Not able to get vpn to work on for iOS devices

I’ve been trying to setup a VPN server with my 960PGS. It works well with my win 10 client, but my iOS devices refuse to connect.

Anyone able to tell what is wrong?

I’m a rookie as you might see from the setup, but trying to learn…

Config

# oct/10/2018 22:12:29 by RouterOS 6.41.3
# software id = VA69-1QBV
#
# model = 960PGS
# serial number = 89F9086F9235
/interface bridge
add admin-mac=CC:2D:E0:03:E5:A1 auto-mac=no comment=defconf name=bridge
add fast-forward=no name=bridge_guest
/interface ethernet
set [ find default-name=ether2 ] arp=proxy-arp name=ether2-master
/interface vlan
add interface=bridge_guest name=vlan900 vlan-id=900
/caps-man datapath
add bridge=bridge name=datapath_home
add bridge=bridge name=datapath_guest
/caps-man security
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=\
    security_home
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=\
    security_guest
/caps-man configuration
add datapath=datapath_home hide-ssid=no mode=ap name=cfg_home security=\
    security_home ssid=SoPa-WiFi
add datapath=datapath_guest hide-ssid=no mode=ap name=cfg_guest security=\
    security_guest ssid=SoPa-WiFi-Guest
/caps-man interface
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
    64:D1:54:68:2E:6E master-interface=none name=cap1-2GHz radio-mac=\
    64:D1:54:68:2E:6E
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
    66:D1:54:68:2E:6E master-interface=cap1-2GHz name=cap1-2GHz-1 radio-mac=\
    00:00:00:00:00:00
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
    64:D1:54:68:2E:6F master-interface=none name=cap1-5GHz radio-mac=\
    64:D1:54:68:2E:6F
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
    66:D1:54:68:2E:6F master-interface=cap1-5GHz name=cap1-5GHz-1 radio-mac=\
    00:00:00:00:00:00
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
    CC:2D:E0:2B:82:05 master-interface=none name=cap2-2GHz radio-mac=\
    CC:2D:E0:2B:82:05
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
    CE:2D:E0:2B:82:05 master-interface=cap2-2GHz name=cap2-2GHz-1 radio-mac=\
    00:00:00:00:00:00
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
    CC:2D:E0:2B:82:06 master-interface=none name=cap2-5GHz radio-mac=\
    CC:2D:E0:2B:82:06
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
    CE:2D:E0:2B:82:06 master-interface=cap2-5GHz name=cap2-5GHz-1 radio-mac=\
    00:00:00:00:00:00
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add exclude=dynamic name=discover
add name=mactel
add name=mac-winbox
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip firewall layer7-protocol
add name=Youtube regexp="^.+(youtube.com|www.youtube.com|m.youtube.com|ytimg.c\
    om|s.ytimg.com|ytimg.|youtube.|googlevideo.com|youtu.be|youtube-ui.l.googl\
    e.com|akamaihd.net).*\$"
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=\
    aes-256-cbc,aes-192-cbc,aes-128-cbc,3des
/ip pool
add name=dhcp ranges=192.168.0.110-192.168.0.190
add name=guest-dhcp ranges=192.168.1.10-192.168.1.254
add name=vpn-pool ranges=192.168.3.90-192.168.3.99
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
add address-pool=guest-dhcp disabled=no interface=bridge_guest name=guest
/ppp profile
set *FFFFFFFE dns-server=192.168.0.11 local-address=vpn-pool remote-address=\
    vpn-pool use-upnp=no
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/system logging action
set 0 memory-lines=2000
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes
/caps-man provisioning
add action=create-dynamic-enabled master-configuration=cfg_home \
    slave-configurations=cfg_guest
/interface bridge port
add bridge=bridge comment=defconf interface=ether2-master
add bridge=bridge comment=defconf hw=no interface=sfp1
add bridge=bridge interface=ether3
add bridge=bridge interface=ether4
add bridge=bridge interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=discover
/interface l2tp-server server
set enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2-master list=discover
add interface=ether3 list=discover
add interface=ether4 list=discover
add interface=ether5 list=discover
add interface=sfp1 list=discover
add interface=bridge list=discover
add interface=bridge list=mactel
add interface=bridge list=mac-winbox
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
add address=192.168.0.11/24 comment=defconf interface=ether2-master network=\
    192.168.0.0
add address=192.168.1.1/24 interface=bridge_guest network=192.168.1.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add dhcp-options=hostname,clientid disabled=no interface=bridge
add dhcp-options=hostname,clientid disabled=no interface=ether1
add dhcp-options=hostname,clientid disabled=no interface=bridge_guest
/ip dhcp-server lease
add address=192.168.0.100 client-id=1:38:60:77:25:92:f mac-address=\
    38:60:77:25:92:0F server=defconf
/ip dhcp-server network
add address=192.168.0.0/24 comment=defconf gateway=192.168.0.11 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.0.11 name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
    protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" disabled=yes \
    protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=drop chain=forward comment="Blockera youtube" disabled=yes \
    layer7-protocol=Youtube
add action=drop chain=forward comment="Blockera Sebbes dator" \
    src-mac-address=98:EE:CB:6D:B0:8F
add action=drop chain=forward comment="Blockera Sebbes Chromebook" disabled=\
    yes src-mac-address=A4:C4:94:AB:9B:FE
add action=drop chain=forward comment=\
    "Blockera youtube p\E5 Sebbes Chromebook" disabled=yes layer7-protocol=\
    Youtube src-mac-address=A4:C4:94:AB:9B:FE
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf:  drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-address-type=local dst-port=8081-8083 \
    protocol=tcp to-addresses=192.168.0.100 to-ports=8081-8083
add action=masquerade chain=srcnat disabled=yes dst-address=192.168.0.100 \
    dst-port=8081-8083 out-interface=bridge protocol=tcp src-address=\
    192.168.0.0/24
add action=masquerade chain=srcnat src-address=192.168.3.0/24
/ppp secret
add name=vpn profile=default-encryption
/system clock
set time-zone-name=Europe/Stockholm
/system identity
set name=MTMainRouter
/system logging
add topics=ipsec
add topics=l2tp
/system ntp client
set enabled=yes server-dns-names=\
    0.se.pool.ntp.org,1.se.pool.ntp.org,2.se.pool.ntp.org,3.se.pool.ntp.org
/system routerboard settings
set silent-boot=yes
/tool graphing interface
add
/tool graphing queue
add
/tool graphing resource
add
/tool mac-server
set allowed-interface-list=mactel
/tool mac-server mac-winbox
set allowed-interface-list=mac-winbox

IPSEC Debug

21:55:55 caps,info A8:5C:2C:37:C5:C6@cap2-2GHz disconnected, extensive data loss 
21:55:59 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500] 
21:55:59 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500] 
21:55:59 ipsec,debug,packet ff 
21:56:07 ipsec,debug ===== received 788 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:07 ipsec,debug,packet da16d52d 848127c0 00000000 00000000 01100200 00000000 00000314 0d000204 
21:56:07 ipsec,debug,packet 00000001 00000001 000001f8 0101000e 03000024 01010000 800b0001 800c0e10 
21:56:07 ipsec,debug,packet 80010007 800e0100 80030001 80020004 8004000e 03000024 02010000 800b0001 
21:56:07 ipsec,debug,packet 800c0e10 80010007 800e0100 80030001 80020002 8004000e 03000024 03010000 
21:56:07 ipsec,debug,packet 800b0001 800c0e10 80010007 800e0100 80030001 80020001 8004000e 03000024 
21:56:07 ipsec,debug,packet 04010000 800b0001 800c0e10 80010007 800e0100 80030001 80020006 8004000e 
21:56:07 ipsec,debug,packet 03000024 05010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
21:56:07 ipsec,debug,packet 80040005 03000024 06010000 800b0001 800c0e10 80010007 800e0100 80030001 
21:56:07 ipsec,debug,packet 80020002 80040005 03000024 07010000 800b0001 800c0e10 80010007 800e0100 
21:56:07 ipsec,debug,packet 80030001 80020001 80040005 03000024 08010000 800b0001 800c0e10 80010007 
21:56:07 ipsec,debug,packet 800e0100 80030001 80020004 80040002 03000024 09010000 800b0001 800c0e10 
21:56:07 ipsec,debug,packet 80010007 800e0100 80030001 80020002 80040002 03000024 0a010000 800b0001 
21:56:07 ipsec,debug,packet 800c0e10 80010007 800e0100 80030001 80020001 80040002 03000024 0b010000 
21:56:07 ipsec,debug,packet 800b0001 800c0e10 80010007 800e0080 80030001 80020002 80040002 03000024 
21:56:07 ipsec,debug,packet 0c010000 800b0001 800c0e10 80010007 800e0080 80030001 80020001 80040002 
21:56:07 ipsec,debug,packet 03000020 0d010000 800b0001 800c0e10 80010005 80030001 80020002 80040002 
21:56:07 ipsec,debug,packet 00000020 0e010000 800b0001 800c0e10 80010005 80030001 80020001 80040002 
21:56:07 ipsec,debug,packet 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1 
21:56:07 ipsec,debug,packet b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 
21:56:07 ipsec,debug,packet 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 
21:56:07 ipsec,debug,packet 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e 
21:56:07 ipsec,debug,packet ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 
21:56:07 ipsec,debug,packet 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 
21:56:07 ipsec,debug,packet 086381b5 ec427b1f 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000 
21:56:07 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100 
21:56:07 ipsec,debug === 
21:56:07 ipsec,info respond new phase 1 (Identity Protection): 155.4.242.200[500]<=>90.232.69.248[500] 
21:56:07 ipsec,debug begin. 
21:56:07 ipsec,debug seen nptype=1(sa) len=516 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug seen nptype=13(vid) len=24 
21:56:07 ipsec,debug seen nptype=13(vid) len=20 
21:56:07 ipsec,debug succeed. 
21:56:07 ipsec received Vendor ID: RFC 3947 
21:56:07 ipsec,debug received unknown Vendor ID 
21:56:07 ipsec,debug 4df37928 e9fc4fd1 b3262170 d515c662 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-08 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-07 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-06 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-05 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-04 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
21:56:07 ipsec 
21:56:07 ipsec received long Microsoft ID: FRAGMENTATION 
21:56:07 ipsec Fragmentation enabled 
21:56:07 ipsec received Vendor ID: DPD 
21:56:07 ipsec,debug remote supports DPD 
21:56:07 ipsec 90.232.69.248 Selected NAT-T version: RFC 3947 
21:56:07 ipsec,debug total SA len=512 
21:56:07 ipsec,debug 00000001 00000001 000001f8 0101000e 03000024 01010000 800b0001 800c0e10 
21:56:07 ipsec,debug 80010007 800e0100 80030001 80020004 8004000e 03000024 02010000 800b0001 
21:56:07 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020002 8004000e 03000024 03010000 
21:56:07 ipsec,debug 800b0001 800c0e10 80010007 800e0100 80030001 80020001 8004000e 03000024 
21:56:07 ipsec,debug 04010000 800b0001 800c0e10 80010007 800e0100 80030001 80020006 8004000e 
21:56:07 ipsec,debug 03000024 05010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
21:56:07 ipsec,debug 80040005 03000024 06010000 800b0001 800c0e10 80010007 800e0100 80030001 
21:56:07 ipsec,debug 80020002 80040005 03000024 07010000 800b0001 800c0e10 80010007 800e0100 
21:56:07 ipsec,debug 80030001 80020001 80040005 03000024 08010000 800b0001 800c0e10 80010007 
21:56:07 ipsec,debug 800e0100 80030001 80020004 80040002 03000024 09010000 800b0001 800c0e10 
21:56:07 ipsec,debug 80010007 800e0100 80030001 80020002 80040002 03000024 0a010000 800b0001 
21:56:07 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020001 80040002 03000024 0b010000 
21:56:07 ipsec,debug 800b0001 800c0e10 80010007 800e0080 80030001 80020002 80040002 03000024 
21:56:07 ipsec,debug 0c010000 800b0001 800c0e10 80010007 800e0080 80030001 80020001 80040002 
21:56:07 ipsec,debug 03000020 0d010000 800b0001 800c0e10 80010005 80030001 80020002 80040002 
21:56:07 ipsec,debug 00000020 0e010000 800b0001 800c0e10 80010005 80030001 80020001 80040002 
21:56:07 ipsec,debug begin. 
21:56:07 ipsec,debug seen nptype=2(prop) len=504 
21:56:07 ipsec,debug succeed. 
21:56:07 ipsec,debug proposal #1 len=504 
21:56:07 ipsec,debug begin. 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=36 
21:56:07 ipsec,debug seen nptype=3(trns) len=32 
21:56:07 ipsec,debug seen nptype=3(trns) len=32 
21:56:07 ipsec,debug succeed. 
21:56:07 ipsec,debug transform #1 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4 
21:56:07 ipsec,debug hash(sha2_256) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
21:56:07 ipsec,debug dh(modp2048) 
21:56:07 ipsec,debug transform #2 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
21:56:07 ipsec,debug hash(sha1) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
21:56:07 ipsec,debug dh(modp2048) 
21:56:07 ipsec,debug transform #3 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5 
21:56:07 ipsec,debug hash(md5) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
21:56:07 ipsec,debug dh(modp2048) 
21:56:07 ipsec,debug transform #4 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=6 
21:56:07 ipsec,debug hash(sha2_512) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
21:56:07 ipsec,debug dh(modp2048) 
21:56:07 ipsec,debug transform #5 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4 
21:56:07 ipsec,debug hash(sha2_256) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
21:56:07 ipsec,debug dh(modp1536) 
21:56:07 ipsec,debug transform #6 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
21:56:07 ipsec,debug hash(sha1) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
21:56:07 ipsec,debug dh(modp1536) 
21:56:07 ipsec,debug transform #7 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5 
21:56:07 ipsec,debug hash(md5) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
21:56:07 ipsec,debug dh(modp1536) 
21:56:07 ipsec,debug transform #8 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4 
21:56:07 ipsec,debug hash(sha2_256) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug transform #9 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
21:56:07 ipsec,debug hash(sha1) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug transform #10 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5 
21:56:07 ipsec,debug hash(md5) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug transform #11 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
21:56:07 ipsec,debug hash(sha1) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug transform #12 len=36 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug encryption(aes) 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5 
21:56:07 ipsec,debug hash(md5) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug transform #13 len=32 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
21:56:07 ipsec,debug encryption(3des) 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
21:56:07 ipsec,debug hash(sha1) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug transform #14 len=32 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
21:56:07 ipsec,debug encryption(3des) 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5 
21:56:07 ipsec,debug hash(md5) 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
21:56:07 ipsec,debug dh(modp1024) 
21:56:07 ipsec,debug pair 1: 
21:56:07 ipsec,debug  0x48db48: next=(nil) tnext=0x48e1e8 
21:56:07 ipsec,debug   0x48e1e8: next=(nil) tnext=0x48e1a8 
21:56:07 ipsec,debug    0x48e1a8: next=(nil) tnext=0x48b0b0 
21:56:07 ipsec,debug     0x48b0b0: next=(nil) tnext=0x490dd0 
21:56:07 ipsec,debug      0x490dd0: next=(nil) tnext=0x48e488 
21:56:07 ipsec,debug       0x48e488: next=(nil) tnext=0x48de98 
21:56:07 ipsec,debug        0x48de98: next=(nil) tnext=0x48eed0 
21:56:07 ipsec,debug         0x48eed0: next=(nil) tnext=0x48cce0 
21:56:07 ipsec,debug          0x48cce0: next=(nil) tnext=0x48ad28 
21:56:07 ipsec,debug           0x48ad28: next=(nil) tnext=0x48d778 
21:56:07 ipsec,debug            0x48d778: next=(nil) tnext=0x48df70 
21:56:07 ipsec,debug             0x48df70: next=(nil) tnext=0x48f910 
21:56:07 ipsec,debug              0x48f910: next=(nil) tnext=0x48e360 
21:56:07 ipsec,debug               0x48e360: next=(nil) tnext=(nil) 
21:56:07 ipsec,debug proposal #1: 14 transform 
21:56:07 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=14 
21:56:07 ipsec,debug trns#=1, trns-id=IKE 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 256:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 256:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 192:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 192:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 128:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 128:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = 3DES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 0:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = 3DES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 0:256) 
21:56:07 ipsec,debug hashtype = SHA:4 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=14 
21:56:07 ipsec,debug trns#=2, trns-id=IKE 
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600 
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group 
21:56:07 ipsec,debug Compared: Local:Peer 
21:56:07 ipsec,debug (lifetime = 86400:3600) 
21:56:07 ipsec,debug (lifebyte = 0:0) 
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC 
21:56:07 ipsec,debug (encklen = 256:256) 
21:56:07 ipsec,debug hashtype = SHA:SHA 
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key 
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group 
21:56:07 ipsec,debug an acceptable proposal found. 
21:56:07 ipsec,debug dh(modp2048) 
21:56:07 ipsec,debug agreed on pre-shared key auth. 
21:56:07 ipsec,debug === 
21:56:07 ipsec,debug new cookie: 
21:56:07 ipsec,debug add81ce5b7d484b2  
21:56:07 ipsec,debug add payload of len 52, next type 13 
21:56:07 ipsec,debug add payload of len 16, next type 13 
21:56:07 ipsec,debug add payload of len 16, next type 13 
21:56:07 ipsec,debug add payload of len 20, next type 0 
21:56:07 ipsec,debug 148 bytes from 155.4.242.200[500] to 90.232.69.248[500] 
21:56:07 ipsec,debug 1 times of 148 bytes message will be sent to 90.232.69.248[500] 
21:56:07 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 01100200 00000000 00000094 0d000038 
21:56:07 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 02010000 800b0001 800c0e10 
21:56:07 ipsec,debug,packet 80010007 800e0100 80030001 80020002 8004000e 0d000014 4a131c81 07035845 
21:56:07 ipsec,debug,packet 5c5728f2 0e95452f 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000018 
21:56:07 ipsec,debug,packet 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000 
21:56:07 ipsec sent phase1 packet 155.4.242.200[500]<=>90.232.69.248[500] da16d52d848127c0:add81ce5b7d484b2 
21:56:08 ipsec,debug ===== received 356 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 04100200 00000000 00000164 0a000104 
21:56:08 ipsec,debug,packet 4364074e efbda155 838a22c9 2965fc64 e5638b13 541678d0 5dd5b31f 2801ea39 
21:56:08 ipsec,debug,packet 1aa37991 c5eb3b8b c378f62b bbfa49e0 0c648b47 7f25d714 d8b9c48f 748cb6a2 
21:56:08 ipsec,debug,packet 9cc6831b 063212a7 8bd825c0 f5be5c88 6b4dad76 5ea7310d b6d41384 38c3b970 
21:56:08 ipsec,debug,packet b6c3d22a f82560b0 1efcf616 33b7e208 692c0191 833f1b42 7c2c20cb 4fcfdce4 
21:56:08 ipsec,debug,packet 284645e5 b485137a bb787885 3fb4232b 781600b0 bf9a11dd d8ee9581 fa0b09ed 
21:56:08 ipsec,debug,packet ba8b503a 9086565e 236f812a 9e97214d c0c5fa35 405cf40b 471b9e12 0ea1cc74 
21:56:08 ipsec,debug,packet 23c17f3d 1db9e85a fcfe4f59 df9db692 cfcb5b3f e011ad52 b6a9cd7a ec03fa19 
21:56:08 ipsec,debug,packet bb0f5ddb f79d646e c0019a9b 6630f258 ea85c9b8 6102d1f5 54a39df6 203a1d77 
21:56:08 ipsec,debug,packet 14000014 302c8c48 8d445b24 9864f29c 163b015c 14000018 e22e4f39 d369e81d 
21:56:08 ipsec,debug,packet 104843a8 b8c0407c 4f8c8223 00000018 9ea2df10 37c568d2 e6bfc0c3 3704fdd8 
21:56:08 ipsec,debug,packet c0022ca7 
21:56:08 ipsec,debug begin. 
21:56:08 ipsec,debug seen nptype=4(ke) len=260 
21:56:08 ipsec,debug seen nptype=10(nonce) len=20 
21:56:08 ipsec,debug seen nptype=20(nat-d) len=24 
21:56:08 ipsec,debug seen nptype=20(nat-d) len=24 
21:56:08 ipsec,debug succeed. 
21:56:08 ipsec 155.4.242.200 Hashing 155.4.242.200[500] with algo #2  
21:56:08 ipsec,debug hash(sha1) 
21:56:08 ipsec NAT-D payload #0 verified 
21:56:08 ipsec 90.232.69.248 Hashing 90.232.69.248[500] with algo #2  
21:56:08 ipsec,debug hash(sha1) 
21:56:08 ipsec NAT-D payload #1 verified 
21:56:08 ipsec NAT not detected  
21:56:08 ipsec,debug === 
21:56:08 ipsec,debug dh(modp2048) 
21:56:08 ipsec,debug compute DH's private. 
21:56:08 ipsec,debug 48095a93 88e7ebf7 6c66115b d01d678b 56ce0369 738cf826 fc0004e6 3e4722fd 
21:56:08 ipsec,debug af287ea9 4631bb64 ac888db6 9113ed87 98cb3819 7b4e5281 5e579430 8814004e 
21:56:08 ipsec,debug 2a1a04d7 87baf8d2 c99ccbd6 ceb1cdd5 892e9157 0e35cf52 e6bf23f4 25ceed4b 
21:56:08 ipsec,debug e33aefec e642279f dd703955 b3baa335 e2973ba4 26456914 e5489b5d 1d41720f 
21:56:08 ipsec,debug 126a3dca a22884b7 aebd50c7 86b23737 45e45d30 fece063b 93467f97 0333fddf 
21:56:08 ipsec,debug 1487ed9a 8122f61c 311b9105 74152fe3 2d9bd4d9 e34abdf6 a5f81025 4b670c05 
21:56:08 ipsec,debug ff1cee24 50688c83 06374e6a 3f2a6197 1e501740 2640a019 72a25d20 5d61fcbf 
21:56:08 ipsec,debug 215dd8c4 326159ed d10a013b d8ed2985 470347dc 912949bb 2ec03cc5 c69583f3 
21:56:08 ipsec,debug compute DH's public. 
21:56:08 ipsec,debug 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8 
21:56:08 ipsec,debug be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5 
21:56:08 ipsec,debug 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77 
21:56:08 ipsec,debug 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6 
21:56:08 ipsec,debug 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a 
21:56:08 ipsec,debug eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39 
21:56:08 ipsec,debug da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47 
21:56:08 ipsec,debug a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3 
21:56:08 ipsec 90.232.69.248 Hashing 90.232.69.248[500] with algo #2  
21:56:08 ipsec,debug hash(sha1) 
21:56:08 ipsec 155.4.242.200 Hashing 155.4.242.200[500] with algo #2  
21:56:08 ipsec,debug hash(sha1) 
21:56:08 ipsec Adding remote and local NAT-D payloads. 
21:56:08 ipsec,debug add payload of len 256, next type 10 
21:56:08 ipsec,debug add payload of len 24, next type 20 
21:56:08 ipsec,debug add payload of len 20, next type 20 
21:56:08 ipsec,debug add payload of len 20, next type 0 
21:56:08 ipsec,debug 364 bytes from 155.4.242.200[500] to 90.232.69.248[500] 
21:56:08 ipsec,debug 1 times of 364 bytes message will be sent to 90.232.69.248[500] 
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 04100200 00000000 0000016c 0a000104 
21:56:08 ipsec,debug,packet 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8 
21:56:08 ipsec,debug,packet be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5 
21:56:08 ipsec,debug,packet 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77 
21:56:08 ipsec,debug,packet 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6 
21:56:08 ipsec,debug,packet 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a 
21:56:08 ipsec,debug,packet eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39 
21:56:08 ipsec,debug,packet da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47 
21:56:08 ipsec,debug,packet a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3 
21:56:08 ipsec,debug,packet 1400001c f4fbce1d 6fa4a508 6250546a a477530a f05dcda4 e044835a 14000018 
21:56:08 ipsec,debug,packet 9ea2df10 37c568d2 e6bfc0c3 3704fdd8 c0022ca7 00000018 e22e4f39 d369e81d 
21:56:08 ipsec,debug,packet 104843a8 b8c0407c 4f8c8223 
21:56:08 ipsec sent phase1 packet 155.4.242.200[500]<=>90.232.69.248[500] da16d52d848127c0:add81ce5b7d484b2 
21:56:08 ipsec,debug dh(modp2048) 
21:56:08 ipsec,debug compute DH's shared. 
21:56:08 ipsec,debug 
21:56:08 ipsec,debug 0ec88c0e 9b0956b3 e9ccdb63 210ffc22 f2e4b366 ffdfb942 9801d971 802f123a 
21:56:08 ipsec,debug f8d1a1ed 42d54e1b f77b98f1 418a7687 f0491787 1147ff4c 6f8f0ca7 61725906 
21:56:08 ipsec,debug 381b0ba3 f6b49e10 c5c2d5dd e3c36deb ee0cdbbf 2a20a617 94bdf030 c2dd0890 
21:56:08 ipsec,debug b32b12f7 c51ba6cb acd7368f 47ad88d2 c150affb eb0463d6 1b41447b eb2f23df 
21:56:08 ipsec,debug 1d703b88 c08224aa 77985914 22dc4bad 05baffac d4cd5725 60b411fe d336a99b 
21:56:08 ipsec,debug f394a26b 9220b048 6a8d39df 54564606 086a866a ea4416e1 b7511bf0 6d84b8a6 
21:56:08 ipsec,debug 39895dc2 62eb5ca7 a63584e4 dd8d0143 7cec39f1 30250732 b85646ce 3dec8bf3 
21:56:08 ipsec,debug 6ee0f192 9e8f180f 1dfeff86 bca075ac 4000e020 f4715aab 3d286283 5732ae09 
21:56:08 ipsec,debug nonce 1:  
21:56:08 ipsec,debug 302c8c48 8d445b24 9864f29c 163b015c 
21:56:08 ipsec,debug nonce 2:  
21:56:08 ipsec,debug f4fbce1d 6fa4a508 6250546a a477530a f05dcda4 e044835a 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug SKEYID computed: 
21:56:08 ipsec,debug 5aedd198 d7fcb421 f7c72f45 3b07bf8d 5566bf75 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug SKEYID_d computed: 
21:56:08 ipsec,debug f29fec94 d5bf8f76 5519f0c6 c226c4fb 79790c6f 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug SKEYID_a computed: 
21:56:08 ipsec,debug 165672d0 bee5b71c c647ebfb 0c667dd9 391f7a49 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug SKEYID_e computed: 
21:56:08 ipsec,debug 7a424565 d0dac1bc b8c547a8 f1357d87 c522d23f 
21:56:08 ipsec,debug encryption(aes) 
21:56:08 ipsec,debug hash(sha1) 
21:56:08 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...) 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug compute intermediate encryption key K1 
21:56:08 ipsec,debug 00 
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug compute intermediate encryption key K2 
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 
21:56:08 ipsec,debug 4cd0f801 88984a31 1cc5e675 ff34cedf 78547361 
21:56:08 ipsec,debug final encryption key computed: 
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:08 ipsec,debug hash(sha1) 
21:56:08 ipsec,debug encryption(aes) 
21:56:08 ipsec,debug IV computed: 
21:56:08 ipsec,debug bf30e51d 9d52b43b 2ff3bc49 3ba0d194 
21:56:08 ipsec,debug ===== received 108 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 05100201 00000000 0000006c ebdc3807 
21:56:08 ipsec,debug,packet 9ffb1788 bbfc8598 3d6ba0dd 872a84a3 1c23c2d2 fd8fc7ea c979ddc7 9160b17f 
21:56:08 ipsec,debug,packet 9cadfec4 7268e643 7d66f716 d72c4801 9d364b8a 5dbb8114 3a69e732 ab953d5b 
21:56:08 ipsec,debug,packet 59260fd8 23fc3476 32ad3c36 
21:56:08 ipsec,debug encryption(aes) 
21:56:08 ipsec,debug IV was saved for next processing: 
21:56:08 ipsec,debug ab953d5b 59260fd8 23fc3476 32ad3c36 
21:56:08 ipsec,debug encryption(aes) 
21:56:08 ipsec,debug with key: 
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:08 ipsec,debug decrypted payload by IV: 
21:56:08 ipsec,debug bf30e51d 9d52b43b 2ff3bc49 3ba0d194 
21:56:08 ipsec,debug decrypted payload, but not trimed. 
21:56:08 ipsec,debug 0800000c 011101f4 5ae845f8 0b000018 3fee1622 0c001d53 904f446d 539bc6ed 
21:56:08 ipsec,debug f12309b1 0000001c 00000001 01106002 da16d52d 848127c0 add81ce5 b7d484b2 
21:56:08 ipsec,debug 00000000 00000000 00000000 00000010 
21:56:08 ipsec,debug padding len=17 
21:56:08 ipsec,debug skip to trim padding. 
21:56:08 ipsec,debug decrypted. 
21:56:08 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 05100201 00000000 0000006c 0800000c 
21:56:08 ipsec,debug 011101f4 5ae845f8 0b000018 3fee1622 0c001d53 904f446d 539bc6ed f12309b1 
21:56:08 ipsec,debug 0000001c 00000001 01106002 da16d52d 848127c0 add81ce5 b7d484b2 00000000 
21:56:08 ipsec,debug 00000000 00000000 00000010 
21:56:08 ipsec,debug begin. 
21:56:08 ipsec,debug seen nptype=5(id) len=12 
21:56:08 ipsec,debug seen nptype=8(hash) len=24 
21:56:08 ipsec,debug seen nptype=11(notify) len=28 
21:56:08 ipsec,debug succeed. 
21:56:08 ipsec,debug 90.232.69.248 Notify Message received 
21:56:08 ipsec 90.232.69.248 ignore INITIAL-CONTACT notification, because it is only accepted after phase1. 
21:56:08 ipsec,debug HASH received: 
21:56:08 ipsec,debug 3fee1622 0c001d53 904f446d 539bc6ed f12309b1 
21:56:08 ipsec,debug HASH with: 
21:56:08 ipsec,debug 4364074e efbda155 838a22c9 2965fc64 e5638b13 541678d0 5dd5b31f 2801ea39 
21:56:08 ipsec,debug 1aa37991 c5eb3b8b c378f62b bbfa49e0 0c648b47 7f25d714 d8b9c48f 748cb6a2 
21:56:08 ipsec,debug 9cc6831b 063212a7 8bd825c0 f5be5c88 6b4dad76 5ea7310d b6d41384 38c3b970 
21:56:08 ipsec,debug b6c3d22a f82560b0 1efcf616 33b7e208 692c0191 833f1b42 7c2c20cb 4fcfdce4 
21:56:08 ipsec,debug 284645e5 b485137a bb787885 3fb4232b 781600b0 bf9a11dd d8ee9581 fa0b09ed 
21:56:08 ipsec,debug ba8b503a 9086565e 236f812a 9e97214d c0c5fa35 405cf40b 471b9e12 0ea1cc74 
21:56:08 ipsec,debug 23c17f3d 1db9e85a fcfe4f59 df9db692 cfcb5b3f e011ad52 b6a9cd7a ec03fa19 
21:56:08 ipsec,debug bb0f5ddb f79d646e c0019a9b 6630f258 ea85c9b8 6102d1f5 54a39df6 203a1d77 
21:56:08 ipsec,debug 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8 
21:56:08 ipsec,debug be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5 
21:56:08 ipsec,debug 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77 
21:56:08 ipsec,debug 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6 
21:56:08 ipsec,debug 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a 
21:56:08 ipsec,debug eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39 
21:56:08 ipsec,debug da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47 
21:56:08 ipsec,debug a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3 
21:56:08 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 00000001 00000001 000001f8 0101000e 
21:56:08 ipsec,debug 03000024 01010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
21:56:08 ipsec,debug 8004000e 03000024 02010000 800b0001 800c0e10 80010007 800e0100 80030001 
21:56:08 ipsec,debug 80020002 8004000e 03000024 03010000 800b0001 800c0e10 80010007 800e0100 
21:56:08 ipsec,debug 80030001 80020001 8004000e 03000024 04010000 800b0001 800c0e10 80010007 
21:56:08 ipsec,debug 800e0100 80030001 80020006 8004000e 03000024 05010000 800b0001 800c0e10 
21:56:08 ipsec,debug 80010007 800e0100 80030001 80020004 80040005 03000024 06010000 800b0001 
21:56:08 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020002 80040005 03000024 07010000 
21:56:08 ipsec,debug 800b0001 800c0e10 80010007 800e0100 80030001 80020001 80040005 03000024 
21:56:08 ipsec,debug 08010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 80040002 
21:56:08 ipsec,debug 03000024 09010000 800b0001 800c0e10 80010007 800e0100 80030001 80020002 
21:56:08 ipsec,debug 80040002 03000024 0a010000 800b0001 800c0e10 80010007 800e0100 80030001 
21:56:08 ipsec,debug 80020001 80040002 03000024 0b010000 800b0001 800c0e10 80010007 800e0080 
21:56:08 ipsec,debug 80030001 80020002 80040002 03000024 0c010000 800b0001 800c0e10 80010007 
21:56:08 ipsec,debug 800e0080 80030001 80020001 80040002 03000020 0d010000 800b0001 800c0e10 
21:56:08 ipsec,debug 80010005 80030001 80020002 80040002 00000020 0e010000 800b0001 800c0e10 
21:56:08 ipsec,debug 80010005 80030001 80020001 80040002 011101f4 5ae845f8 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug HASH computed: 
21:56:08 ipsec,debug 3fee1622 0c001d53 904f446d 539bc6ed f12309b1 
21:56:08 ipsec,debug HASH for PSK validated. 
21:56:08 ipsec,debug 90.232.69.248 peer's ID 
21:56:08 ipsec,debug 011101f4 5ae845f8 
21:56:08 ipsec,debug === 
21:56:08 ipsec,debug use ID type of IPv4_address 
21:56:08 ipsec,debug generate HASH_R 
21:56:08 ipsec,debug HASH with: 
21:56:08 ipsec,debug 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8 
21:56:08 ipsec,debug be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5 
21:56:08 ipsec,debug 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77 
21:56:08 ipsec,debug 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6 
21:56:08 ipsec,debug 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a 
21:56:08 ipsec,debug eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39 
21:56:08 ipsec,debug da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47 
21:56:08 ipsec,debug a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3 
21:56:08 ipsec,debug 4364074e efbda155 838a22c9 2965fc64 e5638b13 541678d0 5dd5b31f 2801ea39 
21:56:08 ipsec,debug 1aa37991 c5eb3b8b c378f62b bbfa49e0 0c648b47 7f25d714 d8b9c48f 748cb6a2 
21:56:08 ipsec,debug 9cc6831b 063212a7 8bd825c0 f5be5c88 6b4dad76 5ea7310d b6d41384 38c3b970 
21:56:08 ipsec,debug b6c3d22a f82560b0 1efcf616 33b7e208 692c0191 833f1b42 7c2c20cb 4fcfdce4 
21:56:08 ipsec,debug 284645e5 b485137a bb787885 3fb4232b 781600b0 bf9a11dd d8ee9581 fa0b09ed 
21:56:08 ipsec,debug ba8b503a 9086565e 236f812a 9e97214d c0c5fa35 405cf40b 471b9e12 0ea1cc74 
21:56:08 ipsec,debug 23c17f3d 1db9e85a fcfe4f59 df9db692 cfcb5b3f e011ad52 b6a9cd7a ec03fa19 
21:56:08 ipsec,debug bb0f5ddb f79d646e c0019a9b 6630f258 ea85c9b8 6102d1f5 54a39df6 203a1d77 
21:56:08 ipsec,debug add81ce5 b7d484b2 da16d52d 848127c0 00000001 00000001 000001f8 0101000e 
21:56:08 ipsec,debug 03000024 01010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 
21:56:08 ipsec,debug 8004000e 03000024 02010000 800b0001 800c0e10 80010007 800e0100 80030001 
21:56:08 ipsec,debug 80020002 8004000e 03000024 03010000 800b0001 800c0e10 80010007 800e0100 
21:56:08 ipsec,debug 80030001 80020001 8004000e 03000024 04010000 800b0001 800c0e10 80010007 
21:56:08 ipsec,debug 800e0100 80030001 80020006 8004000e 03000024 05010000 800b0001 800c0e10 
21:56:08 ipsec,debug 80010007 800e0100 80030001 80020004 80040005 03000024 06010000 800b0001 
21:56:08 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020002 80040005 03000024 07010000 
21:56:08 ipsec,debug 800b0001 800c0e10 80010007 800e0100 80030001 80020001 80040005 03000024 
21:56:08 ipsec,debug 08010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 80040002 
21:56:08 ipsec,debug 03000024 09010000 800b0001 800c0e10 80010007 800e0100 80030001 80020002 
21:56:08 ipsec,debug 80040002 03000024 0a010000 800b0001 800c0e10 80010007 800e0100 80030001 
21:56:08 ipsec,debug 80020001 80040002 03000024 0b010000 800b0001 800c0e10 80010007 800e0080 
21:56:08 ipsec,debug 80030001 80020002 80040002 03000024 0c010000 800b0001 800c0e10 80010007 
21:56:08 ipsec,debug 800e0080 80030001 80020001 80040002 03000020 0d010000 800b0001 800c0e10 
21:56:08 ipsec,debug 80010005 80030001 80020002 80040002 00000020 0e010000 800b0001 800c0e10 
21:56:08 ipsec,debug 80010005 80030001 80020001 80040002 011101f4 9b04f2c8 
21:56:08 ipsec,debug hmac(hmac_sha1) 
21:56:08 ipsec,debug HASH computed: 
21:56:08 ipsec,debug ebecd66d 953550a7 7d303138 b63d83a1 fa6657be 
21:56:08 ipsec,debug add payload of len 8, next type 8 
21:56:08 ipsec,debug add payload of len 20, next type 0 
21:56:08 ipsec,debug begin encryption. 
21:56:08 ipsec,debug encryption(aes) 
21:56:08 ipsec,debug pad length = 12 
21:56:08 ipsec,debug 0800000c 011101f4 9b04f2c8 00000018 ebecd66d 953550a7 7d303138 b63d83a1 
21:56:08 ipsec,debug fa6657be 1053fa9d 04e0b9e7 530a620b 
21:56:08 ipsec,debug encryption(aes) 
21:56:08 ipsec,debug with key: 
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:08 ipsec,debug encrypted payload by IV: 
21:56:08 ipsec,debug ab953d5b 59260fd8 23fc3476 32ad3c36 
21:56:08 ipsec,debug save IV for next: 
21:56:08 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 
21:56:08 ipsec,debug encrypted. 
21:56:08 ipsec,debug 76 bytes from 155.4.242.200[500] to 90.232.69.248[500] 
21:56:08 ipsec,debug 1 times of 76 bytes message will be sent to 90.232.69.248[500] 
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 05100201 00000000 0000004c 4a538398 
21:56:08 ipsec,debug,packet 46fd4e23 e7018b99 0df3b714 16a4a523 a0304ba4 92dfcce5 9d04ad08 cd8192cd 
21:56:08 ipsec,debug,packet 01200b4f 8e6cf81b b9626e33 
21:56:08 ipsec,info ISAKMP-SA established 155.4.242.200[500]-90.232.69.248[500] spi:da16d52d848127c0:add81ce5b7d484b2 
21:56:08 ipsec,debug === 
21:56:09 ipsec,debug ===== received 284 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:09 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000011c f3d6f35a 
21:56:09 ipsec,debug,packet d6e083b9 dffa6f2e e374fdc5 9a75bece d6f9fb43 f354af41 cc6d847a faff050f 
21:56:09 ipsec,debug,packet d9905047 8edb6a86 8063cb5b a56be435 a115a079 6cb80aa5 9000264e 4cabe7d3 
21:56:09 ipsec,debug,packet 81667e65 b0286ebf 9d7f3643 bda17716 4ffb9406 868dbae6 214778c1 83261353 
21:56:09 ipsec,debug,packet 44774730 b2223bb5 bc65c540 2f68089a 71b4d484 496725c5 a2c88129 78c7dae9 
21:56:09 ipsec,debug,packet 947bd3f7 a733d717 f2286337 9df02fd0 d5f47e59 4c2398cd a04745c4 ea08df61 
21:56:09 ipsec,debug,packet d47ba444 17ad5aea 9a379c1d 7f8282f5 92265420 851567d3 e8ffa40f 54372e40 
21:56:09 ipsec,debug,packet dbeb2004 0398b573 7100fa3f 0cd0f9b3 c2fe6e98 867513bd a3ae43a0 40fd927f 
21:56:09 ipsec,debug,packet 6702da05 cbd1e9ca 51dcf9e2 89120f1f a7790f4e 7d63c136 80526c8a 
21:56:09 ipsec,debug compute IV for phase2 
21:56:09 ipsec,debug phase1 last IV: 
21:56:09 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 ce8971bc 
21:56:09 ipsec,debug hash(sha1) 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug phase2 IV computed: 
21:56:09 ipsec,debug d1eb42e6 c211c135 1293cc17 fee784fd 
21:56:09 ipsec,debug === 
21:56:09 ipsec respond new phase 2 negotiation: 155.4.242.200[500]<=>90.232.69.248[500] 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug IV was saved for next processing: 
21:56:09 ipsec,debug 89120f1f a7790f4e 7d63c136 80526c8a 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug with key: 
21:56:09 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:09 ipsec,debug decrypted payload by IV: 
21:56:09 ipsec,debug d1eb42e6 c211c135 1293cc17 fee784fd 
21:56:09 ipsec,debug decrypted payload, but not trimed. 
21:56:09 ipsec,debug 01000018 da323051 0201b2d6 4645548a 7bc14287 c0129f4a 0a0000b8 00000001 
21:56:09 ipsec,debug 00000001 000000ac 01030406 02f249f0 0300001c 010c0000 80010001 80020e10 
21:56:09 ipsec,debug 80040002 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040002 
21:56:09 ipsec,debug 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040002 80060080 
21:56:09 ipsec,debug 80050002 0300001c 040c0000 80010001 80020e10 80040002 80060080 80050001 
21:56:09 ipsec,debug 03000018 05030000 80010001 80020e10 80040002 80050002 00000018 06030000 
21:56:09 ipsec,debug 80010001 80020e10 80040002 80050001 05000014 219a6f54 91595220 588ddf53 
21:56:09 ipsec,debug d15840ab 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8 00000004 
21:56:09 ipsec,debug padding len=5 
21:56:09 ipsec,debug skip to trim padding. 
21:56:09 ipsec,debug decrypted. 
21:56:09 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000011c 01000018 
21:56:09 ipsec,debug da323051 0201b2d6 4645548a 7bc14287 c0129f4a 0a0000b8 00000001 00000001 
21:56:09 ipsec,debug 000000ac 01030406 02f249f0 0300001c 010c0000 80010001 80020e10 80040002 
21:56:09 ipsec,debug 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040002 80060100 
21:56:09 ipsec,debug 80050001 0300001c 030c0000 80010001 80020e10 80040002 80060080 80050002 
21:56:09 ipsec,debug 0300001c 040c0000 80010001 80020e10 80040002 80060080 80050001 03000018 
21:56:09 ipsec,debug 05030000 80010001 80020e10 80040002 80050002 00000018 06030000 80010001 
21:56:09 ipsec,debug 80020e10 80040002 80050001 05000014 219a6f54 91595220 588ddf53 d15840ab 
21:56:09 ipsec,debug 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8 00000004 
21:56:09 ipsec,debug begin. 
21:56:09 ipsec,debug seen nptype=8(hash) len=24 
21:56:09 ipsec,debug seen nptype=1(sa) len=184 
21:56:09 ipsec,debug seen nptype=10(nonce) len=20 
21:56:09 ipsec,debug seen nptype=5(id) len=12 
21:56:09 ipsec,debug seen nptype=5(id) len=12 
21:56:09 ipsec,debug succeed. 
21:56:09 ipsec,debug received IDci2: 
21:56:09 ipsec,debug 0111f25a 5ae845f8 
21:56:09 ipsec,debug received IDcr2: 
21:56:09 ipsec,debug 011106a5 9b04f2c8 
21:56:09 ipsec,debug HASH(1) validate: 
21:56:09 ipsec,debug da323051 0201b2d6 4645548a 7bc14287 c0129f4a 
21:56:09 ipsec,debug HASH with: 
21:56:09 ipsec,debug ce8971bc 0a0000b8 00000001 00000001 000000ac 01030406 02f249f0 0300001c 
21:56:09 ipsec,debug 010c0000 80010001 80020e10 80040002 80060100 80050002 0300001c 020c0000 
21:56:09 ipsec,debug 80010001 80020e10 80040002 80060100 80050001 0300001c 030c0000 80010001 
21:56:09 ipsec,debug 80020e10 80040002 80060080 80050002 0300001c 040c0000 80010001 80020e10 
21:56:09 ipsec,debug 80040002 80060080 80050001 03000018 05030000 80010001 80020e10 80040002 
21:56:09 ipsec,debug 80050002 00000018 06030000 80010001 80020e10 80040002 80050001 05000014 
21:56:09 ipsec,debug 219a6f54 91595220 588ddf53 d15840ab 0500000c 0111f25a 5ae845f8 0000000c 
21:56:09 ipsec,debug 011106a5 9b04f2c8 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug HASH computed: 
21:56:09 ipsec,debug da323051 0201b2d6 4645548a 7bc14287 c0129f4a 
21:56:09 ipsec,debug total SA len=180 
21:56:09 ipsec,debug 00000001 00000001 000000ac 01030406 02f249f0 0300001c 010c0000 80010001 
21:56:09 ipsec,debug 80020e10 80040002 80060100 80050002 0300001c 020c0000 80010001 80020e10 
21:56:09 ipsec,debug 80040002 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040002 
21:56:09 ipsec,debug 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040002 80060080 
21:56:09 ipsec,debug 80050001 03000018 05030000 80010001 80020e10 80040002 80050002 00000018 
21:56:09 ipsec,debug 06030000 80010001 80020e10 80040002 80050001 
21:56:09 ipsec,debug begin. 
21:56:09 ipsec,debug seen nptype=2(prop) len=172 
21:56:09 ipsec,debug succeed. 
21:56:09 ipsec,debug proposal #1 len=172 
21:56:09 ipsec,debug begin. 
21:56:09 ipsec,debug seen nptype=3(trns) len=28 
21:56:09 ipsec,debug seen nptype=3(trns) len=28 
21:56:09 ipsec,debug seen nptype=3(trns) len=28 
21:56:09 ipsec,debug seen nptype=3(trns) len=28 
21:56:09 ipsec,debug seen nptype=3(trns) len=24 
21:56:09 ipsec,debug seen nptype=3(trns) len=24 
21:56:09 ipsec,debug succeed. 
21:56:09 ipsec,debug transform #1 len=28 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug transform #2 len=28 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
21:56:09 ipsec,debug transform #3 len=28 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug transform #4 len=28 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
21:56:09 ipsec,debug transform #5 len=24 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug transform #6 len=24 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
21:56:09 ipsec,debug pair 1: 
21:56:09 ipsec,debug  0x4915c0: next=(nil) tnext=0x4915d8 
21:56:09 ipsec,debug   0x4915d8: next=(nil) tnext=0x492ba8 
21:56:09 ipsec,debug    0x492ba8: next=(nil) tnext=0x492bc0 
21:56:09 ipsec,debug     0x492bc0: next=(nil) tnext=0x48d3b8 
21:56:09 ipsec,debug      0x48d3b8: next=(nil) tnext=0x48d3d0 
21:56:09 ipsec,debug       0x48d3d0: next=(nil) tnext=(nil) 
21:56:09 ipsec,debug proposal #1: 6 transform 
21:56:09 ipsec,debug got the local address from ID payload 155.4.242.200[1701] prefixlen=32 ul_proto=17 
21:56:09 ipsec,debug got the peer address from ID payload 90.232.69.248[62042] prefixlen=32 ul_proto=17 
21:56:09 ipsec,debug updating policy address because of NAT in transport mode 
21:56:09 ipsec searching for policy for selector: 155.4.242.200:1701 ip-proto:17 <=> 90.232.69.248:62042 ip-proto:17 
21:56:09 ipsec generating policy 
21:56:09 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=18:18) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
21:56:09 ipsec,debug begin compare proposals. 
21:56:09 ipsec,debug pair[1]: 0x4915c0 
21:56:09 ipsec,debug  0x4915c0: next=(nil) tnext=0x4915d8 
21:56:09 ipsec,debug   0x4915d8: next=(nil) tnext=0x492ba8 
21:56:09 ipsec,debug    0x492ba8: next=(nil) tnext=0x492bc0 
21:56:09 ipsec,debug     0x492bc0: next=(nil) tnext=0x48d3b8 
21:56:09 ipsec,debug      0x48d3b8: next=(nil) tnext=0x48d3d0 
21:56:09 ipsec,debug       0x48d3d0: next=(nil) tnext=(nil) 
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=1 trns-id=AES-CBC 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=2 trns-id=AES-CBC 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=3 trns-id=AES-CBC 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=4 trns-id=AES-CBC 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=5 trns-id=3DES 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=6 trns-id=3DES 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5 
21:56:09 ipsec,debug peer's single bundle: 
21:56:09 ipsec,debug  (proto_id=ESP spisize=4 spi=02f249f0 spi_p=00000000 encmode=Transport reqid=0:0) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=256 authtype=hmac-md5) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-md5) 
21:56:09 ipsec,debug   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=3DES encklen=0 authtype=hmac-md5) 
21:56:09 ipsec,debug my single bundle: 
21:56:09 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=18:18) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
21:56:09 ipsec,debug   (trns_id=3DES encklen=0 authtype=hmac-sha1) 
21:56:09 ipsec,debug matched 
21:56:09 ipsec,debug === 
21:56:09 ipsec,debug call pfkey_send_getspi e3b64c17 
21:56:09 ipsec,debug pfkey GETSPI sent: ESP/Transport 90.232.69.248[500]->155.4.242.200[500]  
21:56:09 ipsec,debug pfkey getspi sent. 
21:56:09 ipsec,debug total SA len=48 
21:56:09 ipsec,debug 00000001 00000001 00000028 01030401 00000000 0000001c 010c0000 80010001 
21:56:09 ipsec,debug 80020e10 80040002 80060100 80050002 
21:56:09 ipsec,debug begin. 
21:56:09 ipsec,debug seen nptype=2(prop) len=40 
21:56:09 ipsec,debug succeed. 
21:56:09 ipsec,debug proposal #1 len=40 
21:56:09 ipsec,debug begin. 
21:56:09 ipsec,debug seen nptype=3(trns) len=28 
21:56:09 ipsec,debug succeed. 
21:56:09 ipsec,debug transform #1 len=28 
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
21:56:09 ipsec,debug life duration was in TLV. 
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport 
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256 
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
21:56:09 ipsec,debug pair 1: 
21:56:09 ipsec,debug  0x48d700: next=(nil) tnext=(nil) 
21:56:09 ipsec,debug proposal #1: 1 transform 
21:56:09 ipsec,debug add payload of len 48, next type 10 
21:56:09 ipsec,debug add payload of len 24, next type 5 
21:56:09 ipsec,debug add payload of len 8, next type 5 
21:56:09 ipsec,debug add payload of len 8, next type 0 
21:56:09 ipsec,debug HASH with: 
21:56:09 ipsec,debug ce8971bc 219a6f54 91595220 588ddf53 d15840ab 0a000034 00000001 00000001 
21:56:09 ipsec,debug 00000028 01030401 09952a46 0000001c 010c0000 80010001 80020e10 80040002 
21:56:09 ipsec,debug 80060100 80050002 0500001c 8fb8ad84 4655ae2c 37540269 38b3c962 d85afced 
21:56:09 ipsec,debug 83514608 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug HASH computed: 
21:56:09 ipsec,debug 89a3ca05 1f7ef350 a70f8a0d 62ef7275 61633617 
21:56:09 ipsec,debug add payload of len 20, next type 1 
21:56:09 ipsec,debug begin encryption. 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug pad length = 16 
21:56:09 ipsec,debug 01000018 89a3ca05 1f7ef350 a70f8a0d 62ef7275 61633617 0a000034 00000001 
21:56:09 ipsec,debug 00000001 00000028 01030401 09952a46 0000001c 010c0000 80010001 80020e10 
21:56:09 ipsec,debug 80040002 80060100 80050002 0500001c 8fb8ad84 4655ae2c 37540269 38b3c962 
21:56:09 ipsec,debug d85afced 83514608 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8 
21:56:09 ipsec,debug 2a174692 290dd28a 908157e2 c596650f 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug with key: 
21:56:09 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:09 ipsec,debug encrypted payload by IV: 
21:56:09 ipsec,debug 89120f1f a7790f4e 7d63c136 80526c8a 
21:56:09 ipsec,debug save IV for next: 
21:56:09 ipsec,debug 09edb7ab 026c1bba 12bc71d5 af08d6b1 
21:56:09 ipsec,debug encrypted. 
21:56:09 ipsec,debug 172 bytes from 155.4.242.200[500] to 90.232.69.248[500] 
21:56:09 ipsec,debug 1 times of 172 bytes message will be sent to 90.232.69.248[500] 
21:56:09 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 000000ac 7e3e0504 
21:56:09 ipsec,debug,packet ff27f6cc 2eb8420d 9efd34d8 a1264812 18810340 1ca13dea 390bfdc1 904b2c9e 
21:56:09 ipsec,debug,packet 894802cb c64b7b6f 19cb0a98 d5e59353 a7bf4533 9c00ade3 c8aa316d 4010d9f0 
21:56:09 ipsec,debug,packet de805eed 524c56d9 58dae284 054343a2 dd43053a 1ec30c03 26115278 7214325d 
21:56:09 ipsec,debug,packet ff1b17b2 a5d42e11 7b78ae2d ab2bf6ce ecd86017 6760392e 493c232a 09edb7ab 
21:56:09 ipsec,debug,packet 026c1bba 12bc71d5 af08d6b1 
21:56:09 ipsec sent phase2 packet 155.4.242.200[500]<=>90.232.69.248[500] da16d52d848127c0:add81ce5b7d484b2:ce8971bc 
21:56:09 ipsec,debug ===== received 60 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:09 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000003c f3c6c642 
21:56:09 ipsec,debug,packet 71a02d69 67efda2d fd5321c6 6aa2e73e 12306cca 4cba5f73 4d1c05ea 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug IV was saved for next processing: 
21:56:09 ipsec,debug 6aa2e73e 12306cca 4cba5f73 4d1c05ea 
21:56:09 ipsec,debug encryption(aes) 
21:56:09 ipsec,debug with key: 
21:56:09 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:09 ipsec,debug decrypted payload by IV: 
21:56:09 ipsec,debug 09edb7ab 026c1bba 12bc71d5 af08d6b1 
21:56:09 ipsec,debug decrypted payload, but not trimed. 
21:56:09 ipsec,debug 00000018 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf 00000000 00000008 
21:56:09 ipsec,debug padding len=9 
21:56:09 ipsec,debug skip to trim padding. 
21:56:09 ipsec,debug decrypted. 
21:56:09 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000003c 00000018 
21:56:09 ipsec,debug 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf 00000000 00000008 
21:56:09 ipsec,debug begin. 
21:56:09 ipsec,debug seen nptype=8(hash) len=24 
21:56:09 ipsec,debug succeed. 
21:56:09 ipsec,debug HASH(3) validate: 
21:56:09 ipsec,debug 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf 
21:56:09 ipsec,debug HASH with:  
21:56:09 ipsec,debug 00ce8971 bc219a6f 54915952 20588ddf 53d15840 ab8fb8ad 844655ae 2c375402 
21:56:09 ipsec,debug 6938b3c9 62d85afc ed835146 08 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug HASH computed: 
21:56:09 ipsec,debug 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf 
21:56:09 ipsec,debug === 
21:56:09 ipsec,debug KEYMAT compute with 
21:56:09 ipsec,debug 0309952a 46219a6f 54915952 20588ddf 53d15840 ab8fb8ad 844655ae 2c375402 
21:56:09 ipsec,debug 6938b3c9 62d85afc ed835146 08 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug encryption(aes-cbc) 
21:56:09 ipsec,debug hmac(sha1) 
21:56:09 ipsec,debug encklen=256 authklen=160 
21:56:09 ipsec,debug generating 640 bits of key (dupkeymat=4) 
21:56:09 ipsec,debug generating K1...K4 for KEYMAT. 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug 704b2e74 ba2d7f9f 20fe1e47 d05f4e0d 15064acf 440b65f3 3d387efb d162bd5c 
21:56:09 ipsec,debug 5b5e8388 9825a0f5 0e8c9ad3 c4e33a60 834b5cc2 1124e341 d9f4a4f6 7bec443d 
21:56:09 ipsec,debug d9f4e6d4 b37bdd76 63a01239 a30e5136 
21:56:09 ipsec,debug KEYMAT compute with 
21:56:09 ipsec,debug 0302f249 f0219a6f 54915952 20588ddf 53d15840 ab8fb8ad 844655ae 2c375402 
21:56:09 ipsec,debug 6938b3c9 62d85afc ed835146 08 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug encryption(aes-cbc) 
21:56:09 ipsec,debug hmac(sha1) 
21:56:09 ipsec,debug encklen=256 authklen=160 
21:56:09 ipsec,debug generating 640 bits of key (dupkeymat=4) 
21:56:09 ipsec,debug generating K1...K4 for KEYMAT. 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug hmac(hmac_sha1) 
21:56:09 ipsec,debug 0b604b87 38e81df3 535265b0 0f9639d8 bb08572d 425e9d64 dd9e1458 80d5c96f 
21:56:09 ipsec,debug 6780099f 821c5a91 34811eb2 928d29fb 01ae2949 f02c0328 32375f6b d8746806 
21:56:09 ipsec,debug 1d2e15db 7d65e647 1099cbd2 1ad82dd1 
21:56:09 ipsec,debug KEYMAT computed. 
21:56:09 ipsec,debug call pk_sendupdate 
21:56:09 ipsec,debug encryption(aes-cbc) 
21:56:09 ipsec,debug hmac(sha1) 
21:56:09 ipsec,debug call pfkey_send_update_nat 
21:56:09 ipsec IPsec-SA established: ESP/Transport 90.232.69.248[500]->155.4.242.200[500] spi=0x9952a46 
21:56:09 ipsec,debug pfkey update sent. 
21:56:09 ipsec,debug encryption(aes-cbc) 
21:56:09 ipsec,debug hmac(sha1) 
21:56:09 ipsec,debug call pfkey_send_add_nat 
21:56:09 ipsec IPsec-SA established: ESP/Transport 155.4.242.200[500]->90.232.69.248[500] spi=0x2f249f0 
21:56:09 ipsec,debug pfkey add sent. 
21:56:19 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500] 
21:56:19 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500] 
21:56:19 ipsec,debug,packet ff 
21:56:29 ipsec,debug ===== received 76 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:29 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08100501 0e0639e6 0000004c d0ed5309 
21:56:29 ipsec,debug,packet 9c91abbb 6fbdfb9e 9bb906dd 0aa8d3b4 820567d5 4828072c 900f38f3 de8597d0 
21:56:29 ipsec,debug,packet f3e73974 d6bffb9d 12858714 
21:56:29 ipsec,debug receive Information. 
21:56:29 ipsec,debug compute IV for phase2 
21:56:29 ipsec,debug phase1 last IV: 
21:56:29 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 0e0639e6 
21:56:29 ipsec,debug hash(sha1) 
21:56:29 ipsec,debug encryption(aes) 
21:56:29 ipsec,debug phase2 IV computed: 
21:56:29 ipsec,debug 34af0279 f5ea8525 cf115387 5d08d155 
21:56:29 ipsec,debug encryption(aes) 
21:56:29 ipsec,debug IV was saved for next processing: 
21:56:29 ipsec,debug de8597d0 f3e73974 d6bffb9d 12858714 
21:56:29 ipsec,debug encryption(aes) 
21:56:29 ipsec,debug with key: 
21:56:29 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:29 ipsec,debug decrypted payload by IV: 
21:56:29 ipsec,debug 34af0279 f5ea8525 cf115387 5d08d155 
21:56:29 ipsec,debug decrypted payload, but not trimed. 
21:56:29 ipsec,debug 0c000018 44fd457c 47fd1a59 db7d7ea8 d4db4960 2f9b83b7 00000010 00000001 
21:56:29 ipsec,debug 03040001 02f249f0 00000000 00000008 
21:56:29 ipsec,debug padding len=9 
21:56:29 ipsec,debug skip to trim padding. 
21:56:29 ipsec,debug decrypted. 
21:56:29 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08100501 0e0639e6 0000004c 0c000018 
21:56:29 ipsec,debug 44fd457c 47fd1a59 db7d7ea8 d4db4960 2f9b83b7 00000010 00000001 03040001 
21:56:29 ipsec,debug 02f249f0 00000000 00000008 
21:56:29 ipsec,debug HASH with: 
21:56:29 ipsec,debug 0e0639e6 00000010 00000001 03040001 02f249f0 
21:56:29 ipsec,debug hmac(hmac_sha1) 
21:56:29 ipsec,debug HASH computed: 
21:56:29 ipsec,debug 44fd457c 47fd1a59 db7d7ea8 d4db4960 2f9b83b7 
21:56:29 ipsec,debug hash validated. 
21:56:29 ipsec,debug begin. 
21:56:29 ipsec,debug seen nptype=8(hash) len=24 
21:56:29 ipsec,debug seen nptype=12(delete) len=16 
21:56:29 ipsec,debug succeed. 
21:56:29 ipsec,debug 90.232.69.248 delete payload for protocol ESP 
21:56:29 ipsec purged IPsec-SA proto_id=ESP spi=0x2f249f0 
21:56:29 ipsec purged IPsec-SA proto_id=ESP spi=0x9952a46 
21:56:29 ipsec,debug an undead schedule has been deleted. 
21:56:29 ipsec removing generated policy 
21:56:29 ipsec,debug purged SAs. 
21:56:29 ipsec,debug ===== received 92 bytes from 90.232.69.248[500] to 155.4.242.200[500] 
21:56:29 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08100501 401ad7b8 0000005c 21cbd512 
21:56:29 ipsec,debug,packet 6391696c f89b4c90 46f15f97 a786fe30 9a0e6411 86fcaa86 2a96476e fa106e70 
21:56:29 ipsec,debug,packet 7a10ab1a 29c0ed71 85d4e403 07a3fa14 1373509f 58e4f366 4c311c16 
21:56:29 ipsec,debug receive Information. 
21:56:29 ipsec,debug compute IV for phase2 
21:56:29 ipsec,debug phase1 last IV: 
21:56:29 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 401ad7b8 
21:56:29 ipsec,debug hash(sha1) 
21:56:29 ipsec,debug encryption(aes) 
21:56:29 ipsec,debug phase2 IV computed: 
21:56:29 ipsec,debug dbe20280 12ec089d 7f9165ac 5e071da0 
21:56:29 ipsec,debug encryption(aes) 
21:56:29 ipsec,debug IV was saved for next processing: 
21:56:29 ipsec,debug 07a3fa14 1373509f 58e4f366 4c311c16 
21:56:29 ipsec,debug encryption(aes) 
21:56:29 ipsec,debug with key: 
21:56:29 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675 
21:56:29 ipsec,debug decrypted payload by IV: 
21:56:29 ipsec,debug dbe20280 12ec089d 7f9165ac 5e071da0 
21:56:29 ipsec,debug decrypted payload, but not trimed. 
21:56:29 ipsec,debug 0c000018 495a1b37 8e27749a b66e3ef2 76352ef1 bc356e52 0000001c 00000001 
21:56:29 ipsec,debug 01100001 da16d52d 848127c0 add81ce5 b7d484b2 00000000 00000000 0000000c 
21:56:29 ipsec,debug padding len=13 
21:56:29 ipsec,debug skip to trim padding. 
21:56:29 ipsec,debug decrypted. 
21:56:29 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08100501 401ad7b8 0000005c 0c000018 
21:56:29 ipsec,debug 495a1b37 8e27749a b66e3ef2 76352ef1 bc356e52 0000001c 00000001 01100001 
21:56:29 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 00000000 00000000 0000000c 
21:56:29 ipsec,debug HASH with: 
21:56:29 ipsec,debug 401ad7b8 0000001c 00000001 01100001 da16d52d 848127c0 add81ce5 b7d484b2 
21:56:29 ipsec,debug hmac(hmac_sha1) 
21:56:29 ipsec,debug HASH computed: 
21:56:29 ipsec,debug 495a1b37 8e27749a b66e3ef2 76352ef1 bc356e52 
21:56:29 ipsec,debug hash validated. 
21:56:29 ipsec,debug begin. 
21:56:29 ipsec,debug seen nptype=8(hash) len=24 
21:56:29 ipsec,debug seen nptype=12(delete) len=28 
21:56:29 ipsec,debug succeed. 
21:56:29 ipsec,debug 90.232.69.248 delete payload for protocol ISAKMP 
21:56:29 ipsec,info purging ISAKMP-SA 155.4.242.200[500]<=>90.232.69.248[500] spi=da16d52d848127c0:add81ce5b7d484b2. 
21:56:29 ipsec purged ISAKMP-SA 155.4.242.200[500]<=>90.232.69.248[500] spi=da16d52d848127c0:add81ce5b7d484b2. 
21:56:29 ipsec,debug purged SAs. 
21:56:29 ipsec,info ISAKMP-SA deleted 155.4.242.200[500]-90.232.69.248[500] spi:da16d52d848127c0:add81ce5b7d484b2 rekey:1 
21:56:29 ipsec,debug an undead schedule has been deleted. 
21:56:39 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500] 
21:56:39 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500] 
21:56:39 ipsec,debug,packet ff 
21:56:58 system,info,account user admin logged in from 192.168.0.116 via telnet 
21:56:59 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500] 
21:56:59 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500] 
21:56:59 ipsec,debug,packet ff