I’ve been trying to setup a VPN server with my 960PGS. It works well with my win 10 client, but my iOS devices refuse to connect.
Anyone able to tell what is wrong?
I’m a rookie as you might see from the setup, but trying to learn…
Config
# oct/10/2018 22:12:29 by RouterOS 6.41.3
# software id = VA69-1QBV
#
# model = 960PGS
# serial number = 89F9086F9235
/interface bridge
add admin-mac=CC:2D:E0:03:E5:A1 auto-mac=no comment=defconf name=bridge
add fast-forward=no name=bridge_guest
/interface ethernet
set [ find default-name=ether2 ] arp=proxy-arp name=ether2-master
/interface vlan
add interface=bridge_guest name=vlan900 vlan-id=900
/caps-man datapath
add bridge=bridge name=datapath_home
add bridge=bridge name=datapath_guest
/caps-man security
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=\
security_home
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=\
security_guest
/caps-man configuration
add datapath=datapath_home hide-ssid=no mode=ap name=cfg_home security=\
security_home ssid=SoPa-WiFi
add datapath=datapath_guest hide-ssid=no mode=ap name=cfg_guest security=\
security_guest ssid=SoPa-WiFi-Guest
/caps-man interface
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
64:D1:54:68:2E:6E master-interface=none name=cap1-2GHz radio-mac=\
64:D1:54:68:2E:6E
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
66:D1:54:68:2E:6E master-interface=cap1-2GHz name=cap1-2GHz-1 radio-mac=\
00:00:00:00:00:00
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
64:D1:54:68:2E:6F master-interface=none name=cap1-5GHz radio-mac=\
64:D1:54:68:2E:6F
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
66:D1:54:68:2E:6F master-interface=cap1-5GHz name=cap1-5GHz-1 radio-mac=\
00:00:00:00:00:00
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
CC:2D:E0:2B:82:05 master-interface=none name=cap2-2GHz radio-mac=\
CC:2D:E0:2B:82:05
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
CE:2D:E0:2B:82:05 master-interface=cap2-2GHz name=cap2-2GHz-1 radio-mac=\
00:00:00:00:00:00
add configuration=cfg_home disabled=no l2mtu=1600 mac-address=\
CC:2D:E0:2B:82:06 master-interface=none name=cap2-5GHz radio-mac=\
CC:2D:E0:2B:82:06
add configuration=cfg_guest disabled=no l2mtu=1600 mac-address=\
CE:2D:E0:2B:82:06 master-interface=cap2-5GHz name=cap2-5GHz-1 radio-mac=\
00:00:00:00:00:00
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add exclude=dynamic name=discover
add name=mactel
add name=mac-winbox
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip firewall layer7-protocol
add name=Youtube regexp="^.+(youtube.com|www.youtube.com|m.youtube.com|ytimg.c\
om|s.ytimg.com|ytimg.|youtube.|googlevideo.com|youtu.be|youtube-ui.l.googl\
e.com|akamaihd.net).*\$"
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=\
aes-256-cbc,aes-192-cbc,aes-128-cbc,3des
/ip pool
add name=dhcp ranges=192.168.0.110-192.168.0.190
add name=guest-dhcp ranges=192.168.1.10-192.168.1.254
add name=vpn-pool ranges=192.168.3.90-192.168.3.99
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
add address-pool=guest-dhcp disabled=no interface=bridge_guest name=guest
/ppp profile
set *FFFFFFFE dns-server=192.168.0.11 local-address=vpn-pool remote-address=\
vpn-pool use-upnp=no
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/system logging action
set 0 memory-lines=2000
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes
/caps-man provisioning
add action=create-dynamic-enabled master-configuration=cfg_home \
slave-configurations=cfg_guest
/interface bridge port
add bridge=bridge comment=defconf interface=ether2-master
add bridge=bridge comment=defconf hw=no interface=sfp1
add bridge=bridge interface=ether3
add bridge=bridge interface=ether4
add bridge=bridge interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=discover
/interface l2tp-server server
set enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2-master list=discover
add interface=ether3 list=discover
add interface=ether4 list=discover
add interface=ether5 list=discover
add interface=sfp1 list=discover
add interface=bridge list=discover
add interface=bridge list=mactel
add interface=bridge list=mac-winbox
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
add address=192.168.0.11/24 comment=defconf interface=ether2-master network=\
192.168.0.0
add address=192.168.1.1/24 interface=bridge_guest network=192.168.1.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add dhcp-options=hostname,clientid disabled=no interface=bridge
add dhcp-options=hostname,clientid disabled=no interface=ether1
add dhcp-options=hostname,clientid disabled=no interface=bridge_guest
/ip dhcp-server lease
add address=192.168.0.100 client-id=1:38:60:77:25:92:f mac-address=\
38:60:77:25:92:0F server=defconf
/ip dhcp-server network
add address=192.168.0.0/24 comment=defconf gateway=192.168.0.11 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.0.11 name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" disabled=yes \
protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=drop chain=forward comment="Blockera youtube" disabled=yes \
layer7-protocol=Youtube
add action=drop chain=forward comment="Blockera Sebbes dator" \
src-mac-address=98:EE:CB:6D:B0:8F
add action=drop chain=forward comment="Blockera Sebbes Chromebook" disabled=\
yes src-mac-address=A4:C4:94:AB:9B:FE
add action=drop chain=forward comment=\
"Blockera youtube p\E5 Sebbes Chromebook" disabled=yes layer7-protocol=\
Youtube src-mac-address=A4:C4:94:AB:9B:FE
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-address-type=local dst-port=8081-8083 \
protocol=tcp to-addresses=192.168.0.100 to-ports=8081-8083
add action=masquerade chain=srcnat disabled=yes dst-address=192.168.0.100 \
dst-port=8081-8083 out-interface=bridge protocol=tcp src-address=\
192.168.0.0/24
add action=masquerade chain=srcnat src-address=192.168.3.0/24
/ppp secret
add name=vpn profile=default-encryption
/system clock
set time-zone-name=Europe/Stockholm
/system identity
set name=MTMainRouter
/system logging
add topics=ipsec
add topics=l2tp
/system ntp client
set enabled=yes server-dns-names=\
0.se.pool.ntp.org,1.se.pool.ntp.org,2.se.pool.ntp.org,3.se.pool.ntp.org
/system routerboard settings
set silent-boot=yes
/tool graphing interface
add
/tool graphing queue
add
/tool graphing resource
add
/tool mac-server
set allowed-interface-list=mactel
/tool mac-server mac-winbox
set allowed-interface-list=mac-winbox
IPSEC Debug
21:55:55 caps,info A8:5C:2C:37:C5:C6@cap2-2GHz disconnected, extensive data loss
21:55:59 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500]
21:55:59 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500]
21:55:59 ipsec,debug,packet ff
21:56:07 ipsec,debug ===== received 788 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:07 ipsec,debug,packet da16d52d 848127c0 00000000 00000000 01100200 00000000 00000314 0d000204
21:56:07 ipsec,debug,packet 00000001 00000001 000001f8 0101000e 03000024 01010000 800b0001 800c0e10
21:56:07 ipsec,debug,packet 80010007 800e0100 80030001 80020004 8004000e 03000024 02010000 800b0001
21:56:07 ipsec,debug,packet 800c0e10 80010007 800e0100 80030001 80020002 8004000e 03000024 03010000
21:56:07 ipsec,debug,packet 800b0001 800c0e10 80010007 800e0100 80030001 80020001 8004000e 03000024
21:56:07 ipsec,debug,packet 04010000 800b0001 800c0e10 80010007 800e0100 80030001 80020006 8004000e
21:56:07 ipsec,debug,packet 03000024 05010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004
21:56:07 ipsec,debug,packet 80040005 03000024 06010000 800b0001 800c0e10 80010007 800e0100 80030001
21:56:07 ipsec,debug,packet 80020002 80040005 03000024 07010000 800b0001 800c0e10 80010007 800e0100
21:56:07 ipsec,debug,packet 80030001 80020001 80040005 03000024 08010000 800b0001 800c0e10 80010007
21:56:07 ipsec,debug,packet 800e0100 80030001 80020004 80040002 03000024 09010000 800b0001 800c0e10
21:56:07 ipsec,debug,packet 80010007 800e0100 80030001 80020002 80040002 03000024 0a010000 800b0001
21:56:07 ipsec,debug,packet 800c0e10 80010007 800e0100 80030001 80020001 80040002 03000024 0b010000
21:56:07 ipsec,debug,packet 800b0001 800c0e10 80010007 800e0080 80030001 80020002 80040002 03000024
21:56:07 ipsec,debug,packet 0c010000 800b0001 800c0e10 80010007 800e0080 80030001 80020001 80040002
21:56:07 ipsec,debug,packet 03000020 0d010000 800b0001 800c0e10 80010005 80030001 80020002 80040002
21:56:07 ipsec,debug,packet 00000020 0e010000 800b0001 800c0e10 80010005 80030001 80020001 80040002
21:56:07 ipsec,debug,packet 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 4df37928 e9fc4fd1
21:56:07 ipsec,debug,packet b3262170 d515c662 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014
21:56:07 ipsec,debug,packet 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f
21:56:07 ipsec,debug,packet 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e
21:56:07 ipsec,debug,packet ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56
21:56:07 ipsec,debug,packet 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e
21:56:07 ipsec,debug,packet 086381b5 ec427b1f 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
21:56:07 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
21:56:07 ipsec,debug ===
21:56:07 ipsec,info respond new phase 1 (Identity Protection): 155.4.242.200[500]<=>90.232.69.248[500]
21:56:07 ipsec,debug begin.
21:56:07 ipsec,debug seen nptype=1(sa) len=516
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug seen nptype=13(vid) len=24
21:56:07 ipsec,debug seen nptype=13(vid) len=20
21:56:07 ipsec,debug succeed.
21:56:07 ipsec received Vendor ID: RFC 3947
21:56:07 ipsec,debug received unknown Vendor ID
21:56:07 ipsec,debug 4df37928 e9fc4fd1 b3262170 d515c662
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-08
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-07
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-06
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-05
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-04
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
21:56:07 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
21:56:07 ipsec
21:56:07 ipsec received long Microsoft ID: FRAGMENTATION
21:56:07 ipsec Fragmentation enabled
21:56:07 ipsec received Vendor ID: DPD
21:56:07 ipsec,debug remote supports DPD
21:56:07 ipsec 90.232.69.248 Selected NAT-T version: RFC 3947
21:56:07 ipsec,debug total SA len=512
21:56:07 ipsec,debug 00000001 00000001 000001f8 0101000e 03000024 01010000 800b0001 800c0e10
21:56:07 ipsec,debug 80010007 800e0100 80030001 80020004 8004000e 03000024 02010000 800b0001
21:56:07 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020002 8004000e 03000024 03010000
21:56:07 ipsec,debug 800b0001 800c0e10 80010007 800e0100 80030001 80020001 8004000e 03000024
21:56:07 ipsec,debug 04010000 800b0001 800c0e10 80010007 800e0100 80030001 80020006 8004000e
21:56:07 ipsec,debug 03000024 05010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004
21:56:07 ipsec,debug 80040005 03000024 06010000 800b0001 800c0e10 80010007 800e0100 80030001
21:56:07 ipsec,debug 80020002 80040005 03000024 07010000 800b0001 800c0e10 80010007 800e0100
21:56:07 ipsec,debug 80030001 80020001 80040005 03000024 08010000 800b0001 800c0e10 80010007
21:56:07 ipsec,debug 800e0100 80030001 80020004 80040002 03000024 09010000 800b0001 800c0e10
21:56:07 ipsec,debug 80010007 800e0100 80030001 80020002 80040002 03000024 0a010000 800b0001
21:56:07 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020001 80040002 03000024 0b010000
21:56:07 ipsec,debug 800b0001 800c0e10 80010007 800e0080 80030001 80020002 80040002 03000024
21:56:07 ipsec,debug 0c010000 800b0001 800c0e10 80010007 800e0080 80030001 80020001 80040002
21:56:07 ipsec,debug 03000020 0d010000 800b0001 800c0e10 80010005 80030001 80020002 80040002
21:56:07 ipsec,debug 00000020 0e010000 800b0001 800c0e10 80010005 80030001 80020001 80040002
21:56:07 ipsec,debug begin.
21:56:07 ipsec,debug seen nptype=2(prop) len=504
21:56:07 ipsec,debug succeed.
21:56:07 ipsec,debug proposal #1 len=504
21:56:07 ipsec,debug begin.
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=36
21:56:07 ipsec,debug seen nptype=3(trns) len=32
21:56:07 ipsec,debug seen nptype=3(trns) len=32
21:56:07 ipsec,debug succeed.
21:56:07 ipsec,debug transform #1 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
21:56:07 ipsec,debug hash(sha2_256)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group
21:56:07 ipsec,debug dh(modp2048)
21:56:07 ipsec,debug transform #2 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
21:56:07 ipsec,debug hash(sha1)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group
21:56:07 ipsec,debug dh(modp2048)
21:56:07 ipsec,debug transform #3 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
21:56:07 ipsec,debug hash(md5)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group
21:56:07 ipsec,debug dh(modp2048)
21:56:07 ipsec,debug transform #4 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=6
21:56:07 ipsec,debug hash(sha2_512)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group
21:56:07 ipsec,debug dh(modp2048)
21:56:07 ipsec,debug transform #5 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
21:56:07 ipsec,debug hash(sha2_256)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
21:56:07 ipsec,debug dh(modp1536)
21:56:07 ipsec,debug transform #6 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
21:56:07 ipsec,debug hash(sha1)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
21:56:07 ipsec,debug dh(modp1536)
21:56:07 ipsec,debug transform #7 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
21:56:07 ipsec,debug hash(md5)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
21:56:07 ipsec,debug dh(modp1536)
21:56:07 ipsec,debug transform #8 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
21:56:07 ipsec,debug hash(sha2_256)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug transform #9 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
21:56:07 ipsec,debug hash(sha1)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug transform #10 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
21:56:07 ipsec,debug hash(md5)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug transform #11 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=128
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
21:56:07 ipsec,debug hash(sha1)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug transform #12 len=36
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug encryption(aes)
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=128
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
21:56:07 ipsec,debug hash(md5)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug transform #13 len=32
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
21:56:07 ipsec,debug encryption(3des)
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
21:56:07 ipsec,debug hash(sha1)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug transform #14 len=32
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
21:56:07 ipsec,debug encryption(3des)
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
21:56:07 ipsec,debug hash(md5)
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
21:56:07 ipsec,debug dh(modp1024)
21:56:07 ipsec,debug pair 1:
21:56:07 ipsec,debug 0x48db48: next=(nil) tnext=0x48e1e8
21:56:07 ipsec,debug 0x48e1e8: next=(nil) tnext=0x48e1a8
21:56:07 ipsec,debug 0x48e1a8: next=(nil) tnext=0x48b0b0
21:56:07 ipsec,debug 0x48b0b0: next=(nil) tnext=0x490dd0
21:56:07 ipsec,debug 0x490dd0: next=(nil) tnext=0x48e488
21:56:07 ipsec,debug 0x48e488: next=(nil) tnext=0x48de98
21:56:07 ipsec,debug 0x48de98: next=(nil) tnext=0x48eed0
21:56:07 ipsec,debug 0x48eed0: next=(nil) tnext=0x48cce0
21:56:07 ipsec,debug 0x48cce0: next=(nil) tnext=0x48ad28
21:56:07 ipsec,debug 0x48ad28: next=(nil) tnext=0x48d778
21:56:07 ipsec,debug 0x48d778: next=(nil) tnext=0x48df70
21:56:07 ipsec,debug 0x48df70: next=(nil) tnext=0x48f910
21:56:07 ipsec,debug 0x48f910: next=(nil) tnext=0x48e360
21:56:07 ipsec,debug 0x48e360: next=(nil) tnext=(nil)
21:56:07 ipsec,debug proposal #1: 14 transform
21:56:07 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=14
21:56:07 ipsec,debug trns#=1, trns-id=IKE
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 256:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 256:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 192:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 192:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 128:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 128:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = 3DES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 0:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = 3DES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 0:256)
21:56:07 ipsec,debug hashtype = SHA:4
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 1024-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=14
21:56:07 ipsec,debug trns#=2, trns-id=IKE
21:56:07 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
21:56:07 ipsec,debug type=Life Duration, flag=0x8000, lorv=3600
21:56:07 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
21:56:07 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:07 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
21:56:07 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
21:56:07 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group
21:56:07 ipsec,debug Compared: Local:Peer
21:56:07 ipsec,debug (lifetime = 86400:3600)
21:56:07 ipsec,debug (lifebyte = 0:0)
21:56:07 ipsec,debug enctype = AES-CBC:AES-CBC
21:56:07 ipsec,debug (encklen = 256:256)
21:56:07 ipsec,debug hashtype = SHA:SHA
21:56:07 ipsec,debug authmethod = pre-shared key:pre-shared key
21:56:07 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
21:56:07 ipsec,debug an acceptable proposal found.
21:56:07 ipsec,debug dh(modp2048)
21:56:07 ipsec,debug agreed on pre-shared key auth.
21:56:07 ipsec,debug ===
21:56:07 ipsec,debug new cookie:
21:56:07 ipsec,debug add81ce5b7d484b2
21:56:07 ipsec,debug add payload of len 52, next type 13
21:56:07 ipsec,debug add payload of len 16, next type 13
21:56:07 ipsec,debug add payload of len 16, next type 13
21:56:07 ipsec,debug add payload of len 20, next type 0
21:56:07 ipsec,debug 148 bytes from 155.4.242.200[500] to 90.232.69.248[500]
21:56:07 ipsec,debug 1 times of 148 bytes message will be sent to 90.232.69.248[500]
21:56:07 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 01100200 00000000 00000094 0d000038
21:56:07 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 02010000 800b0001 800c0e10
21:56:07 ipsec,debug,packet 80010007 800e0100 80030001 80020002 8004000e 0d000014 4a131c81 07035845
21:56:07 ipsec,debug,packet 5c5728f2 0e95452f 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000018
21:56:07 ipsec,debug,packet 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
21:56:07 ipsec sent phase1 packet 155.4.242.200[500]<=>90.232.69.248[500] da16d52d848127c0:add81ce5b7d484b2
21:56:08 ipsec,debug ===== received 356 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 04100200 00000000 00000164 0a000104
21:56:08 ipsec,debug,packet 4364074e efbda155 838a22c9 2965fc64 e5638b13 541678d0 5dd5b31f 2801ea39
21:56:08 ipsec,debug,packet 1aa37991 c5eb3b8b c378f62b bbfa49e0 0c648b47 7f25d714 d8b9c48f 748cb6a2
21:56:08 ipsec,debug,packet 9cc6831b 063212a7 8bd825c0 f5be5c88 6b4dad76 5ea7310d b6d41384 38c3b970
21:56:08 ipsec,debug,packet b6c3d22a f82560b0 1efcf616 33b7e208 692c0191 833f1b42 7c2c20cb 4fcfdce4
21:56:08 ipsec,debug,packet 284645e5 b485137a bb787885 3fb4232b 781600b0 bf9a11dd d8ee9581 fa0b09ed
21:56:08 ipsec,debug,packet ba8b503a 9086565e 236f812a 9e97214d c0c5fa35 405cf40b 471b9e12 0ea1cc74
21:56:08 ipsec,debug,packet 23c17f3d 1db9e85a fcfe4f59 df9db692 cfcb5b3f e011ad52 b6a9cd7a ec03fa19
21:56:08 ipsec,debug,packet bb0f5ddb f79d646e c0019a9b 6630f258 ea85c9b8 6102d1f5 54a39df6 203a1d77
21:56:08 ipsec,debug,packet 14000014 302c8c48 8d445b24 9864f29c 163b015c 14000018 e22e4f39 d369e81d
21:56:08 ipsec,debug,packet 104843a8 b8c0407c 4f8c8223 00000018 9ea2df10 37c568d2 e6bfc0c3 3704fdd8
21:56:08 ipsec,debug,packet c0022ca7
21:56:08 ipsec,debug begin.
21:56:08 ipsec,debug seen nptype=4(ke) len=260
21:56:08 ipsec,debug seen nptype=10(nonce) len=20
21:56:08 ipsec,debug seen nptype=20(nat-d) len=24
21:56:08 ipsec,debug seen nptype=20(nat-d) len=24
21:56:08 ipsec,debug succeed.
21:56:08 ipsec 155.4.242.200 Hashing 155.4.242.200[500] with algo #2
21:56:08 ipsec,debug hash(sha1)
21:56:08 ipsec NAT-D payload #0 verified
21:56:08 ipsec 90.232.69.248 Hashing 90.232.69.248[500] with algo #2
21:56:08 ipsec,debug hash(sha1)
21:56:08 ipsec NAT-D payload #1 verified
21:56:08 ipsec NAT not detected
21:56:08 ipsec,debug ===
21:56:08 ipsec,debug dh(modp2048)
21:56:08 ipsec,debug compute DH's private.
21:56:08 ipsec,debug 48095a93 88e7ebf7 6c66115b d01d678b 56ce0369 738cf826 fc0004e6 3e4722fd
21:56:08 ipsec,debug af287ea9 4631bb64 ac888db6 9113ed87 98cb3819 7b4e5281 5e579430 8814004e
21:56:08 ipsec,debug 2a1a04d7 87baf8d2 c99ccbd6 ceb1cdd5 892e9157 0e35cf52 e6bf23f4 25ceed4b
21:56:08 ipsec,debug e33aefec e642279f dd703955 b3baa335 e2973ba4 26456914 e5489b5d 1d41720f
21:56:08 ipsec,debug 126a3dca a22884b7 aebd50c7 86b23737 45e45d30 fece063b 93467f97 0333fddf
21:56:08 ipsec,debug 1487ed9a 8122f61c 311b9105 74152fe3 2d9bd4d9 e34abdf6 a5f81025 4b670c05
21:56:08 ipsec,debug ff1cee24 50688c83 06374e6a 3f2a6197 1e501740 2640a019 72a25d20 5d61fcbf
21:56:08 ipsec,debug 215dd8c4 326159ed d10a013b d8ed2985 470347dc 912949bb 2ec03cc5 c69583f3
21:56:08 ipsec,debug compute DH's public.
21:56:08 ipsec,debug 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8
21:56:08 ipsec,debug be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5
21:56:08 ipsec,debug 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77
21:56:08 ipsec,debug 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6
21:56:08 ipsec,debug 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a
21:56:08 ipsec,debug eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39
21:56:08 ipsec,debug da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47
21:56:08 ipsec,debug a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3
21:56:08 ipsec 90.232.69.248 Hashing 90.232.69.248[500] with algo #2
21:56:08 ipsec,debug hash(sha1)
21:56:08 ipsec 155.4.242.200 Hashing 155.4.242.200[500] with algo #2
21:56:08 ipsec,debug hash(sha1)
21:56:08 ipsec Adding remote and local NAT-D payloads.
21:56:08 ipsec,debug add payload of len 256, next type 10
21:56:08 ipsec,debug add payload of len 24, next type 20
21:56:08 ipsec,debug add payload of len 20, next type 20
21:56:08 ipsec,debug add payload of len 20, next type 0
21:56:08 ipsec,debug 364 bytes from 155.4.242.200[500] to 90.232.69.248[500]
21:56:08 ipsec,debug 1 times of 364 bytes message will be sent to 90.232.69.248[500]
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 04100200 00000000 0000016c 0a000104
21:56:08 ipsec,debug,packet 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8
21:56:08 ipsec,debug,packet be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5
21:56:08 ipsec,debug,packet 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77
21:56:08 ipsec,debug,packet 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6
21:56:08 ipsec,debug,packet 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a
21:56:08 ipsec,debug,packet eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39
21:56:08 ipsec,debug,packet da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47
21:56:08 ipsec,debug,packet a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3
21:56:08 ipsec,debug,packet 1400001c f4fbce1d 6fa4a508 6250546a a477530a f05dcda4 e044835a 14000018
21:56:08 ipsec,debug,packet 9ea2df10 37c568d2 e6bfc0c3 3704fdd8 c0022ca7 00000018 e22e4f39 d369e81d
21:56:08 ipsec,debug,packet 104843a8 b8c0407c 4f8c8223
21:56:08 ipsec sent phase1 packet 155.4.242.200[500]<=>90.232.69.248[500] da16d52d848127c0:add81ce5b7d484b2
21:56:08 ipsec,debug dh(modp2048)
21:56:08 ipsec,debug compute DH's shared.
21:56:08 ipsec,debug
21:56:08 ipsec,debug 0ec88c0e 9b0956b3 e9ccdb63 210ffc22 f2e4b366 ffdfb942 9801d971 802f123a
21:56:08 ipsec,debug f8d1a1ed 42d54e1b f77b98f1 418a7687 f0491787 1147ff4c 6f8f0ca7 61725906
21:56:08 ipsec,debug 381b0ba3 f6b49e10 c5c2d5dd e3c36deb ee0cdbbf 2a20a617 94bdf030 c2dd0890
21:56:08 ipsec,debug b32b12f7 c51ba6cb acd7368f 47ad88d2 c150affb eb0463d6 1b41447b eb2f23df
21:56:08 ipsec,debug 1d703b88 c08224aa 77985914 22dc4bad 05baffac d4cd5725 60b411fe d336a99b
21:56:08 ipsec,debug f394a26b 9220b048 6a8d39df 54564606 086a866a ea4416e1 b7511bf0 6d84b8a6
21:56:08 ipsec,debug 39895dc2 62eb5ca7 a63584e4 dd8d0143 7cec39f1 30250732 b85646ce 3dec8bf3
21:56:08 ipsec,debug 6ee0f192 9e8f180f 1dfeff86 bca075ac 4000e020 f4715aab 3d286283 5732ae09
21:56:08 ipsec,debug nonce 1:
21:56:08 ipsec,debug 302c8c48 8d445b24 9864f29c 163b015c
21:56:08 ipsec,debug nonce 2:
21:56:08 ipsec,debug f4fbce1d 6fa4a508 6250546a a477530a f05dcda4 e044835a
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug SKEYID computed:
21:56:08 ipsec,debug 5aedd198 d7fcb421 f7c72f45 3b07bf8d 5566bf75
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug SKEYID_d computed:
21:56:08 ipsec,debug f29fec94 d5bf8f76 5519f0c6 c226c4fb 79790c6f
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug SKEYID_a computed:
21:56:08 ipsec,debug 165672d0 bee5b71c c647ebfb 0c667dd9 391f7a49
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug SKEYID_e computed:
21:56:08 ipsec,debug 7a424565 d0dac1bc b8c547a8 f1357d87 c522d23f
21:56:08 ipsec,debug encryption(aes)
21:56:08 ipsec,debug hash(sha1)
21:56:08 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...)
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug compute intermediate encryption key K1
21:56:08 ipsec,debug 00
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug compute intermediate encryption key K2
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963
21:56:08 ipsec,debug 4cd0f801 88984a31 1cc5e675 ff34cedf 78547361
21:56:08 ipsec,debug final encryption key computed:
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:08 ipsec,debug hash(sha1)
21:56:08 ipsec,debug encryption(aes)
21:56:08 ipsec,debug IV computed:
21:56:08 ipsec,debug bf30e51d 9d52b43b 2ff3bc49 3ba0d194
21:56:08 ipsec,debug ===== received 108 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 05100201 00000000 0000006c ebdc3807
21:56:08 ipsec,debug,packet 9ffb1788 bbfc8598 3d6ba0dd 872a84a3 1c23c2d2 fd8fc7ea c979ddc7 9160b17f
21:56:08 ipsec,debug,packet 9cadfec4 7268e643 7d66f716 d72c4801 9d364b8a 5dbb8114 3a69e732 ab953d5b
21:56:08 ipsec,debug,packet 59260fd8 23fc3476 32ad3c36
21:56:08 ipsec,debug encryption(aes)
21:56:08 ipsec,debug IV was saved for next processing:
21:56:08 ipsec,debug ab953d5b 59260fd8 23fc3476 32ad3c36
21:56:08 ipsec,debug encryption(aes)
21:56:08 ipsec,debug with key:
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:08 ipsec,debug decrypted payload by IV:
21:56:08 ipsec,debug bf30e51d 9d52b43b 2ff3bc49 3ba0d194
21:56:08 ipsec,debug decrypted payload, but not trimed.
21:56:08 ipsec,debug 0800000c 011101f4 5ae845f8 0b000018 3fee1622 0c001d53 904f446d 539bc6ed
21:56:08 ipsec,debug f12309b1 0000001c 00000001 01106002 da16d52d 848127c0 add81ce5 b7d484b2
21:56:08 ipsec,debug 00000000 00000000 00000000 00000010
21:56:08 ipsec,debug padding len=17
21:56:08 ipsec,debug skip to trim padding.
21:56:08 ipsec,debug decrypted.
21:56:08 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 05100201 00000000 0000006c 0800000c
21:56:08 ipsec,debug 011101f4 5ae845f8 0b000018 3fee1622 0c001d53 904f446d 539bc6ed f12309b1
21:56:08 ipsec,debug 0000001c 00000001 01106002 da16d52d 848127c0 add81ce5 b7d484b2 00000000
21:56:08 ipsec,debug 00000000 00000000 00000010
21:56:08 ipsec,debug begin.
21:56:08 ipsec,debug seen nptype=5(id) len=12
21:56:08 ipsec,debug seen nptype=8(hash) len=24
21:56:08 ipsec,debug seen nptype=11(notify) len=28
21:56:08 ipsec,debug succeed.
21:56:08 ipsec,debug 90.232.69.248 Notify Message received
21:56:08 ipsec 90.232.69.248 ignore INITIAL-CONTACT notification, because it is only accepted after phase1.
21:56:08 ipsec,debug HASH received:
21:56:08 ipsec,debug 3fee1622 0c001d53 904f446d 539bc6ed f12309b1
21:56:08 ipsec,debug HASH with:
21:56:08 ipsec,debug 4364074e efbda155 838a22c9 2965fc64 e5638b13 541678d0 5dd5b31f 2801ea39
21:56:08 ipsec,debug 1aa37991 c5eb3b8b c378f62b bbfa49e0 0c648b47 7f25d714 d8b9c48f 748cb6a2
21:56:08 ipsec,debug 9cc6831b 063212a7 8bd825c0 f5be5c88 6b4dad76 5ea7310d b6d41384 38c3b970
21:56:08 ipsec,debug b6c3d22a f82560b0 1efcf616 33b7e208 692c0191 833f1b42 7c2c20cb 4fcfdce4
21:56:08 ipsec,debug 284645e5 b485137a bb787885 3fb4232b 781600b0 bf9a11dd d8ee9581 fa0b09ed
21:56:08 ipsec,debug ba8b503a 9086565e 236f812a 9e97214d c0c5fa35 405cf40b 471b9e12 0ea1cc74
21:56:08 ipsec,debug 23c17f3d 1db9e85a fcfe4f59 df9db692 cfcb5b3f e011ad52 b6a9cd7a ec03fa19
21:56:08 ipsec,debug bb0f5ddb f79d646e c0019a9b 6630f258 ea85c9b8 6102d1f5 54a39df6 203a1d77
21:56:08 ipsec,debug 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8
21:56:08 ipsec,debug be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5
21:56:08 ipsec,debug 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77
21:56:08 ipsec,debug 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6
21:56:08 ipsec,debug 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a
21:56:08 ipsec,debug eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39
21:56:08 ipsec,debug da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47
21:56:08 ipsec,debug a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3
21:56:08 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 00000001 00000001 000001f8 0101000e
21:56:08 ipsec,debug 03000024 01010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004
21:56:08 ipsec,debug 8004000e 03000024 02010000 800b0001 800c0e10 80010007 800e0100 80030001
21:56:08 ipsec,debug 80020002 8004000e 03000024 03010000 800b0001 800c0e10 80010007 800e0100
21:56:08 ipsec,debug 80030001 80020001 8004000e 03000024 04010000 800b0001 800c0e10 80010007
21:56:08 ipsec,debug 800e0100 80030001 80020006 8004000e 03000024 05010000 800b0001 800c0e10
21:56:08 ipsec,debug 80010007 800e0100 80030001 80020004 80040005 03000024 06010000 800b0001
21:56:08 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020002 80040005 03000024 07010000
21:56:08 ipsec,debug 800b0001 800c0e10 80010007 800e0100 80030001 80020001 80040005 03000024
21:56:08 ipsec,debug 08010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 80040002
21:56:08 ipsec,debug 03000024 09010000 800b0001 800c0e10 80010007 800e0100 80030001 80020002
21:56:08 ipsec,debug 80040002 03000024 0a010000 800b0001 800c0e10 80010007 800e0100 80030001
21:56:08 ipsec,debug 80020001 80040002 03000024 0b010000 800b0001 800c0e10 80010007 800e0080
21:56:08 ipsec,debug 80030001 80020002 80040002 03000024 0c010000 800b0001 800c0e10 80010007
21:56:08 ipsec,debug 800e0080 80030001 80020001 80040002 03000020 0d010000 800b0001 800c0e10
21:56:08 ipsec,debug 80010005 80030001 80020002 80040002 00000020 0e010000 800b0001 800c0e10
21:56:08 ipsec,debug 80010005 80030001 80020001 80040002 011101f4 5ae845f8
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug HASH computed:
21:56:08 ipsec,debug 3fee1622 0c001d53 904f446d 539bc6ed f12309b1
21:56:08 ipsec,debug HASH for PSK validated.
21:56:08 ipsec,debug 90.232.69.248 peer's ID
21:56:08 ipsec,debug 011101f4 5ae845f8
21:56:08 ipsec,debug ===
21:56:08 ipsec,debug use ID type of IPv4_address
21:56:08 ipsec,debug generate HASH_R
21:56:08 ipsec,debug HASH with:
21:56:08 ipsec,debug 6ec12a9e 85bfb3c4 58b79582 3f08b773 875a6b03 a3db0fd0 797be378 6c917fc8
21:56:08 ipsec,debug be7bf606 c666fa33 ffe65f36 0db1e1d5 a3ca973b 8e85c657 74e102f8 a92640c5
21:56:08 ipsec,debug 24850922 06ca8ae7 1c59c0f6 d4b76943 06a03a34 2b8cf7a1 b348ef52 ef1f8b77
21:56:08 ipsec,debug 13c058f0 ad2cdaad 10a0dcc6 80aa233d 1dadeca1 5b6e5f66 a9877e64 44d8f8a6
21:56:08 ipsec,debug 3d36f78a f2813967 bf8b5d60 611860cf b4fc9b24 9f694ffe 48127b9d 63c9be5a
21:56:08 ipsec,debug eefe39c6 89802bf3 310dc0d4 efcdab3d b413ac22 2245a32a 78518b35 a40a2e39
21:56:08 ipsec,debug da7fd3da 6dcf884e 423706bf d5e2caf4 c8a9580b 1a9c3ee5 57ec4a8a aef35e47
21:56:08 ipsec,debug a401d148 cdf3849b 11e4bb1c 769cd82c c491eedd 5db020d8 03b8c7ed 4f9134e3
21:56:08 ipsec,debug 4364074e efbda155 838a22c9 2965fc64 e5638b13 541678d0 5dd5b31f 2801ea39
21:56:08 ipsec,debug 1aa37991 c5eb3b8b c378f62b bbfa49e0 0c648b47 7f25d714 d8b9c48f 748cb6a2
21:56:08 ipsec,debug 9cc6831b 063212a7 8bd825c0 f5be5c88 6b4dad76 5ea7310d b6d41384 38c3b970
21:56:08 ipsec,debug b6c3d22a f82560b0 1efcf616 33b7e208 692c0191 833f1b42 7c2c20cb 4fcfdce4
21:56:08 ipsec,debug 284645e5 b485137a bb787885 3fb4232b 781600b0 bf9a11dd d8ee9581 fa0b09ed
21:56:08 ipsec,debug ba8b503a 9086565e 236f812a 9e97214d c0c5fa35 405cf40b 471b9e12 0ea1cc74
21:56:08 ipsec,debug 23c17f3d 1db9e85a fcfe4f59 df9db692 cfcb5b3f e011ad52 b6a9cd7a ec03fa19
21:56:08 ipsec,debug bb0f5ddb f79d646e c0019a9b 6630f258 ea85c9b8 6102d1f5 54a39df6 203a1d77
21:56:08 ipsec,debug add81ce5 b7d484b2 da16d52d 848127c0 00000001 00000001 000001f8 0101000e
21:56:08 ipsec,debug 03000024 01010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004
21:56:08 ipsec,debug 8004000e 03000024 02010000 800b0001 800c0e10 80010007 800e0100 80030001
21:56:08 ipsec,debug 80020002 8004000e 03000024 03010000 800b0001 800c0e10 80010007 800e0100
21:56:08 ipsec,debug 80030001 80020001 8004000e 03000024 04010000 800b0001 800c0e10 80010007
21:56:08 ipsec,debug 800e0100 80030001 80020006 8004000e 03000024 05010000 800b0001 800c0e10
21:56:08 ipsec,debug 80010007 800e0100 80030001 80020004 80040005 03000024 06010000 800b0001
21:56:08 ipsec,debug 800c0e10 80010007 800e0100 80030001 80020002 80040005 03000024 07010000
21:56:08 ipsec,debug 800b0001 800c0e10 80010007 800e0100 80030001 80020001 80040005 03000024
21:56:08 ipsec,debug 08010000 800b0001 800c0e10 80010007 800e0100 80030001 80020004 80040002
21:56:08 ipsec,debug 03000024 09010000 800b0001 800c0e10 80010007 800e0100 80030001 80020002
21:56:08 ipsec,debug 80040002 03000024 0a010000 800b0001 800c0e10 80010007 800e0100 80030001
21:56:08 ipsec,debug 80020001 80040002 03000024 0b010000 800b0001 800c0e10 80010007 800e0080
21:56:08 ipsec,debug 80030001 80020002 80040002 03000024 0c010000 800b0001 800c0e10 80010007
21:56:08 ipsec,debug 800e0080 80030001 80020001 80040002 03000020 0d010000 800b0001 800c0e10
21:56:08 ipsec,debug 80010005 80030001 80020002 80040002 00000020 0e010000 800b0001 800c0e10
21:56:08 ipsec,debug 80010005 80030001 80020001 80040002 011101f4 9b04f2c8
21:56:08 ipsec,debug hmac(hmac_sha1)
21:56:08 ipsec,debug HASH computed:
21:56:08 ipsec,debug ebecd66d 953550a7 7d303138 b63d83a1 fa6657be
21:56:08 ipsec,debug add payload of len 8, next type 8
21:56:08 ipsec,debug add payload of len 20, next type 0
21:56:08 ipsec,debug begin encryption.
21:56:08 ipsec,debug encryption(aes)
21:56:08 ipsec,debug pad length = 12
21:56:08 ipsec,debug 0800000c 011101f4 9b04f2c8 00000018 ebecd66d 953550a7 7d303138 b63d83a1
21:56:08 ipsec,debug fa6657be 1053fa9d 04e0b9e7 530a620b
21:56:08 ipsec,debug encryption(aes)
21:56:08 ipsec,debug with key:
21:56:08 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:08 ipsec,debug encrypted payload by IV:
21:56:08 ipsec,debug ab953d5b 59260fd8 23fc3476 32ad3c36
21:56:08 ipsec,debug save IV for next:
21:56:08 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33
21:56:08 ipsec,debug encrypted.
21:56:08 ipsec,debug 76 bytes from 155.4.242.200[500] to 90.232.69.248[500]
21:56:08 ipsec,debug 1 times of 76 bytes message will be sent to 90.232.69.248[500]
21:56:08 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 05100201 00000000 0000004c 4a538398
21:56:08 ipsec,debug,packet 46fd4e23 e7018b99 0df3b714 16a4a523 a0304ba4 92dfcce5 9d04ad08 cd8192cd
21:56:08 ipsec,debug,packet 01200b4f 8e6cf81b b9626e33
21:56:08 ipsec,info ISAKMP-SA established 155.4.242.200[500]-90.232.69.248[500] spi:da16d52d848127c0:add81ce5b7d484b2
21:56:08 ipsec,debug ===
21:56:09 ipsec,debug ===== received 284 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:09 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000011c f3d6f35a
21:56:09 ipsec,debug,packet d6e083b9 dffa6f2e e374fdc5 9a75bece d6f9fb43 f354af41 cc6d847a faff050f
21:56:09 ipsec,debug,packet d9905047 8edb6a86 8063cb5b a56be435 a115a079 6cb80aa5 9000264e 4cabe7d3
21:56:09 ipsec,debug,packet 81667e65 b0286ebf 9d7f3643 bda17716 4ffb9406 868dbae6 214778c1 83261353
21:56:09 ipsec,debug,packet 44774730 b2223bb5 bc65c540 2f68089a 71b4d484 496725c5 a2c88129 78c7dae9
21:56:09 ipsec,debug,packet 947bd3f7 a733d717 f2286337 9df02fd0 d5f47e59 4c2398cd a04745c4 ea08df61
21:56:09 ipsec,debug,packet d47ba444 17ad5aea 9a379c1d 7f8282f5 92265420 851567d3 e8ffa40f 54372e40
21:56:09 ipsec,debug,packet dbeb2004 0398b573 7100fa3f 0cd0f9b3 c2fe6e98 867513bd a3ae43a0 40fd927f
21:56:09 ipsec,debug,packet 6702da05 cbd1e9ca 51dcf9e2 89120f1f a7790f4e 7d63c136 80526c8a
21:56:09 ipsec,debug compute IV for phase2
21:56:09 ipsec,debug phase1 last IV:
21:56:09 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 ce8971bc
21:56:09 ipsec,debug hash(sha1)
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug phase2 IV computed:
21:56:09 ipsec,debug d1eb42e6 c211c135 1293cc17 fee784fd
21:56:09 ipsec,debug ===
21:56:09 ipsec respond new phase 2 negotiation: 155.4.242.200[500]<=>90.232.69.248[500]
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug IV was saved for next processing:
21:56:09 ipsec,debug 89120f1f a7790f4e 7d63c136 80526c8a
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug with key:
21:56:09 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:09 ipsec,debug decrypted payload by IV:
21:56:09 ipsec,debug d1eb42e6 c211c135 1293cc17 fee784fd
21:56:09 ipsec,debug decrypted payload, but not trimed.
21:56:09 ipsec,debug 01000018 da323051 0201b2d6 4645548a 7bc14287 c0129f4a 0a0000b8 00000001
21:56:09 ipsec,debug 00000001 000000ac 01030406 02f249f0 0300001c 010c0000 80010001 80020e10
21:56:09 ipsec,debug 80040002 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040002
21:56:09 ipsec,debug 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040002 80060080
21:56:09 ipsec,debug 80050002 0300001c 040c0000 80010001 80020e10 80040002 80060080 80050001
21:56:09 ipsec,debug 03000018 05030000 80010001 80020e10 80040002 80050002 00000018 06030000
21:56:09 ipsec,debug 80010001 80020e10 80040002 80050001 05000014 219a6f54 91595220 588ddf53
21:56:09 ipsec,debug d15840ab 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8 00000004
21:56:09 ipsec,debug padding len=5
21:56:09 ipsec,debug skip to trim padding.
21:56:09 ipsec,debug decrypted.
21:56:09 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000011c 01000018
21:56:09 ipsec,debug da323051 0201b2d6 4645548a 7bc14287 c0129f4a 0a0000b8 00000001 00000001
21:56:09 ipsec,debug 000000ac 01030406 02f249f0 0300001c 010c0000 80010001 80020e10 80040002
21:56:09 ipsec,debug 80060100 80050002 0300001c 020c0000 80010001 80020e10 80040002 80060100
21:56:09 ipsec,debug 80050001 0300001c 030c0000 80010001 80020e10 80040002 80060080 80050002
21:56:09 ipsec,debug 0300001c 040c0000 80010001 80020e10 80040002 80060080 80050001 03000018
21:56:09 ipsec,debug 05030000 80010001 80020e10 80040002 80050002 00000018 06030000 80010001
21:56:09 ipsec,debug 80020e10 80040002 80050001 05000014 219a6f54 91595220 588ddf53 d15840ab
21:56:09 ipsec,debug 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8 00000004
21:56:09 ipsec,debug begin.
21:56:09 ipsec,debug seen nptype=8(hash) len=24
21:56:09 ipsec,debug seen nptype=1(sa) len=184
21:56:09 ipsec,debug seen nptype=10(nonce) len=20
21:56:09 ipsec,debug seen nptype=5(id) len=12
21:56:09 ipsec,debug seen nptype=5(id) len=12
21:56:09 ipsec,debug succeed.
21:56:09 ipsec,debug received IDci2:
21:56:09 ipsec,debug 0111f25a 5ae845f8
21:56:09 ipsec,debug received IDcr2:
21:56:09 ipsec,debug 011106a5 9b04f2c8
21:56:09 ipsec,debug HASH(1) validate:
21:56:09 ipsec,debug da323051 0201b2d6 4645548a 7bc14287 c0129f4a
21:56:09 ipsec,debug HASH with:
21:56:09 ipsec,debug ce8971bc 0a0000b8 00000001 00000001 000000ac 01030406 02f249f0 0300001c
21:56:09 ipsec,debug 010c0000 80010001 80020e10 80040002 80060100 80050002 0300001c 020c0000
21:56:09 ipsec,debug 80010001 80020e10 80040002 80060100 80050001 0300001c 030c0000 80010001
21:56:09 ipsec,debug 80020e10 80040002 80060080 80050002 0300001c 040c0000 80010001 80020e10
21:56:09 ipsec,debug 80040002 80060080 80050001 03000018 05030000 80010001 80020e10 80040002
21:56:09 ipsec,debug 80050002 00000018 06030000 80010001 80020e10 80040002 80050001 05000014
21:56:09 ipsec,debug 219a6f54 91595220 588ddf53 d15840ab 0500000c 0111f25a 5ae845f8 0000000c
21:56:09 ipsec,debug 011106a5 9b04f2c8
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug HASH computed:
21:56:09 ipsec,debug da323051 0201b2d6 4645548a 7bc14287 c0129f4a
21:56:09 ipsec,debug total SA len=180
21:56:09 ipsec,debug 00000001 00000001 000000ac 01030406 02f249f0 0300001c 010c0000 80010001
21:56:09 ipsec,debug 80020e10 80040002 80060100 80050002 0300001c 020c0000 80010001 80020e10
21:56:09 ipsec,debug 80040002 80060100 80050001 0300001c 030c0000 80010001 80020e10 80040002
21:56:09 ipsec,debug 80060080 80050002 0300001c 040c0000 80010001 80020e10 80040002 80060080
21:56:09 ipsec,debug 80050001 03000018 05030000 80010001 80020e10 80040002 80050002 00000018
21:56:09 ipsec,debug 06030000 80010001 80020e10 80040002 80050001
21:56:09 ipsec,debug begin.
21:56:09 ipsec,debug seen nptype=2(prop) len=172
21:56:09 ipsec,debug succeed.
21:56:09 ipsec,debug proposal #1 len=172
21:56:09 ipsec,debug begin.
21:56:09 ipsec,debug seen nptype=3(trns) len=28
21:56:09 ipsec,debug seen nptype=3(trns) len=28
21:56:09 ipsec,debug seen nptype=3(trns) len=28
21:56:09 ipsec,debug seen nptype=3(trns) len=28
21:56:09 ipsec,debug seen nptype=3(trns) len=24
21:56:09 ipsec,debug seen nptype=3(trns) len=24
21:56:09 ipsec,debug succeed.
21:56:09 ipsec,debug transform #1 len=28
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug transform #2 len=28
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
21:56:09 ipsec,debug transform #3 len=28
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug transform #4 len=28
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
21:56:09 ipsec,debug transform #5 len=24
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug transform #6 len=24
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
21:56:09 ipsec,debug pair 1:
21:56:09 ipsec,debug 0x4915c0: next=(nil) tnext=0x4915d8
21:56:09 ipsec,debug 0x4915d8: next=(nil) tnext=0x492ba8
21:56:09 ipsec,debug 0x492ba8: next=(nil) tnext=0x492bc0
21:56:09 ipsec,debug 0x492bc0: next=(nil) tnext=0x48d3b8
21:56:09 ipsec,debug 0x48d3b8: next=(nil) tnext=0x48d3d0
21:56:09 ipsec,debug 0x48d3d0: next=(nil) tnext=(nil)
21:56:09 ipsec,debug proposal #1: 6 transform
21:56:09 ipsec,debug got the local address from ID payload 155.4.242.200[1701] prefixlen=32 ul_proto=17
21:56:09 ipsec,debug got the peer address from ID payload 90.232.69.248[62042] prefixlen=32 ul_proto=17
21:56:09 ipsec,debug updating policy address because of NAT in transport mode
21:56:09 ipsec searching for policy for selector: 155.4.242.200:1701 ip-proto:17 <=> 90.232.69.248:62042 ip-proto:17
21:56:09 ipsec generating policy
21:56:09 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=18:18)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
21:56:09 ipsec,debug begin compare proposals.
21:56:09 ipsec,debug pair[1]: 0x4915c0
21:56:09 ipsec,debug 0x4915c0: next=(nil) tnext=0x4915d8
21:56:09 ipsec,debug 0x4915d8: next=(nil) tnext=0x492ba8
21:56:09 ipsec,debug 0x492ba8: next=(nil) tnext=0x492bc0
21:56:09 ipsec,debug 0x492bc0: next=(nil) tnext=0x48d3b8
21:56:09 ipsec,debug 0x48d3b8: next=(nil) tnext=0x48d3d0
21:56:09 ipsec,debug 0x48d3d0: next=(nil) tnext=(nil)
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=1 trns-id=AES-CBC
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=2 trns-id=AES-CBC
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=3 trns-id=AES-CBC
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=4 trns-id=AES-CBC
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=128
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=5 trns-id=3DES
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=6 trns#=6 trns-id=3DES
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
21:56:09 ipsec,debug peer's single bundle:
21:56:09 ipsec,debug (proto_id=ESP spisize=4 spi=02f249f0 spi_p=00000000 encmode=Transport reqid=0:0)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-md5)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-md5)
21:56:09 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-md5)
21:56:09 ipsec,debug my single bundle:
21:56:09 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=18:18)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
21:56:09 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
21:56:09 ipsec,debug matched
21:56:09 ipsec,debug ===
21:56:09 ipsec,debug call pfkey_send_getspi e3b64c17
21:56:09 ipsec,debug pfkey GETSPI sent: ESP/Transport 90.232.69.248[500]->155.4.242.200[500]
21:56:09 ipsec,debug pfkey getspi sent.
21:56:09 ipsec,debug total SA len=48
21:56:09 ipsec,debug 00000001 00000001 00000028 01030401 00000000 0000001c 010c0000 80010001
21:56:09 ipsec,debug 80020e10 80040002 80060100 80050002
21:56:09 ipsec,debug begin.
21:56:09 ipsec,debug seen nptype=2(prop) len=40
21:56:09 ipsec,debug succeed.
21:56:09 ipsec,debug proposal #1 len=40
21:56:09 ipsec,debug begin.
21:56:09 ipsec,debug seen nptype=3(trns) len=28
21:56:09 ipsec,debug succeed.
21:56:09 ipsec,debug transform #1 len=28
21:56:09 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
21:56:09 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
21:56:09 ipsec,debug life duration was in TLV.
21:56:09 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Transport
21:56:09 ipsec,debug type=Key Length, flag=0x8000, lorv=256
21:56:09 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
21:56:09 ipsec,debug pair 1:
21:56:09 ipsec,debug 0x48d700: next=(nil) tnext=(nil)
21:56:09 ipsec,debug proposal #1: 1 transform
21:56:09 ipsec,debug add payload of len 48, next type 10
21:56:09 ipsec,debug add payload of len 24, next type 5
21:56:09 ipsec,debug add payload of len 8, next type 5
21:56:09 ipsec,debug add payload of len 8, next type 0
21:56:09 ipsec,debug HASH with:
21:56:09 ipsec,debug ce8971bc 219a6f54 91595220 588ddf53 d15840ab 0a000034 00000001 00000001
21:56:09 ipsec,debug 00000028 01030401 09952a46 0000001c 010c0000 80010001 80020e10 80040002
21:56:09 ipsec,debug 80060100 80050002 0500001c 8fb8ad84 4655ae2c 37540269 38b3c962 d85afced
21:56:09 ipsec,debug 83514608 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug HASH computed:
21:56:09 ipsec,debug 89a3ca05 1f7ef350 a70f8a0d 62ef7275 61633617
21:56:09 ipsec,debug add payload of len 20, next type 1
21:56:09 ipsec,debug begin encryption.
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug pad length = 16
21:56:09 ipsec,debug 01000018 89a3ca05 1f7ef350 a70f8a0d 62ef7275 61633617 0a000034 00000001
21:56:09 ipsec,debug 00000001 00000028 01030401 09952a46 0000001c 010c0000 80010001 80020e10
21:56:09 ipsec,debug 80040002 80060100 80050002 0500001c 8fb8ad84 4655ae2c 37540269 38b3c962
21:56:09 ipsec,debug d85afced 83514608 0500000c 0111f25a 5ae845f8 0000000c 011106a5 9b04f2c8
21:56:09 ipsec,debug 2a174692 290dd28a 908157e2 c596650f
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug with key:
21:56:09 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:09 ipsec,debug encrypted payload by IV:
21:56:09 ipsec,debug 89120f1f a7790f4e 7d63c136 80526c8a
21:56:09 ipsec,debug save IV for next:
21:56:09 ipsec,debug 09edb7ab 026c1bba 12bc71d5 af08d6b1
21:56:09 ipsec,debug encrypted.
21:56:09 ipsec,debug 172 bytes from 155.4.242.200[500] to 90.232.69.248[500]
21:56:09 ipsec,debug 1 times of 172 bytes message will be sent to 90.232.69.248[500]
21:56:09 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 000000ac 7e3e0504
21:56:09 ipsec,debug,packet ff27f6cc 2eb8420d 9efd34d8 a1264812 18810340 1ca13dea 390bfdc1 904b2c9e
21:56:09 ipsec,debug,packet 894802cb c64b7b6f 19cb0a98 d5e59353 a7bf4533 9c00ade3 c8aa316d 4010d9f0
21:56:09 ipsec,debug,packet de805eed 524c56d9 58dae284 054343a2 dd43053a 1ec30c03 26115278 7214325d
21:56:09 ipsec,debug,packet ff1b17b2 a5d42e11 7b78ae2d ab2bf6ce ecd86017 6760392e 493c232a 09edb7ab
21:56:09 ipsec,debug,packet 026c1bba 12bc71d5 af08d6b1
21:56:09 ipsec sent phase2 packet 155.4.242.200[500]<=>90.232.69.248[500] da16d52d848127c0:add81ce5b7d484b2:ce8971bc
21:56:09 ipsec,debug ===== received 60 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:09 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000003c f3c6c642
21:56:09 ipsec,debug,packet 71a02d69 67efda2d fd5321c6 6aa2e73e 12306cca 4cba5f73 4d1c05ea
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug IV was saved for next processing:
21:56:09 ipsec,debug 6aa2e73e 12306cca 4cba5f73 4d1c05ea
21:56:09 ipsec,debug encryption(aes)
21:56:09 ipsec,debug with key:
21:56:09 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:09 ipsec,debug decrypted payload by IV:
21:56:09 ipsec,debug 09edb7ab 026c1bba 12bc71d5 af08d6b1
21:56:09 ipsec,debug decrypted payload, but not trimed.
21:56:09 ipsec,debug 00000018 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf 00000000 00000008
21:56:09 ipsec,debug padding len=9
21:56:09 ipsec,debug skip to trim padding.
21:56:09 ipsec,debug decrypted.
21:56:09 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08102001 ce8971bc 0000003c 00000018
21:56:09 ipsec,debug 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf 00000000 00000008
21:56:09 ipsec,debug begin.
21:56:09 ipsec,debug seen nptype=8(hash) len=24
21:56:09 ipsec,debug succeed.
21:56:09 ipsec,debug HASH(3) validate:
21:56:09 ipsec,debug 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf
21:56:09 ipsec,debug HASH with:
21:56:09 ipsec,debug 00ce8971 bc219a6f 54915952 20588ddf 53d15840 ab8fb8ad 844655ae 2c375402
21:56:09 ipsec,debug 6938b3c9 62d85afc ed835146 08
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug HASH computed:
21:56:09 ipsec,debug 6e57d750 749f83d6 e4ea2beb 532a7ea6 3d23b5bf
21:56:09 ipsec,debug ===
21:56:09 ipsec,debug KEYMAT compute with
21:56:09 ipsec,debug 0309952a 46219a6f 54915952 20588ddf 53d15840 ab8fb8ad 844655ae 2c375402
21:56:09 ipsec,debug 6938b3c9 62d85afc ed835146 08
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug encryption(aes-cbc)
21:56:09 ipsec,debug hmac(sha1)
21:56:09 ipsec,debug encklen=256 authklen=160
21:56:09 ipsec,debug generating 640 bits of key (dupkeymat=4)
21:56:09 ipsec,debug generating K1...K4 for KEYMAT.
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug 704b2e74 ba2d7f9f 20fe1e47 d05f4e0d 15064acf 440b65f3 3d387efb d162bd5c
21:56:09 ipsec,debug 5b5e8388 9825a0f5 0e8c9ad3 c4e33a60 834b5cc2 1124e341 d9f4a4f6 7bec443d
21:56:09 ipsec,debug d9f4e6d4 b37bdd76 63a01239 a30e5136
21:56:09 ipsec,debug KEYMAT compute with
21:56:09 ipsec,debug 0302f249 f0219a6f 54915952 20588ddf 53d15840 ab8fb8ad 844655ae 2c375402
21:56:09 ipsec,debug 6938b3c9 62d85afc ed835146 08
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug encryption(aes-cbc)
21:56:09 ipsec,debug hmac(sha1)
21:56:09 ipsec,debug encklen=256 authklen=160
21:56:09 ipsec,debug generating 640 bits of key (dupkeymat=4)
21:56:09 ipsec,debug generating K1...K4 for KEYMAT.
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug hmac(hmac_sha1)
21:56:09 ipsec,debug 0b604b87 38e81df3 535265b0 0f9639d8 bb08572d 425e9d64 dd9e1458 80d5c96f
21:56:09 ipsec,debug 6780099f 821c5a91 34811eb2 928d29fb 01ae2949 f02c0328 32375f6b d8746806
21:56:09 ipsec,debug 1d2e15db 7d65e647 1099cbd2 1ad82dd1
21:56:09 ipsec,debug KEYMAT computed.
21:56:09 ipsec,debug call pk_sendupdate
21:56:09 ipsec,debug encryption(aes-cbc)
21:56:09 ipsec,debug hmac(sha1)
21:56:09 ipsec,debug call pfkey_send_update_nat
21:56:09 ipsec IPsec-SA established: ESP/Transport 90.232.69.248[500]->155.4.242.200[500] spi=0x9952a46
21:56:09 ipsec,debug pfkey update sent.
21:56:09 ipsec,debug encryption(aes-cbc)
21:56:09 ipsec,debug hmac(sha1)
21:56:09 ipsec,debug call pfkey_send_add_nat
21:56:09 ipsec IPsec-SA established: ESP/Transport 155.4.242.200[500]->90.232.69.248[500] spi=0x2f249f0
21:56:09 ipsec,debug pfkey add sent.
21:56:19 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500]
21:56:19 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500]
21:56:19 ipsec,debug,packet ff
21:56:29 ipsec,debug ===== received 76 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:29 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08100501 0e0639e6 0000004c d0ed5309
21:56:29 ipsec,debug,packet 9c91abbb 6fbdfb9e 9bb906dd 0aa8d3b4 820567d5 4828072c 900f38f3 de8597d0
21:56:29 ipsec,debug,packet f3e73974 d6bffb9d 12858714
21:56:29 ipsec,debug receive Information.
21:56:29 ipsec,debug compute IV for phase2
21:56:29 ipsec,debug phase1 last IV:
21:56:29 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 0e0639e6
21:56:29 ipsec,debug hash(sha1)
21:56:29 ipsec,debug encryption(aes)
21:56:29 ipsec,debug phase2 IV computed:
21:56:29 ipsec,debug 34af0279 f5ea8525 cf115387 5d08d155
21:56:29 ipsec,debug encryption(aes)
21:56:29 ipsec,debug IV was saved for next processing:
21:56:29 ipsec,debug de8597d0 f3e73974 d6bffb9d 12858714
21:56:29 ipsec,debug encryption(aes)
21:56:29 ipsec,debug with key:
21:56:29 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:29 ipsec,debug decrypted payload by IV:
21:56:29 ipsec,debug 34af0279 f5ea8525 cf115387 5d08d155
21:56:29 ipsec,debug decrypted payload, but not trimed.
21:56:29 ipsec,debug 0c000018 44fd457c 47fd1a59 db7d7ea8 d4db4960 2f9b83b7 00000010 00000001
21:56:29 ipsec,debug 03040001 02f249f0 00000000 00000008
21:56:29 ipsec,debug padding len=9
21:56:29 ipsec,debug skip to trim padding.
21:56:29 ipsec,debug decrypted.
21:56:29 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08100501 0e0639e6 0000004c 0c000018
21:56:29 ipsec,debug 44fd457c 47fd1a59 db7d7ea8 d4db4960 2f9b83b7 00000010 00000001 03040001
21:56:29 ipsec,debug 02f249f0 00000000 00000008
21:56:29 ipsec,debug HASH with:
21:56:29 ipsec,debug 0e0639e6 00000010 00000001 03040001 02f249f0
21:56:29 ipsec,debug hmac(hmac_sha1)
21:56:29 ipsec,debug HASH computed:
21:56:29 ipsec,debug 44fd457c 47fd1a59 db7d7ea8 d4db4960 2f9b83b7
21:56:29 ipsec,debug hash validated.
21:56:29 ipsec,debug begin.
21:56:29 ipsec,debug seen nptype=8(hash) len=24
21:56:29 ipsec,debug seen nptype=12(delete) len=16
21:56:29 ipsec,debug succeed.
21:56:29 ipsec,debug 90.232.69.248 delete payload for protocol ESP
21:56:29 ipsec purged IPsec-SA proto_id=ESP spi=0x2f249f0
21:56:29 ipsec purged IPsec-SA proto_id=ESP spi=0x9952a46
21:56:29 ipsec,debug an undead schedule has been deleted.
21:56:29 ipsec removing generated policy
21:56:29 ipsec,debug purged SAs.
21:56:29 ipsec,debug ===== received 92 bytes from 90.232.69.248[500] to 155.4.242.200[500]
21:56:29 ipsec,debug,packet da16d52d 848127c0 add81ce5 b7d484b2 08100501 401ad7b8 0000005c 21cbd512
21:56:29 ipsec,debug,packet 6391696c f89b4c90 46f15f97 a786fe30 9a0e6411 86fcaa86 2a96476e fa106e70
21:56:29 ipsec,debug,packet 7a10ab1a 29c0ed71 85d4e403 07a3fa14 1373509f 58e4f366 4c311c16
21:56:29 ipsec,debug receive Information.
21:56:29 ipsec,debug compute IV for phase2
21:56:29 ipsec,debug phase1 last IV:
21:56:29 ipsec,debug cd8192cd 01200b4f 8e6cf81b b9626e33 401ad7b8
21:56:29 ipsec,debug hash(sha1)
21:56:29 ipsec,debug encryption(aes)
21:56:29 ipsec,debug phase2 IV computed:
21:56:29 ipsec,debug dbe20280 12ec089d 7f9165ac 5e071da0
21:56:29 ipsec,debug encryption(aes)
21:56:29 ipsec,debug IV was saved for next processing:
21:56:29 ipsec,debug 07a3fa14 1373509f 58e4f366 4c311c16
21:56:29 ipsec,debug encryption(aes)
21:56:29 ipsec,debug with key:
21:56:29 ipsec,debug f8baee0e 235e63c7 74a22e75 a38a56ea 58b1d963 4cd0f801 88984a31 1cc5e675
21:56:29 ipsec,debug decrypted payload by IV:
21:56:29 ipsec,debug dbe20280 12ec089d 7f9165ac 5e071da0
21:56:29 ipsec,debug decrypted payload, but not trimed.
21:56:29 ipsec,debug 0c000018 495a1b37 8e27749a b66e3ef2 76352ef1 bc356e52 0000001c 00000001
21:56:29 ipsec,debug 01100001 da16d52d 848127c0 add81ce5 b7d484b2 00000000 00000000 0000000c
21:56:29 ipsec,debug padding len=13
21:56:29 ipsec,debug skip to trim padding.
21:56:29 ipsec,debug decrypted.
21:56:29 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 08100501 401ad7b8 0000005c 0c000018
21:56:29 ipsec,debug 495a1b37 8e27749a b66e3ef2 76352ef1 bc356e52 0000001c 00000001 01100001
21:56:29 ipsec,debug da16d52d 848127c0 add81ce5 b7d484b2 00000000 00000000 0000000c
21:56:29 ipsec,debug HASH with:
21:56:29 ipsec,debug 401ad7b8 0000001c 00000001 01100001 da16d52d 848127c0 add81ce5 b7d484b2
21:56:29 ipsec,debug hmac(hmac_sha1)
21:56:29 ipsec,debug HASH computed:
21:56:29 ipsec,debug 495a1b37 8e27749a b66e3ef2 76352ef1 bc356e52
21:56:29 ipsec,debug hash validated.
21:56:29 ipsec,debug begin.
21:56:29 ipsec,debug seen nptype=8(hash) len=24
21:56:29 ipsec,debug seen nptype=12(delete) len=28
21:56:29 ipsec,debug succeed.
21:56:29 ipsec,debug 90.232.69.248 delete payload for protocol ISAKMP
21:56:29 ipsec,info purging ISAKMP-SA 155.4.242.200[500]<=>90.232.69.248[500] spi=da16d52d848127c0:add81ce5b7d484b2.
21:56:29 ipsec purged ISAKMP-SA 155.4.242.200[500]<=>90.232.69.248[500] spi=da16d52d848127c0:add81ce5b7d484b2.
21:56:29 ipsec,debug purged SAs.
21:56:29 ipsec,info ISAKMP-SA deleted 155.4.242.200[500]-90.232.69.248[500] spi:da16d52d848127c0:add81ce5b7d484b2 rekey:1
21:56:29 ipsec,debug an undead schedule has been deleted.
21:56:39 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500]
21:56:39 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500]
21:56:39 ipsec,debug,packet ff
21:56:58 system,info,account user admin logged in from 192.168.0.116 via telnet
21:56:59 ipsec,debug KA: 155.4.242.200[4500]->188.65.159.161[4500]
21:56:59 ipsec,debug 1 times of 1 bytes message will be sent to 188.65.159.161[4500]
21:56:59 ipsec,debug,packet ff