Here is log with the above logging setting.
I dont see anything interesing there though, It almost looks like config mismatch, but in the log the setting is correct on both sides.
14:17:52 ipsec,debug Migrate Ph2
14:17:52 ipsec,info ISAKMP-SA deleted 10.255.255.1[500]-XXX.XXX.XXX.XXX[500] spi:d15
35185be9fc0fb:23d22ed5aa4beebe rekey:1
14:17:52 ipsec,debug an undead schedule has been deleted.
14:17:52 ipsec,debug Removing PH1…
14:17:52 ipsec,debug Deleting a Ph2…
14:17:52 ipsec,debug compute IV for phase2
14:17:52 ipsec,debug phase1 last IV:
14:17:52 ipsec,debug 2b435a77 2c14c4fa 23735c64 93bc12fd 8fce989f
14:17:52 ipsec,debug hash(sha1)
14:17:52 ipsec,debug encryption(aes)
14:17:52 ipsec,debug phase2 IV computed:
14:17:52 ipsec,debug ee098b90 cdd12f24 e1f661df 5d9b4d13
14:17:52 ipsec,debug HASH with:
14:17:52 ipsec,debug 8fce989f 00000010 00000001 03040001 03957e8f
14:17:52 ipsec,debug hmac(hmac_sha1)
14:17:52 ipsec,debug HASH computed:
14:17:52 ipsec,debug 1b644661 fb1da4f4 72c60893 4182206f 5bbefd50
14:17:52 ipsec,debug begin encryption.
14:17:52 ipsec,debug encryption(aes)
14:17:52 ipsec,debug pad length = 8
14:17:52 ipsec,debug 0c000018 1b644661 fb1da4f4 72c60893 4182206f 5bbefd50 0000001
0 00000001
14:17:52 ipsec,debug 03040001 03957e8f b3cb99db a3b5d407
14:17:52 ipsec,debug encryption(aes)
14:17:52 ipsec,debug with key:
14:17:52 ipsec,debug d9027c9e 0befdaec cb1a6bf6 32997fb6 dfd87bdb bd9e77e6 9eeec99
3 db180821
14:17:52 ipsec,debug encrypted payload by IV:
14:17:52 ipsec,debug ee098b90 cdd12f24 e1f661df 5d9b4d13
14:17:52 ipsec,debug save IV for next:
14:17:52 ipsec,debug c15637b4 e82ba1f8 8b552b6e c568f2a6
14:17:52 ipsec,debug encrypted.
14:17:52 ipsec,debug 76 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:17:52 ipsec,debug 1 times of 76 bytes message will be sent to XXX.XXX.XXX.XXX[500
]
14:17:52 ipsec,debug sendto Information delete.
14:17:52 ipsec purged IPsec-SA proto_id=ESP spi=0xc982b561
14:17:52 ipsec purged IPsec-SA proto_id=ESP spi=0x3957e8f
14:17:52 ipsec,debug an undead schedule has been deleted.
14:17:52 ipsec,debug compute IV for phase2
14:17:52 ipsec,debug phase1 last IV:
14:17:52 ipsec,debug 2b435a77 2c14c4fa 23735c64 93bc12fd d47859a1
14:17:52 ipsec,debug hash(sha1)
14:17:52 ipsec,debug encryption(aes)
14:17:52 ipsec,debug phase2 IV computed:
14:17:52 ipsec,debug 6732d459 d9369dc6 a645bc9b 0ad0a54c
14:17:52 ipsec,debug HASH with:
14:17:52 ipsec,debug d47859a1 0000001c 00000001 01100001 0020d3b0 bf03db25 d51c1ed
d 23e173f8
14:17:52 ipsec,debug hmac(hmac_sha1)
14:17:52 ipsec,debug HASH computed:
14:17:52 ipsec,debug 9328386d 214da85f 043bb6de 710a1872 7498de8d
14:17:52 ipsec,debug begin encryption.
14:17:52 ipsec,debug encryption(aes)
14:17:52 ipsec,debug pad length = 12
14:17:52 ipsec,debug 0c000018 9328386d 214da85f 043bb6de 710a1872 7498de8d 0000001
c 00000001
14:17:52 ipsec,debug 01100001 0020d3b0 bf03db25 d51c1edd 23e173f8 f8cefcd8 bdf6eec
4 fcbf830b
14:17:52 ipsec,debug encryption(aes)
14:17:52 ipsec,debug with key:
14:17:52 ipsec,debug d9027c9e 0befdaec cb1a6bf6 32997fb6 dfd87bdb bd9e77e6 9eeec99
3 db180821
14:17:52 ipsec,debug encrypted payload by IV:
14:17:52 ipsec,debug 6732d459 d9369dc6 a645bc9b 0ad0a54c
14:17:52 ipsec,debug save IV for next:
14:17:52 ipsec,debug 2995bee7 6b127186 43c2c8de db72ffbd
14:17:52 ipsec,debug encrypted.
14:17:52 ipsec,debug 92 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:17:52 ipsec,debug 1 times of 92 bytes message will be sent to XXX.XXX.XXX.XXX[500
]
14:17:52 ipsec,debug sendto Information delete.
14:17:52 ipsec,info ISAKMP-SA deleted 10.255.255.1[500]-XXX.XXX.XXX.XXX[500] spi:002
0d3b0bf03db25:d51c1edd23e173f8 rekey:1
14:17:52 ipsec,debug an undead schedule has been deleted.
14:17:52 system,info ipsec peer peer2 changed by admin
14:17:54 ipsec,debug ===== received 116 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:17:54 ipsec,debug ===
14:17:54 ipsec,info respond new phase 1 (Identity Protection): 10.255.255.1[500]<=
XXX.XXX.XXX.XXX[500]
14:17:54 ipsec,debug begin.
14:17:54 ipsec,debug seen nptype=1(sa) len=68
14:17:54 ipsec,debug seen nptype=13(vid) len=20
14:17:54 ipsec,debug succeed.
14:17:54 ipsec received Vendor ID: DPD
14:17:54 ipsec,debug remote supports DPD
14:17:54 ipsec,debug total SA len=64
14:17:54 ipsec,debug 00000001 00000001 00000038 01010801 e317f8b1 857bff4c 0000002
8 00010000
14:17:54 ipsec,debug 80010007 800e0100 80020002 80040005 800b0001 000c0004 0001518
0 80030001
14:17:54 ipsec,debug begin.
14:17:54 ipsec,debug seen nptype=2(prop) len=56
14:17:54 ipsec,debug succeed.
14:17:54 ipsec,debug proposal #1 len=56
14:17:54 ipsec SPI size isn’t zero, but IKE proposal.
14:17:54 ipsec,debug begin.
14:17:54 ipsec,debug seen nptype=3(trns) len=40
14:17:54 ipsec,debug succeed.
14:17:54 ipsec,debug transform #0 len=40
14:17:54 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:17:54 ipsec,debug encryption(aes)
14:17:54 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:17:54 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:17:54 ipsec,debug hash(sha1)
14:17:54 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:17:54 ipsec,debug dh(modp1536)
14:17:54 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:17:54 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:17:54 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:17:54 ipsec,debug pair 1:
14:17:54 ipsec,debug 0x80c1128: next=(nil) tnext=(nil)
14:17:54 ipsec,debug proposal #1: 1 transform
14:17:54 ipsec,debug -checking with pre-shared key auth-
14:17:54 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=8, #trns=1
14:17:54 ipsec,debug trns#=0, trns-id=IKE
14:17:54 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:17:54 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:17:54 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:17:54 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:17:54 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:17:54 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:17:54 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:17:54 ipsec,debug -compare proposal #1: Local:Peer
14:17:54 ipsec,debug (lifetime = 86400:86400)
14:17:54 ipsec,debug (lifebyte = 0:0)
14:17:54 ipsec,debug enctype = AES-CBC:AES-CBC
14:17:54 ipsec,debug (encklen = 256:256)
14:17:54 ipsec,debug hashtype = SHA:SHA
14:17:54 ipsec,debug authmethod = pre-shared key:pre-shared key
14:17:54 ipsec,debug dh_group = 1536-bit MODP group:1536-bit MODP group
14:17:54 ipsec,error no identity suits proposal
14:17:54 ipsec,error XXX.XXX.XXX.XXX failed to get valid proposal.
14:17:54 ipsec,error XXX.XXX.XXX.XXX failed to pre-process ph1 packet (side: 1, stat
us 1).
14:17:54 ipsec,error XXX.XXX.XXX.XXX phase1 negotiation failed.
14:17:54 ipsec acquire for 10.255.255.1 <=> XXX.XXX.XXX.XXX
14:17:54 ipsec suitable policy found: 10.1.0.0/16 <=> 10.160.0.0/16
14:17:54 ipsec no peer config for XXX.XXX.XXX.XXX
14:17:54 ipsec no peer config found
14:17:59 ipsec,debug ===== received 116 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:17:59 ipsec,debug ===
14:17:59 ipsec,info respond new phase 1 (Identity Protection): 10.255.255.1[500]<=
XXX.XXX.XXX.XXX[500]
14:17:59 ipsec,debug begin.
14:17:59 ipsec,debug seen nptype=1(sa) len=68
14:17:59 ipsec,debug seen nptype=13(vid) len=20
14:17:59 ipsec,debug succeed.
14:17:59 ipsec received Vendor ID: DPD
14:17:59 ipsec,debug remote supports DPD
14:17:59 ipsec,debug total SA len=64
14:17:59 ipsec,debug 00000001 00000001 00000038 01010801 e317f8b1 857bff4c 0000002
8 00010000
14:17:59 ipsec,debug 80010007 800e0100 80020002 80040005 800b0001 000c0004 0001518
0 80030001
14:17:59 ipsec,debug begin.
14:17:59 ipsec,debug seen nptype=2(prop) len=56
14:17:59 ipsec,debug succeed.
14:17:59 ipsec,debug proposal #1 len=56
14:17:59 ipsec SPI size isn’t zero, but IKE proposal.
14:17:59 ipsec,debug begin.
14:17:59 ipsec,debug seen nptype=3(trns) len=40
14:17:59 ipsec,debug succeed.
14:17:59 ipsec,debug transform #0 len=40
14:17:59 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:17:59 ipsec,debug encryption(aes)
14:17:59 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:17:59 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:17:59 ipsec,debug hash(sha1)
14:17:59 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:17:59 ipsec,debug dh(modp1536)
14:17:59 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:17:59 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:17:59 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:17:59 ipsec,debug pair 1:
14:17:59 ipsec,debug 0x8101298: next=(nil) tnext=(nil)
14:17:59 ipsec,debug proposal #1: 1 transform
14:17:59 ipsec,debug -checking with pre-shared key auth-
14:17:59 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=8, #trns=1
14:17:59 ipsec,debug trns#=0, trns-id=IKE
14:17:59 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:17:59 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:17:59 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:17:59 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:17:59 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:17:59 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:17:59 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:17:59 ipsec,debug -compare proposal #1: Local:Peer
14:17:59 ipsec,debug (lifetime = 86400:86400)
14:17:59 ipsec,debug (lifebyte = 0:0)
14:17:59 ipsec,debug enctype = AES-CBC:AES-CBC
14:17:59 ipsec,debug (encklen = 256:256)
14:17:59 ipsec,debug hashtype = SHA:SHA
14:17:59 ipsec,debug authmethod = pre-shared key:pre-shared key
14:17:59 ipsec,debug dh_group = 1536-bit MODP group:1536-bit MODP group
14:17:59 ipsec,error no identity suits proposal
14:17:59 ipsec,error XXX.XXX.XXX.XXX failed to get valid proposal.
14:17:59 ipsec,error XXX.XXX.XXX.XXX failed to pre-process ph1 packet (side: 1, stat
us 1).
14:17:59 ipsec,error XXX.XXX.XXX.XXX phase1 negotiation failed.
14:18:01 system,info ipsec peer peer2 changed by admin
14:18:01 ipsec,debug ===
14:18:01 ipsec,info initiate new phase 1 (Identity Protection): 10.255.255.1[500]<
=>XXX.XXX.XXX.XXX[500]
14:18:01 ipsec,debug new cookie:
14:18:01 ipsec,debug 3dadeca0fe173faa\01
14:18:01 ipsec,debug add payload of len 56, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 13
14:18:01 ipsec,debug add payload of len 16, next type 0
14:18:01 ipsec,debug 348 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:18:01 ipsec,debug 1 times of 348 bytes message will be sent to XXX.XXX.XXX.XXX[50
0]
14:18:01 ipsec sent phase1 packet 10.255.255.1[500]<=>XXX.XXX.XXX.XXX[500] 3dadeca0f
e173faa:0000000000000000
14:18:01 ipsec,debug ===== received 108 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=1(sa) len=60
14:18:01 ipsec,debug seen nptype=13(vid) len=20
14:18:01 ipsec,debug succeed.
14:18:01 ipsec received Vendor ID: DPD
14:18:01 ipsec,debug remote supports DPD
14:18:01 ipsec,debug total SA len=56
14:18:01 ipsec,debug 00000001 00000001 00000030 01010001 00000028 01010000 800b000
1 000c0004
14:18:01 ipsec,debug 00015180 80010007 800e0100 80030001 80020002 80040005
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=2(prop) len=48
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug proposal #1 len=48
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=3(trns) len=40
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug transform #1 len=40
14:18:01 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:18:01 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:18:01 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:01 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:18:01 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:18:01 ipsec,debug hash(sha1)
14:18:01 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug pair 1:
14:18:01 ipsec,debug 0x80fda48: next=(nil) tnext=(nil)
14:18:01 ipsec,debug proposal #1: 1 transform
14:18:01 ipsec,debug -checking with pre-shared key auth-
14:18:01 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
14:18:01 ipsec,debug trns#=1, trns-id=IKE
14:18:01 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:18:01 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:18:01 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:18:01 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:01 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:18:01 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:18:01 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:18:01 ipsec,debug -compare proposal #1: Local:Peer
14:18:01 ipsec,debug (lifetime = 86400:86400)
14:18:01 ipsec,debug (lifebyte = 0:0)
14:18:01 ipsec,debug enctype = AES-CBC:AES-CBC
14:18:01 ipsec,debug (encklen = 256:256)
14:18:01 ipsec,debug hashtype = SHA:SHA
14:18:01 ipsec,debug authmethod = pre-shared key:pre-shared key
14:18:01 ipsec,debug dh_group = 1536-bit MODP group:1536-bit MODP group
14:18:01 ipsec,debug -an acceptable proposal found-
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug -agreed on pre-shared key auth-
14:18:01 ipsec,debug ===
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug compute DH’s private.
14:18:01 ipsec,debug 74981fc6 8492161a 0a5da098 0a4cc046 12417de2 b9ce663c 24a3afb
9 e20257fd
14:18:01 ipsec,debug c0db2440 3c8bb948 9f11e45e 760304fc ad871fbb 91d235e3 05b4271
a aec76835
14:18:01 ipsec,debug cf36b990 bf880708 b7108e8c eb2e5d17 e51eafc9 e673eed4 88d1890
a 78e20dfc
14:18:01 ipsec,debug dc4e3236 747b6a5f a7f2c788 24d67610 e3e1b016 dd652462 b30d524
0 1e2f1286
14:18:01 ipsec,debug baee4cb4 10b1d76e b5617294 660a86d8 774285ad 4179f703 ddbc43f
9 f9e4a32f
14:18:01 ipsec,debug 4e49106c 1c72ea23 73427829 fef229af 507379a1 cc60c7aa ec71f51
8 daa0ad9f
14:18:01 ipsec,debug compute DH’s public.
14:18:01 ipsec,debug b3250aa6 537afbc9 f4793ce5 bb7c5683 e61bc39f dfda4988 5c86b17
8 39dea297
14:18:01 ipsec,debug 60b0e00a bcc134a2 e238671c cf6d7d37 0013181d d14ebb29 6b73e80
7 e780740f
14:18:01 ipsec,debug 2d905f36 3e11d9d0 0340a60d 310ebeb9 21d0764c dc29b58a 4f38ee6
0 5bdc9f0d
14:18:01 ipsec,debug 464f9db8 6795a820 c2619c49 0fbc7c3c 7076a898 a451509e d30e4a3
6 32c4be16
14:18:01 ipsec,debug 31ce101b ce605bfa 628585df fbd2e433 bc4bd6aa 5fd5de3d 9c87293
6 f8116f2a
14:18:01 ipsec,debug 69d16f77 cc24bc1a 3939359f f42c114c 9b10c0d7 de01e0d7 bd869f2
4 4984be52
14:18:01 ipsec,debug add payload of len 192, next type 10
14:18:01 ipsec,debug add payload of len 24, next type 0
14:18:01 ipsec,debug 252 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:18:01 ipsec,debug 1 times of 252 bytes message will be sent to XXX.XXX.XXX.XXX[50
0]
14:18:01 ipsec sent phase1 packet 10.255.255.1[500]<=>XXX.XXX.XXX.XXX[500] 3dadeca0f
e173faa:51723d21ecd0a63a
14:18:01 ipsec,debug ===== received 244 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=4(ke) len=196
14:18:01 ipsec,debug seen nptype=10(nonce) len=20
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug ===
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug compute DH’s shared.
14:18:01 ipsec,debug
14:18:01 ipsec,debug 79c2371f bbeb69e9 8129244e 4bc9dd0a 3fa47c0c d7c46d65 ad74458
6 eed92528
14:18:01 ipsec,debug 081dfe9d 5a086cc5 ab201be8 ef4183be 7a46d8ce 5d78c296 2aa78de
8 ae0d2b21
14:18:01 ipsec,debug 320ba677 900af6ab 354dfa0e 4159b4f9 2b4305d1 617c3907 b61f560
3 e5672c96
14:18:01 ipsec,debug 61dcdd6b fffa8d76 99d5479b e6853790 4d5dac10 ea0a4055 78af1e4
3 68463441
14:18:01 ipsec,debug 5ebd01ee 7dc09e6a 90069fe5 3a52fc44 af5ac90c bedba0fa 004f7a7
6 1d09a01f
14:18:01 ipsec,debug 60bb9438 a95ffb5b b5377fc9 33da2d24 a4d78ba3 3eb4fe57 de8456d
c e2dab41b
14:18:01 ipsec,debug nonce 1:
14:18:01 ipsec,debug 98a1ad11 cdb454c9 61310efd 141f1b3d 9b21e575 94c84752
14:18:01 ipsec,debug nonce 2:
14:18:01 ipsec,debug f0128060 cbbb88eb 7bc9ab31 f6207370
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug SKEYID computed:
14:18:01 ipsec,debug 37dea46b 69bb9b28 60396c64 df802ba0 736bdbd2
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug SKEYID_d computed:
14:18:01 ipsec,debug e7a035a5 0a0af354 402f7f51 8bb0dc6b d86ffe6b
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug SKEYID_a computed:
14:18:01 ipsec,debug a60173bb fdcce0b1 158a14bc 0470fd79 3fcc241d
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug SKEYID_e computed:
14:18:01 ipsec,debug b869468d c78c3185 4c6d2489 d1fdec64 2b25d432
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug hash(sha1)
14:18:01 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka =
K1 | K2 | …)
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug compute intermediate encryption key K1
14:18:01 ipsec,debug 00
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug compute intermediate encryption key K2
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803
14:18:01 ipsec,debug db5580cc a39618ec 36d7f6ea 01ce9bba 317b4b88
14:18:01 ipsec,debug final encryption key computed:
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803 db5580cc a39618e
c 36d7f6ea
14:18:01 ipsec,debug hash(sha1)
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug IV computed:
14:18:01 ipsec,debug f79fb966 ae53a6fb 24b099a1 54eaba0a
14:18:01 ipsec,debug use ID type of IPv4_address
14:18:01 ipsec,debug HASH with:
14:18:01 ipsec,debug b3250aa6 537afbc9 f4793ce5 bb7c5683 e61bc39f dfda4988 5c86b17
8 39dea297
14:18:01 ipsec,debug 60b0e00a bcc134a2 e238671c cf6d7d37 0013181d d14ebb29 6b73e80
7 e780740f
14:18:01 ipsec,debug 2d905f36 3e11d9d0 0340a60d 310ebeb9 21d0764c dc29b58a 4f38ee6
0 5bdc9f0d
14:18:01 ipsec,debug 464f9db8 6795a820 c2619c49 0fbc7c3c 7076a898 a451509e d30e4a3
6 32c4be16
14:18:01 ipsec,debug 31ce101b ce605bfa 628585df fbd2e433 bc4bd6aa 5fd5de3d 9c87293
6 f8116f2a
14:18:01 ipsec,debug 69d16f77 cc24bc1a 3939359f f42c114c 9b10c0d7 de01e0d7 bd869f2
4 4984be52
14:18:01 ipsec,debug ee361c41 e9858885 4d5c6aed cd27127a 4d8d84ef c43bdcc6 fbbf647
b a2194817
14:18:01 ipsec,debug 4ca5e8fe d90acf92 e35fd750 bbca7c09 d4be1805 f6645ddc 3d4188f
9 7bab51b4
14:18:01 ipsec,debug d20d67a3 0398b98e 745ca934 d947359d 298a5503 62e0710c a9a7498
f eb85b609
14:18:01 ipsec,debug 62b67401 b12c2812 9f0ddad4 c49ec56d 98433a54 176cae3a 0d89ea0
f 3b332fb7
14:18:01 ipsec,debug 4ca68197 ec6f4583 f45a09eb 32803392 4bd3a88e 91878586 aab5d99
0 8dcace78
14:18:01 ipsec,debug cb431190 cb26acea 1a898aef 5537e4b2 80df9efe 43833b29 3d56e9d
0 09450e54
14:18:01 ipsec,debug 3dadeca0 fe173faa 51723d21 ecd0a63a 00000001 00000001 0000003
0 01010001
14:18:01 ipsec,debug 00000028 01010000 800b0001 000c0004 00015180 80010007 800e010
0 80030001
14:18:01 ipsec,debug 80020002 80040005 011101f4 2ffe9bda
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug HASH computed:
14:18:01 ipsec,debug a34d63fb c5893e86 9b128b12 02416aa7 03708474
14:18:01 ipsec,debug add payload of len 8, next type 8
14:18:01 ipsec,debug add payload of len 20, next type 0
14:18:01 ipsec,debug begin encryption.
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug pad length = 12
14:18:01 ipsec,debug 0800000c 011101f4 2ffe9bda 00000018 a34d63fb c5893e86 9b128b1
2 02416aa7
14:18:01 ipsec,debug 03708474 a9babcf5 b8d397d7 fde3e30b
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug with key:
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803 db5580cc a39618e
c 36d7f6ea
14:18:01 ipsec,debug encrypted payload by IV:
14:18:01 ipsec,debug f79fb966 ae53a6fb 24b099a1 54eaba0a
14:18:01 ipsec,debug save IV for next:
14:18:01 ipsec,debug f9e27a33 f69d0de0 f97d96f0 baad9bb4
14:18:01 ipsec,debug encrypted.
14:18:01 ipsec,debug 76 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:18:01 ipsec,debug 1 times of 76 bytes message will be sent to XXX.XXX.XXX.XXX[500
]
14:18:01 ipsec sent phase1 packet 10.255.255.1[500]<=>XXX.XXX.XXX.XXX[500] 3dadeca0f
e173faa:51723d21ecd0a63a
14:18:01 ipsec,debug ===== received 76 bytes from XXX.XXX.XXX.XXX[500] to 10.255.255
.1[500]
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug IV was saved for next processing:
14:18:01 ipsec,debug 53b42d02 902cbfdb 440000b3 ace0cb25
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug with key:
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803 db5580cc a39618e
c 36d7f6ea
14:18:01 ipsec,debug decrypted payload by IV:
14:18:01 ipsec,debug f9e27a33 f69d0de0 f97d96f0 baad9bb4
14:18:01 ipsec,debug decrypted payload, but not trimed.
14:18:01 ipsec,debug 0800000c 01000000 55cd1e8f 00000018 cdd20265 abce1af3 8529ee5
c b60bb6bb
14:18:01 ipsec,debug 52c5f27d 00000000 00000000 00000000
14:18:01 ipsec,debug padding len=1
14:18:01 ipsec,debug skip to trim padding.
14:18:01 ipsec,debug decrypted.
14:18:01 ipsec,debug 3dadeca0 fe173faa 51723d21 ecd0a63a 05100201 00000000 0000004
c 0800000c
14:18:01 ipsec,debug 01000000 55cd1e8f 00000018 cdd20265 abce1af3 8529ee5c b60bb6b
b 52c5f27d
14:18:01 ipsec,debug 00000000 00000000 00000000
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=5(id) len=12
14:18:01 ipsec,debug seen nptype=8(hash) len=24
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug HASH received:
14:18:01 ipsec,debug cdd20265 abce1af3 8529ee5c b60bb6bb 52c5f27d
14:18:01 ipsec,debug HASH with:
14:18:01 ipsec,debug ee361c41 e9858885 4d5c6aed cd27127a 4d8d84ef c43bdcc6 fbbf647
b a2194817
14:18:01 ipsec,debug 4ca5e8fe d90acf92 e35fd750 bbca7c09 d4be1805 f6645ddc 3d4188f
9 7bab51b4
14:18:01 ipsec,debug d20d67a3 0398b98e 745ca934 d947359d 298a5503 62e0710c a9a7498
f eb85b609
14:18:01 ipsec,debug 62b67401 b12c2812 9f0ddad4 c49ec56d 98433a54 176cae3a 0d89ea0
f 3b332fb7
14:18:01 ipsec,debug 4ca68197 ec6f4583 f45a09eb 32803392 4bd3a88e 91878586 aab5d99
0 8dcace78
14:18:01 ipsec,debug cb431190 cb26acea 1a898aef 5537e4b2 80df9efe 43833b29 3d56e9d
0 09450e54
14:18:01 ipsec,debug b3250aa6 537afbc9 f4793ce5 bb7c5683 e61bc39f dfda4988 5c86b17
8 39dea297
14:18:01 ipsec,debug 60b0e00a bcc134a2 e238671c cf6d7d37 0013181d d14ebb29 6b73e80
7 e780740f
14:18:01 ipsec,debug 2d905f36 3e11d9d0 0340a60d 310ebeb9 21d0764c dc29b58a 4f38ee6
0 5bdc9f0d
14:18:01 ipsec,debug 464f9db8 6795a820 c2619c49 0fbc7c3c 7076a898 a451509e d30e4a3
6 32c4be16
14:18:01 ipsec,debug 31ce101b ce605bfa 628585df fbd2e433 bc4bd6aa 5fd5de3d 9c87293
6 f8116f2a
14:18:01 ipsec,debug 69d16f77 cc24bc1a 3939359f f42c114c 9b10c0d7 de01e0d7 bd869f2
4 4984be52
14:18:01 ipsec,debug 51723d21 ecd0a63a 3dadeca0 fe173faa 00000001 00000001 0000003
0 01010001
14:18:01 ipsec,debug 00000028 01010000 800b0001 000c0004 00015180 80010007 800e010
0 80030001
14:18:01 ipsec,debug 80020002 80040005 01000000 55cd1e8f
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug HASH computed:
14:18:01 ipsec,debug cdd20265 abce1af3 8529ee5c b60bb6bb 52c5f27d
14:18:01 ipsec,debug HASH for PSK validated.
14:18:01 ipsec,debug XXX.XXX.XXX.XXX peer’s ID:
14:18:01 ipsec,debug 01000000 55cd1e8f
14:18:01 ipsec,debug ===
14:18:01 ipsec ph2 possible after ph1 creation
14:18:01 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=
Tunnel reqid=0:0)
14:18:01 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
14:18:01 ipsec,debug begin QUICK mode.
14:18:01 ipsec,debug ===
14:18:01 ipsec,debug begin QUICK mode.
14:18:01 ipsec initiate new phase 2 negotiation: 10.255.255.1[500]<=>XXX.XXX.XXX.XXX
[500]
14:18:01 ipsec,debug compute IV for phase2
14:18:01 ipsec,debug phase1 last IV:
14:18:01 ipsec,debug 53b42d02 902cbfdb 440000b3 ace0cb25 c72d5815
14:18:01 ipsec,debug hash(sha1)
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug phase2 IV computed:
14:18:01 ipsec,debug 4efe92fd ac3ecd2b cea2c0ca 959f1f2f
14:18:01 ipsec,debug call pfkey_send_getspi c63
14:18:01 ipsec,debug pfkey GETSPI sent: ESP/Tunnel XXX.XXX.XXX.XXX[500]->10.255.255.
1[500]
14:18:01 ipsec,debug pfkey getspi sent.
14:18:01 ipsec,info ISAKMP-SA established 10.255.255.1[500]-XXX.XXX.XXX.XXX[500] spi
:3dadeca0fe173faa:51723d21ecd0a63a
14:18:01 ipsec,debug ===
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug compute DH’s private.
14:18:01 ipsec,debug 6e31c04b cc142ec3 1c5fbf3f cc5be4b1 3a985433 f5603d68 9fa520b
e 8818c894
14:18:01 ipsec,debug eeda3f99 8823dfd7 58687981 a3a708fd f2147a2b 7821ef8f fb9b4e0
d bc0bc27b
14:18:01 ipsec,debug 7811f1d4 c07c436a a12416ff a08a5de1 78bb1aa1 1fd9bcf8 23ca670
8 b78d83a1
14:18:01 ipsec,debug daad31dc eb581918 2a43b39f efb4c28f df1287c7 28eeb539 a72182c
9 0f2cf894
14:18:01 ipsec,debug ccb7b86a 7d4a5475 a570114f ecd2c681 77408e7a 0b4b7761 c7bf7a4
0 58962414
14:18:01 ipsec,debug b5950fa9 a29d2585 a7d2ecba 4cae43f1 588a98fe 8546b5b4 0a9ba9a
4 62a4a413
14:18:01 ipsec,debug compute DH’s public.
14:18:01 ipsec,debug a9302de6 ed328b57 f35b92f7 13bbe5ac 8fa48f53 c8935a9d 5a0f9cb
b 6d5b0471
14:18:01 ipsec,debug 2670210c d4b06831 61dbafb4 30dc4258 1c77ffa7 afeae592 e00b9be
9 f41598cc
14:18:01 ipsec,debug b754c2ef 317525cd 0e2af5c0 2452eb10 9b553c12 7a9f215b 5079c8a
8 1cdac760
14:18:01 ipsec,debug 014dae17 5b0a3946 d8222956 f7878693 d628ed9d 1a81e73d 26e1b7f
9 34681141
14:18:01 ipsec,debug 3c3efa08 5419a6bb bb3f6bb1 0f352fe4 3ae0a6ba c3ff5811 34a016f
b 48189e33
14:18:01 ipsec,debug b73496f9 7b8007e7 d10e0f7f 4156d280 722d3d27 ae85af59 ce9a790
7 3b907361
14:18:01 ipsec,debug use local ID type IPv4_subnet
14:18:01 ipsec,debug use remote ID type IPv4_subnet
14:18:01 ipsec,debug IDci:
14:18:01 ipsec,debug 04000000 0a010000 ffff0000
14:18:01 ipsec,debug IDcr:
14:18:01 ipsec,debug 04000000 0aa00000 ffff0000
14:18:01 ipsec,debug add payload of len 52, next type 10
14:18:01 ipsec,debug add payload of len 24, next type 4
14:18:01 ipsec,debug add payload of len 192, next type 5
14:18:01 ipsec,debug add payload of len 12, next type 5
14:18:01 ipsec,debug add payload of len 12, next type 0
14:18:01 ipsec,debug HASH with:
14:18:01 ipsec,debug c72d5815 0a000038 00000001 00000001 0000002c 01030401 09e2093
3 00000020
14:18:01 ipsec,debug 010c0000 80010001 80020708 80040001 80060100 80050002 8003000
5 0400001c
14:18:01 ipsec,debug a762ee58 d635ce3b cfd95b74 c9258c0e 274a8b99 7b6e8c6a 050000c
4 a9302de6
14:18:01 ipsec,debug ed328b57 f35b92f7 13bbe5ac 8fa48f53 c8935a9d 5a0f9cbb 6d5b047
1 2670210c
14:18:01 ipsec,debug d4b06831 61dbafb4 30dc4258 1c77ffa7 afeae592 e00b9be9 f41598c
c b754c2ef
14:18:01 ipsec,debug 317525cd 0e2af5c0 2452eb10 9b553c12 7a9f215b 5079c8a8 1cdac76
0 014dae17
14:18:01 ipsec,debug 5b0a3946 d8222956 f7878693 d628ed9d 1a81e73d 26e1b7f9 3468114
1 3c3efa08
14:18:01 ipsec,debug 5419a6bb bb3f6bb1 0f352fe4 3ae0a6ba c3ff5811 34a016fb 48189e3
3 b73496f9
14:18:01 ipsec,debug 7b8007e7 d10e0f7f 4156d280 722d3d27 ae85af59 ce9a7907 3b90736
1 05000010
14:18:01 ipsec,debug 04000000 0a010000 ffff0000 00000010 04000000 0aa00000 ffff000
0
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug HASH computed:
14:18:01 ipsec,debug 1ac7bf3c 51407789 b6c3618a 2b572c10 8cfa21e6
14:18:01 ipsec,debug add payload of len 20, next type 1
14:18:01 ipsec,debug begin encryption.
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug pad length = 16
14:18:01 ipsec,debug 01000018 1ac7bf3c 51407789 b6c3618a 2b572c10 8cfa21e6 0a00003
8 00000001
14:18:01 ipsec,debug 00000001 0000002c 01030401 09e20933 00000020 010c0000 8001000
1 80020708
14:18:01 ipsec,debug 80040001 80060100 80050002 80030005 0400001c a762ee58 d635ce3
b cfd95b74
14:18:01 ipsec,debug c9258c0e 274a8b99 7b6e8c6a 050000c4 a9302de6 ed328b57 f35b92f
7 13bbe5ac
14:18:01 ipsec,debug 8fa48f53 c8935a9d 5a0f9cbb 6d5b0471 2670210c d4b06831 61dbafb
4 30dc4258
14:18:01 ipsec,debug 1c77ffa7 afeae592 e00b9be9 f41598cc b754c2ef 317525cd 0e2af5c
0 2452eb10
14:18:01 ipsec,debug 9b553c12 7a9f215b 5079c8a8 1cdac760 014dae17 5b0a3946 d822295
6 f7878693
14:18:01 ipsec,debug d628ed9d 1a81e73d 26e1b7f9 34681141 3c3efa08 5419a6bb bb3f6bb
1 0f352fe4
14:18:01 ipsec,debug 3ae0a6ba c3ff5811 34a016fb 48189e33 b73496f9 7b8007e7 d10e0f7
f 4156d280
14:18:01 ipsec,debug 722d3d27 ae85af59 ce9a7907 3b907361 05000010 04000000 0a01000
0 ffff0000
14:18:01 ipsec,debug 00000010 04000000 0aa00000 ffff0000 ccbdd099 d8c28db0 94d0d1c
a 8ead9e0f
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug with key:
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803 db5580cc a39618e
c 36d7f6ea
14:18:01 ipsec,debug encrypted payload by IV:
14:18:01 ipsec,debug 4efe92fd ac3ecd2b cea2c0ca 959f1f2f
14:18:01 ipsec,debug save IV for next:
14:18:01 ipsec,debug e532d8e8 db1ced4e 60614b7d 92481eb5
14:18:01 ipsec,debug encrypted.
14:18:01 ipsec,debug 380 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:18:01 ipsec,debug 1 times of 380 bytes message will be sent to XXX.XXX.XXX.XXX[50
0]
14:18:01 ipsec sent phase2 packet 10.255.255.1[500]<=>XXX.XXX.XXX.XXX[500] 3dadeca0f
e173faa:51723d21ecd0a63a:0000c72d
14:18:01 ipsec,debug ===== received 364 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug IV was saved for next processing:
14:18:01 ipsec,debug 31f863ca 8d5ff75d 9e493b3e 2ba73916
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug with key:
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803 db5580cc a39618e
c 36d7f6ea
14:18:01 ipsec,debug decrypted payload by IV:
14:18:01 ipsec,debug e532d8e8 db1ced4e 60614b7d 92481eb5
14:18:01 ipsec,debug decrypted payload, but not trimed.
14:18:01 ipsec,debug 01000018 3f8017b0 e8ca4cc3 daeaca7d c6fb325c a5b58e5e 0a00003
8 00000001
14:18:01 ipsec,debug 00000001 0000002c 01030401 490b77f0 00000020 010c0000 8001000
1 80020708
14:18:01 ipsec,debug 80040001 80060100 80050002 80030005 04000014 58499fd2 6dc937a
6 31b3c957
14:18:01 ipsec,debug c5b5f966 050000c4 12411201 54185a53 c6d1471d e9b662df f034395
7 f86e2541
14:18:01 ipsec,debug a50a1a55 ded80b2d 5fd95821 88e34e5a f59b8ca0 1d5339a4 a853862
b c482656d
14:18:01 ipsec,debug f2210561 fdb567b7 232122dc 38753488 b4bcd6e3 413dd559 6de480c
f 0c7435fc
14:18:01 ipsec,debug 00bf88de 7daff2b3 d8793437 a6bd4d72 593bab10 179f7148 6ed9148
2 65d00da6
14:18:01 ipsec,debug c78ed16b 8d7c526d 55c0d26a f76c89f4 69cb2897 c9aff4b3 b30297e
6 d86971bc
14:18:01 ipsec,debug 195e277d a7dd8dbc 14a83ee5 528c1faa 98ea570a e9a4325f b522fa5
2 a80b9749
14:18:01 ipsec,debug 74db7f38 676c77bd 05000010 04000000 0a010000 ffff0000 0000001
0 04000000
14:18:01 ipsec,debug 0aa00000 ffff0000 00000000 00000000
14:18:01 ipsec,debug padding len=1
14:18:01 ipsec,debug skip to trim padding.
14:18:01 ipsec,debug decrypted.
14:18:01 ipsec,debug 3dadeca0 fe173faa 51723d21 ecd0a63a 08102001 c72d5815 0000016
c 01000018
14:18:01 ipsec,debug 3f8017b0 e8ca4cc3 daeaca7d c6fb325c a5b58e5e 0a000038 0000000
1 00000001
14:18:01 ipsec,debug 0000002c 01030401 490b77f0 00000020 010c0000 80010001 8002070
8 80040001
14:18:01 ipsec,debug 80060100 80050002 80030005 04000014 58499fd2 6dc937a6 31b3c95
7 c5b5f966
14:18:01 ipsec,debug 050000c4 12411201 54185a53 c6d1471d e9b662df f0343957 f86e254
1 a50a1a55
14:18:01 ipsec,debug ded80b2d 5fd95821 88e34e5a f59b8ca0 1d5339a4 a853862b c482656
d f2210561
14:18:01 ipsec,debug fdb567b7 232122dc 38753488 b4bcd6e3 413dd559 6de480cf 0c7435f
c 00bf88de
14:18:01 ipsec,debug 7daff2b3 d8793437 a6bd4d72 593bab10 179f7148 6ed91482 65d00da
6 c78ed16b
14:18:01 ipsec,debug 8d7c526d 55c0d26a f76c89f4 69cb2897 c9aff4b3 b30297e6 d86971b
c 195e277d
14:18:01 ipsec,debug a7dd8dbc 14a83ee5 528c1faa 98ea570a e9a4325f b522fa52 a80b974
9 74db7f38
14:18:01 ipsec,debug 676c77bd 05000010 04000000 0a010000 ffff0000 00000010 0400000
0 0aa00000
14:18:01 ipsec,debug ffff0000 00000000 00000000
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=8(hash) len=24
14:18:01 ipsec,debug seen nptype=1(sa) len=56
14:18:01 ipsec,debug seen nptype=10(nonce) len=20
14:18:01 ipsec,debug seen nptype=4(ke) len=196
14:18:01 ipsec,debug seen nptype=5(id) len=16
14:18:01 ipsec,debug seen nptype=5(id) len=16
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug IDci matches proposal.
14:18:01 ipsec,debug IDcr matches proposal.
14:18:01 ipsec,debug HASH allocated:hbuf->l=360 actual:tlen=328
14:18:01 ipsec,debug HASH(2) received:
14:18:01 ipsec,debug 3f8017b0 e8ca4cc3 daeaca7d c6fb325c a5b58e5e
14:18:01 ipsec,debug HASH with:
14:18:01 ipsec,debug c72d5815 a762ee58 d635ce3b cfd95b74 c9258c0e 274a8b99 7b6e8c6
a 0a000038
14:18:01 ipsec,debug 00000001 00000001 0000002c 01030401 490b77f0 00000020 010c000
0 80010001
14:18:01 ipsec,debug 80020708 80040001 80060100 80050002 80030005 04000014 58499fd
2 6dc937a6
14:18:01 ipsec,debug 31b3c957 c5b5f966 050000c4 12411201 54185a53 c6d1471d e9b662d
f f0343957
14:18:01 ipsec,debug f86e2541 a50a1a55 ded80b2d 5fd95821 88e34e5a f59b8ca0 1d5339a
4 a853862b
14:18:01 ipsec,debug c482656d f2210561 fdb567b7 232122dc 38753488 b4bcd6e3 413dd55
9 6de480cf
14:18:01 ipsec,debug 0c7435fc 00bf88de 7daff2b3 d8793437 a6bd4d72 593bab10 179f714
8 6ed91482
14:18:01 ipsec,debug 65d00da6 c78ed16b 8d7c526d 55c0d26a f76c89f4 69cb2897 c9aff4b
3 b30297e6
14:18:01 ipsec,debug d86971bc 195e277d a7dd8dbc 14a83ee5 528c1faa 98ea570a e9a4325
f b522fa52
14:18:01 ipsec,debug a80b9749 74db7f38 676c77bd 05000010 04000000 0a010000 ffff000
0 00000010
14:18:01 ipsec,debug 04000000 0aa00000 ffff0000
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug HASH computed:
14:18:01 ipsec,debug 3f8017b0 e8ca4cc3 daeaca7d c6fb325c a5b58e5e
14:18:01 ipsec,debug total SA len=52
14:18:01 ipsec,debug 00000001 00000001 0000002c 01030401 09e20933 00000020 010c000
0 80010001
14:18:01 ipsec,debug 80020708 80040001 80060100 80050002 80030005
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=2(prop) len=44
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug proposal #1 len=44
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=3(trns) len=32
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug transform #1 len=32
14:18:01 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
14:18:01 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=1800
14:18:01 ipsec,debug life duration was in TLV.
14:18:01 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
14:18:01 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:01 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
14:18:01 ipsec,debug type=Group Description, flag=0x8000, lorv=5
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug pair 1:
14:18:01 ipsec,debug 0x80f8908: next=(nil) tnext=(nil)
14:18:01 ipsec,debug proposal #1: 1 transform
14:18:01 ipsec,debug total SA len=52
14:18:01 ipsec,debug 00000001 00000001 0000002c 01030401 490b77f0 00000020 010c000
0 80010001
14:18:01 ipsec,debug 80020708 80040001 80060100 80050002 80030005
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=2(prop) len=44
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug proposal #1 len=44
14:18:01 ipsec,debug begin.
14:18:01 ipsec,debug seen nptype=3(trns) len=32
14:18:01 ipsec,debug succeed.
14:18:01 ipsec,debug transform #1 len=32
14:18:01 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
14:18:01 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=1800
14:18:01 ipsec,debug life duration was in TLV.
14:18:01 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
14:18:01 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:01 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
14:18:01 ipsec,debug type=Group Description, flag=0x8000, lorv=5
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug pair 1:
14:18:01 ipsec,debug 0x80f8410: next=(nil) tnext=(nil)
14:18:01 ipsec,debug proposal #1: 1 transform
14:18:01 ipsec,debug begin compare proposals.
14:18:01 ipsec,debug pair[1]: 0x80f8410
14:18:01 ipsec,debug 0x80f8410: next=(nil) tnext=(nil)
14:18:01 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CB
C
14:18:01 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
14:18:01 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=1800
14:18:01 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
14:18:01 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:01 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
14:18:01 ipsec,debug type=Group Description, flag=0x8000, lorv=5
14:18:01 ipsec,debug peer’s single bundle:
14:18:01 ipsec,debug (proto_id=ESP spisize=4 spi=490b77f0 spi_p=00000000 encmode=
Tunnel reqid=0:0)
14:18:01 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
14:18:01 ipsec,debug my single bundle:
14:18:01 ipsec,debug (proto_id=ESP spisize=4 spi=09e20933 spi_p=00000000 encmode=
Tunnel reqid=0:0)
14:18:01 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
14:18:01 ipsec,debug matched
14:18:01 ipsec,debug ===
14:18:01 ipsec,debug HASH(3) generate
14:18:01 ipsec,debug HASH with:
14:18:01 ipsec,debug 00c72d58 15a762ee 58d635ce 3bcfd95b 74c9258c 0e274a8b 997b6e8
c 6a58499f
14:18:01 ipsec,debug d26dc937 a631b3c9 57c5b5f9 66
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug HASH computed:
14:18:01 ipsec,debug ed88563d f1664ec0 8a9efdd7 34802fbf cbbabf49
14:18:01 ipsec,debug add payload of len 20, next type 0
14:18:01 ipsec,debug begin encryption.
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug pad length = 8
14:18:01 ipsec,debug 00000018 ed88563d f1664ec0 8a9efdd7 34802fbf cbbabf49 86bd91c
3 e797e707
14:18:01 ipsec,debug encryption(aes)
14:18:01 ipsec,debug with key:
14:18:01 ipsec,debug c87efe7b d3513ce9 2199603e 74e55622 70c0b803 db5580cc a39618e
c 36d7f6ea
14:18:01 ipsec,debug encrypted payload by IV:
14:18:01 ipsec,debug 31f863ca 8d5ff75d 9e493b3e 2ba73916
14:18:01 ipsec,debug save IV for next:
14:18:01 ipsec,debug 28314c74 905ef5e2 c49d25ba f7fa771f
14:18:01 ipsec,debug encrypted.
14:18:01 ipsec,debug 60 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:18:01 ipsec,debug 1 times of 60 bytes message will be sent to XXX.XXX.XXX.XXX[500
]
14:18:01 ipsec,debug dh(modp1536)
14:18:01 ipsec,debug compute DH’s shared.
14:18:01 ipsec,debug
14:18:01 ipsec,debug 347a5b98 81338070 02cd450e 55d90ce4 4e26efc3 5cf762df c719e7b
8 a70d33d8
14:18:01 ipsec,debug 7f3bc466 6c726bc4 6f57af4d 54b89a24 a0e90fc7 e60fa361 ebc1e97
2 71fba87b
14:18:01 ipsec,debug bbdc8aae f3e80723 2bbef05a ae8a1634 f7b51988 652ce75b 1d8bf4f
7 f35dbd57
14:18:01 ipsec,debug 6efcaae5 22f5aff1 910e0c68 df477745 f5581763 9cb6e382 0587ad4
9 2393d2be
14:18:01 ipsec,debug cdf768f3 1a8c5f37 d367ef95 5df1f81c 71926463 3261a27e 2e9ad5b
f 5f0aed3d
14:18:01 ipsec,debug f24e3d21 0fe81f64 d57735de 1f672073 86dc2fb6 ffc7f4b7 0314b59
a 6e8ccad3
14:18:01 ipsec,debug KEYMAT compute with
14:18:01 ipsec,debug 347a5b98 81338070 02cd450e 55d90ce4 4e26efc3 5cf762df c719e7b
8 a70d33d8
14:18:01 ipsec,debug 7f3bc466 6c726bc4 6f57af4d 54b89a24 a0e90fc7 e60fa361 ebc1e97
2 71fba87b
14:18:01 ipsec,debug bbdc8aae f3e80723 2bbef05a ae8a1634 f7b51988 652ce75b 1d8bf4f
7 f35dbd57
14:18:01 ipsec,debug 6efcaae5 22f5aff1 910e0c68 df477745 f5581763 9cb6e382 0587ad4
9 2393d2be
14:18:01 ipsec,debug cdf768f3 1a8c5f37 d367ef95 5df1f81c 71926463 3261a27e 2e9ad5b
f 5f0aed3d
14:18:01 ipsec,debug f24e3d21 0fe81f64 d57735de 1f672073 86dc2fb6 ffc7f4b7 0314b59
a 6e8ccad3
14:18:01 ipsec,debug 0309e209 33a762ee 58d635ce 3bcfd95b 74c9258c 0e274a8b 997b6e8
c 6a58499f
14:18:01 ipsec,debug d26dc937 a631b3c9 57c5b5f9 66
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug encryption(aes-cbc)
14:18:01 ipsec,debug hmac(sha1)
14:18:01 ipsec,debug encklen=256 authklen=160
14:18:01 ipsec,debug generating 640 bits of key (dupkeymat=4)
14:18:01 ipsec,debug generating K1…K4 for KEYMAT.
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug 20fe9ea6 c0ead563 b36b96c0 4d2416b4 9fc856e7 f124d62a 8e62e9e
1 84224a17
14:18:01 ipsec,debug 5d63978a 9c7c843e d9184543 d80431ba 7de912dc 18fcc436 8b85555
b b2136972
14:18:01 ipsec,debug de6a334d c4aeac46 bef582c3 cf588a88
14:18:01 ipsec,debug KEYMAT compute with
14:18:01 ipsec,debug 347a5b98 81338070 02cd450e 55d90ce4 4e26efc3 5cf762df c719e7b
8 a70d33d8
14:18:01 ipsec,debug 7f3bc466 6c726bc4 6f57af4d 54b89a24 a0e90fc7 e60fa361 ebc1e97
2 71fba87b
14:18:01 ipsec,debug bbdc8aae f3e80723 2bbef05a ae8a1634 f7b51988 652ce75b 1d8bf4f
7 f35dbd57
14:18:01 ipsec,debug 6efcaae5 22f5aff1 910e0c68 df477745 f5581763 9cb6e382 0587ad4
9 2393d2be
14:18:01 ipsec,debug cdf768f3 1a8c5f37 d367ef95 5df1f81c 71926463 3261a27e 2e9ad5b
f 5f0aed3d
14:18:01 ipsec,debug f24e3d21 0fe81f64 d57735de 1f672073 86dc2fb6 ffc7f4b7 0314b59
a 6e8ccad3
14:18:01 ipsec,debug 03490b77 f0a762ee 58d635ce 3bcfd95b 74c9258c 0e274a8b 997b6e8
c 6a58499f
14:18:01 ipsec,debug d26dc937 a631b3c9 57c5b5f9 66
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug encryption(aes-cbc)
14:18:01 ipsec,debug hmac(sha1)
14:18:01 ipsec,debug encklen=256 authklen=160
14:18:01 ipsec,debug generating 640 bits of key (dupkeymat=4)
14:18:01 ipsec,debug generating K1…K4 for KEYMAT.
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug hmac(hmac_sha1)
14:18:01 ipsec,debug 6aa296c8 676019d6 bf5cbe90 6c95ee65 6340f123 eb9ba531 570dca3
c 8b0919e3
14:18:01 ipsec,debug b3050d87 9da3c482 1b2839c6 144060b1 58e5af24 d46de11b 47b31b7
2 0375cd7e
14:18:01 ipsec,debug 9b99dcca cc5bc6ca 787986fa 628c5a5b
14:18:01 ipsec,debug KEYMAT computed.
14:18:01 ipsec,debug call pk_sendupdate
14:18:01 ipsec,debug encryption(aes-cbc)
14:18:01 ipsec,debug hmac(sha1)
14:18:01 ipsec,debug call pfkey_send_update_nat
14:18:01 ipsec IPsec-SA established: ESP/Tunnel XXX.XXX.XXX.XXX[500]->10.255.255.1[5
00] spi=0x9e20933
14:18:01 ipsec,debug pfkey update sent.
14:18:01 ipsec,debug encryption(aes-cbc)
14:18:01 ipsec,debug hmac(sha1)
14:18:01 ipsec,debug call pfkey_send_add_nat
14:18:01 ipsec IPsec-SA established: ESP/Tunnel 10.255.255.1[500]->XXX.XXX.XXX.XXX[5
00] spi=0x490b77f0
14:18:01 ipsec,debug pfkey add sent.
14:18:03 ipsec,debug ===== received 196 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:18:03 ipsec,debug ===
14:18:03 ipsec,info respond new phase 1 (Identity Protection): 10.255.255.1[500]<=
XXX.XXX.XXX.XXX[500]
14:18:03 ipsec,debug begin.
14:18:03 ipsec,debug seen nptype=1(sa) len=68
14:18:03 ipsec,debug seen nptype=13(vid) len=20
14:18:03 ipsec,debug seen nptype=13(vid) len=20
14:18:03 ipsec,debug seen nptype=13(vid) len=20
14:18:03 ipsec,debug seen nptype=13(vid) len=20
14:18:03 ipsec,debug seen nptype=13(vid) len=20
14:18:03 ipsec,debug succeed.
14:18:03 ipsec received Vendor ID: DPD
14:18:03 ipsec,debug remote supports DPD
14:18:03 ipsec received Vendor ID: RFC 3947
14:18:03 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
14:18:03 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n
14:18:03 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
14:18:03 ipsec XXX.XXX.XXX.XXX Selected NAT-T version: RFC 3947
14:18:03 ipsec,debug total SA len=64
14:18:03 ipsec,debug 00000001 00000001 00000038 01010801 4ac6b43e 02996e01 0000002
8 00010000
14:18:03 ipsec,debug 80010007 800e0100 80020002 80040005 800b0001 000c0004 0001518
0 80030001
14:18:03 ipsec,debug begin.
14:18:03 ipsec,debug seen nptype=2(prop) len=56
14:18:03 ipsec,debug succeed.
14:18:03 ipsec,debug proposal #1 len=56
14:18:03 ipsec SPI size isn’t zero, but IKE proposal.
14:18:03 ipsec,debug begin.
14:18:03 ipsec,debug seen nptype=3(trns) len=40
14:18:03 ipsec,debug succeed.
14:18:03 ipsec,debug transform #0 len=40
14:18:03 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:18:03 ipsec,debug encryption(aes)
14:18:03 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:03 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:18:03 ipsec,debug hash(sha1)
14:18:03 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:18:03 ipsec,debug dh(modp1536)
14:18:03 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:18:03 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:18:03 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:18:03 ipsec,debug pair 1:
14:18:03 ipsec,debug 0x81003b8: next=(nil) tnext=(nil)
14:18:03 ipsec,debug proposal #1: 1 transform
14:18:03 ipsec,debug -checking with pre-shared key auth-
14:18:03 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=8, #trns=1
14:18:03 ipsec,debug trns#=0, trns-id=IKE
14:18:03 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
14:18:03 ipsec,debug type=Key Length, flag=0x8000, lorv=256
14:18:03 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
14:18:03 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
14:18:03 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
14:18:03 ipsec,debug type=Life Duration, flag=0x0000, lorv=4
14:18:03 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
14:18:03 ipsec,debug -compare proposal #1: Local:Peer
14:18:03 ipsec,debug (lifetime = 86400:86400)
14:18:03 ipsec,debug (lifebyte = 0:0)
14:18:03 ipsec,debug enctype = AES-CBC:AES-CBC
14:18:03 ipsec,debug (encklen = 256:256)
14:18:03 ipsec,debug hashtype = SHA:SHA
14:18:03 ipsec,debug authmethod = pre-shared key:pre-shared key
14:18:03 ipsec,debug dh_group = 1536-bit MODP group:1536-bit MODP group
14:18:03 ipsec,debug -an acceptable proposal found-
14:18:03 ipsec,debug dh(modp1536)
14:18:03 ipsec,debug -agreed on pre-shared key auth-
14:18:03 ipsec,debug ===
14:18:03 ipsec,debug new cookie:
14:18:03 ipsec,debug 760e373210bd18be\01
14:18:03 ipsec,debug add payload of len 64, next type 13
14:18:03 ipsec,debug add payload of len 16, next type 13
14:18:03 ipsec,debug add payload of len 16, next type 0
14:18:03 ipsec,debug 136 bytes from 10.255.255.1[500] to XXX.XXX.XXX.XXX[500]
14:18:03 ipsec,debug 1 times of 136 bytes message will be sent to XXX.XXX.XXX.XXX[50
0]
14:18:03 ipsec sent phase1 packet 10.255.255.1[500]<=>XXX.XXX.XXX.XXX[500] 4ac6b43e0
2996e01:760e373210bd18be
14:18:03 ipsec,debug KA: 10.255.255.1[4500]->YYY.YYY.YYY.YYY[4500]
14:18:03 ipsec,debug 1 times of 1 bytes message will be sent to YYY.YYY.YYY.YYY[4500]
14:18:08 ipsec,debug ===== received 196 bytes from XXX.XXX.XXX.XXX[500] to 10.255.25
5.1[500]
14:18:08 ipsec,debug 1 times of 136 bytes message will be sent to XXX.XXX.XXX.XXX[50
0]
14:18:08 ipsec,info the packet is retransmitted by XXX.XXX.XXX.XXX[500].