IPSec IKEv2 rekeying problem

I’m currently fighting with a re-keying problem in my IPSec configuration. I’m using IKEv2, certificate authentication on ROS6.43.4

I got a connection from a strongSwan linux ipsec client to my customers RB2011 running. From time to it happens that, when a new ChildSA is negotiated, no data arrives on the strongSwan client.

A new overlapping ChildSA is created properly on re-keying, but no data exchange is possible.

I can also see that traffic counter from RouterOS to the strongSwan is increasing, when i try to send data from RouterOS to the strongSwan client, using ICMP ping.
But no data arrives on the strongSwan client side. I checked that using tcpdump by forwarding the decapsulated ipsec traffice to the NFLOG chain, on the linux client side.

Also the traffic counter from strongSwan to the RouterOS stays at zero.

The log from strongSwan shows that strongSwan tries to send a request to RouterOS which is never answered properly.

...
15[IKE] <connection1|1> IKE_SA connection1[1] state change: CONNECTING => ESTABLISHED
15[IKE] <connection1|1> scheduling reauthentication in 42914s
15[IKE] <connection1|1> maximum IKE_SA lifetime 43094s
15[CFG] <connection1|1> selected proposal: ESP:AES_CTR_256/HMAC_SHA2_256_128/NO_EXT_SEQ
15[CHD] <connection1|1> CHILD_SA connection1{1} state change: CREATED => INSTALLING
15[CHD] <connection1|1>   using AES_CTR for encryption
15[CHD] <connection1|1>   using HMAC_SHA2_256_128 for integrity
15[CHD] <connection1|1> adding inbound ESP SA
15[CHD] <connection1|1>   SPI 0xc29064f7, src [RouterOS IP] dst [strongSwan IP]
15[CHD] <connection1|1> adding outbound ESP SA
15[CHD] <connection1|1>   SPI 0x0b3036d3, src [strongSwan IP] dst [RouterOS IP]
15[IKE] <connection1|1> CHILD_SA connection1{1} established with SPIs c29064f7_i 0b3036d3_o and TS [strongSwan IP]/32 === 10.109.0.0/16
15[CHD] <connection1|1> CHILD_SA connection1{1} state change: INSTALLING => INSTALLED
15[IKE] <connection1|1> activating new tasks
15[IKE] <connection1|1> nothing to initiate
09[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (128 bytes)
09[ENC] <connection1|1> parsed INFORMATIONAL request 0 [ ]
09[ENC] <connection1|1> generating INFORMATIONAL response 0 [ ]
09[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
10[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (160 bytes)
10[ENC] <connection1|1> parsed INFORMATIONAL request 1 [ ]
10[ENC] <connection1|1> generating INFORMATIONAL response 1 [ ]
10[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
06[KNL] creating rekey job for CHILD_SA ESP/0x0b3036d3/[RouterOS IP]
13[IKE] <connection1|1> queueing CHILD_REKEY task
13[IKE] <connection1|1> activating new tasks
13[IKE] <connection1|1>   activating CHILD_REKEY task
13[IKE] <connection1|1> establishing CHILD_SA connection1{2} reqid 1
13[CHD] <connection1|1> CHILD_SA connection1{1} state change: INSTALLED => REKEYING
13[ENC] <connection1|1> generating CREATE_CHILD_SA request 2 [ N(REKEY_SA) SA No KE TSi TSr ]
13[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (736 bytes)
14[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (144 bytes)
14[ENC] <connection1|1> parsed INFORMATIONAL request 2 [ ]
14[ENC] <connection1|1> generating INFORMATIONAL response 2 [ ]
14[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
16[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (144 bytes)
16[ENC] <connection1|1> parsed INFORMATIONAL request 2 [ ]
16[IKE] <connection1|1> received retransmit of request with ID 2, retransmitting response
16[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
05[IKE] <connection1|1> retransmit 1 of request with message ID 2
05[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (736 bytes)
07[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (800 bytes)
07[ENC] <connection1|1> parsed IKE_AUTH response 1 [ No KE TSi TSr SA ]
07[IKE] <connection1|1> received message ID 1, expected 2, ignored
15[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (800 bytes)
15[ENC] <connection1|1> parsed IKE_AUTH response 1 [ No KE TSi TSr SA ]
15[IKE] <connection1|1> received message ID 1, expected 2, ignored
09[IKE] <connection1|1> retransmit 2 of request with message ID 2
09[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (736 bytes)
08[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (800 bytes)
08[ENC] <connection1|1> parsed IKE_AUTH response 1 [ No KE TSi TSr SA ]
08[IKE] <connection1|1> received message ID 1, expected 2, ignored
10[IKE] <connection1|1> retransmit 3 of request with message ID 2
10[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (736 bytes)
11[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (800 bytes)
11[ENC] <connection1|1> parsed IKE_AUTH response 1 [ No KE TSi TSr SA ]
11[IKE] <connection1|1> received message ID 1, expected 2, ignored
13[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (144 bytes)
13[ENC] <connection1|1> parsed INFORMATIONAL request 3 [ ]
13[ENC] <connection1|1> generating INFORMATIONAL response 3 [ ]
13[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
12[KNL] creating rekey job for CHILD_SA ESP/0xc29064f7/[strongSwan IP]
16[IKE] <connection1|1> queueing CHILD_REKEY task
16[IKE] <connection1|1> delaying task initiation, CREATE_CHILD_SA exchange in progress
14[IKE] <connection1|1> retransmit 4 of request with message ID 2
14[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (736 bytes)
05[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (800 bytes)
05[ENC] <connection1|1> parsed IKE_AUTH response 1 [ No KE TSi TSr SA ]
05[IKE] <connection1|1> received message ID 1, expected 2, ignored
15[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (96 bytes)
15[ENC] <connection1|1> parsed INFORMATIONAL request 4 [ ]
15[ENC] <connection1|1> generating INFORMATIONAL response 4 [ ]
15[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
09[IKE] <connection1|1> retransmit 5 of request with message ID 2
09[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (736 bytes)
10[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (800 bytes)
10[ENC] <connection1|1> parsed IKE_AUTH response 1 [ No KE TSi TSr SA ]
10[IKE] <connection1|1> received message ID 1, expected 2, ignored
11[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (144 bytes)
11[ENC] <connection1|1> parsed INFORMATIONAL request 5 [ ]
11[ENC] <connection1|1> generating INFORMATIONAL response 5 [ ]
11[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
13[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (144 bytes)
13[ENC] <connection1|1> parsed INFORMATIONAL request 6 [ ]
13[ENC] <connection1|1> generating INFORMATIONAL response 6 [ ]
13[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
12[NET] <connection1|1> received packet: from [RouterOS IP][500] to [strongSwan IP][500] (128 bytes)
12[ENC] <connection1|1> parsed INFORMATIONAL request 7 [ ]
12[ENC] <connection1|1> generating INFORMATIONAL response 7 [ ]
12[NET] <connection1|1> sending packet: from [strongSwan IP][500] to [RouterOS IP][500] (80 bytes)
14[KNL] creating delete job for CHILD_SA ESP/0xcd516725/[strongSwan IP]
14[JOB] CHILD_SA ESP/0xcd516725/[strongSwan IP] not found for delete
07[IKE] <connection1|1> giving up after 5 retransmits
07[IKE] <connection1|1> restarting CHILD_SA connection1
...

When strongSwan is restarting the CHILD_SA connection the Child SA are brought up properly and traffic flow threw them.

I also tried different version of strongSwan but the behavior on version 5.5.0 and 5.7.1is the same.

Finally I also tried the rekeying between to strongSwan clients and it has always worked.

I can reproduce that behavior in my local lab environment. So if any further logs were needed, please let me know.

Has anybody encountered that problem?

Thanks in advance and kind regards,
Sebastian

Is PFS group set to ‘none’ on RouterOS side for your IPsec proposal? If yes, can you compare spi numbers, encryption keys and authentication keys between both sides when the issue is present?

Yes, the PFS group for the proposal is set to: MODP4096, that was a requirement from the customer.

Comparing the spi and the keys brought me to the problem that i’m not able to find out the spi or the keys from the strongSwan log. I tried it now for a few hours.

I could only provide a log with maximized logging outputs of strongSwan when the problem is exisiting. I attached them to my post. Unfortunatly is a very big log file, because logging for all the strongSwan modules is activated.

If I should provide a log with less outputs, please let me know for which modules of strongSwan (indentified by [module] in the log), I can reduce the logging level. And I’ll provide a new logfile.

IPSec SA from RouterOS:

Flags: H - hw-aead, A - AH, E - ESP 
 0  E spi=0xBEBCC16 src-address=[strongSwan IP] dst-address=[ROS IP]
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="17aaf5a77d0dd2ac42be769c83236ca7b9de2e5cd3c3c3
         bd718ce57f4ebe9808" 
      enc-key="7b694cadab5980e2de748ea9fc57334f68e74b8f920403a10ae5030b0a814203
        4eb2169f" 
      addtime=nov/02/2018 13:31:27 expires-in=5h58m32s 
      add-lifetime=4h48m4s/6h6s current-bytes=560 current-packets=10 
      replay=128 

 1  E spi=0xC98DECFB src-address=[RouterOS IP] dst-address=[strongSwan IP] 
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="8d4d558a5b836c75384e83ea198c88d66d5a612766fe57
         03a5c004f131b48d54" 
      enc-key="cb9f0ed87ed1ba72c1d6fb9bc9c6d3eeca4c3b2d33d647812152d93058250f8d
        d8abd8ca" 
      addtime=nov/02/2018 13:31:32 expires-in=5h58m37s 
      add-lifetime=4h48m4s/6h6s current-bytes=616 current-packets=11 
      replay=128 

 2  E spi=0x9933A7F src-address=[strongSwan IP] dst-address=[RouterOS IP] 
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="b9a861939c36c95ad2a74497633fc5fa76e201482cbaea
         86d276d8678d37ba63" 
      enc-key="363c4e683edb3dea48bbadf053bf214119594c6f395d684a02d8fc92cf7a4a75
        d1c0ea31" 
      add-lifetime=4h48m4s/6h6s replay=128 

 3  E spi=0xC6343304 src-address=[RouterOS IP] dst-address=[strongSwan IP] 
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="f81910f768fedd51bac71b082981f54a4ec8bde79f09ba
         54791984deff90f15c" 
      enc-key="769b702c0d3cf5412165aba5103ac41210d5bd0b7f66793cef2cdac9d41ea090
        a5989d21" 
      addtime=nov/02/2018 13:32:22 expires-in=5h59m27s 
      add-lifetime=4h48m4s/6h6s current-bytes=2184 current-packets=39 
      replay=128

Hope that helps.

Thank you and kind regards,
Sebastian
strongSwan_log_all_modules.txt (420 KB)

Try setting pfs-group to none on RouterOS side. It should still use the same PFS group configured under Peer Profiles when rekeying.

Ok. I removed the PFS group from the Policy Proposal.

The Child SAs are negotiated properly on connect.

Flags: H - hw-aead, A - AH, E - ESP 
 0  E spi=0xF79B8D5 src-address=[strongSwan] dst-address=[ROS IP] 
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="936efeca2a29cab3ba4d46ae246437aa462ff6f12394a6
         a173b4a31c5372bce1" 
      enc-key="6d5ccc9735552de36b5da1056e325d0f50e35c6abb8867c26dd961f2d45f556a
        706f5fc8" 
      add-lifetime=4h48m20s/6h25s replay=128 

 1  E spi=0xCFB62356 src-address=[ROS IP] dst-address=10.108.243.4 
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="625cac05caec966a593693be4969e69e4cce25e89c35eb
         4d2617fa11b61b92c3" 
      enc-key="47744cc60877c2141843064c2e3abf5337b865f4bf592999695accdfe3a5ee91
        dcca2403" 
      addtime=nov/02/2018 14:57:32 expires-in=6h23s 
      add-lifetime=4h48m20s/6h25s current-bytes=112 current-packets=2 
      replay=128

On Rekey, one of the Child SAs goes away.

Flags: H - hw-aead, A - AH, E - ESP 
 0  E spi=0xCFB62356 src-address=[ROS IP] dst-address=[strongSwan IP] 
      state=mature auth-algorithm=sha256 enc-algorithm=aes-ctr 
      enc-key-size=288 auth-key="625cac05caec966a593693be4969e69e4cce25e89c35eb
         4d2617fa11b61b92c3" 
      enc-key="47744cc60877c2141843064c2e3abf5337b865f4bf592999695accdfe3a5ee91
        dcca2403" 
      addtime=nov/02/2018 14:57:32 expires-in=5h58m32s 
      add-lifetime=4h48m20s/6h25s current-bytes=6328 current-packets=113 
      replay=128

I can see in winbox that there flashes from time to a new Child SA with Null encryption which disapears after about a second.

When strongSwan tries to rekey, the Logfile from Router OS shows:

ipsec,error no proposal choosen

An no Child SAs were generated anymore.

When now try to reconnect from strongSwan, strongSwan shows a problem with message ID.

establishing CHILD_SA connection1{35}
generating CREATE_CHILD_SA request 44 [ SA No KE TSi TSr ]
sending packet: from [strongSwan IP][500] to [ROS IP][500] (736 bytes)
received packet: from [ROS IP][500] to [strongSwan IP][500] (112 bytes)
parsed INFORMATIONAL request 17 [ ]
generating INFORMATIONAL response 17 [ ]
sending packet: from [strongSwan IP][500] to [ROS IP][500] (80 bytes)
received packet: from [ROS IP][500] to [strongSwan IP][500] (256 bytes)
parsed INFORMATIONAL response 43 [ N(NO_PROP) ]
received message ID 43, expected 44, ignored
retransmit 1 of request with message ID 44
sending packet: from [strongSwan IP][500] to [ROS IP][500] (736 bytes)
received packet: from [ROS IP][500] to [strongSwan IP][500] (256 bytes)
parsed INFORMATIONAL response 43 [ N(NO_PROP) ]
received message ID 43, expected 44, ignored
retransmit 2 of request with message ID 44
sending packet: from [strongSwan IP][500] to [ROS IP][500] (736 bytes)
received packet: from [ROS IP][500] to [strongSwan IP][500] (256 bytes)
parsed INFORMATIONAL response 43 [ N(NO_PROP) ]
received message ID 43, expected 44, ignored

Kind regards,
Sebastian

Please post your StrongSwan and RouterOS IPsec configurations. Also enable IPsec debug logs in RouterOS (/system logging add topics=ipsec) and post logs when rekeying fails (before the no proposal choosen message).

Ok. Here they are:

ipsec.conf from strongSwan:

conn connection1
        keyexchange=ikev2
        esp=aes256ctr-sha256-modp4096!
        ike=aes256-sha256-modp4096!
        ikelifetime=720m
        keylife=6m
        rekeymargin=3m
        keyingtries=3
        left=[strongSwan IP]
        leftcert=station4crt.pem
        leftid="[Local Cert DN]"
        right=[RouterOS IP]
        rightcert=mikrotikcrt.pem
        rightid="[Remote Cert DN]"
        rightsubnet=[RouterOS Network]/16
        leftupdown=/usr/libexec/ohp/_updown
        auto=add
        dpdaction=restart
        dpddelay=30s

IPSec Config from RouterOS:

/ip ipsec peer profile
add dh-group=modp4096 dpd-interval=30s enc-algorithm=aes-256,aes-192,aes-128 \
    hash-algorithm=sha256 name=IKEv2_Peer nat-traversal=no

/ip ipsec policy group
add name=IKEv2_Pol_Grp

/ip ipsec proposal
add auth-algorithms=sha512,sha256 enc-algorithms="aes-256-cbc,aes-256-ctr,aes-\
    256-gcm,aes-192-cbc,aes-192-ctr,aes-192-gcm,aes-128-cbc,aes-128-ctr,aes-12\
    8-gcm" lifetime=6h name=IKEv2_Pol_Prop pfs-group=none

/ip ipsec peer
add address=[strongSwan Client Network]/24 auth-method=rsa-signature certificate=\
    mikrotikcrt.pem_0 comment="ALU IKEv2" disabled=yes exchange-mode=ike2 \
    generate-policy=port-strict local-address=[RouterOS IP] passive=yes \
    policy-template-group=IKEv2_Pol_Grp profile=IKEv2_Peer
	
/ip ipsec policy
add dst-address=[strongSwan Client Network]/24 group=IKEv2_Pol_Grp proposal=\
    IKEv2_Pol_Prop src-address=[RouterOS Client Network]/16 template=yes

RouterOS has also other different active IPSec Configurations. Some IKEv1 with PSK and static policies and also one for L2TP over IPSec. I stripped them out of posted configuration.
If you need them I can post them also.

StrongSwan IPSec Log outputs:

Nov/05/2018 10:11:44 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/05/2018 10:11:44 ipsec,debug,packet ffde5dad e5561a5d febbea00 703e04c7 2e202408 00000002 000002e0 290002c4
Nov/05/2018 10:11:44 ipsec,debug,packet 03995236 82a0d4ba 6437df6a 07c69e24 a0378ae6 a8c98769 4bcff0c3 bd199758
Nov/05/2018 10:11:44 ipsec,debug,packet 3cafdb01 a4c01d4d 830cec8f d5275c4e d6be2088 48b81943 0ea9cc30 e56a7156
Nov/05/2018 10:11:44 ipsec,debug,packet 46ba52cf fde2e29d c200fb11 a1e8cf55 91fb75e2 3b255089 97773969 a7e4d880
Nov/05/2018 10:11:44 ipsec,debug,packet 12aece97 acb8e735 cb9bff9a 84102d81 17f46be3 6bb7dedf 945e4015 88d0447d
Nov/05/2018 10:11:44 ipsec,debug,packet 15db6c80 ca88b010 8c4bd64f a71f15a7 2ac63f58 0035cda8 a1c02eea cbdcdfb3
Nov/05/2018 10:11:44 ipsec,debug,packet b22787e6 70718deb 1f0f64de d6e15119 c4b7234d 06ea2b98 69691b98 9598d137
Nov/05/2018 10:11:44 ipsec,debug,packet 98665ec2 65e701b2 f9cfde70 92e3fc6e 6f9881e5 d8f017f5 cb90ff82 aaf5a9c8
Nov/05/2018 10:11:44 ipsec,debug,packet 8af66e9a f5180cc1 9608cab6 3f4a36a4 6de10c17 d1426712 c92e846d ea05f776
Nov/05/2018 10:11:44 ipsec,debug,packet 3b82a5eb 275b1718 98836bfa e68cc5fa ff302c81 0a218b53 622023b7 3899d0a9
Nov/05/2018 10:11:44 ipsec,debug,packet f1e6ecff 0b7877b3 0226c4df acb09044 c4366e77 0d8d1a4e 846730bd f540f6d7
Nov/05/2018 10:11:44 ipsec,debug,packet 2e1f4ed8 1af7f5eb e6ed0116 1c4e0ae4 2e8c837a 7d3ded21 53c022a6 209b3d20
Nov/05/2018 10:11:44 ipsec,debug,packet d8c98daa ecfdf8ec f1bfb415 92e32b00 2b23a35d e5fe4ff1 48ba7bfd 22052c1c
Nov/05/2018 10:11:44 ipsec,debug,packet 1d05d6df d034d645 4d4ead21 7c61f088 cbbad81d 90198bd9 9f8ff0b4 db289c10
Nov/05/2018 10:11:44 ipsec,debug,packet 32964785 b1dc25b3 f45b506b 45b53dca 0e44a5c4 65588432 aade6f25 50207808
Nov/05/2018 10:11:44 ipsec,debug,packet 4c30161e 6faa91f7 073a45f6 a7a19cbb 6f69cc08 21fb131b 22fabb41 414491b0
Nov/05/2018 10:11:44 ipsec,debug,packet f4751697 da445f2f 3930363e 82ab88ed 8ccf3374 fa649507 3afacb55 7d0d9ebd
Nov/05/2018 10:11:44 ipsec,debug,packet ce4c270e 24c3af34 642f3eef c20c9b2c cb43d478 297945f7 76b7e99d c93eb8b1
Nov/05/2018 10:11:44 ipsec,debug,packet 7b45146f cfab5974 aca91380 8932ce11 ad7d138d 9e87abeb 4449dc54 6129ab53
Nov/05/2018 10:11:44 ipsec,debug,packet 698dfeca ad3d3a0b b3a74ebe d5cca735 321628cf 80d99e7d 418e0c07 a7db0e5a
Nov/05/2018 10:11:44 ipsec,debug,packet 07698dec be10c0a4 516a72b2 df565b37 d8a89b39 c6ac8be6 6706f8b9 83e357cb
Nov/05/2018 10:11:44 ipsec,debug,packet be19a4fa dd79719e c3aca09d 5a48a58e bf184d90 17782c62 b63d177b 4fcea5c0
Nov/05/2018 10:11:44 ipsec,debug,packet 15239b13 c4d612e8 b7ec4900 9fd8c221 b084d096 c9ed035a 78640822 81a6c1c6
Nov/05/2018 10:11:44 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/05/2018 10:11:44 ipsec payload seen: ENC
Nov/05/2018 10:11:44 ipsec processing payload: ENC
Nov/05/2018 10:11:44 ipsec,debug => iv (size 0x10)
Nov/05/2018 10:11:44 ipsec,debug 03995236 82a0d4ba 6437df6a 07c69e24
Nov/05/2018 10:11:44 ipsec,debug decrypted
Nov/05/2018 10:11:44 ipsec,debug,packet => decrypted packet (size 0x29c)
Nov/05/2018 10:11:44 ipsec,debug,packet 2100000c 03044009 cf2702b2 28000034 00000030 01030404 c1e8d94f 0300000c
Nov/05/2018 10:11:44 ipsec,debug,packet 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008 05000000
Nov/05/2018 10:11:44 ipsec,debug,packet 22000024 9e60885b 2e0e03e9 7510e6be 6d300cd3 b8d09832 2f72e4dc a0b12592
Nov/05/2018 10:11:44 ipsec,debug,packet f54dde44 2c000208 00100000 e808df9c 96372ad3 e8e42d88 2ca6de08 eadabfd0
Nov/05/2018 10:11:44 ipsec,debug,packet d243356a f21c1f4c 02ee68f7 9530bc23 f82f8e68 4dd56e21 ab04dbc3 c132dba9
Nov/05/2018 10:11:44 ipsec,debug,packet 6ff84a35 37f2c225 a4f794c2 ec700801 a89d840b 56b5c306 19935902 1c83989e
Nov/05/2018 10:11:44 ipsec,debug,packet a3403043 2d9d6ab0 2a3a7e46 37cf0d9e 7a1a8608 a22b99d7 325787c0 7e99dfd0
Nov/05/2018 10:11:44 ipsec,debug,packet 25102f8e a7322a4c cffb92f9 85b52230 4d3e755a 405b5e02 06773e52 4dbf2349
Nov/05/2018 10:11:44 ipsec,debug,packet 
Nov/05/2018 10:11:44 ipsec,debug,packet 50e4764d 761f4e35 38dcade4 4edda9f0 8db21b55 9160088a 29d1720a 474891f4
Nov/05/2018 10:11:44 ipsec,debug,packet e046789c 21f534af 82a7cdc0 ed958c49 bd05a576 83646462 c0de3d5e 4611feaf
Nov/05/2018 10:11:44 ipsec,debug,packet 8722bcdc eb0ced90 3bc6a834 ef3092f1 e317ab94 54a2745b 4bfc2e94 6a716990
Nov/05/2018 10:11:44 ipsec,debug,packet 2c616840 6b57a95a 0e76d7b7 fa77cea5 42e929e7 f0fbb47d 7c6e1e6c 294a635e
Nov/05/2018 10:11:44 ipsec,debug,packet c9ceff3c e8ff8c6b 65f38cea 9d541895 cedb2ca3 bfcd8ae5 3f3f4993 f967ce13
Nov/05/2018 10:11:44 ipsec,debug,packet 2b06e348 2e53a686 a83858cb 1adae7ba 68a5c7ec ab0fe8f4 dbaaa4d9 760bf995
Nov/05/2018 10:11:44 ipsec,debug,packet f6a3c954 9867ca85 f5d99b38 8e4ae10e d1bb3ba1 04964d68 fc5cc168 6f7b36c8
Nov/05/2018 10:11:44 ipsec,debug,packet 51d05cb5 ef6de1b3 43120e72 9dd4d669 e2c65732 9e0e9dbe ec845e9a cd10d06c
Nov/05/2018 10:11:44 ipsec,debug,packet 
Nov/05/2018 10:11:44 ipsec,debug,packet ef460563 9c652b6f b6e014bb 6ba94347 003e6d56 f12b60dd 8bab203c acc9f526
Nov/05/2018 10:11:44 ipsec,debug,packet 7241c89d 69b8a6f1 83e50ecf 3a0ec66e 15b38199 b9a95482 904c0664 14e8371b
Nov/05/2018 10:11:44 ipsec,debug,packet 52575ff6 7fde4edb 2c5839c3 353be6db 229efeca b89bb83b a677c68d 7420f2a0
Nov/05/2018 10:11:44 ipsec,debug,packet ab5c45b4 7ad726eb 08f98e41 2d000018 01000000 07000010 0000ffff 0a6cf304
Nov/05/2018 10:11:44 ipsec,debug,packet 0a6cf304 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/05/2018 10:11:44 ipsec payload seen: NOTIFY
Nov/05/2018 10:11:44 ipsec payload seen: SA
Nov/05/2018 10:11:44 ipsec payload seen: NONCE
Nov/05/2018 10:11:44 ipsec payload seen: KE
Nov/05/2018 10:11:44 ipsec payload seen: TS_I
Nov/05/2018 10:11:44 ipsec payload seen: TS_R
Nov/05/2018 10:11:44 ipsec create child: respond
Nov/05/2018 10:11:44 ipsec processing payload: NONCE
Nov/05/2018 10:11:44 ipsec processing payloads: NOTIFY
Nov/05/2018 10:11:44 ipsec   notify: REKEY_SA
Nov/05/2018 10:11:44 ipsec rekeying child SA 0xcf2702b2
Nov/05/2018 10:11:44 ipsec peer wants tunnel mode
Nov/05/2018 10:11:44 ipsec processing payload: TS_R
Nov/05/2018 10:11:44 ipsec [RouterOS Network]/16
Nov/05/2018 10:11:44 ipsec processing payload: TS_I
Nov/05/2018 10:11:44 ipsec [strongSwan IP]
Nov/05/2018 10:11:44 ipsec processing payload: SA
Nov/05/2018 10:11:44 ipsec IKE Protocol: ESP
Nov/05/2018 10:11:44 ipsec  proposal #1
Nov/05/2018 10:11:44 ipsec   enc: aes256-ctr
Nov/05/2018 10:11:44 ipsec   auth: sha256
Nov/05/2018 10:11:44 ipsec   dh: modp4096
Nov/05/2018 10:11:44 ipsec reply notify: NO_PROPOSAL_CHOSEN
Nov/05/2018 10:11:44 ipsec adding notify: NO_PROPOSAL_CHOSEN
Nov/05/2018 10:11:44 ipsec,debug => (size 0x8)
Nov/05/2018 10:11:44 ipsec,debug 00000008 0000000e
Nov/05/2018 10:11:44 ipsec <- ike2 reply, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/05/2018 10:11:44 ipsec,debug,packet => outgoing plain packet (size 0x24)
Nov/05/2018 10:11:44 ipsec,debug,packet ffde5dad e5561a5d febbea00 703e04c7 29202420 00000002 00000024 00000008
Nov/05/2018 10:11:44 ipsec,debug,packet 0000000e
Nov/05/2018 10:11:44 ipsec adding payload: ENC
Nov/05/2018 10:11:44 ipsec,debug => (first 0x100 of 0x104)
Nov/05/2018 10:11:44 ipsec,debug 29000104 b084d096 c9ed035a 78640822 81a6c1c6 28deb8cc 8e3e95cd 63e31087
Nov/05/2018 10:11:44 ipsec,debug 6ac7e8a4 9a89cbb4 32f8553b 902cab5f 7be9edfd 6c2587fb 63ac18db 1f8d4189
Nov/05/2018 10:11:44 ipsec,debug f997a620 b90ec1bd d40b0916 35c00c50 2c501534 a7a0f2e0 ea228792 b6f6634a
Nov/05/2018 10:11:44 ipsec,debug 87cbb87d a004532c 79e2f7cc 70859d05 c4bde6db 006e5287 276ebaa2 763b9276
Nov/05/2018 10:11:44 ipsec,debug b9ab9242 da3b7052 e7cb2237 6adbae03 5fd744e8 f262baa3 edce5372 6f670d53
Nov/05/2018 10:11:44 ipsec,debug bf227311 1c11a7da 8174fb89 a56d0ab0 938f52dd d0e4cfcb d0cda688 47f7b0ec
Nov/05/2018 10:11:44 ipsec,debug c3ca9a6e ec1cb051 6d263a7c dba52770 97b59f56 60744583 829d2a47 65859e68
Nov/05/2018 10:11:44 ipsec,debug 79ae831d a3d15725 6977b569 69c0d81d 6979c0bc 000000a0 773d99d8 773d99d8
Nov/05/2018 10:11:44 ipsec,debug ===== sending 288 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/05/2018 10:11:44 ipsec,debug 1 times of 288 bytes message will be sent to [strongSwan IP][500]
Nov/05/2018 10:11:44 ipsec,debug,packet ffde5dad e5561a5d febbea00 703e04c7 2e202420 00000002 00000120 29000104
Nov/05/2018 10:11:44 ipsec,debug,packet b084d096 c9ed035a 78640822 81a6c1c6 28deb8cc 8e3e95cd 63e31087 6ac7e8a4
Nov/05/2018 10:11:44 ipsec,debug,packet 9a89cbb4 32f8553b 902cab5f 7be9edfd 6c2587fb 63ac18db 1f8d4189 f997a620
Nov/05/2018 10:11:44 ipsec,debug,packet b90ec1bd d40b0916 35c00c50 2c501534 a7a0f2e0 ea228792 b6f6634a 87cbb87d
Nov/05/2018 10:11:44 ipsec,debug,packet a004532c 79e2f7cc 70859d05 c4bde6db 006e5287 276ebaa2 763b9276 b9ab9242
Nov/05/2018 10:11:44 ipsec,debug,packet da3b7052 e7cb2237 6adbae03 5fd744e8 f262baa3 edce5372 6f670d53 bf227311
Nov/05/2018 10:11:44 ipsec,debug,packet 1c11a7da 8174fb89 a56d0ab0 938f52dd d0e4cfcb d0cda688 47f7b0ec c3ca9a6e
Nov/05/2018 10:11:44 ipsec,debug,packet ec1cb051 6d263a7c dba52770 97b59f56 60744583 829d2a47 65859e68 79ae831d
Nov/05/2018 10:11:44 ipsec,debug,packet a3d15725 6977b569 69c0d81d 6979c0bc c6a0ce6a 242cc83a 45505b1f 5533694a

Kind regards,
Sebastian

Are there any news according to my problem?

Are the posted logs ok? Can provide anything else for solving my problem?

Kind regards,
Sebastian

What if you set the pfs-group back to modp4096 in RouterOS? Are the logs any different?

When I renable the PFS group, the log differ. But from my opinion that because the behavior changes completly:

With enabled PFS group, it happens from time, that no data flows through the created ChildSA. And on the strongSwan side, I can see that there is package that is retransmitted, but never answered by the RouterOS. After 5 retransmits strongSwan give up to retransmit and initiates new rekeying attempt which creates, in most cases, a working ChildSA on the RouterOS.

With disabled PFS group rekeying fails with the message from RouterOS that now Proposal was found.

Do you rely want me to compare the log, when the behaviour is completly different?

I’m not able to find out what happens by digging in the hexdumps of the packets. I hoped that someone from MikroTik were able to do that.

I personally think that it’s a problem of the RouterOS. Rekeying against another running strongSwan instance is working flawlessly.


Kind regards,
Sebastian

Just tested your configuration between strongSwan 5.7.1 and RouterOS v6.44beta and rekeying works properly at least if initiated from strongSwan side if pfs-group=modp4096 is set in RouterOS. Can you post the logs when pfs-group=4096 is used?

Do you have also tried to send data?

Rekeying looks from the RouterOS side is looking like it has worked. But no data goes through. ChildSA for both directions were created. But no data exchange is possible.

Here is the log file:

Nov/06/2018 14:14:38 ipsec IPsec-SA established: [strongSwan IP][500]->[RouterOS IP][500] spi=0x3b955f6
Nov/06/2018 14:14:43 ipsec IPsec-SA established: [RouterOS IP][500]->[strongSwan IP][500] spi=0xc60d9351
Nov/06/2018 14:14:49 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:14:49 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202508 00000003 00000050 2a000034
Nov/06/2018 14:14:49 ipsec,debug,packet 09813828 f939f4c1 08365538 3a923133 3c1c875c 85540bc5 3bc5c6ef 4d56c6f4
Nov/06/2018 14:14:49 ipsec,debug,packet 989d0ab9 30559053 d16debbf 8c6700e5
Nov/06/2018 14:14:49 ipsec -> ike2 request, exchange: INFORMATIONAL:3 [strongSwan IP][500]
Nov/06/2018 14:14:49 ipsec payload seen: ENC
Nov/06/2018 14:14:49 ipsec processing payload: ENC
Nov/06/2018 14:14:49 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:14:49 ipsec,debug 09813828 f939f4c1 08365538 3a923133
Nov/06/2018 14:14:49 ipsec,debug decrypted
Nov/06/2018 14:14:49 ipsec,debug,packet => decrypted packet (size 0xc)
Nov/06/2018 14:14:49 ipsec,debug,packet 0000000c 03040001 c404dec1
Nov/06/2018 14:14:49 ipsec payload seen: DELETE
Nov/06/2018 14:14:49 ipsec respond: info
Nov/06/2018 14:14:49 ipsec processing payloads: NOTIFY (none found)
Nov/06/2018 14:14:49 ipsec processing payloads: DELETE
Nov/06/2018 14:14:49 ipsec delete ESP SA
Nov/06/2018 14:14:49 ipsec delete spi: 0xc404dec1
Nov/06/2018 14:14:49 ipsec IPsec-SA killing: [strongSwan IP][500]->[RouterOS IP][500] spi=0x75dc32a
Nov/06/2018 14:14:49 ipsec IPsec-SA killing: [RouterOS IP][500]->[strongSwan IP][500] spi=0xc404dec1
Nov/06/2018 14:14:49 ipsec,debug sending empty reply
Nov/06/2018 14:14:49 ipsec <- ike2 reply, exchange: INFORMATIONAL:3 [strongSwan IP][500]
Nov/06/2018 14:14:49 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:14:49 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 00202520 00000003 0000001c
Nov/06/2018 14:14:49 ipsec adding payload: ENC
Nov/06/2018 14:14:49 ipsec,debug => (size 0x54)
Nov/06/2018 14:14:49 ipsec,debug 00000054 989d0ab9 30559053 d16debbf 8c6700e5 795c7693 d43be962 a459c80e
Nov/06/2018 14:14:49 ipsec,debug 8db10615 75f4647f 1cced94e 1c18918c ca72707f 56e3044e b5c5dffe d17211d9
Nov/06/2018 14:14:49 ipsec,debug 0f296643 00000000 00000000 00000010 773d9940
Nov/06/2018 14:14:49 ipsec,debug ===== sending 112 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:14:49 ipsec,debug 1 times of 112 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:14:49 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202520 00000003 00000070 00000054
Nov/06/2018 14:14:49 ipsec,debug,packet 989d0ab9 30559053 d16debbf 8c6700e5 795c7693 d43be962 a459c80e 8db10615
Nov/06/2018 14:14:49 ipsec,debug,packet 75f4647f 1cced94e 1c18918c ca72707f 56e3044e b5c5dffe d17211d9 0f296643
Nov/06/2018 14:14:49 ipsec,debug,packet b4c805b4 a780babe f82949fb 674a19ed
Nov/06/2018 14:15:19 ipsec sending dpd packet
Nov/06/2018 14:15:19 ipsec <- ike2 request, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:15:19 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:15:19 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 00202500 00000000 0000001c
Nov/06/2018 14:15:19 ipsec adding payload: ENC
Nov/06/2018 14:15:19 ipsec,debug => (size 0x44)
Nov/06/2018 14:15:19 ipsec,debug 00000044 989d0ab9 30559053 d16debbf 8c6700e5 d7e9d954 0a3ca5fc 1e2111fa
Nov/06/2018 14:15:19 ipsec,debug 0b35467e b9065f4f 1a0b1914 a05e8ec7 5524181c 66356662 ffffffff 00000002
Nov/06/2018 14:15:19 ipsec,debug ffffffff
Nov/06/2018 14:15:19 ipsec,debug ===== sending 96 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:15:19 ipsec,debug 1 times of 96 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:15:19 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202500 00000000 00000060 00000044
Nov/06/2018 14:15:19 ipsec,debug,packet 989d0ab9 30559053 d16debbf 8c6700e5 d7e9d954 0a3ca5fc 1e2111fa 0b35467e
Nov/06/2018 14:15:19 ipsec,debug,packet b9065f4f 1a0b1914 a05e8ec7 5524181c f4b13be2 ab84f7d0 d0f05371 b0d9164c
Nov/06/2018 14:15:21 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:15:21 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202408 00000004 000002e0 290002c4
Nov/06/2018 14:15:21 ipsec,debug,packet 56bb4017 0a39c19d 80112a20 ee05217a 54577ff4 8224ce33 3910bcce d9271f6a
Nov/06/2018 14:15:21 ipsec,debug,packet 9d2ab09f 29c3dcf4 c3c7ae57 e14a659c 7b20b942 e1cdd92f ef97c1a0 bd113e66
Nov/06/2018 14:15:21 ipsec,debug,packet 9c6130a2 1c0fa717 2789ac70 dcadb93e 8d821b28 968c8802 903182fb 3c07502b
Nov/06/2018 14:15:21 ipsec,debug,packet 5ee7a526 2b77634f 4c4585b4 2c1f717e c8e0cf70 2427d57f dd805b27 d94c32f1
Nov/06/2018 14:15:21 ipsec,debug,packet f5706646 f91c9261 ac0833a3 37a96617 ce0466b4 9fbd35aa 9a7b66c5 5a669f03
Nov/06/2018 14:15:21 ipsec,debug,packet e70340ce 2c33ceec a3f56c74 fb502d4c 68ed3172 e760da10 307dfe04 20242e9b
Nov/06/2018 14:15:21 ipsec,debug,packet 0ca33ecd b6bf73f1 43d0fb2e a0e26307 e957f9ee 49837c98 df11f155 1e78bc3d
Nov/06/2018 14:15:21 ipsec,debug,packet b9638697 63b384c5 1b608e99 d16be566 7b028ed5 e1120e62 751ba455 5f9ca23c
Nov/06/2018 14:15:21 ipsec,debug,packet 2c2e12b1 96705bd6 11ecdb19 26a05b9d 3d640544 a0ca584f 1a210388 2ea94e97
Nov/06/2018 14:15:21 ipsec,debug,packet 290a1c9e d8fc4e7a ab52ec44 210e77df 0c6ab50e 4faa06ee 564713fd ce91e544
Nov/06/2018 14:15:21 ipsec,debug,packet e5ec64f1 321b533b 2f54ee18 dc394605 0f27b193 dda2ab54 bca38d64 c829df10
Nov/06/2018 14:15:21 ipsec,debug,packet bbfab2ad 3ead03f4 f7a75dc5 a99b1a63 22b35525 76f5b1a6 a189ca13 862e7d5b
Nov/06/2018 14:15:21 ipsec,debug,packet 1ef64185 c95d2488 b37fac06 3844d82b 20ea93e9 52b4b53e e0d9fd98 18158152
Nov/06/2018 14:15:21 ipsec,debug,packet 5e4c8a1c 5498efe6 9b303092 e4a98bd4 69f930ba 67576c9e 653f09ff 0f7fe46a
Nov/06/2018 14:15:21 ipsec,debug,packet 3f97c61e 660c4b1c 57f6e586 4dffd559 7cd84971 18458ef7 1900fb5d c07bc43e
Nov/06/2018 14:15:21 ipsec,debug,packet 7514bc0b 0361383d f8905dfe 4a54b10a baefc7e6 b511900c ae1e9101 19432b7a
Nov/06/2018 14:15:21 ipsec,debug,packet 137f13fa 2f4e8ddd 81cadfaf be27423c d750f33e e88e04c6 0277c146 5d98303c
Nov/06/2018 14:15:21 ipsec,debug,packet 6d20e22e 413f0657 7162579e c86b9ab6 a2ece96f 945ca5b7 0140e759 5680d35a
Nov/06/2018 14:15:21 ipsec,debug,packet 47bc426e 5fbe011d d96a2659 1681929e 17ecbe8b e81c50c3 139bacdd fb1fd5f3
Nov/06/2018 14:15:21 ipsec,debug,packet 91ed5903 6915a031 7b16a451 ac39febd 035097d8 8ce85452 9f3f44f9 dc4de89c
Nov/06/2018 14:15:21 ipsec,debug,packet e7585497 dbd00863 bd7c52dd 00c2c74d c97cd5bf a136c81f 9d58caf6 2b959256
Nov/06/2018 14:15:21 ipsec,debug,packet 8ec366fb 1f60dace 0c38baf5 889efc27 9c4eadab 87f65a0b f6e0d928 477eebbf
Nov/06/2018 14:15:21 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:4 [strongSwan IP][500]
Nov/06/2018 14:15:21 ipsec payload seen: ENC
Nov/06/2018 14:15:21 ipsec processing payload: ENC
Nov/06/2018 14:15:21 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:15:21 ipsec,debug 56bb4017 0a39c19d 80112a20 ee05217a
Nov/06/2018 14:15:21 ipsec,debug decrypted
Nov/06/2018 14:15:21 ipsec,debug,packet => decrypted packet (size 0x29c)
Nov/06/2018 14:15:21 ipsec,debug,packet 2100000c 03044009 c60d9351 28000034 00000030 01030404 c7b66943 0300000c
Nov/06/2018 14:15:21 ipsec,debug,packet 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008 05000000
Nov/06/2018 14:15:21 ipsec,debug,packet 22000024 5834f7be d9b66471 e53a3c8c 792e1953 306e690c e96f3160 aa951d9d
Nov/06/2018 14:15:21 ipsec,debug,packet 99415745 2c000208 00100000 41eae2f1 31c46b52 ea1949b5 3f85d3be c1352cfb
Nov/06/2018 14:15:21 ipsec,debug,packet 3cd22fa0 c229786d b97a4954 b34c30bc 971a2044 cfcc5d3b c1f6eca1 856d802b
Nov/06/2018 14:15:21 ipsec,debug,packet 3cf9b4f4 6c266eec 2c178d3f aca69755 00ad8911 8a6b7566 55efd88b e1edf34a
Nov/06/2018 14:15:21 ipsec,debug,packet 12d2abf2 1b6db22e aa04da0c 2206f628 d791fd24 892236e0 fd128005 36f6a92a
Nov/06/2018 14:15:21 ipsec,debug,packet 528d9dca 167f9da8 84fed9e4 010208b0 6b0f9aaa 95490427 30b9246a c0a05547
Nov/06/2018 14:15:21 ipsec,debug,packet 
Nov/06/2018 14:15:21 ipsec,debug,packet 29b2e054 833af723 b651a733 f735989c e5111091 15f125b3 484c2ea5 1d7ec088
Nov/06/2018 14:15:21 ipsec,debug,packet e23bd0e3 dd3b7b98 630b3316 55f52818 4883670c 703ce246 2029c857 f247e2e1
Nov/06/2018 14:15:21 ipsec,debug,packet 9ffeba24 752dcc41 28d5d033 3f550756 0647e528 f4c453c2 33284bbb dfcbbd2a
Nov/06/2018 14:15:21 ipsec,debug,packet 12a1b174 12109db9 919424cc 6aaff75c 37629bb6 65984129 2093bb81 81e39e87
Nov/06/2018 14:15:21 ipsec,debug,packet 930f9a2b ece0953c b1598df6 65672400 eaf36525 b70ec93e 1cc93c1e 5bf170fb
Nov/06/2018 14:15:21 ipsec,debug,packet 60ba41e5 6632c4c4 89b78485 3544b534 b1b66e70 c2a0697e 7a79426d 745f9d9b
Nov/06/2018 14:15:21 ipsec,debug,packet 2f62d220 1c3ccf4e 382d1765 1bf68e7a 204044a5 17a635ec 93abb691 ff8ce454
Nov/06/2018 14:15:21 ipsec,debug,packet 9103d1c5 54c5bd25 bef5def5 87a37cea 0e5625ef d4e343e9 dc1a1a3e 41b5e1ce
Nov/06/2018 14:15:21 ipsec,debug,packet 
Nov/06/2018 14:15:21 ipsec,debug,packet 5d036bfe d94b7a92 73147901 46dc7682 8506742b b1ffbfb9 4ff105de 6445c1cb
Nov/06/2018 14:15:21 ipsec,debug,packet 431f7bc1 b71670c8 2a9514e3 74c92bc3 551963be de9d52f9 9b1e15dd 8420f845
Nov/06/2018 14:15:21 ipsec,debug,packet 6b967e2f 136d64ef db6de693 da7138a6 7b02b541 51aaa4f8 837de610 40ee4ab9
Nov/06/2018 14:15:21 ipsec,debug,packet b87ba481 463c7222 7ffea30a 2d000018 01000000 07000010 0000ffff 0a6cf304
Nov/06/2018 14:15:21 ipsec,debug,packet 0a6cf304 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/06/2018 14:15:21 ipsec payload seen: NOTIFY
Nov/06/2018 14:15:21 ipsec payload seen: SA
Nov/06/2018 14:15:21 ipsec payload seen: NONCE
Nov/06/2018 14:15:21 ipsec payload seen: KE
Nov/06/2018 14:15:21 ipsec payload seen: TS_I
Nov/06/2018 14:15:21 ipsec payload seen: TS_R
Nov/06/2018 14:15:21 ipsec request while waiting for dpd
Nov/06/2018 14:15:21 ipsec create child: respond
Nov/06/2018 14:15:21 ipsec processing payload: NONCE
Nov/06/2018 14:15:21 ipsec processing payloads: NOTIFY
Nov/06/2018 14:15:21 ipsec   notify: REKEY_SA
Nov/06/2018 14:15:21 ipsec rekeying child SA 0xc60d9351
Nov/06/2018 14:15:21 ipsec peer wants tunnel mode
Nov/06/2018 14:15:21 ipsec processing payload: TS_R
Nov/06/2018 14:15:21 ipsec [RouterOS Network IP]/16
Nov/06/2018 14:15:21 ipsec processing payload: TS_I
Nov/06/2018 14:15:21 ipsec [strongSwan IP]
Nov/06/2018 14:15:21 ipsec processing payload: SA
Nov/06/2018 14:15:21 ipsec IKE Protocol: ESP
Nov/06/2018 14:15:21 ipsec  proposal #1
Nov/06/2018 14:15:21 ipsec   enc: aes256-ctr
Nov/06/2018 14:15:21 ipsec   auth: sha256
Nov/06/2018 14:15:21 ipsec   dh: modp4096
Nov/06/2018 14:15:21 ipsec matched proposal:
Nov/06/2018 14:15:21 ipsec  proposal #1
Nov/06/2018 14:15:21 ipsec   enc: aes256-ctr
Nov/06/2018 14:15:21 ipsec   auth: sha256
Nov/06/2018 14:15:21 ipsec   dh: modp4096
Nov/06/2018 14:15:21 ipsec processing payload: KE
Nov/06/2018 14:15:28 ipsec,debug => shared secret (first 0x100 of 0x200)
Nov/06/2018 14:15:28 ipsec,debug dd19c8fa 24f2bd37 0c459e4d 460c43e6 aa2bc8f0 29b69046 c65ee1ca da2e72fe
Nov/06/2018 14:15:28 ipsec,debug eafee66d 4efccdb2 fafc6785 cf6fc7c1 8fd82e88 11acb9b5 3f2e335a 6c852b79
Nov/06/2018 14:15:28 ipsec,debug 3fa97753 db1156d1 aaf11fd1 04b40705 8c2544ba 59888944 2b7d909b 88744014
Nov/06/2018 14:15:28 ipsec,debug d5a68724 60c57f0d d4013055 4705d563 1c4d58bd 13176ef5 12327b05 42af0310
Nov/06/2018 14:15:28 ipsec,debug d30bc7a9 de5ff7aa d184db26 8bd3f2c3 b954800e e96af119 ce8579de bab46c5a
Nov/06/2018 14:15:28 ipsec,debug 64d0a7dd 8ac85f7b e1306c01 efb7f91b 818252a2 09ff14bf 72d1d857 9d2ebee5
Nov/06/2018 14:15:28 ipsec,debug b6534717 8a8de196 ac253d16 f8cec80d 302c6bed 1d6cf450 d3cdf590 7f9fa3e3
Nov/06/2018 14:15:28 ipsec,debug a13d8323 535c2333 6cfc1640 c1b8ae6f 437f2d91 5b52baaa 759fe32d 546e760f
Nov/06/2018 14:15:28 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:15:28 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202528 00000000 00000050 00000034
Nov/06/2018 14:15:28 ipsec,debug,packet 0caec3d7 29b98b2f 0383c971 aa7a62cc 3b2c9218 3ad05288 ccc8fef7 55e96c4e
Nov/06/2018 14:15:28 ipsec,debug,packet 1f28f35f 14c0dd88 86760f45 76914c20
Nov/06/2018 14:15:28 ipsec -> ike2 reply, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec ignoring
Nov/06/2018 14:15:28 ipsec create child: finish
Nov/06/2018 14:15:28 ipsec adding payload: NONCE
Nov/06/2018 14:15:28 ipsec,debug => (size 0x1c)
Nov/06/2018 14:15:28 ipsec,debug 0000001c 72f78157 4ac15077 cbf24a07 edb3c5ab 0e435972 743cf1a5
Nov/06/2018 14:15:28 ipsec adding payload: KE
Nov/06/2018 14:15:28 ipsec,debug => (first 0x100 of 0x208)
Nov/06/2018 14:15:28 ipsec,debug 00000208 00100000 5f25c5dc 4923d261 32cc250c 50285b17 9191bbd7 65eaa88e
Nov/06/2018 14:15:28 ipsec,debug 61b45d1b 37163366 d937f68d 9899c305 c1f5f8bb f9ab8b3b fe28830d ad70df46
Nov/06/2018 14:15:28 ipsec,debug b0521b0d efba31d3 85516a55 6a48f2fa ec98503b 6f533504 956af7cc c385b326
Nov/06/2018 14:15:28 ipsec,debug b6282c67 7b596b56 04878fd0 1e1d2ddf f7859fee 3c328b14 2a0c77b4 444831f6
Nov/06/2018 14:15:28 ipsec,debug 6551c4cb b079b1f8 82ce3391 5f1ed323 542dc7d7 9d8d1e86 0d20313e 3630ccd6
Nov/06/2018 14:15:28 ipsec,debug ee5709a5 c1cfa91a e610f58b 7a214bb3 99716bd1 67fabfac 34152769 e3f92359
Nov/06/2018 14:15:28 ipsec,debug a8f5cf00 6ba57757 f7687151 4f5f7fbd 1ef196ed 074631dc 3925da1f 08547b24
Nov/06/2018 14:15:28 ipsec,debug 21bfd553 8c5536af 3f01c048 3782bced 69fff25b 2c18ce05 805fe95f 3e5e3add
Nov/06/2018 14:15:28 ipsec initiator selector: [strongSwan IP]
Nov/06/2018 14:15:28 ipsec adding payload: TS_I
Nov/06/2018 14:15:28 ipsec,debug => (size 0x18)
Nov/06/2018 14:15:28 ipsec,debug 00000018 01000000 07000010 0000ffff 0a6cf304 0a6cf304
Nov/06/2018 14:15:28 ipsec responder selector: [RouterOS Network IP]/16
Nov/06/2018 14:15:28 ipsec adding payload: TS_R
Nov/06/2018 14:15:28 ipsec,debug => (size 0x18)
Nov/06/2018 14:15:28 ipsec,debug 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/06/2018 14:15:28 ipsec adding payload: SA
Nov/06/2018 14:15:28 ipsec,debug => (size 0x34)
Nov/06/2018 14:15:28 ipsec,debug 00000034 00000030 01030404 0f10d015 0300000c 0100000d 800e0100 03000008
Nov/06/2018 14:15:28 ipsec,debug 0300000c 03000008 04000010 00000008 05000000
Nov/06/2018 14:15:28 ipsec <- ike2 reply, exchange: INFORMATIONAL:3 [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec,debug,packet => outgoing plain packet (size 0x2a4)
Nov/06/2018 14:15:28 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 28202520 00000003 000002a4 2200001c
Nov/06/2018 14:15:28 ipsec,debug,packet 72f78157 4ac15077 cbf24a07 edb3c5ab 0e435972 743cf1a5 2c000208 00100000
Nov/06/2018 14:15:28 ipsec,debug,packet 5f25c5dc 4923d261 32cc250c 50285b17 9191bbd7 65eaa88e 61b45d1b 37163366
Nov/06/2018 14:15:28 ipsec,debug,packet d937f68d 9899c305 c1f5f8bb f9ab8b3b fe28830d ad70df46 b0521b0d efba31d3
Nov/06/2018 14:15:28 ipsec,debug,packet 85516a55 6a48f2fa ec98503b 6f533504 956af7cc c385b326 b6282c67 7b596b56
Nov/06/2018 14:15:28 ipsec,debug,packet 04878fd0 1e1d2ddf f7859fee 3c328b14 2a0c77b4 444831f6 6551c4cb b079b1f8
Nov/06/2018 14:15:28 ipsec,debug,packet 82ce3391 5f1ed323 542dc7d7 9d8d1e86 0d20313e 3630ccd6 ee5709a5 c1cfa91a
Nov/06/2018 14:15:28 ipsec,debug,packet e610f58b 7a214bb3 99716bd1 67fabfac 34152769 e3f92359 a8f5cf00 6ba57757
Nov/06/2018 14:15:28 ipsec,debug,packet 
Nov/06/2018 14:15:28 ipsec,debug,packet f7687151 4f5f7fbd 1ef196ed 074631dc 3925da1f 08547b24 21bfd553 8c5536af
Nov/06/2018 14:15:28 ipsec,debug,packet 3f01c048 3782bced 69fff25b 2c18ce05 805fe95f 3e5e3add 57b00816 4dfff1b4
Nov/06/2018 14:15:28 ipsec,debug,packet 8ce62442 00bc3df9 0096c304 583f1bdc e710b6f2 548e104e 8b3a2fc2 c6d0c670
Nov/06/2018 14:15:28 ipsec,debug,packet 812d31b5 5b2695e9 2b1a0380 d90f14d3 f04aade7 993460ca 18643f91 f9bacb6d
Nov/06/2018 14:15:28 ipsec,debug,packet 9685d6b6 755f3576 ee0b24db d93fde54 e2be20c2 ef688e7e 7dbf0ee4 33880704
Nov/06/2018 14:15:28 ipsec,debug,packet f075901c b6b01988 33691e9c f97cac29 573cdcf3 62dbef8a 461633ac ef370305
Nov/06/2018 14:15:28 ipsec,debug,packet 790cb20c faff7107 54d06b8b ef79803c 236624e7 9c164501 e21ca9de 9845295d
Nov/06/2018 14:15:28 ipsec,debug,packet 1fdae8b6 3a32c50e 2b3911f7 166c822d f66e82f8 5612b8ee c0726418 603dd902
Nov/06/2018 14:15:28 ipsec,debug,packet 
Nov/06/2018 14:15:28 ipsec,debug,packet a2170e5c f19bdc94 2e3d3870 c385d974 a425fc53 d7ab92f1 8de4f8a9 5e7dfaa6
Nov/06/2018 14:15:28 ipsec,debug,packet ee1a3248 642a4c74 84e0e6f4 4c7ac490 b5e6fc02 1ec2e87b 9b92e97d 96c3f948
Nov/06/2018 14:15:28 ipsec,debug,packet 2d000018 01000000 07000010 0000ffff 0a6cf304 0a6cf304 21000018 01000000
Nov/06/2018 14:15:28 ipsec,debug,packet 07000010 0000ffff 0a6d0000 0a6dffff 00000034 00000030 01030404 0f10d015
Nov/06/2018 14:15:28 ipsec,debug,packet 0300000c 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008
Nov/06/2018 14:15:28 ipsec,debug,packet 05000000
Nov/06/2018 14:15:28 ipsec adding payload: ENC
Nov/06/2018 14:15:28 ipsec,debug => (first 0x100 of 0x2c4)
Nov/06/2018 14:15:28 ipsec,debug 280002c4 9c4eadab 87f65a0b f6e0d928 477eebbf 01d2ae5b e45deab6 ee8cdfb2
Nov/06/2018 14:15:28 ipsec,debug c264c4dc 0fee41b2 a2d319ff f23339e2 c134b921 90b98601 e1b592ca 79cbe08f
Nov/06/2018 14:15:28 ipsec,debug 62c34d06 6c9f0ec4 8b2ccb26 9d19dab9 98713ae2 6219702a e22024f0 9153c8f9
Nov/06/2018 14:15:28 ipsec,debug 251a7379 8a777a8b fd446754 41f108d8 8f3a1057 465bda09 d94dd5f5 a163827b
Nov/06/2018 14:15:28 ipsec,debug a4f55e7a 0e180421 60fccfc9 37d301a4 79506075 b0720ef7 9234012b b019bb67
Nov/06/2018 14:15:28 ipsec,debug 39f0e0e5 1f79c433 ca4ef107 32fa2628 f05ca22d ed9f5aee 9b77569e ce6ddc0f
Nov/06/2018 14:15:28 ipsec,debug ed5ae238 d0e9384d 96ad7b82 3e269fc0 1609dc4b a21901f6 88dd353e 22868ed7
Nov/06/2018 14:15:28 ipsec,debug 42a2cf3c 169e0b39 3ab06ccd cf0ff7f5 6de50628 c08bea03 924566df c2206658
Nov/06/2018 14:15:28 ipsec,debug ===== sending 736 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec,debug 1 times of 736 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202520 00000003 000002e0 280002c4
Nov/06/2018 14:15:28 ipsec,debug,packet 9c4eadab 87f65a0b f6e0d928 477eebbf 01d2ae5b e45deab6 ee8cdfb2 c264c4dc
Nov/06/2018 14:15:28 ipsec,debug,packet 0fee41b2 a2d319ff f23339e2 c134b921 90b98601 e1b592ca 79cbe08f 62c34d06
Nov/06/2018 14:15:28 ipsec,debug,packet 6c9f0ec4 8b2ccb26 9d19dab9 98713ae2 6219702a e22024f0 9153c8f9 251a7379
Nov/06/2018 14:15:28 ipsec,debug,packet 8a777a8b fd446754 41f108d8 8f3a1057 465bda09 d94dd5f5 a163827b a4f55e7a
Nov/06/2018 14:15:28 ipsec,debug,packet 0e180421 60fccfc9 37d301a4 79506075 b0720ef7 9234012b b019bb67 39f0e0e5
Nov/06/2018 14:15:28 ipsec,debug,packet 1f79c433 ca4ef107 32fa2628 f05ca22d ed9f5aee 9b77569e ce6ddc0f ed5ae238
Nov/06/2018 14:15:28 ipsec,debug,packet d0e9384d 96ad7b82 3e269fc0 1609dc4b a21901f6 88dd353e 22868ed7 42a2cf3c
Nov/06/2018 14:15:28 ipsec,debug,packet 169e0b39 3ab06ccd cf0ff7f5 6de50628 c08bea03 924566df c2206658 b971727a
Nov/06/2018 14:15:28 ipsec,debug,packet 3fb0fe3f 4810599d 8c4fdf74 4057d6b6 a931d36d b98dded6 b92274a2 80016356
Nov/06/2018 14:15:28 ipsec,debug,packet d5a06342 077a4589 42a69ea8 7c6d54e9 9e310f82 2f76bc1a 06e4506b 10dd0d6a
Nov/06/2018 14:15:28 ipsec,debug,packet 5a15526e 508af964 fd041f60 333a0fbb f39c5f65 dd4a347b f16a1929 90a94303
Nov/06/2018 14:15:28 ipsec,debug,packet b5b894f6 67c396f4 ec8f62a3 95884f0a 5173ba21 eef0f7f9 d234523d 9397d1c4
Nov/06/2018 14:15:28 ipsec,debug,packet 7cd11262 4763c3a1 293f9941 4f21659d 6537358b 048df2c8 eb39286c 5768953f
Nov/06/2018 14:15:28 ipsec,debug,packet 7749c7fd 6ca07766 fd3737dc cb9465c2 fecbdf9d d71b81da b2131474 356e66e0
Nov/06/2018 14:15:28 ipsec,debug,packet d06bc6b6 6b3ad778 b16cb537 b737527b b3a5777e 07a46460 19b38dfe 67cbad76
Nov/06/2018 14:15:28 ipsec,debug,packet 0862f5a8 2455d042 40e800c0 20dc3d68 57483ba6 2ce69e28 bc55d5b5 0a8687f5
Nov/06/2018 14:15:28 ipsec,debug,packet 0659ad8e bbde8948 a0b2ce22 ae06d11f 33f176c5 8af25826 6c5db06a e405e831
Nov/06/2018 14:15:28 ipsec,debug,packet 29f79064 187c0756 264dfbd4 c117f516 d5210746 086813ac 5adb82bf eff36119
Nov/06/2018 14:15:28 ipsec,debug,packet 56ea78da 36a6feba 8dd958ef 054067cc 30242a11 f9eff480 4882fac7 606d4e2b
Nov/06/2018 14:15:28 ipsec,debug,packet 179e50de 65d1b55d 840aa57b 9d5328b9 df8bfb61 1ea78159 96b06561 cc8c390c
Nov/06/2018 14:15:28 ipsec,debug,packet 4982d265 0a81c077 86d649f5 a967809f a190f2d4 e23558a8 0e8f5391 d59a5891
Nov/06/2018 14:15:28 ipsec,debug,packet 1b0bc695 6e26b75d dccec1be 9f8d60f7 24e6bc3f 51c74c7b 13229ffb 33a60ed6
Nov/06/2018 14:15:28 ipsec,debug => child keymat (size 0xa0)
Nov/06/2018 14:15:28 ipsec,debug 4efadfc8 848c6c10 6d62e81c 6d5ad206 1ecde203 ac89da4f f42d6dee 823a5738
Nov/06/2018 14:15:28 ipsec,debug 89425b99 a4d0aee2 554e0467 beeb685d 48a58ef4 0d794689 e175f867 9aee4716
Nov/06/2018 14:15:28 ipsec,debug ba701115 df2af0a3 2691df21 558bf081 6cbcab16 0afb7057 6b552b18 0086f2ce
Nov/06/2018 14:15:28 ipsec,debug 5aa2a3c8 95dd5453 99480ab6 58d604f8 81612edc 393345d1 ca5cf2bb 3ffd883b
Nov/06/2018 14:15:28 ipsec,debug 1299e2e7 385b64d4 dc80edd9 89412949 d1b82adb e9b4f76f 879c1feb d2563a03
Nov/06/2018 14:15:28 ipsec IPsec-SA established: [strongSwan IP][500]->[RouterOS IP][500] spi=0xf10d015
Nov/06/2018 14:15:28 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:15:28 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202408 00000004 000002e0 290002c4
Nov/06/2018 14:15:28 ipsec,debug,packet 56bb4017 0a39c19d 80112a20 ee05217a 54577ff4 8224ce33 3910bcce d9271f6a
Nov/06/2018 14:15:28 ipsec,debug,packet 9d2ab09f 29c3dcf4 c3c7ae57 e14a659c 7b20b942 e1cdd92f ef97c1a0 bd113e66
Nov/06/2018 14:15:28 ipsec,debug,packet 9c6130a2 1c0fa717 2789ac70 dcadb93e 8d821b28 968c8802 903182fb 3c07502b
Nov/06/2018 14:15:28 ipsec,debug,packet 5ee7a526 2b77634f 4c4585b4 2c1f717e c8e0cf70 2427d57f dd805b27 d94c32f1
Nov/06/2018 14:15:28 ipsec,debug,packet f5706646 f91c9261 ac0833a3 37a96617 ce0466b4 9fbd35aa 9a7b66c5 5a669f03
Nov/06/2018 14:15:28 ipsec,debug,packet e70340ce 2c33ceec a3f56c74 fb502d4c 68ed3172 e760da10 307dfe04 20242e9b
Nov/06/2018 14:15:28 ipsec,debug,packet 0ca33ecd b6bf73f1 43d0fb2e a0e26307 e957f9ee 49837c98 df11f155 1e78bc3d
Nov/06/2018 14:15:28 ipsec,debug,packet b9638697 63b384c5 1b608e99 d16be566 7b028ed5 e1120e62 751ba455 5f9ca23c
Nov/06/2018 14:15:28 ipsec,debug,packet 2c2e12b1 96705bd6 11ecdb19 26a05b9d 3d640544 a0ca584f 1a210388 2ea94e97
Nov/06/2018 14:15:28 ipsec,debug,packet 290a1c9e d8fc4e7a ab52ec44 210e77df 0c6ab50e 4faa06ee 564713fd ce91e544
Nov/06/2018 14:15:28 ipsec,debug,packet e5ec64f1 321b533b 2f54ee18 dc394605 0f27b193 dda2ab54 bca38d64 c829df10
Nov/06/2018 14:15:28 ipsec,debug,packet bbfab2ad 3ead03f4 f7a75dc5 a99b1a63 22b35525 76f5b1a6 a189ca13 862e7d5b
Nov/06/2018 14:15:28 ipsec,debug,packet 1ef64185 c95d2488 b37fac06 3844d82b 20ea93e9 52b4b53e e0d9fd98 18158152
Nov/06/2018 14:15:28 ipsec,debug,packet 5e4c8a1c 5498efe6 9b303092 e4a98bd4 69f930ba 67576c9e 653f09ff 0f7fe46a
Nov/06/2018 14:15:28 ipsec,debug,packet 3f97c61e 660c4b1c 57f6e586 4dffd559 7cd84971 18458ef7 1900fb5d c07bc43e
Nov/06/2018 14:15:28 ipsec,debug,packet 7514bc0b 0361383d f8905dfe 4a54b10a baefc7e6 b511900c ae1e9101 19432b7a
Nov/06/2018 14:15:28 ipsec,debug,packet 137f13fa 2f4e8ddd 81cadfaf be27423c d750f33e e88e04c6 0277c146 5d98303c
Nov/06/2018 14:15:28 ipsec,debug,packet 6d20e22e 413f0657 7162579e c86b9ab6 a2ece96f 945ca5b7 0140e759 5680d35a
Nov/06/2018 14:15:28 ipsec,debug,packet 47bc426e 5fbe011d d96a2659 1681929e 17ecbe8b e81c50c3 139bacdd fb1fd5f3
Nov/06/2018 14:15:28 ipsec,debug,packet 91ed5903 6915a031 7b16a451 ac39febd 035097d8 8ce85452 9f3f44f9 dc4de89c
Nov/06/2018 14:15:28 ipsec,debug,packet e7585497 dbd00863 bd7c52dd 00c2c74d c97cd5bf a136c81f 9d58caf6 2b959256
Nov/06/2018 14:15:28 ipsec,debug,packet 8ec366fb 1f60dace 0c38baf5 889efc27 9c4eadab 87f65a0b f6e0d928 477eebbf
Nov/06/2018 14:15:28 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:4 [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec reply retransmission
Nov/06/2018 14:15:28 ipsec,debug ===== sending 736 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec,debug 1 times of 736 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:15:28 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202520 00000003 000002e0 280002c4
Nov/06/2018 14:15:28 ipsec,debug,packet 9c4eadab 87f65a0b f6e0d928 477eebbf 01d2ae5b e45deab6 ee8cdfb2 c264c4dc
Nov/06/2018 14:15:28 ipsec,debug,packet 0fee41b2 a2d319ff f23339e2 c134b921 90b98601 e1b592ca 79cbe08f 62c34d06
Nov/06/2018 14:15:28 ipsec,debug,packet 6c9f0ec4 8b2ccb26 9d19dab9 98713ae2 6219702a e22024f0 9153c8f9 251a7379
Nov/06/2018 14:15:28 ipsec,debug,packet 8a777a8b fd446754 41f108d8 8f3a1057 465bda09 d94dd5f5 a163827b a4f55e7a
Nov/06/2018 14:15:28 ipsec,debug,packet 0e180421 60fccfc9 37d301a4 79506075 b0720ef7 9234012b b019bb67 39f0e0e5
Nov/06/2018 14:15:28 ipsec,debug,packet 1f79c433 ca4ef107 32fa2628 f05ca22d ed9f5aee 9b77569e ce6ddc0f ed5ae238
Nov/06/2018 14:15:28 ipsec,debug,packet d0e9384d 96ad7b82 3e269fc0 1609dc4b a21901f6 88dd353e 22868ed7 42a2cf3c
Nov/06/2018 14:15:28 ipsec,debug,packet 169e0b39 3ab06ccd cf0ff7f5 6de50628 c08bea03 924566df c2206658 b971727a
Nov/06/2018 14:15:28 ipsec,debug,packet 3fb0fe3f 4810599d 8c4fdf74 4057d6b6 a931d36d b98dded6 b92274a2 80016356
Nov/06/2018 14:15:28 ipsec,debug,packet d5a06342 077a4589 42a69ea8 7c6d54e9 9e310f82 2f76bc1a 06e4506b 10dd0d6a
Nov/06/2018 14:15:28 ipsec,debug,packet 5a15526e 508af964 fd041f60 333a0fbb f39c5f65 dd4a347b f16a1929 90a94303
Nov/06/2018 14:15:28 ipsec,debug,packet b5b894f6 67c396f4 ec8f62a3 95884f0a 5173ba21 eef0f7f9 d234523d 9397d1c4
Nov/06/2018 14:15:28 ipsec,debug,packet 7cd11262 4763c3a1 293f9941 4f21659d 6537358b 048df2c8 eb39286c 5768953f
Nov/06/2018 14:15:28 ipsec,debug,packet 7749c7fd 6ca07766 fd3737dc cb9465c2 fecbdf9d d71b81da b2131474 356e66e0
Nov/06/2018 14:15:28 ipsec,debug,packet d06bc6b6 6b3ad778 b16cb537 b737527b b3a5777e 07a46460 19b38dfe 67cbad76
Nov/06/2018 14:15:28 ipsec,debug,packet 0862f5a8 2455d042 40e800c0 20dc3d68 57483ba6 2ce69e28 bc55d5b5 0a8687f5
Nov/06/2018 14:15:28 ipsec,debug,packet 0659ad8e bbde8948 a0b2ce22 ae06d11f 33f176c5 8af25826 6c5db06a e405e831
Nov/06/2018 14:15:28 ipsec,debug,packet 29f79064 187c0756 264dfbd4 c117f516 d5210746 086813ac 5adb82bf eff36119
Nov/06/2018 14:15:28 ipsec,debug,packet 56ea78da 36a6feba 8dd958ef 054067cc 30242a11 f9eff480 4882fac7 606d4e2b
Nov/06/2018 14:15:28 ipsec,debug,packet 179e50de 65d1b55d 840aa57b 9d5328b9 df8bfb61 1ea78159 96b06561 cc8c390c
Nov/06/2018 14:15:28 ipsec,debug,packet 4982d265 0a81c077 86d649f5 a967809f a190f2d4 e23558a8 0e8f5391 d59a5891
Nov/06/2018 14:15:28 ipsec,debug,packet 1b0bc695 6e26b75d dccec1be 9f8d60f7 24e6bc3f 51c74c7b 13229ffb 33a60ed6
Nov/06/2018 14:15:32 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:15:32 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202408 00000004 000002e0 290002c4
Nov/06/2018 14:15:32 ipsec,debug,packet 56bb4017 0a39c19d 80112a20 ee05217a 54577ff4 8224ce33 3910bcce d9271f6a
Nov/06/2018 14:15:32 ipsec,debug,packet 9d2ab09f 29c3dcf4 c3c7ae57 e14a659c 7b20b942 e1cdd92f ef97c1a0 bd113e66
Nov/06/2018 14:15:32 ipsec,debug,packet 9c6130a2 1c0fa717 2789ac70 dcadb93e 8d821b28 968c8802 903182fb 3c07502b
Nov/06/2018 14:15:32 ipsec,debug,packet 5ee7a526 2b77634f 4c4585b4 2c1f717e c8e0cf70 2427d57f dd805b27 d94c32f1
Nov/06/2018 14:15:32 ipsec,debug,packet f5706646 f91c9261 ac0833a3 37a96617 ce0466b4 9fbd35aa 9a7b66c5 5a669f03
Nov/06/2018 14:15:32 ipsec,debug,packet e70340ce 2c33ceec a3f56c74 fb502d4c 68ed3172 e760da10 307dfe04 20242e9b
Nov/06/2018 14:15:32 ipsec,debug,packet 0ca33ecd b6bf73f1 43d0fb2e a0e26307 e957f9ee 49837c98 df11f155 1e78bc3d
Nov/06/2018 14:15:32 ipsec,debug,packet b9638697 63b384c5 1b608e99 d16be566 7b028ed5 e1120e62 751ba455 5f9ca23c
Nov/06/2018 14:15:32 ipsec,debug,packet 2c2e12b1 96705bd6 11ecdb19 26a05b9d 3d640544 a0ca584f 1a210388 2ea94e97
Nov/06/2018 14:15:32 ipsec,debug,packet 290a1c9e d8fc4e7a ab52ec44 210e77df 0c6ab50e 4faa06ee 564713fd ce91e544
Nov/06/2018 14:15:32 ipsec,debug,packet e5ec64f1 321b533b 2f54ee18 dc394605 0f27b193 dda2ab54 bca38d64 c829df10
Nov/06/2018 14:15:32 ipsec,debug,packet bbfab2ad 3ead03f4 f7a75dc5 a99b1a63 22b35525 76f5b1a6 a189ca13 862e7d5b
Nov/06/2018 14:15:32 ipsec,debug,packet 1ef64185 c95d2488 b37fac06 3844d82b 20ea93e9 52b4b53e e0d9fd98 18158152
Nov/06/2018 14:15:32 ipsec,debug,packet 5e4c8a1c 5498efe6 9b303092 e4a98bd4 69f930ba 67576c9e 653f09ff 0f7fe46a
Nov/06/2018 14:15:32 ipsec,debug,packet 3f97c61e 660c4b1c 57f6e586 4dffd559 7cd84971 18458ef7 1900fb5d c07bc43e
Nov/06/2018 14:15:32 ipsec,debug,packet 7514bc0b 0361383d f8905dfe 4a54b10a baefc7e6 b511900c ae1e9101 19432b7a
Nov/06/2018 14:15:32 ipsec,debug,packet 137f13fa 2f4e8ddd 81cadfaf be27423c d750f33e e88e04c6 0277c146 5d98303c
Nov/06/2018 14:15:32 ipsec,debug,packet 6d20e22e 413f0657 7162579e c86b9ab6 a2ece96f 945ca5b7 0140e759 5680d35a
Nov/06/2018 14:15:32 ipsec,debug,packet 47bc426e 5fbe011d d96a2659 1681929e 17ecbe8b e81c50c3 139bacdd fb1fd5f3
Nov/06/2018 14:15:32 ipsec,debug,packet 91ed5903 6915a031 7b16a451 ac39febd 035097d8 8ce85452 9f3f44f9 dc4de89c
Nov/06/2018 14:15:32 ipsec,debug,packet e7585497 dbd00863 bd7c52dd 00c2c74d c97cd5bf a136c81f 9d58caf6 2b959256
Nov/06/2018 14:15:32 ipsec,debug,packet 8ec366fb 1f60dace 0c38baf5 889efc27 9c4eadab 87f65a0b f6e0d928 477eebbf
Nov/06/2018 14:15:32 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:4 [strongSwan IP][500]
Nov/06/2018 14:15:32 ipsec reply retransmission
Nov/06/2018 14:15:32 ipsec,debug ===== sending 736 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:15:32 ipsec,debug 1 times of 736 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:15:32 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202520 00000003 000002e0 280002c4
Nov/06/2018 14:15:32 ipsec,debug,packet 9c4eadab 87f65a0b f6e0d928 477eebbf 01d2ae5b e45deab6 ee8cdfb2 c264c4dc
Nov/06/2018 14:15:32 ipsec,debug,packet 0fee41b2 a2d319ff f23339e2 c134b921 90b98601 e1b592ca 79cbe08f 62c34d06
Nov/06/2018 14:15:32 ipsec,debug,packet 6c9f0ec4 8b2ccb26 9d19dab9 98713ae2 6219702a e22024f0 9153c8f9 251a7379
Nov/06/2018 14:15:32 ipsec,debug,packet 8a777a8b fd446754 41f108d8 8f3a1057 465bda09 d94dd5f5 a163827b a4f55e7a
Nov/06/2018 14:15:32 ipsec,debug,packet 0e180421 60fccfc9 37d301a4 79506075 b0720ef7 9234012b b019bb67 39f0e0e5
Nov/06/2018 14:15:32 ipsec,debug,packet 1f79c433 ca4ef107 32fa2628 f05ca22d ed9f5aee 9b77569e ce6ddc0f ed5ae238
Nov/06/2018 14:15:32 ipsec,debug,packet d0e9384d 96ad7b82 3e269fc0 1609dc4b a21901f6 88dd353e 22868ed7 42a2cf3c
Nov/06/2018 14:15:32 ipsec,debug,packet 169e0b39 3ab06ccd cf0ff7f5 6de50628 c08bea03 924566df c2206658 b971727a
Nov/06/2018 14:15:32 ipsec,debug,packet 3fb0fe3f 4810599d 8c4fdf74 4057d6b6 a931d36d b98dded6 b92274a2 80016356
Nov/06/2018 14:15:32 ipsec,debug,packet d5a06342 077a4589 42a69ea8 7c6d54e9 9e310f82 2f76bc1a 06e4506b 10dd0d6a
Nov/06/2018 14:15:32 ipsec,debug,packet 5a15526e 508af964 fd041f60 333a0fbb f39c5f65 dd4a347b f16a1929 90a94303
Nov/06/2018 14:15:32 ipsec,debug,packet b5b894f6 67c396f4 ec8f62a3 95884f0a 5173ba21 eef0f7f9 d234523d 9397d1c4
Nov/06/2018 14:15:32 ipsec,debug,packet 7cd11262 4763c3a1 293f9941 4f21659d 6537358b 048df2c8 eb39286c 5768953f
Nov/06/2018 14:15:32 ipsec,debug,packet 7749c7fd 6ca07766 fd3737dc cb9465c2 fecbdf9d d71b81da b2131474 356e66e0
Nov/06/2018 14:15:32 ipsec,debug,packet d06bc6b6 6b3ad778 b16cb537 b737527b b3a5777e 07a46460 19b38dfe 67cbad76
Nov/06/2018 14:15:32 ipsec,debug,packet 0862f5a8 2455d042 40e800c0 20dc3d68 57483ba6 2ce69e28 bc55d5b5 0a8687f5
Nov/06/2018 14:15:32 ipsec,debug,packet 0659ad8e bbde8948 a0b2ce22 ae06d11f 33f176c5 8af25826 6c5db06a e405e831
Nov/06/2018 14:15:32 ipsec,debug,packet 29f79064 187c0756 264dfbd4 c117f516 d5210746 086813ac 5adb82bf eff36119
Nov/06/2018 14:15:32 ipsec,debug,packet 56ea78da 36a6feba 8dd958ef 054067cc 30242a11 f9eff480 4882fac7 606d4e2b
Nov/06/2018 14:15:32 ipsec,debug,packet 179e50de 65d1b55d 840aa57b 9d5328b9 df8bfb61 1ea78159 96b06561 cc8c390c
Nov/06/2018 14:15:32 ipsec,debug,packet 4982d265 0a81c077 86d649f5 a967809f a190f2d4 e23558a8 0e8f5391 d59a5891
Nov/06/2018 14:15:32 ipsec,debug,packet 1b0bc695 6e26b75d dccec1be 9f8d60f7 24e6bc3f 51c74c7b 13229ffb 33a60ed6
Nov/06/2018 14:15:33 ipsec IPsec-SA established: [RouterOS IP][500]->[strongSwan IP][500] spi=0xc7b66943
Nov/06/2018 14:15:45 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:15:45 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202408 00000004 000002e0 290002c4
Nov/06/2018 14:15:45 ipsec,debug,packet 56bb4017 0a39c19d 80112a20 ee05217a 54577ff4 8224ce33 3910bcce d9271f6a
Nov/06/2018 14:15:45 ipsec,debug,packet 9d2ab09f 29c3dcf4 c3c7ae57 e14a659c 7b20b942 e1cdd92f ef97c1a0 bd113e66
Nov/06/2018 14:15:45 ipsec,debug,packet 9c6130a2 1c0fa717 2789ac70 dcadb93e 8d821b28 968c8802 903182fb 3c07502b
Nov/06/2018 14:15:45 ipsec,debug,packet 5ee7a526 2b77634f 4c4585b4 2c1f717e c8e0cf70 2427d57f dd805b27 d94c32f1
Nov/06/2018 14:15:45 ipsec,debug,packet f5706646 f91c9261 ac0833a3 37a96617 ce0466b4 9fbd35aa 9a7b66c5 5a669f03
Nov/06/2018 14:15:45 ipsec,debug,packet e70340ce 2c33ceec a3f56c74 fb502d4c 68ed3172 e760da10 307dfe04 20242e9b
Nov/06/2018 14:15:45 ipsec,debug,packet 0ca33ecd b6bf73f1 43d0fb2e a0e26307 e957f9ee 49837c98 df11f155 1e78bc3d
Nov/06/2018 14:15:45 ipsec,debug,packet b9638697 63b384c5 1b608e99 d16be566 7b028ed5 e1120e62 751ba455 5f9ca23c
Nov/06/2018 14:15:45 ipsec,debug,packet 2c2e12b1 96705bd6 11ecdb19 26a05b9d 3d640544 a0ca584f 1a210388 2ea94e97
Nov/06/2018 14:15:45 ipsec,debug,packet 290a1c9e d8fc4e7a ab52ec44 210e77df 0c6ab50e 4faa06ee 564713fd ce91e544
Nov/06/2018 14:15:45 ipsec,debug,packet e5ec64f1 321b533b 2f54ee18 dc394605 0f27b193 dda2ab54 bca38d64 c829df10
Nov/06/2018 14:15:45 ipsec,debug,packet bbfab2ad 3ead03f4 f7a75dc5 a99b1a63 22b35525 76f5b1a6 a189ca13 862e7d5b
Nov/06/2018 14:15:45 ipsec,debug,packet 1ef64185 c95d2488 b37fac06 3844d82b 20ea93e9 52b4b53e e0d9fd98 18158152
Nov/06/2018 14:15:45 ipsec,debug,packet 5e4c8a1c 5498efe6 9b303092 e4a98bd4 69f930ba 67576c9e 653f09ff 0f7fe46a
Nov/06/2018 14:15:45 ipsec,debug,packet 3f97c61e 660c4b1c 57f6e586 4dffd559 7cd84971 18458ef7 1900fb5d c07bc43e
Nov/06/2018 14:15:45 ipsec,debug,packet 7514bc0b 0361383d f8905dfe 4a54b10a baefc7e6 b511900c ae1e9101 19432b7a
Nov/06/2018 14:15:45 ipsec,debug,packet 137f13fa 2f4e8ddd 81cadfaf be27423c d750f33e e88e04c6 0277c146 5d98303c
Nov/06/2018 14:15:45 ipsec,debug,packet 6d20e22e 413f0657 7162579e c86b9ab6 a2ece96f 945ca5b7 0140e759 5680d35a
Nov/06/2018 14:15:45 ipsec,debug,packet 47bc426e 5fbe011d d96a2659 1681929e 17ecbe8b e81c50c3 139bacdd fb1fd5f3
Nov/06/2018 14:15:45 ipsec,debug,packet 91ed5903 6915a031 7b16a451 ac39febd 035097d8 8ce85452 9f3f44f9 dc4de89c
Nov/06/2018 14:15:45 ipsec,debug,packet e7585497 dbd00863 bd7c52dd 00c2c74d c97cd5bf a136c81f 9d58caf6 2b959256
Nov/06/2018 14:15:45 ipsec,debug,packet 8ec366fb 1f60dace 0c38baf5 889efc27 9c4eadab 87f65a0b f6e0d928 477eebbf
Nov/06/2018 14:15:45 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:4 [strongSwan IP][500]
Nov/06/2018 14:15:45 ipsec reply retransmission
Nov/06/2018 14:15:45 ipsec,debug ===== sending 736 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:15:45 ipsec,debug 1 times of 736 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:15:45 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202520 00000003 000002e0 280002c4
Nov/06/2018 14:15:45 ipsec,debug,packet 9c4eadab 87f65a0b f6e0d928 477eebbf 01d2ae5b e45deab6 ee8cdfb2 c264c4dc
Nov/06/2018 14:15:45 ipsec,debug,packet 0fee41b2 a2d319ff f23339e2 c134b921 90b98601 e1b592ca 79cbe08f 62c34d06
Nov/06/2018 14:15:45 ipsec,debug,packet 6c9f0ec4 8b2ccb26 9d19dab9 98713ae2 6219702a e22024f0 9153c8f9 251a7379
Nov/06/2018 14:15:45 ipsec,debug,packet 8a777a8b fd446754 41f108d8 8f3a1057 465bda09 d94dd5f5 a163827b a4f55e7a
Nov/06/2018 14:15:45 ipsec,debug,packet 0e180421 60fccfc9 37d301a4 79506075 b0720ef7 9234012b b019bb67 39f0e0e5
Nov/06/2018 14:15:45 ipsec,debug,packet 1f79c433 ca4ef107 32fa2628 f05ca22d ed9f5aee 9b77569e ce6ddc0f ed5ae238
Nov/06/2018 14:15:45 ipsec,debug,packet d0e9384d 96ad7b82 3e269fc0 1609dc4b a21901f6 88dd353e 22868ed7 42a2cf3c
Nov/06/2018 14:15:45 ipsec,debug,packet 169e0b39 3ab06ccd cf0ff7f5 6de50628 c08bea03 924566df c2206658 b971727a
Nov/06/2018 14:15:45 ipsec,debug,packet 3fb0fe3f 4810599d 8c4fdf74 4057d6b6 a931d36d b98dded6 b92274a2 80016356
Nov/06/2018 14:15:45 ipsec,debug,packet d5a06342 077a4589 42a69ea8 7c6d54e9 9e310f82 2f76bc1a 06e4506b 10dd0d6a
Nov/06/2018 14:15:45 ipsec,debug,packet 5a15526e 508af964 fd041f60 333a0fbb f39c5f65 dd4a347b f16a1929 90a94303
Nov/06/2018 14:15:45 ipsec,debug,packet b5b894f6 67c396f4 ec8f62a3 95884f0a 5173ba21 eef0f7f9 d234523d 9397d1c4
Nov/06/2018 14:15:45 ipsec,debug,packet 7cd11262 4763c3a1 293f9941 4f21659d 6537358b 048df2c8 eb39286c 5768953f
Nov/06/2018 14:15:45 ipsec,debug,packet 7749c7fd 6ca07766 fd3737dc cb9465c2 fecbdf9d d71b81da b2131474 356e66e0
Nov/06/2018 14:15:45 ipsec,debug,packet d06bc6b6 6b3ad778 b16cb537 b737527b b3a5777e 07a46460 19b38dfe 67cbad76
Nov/06/2018 14:15:45 ipsec,debug,packet 0862f5a8 2455d042 40e800c0 20dc3d68 57483ba6 2ce69e28 bc55d5b5 0a8687f5
Nov/06/2018 14:15:45 ipsec,debug,packet 0659ad8e bbde8948 a0b2ce22 ae06d11f 33f176c5 8af25826 6c5db06a e405e831
Nov/06/2018 14:15:45 ipsec,debug,packet 29f79064 187c0756 264dfbd4 c117f516 d5210746 086813ac 5adb82bf eff36119
Nov/06/2018 14:15:45 ipsec,debug,packet 56ea78da 36a6feba 8dd958ef 054067cc 30242a11 f9eff480 4882fac7 606d4e2b
Nov/06/2018 14:15:45 ipsec,debug,packet 179e50de 65d1b55d 840aa57b 9d5328b9 df8bfb61 1ea78159 96b06561 cc8c390c
Nov/06/2018 14:15:45 ipsec,debug,packet 4982d265 0a81c077 86d649f5 a967809f a190f2d4 e23558a8 0e8f5391 d59a5891
Nov/06/2018 14:15:45 ipsec,debug,packet 1b0bc695 6e26b75d dccec1be 9f8d60f7 24e6bc3f 51c74c7b 13229ffb 33a60ed6
Nov/06/2018 14:15:51 ipsec sending dpd packet
Nov/06/2018 14:15:51 ipsec <- ike2 request, exchange: INFORMATIONAL:1 [strongSwan IP][500]
Nov/06/2018 14:15:51 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:15:51 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 00202500 00000001 0000001c
Nov/06/2018 14:15:51 ipsec adding payload: ENC
Nov/06/2018 14:15:51 ipsec,debug => (size 0x64)
Nov/06/2018 14:15:51 ipsec,debug 00000064 9c4eadab 87f65a0b f6e0d928 477eebbf a7a2cf3d 7badad40 dd36ff65
Nov/06/2018 14:15:51 ipsec,debug 1a1023c2 f356613d b473549f afe3c8bf 73a64bae 63ea9027 2883371b 957dbdbe
Nov/06/2018 14:15:51 ipsec,debug 7df8e06c 020c0752 60e6a618 3cccfb51 63260c1e 0000090d 07000008 0a6cf304
Nov/06/2018 14:15:51 ipsec,debug 08000008
Nov/06/2018 14:15:51 ipsec,debug ===== sending 128 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:15:51 ipsec,debug 1 times of 128 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:15:51 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202500 00000001 00000080 00000064
Nov/06/2018 14:15:51 ipsec,debug,packet 9c4eadab 87f65a0b f6e0d928 477eebbf a7a2cf3d 7badad40 dd36ff65 1a1023c2
Nov/06/2018 14:15:51 ipsec,debug,packet f356613d b473549f afe3c8bf 73a64bae 63ea9027 2883371b 957dbdbe 7df8e06c
Nov/06/2018 14:15:51 ipsec,debug,packet 020c0752 60e6a618 3cccfb51 63260c1e a62fe00f 5002265a 95424fb9 e62c2f07
Nov/06/2018 14:15:51 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:15:51 ipsec,debug,packet 09af1d1b 422c8f76 5b9f0d07 e25045b8 2e202528 00000001 00000050 00000034
Nov/06/2018 14:15:51 ipsec,debug,packet 324d1213 3101a695 1135579a f7b87d25 83212ad7 7bf555a4 70887fb6 8b5d1ab5
Nov/06/2018 14:15:51 ipsec,debug,packet 47bdf363 a8147716 6adcd55c 53a76eb8
Nov/06/2018 14:15:51 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 [strongSwan IP][500]
Nov/06/2018 14:15:51 ipsec payload seen: ENC
Nov/06/2018 14:15:51 ipsec processing payload: ENC
Nov/06/2018 14:15:51 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:15:51 ipsec,debug 324d1213 3101a695 1135579a f7b87d25
Nov/06/2018 14:15:51 ipsec,debug decrypted
Nov/06/2018 14:15:51 ipsec,debug,packet => decrypted packet (size 0x0)
Nov/06/2018 14:15:51 ipsec respond: info
Nov/06/2018 14:15:51 ipsec,debug reply ignored

After arround 14:51:51 no data goes through the ChildSA. Tried that by pinging the strongSwan IP from the RouterOS.

Kind regards,
Sebastian

Here log file where you can also see the ping problem.

Nov/06/2018 14:43:30 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:30 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:31 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:31 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:32 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:32 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:33 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:43:33 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:43:47 ipsec sending dpd packet
Nov/06/2018 14:43:47 ipsec <- ike2 request, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:43:47 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:43:47 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 00202500 00000000 0000001c
Nov/06/2018 14:43:47 ipsec adding payload: ENC
Nov/06/2018 14:43:47 ipsec,debug => (size 0x44)
Nov/06/2018 14:43:47 ipsec,debug 00000044 0c11d094 17151321 77ac35d4 c046cb61 737967ca 3c26169e bebed504
Nov/06/2018 14:43:47 ipsec,debug 61d89080 ad07d4b6 bc1456c6 492d1b29 fee03c72 35623737 65366665 30393937
Nov/06/2018 14:43:47 ipsec,debug 66353931
Nov/06/2018 14:43:47 ipsec,debug ===== sending 96 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:43:47 ipsec,debug 1 times of 96 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:43:47 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000000 00000060 00000044
Nov/06/2018 14:43:47 ipsec,debug,packet 0c11d094 17151321 77ac35d4 c046cb61 737967ca 3c26169e bebed504 61d89080
Nov/06/2018 14:43:47 ipsec,debug,packet ad07d4b6 bc1456c6 492d1b29 fee03c72 09225de1 70c1b6be b3d9cc50 cfe44912
Nov/06/2018 14:43:52 ipsec dpd: retransmit
Nov/06/2018 14:43:52 ipsec,debug ===== sending 96 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:43:52 ipsec,debug 1 times of 96 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:43:52 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000000 00000060 00000044
Nov/06/2018 14:43:52 ipsec,debug,packet 0c11d094 17151321 77ac35d4 c046cb61 737967ca 3c26169e bebed504 61d89080
Nov/06/2018 14:43:52 ipsec,debug,packet ad07d4b6 bc1456c6 492d1b29 fee03c72 09225de1 70c1b6be b3d9cc50 cfe44912
Nov/06/2018 14:43:55 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:43:55 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:43:55 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:43:55 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:43:55 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:43:55 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:43:55 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:43:55 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:43:55 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:43:55 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:43:55 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:43:55 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:43:55 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:43:55 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:43:55 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:43:55 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:43:55 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:43:55 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:43:55 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:43:55 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:43:55 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:43:55 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:43:55 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:43:55 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:43:55 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:43:55 ipsec payload seen: ENC
Nov/06/2018 14:43:55 ipsec processing payload: ENC
Nov/06/2018 14:43:55 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:43:55 ipsec,debug 97e84f2e 0af2f774 6e12b3b4 eb32c60f
Nov/06/2018 14:43:55 ipsec,debug decrypted
Nov/06/2018 14:43:55 ipsec,debug,packet => decrypted packet (size 0x29c)
Nov/06/2018 14:43:55 ipsec,debug,packet 2100000c 03044009 c645ee37 28000034 00000030 01030404 cb1e31d6 0300000c
Nov/06/2018 14:43:55 ipsec,debug,packet 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008 05000000
Nov/06/2018 14:43:55 ipsec,debug,packet 22000024 c102bdb3 9962fa66 8ec4a8c7 952d0cd7 03ec82ac 6e410174 83027dcf
Nov/06/2018 14:43:55 ipsec,debug,packet a7a6d34e 2c000208 00100000 c2788fec 02f8a00e 7e3c6ce2 a1b525c0 de8ef8cb
Nov/06/2018 14:43:55 ipsec,debug,packet cb76756f bc67f37b 60f1a7d2 5eedc01b bf158a3d 19808511 e98d238f 13a5e83b
Nov/06/2018 14:43:55 ipsec,debug,packet a8005860 691838f2 c8e1e329 edb604bb f38cb1e6 ffbb7afe 2e9cfd11 ba9b086e
Nov/06/2018 14:43:55 ipsec,debug,packet ebaac1f1 49252417 bfebf641 bec5e2f7 7a15dfac 42ce11cd eee3e63a 28134fe2
Nov/06/2018 14:43:55 ipsec,debug,packet 786081d0 7abf4993 9ea46a8a 443adc3c 6b01dfe8 62e66af1 05c3122e ebb7228b
Nov/06/2018 14:43:55 ipsec,debug,packet 
Nov/06/2018 14:43:55 ipsec,debug,packet b2886194 b1268196 102c6fae dae58d96 32c252af b852faf4 460b4c34 c70a7dc5
Nov/06/2018 14:43:55 ipsec,debug,packet 8b1c47e9 64ced230 6a7b66df 12cd4009 08ab5c96 4e6b8cea 3915a19c 72e0189a
Nov/06/2018 14:43:55 ipsec,debug,packet 5edcbcb7 6968ef94 6b6de0f3 98d0d8e1 c33672e5 f64a9470 2cd2ff90 3c24f270
Nov/06/2018 14:43:55 ipsec,debug,packet 2cb0678e 8b94c94a 4b83f537 2c1113f6 7b42a56c 6200d635 5190bb4e 2ce7bf0b
Nov/06/2018 14:43:55 ipsec,debug,packet b3bca3c7 95e70823 e1ee3255 767f8aa1 8dbc72af 1903b552 e969afca 08c2be56
Nov/06/2018 14:43:55 ipsec,debug,packet 0ca751ca 8cd1f8bb 9ad4009c 2fd081d5 6a247094 bb0a787b 1f2343b1 4c81592e
Nov/06/2018 14:43:55 ipsec,debug,packet e9114e60 df1083c8 0fef221d 65906a22 36bdea76 f22ce16f fd5f00ea 79d2f46b
Nov/06/2018 14:43:55 ipsec,debug,packet b0610e61 a674a98d d0a022a1 1e0bc30d 49333afa 9c4580d8 e63420ce 36bf19b6
Nov/06/2018 14:43:55 ipsec,debug,packet 
Nov/06/2018 14:43:55 ipsec,debug,packet 18dc129b 59b44aa1 ff2ec359 5540cc2a 6a17a5c2 ad9cfefb c075509e c77002f0
Nov/06/2018 14:43:55 ipsec,debug,packet 9ab5a7f2 2d1a40fc 2e23e0eb 7611cfd9 cebd059e 6a54c1b4 b76d254f 304aaded
Nov/06/2018 14:43:55 ipsec,debug,packet 089b83eb fd18c576 ded19128 bc4fc586 70a3c246 bb6bff4d 64910585 c43ee14e
Nov/06/2018 14:43:55 ipsec,debug,packet 27bba0dd bb60623b 1b8f33c0 2d000018 01000000 07000010 0000ffff 0a6cf304
Nov/06/2018 14:43:55 ipsec,debug,packet 0a6cf304 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/06/2018 14:43:55 ipsec payload seen: NOTIFY
Nov/06/2018 14:43:55 ipsec payload seen: SA
Nov/06/2018 14:43:55 ipsec payload seen: NONCE
Nov/06/2018 14:43:55 ipsec payload seen: KE
Nov/06/2018 14:43:55 ipsec payload seen: TS_I
Nov/06/2018 14:43:55 ipsec payload seen: TS_R
Nov/06/2018 14:43:55 ipsec request while waiting for dpd
Nov/06/2018 14:43:55 ipsec create child: respond
Nov/06/2018 14:43:55 ipsec processing payload: NONCE
Nov/06/2018 14:43:55 ipsec processing payloads: NOTIFY
Nov/06/2018 14:43:55 ipsec   notify: REKEY_SA
Nov/06/2018 14:43:55 ipsec rekeying child SA 0xc645ee37
Nov/06/2018 14:43:55 ipsec peer wants tunnel mode
Nov/06/2018 14:43:55 ipsec processing payload: TS_R
Nov/06/2018 14:43:55 ipsec [RouterOS Network IP]/16
Nov/06/2018 14:43:55 ipsec processing payload: TS_I
Nov/06/2018 14:43:55 ipsec [strongSwan IP]
Nov/06/2018 14:43:55 ipsec processing payload: SA
Nov/06/2018 14:43:55 ipsec IKE Protocol: ESP
Nov/06/2018 14:43:55 ipsec  proposal #1
Nov/06/2018 14:43:55 ipsec   enc: aes256-ctr
Nov/06/2018 14:43:55 ipsec   auth: sha256
Nov/06/2018 14:43:55 ipsec   dh: modp4096
Nov/06/2018 14:43:55 ipsec matched proposal:
Nov/06/2018 14:43:55 ipsec  proposal #1
Nov/06/2018 14:43:55 ipsec   enc: aes256-ctr
Nov/06/2018 14:43:55 ipsec   auth: sha256
Nov/06/2018 14:43:55 ipsec   dh: modp4096
Nov/06/2018 14:43:55 ipsec processing payload: KE
Nov/06/2018 14:44:02 ipsec,debug => shared secret (first 0x100 of 0x200)
Nov/06/2018 14:44:02 ipsec,debug 9e499270 95452374 fc93b3d7 85cb1a8e 35112ae3 b6f53df0 c11939b7 4e306ec7
Nov/06/2018 14:44:02 ipsec,debug e23697bf a5b15070 193a6234 4cdcb9db b60edbbb 8e012a60 c61aa3dc 1987b468
Nov/06/2018 14:44:02 ipsec,debug 23ae0635 b8612211 033441e2 f1fd4857 f54c664e d0b69ff5 600f6fb0 2eee3c1f
Nov/06/2018 14:44:02 ipsec,debug 83d86257 b0226305 cc2f46d8 7c936ce0 e03e153a 0b3aa9a0 71c9f1e4 b0d9bb16
Nov/06/2018 14:44:02 ipsec,debug 99f2bdd5 a86418ee 2e734e09 ad280e6d a0748066 d21fdb61 9960d6cf 28a5c29f
Nov/06/2018 14:44:02 ipsec,debug 91444764 ce0ccfa1 47a8d27c c269c225 b2518c2b eaca2fee 23030890 b3f0e1a9
Nov/06/2018 14:44:02 ipsec,debug ac617882 a7796c98 d8e14fac 275aa42e 5db47f15 61ab06da 2717b092 7923f6e7
Nov/06/2018 14:44:02 ipsec,debug 7b64e347 c166384b 513c26bf e2ded00c abdb6e61 04873a6a 0c7789be d4a3570a
Nov/06/2018 14:44:02 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202528 00000000 00000050 00000034
Nov/06/2018 14:44:02 ipsec,debug,packet 75b0e9ee f49d1c93 4c55f0ca 477ca250 e9968dfa 5556dc3e a596929c f53e1a4c
Nov/06/2018 14:44:02 ipsec,debug,packet 58717270 ecca511e 6465994c 78d4d04a
Nov/06/2018 14:44:02 ipsec -> ike2 reply, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec ignoring
Nov/06/2018 14:44:02 ipsec create child: finish
Nov/06/2018 14:44:02 ipsec adding payload: NONCE
Nov/06/2018 14:44:02 ipsec,debug => (size 0x1c)
Nov/06/2018 14:44:02 ipsec,debug 0000001c dca9937d b352dfe0 506114b0 decad88f fd0b0e67 84591355
Nov/06/2018 14:44:02 ipsec adding payload: KE
Nov/06/2018 14:44:02 ipsec,debug => (first 0x100 of 0x208)
Nov/06/2018 14:44:02 ipsec,debug 00000208 00100000 d9016095 6bcb2150 9188845c 259ef181 643641aa 180f0579
Nov/06/2018 14:44:02 ipsec,debug 0cc5a9bb 8e4ae92a 805b567e 224dd69b 0b421caa 95ac007b e5241ee5 5e094186
Nov/06/2018 14:44:02 ipsec,debug bbf404a9 fc66dddd 0bc8c657 ea34c7a0 2808a8b9 433708ab 516e1af4 bf2d07b4
Nov/06/2018 14:44:02 ipsec,debug f6f84ead 295c02d7 f8303163 39d82b17 59475a64 ff6b2b33 461dd0b2 82ebfae2
Nov/06/2018 14:44:02 ipsec,debug 82039224 d0705dc7 8b4f93dc a32a452f 7fd5e778 34cde4bf f74212d2 3ec726ee
Nov/06/2018 14:44:02 ipsec,debug 71b52e94 3738e7f8 429917e9 2de811a9 1ae22e29 8144c198 9cf2167f dde83507
Nov/06/2018 14:44:02 ipsec,debug e720393f d9c933e8 6632bf9c b2ecfb6b 120d9ea5 1123020f 16000ac0 3bfae076
Nov/06/2018 14:44:02 ipsec,debug b9c04bad 859e106f 40b2ea28 abb9a17f 39671306 2bfaf41f 3f275dcc e50a0ecd
Nov/06/2018 14:44:02 ipsec initiator selector: [strongSwan IP]
Nov/06/2018 14:44:02 ipsec adding payload: TS_I
Nov/06/2018 14:44:02 ipsec,debug => (size 0x18)
Nov/06/2018 14:44:02 ipsec,debug 00000018 01000000 07000010 0000ffff 0a6cf304 0a6cf304
Nov/06/2018 14:44:02 ipsec responder selector: [RouterOS Network IP]/16
Nov/06/2018 14:44:02 ipsec adding payload: TS_R
Nov/06/2018 14:44:02 ipsec,debug => (size 0x18)
Nov/06/2018 14:44:02 ipsec,debug 00000018 01000000 07000010 0000ffff 0a6d0000 0a6dffff
Nov/06/2018 14:44:02 ipsec adding payload: SA
Nov/06/2018 14:44:02 ipsec,debug => (size 0x34)
Nov/06/2018 14:44:02 ipsec,debug 00000034 00000030 01030404 0846a964 0300000c 0100000d 800e0100 03000008
Nov/06/2018 14:44:02 ipsec,debug 0300000c 03000008 04000010 00000008 05000000
Nov/06/2018 14:44:02 ipsec <- ike2 reply, exchange: AUTH:1 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet => outgoing plain packet (size 0x2a4)
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 28202320 00000001 000002a4 2200001c
Nov/06/2018 14:44:02 ipsec,debug,packet dca9937d b352dfe0 506114b0 decad88f fd0b0e67 84591355 2c000208 00100000
Nov/06/2018 14:44:02 ipsec,debug,packet d9016095 6bcb2150 9188845c 259ef181 643641aa 180f0579 0cc5a9bb 8e4ae92a
Nov/06/2018 14:44:02 ipsec,debug,packet 805b567e 224dd69b 0b421caa 95ac007b e5241ee5 5e094186 bbf404a9 fc66dddd
Nov/06/2018 14:44:02 ipsec,debug,packet 0bc8c657 ea34c7a0 2808a8b9 433708ab 516e1af4 bf2d07b4 f6f84ead 295c02d7
Nov/06/2018 14:44:02 ipsec,debug,packet f8303163 39d82b17 59475a64 ff6b2b33 461dd0b2 82ebfae2 82039224 d0705dc7
Nov/06/2018 14:44:02 ipsec,debug,packet 8b4f93dc a32a452f 7fd5e778 34cde4bf f74212d2 3ec726ee 71b52e94 3738e7f8
Nov/06/2018 14:44:02 ipsec,debug,packet 429917e9 2de811a9 1ae22e29 8144c198 9cf2167f dde83507 e720393f d9c933e8
Nov/06/2018 14:44:02 ipsec,debug,packet 
Nov/06/2018 14:44:02 ipsec,debug,packet 6632bf9c b2ecfb6b 120d9ea5 1123020f 16000ac0 3bfae076 b9c04bad 859e106f
Nov/06/2018 14:44:02 ipsec,debug,packet 40b2ea28 abb9a17f 39671306 2bfaf41f 3f275dcc e50a0ecd dbee4610 1b0789ce
Nov/06/2018 14:44:02 ipsec,debug,packet 98224a7c 30451d20 81d22255 34b75fdf 2e2b1b5b 057ef422 c361e5f5 a0184e09
Nov/06/2018 14:44:02 ipsec,debug,packet d6150a9a 88694381 758011d5 153eefba fda9a718 86b99379 1b2b9275 fad17016
Nov/06/2018 14:44:02 ipsec,debug,packet ae1e0f40 b603b16d d9a2657c 8a1979e6 fa64a529 63edb9f3 857f4d96 ff78fcca
Nov/06/2018 14:44:02 ipsec,debug,packet 6e5dddba 48c0bef4 aa43a99e 44ece453 4626bcc1 087509ef 4b839e4d 94d1e898
Nov/06/2018 14:44:02 ipsec,debug,packet e0daa84c e67a6182 e0719ee4 779b0afa fc64865d 9e580cb5 304749a3 e46e01eb
Nov/06/2018 14:44:02 ipsec,debug,packet 6d75d917 a2d8dfa3 48ef9159 a5aebba6 a57ed11d 6280c70f 64fad23b 160fb681
Nov/06/2018 14:44:02 ipsec,debug,packet 
Nov/06/2018 14:44:02 ipsec,debug,packet 9340132d c32e4c00 f7676c93 d1337592 0852c42e 36560be9 80a6ecfb 7bf97d14
Nov/06/2018 14:44:02 ipsec,debug,packet efd51675 b6748e43 21a4fbe8 6ca0da69 282b18b0 b22f6522 31c3991c b343affb
Nov/06/2018 14:44:02 ipsec,debug,packet 2d000018 01000000 07000010 0000ffff 0a6cf304 0a6cf304 21000018 01000000
Nov/06/2018 14:44:02 ipsec,debug,packet 07000010 0000ffff 0a6d0000 0a6dffff 00000034 00000030 01030404 0846a964
Nov/06/2018 14:44:02 ipsec,debug,packet 0300000c 0100000d 800e0100 03000008 0300000c 03000008 04000010 00000008
Nov/06/2018 14:44:02 ipsec,debug,packet 05000000
Nov/06/2018 14:44:02 ipsec adding payload: ENC
Nov/06/2018 14:44:02 ipsec,debug => (first 0x100 of 0x2e4)
Nov/06/2018 14:44:02 ipsec,debug 280002e4 e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517
Nov/06/2018 14:44:02 ipsec,debug 223865d9 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668
Nov/06/2018 14:44:02 ipsec,debug b0f19a24 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44
Nov/06/2018 14:44:02 ipsec,debug 9731fcf1 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69
Nov/06/2018 14:44:02 ipsec,debug 036245be 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd
Nov/06/2018 14:44:02 ipsec,debug b63558ab 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36
Nov/06/2018 14:44:02 ipsec,debug 3d006413 b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96
Nov/06/2018 14:44:02 ipsec,debug 9bab311c 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72
Nov/06/2018 14:44:02 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:02 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:02 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:02 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:02 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:02 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:02 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:02 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:02 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:02 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:02 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:02 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:02 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:02 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:02 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:02 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:02 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:02 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:02 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:02 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:02 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:02 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:02 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:02 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:02 ipsec,debug => child keymat (size 0xa0)
Nov/06/2018 14:44:02 ipsec,debug 5a2ddc4c c7a9cb5e c988bec2 081ae26e 7ab0a4a3 67cba62e 8897cf88 1a2bbcaa
Nov/06/2018 14:44:02 ipsec,debug 0528695a 800d49d2 28b5a1b9 74a7b55e c00eac10 bf4e79e9 e3be9730 fd8c18c8
Nov/06/2018 14:44:02 ipsec,debug cafe075e eb0c30a4 a9906150 ab87490a cc47ce01 fedcc986 f7b7ce4a 7f412c74
Nov/06/2018 14:44:02 ipsec,debug acf7cad4 0347c970 c0aee236 2e5c7ff7 fd58ff64 1f5beb37 b8962479 9b996a93
Nov/06/2018 14:44:02 ipsec,debug 3cdf7f4e af8a9331 d7d617a7 4b8045cb 185d985c eae77c78 1010d81c 19709666
Nov/06/2018 14:44:02 ipsec IPsec-SA established: [strongSwan IP][500]->[RouterOS IP][500] spi=0x846a964
Nov/06/2018 14:44:02 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202528 00000000 00000050 00000034
Nov/06/2018 14:44:02 ipsec,debug,packet 75b0e9ee f49d1c93 4c55f0ca 477ca250 e9968dfa 5556dc3e a596929c f53e1a4c
Nov/06/2018 14:44:02 ipsec,debug,packet 58717270 ecca511e 6465994c 78d4d04a
Nov/06/2018 14:44:02 ipsec -> ike2 reply, exchange: INFORMATIONAL:0 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec ignoring
Nov/06/2018 14:44:02 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:02 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:02 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:02 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:02 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:02 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:02 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:02 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:02 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:02 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:02 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:02 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:02 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:02 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:02 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:02 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:02 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:02 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:02 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:02 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:02 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:02 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:02 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:02 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec reply retransmission
Nov/06/2018 14:44:02 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:02 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:02 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:02 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:02 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:02 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:02 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:02 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:02 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:02 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:02 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:02 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:02 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:02 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:02 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:02 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:02 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:02 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:02 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:02 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:02 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:02 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:02 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:02 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:02 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:07 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:07 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:07 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:07 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:07 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:07 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:07 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:07 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:07 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:07 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:07 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:07 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:07 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:07 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:07 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:07 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:07 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:07 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:07 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:07 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:07 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:07 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:07 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:07 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:07 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:07 ipsec reply retransmission
Nov/06/2018 14:44:07 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:07 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:07 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:07 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:07 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:07 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:07 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:07 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:07 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:07 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:07 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:07 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:07 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:07 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:07 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:07 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:07 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:07 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:07 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:07 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:07 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:07 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:07 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:07 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:07 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:07 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:07 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:07 ipsec IPsec-SA established: [RouterOS IP][500]->[strongSwan IP][500] spi=0xcb1e31d6
Nov/06/2018 14:44:07 firewall,info input: in:vrrp1 out:(unknown 0), src-mac 00:04:a7:09:8c:3a, proto ICMP (type 0, code 0), [strongSwan IP]->[RouterOS IP], len 56
Nov/06/2018 14:44:08 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:09 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:10 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:11 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:12 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:13 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:14 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:15 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:16 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:17 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:18 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:19 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:20 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:20 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:20 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:20 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:20 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:20 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:20 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:20 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:20 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:20 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:20 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:20 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:20 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:20 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:20 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:20 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:20 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:20 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:20 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:20 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:20 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:20 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:20 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:20 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:20 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:20 ipsec reply retransmission
Nov/06/2018 14:44:20 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:20 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:20 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:20 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:20 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:20 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:20 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:20 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:20 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:20 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:20 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:20 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:20 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:20 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:20 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:20 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:20 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:20 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:20 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:20 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:20 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:20 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:20 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:20 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:20 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:20 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:20 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:21 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:22 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:23 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:24 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:25 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:25 ipsec sending dpd packet
Nov/06/2018 14:44:25 ipsec <- ike2 request, exchange: INFORMATIONAL:1 [strongSwan IP][500]
Nov/06/2018 14:44:25 ipsec,debug,packet => outgoing plain packet (size 0x1c)
Nov/06/2018 14:44:25 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 00202500 00000001 0000001c
Nov/06/2018 14:44:25 ipsec adding payload: ENC
Nov/06/2018 14:44:25 ipsec,debug => (size 0x74)
Nov/06/2018 14:44:25 ipsec,debug 00000074 e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53
Nov/06/2018 14:44:25 ipsec,debug 2c76f0c7 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff
Nov/06/2018 14:44:25 ipsec,debug e87d642e 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b
Nov/06/2018 14:44:25 ipsec,debug 22415904 03000009 011a0000 10050000 00000000
Nov/06/2018 14:44:25 ipsec,debug ===== sending 144 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:25 ipsec,debug 1 times of 144 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:25 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000001 00000090 00000074
Nov/06/2018 14:44:25 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53 2c76f0c7
Nov/06/2018 14:44:25 ipsec,debug,packet 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff e87d642e
Nov/06/2018 14:44:25 ipsec,debug,packet 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b 22415904
Nov/06/2018 14:44:25 ipsec,debug,packet 7306ec5d e4c87e1f 731bee76 8c1f6bc9
Nov/06/2018 14:44:26 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:27 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:28 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:29 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:30 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:30 ipsec dpd: retransmit
Nov/06/2018 14:44:30 ipsec,debug ===== sending 144 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:30 ipsec,debug 1 times of 144 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:30 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000001 00000090 00000074
Nov/06/2018 14:44:30 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53 2c76f0c7
Nov/06/2018 14:44:30 ipsec,debug,packet 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff e87d642e
Nov/06/2018 14:44:30 ipsec,debug,packet 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b 22415904
Nov/06/2018 14:44:30 ipsec,debug,packet 7306ec5d e4c87e1f 731bee76 8c1f6bc9
Nov/06/2018 14:44:31 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:32 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:33 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:34 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:35 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:35 ipsec dpd: retransmit
Nov/06/2018 14:44:35 ipsec,debug ===== sending 144 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:35 ipsec,debug 1 times of 144 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:35 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202500 00000001 00000090 00000074
Nov/06/2018 14:44:35 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 045d84f4 46ec9914 f0d89b53 2c76f0c7
Nov/06/2018 14:44:35 ipsec,debug,packet 29a434f6 6b20f843 ca04851d 8e022c19 b59bea64 130cba22 eb1d6eff e87d642e
Nov/06/2018 14:44:35 ipsec,debug,packet 98dd70b2 c5bdf361 3dbb0c4b 2d07a932 090f70d2 c537b782 ae6bfd6b 22415904
Nov/06/2018 14:44:35 ipsec,debug,packet 7306ec5d e4c87e1f 731bee76 8c1f6bc9
Nov/06/2018 14:44:36 ipsec,debug ===== received 80 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:36 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202528 00000001 00000050 00000034
Nov/06/2018 14:44:36 ipsec,debug,packet 8bdc1bf3 6c3b7599 200e8237 390ce9bf 593c2d1f 6bf6a1d8 927b13db e2f23e91
Nov/06/2018 14:44:36 ipsec,debug,packet cd971c3b da1d2a92 ed9d9d12 f754841b
Nov/06/2018 14:44:36 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 [strongSwan IP][500]
Nov/06/2018 14:44:36 ipsec payload seen: ENC
Nov/06/2018 14:44:36 ipsec processing payload: ENC
Nov/06/2018 14:44:36 ipsec,debug => iv (size 0x10)
Nov/06/2018 14:44:36 ipsec,debug 8bdc1bf3 6c3b7599 200e8237 390ce9bf
Nov/06/2018 14:44:36 ipsec,debug decrypted
Nov/06/2018 14:44:36 ipsec,debug,packet => decrypted packet (size 0x0)
Nov/06/2018 14:44:36 ipsec respond: info
Nov/06/2018 14:44:36 ipsec,debug reply ignored
Nov/06/2018 14:44:36 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:37 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:38 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:39 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:40 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:41 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:42 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:43 ipsec,debug ===== received 736 bytes from [strongSwan IP][500] to [RouterOS IP][500]
Nov/06/2018 14:44:43 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202408 00000002 000002e0 290002c4
Nov/06/2018 14:44:43 ipsec,debug,packet 97e84f2e 0af2f774 6e12b3b4 eb32c60f c756e844 d5738f99 779fdc5a 08107492
Nov/06/2018 14:44:43 ipsec,debug,packet 3860aa55 482f2daf c6ca9f62 3812a3ca e6c2aada edf306b3 c91a9f4b d48018c4
Nov/06/2018 14:44:43 ipsec,debug,packet bb1f01e7 4d8d0fd5 5dbe5792 c798c745 afddcc63 a964b356 bc1a852c de11ae0d
Nov/06/2018 14:44:43 ipsec,debug,packet 050c8c7a a509f8c3 e63e6579 bf1c4943 d0594d18 6380f37d bd5d9cc9 3afca78a
Nov/06/2018 14:44:43 ipsec,debug,packet bae541b3 8eb8e1bf 423cdf86 98256fb1 6ffccc17 bbe06d17 29f1df51 e57ff62d
Nov/06/2018 14:44:43 ipsec,debug,packet bfadcadf 586ef078 3ab8aa08 5b4c7232 792d64c9 d440f62a f623c186 76c0e309
Nov/06/2018 14:44:43 ipsec,debug,packet 409461ff 462f4753 962a84b5 bf2815d9 99d278e9 c6ba41e0 6cfafd78 52efb894
Nov/06/2018 14:44:43 ipsec,debug,packet fec7ae07 32bca5f4 93a7f8ea 4ad2f765 7f6450c4 01b28180 a4cd2fb4 38df9546
Nov/06/2018 14:44:43 ipsec,debug,packet cd01f2df ad00be46 3c44babf 131fc07d 62d96667 29ab608f b69292f7 534679ba
Nov/06/2018 14:44:43 ipsec,debug,packet f2533888 01614c41 e2c3768f fda413d4 2faa559d f1fd15e5 41298ce3 b9600ba0
Nov/06/2018 14:44:43 ipsec,debug,packet deb2f225 fa1a3826 0017d121 4b7633c0 41902887 b85c10bb a7a59beb b71a0405
Nov/06/2018 14:44:43 ipsec,debug,packet b8da931b 6ab18aa9 ed85548f 2023cdaa 7fa72b69 0788faec 41bf2003 2202ba5b
Nov/06/2018 14:44:43 ipsec,debug,packet ab7e479b 73df11a3 ef8e3648 e3d864d2 eeaedc3d e3850d74 5c24ef73 dc616036
Nov/06/2018 14:44:43 ipsec,debug,packet ffffd4c7 fb3f7772 a06595a9 88985174 4551e3e4 f96e9812 e1f5e0d1 b8afc8ff
Nov/06/2018 14:44:43 ipsec,debug,packet 2e628739 786a5f8f 13f6e90f 7a715eab a5bdbc4e bbe02bcb ff02d4f8 717e94c9
Nov/06/2018 14:44:43 ipsec,debug,packet 308695f7 631a8219 1eee4210 a32e437b 886ef9b7 9563fc6d 7eec73e4 1a0bbc3f
Nov/06/2018 14:44:43 ipsec,debug,packet c07eb481 61d78370 27399212 0de995ea 436b1bf6 a3afc5c5 94d1492d a388618f
Nov/06/2018 14:44:43 ipsec,debug,packet 532c5300 247f5b9e 311a721b 2eefb34b 6a0d9c5f 73997007 f051b71f 7eb701a4
Nov/06/2018 14:44:43 ipsec,debug,packet dc42d803 f3189e37 59deaf34 915892cc bb828f7d 8b5dc244 9043964e 5c76839e
Nov/06/2018 14:44:43 ipsec,debug,packet 8094a6bc db99273d bd93e589 f6f68c2c 3f2955b9 0603328f 4df8cbff 5c6af6b1
Nov/06/2018 14:44:43 ipsec,debug,packet c74adc69 0ef17aca 556dcc87 abdf1427 7f25ad19 8d4121c4 e7ea5582 8683f1d2
Nov/06/2018 14:44:43 ipsec,debug,packet f0e41d6b 54be9586 0afd08e2 d5fefceb e53d3608 a3b33400 89dcc918 93a2f309
Nov/06/2018 14:44:43 ipsec -> ike2 request, exchange: CREATE_CHILD_SA:2 [strongSwan IP][500]
Nov/06/2018 14:44:43 ipsec reply retransmission
Nov/06/2018 14:44:43 ipsec,debug ===== sending 768 bytes from [RouterOS IP][500] to [strongSwan IP][500]
Nov/06/2018 14:44:43 ipsec,debug 1 times of 768 bytes message will be sent to [strongSwan IP][500]
Nov/06/2018 14:44:43 ipsec,debug,packet 4eb16358 999296a3 9ac893ed d15770a0 2e202320 00000001 00000300 280002e4
Nov/06/2018 14:44:43 ipsec,debug,packet e53d3608 a3b33400 89dcc918 93a2f309 b75972b6 b5faa615 3ede3517 223865d9
Nov/06/2018 14:44:43 ipsec,debug,packet 40033f9c 3d7121a5 cde19741 ffc0f1c4 5387b7af 9abef5ee 8ab74668 b0f19a24
Nov/06/2018 14:44:43 ipsec,debug,packet 58f9ff33 af43a683 f4b4b322 f644497b eff871dc c397af07 4d22cb44 9731fcf1
Nov/06/2018 14:44:43 ipsec,debug,packet 97790bf7 a7ef6c0d 447f5e9f 6d81fb83 0caad708 ce332609 3a949c69 036245be
Nov/06/2018 14:44:43 ipsec,debug,packet 61c0fcab de1e95f1 e6f64954 c015b38e dadedc96 91277713 b766c7fd b63558ab
Nov/06/2018 14:44:43 ipsec,debug,packet 6b783799 9e274f61 8a6029e5 e5e310f7 3c99037e 2e9ad43a f64d3a36 3d006413
Nov/06/2018 14:44:43 ipsec,debug,packet b83c593b 858dd0be d5f71773 7d1ec71e fa871a51 38d0422f 60ddcc96 9bab311c
Nov/06/2018 14:44:43 ipsec,debug,packet 1b394135 f09504fe a1e116ef 9d18c25d 9b135158 ec5d26f2 b1660d72 7e8d3af6
Nov/06/2018 14:44:43 ipsec,debug,packet 848f706a 0733ac2b 7e053016 3484a600 c91f3db0 fb09e2e2 60acd51b ecc42d0c
Nov/06/2018 14:44:43 ipsec,debug,packet 9a6d5620 b0c45021 7e12b0a1 cd2b5134 12a80705 62864ef6 510cfea5 ec05cd16
Nov/06/2018 14:44:43 ipsec,debug,packet 129ffb50 90045e69 a6737c37 e19c01ec f162e852 8dc2fd67 f5796e65 0cb3df42
Nov/06/2018 14:44:43 ipsec,debug,packet 6922be65 a818ec7a 264d4b14 8c9e2a55 b98815fe 87e4e9b5 b2bb1b27 6c5d2ac2
Nov/06/2018 14:44:43 ipsec,debug,packet 571b465a 8041ac30 97fade54 ef76ff5c e328d315 8addcd82 0ee3b0a9 59f6543b
Nov/06/2018 14:44:43 ipsec,debug,packet b9d35c94 b6bde684 3c0903b7 2cdc21b7 9f581f67 e2d0f03b 05e4919b b2e254c5
Nov/06/2018 14:44:43 ipsec,debug,packet bf23f7e5 56d6b6d7 2d6f5e26 29f80694 df357068 cb351cd6 1653d6a0 4917b37b
Nov/06/2018 14:44:43 ipsec,debug,packet 254a9531 aab24a7a a50d7e44 49be8b0a dc5ac995 69bff33d 08d0ec19 1e960ea2
Nov/06/2018 14:44:43 ipsec,debug,packet 27580254 395dce4b 39e53edf a397eb02 44a8e1eb 23a1c10c 9c6a3e4f 95f4d03e
Nov/06/2018 14:44:43 ipsec,debug,packet c0218cbe f7509a49 60512fd4 2f8206cb 6de0b6b0 31ddfc07 cbf430c8 94282831
Nov/06/2018 14:44:43 ipsec,debug,packet df13f90f b5465894 ac88e171 1ea80dde 2f33e3c1 51785cf7 4d76ef0e e8d759a2
Nov/06/2018 14:44:43 ipsec,debug,packet 8deae301 f1d19364 5d259f9f 70770b20 db6f835f 8b967578 dae15094 6fb3019d
Nov/06/2018 14:44:43 ipsec,debug,packet f860a516 fcf6c63f 5ee12723 3d001c91 043ebc3a 260b5989 902e1311 8b265f58
Nov/06/2018 14:44:43 ipsec,debug,packet 757685eb 16622862 85c2cdac 6bd28edf 2fa53e13 46960bba fd51243a 6597d2bf
Nov/06/2018 14:44:43 ipsec,debug,packet f60f8eef 48573126 29a1dafb 581b8408 3fd879cd 02ebcba1 9dd99fdb 0ded768e
Nov/06/2018 14:44:43 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56
Nov/06/2018 14:44:44 firewall,info output: in:(unknown 0) out:vrrp1, proto ICMP (type 8, code 0), [RouterOS IP]->[strongSwan IP], len 56

I just created a logging firewall rule that logs all icmp with ipsec policy.

Kind regards,
Sebastian

Bump…

@normis: Have you tried to send data when the ChildSA were recreated?

I made another test against an Linux machine running openSWAN and it’s working also flawlessly.

And I’ve played arround with the problem. And noticed that it usally happens, when I start the data transmission (ICMP ping) when only one ChildSA is generated. (From RouterOS to strongSwan, the ChildSA for the other direction is not there at this point (at least Winbox isn’t showing it))

When i continously send ping from the RouterOS to the strongSwan client then the data transmission is allways (with short breaks on rekeying) working. But it get never stuck for a few minutes.

Kind regards,
Sebastian

Yes, traffic is flowing without any intermittence before, during and after rekeying as it should with IKEv2. Also it should not matter when you start sending the traffic since rekeying process is the same. I guess, you could try checking whether the latest beta version has any changes in your test case. As far as I can see there is one change that could have some impact on your issue.

*) ike2 - improved subsequent phase 2 initialization when no childs exist;

Other than that I would start looking at other things apart from IPsec that could cause the issue. Is routing table and firewall properly configured? I can see you are sending packets out the VRRP interface, which should not be a case. VRRP should have /32 address and no traffic should be routed through the interface itself.

Hey,

Okay. I’ll give the beta Firmware another try. With the removed PFS group from the Policy Proposal.

A side annotation. When I setup VRRP with an /32 Address, like mentioned in Configuration Examples from the Wiki, the Router doesn’t respond at this IP-Address.

In my lab the VRRP is only working when I setup the IP-Address for the vrrp1 interface with the same subnetmask as the interface the vrrp interface is running on.

Kind regards,
Sebastian

Leave the pfs-group set to modp4096 on RouterOS side. If you have explicitly set to use it on strongSwan side, then it must be set in RouterOS as well.

Then you have to find out what causes the router to not respond with VRRP address, because it is not correct to use VRRP interface for traffic. Maybe NAT or firewall is blocking such packets.

I have the same problem with IPsec tunnel on Google Cloud Platform with Mikrotik CHR

{
insertId: "19i68qjg37lbjw8" 
labels: {…} 
logName: "projects/project1/logs/cloud.googleapis.com%2Fipsec_events"
receiveTimestamp: "2019-04-27T07:10:57.800611868Z" 
resource: {…} 
severity: "DEBUG" 
textPayload: "parsed CREATE_CHILD_SA request 36 [ No KE N(REKEY_SA) SA TSi TSr ]" 
timestamp: "2019-04-27T07:10:57.669630828Z" 
}

And mikrotik needs to restablish connection again. Version of firmware is 6.43.14 so it shoud have all ipsec bugs fixed and still has issues.

I have the same problem with IPsec tunnel error simulation rekey on VMware NSX Edge with Mikrotik HAP AC RB 962UiGS-5HacT2HnT RouterOS 6.45.6.
VMware Log Inside:
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}
10/28/201916:15:28.225
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 99 [ N(REKEY_SA) SA No TSi TSr ]
10/28/201916:15:28.225
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)
10/28/201916:15:28.228
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (268 bytes)
10/28/201916:15:28.228
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 99 [ N(NO_PROP) ]
10/28/201916:15:28.228
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
10/28/201916:15:28.228
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:28.228
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 14 seconds
10/28/201916:15:33.972
Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 16[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending DPD request
10/28/201916:15:33.972
Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 16[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> generating INFORMATIONAL request 48
10/28/201916:15:33.972
Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 16[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (76 bytes)
10/28/201916:15:33.975
Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> received packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (124 bytes)
10/28/201916:15:33.975
Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> parsed INFORMATIONAL response 48
10/28/201916:15:35.644
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (716 bytes)
10/28/201916:15:35.644
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA request 57 [ No KE N(REKEY_SA) SA TSi TSr ]
10/28/201916:15:35.645
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ
10/28/201916:15:35.645
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
10/28/201916:15:35.645
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> no acceptable proposal found
10/28/201916:15:35.645
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:35.645
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA response 57 [ N(NO_PROP) ]
10/28/201916:15:35.645
Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)
10/28/201916:15:36.652
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}
10/28/201916:15:36.652
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 100 [ N(REKEY_SA) SA No TSi TSr ]
10/28/201916:15:36.652
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)
10/28/201916:15:36.655
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (220 bytes)
10/28/201916:15:36.655
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 100 [ N(NO_PROP) ]
10/28/201916:15:36.655
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
10/28/201916:15:36.655
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:36.655
Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 15 seconds
10/28/201916:15:39.088
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (700 bytes)
10/28/201916:15:39.088
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA request 58 [ No KE N(REKEY_SA) SA TSi TSr ]
10/28/201916:15:39.089
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ
10/28/201916:15:39.089
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
10/28/201916:15:39.089
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> no acceptable proposal found
10/28/201916:15:39.089
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:39.089
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA response 58 [ N(NO_PROP) ]
10/28/201916:15:39.089
Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)
10/28/201916:15:42.229
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 08[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}
10/28/201916:15:42.229
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 08[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 101 [ N(REKEY_SA) SA No TSi TSr ]
10/28/201916:15:42.229
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 08[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)
10/28/201916:15:42.234
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (252 bytes)
10/28/201916:15:42.234
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 101 [ N(NO_PROP) ]
10/28/201916:15:42.234
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
10/28/201916:15:42.234
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:42.234
Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 6 seconds
10/28/201916:15:45.663
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (716 bytes)
10/28/201916:15:45.663
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA request 59 [ No KE N(REKEY_SA) SA TSi TSr ]
10/28/201916:15:45.663
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ
10/28/201916:15:45.663
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
10/28/201916:15:45.663
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> no acceptable proposal found
10/28/201916:15:45.664
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:45.664
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA response 59 [ N(NO_PROP) ]
10/28/201916:15:45.664
Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)
10/28/201916:15:48.234
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}
10/28/201916:15:48.234
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 102 [ N(REKEY_SA) SA No TSi TSr ]
10/28/201916:15:48.234
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)
10/28/201916:15:48.241
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (220 bytes)
10/28/201916:15:48.241
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 102 [ N(NO_PROP) ]
10/28/201916:15:48.241
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
10/28/201916:15:48.241
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA
10/28/201916:15:48.241
Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 10 seconds
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (268 bytes)
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed INFORMATIONAL request 60 [ D ]
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received DELETE for IKE_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX[3]
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> deleting IKE_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX[3] between XXX.XXX.XXX.XXX[XXX.XXX.XXX.XXX]…XXX.XXX.XXX.XXX[XXX.XXX.XXX.XXX]
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> IKE_SA deleted
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating INFORMATIONAL response 60
10/28/201916:15:49.759
Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)
10/28/201916:15:51.655
Oct 28 13:15:29 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[JOB] CHILD_SA ESP/0xc49e71cd/XXX.XXX.XXX.XXX not found for rekey
10/28/201916:15:58.241
Oct 28 13:15:35 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 12[JOB] CHILD_SA ESP/0xc49e71cd/XXX.XXX.XXX.XXX not found for rekey
source event_type hostname appname
10/28/201916:16:03.973
Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending DPD request
10/28/201916:16:03.973
Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> generating INFORMATIONAL request 49
10/28/201916:16:03.973
Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (76 bytes)
10/28/201916:16:03.975
Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 14[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> received packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (108 bytes)
10/28/201916:16:03.975
Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 14[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> parsed INFORMATIONAL response 49
10/28/201916:16:08.195
Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[KNL] creating acquire job for policy YYY.YYY.YYY.YYY/XX[tcp/51760] === YYY.YYY.YYY.YYY/XX[tcp/ssh] with reqid {2}
10/28/201916:16:08.195
Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> initiating IKE_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX[7] to XXX.XXX.XXX.XXX
10/28/201916:16:08.198
Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
10/28/201916:16:08.198
Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (464 bytes)
10/28/201916:16:08.915
Oct 28 13:15:46 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (429 bytes)
10/28/201916:16:08.915
Oct 28 13:15:46 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
10/28/201916:16:08.915
Oct 28 13:15:46 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> authentication of ‘XXX.XXX.XXX.XXX’ (myself) with pre-shared key

I have the same problem with IPsec tunnel error simulation rekey on VMware NSX Edge with Mikrotik HAP AC RB 962UiGS-5HacT2HnT RouterOS 6.45.6.

VMware Log Inside:
<CODEBOX codebox="VMwareLog Inside file=“Untitled.txt”>
Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}

10/28/201916:15:28.225

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 99 [ N(REKEY_SA) SA No TSi TSr ]

10/28/201916:15:28.225

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)

10/28/201916:15:28.228

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (268 bytes)

10/28/201916:15:28.228

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 99 [ N(NO_PROP) ]

10/28/201916:15:28.228

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built

10/28/201916:15:28.228

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:28.228

Oct 28 13:15:05 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 14 seconds

10/28/201916:15:33.972

Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 16[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending DPD request

10/28/201916:15:33.972

Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 16[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> generating INFORMATIONAL request 48

10/28/201916:15:33.972

Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 16[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (76 bytes)

10/28/201916:15:33.975

Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> received packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (124 bytes)

10/28/201916:15:33.975

Oct 28 13:15:11 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> parsed INFORMATIONAL response 48

10/28/201916:15:35.644

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (716 bytes)

10/28/201916:15:35.644

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA request 57 [ No KE N(REKEY_SA) SA TSi TSr ]

10/28/201916:15:35.645

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ

10/28/201916:15:35.645

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ

10/28/201916:15:35.645

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> no acceptable proposal found

10/28/201916:15:35.645

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:35.645

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA response 57 [ N(NO_PROP) ]

10/28/201916:15:35.645

Oct 28 13:15:13 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)

10/28/201916:15:36.652

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}

10/28/201916:15:36.652

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 100 [ N(REKEY_SA) SA No TSi TSr ]

10/28/201916:15:36.652

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)

10/28/201916:15:36.655

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (220 bytes)

10/28/201916:15:36.655

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 100 [ N(NO_PROP) ]

10/28/201916:15:36.655

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built

10/28/201916:15:36.655

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:36.655

Oct 28 13:15:14 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 13[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 15 seconds

10/28/201916:15:39.088

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (700 bytes)

10/28/201916:15:39.088

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA request 58 [ No KE N(REKEY_SA) SA TSi TSr ]

10/28/201916:15:39.089

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ

10/28/201916:15:39.089

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ

10/28/201916:15:39.089

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> no acceptable proposal found

10/28/201916:15:39.089

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:39.089

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA response 58 [ N(NO_PROP) ]

10/28/201916:15:39.089

Oct 28 13:15:16 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 09[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)

10/28/201916:15:42.229

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 08[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}

10/28/201916:15:42.229

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 08[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 101 [ N(REKEY_SA) SA No TSi TSr ]

10/28/201916:15:42.229

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 08[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)

10/28/201916:15:42.234

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (252 bytes)

10/28/201916:15:42.234

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 101 [ N(NO_PROP) ]

10/28/201916:15:42.234

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built

10/28/201916:15:42.234

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:42.234

Oct 28 13:15:19 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 6 seconds

10/28/201916:15:45.663

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (716 bytes)

10/28/201916:15:45.663

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA request 59 [ No KE N(REKEY_SA) SA TSi TSr ]

10/28/201916:15:45.663

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ

10/28/201916:15:45.663

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[CFG] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ

10/28/201916:15:45.663

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> no acceptable proposal found

10/28/201916:15:45.664

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:45.664

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA response 59 [ N(NO_PROP) ]

10/28/201916:15:45.664

Oct 28 13:15:23 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 15[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)

10/28/201916:15:48.234

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> establishing CHILD_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX{2}

10/28/201916:15:48.234

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating CREATE_CHILD_SA request 102 [ N(REKEY_SA) SA No TSi TSr ]

10/28/201916:15:48.234

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (204 bytes)

10/28/201916:15:48.241

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (220 bytes)

10/28/201916:15:48.241

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed CREATE_CHILD_SA response 102 [ N(NO_PROP) ]

10/28/201916:15:48.241

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built

10/28/201916:15:48.241

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> failed to establish CHILD_SA, keeping IKE_SA

10/28/201916:15:48.241

Oct 28 13:15:25 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 05[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> CHILD_SA rekeying failed, trying again in 10 seconds

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (268 bytes)

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> parsed INFORMATIONAL request 60 [ D ]

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> received DELETE for IKE_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX[3]

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> deleting IKE_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX[3] between XXX.XXX.XXX.XXX[XXX.XXX.XXX.XXX]…XXX.XXX.XXX.XXX[XXX.XXX.XXX.XXX]

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> IKE_SA deleted

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> generating INFORMATIONAL response 60

10/28/201916:15:49.759

Oct 28 13:15:27 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|3> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (76 bytes)

10/28/201916:15:51.655

Oct 28 13:15:29 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 07[JOB] CHILD_SA ESP/0xc49e71cd/XXX.XXX.XXX.XXX not found for rekey

10/28/201916:15:58.241

Oct 28 13:15:35 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 12[JOB] CHILD_SA ESP/0xc49e71cd/XXX.XXX.XXX.XXX not found for rekey

source event_type hostname appname

10/28/201916:16:03.973

Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending DPD request

10/28/201916:16:03.973

Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> generating INFORMATIONAL request 49

10/28/201916:16:03.973

Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 10[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> sending packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (76 bytes)

10/28/201916:16:03.975

Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 14[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> received packet: from XXX.XXX.XXX.XXX[4500] to XXX.XXX.XXX.XXX[4500] (108 bytes)

10/28/201916:16:03.975

Oct 28 13:15:41 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 14[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|6> parsed INFORMATIONAL response 49

10/28/201916:16:08.195

Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[KNL] creating acquire job for policy YYY.YYY.YYY.YYY/XX[tcp/51760] === YYY.YYY.YYY.YYY/XX[tcp/ssh] with reqid {2}

10/28/201916:16:08.195

Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> initiating IKE_SA XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX[7] to XXX.XXX.XXX.XXX

10/28/201916:16:08.198

Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]

10/28/201916:16:08.198

Oct 28 13:15:45 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 06[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> sending packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (464 bytes)

10/28/201916:16:08.915

Oct 28 13:15:46 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[NET] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> received packet: from XXX.XXX.XXX.XXX[500] to XXX.XXX.XXX.XXX[500] (429 bytes)

10/28/201916:16:08.915

Oct 28 13:15:46 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[ENC] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]

10/28/201916:16:08.915

Oct 28 13:15:46 vse-d4579c4c-1df9-4159-b282-4bc5bd153dde-1 charon: 11[IKE] <XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX-XXX.XXX.XXX.XXX_YYY.YYY.YYY.YYY/XX|7> authentication of ‘XXX.XXX.XXX.XXX’ (myself) with pre-shared key