecdebug: processing payload: ENC
17:00:36 ipsec ipsecdebug: respond: info
17:00:36 ipsec ipsecdebug: reply ignored
= = = = = = = = = = = = = = = = = = = = = = = = = = =
17:02:36 ipsec ipsecdebug: sending dpd packet
17:02:36 ipsec ipsecdebug: <- ike2 request, exchange: INFORMATIONAL:3 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:02:36 ipsec ipsecdebug: -> ike2 reply, exchange: INFORMATIONAL:3 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:02:36 ipsec ipsecdebug: payload seen: ENC
17:02:36 ipsec ipsecdebug: processing payload: ENC
17:02:36 ipsec ipsecdebug: respond: info
17:02:36 ipsec ipsecdebug: reply ignored
17:02:36 ipsec ipsecdebug: -> ike2 request, exchange: CREATE_CHILD_SA:2 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:02:36 ipsec ipsecdebug: payload seen: ENC
17:02:36 ipsec ipsecdebug: processing payload: ENC
17:02:36 ipsec ipsecdebug: payload seen: SA
17:02:36 ipsec ipsecdebug: payload seen: NONCE
17:02:36 ipsec ipsecdebug: payload seen: KE
17:02:36 ipsec ipsecdebug: create child: respond
17:02:36 ipsec ipsecdebug: processing payloads: NOTIFY (none found)
17:02:36 ipsec ipsecdebug: IKE SA rekey
17:02:36 ipsec ipsecdebug: processing payload: SA
17:02:36 ipsec ipsecdebug: IKE Protocol: IKE
17:02:36 ipsec ipsecdebug: proposal #1
17:02:36 ipsec ipsecdebug: enc: aes256-cbc
17:02:36 ipsec ipsecdebug: prf: hmac-sha256
17:02:36 ipsec ipsecdebug: auth: sha256
17:02:36 ipsec ipsecdebug: dh: modp2048
17:02:36 ipsec ipsecdebug: matched proposal:
17:02:36 ipsec ipsecdebug: proposal #1
17:02:36 ipsec ipsecdebug: enc: aes256-cbc
17:02:36 ipsec ipsecdebug: prf: hmac-sha256
17:02:36 ipsec ipsecdebug: auth: sha256
17:02:36 ipsec ipsecdebug: dh: modp2048
17:02:36 ipsec ipsecdebug: processing payload: KE
17:02:36 ipsec ipsecdebug: processing payload: NONCE
17:02:36 ipsec ipsecdebug: adding payload: SA
17:02:36 ipsec ipsecdebug: adding payload: KE
17:02:36 ipsec ipsecdebug: adding payload: NONCE
17:02:36 ipsec ipsecdebug: <- ike2 reply, exchange: CREATE_CHILD_SA:2 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:02:36 ipsec ipsecdebug: -> ike2 request, exchange: INFORMATIONAL:3 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:02:36 ipsec ipsecdebug: payload seen: ENC
17:02:36 ipsec ipsecdebug: processing payload: ENC
17:02:36 ipsec ipsecdebug: payload seen: DELETE
17:02:36 ipsec ipsecdebug: respond: info
17:02:36 ipsec ipsecdebug: processing payloads: NOTIFY (none found)
17:02:36 ipsec ipsecdebug: <- ike2 reply, exchange: INFORMATIONAL:3 laptop_ipv6_address[4500] 19daf5dfb3e01030:7103e19a622b8746
17:02:36 ipsec ipsecdebug: processing payloads: DELETE
17:02:36 ipsec ipsecdebug: delete IKE SA
17:02:36 ipsec ipsecdebug: rekey done
17:02:37 ipsec ipsecdebug: -> ike2 request, exchange: CREATE_CHILD_SA:0 laptop_ipv6_address[4500] b1f8195c4235d665:6f8d23efdfbda24e
17:02:37 ipsec ipsecdebug: payload seen: ENC
17:02:37 ipsec ipsecdebug: processing payload: ENC
17:02:37 ipsec ipsecdebug: payload seen: NOTIFY
17:02:37 ipsec ipsecdebug: payload seen: SA
17:02:37 ipsec ipsecdebug: payload seen: NONCE
17:02:37 ipsec ipsecdebug: payload seen: TS_I
17:02:37 ipsec ipsecdebug: payload seen: TS_R
17:02:37 ipsec ipsecdebug: create child: respond
17:02:37 ipsec ipsecdebug: processing payloads: NOTIFY
17:02:37 ipsec ipsecdebug: notify: REKEY_SA
17:02:37 ipsec ipsecdebug: rekeying child SA 0x111be35
17:02:37 ipsec ipsecdebug: peer wants tunnel mode
17:02:37 ipsec ipsecdebug: processing payload: TS_R
17:02:37 ipsec ipsecdebug: 0.0.0.0/0
17:02:37 ipsec ipsecdebug: processing payload: TS_I
17:02:37 ipsec ipsecdebug: 10.x.y.z
17:02:37 ipsec ipsecdebug: checking: 0.0.0.0/0 <=> 10.x.y.z
17:02:37 ipsec ipsecdebug: processing payload: SA
17:02:37 ipsec ipsecdebug: IKE Protocol: ESP
17:02:37 ipsec ipsecdebug: proposal #1
17:02:37 ipsec ipsecdebug: enc: aes256-cbc
17:02:37 ipsec ipsecdebug: auth: sha256
17:02:37 ipsec ipsecdebug: matched proposal:
17:02:37 ipsec ipsecdebug: proposal #1
17:02:37 ipsec ipsecdebug: enc: aes256-cbc
17:02:37 ipsec ipsecdebug: auth: sha256
17:02:37 ipsec ipsecdebug: processing payload: NONCE
17:02:37 ipsec ipsecdebug: create child: finish
17:02:37 ipsec ipsecdebug: adding payload: NONCE
17:02:37 ipsec ipsecdebug: initiator selector: 10.x.y.z
17:02:37 ipsec ipsecdebug: adding payload: TS_I
17:02:37 ipsec ipsecdebug: responder selector: 0.0.0.0/0
17:02:37 ipsec ipsecdebug: adding payload: TS_R
17:02:37 ipsec ipsecdebug: adding payload: SA
17:02:37 ipsec ipsecdebug: <- ike2 reply, exchange: CREATE_CHILD_SA:0 laptop_ipv6_address[4500] b1f8195c4235d665:6f8d23efdfbda24e
17:02:37 ipsec ipsecdebug: IPsec-SA established: laptop_ipv6_address[4500]->mikrotik_ipv6_address[4500] spi=0x2bad8f1
17:02:37 ipsec ipsecdebug: -> ike2 request, exchange: INFORMATIONAL:1 laptop_ipv6_address[4500] b1f8195c4235d665:6f8d23efdfbda24e
17:02:37 ipsec ipsecdebug: payload seen: ENC
17:02:37 ipsec ipsecdebug: processing payload: ENC
17:02:37 ipsec ipsecdebug: payload seen: DELETE
17:02:37 ipsec ipsecdebug: respond: info
17:02:37 ipsec ipsecdebug: processing payloads: NOTIFY (none found)
17:02:37 ipsec ipsecdebug: <- ike2 reply, exchange: INFORMATIONAL:1 laptop_ipv6_address[4500] b1f8195c4235d665:6f8d23efdfbda24e
17:02:37 ipsec ipsecdebug: processing payloads: DELETE
17:02:37 ipsec ipsecdebug: delete ESP SA
17:02:37 ipsec ipsecdebug: delete spi: 0x111be35
17:02:37 ipsec ipsecdebug: IPsec-SA established: mikrotik_ipv6_address[4500]->laptop_ipv6_address[4500] spi=0xed542dd
17:02:37 ipsec ipsecdebug: IPsec-SA killing: laptop_ipv6_address[4500]->mikrotik_ipv6_address[4500] spi=0x39c0e3
17:02:37 ipsec ipsecdebug: IPsec-SA killing: mikrotik_ipv6_address[4500]->laptop_ipv6_address[4500] spi=0x111be35
17:02:37 ipsec ipsecdebug: -> ike2 request, exchange: INFORMATIONAL:2 laptop_ipv6_address[4500] b1f8195c4235d665:6f8d23efdfbda24e
17:02:37 ipsec ipsecdebug: payload seen: ENC
17:02:37 ipsec ipsecdebug: processing payload: ENC
17:02:37 ipsec ipsecdebug: payload seen: DELETE
17:02:37 ipsec ipsecdebug: respond: info
17:02:37 ipsec ipsecdebug: processing payloads: NOTIFY (none found)
17:02:37 ipsec ipsecdebug: <- ike2 reply, exchange: INFORMATIONAL:2 laptop_ipv6_address[4500] b1f8195c4235d665:6f8d23efdfbda24e
17:02:37 ipsec ipsecdebug: processing payloads: DELETE
17:02:37 ipsec ipsecdebug: delete IKE SA
17:02:37 ipsec,info killing ike2 SA: ipsec_peer1 mikrotik_ipv6_address[4500]-laptop_ipv6_address[4500] spi:6f8d23efdfbda24e:b1f8195c4235d665
17:02:37 ipsec,info ipsecdebug: killing ike2 SA: ipsec_peer1 mikrotik_ipv6_address[4500]-laptop_ipv6_address[4500] spi:6f8d23efdfbda24e:b1f8195c4235d665
17:02:37 ipsec ipsecdebug: IPsec-SA killing: laptop_ipv6_address[4500]->mikrotik_ipv6_address[4500] spi=0x2bad8f1
17:02:37 ipsec ipsecdebug: IPsec-SA killing: mikrotik_ipv6_address[4500]->laptop_ipv6_address[4500] spi=0xed542dd
17:02:37 ipsec ipsecdebug: removing generated policy
17:02:37 ipsec,info releasing address 10.x.y.z
17:02:37 ipsec,info ipsecdebug: releasing address 10.x.y.z