VPN site-to-site multiple subnets

I have a problem with subnets failures in VPN Mikrotik-Sophos

On my side (Mikrotik 6.44.3) one IP subnet.
On other side (Sophos) about 15 subnets.
for every subnet i have policy like this:
add dst-address=172.x.x.x/24 level=unique sa-dst-address=88.x.x.x
sa-src-address=62.x.x.x src-address=192.x.x.x/24 tunnel=yes

All policies have ph2 state established.


Some subnet i cannot reach.
But If i disable subnet that does not work and then i enable it it works but other becomes dysfunctional.
what is interesting that this always applies to the same pair of subnets

Have any some idea?

I made a sniff and mikrotik uses same policy (i see same SPI) for different subnet.
But i have defined for every subnet own policy.

here is two policies with have some collision:

7 A src-address=192.168.163.0/24 src-port=any dst-address=172.21.69.0/24 dst-port=any protocol=all action=encrypt level=uniqu>
ipsec-protocols=esp tunnel=yes sa-src-address=62.24.71.26 sa-dst-address=88.79.252.164 proposal=default ph2-count=1

18 A src-address=192.168.163.0/24 src-port=any dst-address=192.168.22.0/24 dst-port=any protocol=all action=encrypt
level=unique ipsec-protocols=esp tunnel=yes sa-src-address=62.24.71.26 sa-dst-address=88.79.252.164 proposal=default
ph2-count=1


Mikrotik uses the same SPI for both subnets and uses the SPI that is newer.

Here is sniff from mikrotik. Mikrotik uses same SPI (red marked) for addresses from different subnets ( blue marked):
error.PNG

What does /ip ipsec installed-sa print where src-address~“88.*164” or dst-address~“88.*164” say? If it shows more than two established SAs, what are the SPIs of SAs in the same direction, same or different?

Normally when level=unique is used, each policy triggers establishment of its own pair of security associations (with individual SPI in each direction of course). So if you can see double the number of installed-sa towards the Sophos as is the number of policies, and nevertheless the same SPI is used to transport pings to destinations matching different policies, something is either broken in 6.44.3 or in the initial negotiation with Sophos. You should be able to see what exactly is wrong in the negotiation if you switch on logging of IPsec using /system logging add topics=ipsec,!packet, then disable the peer representing the Sophos, and then run /log print follow-only file=ipsec-log where topics~“ipsec” in one window and re-enable the peer in another window or using the GUI. After the policies become active, break the logging into file, download the file and start reading it (or post it here if you get lost).

i have 15 policies and as you can see 30 SAs. for all policies i have set Level unique.
SA.PNG

OK, so it doesn’t seem like a misunderstanding between Sophos and Mikrotik on how to use the SAs, i.e. whether to use a single pair for all policies or not, because some SA pairs are obviously used in both directions. So the more I suspect a bug. Assuming that you cannot use the VPN anyway due to these issues, can you disable all policies for those remote subnets which work (or, even better, change their sa-dst-address to some bogus one to make Mikrotik ignore them for the Sophos peer), then disable and re-enable the Sophos peer and see whether the remaining policies work properly or the problem still persists? I mean, it can be an issue of how many policies per peer the Mikrotik stack can handle in 6.44.3 before going mad.

Here is log. What i cas see as strange is that some policies have same “reqid” eg. reqid 9. I guess this is a reason why mikrotik sends both subnet with same SA.
Do you know who is responsible for setting reqid? my side or sophos?

# apr/25/2019 12:57: 8 by RouterOS 6.44.3
# software id = 3S1P-BNWF
#
12:57:08 ipsec phase2 sa deleted 62.24.71.26-88.79.252.164 
12:57:10 ipsec acquire for 62.24.71.26 <=> 88.79.252.164 
12:57:10 ipsec suitable policy found: 192.168.163.0/24 <=> 172.31.0.0/24 
12:57:10 ipsec,debug Zombie ph2 found, expiring it 
12:57:10 ipsec phase2 sa expired 62.24.71.26-88.79.252.164 
12:57:10 ipsec no peer config for 88.79.252.164 
12:57:10 ipsec no peer config found 
12:57:11 ipsec phase2 sa deleted 62.24.71.26-88.79.252.164 
12:57:14 ipsec,debug ===== received 256 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:14 ipsec no IKEv1 peer config for 88.79.252.164 
12:57:16 ipsec acquire for 62.24.71.26 <=> 88.79.252.164 
12:57:16 ipsec suitable policy found: 192.168.163.0/24 <=> 172.21.32.0/20 
12:57:16 ipsec no peer config for 88.79.252.164 
12:57:16 ipsec no peer config found 
12:57:32 ipsec acquire for 62.24.71.26 <=> 88.79.252.164 
12:57:32 ipsec suitable policy found: 192.168.163.0/24 <=> 192.168.9.0/24 
12:57:32 ipsec no peer config for 88.79.252.164 
12:57:32 ipsec no peer config found 
12:57:34 ipsec,debug ===== received 256 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug === 
12:57:34 ipsec,info respond new phase 1 (Identity Protection): 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=1(sa) len=56 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=12 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug seen nptype=13(vid) len=20 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received unknown Vendor ID 
12:57:34 ipsec,debug 882fe56d 6fd20dbc 2251613b 2ebe5beb 
12:57:34 ipsec received Vendor ID: CISCO-UNITY 
12:57:34 ipsec received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt 
12:57:34 ipsec received Vendor ID: DPD 
12:57:34 ipsec,debug remote supports DPD 
12:57:34 ipsec received Vendor ID: RFC 3947 
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n 
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-00 
12:57:34 ipsec 88.79.252.164 Selected NAT-T version: RFC 3947 
12:57:34 ipsec,debug total SA len=52 
12:57:34 ipsec,debug 00000001 00000001 0000002c 00010001 00000024 00010000 800b0001 800c7080 
12:57:34 ipsec,debug 80010007 80020002 800e0080 80030001 80040005 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=44 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=44 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=36 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=36 
12:57:34 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800 
12:57:34 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
12:57:34 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
12:57:34 ipsec,debug dh(modp1536) 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80bcc70: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug -checking with pre-shared key auth- 
12:57:34 ipsec,debug prop#=0, prot-id=ISAKMP, spi-size=0, #trns=1 
12:57:34 ipsec,debug trns#=0, trns-id=IKE 
12:57:34 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800 
12:57:34 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC 
12:57:34 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
12:57:34 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group 
12:57:34 ipsec,debug -compare proposal #1: Local:Peer 
12:57:34 ipsec,debug (lifetime = 28800:28800) 
12:57:34 ipsec,debug (lifebyte = 0:0) 
12:57:34 ipsec,debug enctype = AES-CBC:AES-CBC 
12:57:34 ipsec,debug (encklen = 128:128) 
12:57:34 ipsec,debug hashtype = SHA:SHA 
12:57:34 ipsec,debug authmethod = pre-shared key:pre-shared key 
12:57:34 ipsec,debug dh_group = 1536-bit MODP group:1536-bit MODP group 
12:57:34 ipsec,debug -an acceptable proposal found- 
12:57:34 ipsec,debug dh(modp1536) 
12:57:34 ipsec,debug -agreed on pre-shared key auth- 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug new cookie: 
12:57:34 ipsec,debug b4b9751c9b603079\01 
12:57:34 ipsec Adding xauth VID payload. 
12:57:34 ipsec,debug add payload of len 52, next type 13 
12:57:34 ipsec,debug add payload of len 16, next type 13 
12:57:34 ipsec,debug add payload of len 8, next type 13 
12:57:34 ipsec,debug add payload of len 16, next type 13 
12:57:34 ipsec,debug add payload of len 16, next type 0 
12:57:34 ipsec,debug 156 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 156 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase1 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079 
12:57:34 ipsec,debug ===== received 292 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=4(ke) len=196 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=20(nat-d) len=24 
12:57:34 ipsec,debug seen nptype=20(nat-d) len=24 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec 62.24.71.26 Hashing 62.24.71.26[500] with algo #2  
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec NAT-D payload #0 verified 
12:57:34 ipsec 88.79.252.164 Hashing 88.79.252.164[500] with algo #2  
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec NAT-D payload #1 verified 
12:57:34 ipsec NAT not detected  
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug dh(modp1536) 
12:57:34 ipsec,debug compute DH's private. 
12:57:34 ipsec,debug 7bfcb681 03f06401 74879f50 b0235fd5 f23f47ec c3dd16c0 4ad9616e 9a81bdf2 
12:57:34 ipsec,debug c3c9a0f5 b211297b 183ecad9 9bd61619 08dad204 4672c91e 8b73f86d 33685655 
12:57:34 ipsec,debug a9c8a7ed 22348671 3b1bd156 bb526376 07b6c410 4b3201e5 8ce11e4a c246a5bf 
12:57:34 ipsec,debug f8c95999 b818ce15 e5826a37 833516d3 cb99fa0e cc2e6a9f 71c49a4e 045820dd 
12:57:34 ipsec,debug e5d7d1a9 deb3063e 5cf5a0bc d4023a83 8bf65f74 0ba98822 aa4af686 06cad540 
12:57:34 ipsec,debug d810fd7e b5baba52 dfba5b84 83307eec 4a5074c8 2aae066e 7485e1d6 5018a819 
12:57:34 ipsec,debug compute DH's public. 
12:57:34 ipsec,debug a5d3beca f2b443de b9394ef8 96493189 3e560e39 29f11575 943fce33 c211b662 
12:57:34 ipsec,debug df27cc28 eb8f7d7e 4d60420f 194325a6 64b81742 2545ad53 78be796d 57c594df 
12:57:34 ipsec,debug f97abc55 dced847b 90f8e692 f79a6723 a571b3db 98390d9d b8d8fb0d cf03b25b 
12:57:34 ipsec,debug 1066cac8 f5c6ef58 0dec6601 cab30598 559e7b34 4ac9b84c a40be138 7fa74eff 
12:57:34 ipsec,debug 2de6054e d4fa92b4 5b9d6429 aee8f2df bc8b0c29 16f872f1 f752ad8d c15fe26a 
12:57:34 ipsec,debug fc18fc8d f4899285 e3400689 ffa06ee8 0d04d39d e5238e41 9577fb47 35d28099 
12:57:34 ipsec 88.79.252.164 Hashing 88.79.252.164[500] with algo #2  
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec 62.24.71.26 Hashing 62.24.71.26[500] with algo #2  
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec Adding remote and local NAT-D payloads. 
12:57:34 ipsec,debug add payload of len 192, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 20 
12:57:34 ipsec,debug add payload of len 20, next type 20 
12:57:34 ipsec,debug add payload of len 20, next type 0 
12:57:34 ipsec,debug 300 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 300 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase1 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079 
12:57:34 ipsec,debug dh(modp1536) 
12:57:34 ipsec,debug compute DH's shared. 
12:57:34 ipsec,debug 
12:57:34 ipsec,debug 64e04dfe 3e1a9293 4f3ef24d 598abc8d 4efe1262 8e21c156 cbba6e9d 48a45df7 
12:57:34 ipsec,debug 72b53ced 597f2209 2912089d 3181c14a efa8924c 5c84d51b 3ca84dc7 b14b341b 
12:57:34 ipsec,debug 32a50f2c c28f3dde 3b9acc93 76a40303 6d79cf6b c3fbb907 f85f48c0 34eac23b 
12:57:34 ipsec,debug 96887a69 cbb0a8b1 c40d1334 0c3bd159 92400417 7711c30a 3b094067 4e2983b7 
12:57:34 ipsec,debug 32116614 d4d28696 0a5b6991 5c5dac07 7284a74d d6c9dd75 bc1076e3 5a434ed7 
12:57:34 ipsec,debug 50f6b33f 693d3248 5392dd5a 242ff01b 90bd3d07 ca2afd55 1ab0e8c2 ee65216c 
12:57:34 ipsec,debug nonce 1:  
12:57:34 ipsec,debug f9a0f0b5 0a1b1f79 ae6ff43f 0054c951 
12:57:34 ipsec,debug nonce 2:  
12:57:34 ipsec,debug a548ef19 aae95f78 93d1da4d be6b0f27 d0981bf1 b2f60aab 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug SKEYID computed: 
12:57:34 ipsec,debug b530dc08 2c833050 ed19f1a7 71d0c0a0 81e27d1e 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug SKEYID_d computed: 
12:57:34 ipsec,debug a14fbe38 13c966c7 35f6cdb4 9a147e30 9be56635 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug SKEYID_a computed: 
12:57:34 ipsec,debug 80646eb9 5bf22489 ce4b4464 c6302a6a 2c315944 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug SKEYID_e computed: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 0f515ed2 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug final encryption key computed: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV computed: 
12:57:34 ipsec,debug 6826048c 0d254190 72a5184c 005762ac 
12:57:34 ipsec,debug ===== received 76 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug ceefd4d3 33e95f7d f9964280 bfad361b 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 6826048c 0d254190 72a5184c 005762ac 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 0800000c 01000000 584ffca4 00000018 7bf537ec b4cd1bf8 b7571c06 f6e0544c 
12:57:34 ipsec,debug f6377499 00000000 00000000 00000000 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 05100201 00000000 0000004c 0800000c 
12:57:34 ipsec,debug 01000000 584ffca4 00000018 7bf537ec b4cd1bf8 b7571c06 f6e0544c f6377499 
12:57:34 ipsec,debug 00000000 00000000 00000000 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=5(id) len=12 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug HASH received: 
12:57:34 ipsec,debug 7bf537ec b4cd1bf8 b7571c06 f6e0544c f6377499 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug e333d65e 12018d12 dd9ddea8 3e1a1b1f 8df6dd47 1eac27ed c412d458 443cb2ea 
12:57:34 ipsec,debug bd333f78 7328f0a4 b00d5f84 3c473b86 0024ce56 bd64a978 e670d39a 5847d4ca 
12:57:34 ipsec,debug ca447606 b8d67182 2500d569 44bbffb8 64e347e6 01e8053f b7053388 fc35a9b1 
12:57:34 ipsec,debug c1fcbcaf d1a72c36 6070f5be 04e411e5 c32ac7ac a728cb80 bbcdff85 028a4135 
12:57:34 ipsec,debug 78a1efba 8c42811b ebd8ef17 87e2a5b7 7eebce73 a47feead c13a3528 d3421114 
12:57:34 ipsec,debug 001695e6 72c494ab 49e72c5f d7acb580 3555e1f1 a1315d05 a3a1f912 e49cb885 
12:57:34 ipsec,debug a5d3beca f2b443de b9394ef8 96493189 3e560e39 29f11575 943fce33 c211b662 
12:57:34 ipsec,debug df27cc28 eb8f7d7e 4d60420f 194325a6 64b81742 2545ad53 78be796d 57c594df 
12:57:34 ipsec,debug f97abc55 dced847b 90f8e692 f79a6723 a571b3db 98390d9d b8d8fb0d cf03b25b 
12:57:34 ipsec,debug 1066cac8 f5c6ef58 0dec6601 cab30598 559e7b34 4ac9b84c a40be138 7fa74eff 
12:57:34 ipsec,debug 2de6054e d4fa92b4 5b9d6429 aee8f2df bc8b0c29 16f872f1 f752ad8d c15fe26a 
12:57:34 ipsec,debug fc18fc8d f4899285 e3400689 ffa06ee8 0d04d39d e5238e41 9577fb47 35d28099 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 00000001 00000001 0000002c 00010001 
12:57:34 ipsec,debug 00000024 00010000 800b0001 800c7080 80010007 80020002 800e0080 80030001 
12:57:34 ipsec,debug 80040005 01000000 584ffca4 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 7bf537ec b4cd1bf8 b7571c06 f6e0544c f6377499 
12:57:34 ipsec,debug HASH for PSK validated. 
12:57:34 ipsec,debug 88.79.252.164 peer's ID 
12:57:34 ipsec,debug 01000000 584ffca4 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug use ID type of IPv4_address 
12:57:34 ipsec,debug generate HASH_R 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug a5d3beca f2b443de b9394ef8 96493189 3e560e39 29f11575 943fce33 c211b662 
12:57:34 ipsec,debug df27cc28 eb8f7d7e 4d60420f 194325a6 64b81742 2545ad53 78be796d 57c594df 
12:57:34 ipsec,debug f97abc55 dced847b 90f8e692 f79a6723 a571b3db 98390d9d b8d8fb0d cf03b25b 
12:57:34 ipsec,debug 1066cac8 f5c6ef58 0dec6601 cab30598 559e7b34 4ac9b84c a40be138 7fa74eff 
12:57:34 ipsec,debug 2de6054e d4fa92b4 5b9d6429 aee8f2df bc8b0c29 16f872f1 f752ad8d c15fe26a 
12:57:34 ipsec,debug fc18fc8d f4899285 e3400689 ffa06ee8 0d04d39d e5238e41 9577fb47 35d28099 
12:57:34 ipsec,debug e333d65e 12018d12 dd9ddea8 3e1a1b1f 8df6dd47 1eac27ed c412d458 443cb2ea 
12:57:34 ipsec,debug bd333f78 7328f0a4 b00d5f84 3c473b86 0024ce56 bd64a978 e670d39a 5847d4ca 
12:57:34 ipsec,debug ca447606 b8d67182 2500d569 44bbffb8 64e347e6 01e8053f b7053388 fc35a9b1 
12:57:34 ipsec,debug c1fcbcaf d1a72c36 6070f5be 04e411e5 c32ac7ac a728cb80 bbcdff85 028a4135 
12:57:34 ipsec,debug 78a1efba 8c42811b ebd8ef17 87e2a5b7 7eebce73 a47feead c13a3528 d3421114 
12:57:34 ipsec,debug 001695e6 72c494ab 49e72c5f d7acb580 3555e1f1 a1315d05 a3a1f912 e49cb885 
12:57:34 ipsec,debug b4b9751c 9b603079 b24d3d59 a41d03c9 00000001 00000001 0000002c 00010001 
12:57:34 ipsec,debug 00000024 00010000 800b0001 800c7080 80010007 80020002 800e0080 80030001 
12:57:34 ipsec,debug 80040005 011101f4 3e18471a 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug c23a2b48 7aee884a fc3d9320 77aa65b0 a8f0c035 
12:57:34 ipsec,debug add payload of len 8, next type 8 
12:57:34 ipsec,debug add payload of len 20, next type 0 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 12 
12:57:34 ipsec,debug 0800000c 011101f4 3e18471a 00000018 c23a2b48 7aee884a fc3d9320 77aa65b0 
12:57:34 ipsec,debug a8f0c035 e4cef3fd ec879af8 ebb29a0b 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug ceefd4d3 33e95f7d f9964280 bfad361b 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 76 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 76 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec,info ISAKMP-SA established 62.24.71.26[500]-88.79.252.164[500] spi:b24d3d59a41d03c9:b4b9751c9b603079 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba b476b60a 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 840e8c2e dc69e086 c1411285 99009951 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 095c1d53 f86ffa0d 7f76cced 45e68448 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 840e8c2e dc69e086 c1411285 99009951 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 14df5ab4 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 9b070e19 a57d0f40 d4ebf026 5b1f20c8 
12:57:34 ipsec,debug 05000010 04000000 ac151000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 b476b60a 0000009c 01000018 
12:57:34 ipsec,debug afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 14df5ab4 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 9b070e19 a57d0f40 d4ebf026 5b1f20c8 05000010 
12:57:34 ipsec,debug 04000000 ac151000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac151000 fffff000 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug b476b60a 0a000034 00000001 00000001 00000028 00030401 14df5ab4 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 9b070e19 
12:57:34 ipsec,debug a57d0f40 d4ebf026 5b1f20c8 05000010 04000000 ac151000 fffff000 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 14df5ab4 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80ce978: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.21.16.0[0] prefixlen=20 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.16.0/20 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.16.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=6:6) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80ce978 
12:57:34 ipsec,debug  0x80ce978: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=14df5ab4 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=6:6) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 316 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 4e2211db 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 89dc5538 1a1f1035 47361b86 b551d4f6 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 218f4bdb 4447b9cc 405ea828 e568bb40 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 89dc5538 1a1f1035 47361b86 b551d4f6 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 226fb164 e4432897 32475565 cff2e98d 5509e812 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 b1cf32db 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 9c131ebc c1fb8f29 99974f1f 70eadab6 
12:57:34 ipsec,debug 05000010 04000000 ac154100 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 4e2211db 0000009c 01000018 
12:57:34 ipsec,debug 226fb164 e4432897 32475565 cff2e98d 5509e812 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 b1cf32db 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 9c131ebc c1fb8f29 99974f1f 70eadab6 05000010 
12:57:34 ipsec,debug 04000000 ac154100 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac154100 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 226fb164 e4432897 32475565 cff2e98d 5509e812 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 4e2211db 0a000034 00000001 00000001 00000028 00030401 b1cf32db 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 9c131ebc 
12:57:34 ipsec,debug c1fb8f29 99974f1f 70eadab6 05000010 04000000 ac154100 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 226fb164 e4432897 32475565 cff2e98d 5509e812 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 b1cf32db 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c4ed0: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.21.65.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.65.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.65.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=14:14) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80c4ed0 
12:57:34 ipsec,debug  0x80c4ed0: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=b1cf32db spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=14:14) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 317 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80ceb30: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug b476b60a 9b070e19 a57d0f40 d4ebf026 5b1f20c8 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 030e5f84 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c 8e112b34 d5c2cfac 6f917398 030e6832 f940c00f 
12:57:34 ipsec,debug 1eae9ae1 05000010 04000000 ac151000 fffff000 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 9c17e020 732ffbf3 756e20a2 22f8dfac 781c73b6 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 9c17e020 732ffbf3 756e20a2 22f8dfac 781c73b6 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 030e5f84 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c 8e112b34 d5c2cfac 6f917398 030e6832 
12:57:34 ipsec,debug f940c00f 1eae9ae1 05000010 04000000 ac151000 fffff000 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 c49ac0f5 b7e49e07 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug 095c1d53 f86ffa0d 7f76cced 45e68448 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 88538956 0d83dbbe fc2b780f 6563b6c9 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000b476 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 7d977968 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug b1b9ea9c 3df985a2 0d1eb5e5 019b29c9 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug e3116166 f8ba63bc 1aafc8a7 568beaee 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug b1b9ea9c 3df985a2 0d1eb5e5 019b29c9 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 77065c88 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 d103b0b1 0ddd7b19 dc90955a 858b9809 
12:57:34 ipsec,debug 05000010 04000000 ac154500 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 7d977968 0000009c 01000018 
12:57:34 ipsec,debug cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 77065c88 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 d103b0b1 0ddd7b19 dc90955a 858b9809 05000010 
12:57:34 ipsec,debug 04000000 ac154500 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac154500 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 7d977968 0a000034 00000001 00000001 00000028 00030401 77065c88 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 d103b0b1 
12:57:34 ipsec,debug 0ddd7b19 dc90955a 858b9809 05000010 04000000 ac154500 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 77065c88 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cd6a8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.21.69.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.69.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.69.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80cd6a8 
12:57:34 ipsec,debug  0x80cd6a8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=77065c88 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 318 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80ce850: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 4e2211db 9c131ebc c1fb8f29 99974f1f 70eadab6 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0e734bcc 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c e50349c6 139d783d 3b54ed13 dfe8ef51 9ea31115 
12:57:34 ipsec,debug 86b6e80b 05000010 04000000 ac154100 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 0fe2a85d 3be4c63f fe71da04 e0120927 9535fca9 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 0fe2a85d 3be4c63f fe71da04 e0120927 9535fca9 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0e734bcc 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e50349c6 139d783d 3b54ed13 dfe8ef51 
12:57:34 ipsec,debug 9ea31115 86b6e80b 05000010 04000000 ac154100 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 ebb19ab1 b0cafa07 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug 218f4bdb 4447b9cc 405ea828 e568bb40 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug f7269c69 9752e105 a73ae47f 3019611b 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00004e22 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 2101e83d 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 4bc6a89b fb4e9c1e d264a7f1 1a1c8098 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug b4480a1b f9d00dfb 3160dafe 19ffe656 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 4bc6a89b fb4e9c1e d264a7f1 1a1c8098 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 f510f072 23f84b50 7b27654d 0a64e412 53c8fd86 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 372170ec 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 5289fff4 2f508add a8dfdc75 4aef8a3a 
12:57:34 ipsec,debug 05000010 04000000 ac155500 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 2101e83d 0000009c 01000018 
12:57:34 ipsec,debug f510f072 23f84b50 7b27654d 0a64e412 53c8fd86 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 372170ec 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 5289fff4 2f508add a8dfdc75 4aef8a3a 05000010 
12:57:34 ipsec,debug 04000000 ac155500 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac155500 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug f510f072 23f84b50 7b27654d 0a64e412 53c8fd86 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 2101e83d 0a000034 00000001 00000001 00000028 00030401 372170ec 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 5289fff4 
12:57:34 ipsec,debug 2f508add a8dfdc75 4aef8a3a 05000010 04000000 ac155500 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug f510f072 23f84b50 7b27654d 0a64e412 53c8fd86 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 372170ec 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c23b8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.21.85.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.85.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.85.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=16:16) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80c23b8 
12:57:34 ipsec,debug  0x80c23b8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=372170ec spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=16:16) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 319 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c2488: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 7d977968 d103b0b1 0ddd7b19 dc90955a 858b9809 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 06d4d8ee 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c fbfdc833 0d9e9214 2e4d916c 0df53cef eee7af9f 
12:57:34 ipsec,debug d7b1e577 05000010 04000000 ac154500 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug c0ffd27b 41bf11db 0a26f2bb 9af12769 59864873 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 c0ffd27b 41bf11db 0a26f2bb 9af12769 59864873 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 06d4d8ee 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c fbfdc833 0d9e9214 2e4d916c 0df53cef 
12:57:34 ipsec,debug eee7af9f d7b1e577 05000010 04000000 ac154500 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 b3a3a982 c785ec07 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug e3116166 f8ba63bc 1aafc8a7 568beaee 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 1c943449 cb3dc5b2 75ebef70 51a57a11 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00007d97 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba e71475bc 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug cb91da91 eccdf169 5ad52ba2 b27709bc 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 762031d7 5d921388 a74864e0 87abd6a1 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug cb91da91 eccdf169 5ad52ba2 b27709bc 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 9551b1ca 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 a0a2df23 586dc422 8b0321de 8490a3ae 
12:57:34 ipsec,debug 05000010 04000000 c0a80d00 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 e71475bc 0000009c 01000018 
12:57:34 ipsec,debug eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 9551b1ca 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 a0a2df23 586dc422 8b0321de 8490a3ae 05000010 
12:57:34 ipsec,debug 04000000 c0a80d00 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 c0a80d00 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug e71475bc 0a000034 00000001 00000001 00000028 00030401 9551b1ca 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 a0a2df23 
12:57:34 ipsec,debug 586dc422 8b0321de 8490a3ae 05000010 04000000 c0a80d00 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 9551b1ca 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cd758: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 192.168.13.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.13.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.13.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=19:19) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80cd758 
12:57:34 ipsec,debug  0x80cd758: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=9551b1ca spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=19:19) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 31a 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cd758: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 2101e83d 5289fff4 2f508add a8dfdc75 4aef8a3a 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0afedfef 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c e3493302 aebaae60 499cb76f e5891f7e 3dfd21d4 
12:57:34 ipsec,debug 23108ee5 05000010 04000000 ac155500 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 8473f09a 807a3797 2d64a1cc 6567f56e 77eb2a53 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 8473f09a 807a3797 2d64a1cc 6567f56e 77eb2a53 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0afedfef 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e3493302 aebaae60 499cb76f e5891f7e 
12:57:34 ipsec,debug 3dfd21d4 23108ee5 05000010 04000000 ac155500 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 a0efa7d2 9ddfc807 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug b4480a1b f9d00dfb 3160dafe 19ffe656 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 78581604 80e81e65 74f0fde3 f13ea672 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00002101 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 5f86beda 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 659376f9 08f78844 82983701 e01e93ab 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug e112fb55 c6e41408 b073623d 4bb37896 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 659376f9 08f78844 82983701 e01e93ab 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 0c228712 083c8189 a6261384 58198a80 66d4a7c1 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 d6c025b1 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 999e598c 4f49b2ca 0a1e9ae7 960f36cb 
12:57:34 ipsec,debug 05000010 04000000 c0a84a00 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 5f86beda 0000009c 01000018 
12:57:34 ipsec,debug 0c228712 083c8189 a6261384 58198a80 66d4a7c1 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 d6c025b1 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 999e598c 4f49b2ca 0a1e9ae7 960f36cb 05000010 
12:57:34 ipsec,debug 04000000 c0a84a00 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 c0a84a00 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 0c228712 083c8189 a6261384 58198a80 66d4a7c1 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 5f86beda 0a000034 00000001 00000001 00000028 00030401 d6c025b1 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 999e598c 
12:57:34 ipsec,debug 4f49b2ca 0a1e9ae7 960f36cb 05000010 04000000 c0a84a00 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 0c228712 083c8189 a6261384 58198a80 66d4a7c1 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 d6c025b1 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c9348: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 192.168.74.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.74.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.74.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80c9348 
12:57:34 ipsec,debug  0x80c9348: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=d6c025b1 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 31b 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c9410: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug e71475bc a0a2df23 586dc422 8b0321de 8490a3ae 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0bfb15d2 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c ae86a0a2 863d910b fad18fc6 6e513667 18ffdf62 
12:57:34 ipsec,debug caa15576 05000010 04000000 c0a80d00 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 49370450 698aadb3 ae57b581 5b65f49a 238a2cec 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 49370450 698aadb3 ae57b581 5b65f49a 238a2cec 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0bfb15d2 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c ae86a0a2 863d910b fad18fc6 6e513667 
12:57:34 ipsec,debug 18ffdf62 caa15576 05000010 04000000 c0a80d00 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 9caf819a fddaf907 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug 762031d7 5d921388 a74864e0 87abd6a1 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 3589105c 02701d12 66837ca0 df2018b6 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000e714 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 9340aee7 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 902ca196 f6d4cbb6 d0d0433e dac653f9 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug ee3c84ba ff05d0af 6e01a04d c3502471 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 902ca196 f6d4cbb6 d0d0433e dac653f9 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 3e363cce 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 8f204fc1 e51ec9cc e0be6c7d 8b8aff89 
12:57:34 ipsec,debug 05000010 04000000 ac152000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 9340aee7 0000009c 01000018 
12:57:34 ipsec,debug f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 3e363cce 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 8f204fc1 e51ec9cc e0be6c7d 8b8aff89 05000010 
12:57:34 ipsec,debug 04000000 ac152000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac152000 fffff000 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 9340aee7 0a000034 00000001 00000001 00000028 00030401 3e363cce 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 8f204fc1 
12:57:34 ipsec,debug e51ec9cc e0be6c7d 8b8aff89 05000010 04000000 ac152000 fffff000 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 3e363cce 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cbcf8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.21.32.0[0] prefixlen=20 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.32.0/20 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.32.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=2:2) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80cbcf8 
12:57:34 ipsec,debug  0x80cbcf8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=3e363cce spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=2:2) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 31c 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c70e8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 5f86beda 999e598c 4f49b2ca 0a1e9ae7 960f36cb 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0c7aee4c 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c e527a00d 3ce4d4d3 c629d469 6684506f ddb8b71c 
12:57:34 ipsec,debug 47b2f2e7 05000010 04000000 c0a84a00 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug dedcc9f4 c86cda88 0805529f b4bb38ec 343dedcf 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 dedcc9f4 c86cda88 0805529f b4bb38ec 343dedcf 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0c7aee4c 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e527a00d 3ce4d4d3 c629d469 6684506f 
12:57:34 ipsec,debug ddb8b71c 47b2f2e7 05000010 04000000 c0a84a00 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 dcccdcdf 8ef58607 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug e112fb55 c6e41408 b073623d 4bb37896 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 3def5b64 2748b9f1 a7c38180 2b92c862 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00005f86 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba eae461cc 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug e0bff7ce 30dcde07 b3c2018a fed9d5fa 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug ef8c8bd9 a2feb350 0f28770b 31072c0b 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug e0bff7ce 30dcde07 b3c2018a fed9d5fa 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 8a737d6c 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 2ada5d4b 1750cfc3 b86982e4 82524afa 
12:57:34 ipsec,debug 05000010 04000000 ac170000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 eae461cc 0000009c 01000018 
12:57:34 ipsec,debug ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 8a737d6c 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 2ada5d4b 1750cfc3 b86982e4 82524afa 05000010 
12:57:34 ipsec,debug 04000000 ac170000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac170000 fffff000 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug eae461cc 0a000034 00000001 00000001 00000028 00030401 8a737d6c 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 2ada5d4b 
12:57:34 ipsec,debug 1750cfc3 b86982e4 82524afa 05000010 04000000 ac170000 fffff000 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 8a737d6c 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80ce830: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.23.0.0[0] prefixlen=20 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.23.0.0/20 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.23.0.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=10:10) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80ce830 
12:57:34 ipsec,debug  0x80ce830: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=8a737d6c spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=10:10) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 31d 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c4890: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 9340aee7 8f204fc1 e51ec9cc e0be6c7d 8b8aff89 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 03a677f2 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c e2095eea e5e5dee3 3bc952a6 ea7bae2e 1b40bd9d 
12:57:34 ipsec,debug 9fc01455 05000010 04000000 ac152000 fffff000 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug f99f1326 6b908ae9 677f8695 a4c65230 e8cf1a2c 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 f99f1326 6b908ae9 677f8695 a4c65230 e8cf1a2c 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 03a677f2 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e2095eea e5e5dee3 3bc952a6 ea7bae2e 
12:57:34 ipsec,debug 1b40bd9d 9fc01455 05000010 04000000 ac152000 fffff000 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 97d3949b badab807 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug ee3c84ba ff05d0af 6e01a04d c3502471 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 4a1998d3 161d372e 58422bcd 5f596fc3 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00009340 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba cc51649b 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 56cce85f 7214a053 915c80f9 fe646004 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug b11dbc82 ec2ba732 ba3ae375 74506e8f 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 56cce85f 7214a053 915c80f9 fe646004 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 948c66a7 437c811d 587e9459 67a68522 6f7b175e 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 58b39bbd 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 e64a135c a0a9a283 4d4b8241 2f230d95 
12:57:34 ipsec,debug 05000010 04000000 ac1d0000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 cc51649b 0000009c 01000018 
12:57:34 ipsec,debug 948c66a7 437c811d 587e9459 67a68522 6f7b175e 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 58b39bbd 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 e64a135c a0a9a283 4d4b8241 2f230d95 05000010 
12:57:34 ipsec,debug 04000000 ac1d0000 fffff000 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac1d0000 fffff000 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 948c66a7 437c811d 587e9459 67a68522 6f7b175e 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug cc51649b 0a000034 00000001 00000001 00000028 00030401 58b39bbd 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 e64a135c 
12:57:34 ipsec,debug a0a9a283 4d4b8241 2f230d95 05000010 04000000 ac1d0000 fffff000 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 948c66a7 437c811d 587e9459 67a68522 6f7b175e 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 58b39bbd 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c9b28: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.29.0.0[0] prefixlen=20 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.29.0.0/20 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.29.0.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80c9b28 
12:57:34 ipsec,debug  0x80c9b28: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=58b39bbd spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 31e 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c9c90: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug eae461cc 2ada5d4b 1750cfc3 b86982e4 82524afa 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 012e952e 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c ea8d72e1 ea1068f4 3af381f9 c69d767c 16bf7ba8 
12:57:34 ipsec,debug 7452f817 05000010 04000000 ac170000 fffff000 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug b95acd48 da9754d0 83c28e30 99b74437 74c5f0d2 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 b95acd48 da9754d0 83c28e30 99b74437 74c5f0d2 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 012e952e 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c ea8d72e1 ea1068f4 3af381f9 c69d767c 
12:57:34 ipsec,debug 16bf7ba8 7452f817 05000010 04000000 ac170000 fffff000 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 c1c8d1e5 f096e407 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug ef8c8bd9 a2feb350 0f28770b 31072c0b 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug d9d93ae3 7ac39b7c d16f3f4e c86e2d77 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000eae4 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 992b663e 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 76c23af8 08ab7b0c 38e93e3e 9e6384b5 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug ef68066f be5d02c3 11f635cc 5af8bed4 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 76c23af8 08ab7b0c 38e93e3e 9e6384b5 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 9c362832 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 fc3573c1 5042ffc5 92ab82a8 095ea584 
12:57:34 ipsec,debug 05000010 04000000 c0a80000 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 992b663e 0000009c 01000018 
12:57:34 ipsec,debug 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 9c362832 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 fc3573c1 5042ffc5 92ab82a8 095ea584 05000010 
12:57:34 ipsec,debug 04000000 c0a80000 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 c0a80000 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 992b663e 0a000034 00000001 00000001 00000028 00030401 9c362832 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 fc3573c1 
12:57:34 ipsec,debug 5042ffc5 92ab82a8 095ea584 05000010 04000000 c0a80000 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 9c362832 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80ca118: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 192.168.0.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.0.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.0.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=3:3) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80ca118 
12:57:34 ipsec,debug  0x80ca118: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=9c362832 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=3:3) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 31f 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c4998: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug cc51649b e64a135c a0a9a283 4d4b8241 2f230d95 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0d1afda3 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c 90c1de1b 806863ae 9add6652 2a0dfb03 9a29d8a3 
12:57:34 ipsec,debug 7536149f 05000010 04000000 ac1d0000 fffff000 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 1002e016 2a1d8e70 3beee47e aa964ef7 86df1f10 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 1002e016 2a1d8e70 3beee47e aa964ef7 86df1f10 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0d1afda3 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c 90c1de1b 806863ae 9add6652 2a0dfb03 
12:57:34 ipsec,debug 9a29d8a3 7536149f 05000010 04000000 ac1d0000 fffff000 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 9db084b6 e0cb9c07 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug b11dbc82 ec2ba732 ba3ae375 74506e8f 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 817c0ca3 27ddee3e 1dbd4497 c71e5344 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000cc51 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba c6fb6612 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug faae2c2a 01de9bfb ec84bf10 3283a3eb 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 1c44c766 0ab7cbf1 8d97daab e985584a 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug faae2c2a 01de9bfb ec84bf10 3283a3eb 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 7575e5d3 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 79a17f3e d79b9546 f6dab836 2813ad06 
12:57:34 ipsec,debug 05000010 04000000 c0a80c00 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 c6fb6612 0000009c 01000018 
12:57:34 ipsec,debug 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 7575e5d3 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 79a17f3e d79b9546 f6dab836 2813ad06 05000010 
12:57:34 ipsec,debug 04000000 c0a80c00 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 c0a80c00 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug c6fb6612 0a000034 00000001 00000001 00000028 00030401 7575e5d3 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 79a17f3e 
12:57:34 ipsec,debug d79b9546 f6dab836 2813ad06 05000010 04000000 c0a80c00 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 7575e5d3 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80ca2c0: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 192.168.12.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.12.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.12.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=4:4) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80ca2c0 
12:57:34 ipsec,debug  0x80ca2c0: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=7575e5d3 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=4:4) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 320 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c6970: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 992b663e fc3573c1 5042ffc5 92ab82a8 095ea584 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0e7c7038 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c d4873b89 de746c12 46c22564 2545fa22 469e2765 
12:57:34 ipsec,debug 45bba9db 05000010 04000000 c0a80000 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug b8e0dedf 13e4ae26 8358838b 1b147593 b7da7324 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 b8e0dedf 13e4ae26 8358838b 1b147593 b7da7324 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0e7c7038 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c d4873b89 de746c12 46c22564 2545fa22 
12:57:34 ipsec,debug 469e2765 45bba9db 05000010 04000000 c0a80000 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 c9feaa92 cbcfa607 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug ef68066f be5d02c3 11f635cc 5af8bed4 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 1b98a1c0 d322ff8c 969e500e ec7f00e5 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000992b 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba d41e5c8b 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 9d739cac d6e8c413 7011f03b 6854a20b 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 71d6302b 708fb39b ca83f9e4 9ba08f41 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 9d739cac d6e8c413 7011f03b 6854a20b 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 30257509 f6465e8c ca359865 f520f805 0988f740 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 1625e0a2 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 d736cca2 57e52913 d801e9d6 501c16ab 
12:57:34 ipsec,debug 05000010 04000000 c0a81600 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 d41e5c8b 0000009c 01000018 
12:57:34 ipsec,debug 30257509 f6465e8c ca359865 f520f805 0988f740 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 1625e0a2 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 d736cca2 57e52913 d801e9d6 501c16ab 05000010 
12:57:34 ipsec,debug 04000000 c0a81600 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 c0a81600 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 30257509 f6465e8c ca359865 f520f805 0988f740 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug d41e5c8b 0a000034 00000001 00000001 00000028 00030401 1625e0a2 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 d736cca2 
12:57:34 ipsec,debug 57e52913 d801e9d6 501c16ab 05000010 04000000 c0a81600 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 30257509 f6465e8c ca359865 f520f805 0988f740 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 1625e0a2 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cf050: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 192.168.22.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.22.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.22.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80cf050 
12:57:34 ipsec,debug  0x80cf050: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=1625e0a2 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 321 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cf130: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug c6fb6612 79a17f3e d79b9546 f6dab836 2813ad06 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 068bd720 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c fa179142 fbe64813 53f06f0b 7da85d64 f3615b54 
12:57:34 ipsec,debug accf1363 05000010 04000000 c0a80c00 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 94c6dd8b 54d7164a 5f087be5 845bb559 54b619c8 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 94c6dd8b 54d7164a 5f087be5 845bb559 54b619c8 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 068bd720 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c fa179142 fbe64813 53f06f0b 7da85d64 
12:57:34 ipsec,debug f3615b54 accf1363 05000010 04000000 c0a80c00 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 938dd297 9ccad507 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug 1c44c766 0ab7cbf1 8d97daab e985584a 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 4a9a9ebd 121bc522 bc81a47b 78a63522 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000c6fb 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 35e38bb4 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug 3ffbb4ad 95e6de40 fd1444c2 6d504ce8 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug fe9ef13d a2ba6462 ccf73854 a9fb7a48 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug 3ffbb4ad 95e6de40 fd1444c2 6d504ce8 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 b5210fa7 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 af4b7524 ccf228c4 4a350969 aec59f03 
12:57:34 ipsec,debug 05000010 04000000 c0a80900 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 35e38bb4 0000009c 01000018 
12:57:34 ipsec,debug 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 b5210fa7 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 af4b7524 ccf228c4 4a350969 aec59f03 05000010 
12:57:34 ipsec,debug 04000000 c0a80900 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 c0a80900 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 35e38bb4 0a000034 00000001 00000001 00000028 00030401 b5210fa7 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 af4b7524 
12:57:34 ipsec,debug ccf228c4 4a350969 aec59f03 05000010 04000000 c0a80900 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 b5210fa7 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c9e38: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 192.168.9.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.9.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.9.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=8:8) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80c9e38 
12:57:34 ipsec,debug  0x80c9e38: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=b5210fa7 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=8:8) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 322 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c9e70: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug d41e5c8b d736cca2 57e52913 d801e9d6 501c16ab 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 082827cb 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c 980f9988 dac8be75 424aed32 5db94edc fc50ed56 
12:57:34 ipsec,debug e96d392b 05000010 04000000 c0a81600 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug 603b4230 7d01193e 82f051a5 da201831 4fdf91ed 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 603b4230 7d01193e 82f051a5 da201831 4fdf91ed 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 082827cb 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c 980f9988 dac8be75 424aed32 5db94edc 
12:57:34 ipsec,debug fc50ed56 e96d392b 05000010 04000000 c0a81600 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 9ea5b197 f799f907 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug 71d6302b 708fb39b ca83f9e4 9ba08f41 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 6741a3c2 0faff444 9fb9e181 59ed667e 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000d41e 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 177a918a 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug e3d9b72a 1736559d 62316169 72428a80 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 97af8907 91e2a4fc 389e8e1f 166d0ea5 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug e3d9b72a 1736559d 62316169 72428a80 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 a7e39a09 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 91cebb91 5c5a0746 9e550c10 7a62685f 
12:57:34 ipsec,debug 05000010 04000000 ac154000 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 177a918a 0000009c 01000018 
12:57:34 ipsec,debug b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 a7e39a09 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 91cebb91 5c5a0746 9e550c10 7a62685f 05000010 
12:57:34 ipsec,debug 04000000 ac154000 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac154000 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 177a918a 0a000034 00000001 00000001 00000028 00030401 a7e39a09 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 91cebb91 
12:57:34 ipsec,debug 5c5a0746 9e550c10 7a62685f 05000010 04000000 ac154000 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 a7e39a09 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c2cb8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.21.64.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.64.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.64.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=13:13) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80c2cb8 
12:57:34 ipsec,debug  0x80c2cb8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=a7e39a09 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=13:13) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 323 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cefa8: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 35e38bb4 af4b7524 ccf228c4 4a350969 aec59f03 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 0608b436 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c a8c05b1f 917d3c42 90c2fc3a a8850814 ebcd9d41 
12:57:34 ipsec,debug f7bf1ddc 05000010 04000000 c0a80900 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug fba1010a bfea1e45 1ea344c9 798617c8 a76f5144 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 fba1010a bfea1e45 1ea344c9 798617c8 a76f5144 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 0608b436 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c a8c05b1f 917d3c42 90c2fc3a a8850814 
12:57:34 ipsec,debug ebcd9d41 f7bf1ddc 05000010 04000000 c0a80900 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 ece088c3 cdeed607 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug encrypted payload by IV: 
12:57:34 ipsec,debug fe9ef13d a2ba6462 ccf73854 a9fb7a48 
12:57:34 ipsec,debug save IV for next: 
12:57:34 ipsec,debug 0e290f96 d0893c0f ffea127c 4e01fc4f 
12:57:34 ipsec,debug encrypted. 
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:000035e3 
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:34 ipsec,debug compute IV for phase2 
12:57:34 ipsec,debug phase1 last IV: 
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 73bf2329 
12:57:34 ipsec,debug hash(sha1) 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug phase2 IV computed: 
12:57:34 ipsec,debug da3c4b6b 2f05710d e9f4e9f6 2fa7719c 
12:57:34 ipsec,debug === 
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500] 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug IV was saved for next processing: 
12:57:34 ipsec,debug 158edbca b04f2ccf 42689d5b 0fc85403 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:34 ipsec,debug decrypted payload by IV: 
12:57:34 ipsec,debug da3c4b6b 2f05710d e9f4e9f6 2fa7719c 
12:57:34 ipsec,debug decrypted payload, but not trimed. 
12:57:34 ipsec,debug 01000018 da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 19302fac 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 b3baaea8 a7d15f02 cf874b30 60d274f3 
12:57:34 ipsec,debug 05000010 04000000 ac1f0000 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug padding len=1 
12:57:34 ipsec,debug skip to trim padding. 
12:57:34 ipsec,debug decrypted. 
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 73bf2329 0000009c 01000018 
12:57:34 ipsec,debug da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 19302fac 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 05000014 b3baaea8 a7d15f02 cf874b30 60d274f3 05000010 
12:57:34 ipsec,debug 04000000 ac1f0000 ffffff00 00000010 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=8(hash) len=24 
12:57:34 ipsec,debug seen nptype=1(sa) len=52 
12:57:34 ipsec,debug seen nptype=10(nonce) len=20 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug seen nptype=5(id) len=16 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug received IDci2: 
12:57:34 ipsec,debug 04000000 ac1f0000 ffffff00 
12:57:34 ipsec,debug received IDcr2: 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug HASH(1) validate: 
12:57:34 ipsec,debug da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 73bf2329 0a000034 00000001 00000001 00000028 00030401 19302fac 0000001c 
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 b3baaea8 
12:57:34 ipsec,debug a7d15f02 cf874b30 60d274f3 05000010 04000000 ac1f0000 ffffff00 00000010 
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 19302fac 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80cdf00: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec,debug got the peer address from ID payload 172.31.0.0[0] prefixlen=24 ul_proto=255 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.31.0.0/24 
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.31.0.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=17:17) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug begin compare proposals. 
12:57:34 ipsec,debug pair[0]: 0x80cdf00 
12:57:34 ipsec,debug  0x80cdf00: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug peer's single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=19302fac spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug my single bundle: 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=17:17) 
12:57:34 ipsec,debug   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
12:57:34 ipsec,debug matched 
12:57:34 ipsec,debug === 
12:57:34 ipsec,debug call pfkey_send_getspi 324 
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]  
12:57:34 ipsec,debug pfkey getspi sent. 
12:57:34 ipsec,debug total SA len=48 
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=2(prop) len=40 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug proposal #0 len=40 
12:57:34 ipsec,debug begin. 
12:57:34 ipsec,debug seen nptype=3(trns) len=28 
12:57:34 ipsec,debug succeed. 
12:57:34 ipsec,debug transform #0 len=28 
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:34 ipsec,debug life duration was in TLV. 
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:34 ipsec,debug pair 0: 
12:57:34 ipsec,debug  0x80c2a88: next=(nil) tnext=(nil) 
12:57:34 ipsec,debug proposal #0: 1 transform 
12:57:34 ipsec,debug add payload of len 48, next type 10 
12:57:34 ipsec,debug add payload of len 24, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 5 
12:57:34 ipsec,debug add payload of len 12, next type 0 
12:57:34 ipsec,debug HASH with: 
12:57:34 ipsec,debug 177a918a 91cebb91 5c5a0746 9e550c10 7a62685f 0a000034 00000001 00000001 
12:57:34 ipsec,debug 00000028 00030401 05215517 0000001c 000c0000 80040001 80010001 80020e10 
12:57:34 ipsec,debug 80050002 80060080 0500001c b4b7886f f1b5d3a5 37a4f3e7 4882a524 f6fd2986 
12:57:34 ipsec,debug 322a13e3 05000010 04000000 ac154000 ffffff00 00000010 04000000 c0a8a300 
12:57:34 ipsec,debug ffffff00 
12:57:34 ipsec,debug hmac(hmac_sha1) 
12:57:34 ipsec,debug HASH computed: 
12:57:34 ipsec,debug f5466aed 00bcde00 7b56c58a 88f144f3 f61d83fd 
12:57:34 ipsec,debug add payload of len 20, next type 1 
12:57:34 ipsec,debug begin encryption. 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug pad length = 8 
12:57:34 ipsec,debug 01000018 f5466aed 00bcde00 7b56c58a 88f144f3 f61d83fd 0a000034 00000001 
12:57:34 ipsec,debug 00000001 00000028 00030401 05215517 0000001c 000c0000 80040001 80010001 
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c b4b7886f f1b5d3a5 37a4f3e7 4882a524 
12:57:34 ipsec,debug f6fd2986 322a13e3 05000010 04000000 ac154000 ffffff00 00000010 04000000 
12:57:34 ipsec,debug c0a8a300 ffffff00 b7d8ca80 e68ee507 
12:57:34 ipsec,debug encryption(aes) 
12:57:34 ipsec,debug with key: 
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug encrypted payload by IV: 
12:57:35 ipsec,debug 97af8907 91e2a4fc 389e8e1f 166d0ea5 
12:57:35 ipsec,debug save IV for next: 
12:57:35 ipsec,debug b270b90f e20a1481 111aa824 ab96d047 
12:57:35 ipsec,debug encrypted. 
12:57:35 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:35 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:35 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000177a 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 7d02b6ed 53874267 38e32132 ac96e5bb 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 88538956 0d83dbbe fc2b780f 6563b6c9 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 b476b60a 0000003c 00000018 
12:57:35 ipsec,debug 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00b476b6 0a9b070e 19a57d0f 40d4ebf0 265b1f20 c88e112b 34d5c2cf ac6f9173 
12:57:35 ipsec,debug 98030e68 32f940c0 0f1eae9a e1 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03030e5f 849b070e 19a57d0f 40d4ebf0 265b1f20 c88e112b 34d5c2cf ac6f9173 
12:57:35 ipsec,debug 98030e68 32f940c0 0f1eae9a e1 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug eca135e3 9751911e ff1482b3 b331d5c5 02d1a8d1 c3310db6 e709fcd2 7af531a9 
12:57:35 ipsec,debug 5aed4e31 1499749b a114174b fcb267dd 20a2687e 6d654ff1 a4f33d0b 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0314df5a b49b070e 19a57d0f 40d4ebf0 265b1f20 c88e112b 34d5c2cf ac6f9173 
12:57:35 ipsec,debug 98030e68 32f940c0 0f1eae9a e1 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 685961c2 bbe99301 d417ffae 2a6a9319 ab116f52 66f27476 c7495fb3 85444ce2 
12:57:35 ipsec,debug f9a41d5e 380e6a55 30a77079 dd9b3136 5a9c5118 23cd2bf7 157285a5 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x30e5f84 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x14df5ab4 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug total SA len=48 
12:57:35 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001 
12:57:35 ipsec,debug 80010001 80020e10 80050002 80060080 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=2(prop) len=40 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug proposal #0 len=40 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=3(trns) len=28 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug transform #0 len=28 
12:57:35 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel 
12:57:35 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds 
12:57:35 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600 
12:57:35 ipsec,debug life duration was in TLV. 
12:57:35 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1 
12:57:35 ipsec,debug type=Key Length, flag=0x8000, lorv=128 
12:57:35 ipsec,debug pair 0: 
12:57:35 ipsec,debug  0x80cdaa8: next=(nil) tnext=(nil) 
12:57:35 ipsec,debug proposal #0: 1 transform 
12:57:35 ipsec,debug add payload of len 48, next type 10 
12:57:35 ipsec,debug add payload of len 24, next type 5 
12:57:35 ipsec,debug add payload of len 12, next type 5 
12:57:35 ipsec,debug add payload of len 12, next type 0 
12:57:35 ipsec,debug HASH with: 
12:57:35 ipsec,debug 73bf2329 b3baaea8 a7d15f02 cf874b30 60d274f3 0a000034 00000001 00000001 
12:57:35 ipsec,debug 00000028 00030401 05ed2e7c 0000001c 000c0000 80040001 80010001 80020e10 
12:57:35 ipsec,debug 80050002 80060080 0500001c d15a5404 abb0dc4c 0cddddcb 27d4bdf5 9046db39 
12:57:35 ipsec,debug 95020df0 05000010 04000000 ac1f0000 ffffff00 00000010 04000000 c0a8a300 
12:57:35 ipsec,debug ffffff00 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 06510b83 28f998f1 035d12b5 155ddd1a 900c3145 
12:57:35 ipsec,debug add payload of len 20, next type 1 
12:57:35 ipsec,debug begin encryption. 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug pad length = 8 
12:57:35 ipsec,debug 01000018 06510b83 28f998f1 035d12b5 155ddd1a 900c3145 0a000034 00000001 
12:57:35 ipsec,debug 00000001 00000028 00030401 05ed2e7c 0000001c 000c0000 80040001 80010001 
12:57:35 ipsec,debug 80020e10 80050002 80060080 0500001c d15a5404 abb0dc4c 0cddddcb 27d4bdf5 
12:57:35 ipsec,debug 9046db39 95020df0 05000010 04000000 ac1f0000 ffffff00 00000010 04000000 
12:57:35 ipsec,debug c0a8a300 ffffff00 ac99d885 c7e1d307 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug encrypted payload by IV: 
12:57:35 ipsec,debug 158edbca b04f2ccf 42689d5b 0fc85403 
12:57:35 ipsec,debug save IV for next: 
12:57:35 ipsec,debug 3a9954ef 961706ff 8416cf35 ae1dc565 
12:57:35 ipsec,debug encrypted. 
12:57:35 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500] 
12:57:35 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500] 
12:57:35 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:000073bf 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 4a91ecb4 474e4d21 e4834aac 745e3dd0 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug f7269c69 9752e105 a73ae47f 3019611b 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 4e2211db 0000003c 00000018 
12:57:35 ipsec,debug 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 004e2211 db9c131e bcc1fb8f 2999974f 1f70eada b6e50349 c6139d78 3d3b54ed 
12:57:35 ipsec,debug 13dfe8ef 519ea311 1586b6e8 0b 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030e734b cc9c131e bcc1fb8f 2999974f 1f70eada b6e50349 c6139d78 3d3b54ed 
12:57:35 ipsec,debug 13dfe8ef 519ea311 1586b6e8 0b 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug f86c60e0 98095879 e8f1a8c5 f6c0552b 267b90e2 6cf2ac0d 9a374ea1 4331d5b1 
12:57:35 ipsec,debug 439b58c7 93cdde9b f3400203 cd2f1066 76f4196d 9acf2c65 fecb500d 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03b1cf32 db9c131e bcc1fb8f 2999974f 1f70eada b6e50349 c6139d78 3d3b54ed 
12:57:35 ipsec,debug 13dfe8ef 519ea311 1586b6e8 0b 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug d5e14cb3 271aeec3 fdfdc317 7860846e cb1e895f bfad9bb7 44cc5240 941b1dbc 
12:57:35 ipsec,debug b612c3bf 7da1552d 3d3cb123 c165e183 9d3fc687 d64fe30c dca9ead9 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xe734bcc 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xb1cf32db 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 26151ba2 89535c69 1fc7940e 21efcc91 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 1c943449 cb3dc5b2 75ebef70 51a57a11 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 7d977968 0000003c 00000018 
12:57:35 ipsec,debug 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 007d9779 68d103b0 b10ddd7b 19dc9095 5a858b98 09fbfdc8 330d9e92 142e4d91 
12:57:35 ipsec,debug 6c0df53c efeee7af 9fd7b1e5 77 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0306d4d8 eed103b0 b10ddd7b 19dc9095 5a858b98 09fbfdc8 330d9e92 142e4d91 
12:57:35 ipsec,debug 6c0df53c efeee7af 9fd7b1e5 77 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug ff4c27e4 3ff21a82 c23c4c44 fdbfe263 124a2b90 c86912ce 42f82291 9f343df7 
12:57:35 ipsec,debug 1ed4408b 911d541e 50115e98 e306c301 d07f0076 d1b1b75f 1b7ef4bd 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0377065c 88d103b0 b10ddd7b 19dc9095 5a858b98 09fbfdc8 330d9e92 142e4d91 
12:57:35 ipsec,debug 6c0df53c efeee7af 9fd7b1e5 77 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug ad265d46 16c37b01 0af709cb 740631e4 919be04a fa99675b 7aa6c5b6 b72b076c 
12:57:35 ipsec,debug 19924311 dc525940 363e047f fa3d294d 80d34ac5 2ed15372 93bf26dc 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x6d4d8ee 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x77065c88 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug c9c13265 65f479fe 76254b90 ce91f1f3 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 78581604 80e81e65 74f0fde3 f13ea672 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 2101e83d 0000003c 00000018 
12:57:35 ipsec,debug d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 002101e8 3d5289ff f42f508a dda8dfdc 754aef8a 3ae34933 02aebaae 60499cb7 
12:57:35 ipsec,debug 6fe5891f 7e3dfd21 d423108e e5 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030afedf ef5289ff f42f508a dda8dfdc 754aef8a 3ae34933 02aebaae 60499cb7 
12:57:35 ipsec,debug 6fe5891f 7e3dfd21 d423108e e5 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 02962e5e 387092ed aadef720 3bc0bbf3 84df6a88 99e1ce5b 0748d7bc 59a86001 
12:57:35 ipsec,debug 033fa805 81cc0bd8 9ab919d8 701419e1 a9a8580e c62c343d 09652b9c 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03372170 ec5289ff f42f508a dda8dfdc 754aef8a 3ae34933 02aebaae 60499cb7 
12:57:35 ipsec,debug 6fe5891f 7e3dfd21 d423108e e5 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug b39803d5 055badcd 85f5c761 dea8c6be 238209d3 2aa0b141 d6b8c20a d388c9da 
12:57:35 ipsec,debug fab165ed 85e9e81d dac846db ed8b2ae6 73ac91c3 2d03f3e2 d5ef32c6 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xafedfef 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x372170ec 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 0c35ab96 f912737b 3e69a980 1be271d6 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 3589105c 02701d12 66837ca0 df2018b6 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 7261620d b0631052 d290f26f 3b594986 3580ceb6 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 e71475bc 0000003c 00000018 
12:57:35 ipsec,debug 7261620d b0631052 d290f26f 3b594986 3580ceb6 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 7261620d b0631052 d290f26f 3b594986 3580ceb6 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00e71475 bca0a2df 23586dc4 228b0321 de8490a3 aeae86a0 a2863d91 0bfad18f 
12:57:35 ipsec,debug c66e5136 6718ffdf 62caa155 76 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 7261620d b0631052 d290f26f 3b594986 3580ceb6 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030bfb15 d2a0a2df 23586dc4 228b0321 de8490a3 aeae86a0 a2863d91 0bfad18f 
12:57:35 ipsec,debug c66e5136 6718ffdf 62caa155 76 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 22c6f8b2 3b41b975 74bbd912 95f831e1 50fa4d01 4a8c3ec3 3068eaed e7bde99d 
12:57:35 ipsec,debug 521bf20c cd3bb73e 8a9c0b9f 3c5c0ded 8d24349f 4acbf1ff 4ec92a2c 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 039551b1 caa0a2df 23586dc4 228b0321 de8490a3 aeae86a0 a2863d91 0bfad18f 
12:57:35 ipsec,debug c66e5136 6718ffdf 62caa155 76 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 91c08258 c4848da0 0705a857 c9f13506 b9a28308 69e51a90 18ef29cd 4e2525db 
12:57:35 ipsec,debug 9b1cf592 6bd80cc1 bc86f576 a561d1a0 cab11b28 3faff4ee 40cb8c50 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xbfb15d2 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x9551b1ca 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug d2027db4 56855a37 c164e509 d9f580ad 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 3def5b64 2748b9f1 a7c38180 2b92c862 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 5f86beda 0000003c 00000018 
12:57:35 ipsec,debug 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 005f86be da999e59 8c4f49b2 ca0a1e9a e7960f36 cbe527a0 0d3ce4d4 d3c629d4 
12:57:35 ipsec,debug 69668450 6fddb8b7 1c47b2f2 e7 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030c7aee 4c999e59 8c4f49b2 ca0a1e9a e7960f36 cbe527a0 0d3ce4d4 d3c629d4 
12:57:35 ipsec,debug 69668450 6fddb8b7 1c47b2f2 e7 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug ed8991e3 cca862d7 6eb79065 19e1c97e 51cebaf5 c9d1156d 198e2e60 59ddd8c1 
12:57:35 ipsec,debug bf7cb64d b8197497 f81c8995 e7407562 bbe9da7a 0bb9d2a2 93d0bb13 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03d6c025 b1999e59 8c4f49b2 ca0a1e9a e7960f36 cbe527a0 0d3ce4d4 d3c629d4 
12:57:35 ipsec,debug 69668450 6fddb8b7 1c47b2f2 e7 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug fa0e0737 92a6c578 a496d70a 08977232 2343b1b2 596a31ca 549989ee 69cdc56d 
12:57:35 ipsec,debug 44d764bb cf31c062 cc193664 81ff205c 32608c8d d36b9fb7 d93f024f 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xc7aee4c 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xd6c025b1 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 45d936be 2c93d93b aa424c29 dbf45c67 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 4a1998d3 161d372e 58422bcd 5f596fc3 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 90e787b5 686dd09e b8899d59 08d97f99 c366b75b 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 9340aee7 0000003c 00000018 
12:57:35 ipsec,debug 90e787b5 686dd09e b8899d59 08d97f99 c366b75b 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 90e787b5 686dd09e b8899d59 08d97f99 c366b75b 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 009340ae e78f204f c1e51ec9 cce0be6c 7d8b8aff 89e2095e eae5e5de e33bc952 
12:57:35 ipsec,debug a6ea7bae 2e1b40bd 9d9fc014 55 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 90e787b5 686dd09e b8899d59 08d97f99 c366b75b 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0303a677 f28f204f c1e51ec9 cce0be6c 7d8b8aff 89e2095e eae5e5de e33bc952 
12:57:35 ipsec,debug a6ea7bae 2e1b40bd 9d9fc014 55 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 313d3041 6ba91121 f57e57e4 cb625859 9177773f f612736e bfb43f6a c47776ea 
12:57:35 ipsec,debug 8f17165c c0020fca 690cf5e0 610df850 2bd6867f 5c05d5ba e4c02341 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 033e363c ce8f204f c1e51ec9 cce0be6c 7d8b8aff 89e2095e eae5e5de e33bc952 
12:57:35 ipsec,debug a6ea7bae 2e1b40bd 9d9fc014 55 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 20da29f2 76dd8e15 7dc97902 0af4ac10 a825c6d6 41afd97a 8f316ea7 7bca75c0 
12:57:35 ipsec,debug 51d21ab3 bbdfac92 39824597 2258c427 03509094 59bb8582 74d6b024 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x3a677f2 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x3e363cce 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 49d681ca 5bf2f6b1 8f405789 74b5aff2 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug d9d93ae3 7ac39b7c d16f3f4e c86e2d77 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 94b41de5 4521e466 d910485e 254b3d20 a26e2cef 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 eae461cc 0000003c 00000018 
12:57:35 ipsec,debug 94b41de5 4521e466 d910485e 254b3d20 a26e2cef 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 94b41de5 4521e466 d910485e 254b3d20 a26e2cef 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00eae461 cc2ada5d 4b1750cf c3b86982 e482524a faea8d72 e1ea1068 f43af381 
12:57:35 ipsec,debug f9c69d76 7c16bf7b a87452f8 17 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 94b41de5 4521e466 d910485e 254b3d20 a26e2cef 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03012e95 2e2ada5d 4b1750cf c3b86982 e482524a faea8d72 e1ea1068 f43af381 
12:57:35 ipsec,debug f9c69d76 7c16bf7b a87452f8 17 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 857e9f6e 2a9b1efb 4bf6f155 a46dd7a5 f737b624 973c49f7 c573fb29 49fb5577 
12:57:35 ipsec,debug fce248d2 3da6faf7 3e3904d5 a6a367a8 967b07fd eb8c8546 cf3a6cc3 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 038a737d 6c2ada5d 4b1750cf c3b86982 e482524a faea8d72 e1ea1068 f43af381 
12:57:35 ipsec,debug f9c69d76 7c16bf7b a87452f8 17 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug efea46b4 6dd9c5ce fb1b9b18 0d0aa753 0f0f5aed 52c3425c f7db32bd f95ed81c 
12:57:35 ipsec,debug 07ce0e6e b731efa6 89ee1534 6e1a0ba6 4c754edc 47cf6e5d 505dd42f 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x12e952e 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x8a737d6c 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 5d904575 c1fbf5bb 9788c97b 92a20daf 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 817c0ca3 27ddee3e 1dbd4497 c71e5344 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 469960ba a3567adf 4db3eaac d77d8627 57c6a418 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 cc51649b 0000003c 00000018 
12:57:35 ipsec,debug 469960ba a3567adf 4db3eaac d77d8627 57c6a418 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 469960ba a3567adf 4db3eaac d77d8627 57c6a418 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00cc5164 9be64a13 5ca0a9a2 834d4b82 412f230d 9590c1de 1b806863 ae9add66 
12:57:35 ipsec,debug 522a0dfb 039a29d8 a3753614 9f 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 469960ba a3567adf 4db3eaac d77d8627 57c6a418 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030d1afd a3e64a13 5ca0a9a2 834d4b82 412f230d 9590c1de 1b806863 ae9add66 
12:57:35 ipsec,debug 522a0dfb 039a29d8 a3753614 9f 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 05d3b8d5 8752fe83 b7af7deb 80c182dd 162404dc 9831a57c 43dea212 d7742f20 
12:57:35 ipsec,debug 2f54910e 4c575f96 3bf1cfd2 e919a8c2 5676dcc2 34bd779e d708e141 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0358b39b bde64a13 5ca0a9a2 834d4b82 412f230d 9590c1de 1b806863 ae9add66 
12:57:35 ipsec,debug 522a0dfb 039a29d8 a3753614 9f 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 882171d6 66b9121d 6062bb14 42aee725 dd557f8f 34483a8b 8ee64492 a1fd589a 
12:57:35 ipsec,debug f6333200 d1e05d53 c2a2029e cd78716b 7c083d16 296c17f7 b6755072 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xd1afda3 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x58b39bbd 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug cf5fd0f1 409c5344 4e39397c f38ab1d3 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 1b98a1c0 d322ff8c 969e500e ec7f00e5 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 992b663e 0000003c 00000018 
12:57:35 ipsec,debug 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00992b66 3efc3573 c15042ff c592ab82 a8095ea5 84d4873b 89de746c 1246c225 
12:57:35 ipsec,debug 642545fa 22469e27 6545bba9 db 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030e7c70 38fc3573 c15042ff c592ab82 a8095ea5 84d4873b 89de746c 1246c225 
12:57:35 ipsec,debug 642545fa 22469e27 6545bba9 db 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 82079f11 d16e3e7a 2b20b894 091d605d e62622ef ec049ac0 2f5ca998 749fe853 
12:57:35 ipsec,debug 44d673eb d62d134d 48d56e64 f00b3ed0 e5641ce9 5c3808c5 8484f08a 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 039c3628 32fc3573 c15042ff c592ab82 a8095ea5 84d4873b 89de746c 1246c225 
12:57:35 ipsec,debug 642545fa 22469e27 6545bba9 db 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug c17b7bbd 4174d8a6 6d15b451 e52651d5 a85897bd 42e99a49 4a9e80fa 4460bf4c 
12:57:35 ipsec,debug a7f130e6 681561c2 60d1d6d2 2e9d1794 74e7e5c3 1d1543b8 cea61fb7 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xe7c7038 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x9c362832 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug ec702215 e85aacdb 444caf3d 48e6e141 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 4a9a9ebd 121bc522 bc81a47b 78a63522 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 c6fb6612 0000003c 00000018 
12:57:35 ipsec,debug ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00c6fb66 1279a17f 3ed79b95 46f6dab8 362813ad 06fa1791 42fbe648 1353f06f 
12:57:35 ipsec,debug 0b7da85d 64f3615b 54accf13 63 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03068bd7 2079a17f 3ed79b95 46f6dab8 362813ad 06fa1791 42fbe648 1353f06f 
12:57:35 ipsec,debug 0b7da85d 64f3615b 54accf13 63 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug a2afec36 2060419e 70364455 b5df9dd6 f1cd73ef f8ae1f6c d97aa5f9 c7eae597 
12:57:35 ipsec,debug 778ee8e4 440e4661 8e36da77 297c9f37 55fea4e9 ae185984 539eebeb 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 037575e5 d379a17f 3ed79b95 46f6dab8 362813ad 06fa1791 42fbe648 1353f06f 
12:57:35 ipsec,debug 0b7da85d 64f3615b 54accf13 63 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 9f6de2e2 d92d7966 93882574 09661330 98905749 23a94e7a 64f15c52 bd5cfd67 
12:57:35 ipsec,debug 4cfbbcaf 6ab64536 314df92b 9473879c 6ff0dacb 641d4152 af4d2fd2 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x68bd720 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x7575e5d3 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 8bee10a7 db436f7f 2536760e ca4da262 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 6741a3c2 0faff444 9fb9e181 59ed667e 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 d41e5c8b 0000003c 00000018 
12:57:35 ipsec,debug 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00d41e5c 8bd736cc a257e529 13d801e9 d6501c16 ab980f99 88dac8be 75424aed 
12:57:35 ipsec,debug 325db94e dcfc50ed 56e96d39 2b 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03082827 cbd736cc a257e529 13d801e9 d6501c16 ab980f99 88dac8be 75424aed 
12:57:35 ipsec,debug 325db94e dcfc50ed 56e96d39 2b 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 2249a3fb 755c28b3 77c374ab b63923d3 115a5762 59313732 983b3dba ca9d801a 
12:57:35 ipsec,debug fe588370 e0c7a397 60014129 25a91b09 cc4c77cd bdb90d60 aea9d9a7 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 031625e0 a2d736cc a257e529 13d801e9 d6501c16 ab980f99 88dac8be 75424aed 
12:57:35 ipsec,debug 325db94e dcfc50ed 56e96d39 2b 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 9e03fb6b 1e58e6d7 740c0368 c363f74e 7a701027 2e9ad347 825303a6 e95deca8 
12:57:35 ipsec,debug b3cec9fa bb5943f3 6d9fa541 82859867 fe18a663 5d1296de 89e025d1 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x82827cb 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x1625e0a2 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 39cd492c 902a694c a18cff46 59fb1f8e 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 0e290f96 d0893c0f ffea127c 4e01fc4f 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 35e38bb4 0000003c 00000018 
12:57:35 ipsec,debug 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 0035e38b b4af4b75 24ccf228 c44a3509 69aec59f 03a8c05b 1f917d3c 4290c2fc 
12:57:35 ipsec,debug 3aa88508 14ebcd9d 41f7bf1d dc 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 030608b4 36af4b75 24ccf228 c44a3509 69aec59f 03a8c05b 1f917d3c 4290c2fc 
12:57:35 ipsec,debug 3aa88508 14ebcd9d 41f7bf1d dc 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 3948919f 58c54782 c24a2609 ce9eef35 052bafa7 43f82a44 45ed11b5 bed5cfbd 
12:57:35 ipsec,debug d417bd19 07d1934b 942ce8d2 038251b4 be7504f5 cf45efd8 054a760e 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03b5210f a7af4b75 24ccf228 c44a3509 69aec59f 03a8c05b 1f917d3c 4290c2fc 
12:57:35 ipsec,debug 3aa88508 14ebcd9d 41f7bf1d dc 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug c1c8cb1c 54d66115 00518d63 c5748442 9aca3b06 c0fbe20f c15ba410 65da3a53 
12:57:35 ipsec,debug 1eda8de5 305c478c e317a985 a5756f1b a77002d7 5e8ada39 1f75bea0 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x608b436 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xb5210fa7 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug cbce495d 84de6974 c3891f4b 40e8d215 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug b270b90f e20a1481 111aa824 ab96d047 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 e269a904 f173b2b7 faf1b861 ad1417fe 35347f93 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 177a918a 0000003c 00000018 
12:57:35 ipsec,debug e269a904 f173b2b7 faf1b861 ad1417fe 35347f93 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug e269a904 f173b2b7 faf1b861 ad1417fe 35347f93 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 00177a91 8a91cebb 915c5a07 469e550c 107a6268 5fb4b788 6ff1b5d3 a537a4f3 
12:57:35 ipsec,debug e74882a5 24f6fd29 86322a13 e3 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug e269a904 f173b2b7 faf1b861 ad1417fe 35347f93 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03052155 1791cebb 915c5a07 469e550c 107a6268 5fb4b788 6ff1b5d3 a537a4f3 
12:57:35 ipsec,debug e74882a5 24f6fd29 86322a13 e3 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 13e7c428 78198b3f fd80f008 852c07de 154ca599 7d4a64e5 ca707396 50b46eeb 
12:57:35 ipsec,debug c3707a50 a633e3a9 967856ad 8a7c8c49 4b6b8af3 6b59dc28 5d0e46f0 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 03a7e39a 0991cebb 915c5a07 469e550c 107a6268 5fb4b788 6ff1b5d3 a537a4f3 
12:57:35 ipsec,debug e74882a5 24f6fd29 86322a13 e3 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 3ffa74d0 8dc8eda1 c99a95a9 f82a87dd b9dacdf4 e947dda3 9807851e 75ae5b1d 
12:57:35 ipsec,debug aca48365 d2df2948 3cdd4a41 d9be2d44 290d17cf 8b8dfedc 3ef18361 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x5215517 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xa7e39a09 
12:57:35 ipsec,debug pfkey add sent. 
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500] 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug IV was saved for next processing: 
12:57:35 ipsec,debug 5fae5638 4a9dc2f8 bd5f9004 38b391d7 
12:57:35 ipsec,debug encryption(aes) 
12:57:35 ipsec,debug with key: 
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 
12:57:35 ipsec,debug decrypted payload by IV: 
12:57:35 ipsec,debug 3a9954ef 961706ff 8416cf35 ae1dc565 
12:57:35 ipsec,debug decrypted payload, but not trimed. 
12:57:35 ipsec,debug 00000018 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc 00000000 00000000 
12:57:35 ipsec,debug padding len=1 
12:57:35 ipsec,debug skip to trim padding. 
12:57:35 ipsec,debug decrypted. 
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 73bf2329 0000003c 00000018 
12:57:35 ipsec,debug 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc 00000000 00000000 
12:57:35 ipsec,debug begin. 
12:57:35 ipsec,debug seen nptype=8(hash) len=24 
12:57:35 ipsec,debug succeed. 
12:57:35 ipsec,debug HASH(3) validate: 
12:57:35 ipsec,debug 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc 
12:57:35 ipsec,debug HASH with:  
12:57:35 ipsec,debug 0073bf23 29b3baae a8a7d15f 02cf874b 3060d274 f3d15a54 04abb0dc 4c0cdddd 
12:57:35 ipsec,debug cb27d4bd f59046db 3995020d f0 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug HASH computed: 
12:57:35 ipsec,debug 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc 
12:57:35 ipsec,debug === 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0305ed2e 7cb3baae a8a7d15f 02cf874b 3060d274 f3d15a54 04abb0dc 4c0cdddd 
12:57:35 ipsec,debug cb27d4bd f59046db 3995020d f0 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug 93bdb343 14551e5d 73352f6f 871d23da c048dbc1 bcedd0b3 cd09a6e3 2e0f5e10 
12:57:35 ipsec,debug be3d84a9 950794e8 ad6329b7 86e2f188 2e65dd95 e6d7289a d6d1e7cf 
12:57:35 ipsec,debug KEYMAT compute with 
12:57:35 ipsec,debug 0319302f acb3baae a8a7d15f 02cf874b 3060d274 f3d15a54 04abb0dc 4c0cdddd 
12:57:35 ipsec,debug cb27d4bd f59046db 3995020d f0 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug encklen=128 authklen=160 
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3) 
12:57:35 ipsec,debug generating K1...K3 for KEYMAT. 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug hmac(hmac_sha1) 
12:57:35 ipsec,debug d03c2fba bb196db2 479dec34 1f75ebad 122fa792 5e098175 2606a28d 471c0116 
12:57:35 ipsec,debug 7f431331 aa1e6af8 c01aaea7 8eba01f1 36962b5c 9cd25e29 0448f21f 
12:57:35 ipsec,debug KEYMAT computed. 
12:57:35 ipsec,debug call pk_sendupdate 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_update_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x5ed2e7c 
12:57:35 ipsec,debug pfkey update sent. 
12:57:35 ipsec,debug encryption(aes-cbc) 
12:57:35 ipsec,debug hmac(sha1) 
12:57:35 ipsec,debug call pfkey_send_add_nat 
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x19302fac 
12:57:35 ipsec,debug pfkey add sent.

Depending on if you would like to hunt down a bug or just make it work (and also depending on what you can do on the other side)
I would recommend (as I always do) to setup a single encrypted tunnel to that site, e.g. GRE/IPsec, which wiil use a single SA and
then route the subnets on the other sites over that (either using static routes or some autorouting like BGP or OSPF).

This solution is much easier to maintain, e.g. when subnets are added or dropped, and also is usable when a partial mesh is used
instead of a simple peering. Of course one can argue that it is less secure when used as a bare solution, but you can add firewall
rules to overcome that.

Also, because this solution has a separate interface for the tunnel, writing firewall rules and avoiding NAT problems is easier.

I am not able change type of tunnel on other side.

I don’t know which party (initiator or responder) is responsible for assignment of reqid, but they actually do not overlap between the traffic selectors, nor do the pair[0] IDs, nor do the local SPIs.

12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.16.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=6:6) 
12:57:34 ipsec,debug pair[0]: 0x80ce978 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=14df5ab4 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=6:6) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.65.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=14:14) 
12:57:34 ipsec,debug pair[0]: 0x80c4ed0 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=b1cf32db spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=14:14) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.69.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec,debug pair[0]: 0x80cd6a8 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=77065c88 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.85.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=16:16) 
12:57:34 ipsec,debug pair[0]: 0x80c23b8 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=372170ec spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=16:16) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.13.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=19:19) 
12:57:34 ipsec,debug pair[0]: 0x80cd758 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=9551b1ca spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=19:19) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.74.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec,debug pair[0]: 0x80c9348 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=d6c025b1 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.32.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=2:2) 
12:57:34 ipsec,debug pair[0]: 0x80cbcf8 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=3e363cce spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=2:2) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.23.0.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=10:10) 
12:57:34 ipsec,debug pair[0]: 0x80ce830 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=8a737d6c spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=10:10) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.29.0.0/20 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec,debug pair[0]: 0x80c9b28 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=58b39bbd spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.0.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=3:3) 
12:57:34 ipsec,debug pair[0]: 0x80ca118 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=9c362832 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=3:3) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.12.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=4:4) 
12:57:34 ipsec,debug pair[0]: 0x80ca2c0 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=7575e5d3 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=4:4) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.22.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec,debug pair[0]: 0x80cf050 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=1625e0a2 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.9.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=8:8) 
12:57:34 ipsec,debug pair[0]: 0x80c9e38 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=b5210fa7 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=8:8) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.64.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=13:13) 
12:57:34 ipsec,debug pair[0]: 0x80c2cb8 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=a7e39a09 spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=13:13) 
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.31.0.0/24 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=17:17) 
12:57:34 ipsec,debug pair[0]: 0x80cdf00 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=19302fac spi_p=00000000 encmode=Tunnel reqid=0:0) 
12:57:34 ipsec,debug  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=17:17)

So it looks that the negotiation went fine, but the mapping between traffic selectors and SAs during runtime sometimes fails, which cannot be seen from the log.

As you say that the Sophos end won’t change the approach, I’m afraid your only chance is to do the test I’ve suggested, i.e. to reduce the total number of policies by temporarily redirecting those which work without breaking each other to some non-existent sa-dst-address, disable and re-enable the peer and check again with the problematic pairs of remote subnets. Of course Sophos may tear down the session if some of policies on its side remain unresponded from your side, but it’s worth trying anyway.

The next step would be to summarize the result and send supout.rif to support@mikrotik.com; by now the keys should not be visible in supout.rif any more, but to stay bullet-proof, I’d use temporary PSK when taking the supout.rif (change the PSK at both ends, the SAs must be up so that the supout.rif would make sense).

You can also try to downgrade to the latest 6.43.x because there has been a lot of changes in IPsec between 6.43 and 6.44 and some of them may have had this side effect. But that will probably require to redo the IPsec configuration from scratch if you haven’t saved the pre-6.44 one.

I made a test. I disabled two working policies. I killed remote peer.
New connection was estabilshed with coresponding number of SAs.
Still same pairs of subnets have same problem. Result is that total number of policies is not a problem.
What is interesting always is conflict betwen some subnets 172.x.x.x and 192.x.x.x never betwen 172.x.x.x and 172.x.x.x or 192.x.x.x and 192.x.x.x.

So if you reduce it to a single conflicting pair of 192.x.x.x and 172.y.y.y, the issue is still there? Can you specify all the particular pairs whose members collide with each other? That should be reproducible between two Mikrotiks as well, except that none of them might mind receiving the data via the wrong SA, which would explain why it has not been noticed during testing in Riga.

I cannot disable all policies because lot of them are used.
Right now I know about these three pairs of subnets with confict.
172.29.0.0/20 vs 192.168.74.0/24
172.21.69.0/24 vs 192.168.22.0/24
172.23.17.0/20 vs 192.168.9.0/24.

Unfortunately I have no free mikrotik for testing.

I sent report to mikrotik support but with my bad English I do not believe that they will understand my problem :slight_smile:

I’ve expected the whole setup to be in pre-production phase as half of the subnets is unreachable.


Providing a link to a topic on the forum in the report to support always helps - we’ve discussed the issue here quite in detail, and your English is not that bad as I didn’t need my knowledge of your native language to decode it :slight_smile:


I was thinking of giving 6.44.3 a try anyway, that’s why I’ve asked for the particular conflicting pairs, but I don’t promise it to happen soon (and I’ll try it first on my 6.43.something anyway). What Mikrotik model do you run? The CPU architecture may theoretically have an impact on the behaviour.

We have been using this configuration for several years. Administrator before me never updated OS.
Two months ago i made update to version 6.43.9. Old release was somethnig like 6.34 :slight_smile:)
Everything looked fine. Nobody had problem with tunnel to our headquorter. My fault is i did not test ping to all subnet.
Last Thursday i added new subnet with new policy. And i tested it. but only the new subnet :frowning:
And two days ago my coleague told me : " I cannot reach some server via VPN"
I tested old subnets and found out that some do not work.

I started with update from version 6.43.9 to 6.44.3.
But no change.

And this is my story.

I puted link into report.

We have own hardware and we use X86 package.

Hm. Sounds like you’ll need to revert back to that 6.34.whatever for the IPsec functionality, and put another machine running 6.44.3 between the “VPN gateway” and the internet as a firewall.

The small positive point is that the issue should be visible on my 6.43.8 as well.

So I’ve tried with 6.43.8 running on RB 952Ui-5ac2nD (hAP ac lite) against a 6.43.8 running on RB D52G-5HacD2HnD-TC (hAP ac²) with all your 15 subnets and no issue seen - pings to .1 in each remote subnet each take their own SA. Then, I’ve upgraded the hAP ac lite to 6.44.3, and got the same result. So it may be an issue specific to your x86 architecture, or an issue of interworking with the Sophos (not really likely), or a matter of how the IKE SA was set up…

As you say you’ve already experienced it with 6.43.9 and it did not change after upgrade to 6.44.3, I’d assume there is no need to remove and re-create all 15 policies as there was a reboot, but life isn’t fair so I’d do that anyway:
/ip ipsec policy export file=policies
only if there are any policies other than towards the Sophos: /file edit policies.rsc contents and remove all policies which are not for sophos from the file, then Ctrl-O to save it
/ip ipsec policy remove [find sa-dst-address=88…] (of course use the full IP address of Sophos here)
/import policies.rsc

It should take the VPN traffic down for less than a minute, but there is a chance that the Sophos will overreact to it so better don’t do it during peak hours.

If that doesn’t help, post here the output of /ip ipsec export hide-sensitive, maybe there are some specific settings which differ in my case (initiator/responder roles of the pees, maybe something else).

If that does not help, I’d probably spend those few dollars on a hAP ac², copy the complete configuration from the x86 to it (using export & manual import line by line due to difference in architecture and conflict with the default configuration, never use backup for copying between devices) and try it that way. There may be some weird memory issue on the PC hardware you use, or a compiler error causing the issue to only exist on x86 architecture… hard to say.

… or ask headquarters to send a router that conforms to their specification.
it is always a bit hard to operate within “no, we won’t change anything” boundaries without the corresponding budget to do it the way they like.

I exported all policies.
I removed all policies.
i restarted mikrotik.
I imported all policies.

Now all subnets are working!

It seems that during update from old Release (6.34) to new Release(6.43) something happened with policies.

Maybe this warning from wiki is reason.

Warning: policy order is important starting form v6.40. Now it works similar as firewall filters where policies are executed from top to bottom (priority parameter is removed).

Thank all for help, especialy Sindy.

It shouldn’t be. This just says that matching of headers of packets to traffic selectors of policies is now done in the order of policies from the topmost one to the bottommost one, allowing you to create exceptions like

action=none src-address=192.168.1.0/24 dst-address=192.168.1.0/24 …
action=encrypt src-address=192.168.0.0/16 dst-address=192.168.22.0/16 sa-dst-address=peerA …
action=encrypt src-address=192.168.0.0/16 dst-address=192.168.0.0/16 sa-dst-address=peerB …

I.e.

  • traffic within 192.168.1.0/24 (for example a local one) is ignored by IPsec (action=none)
  • traffic from anywhere in 192.168.0.0/16 to 192.168.22.0/24 is sent to remote peer A
  • the rest of traffic from anywhere in 192.168.0.0/16 to anywhere in 192.168.0.0/16 is sent to remote peer B

Before that change, such exceptions were impossible, so you would have to compose tens of policies to fill the gaps around 192.168.1.0/24 and 192.168.22.0/24 to functionally substitute the last policy above.