Here is log. What i cas see as strange is that some policies have same “reqid” eg. reqid 9. I guess this is a reason why mikrotik sends both subnet with same SA.
Do you know who is responsible for setting reqid? my side or sophos?
# apr/25/2019 12:57: 8 by RouterOS 6.44.3
# software id = 3S1P-BNWF
#
12:57:08 ipsec phase2 sa deleted 62.24.71.26-88.79.252.164
12:57:10 ipsec acquire for 62.24.71.26 <=> 88.79.252.164
12:57:10 ipsec suitable policy found: 192.168.163.0/24 <=> 172.31.0.0/24
12:57:10 ipsec,debug Zombie ph2 found, expiring it
12:57:10 ipsec phase2 sa expired 62.24.71.26-88.79.252.164
12:57:10 ipsec no peer config for 88.79.252.164
12:57:10 ipsec no peer config found
12:57:11 ipsec phase2 sa deleted 62.24.71.26-88.79.252.164
12:57:14 ipsec,debug ===== received 256 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:14 ipsec no IKEv1 peer config for 88.79.252.164
12:57:16 ipsec acquire for 62.24.71.26 <=> 88.79.252.164
12:57:16 ipsec suitable policy found: 192.168.163.0/24 <=> 172.21.32.0/20
12:57:16 ipsec no peer config for 88.79.252.164
12:57:16 ipsec no peer config found
12:57:32 ipsec acquire for 62.24.71.26 <=> 88.79.252.164
12:57:32 ipsec suitable policy found: 192.168.163.0/24 <=> 192.168.9.0/24
12:57:32 ipsec no peer config for 88.79.252.164
12:57:32 ipsec no peer config found
12:57:34 ipsec,debug ===== received 256 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug ===
12:57:34 ipsec,info respond new phase 1 (Identity Protection): 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=1(sa) len=56
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=12
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug seen nptype=13(vid) len=20
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received unknown Vendor ID
12:57:34 ipsec,debug 882fe56d 6fd20dbc 2251613b 2ebe5beb
12:57:34 ipsec received Vendor ID: CISCO-UNITY
12:57:34 ipsec received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
12:57:34 ipsec received Vendor ID: DPD
12:57:34 ipsec,debug remote supports DPD
12:57:34 ipsec received Vendor ID: RFC 3947
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n
12:57:34 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
12:57:34 ipsec 88.79.252.164 Selected NAT-T version: RFC 3947
12:57:34 ipsec,debug total SA len=52
12:57:34 ipsec,debug 00000001 00000001 0000002c 00010001 00000024 00010000 800b0001 800c7080
12:57:34 ipsec,debug 80010007 80020002 800e0080 80030001 80040005
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=44
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=44
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=36
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=36
12:57:34 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
12:57:34 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
12:57:34 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
12:57:34 ipsec,debug dh(modp1536)
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80bcc70: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug -checking with pre-shared key auth-
12:57:34 ipsec,debug prop#=0, prot-id=ISAKMP, spi-size=0, #trns=1
12:57:34 ipsec,debug trns#=0, trns-id=IKE
12:57:34 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
12:57:34 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
12:57:34 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
12:57:34 ipsec,debug type=Group Description, flag=0x8000, lorv=1536-bit MODP group
12:57:34 ipsec,debug -compare proposal #1: Local:Peer
12:57:34 ipsec,debug (lifetime = 28800:28800)
12:57:34 ipsec,debug (lifebyte = 0:0)
12:57:34 ipsec,debug enctype = AES-CBC:AES-CBC
12:57:34 ipsec,debug (encklen = 128:128)
12:57:34 ipsec,debug hashtype = SHA:SHA
12:57:34 ipsec,debug authmethod = pre-shared key:pre-shared key
12:57:34 ipsec,debug dh_group = 1536-bit MODP group:1536-bit MODP group
12:57:34 ipsec,debug -an acceptable proposal found-
12:57:34 ipsec,debug dh(modp1536)
12:57:34 ipsec,debug -agreed on pre-shared key auth-
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug new cookie:
12:57:34 ipsec,debug b4b9751c9b603079\01
12:57:34 ipsec Adding xauth VID payload.
12:57:34 ipsec,debug add payload of len 52, next type 13
12:57:34 ipsec,debug add payload of len 16, next type 13
12:57:34 ipsec,debug add payload of len 8, next type 13
12:57:34 ipsec,debug add payload of len 16, next type 13
12:57:34 ipsec,debug add payload of len 16, next type 0
12:57:34 ipsec,debug 156 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 156 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase1 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079
12:57:34 ipsec,debug ===== received 292 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=4(ke) len=196
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=20(nat-d) len=24
12:57:34 ipsec,debug seen nptype=20(nat-d) len=24
12:57:34 ipsec,debug succeed.
12:57:34 ipsec 62.24.71.26 Hashing 62.24.71.26[500] with algo #2
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec NAT-D payload #0 verified
12:57:34 ipsec 88.79.252.164 Hashing 88.79.252.164[500] with algo #2
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec NAT-D payload #1 verified
12:57:34 ipsec NAT not detected
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug dh(modp1536)
12:57:34 ipsec,debug compute DH's private.
12:57:34 ipsec,debug 7bfcb681 03f06401 74879f50 b0235fd5 f23f47ec c3dd16c0 4ad9616e 9a81bdf2
12:57:34 ipsec,debug c3c9a0f5 b211297b 183ecad9 9bd61619 08dad204 4672c91e 8b73f86d 33685655
12:57:34 ipsec,debug a9c8a7ed 22348671 3b1bd156 bb526376 07b6c410 4b3201e5 8ce11e4a c246a5bf
12:57:34 ipsec,debug f8c95999 b818ce15 e5826a37 833516d3 cb99fa0e cc2e6a9f 71c49a4e 045820dd
12:57:34 ipsec,debug e5d7d1a9 deb3063e 5cf5a0bc d4023a83 8bf65f74 0ba98822 aa4af686 06cad540
12:57:34 ipsec,debug d810fd7e b5baba52 dfba5b84 83307eec 4a5074c8 2aae066e 7485e1d6 5018a819
12:57:34 ipsec,debug compute DH's public.
12:57:34 ipsec,debug a5d3beca f2b443de b9394ef8 96493189 3e560e39 29f11575 943fce33 c211b662
12:57:34 ipsec,debug df27cc28 eb8f7d7e 4d60420f 194325a6 64b81742 2545ad53 78be796d 57c594df
12:57:34 ipsec,debug f97abc55 dced847b 90f8e692 f79a6723 a571b3db 98390d9d b8d8fb0d cf03b25b
12:57:34 ipsec,debug 1066cac8 f5c6ef58 0dec6601 cab30598 559e7b34 4ac9b84c a40be138 7fa74eff
12:57:34 ipsec,debug 2de6054e d4fa92b4 5b9d6429 aee8f2df bc8b0c29 16f872f1 f752ad8d c15fe26a
12:57:34 ipsec,debug fc18fc8d f4899285 e3400689 ffa06ee8 0d04d39d e5238e41 9577fb47 35d28099
12:57:34 ipsec 88.79.252.164 Hashing 88.79.252.164[500] with algo #2
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec 62.24.71.26 Hashing 62.24.71.26[500] with algo #2
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec Adding remote and local NAT-D payloads.
12:57:34 ipsec,debug add payload of len 192, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 20
12:57:34 ipsec,debug add payload of len 20, next type 20
12:57:34 ipsec,debug add payload of len 20, next type 0
12:57:34 ipsec,debug 300 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 300 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase1 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079
12:57:34 ipsec,debug dh(modp1536)
12:57:34 ipsec,debug compute DH's shared.
12:57:34 ipsec,debug
12:57:34 ipsec,debug 64e04dfe 3e1a9293 4f3ef24d 598abc8d 4efe1262 8e21c156 cbba6e9d 48a45df7
12:57:34 ipsec,debug 72b53ced 597f2209 2912089d 3181c14a efa8924c 5c84d51b 3ca84dc7 b14b341b
12:57:34 ipsec,debug 32a50f2c c28f3dde 3b9acc93 76a40303 6d79cf6b c3fbb907 f85f48c0 34eac23b
12:57:34 ipsec,debug 96887a69 cbb0a8b1 c40d1334 0c3bd159 92400417 7711c30a 3b094067 4e2983b7
12:57:34 ipsec,debug 32116614 d4d28696 0a5b6991 5c5dac07 7284a74d d6c9dd75 bc1076e3 5a434ed7
12:57:34 ipsec,debug 50f6b33f 693d3248 5392dd5a 242ff01b 90bd3d07 ca2afd55 1ab0e8c2 ee65216c
12:57:34 ipsec,debug nonce 1:
12:57:34 ipsec,debug f9a0f0b5 0a1b1f79 ae6ff43f 0054c951
12:57:34 ipsec,debug nonce 2:
12:57:34 ipsec,debug a548ef19 aae95f78 93d1da4d be6b0f27 d0981bf1 b2f60aab
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug SKEYID computed:
12:57:34 ipsec,debug b530dc08 2c833050 ed19f1a7 71d0c0a0 81e27d1e
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug SKEYID_d computed:
12:57:34 ipsec,debug a14fbe38 13c966c7 35f6cdb4 9a147e30 9be56635
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug SKEYID_a computed:
12:57:34 ipsec,debug 80646eb9 5bf22489 ce4b4464 c6302a6a 2c315944
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug SKEYID_e computed:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b 0f515ed2
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug final encryption key computed:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV computed:
12:57:34 ipsec,debug 6826048c 0d254190 72a5184c 005762ac
12:57:34 ipsec,debug ===== received 76 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug ceefd4d3 33e95f7d f9964280 bfad361b
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 6826048c 0d254190 72a5184c 005762ac
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 0800000c 01000000 584ffca4 00000018 7bf537ec b4cd1bf8 b7571c06 f6e0544c
12:57:34 ipsec,debug f6377499 00000000 00000000 00000000
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 05100201 00000000 0000004c 0800000c
12:57:34 ipsec,debug 01000000 584ffca4 00000018 7bf537ec b4cd1bf8 b7571c06 f6e0544c f6377499
12:57:34 ipsec,debug 00000000 00000000 00000000
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=5(id) len=12
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug HASH received:
12:57:34 ipsec,debug 7bf537ec b4cd1bf8 b7571c06 f6e0544c f6377499
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug e333d65e 12018d12 dd9ddea8 3e1a1b1f 8df6dd47 1eac27ed c412d458 443cb2ea
12:57:34 ipsec,debug bd333f78 7328f0a4 b00d5f84 3c473b86 0024ce56 bd64a978 e670d39a 5847d4ca
12:57:34 ipsec,debug ca447606 b8d67182 2500d569 44bbffb8 64e347e6 01e8053f b7053388 fc35a9b1
12:57:34 ipsec,debug c1fcbcaf d1a72c36 6070f5be 04e411e5 c32ac7ac a728cb80 bbcdff85 028a4135
12:57:34 ipsec,debug 78a1efba 8c42811b ebd8ef17 87e2a5b7 7eebce73 a47feead c13a3528 d3421114
12:57:34 ipsec,debug 001695e6 72c494ab 49e72c5f d7acb580 3555e1f1 a1315d05 a3a1f912 e49cb885
12:57:34 ipsec,debug a5d3beca f2b443de b9394ef8 96493189 3e560e39 29f11575 943fce33 c211b662
12:57:34 ipsec,debug df27cc28 eb8f7d7e 4d60420f 194325a6 64b81742 2545ad53 78be796d 57c594df
12:57:34 ipsec,debug f97abc55 dced847b 90f8e692 f79a6723 a571b3db 98390d9d b8d8fb0d cf03b25b
12:57:34 ipsec,debug 1066cac8 f5c6ef58 0dec6601 cab30598 559e7b34 4ac9b84c a40be138 7fa74eff
12:57:34 ipsec,debug 2de6054e d4fa92b4 5b9d6429 aee8f2df bc8b0c29 16f872f1 f752ad8d c15fe26a
12:57:34 ipsec,debug fc18fc8d f4899285 e3400689 ffa06ee8 0d04d39d e5238e41 9577fb47 35d28099
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 00000001 00000001 0000002c 00010001
12:57:34 ipsec,debug 00000024 00010000 800b0001 800c7080 80010007 80020002 800e0080 80030001
12:57:34 ipsec,debug 80040005 01000000 584ffca4
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 7bf537ec b4cd1bf8 b7571c06 f6e0544c f6377499
12:57:34 ipsec,debug HASH for PSK validated.
12:57:34 ipsec,debug 88.79.252.164 peer's ID
12:57:34 ipsec,debug 01000000 584ffca4
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug use ID type of IPv4_address
12:57:34 ipsec,debug generate HASH_R
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug a5d3beca f2b443de b9394ef8 96493189 3e560e39 29f11575 943fce33 c211b662
12:57:34 ipsec,debug df27cc28 eb8f7d7e 4d60420f 194325a6 64b81742 2545ad53 78be796d 57c594df
12:57:34 ipsec,debug f97abc55 dced847b 90f8e692 f79a6723 a571b3db 98390d9d b8d8fb0d cf03b25b
12:57:34 ipsec,debug 1066cac8 f5c6ef58 0dec6601 cab30598 559e7b34 4ac9b84c a40be138 7fa74eff
12:57:34 ipsec,debug 2de6054e d4fa92b4 5b9d6429 aee8f2df bc8b0c29 16f872f1 f752ad8d c15fe26a
12:57:34 ipsec,debug fc18fc8d f4899285 e3400689 ffa06ee8 0d04d39d e5238e41 9577fb47 35d28099
12:57:34 ipsec,debug e333d65e 12018d12 dd9ddea8 3e1a1b1f 8df6dd47 1eac27ed c412d458 443cb2ea
12:57:34 ipsec,debug bd333f78 7328f0a4 b00d5f84 3c473b86 0024ce56 bd64a978 e670d39a 5847d4ca
12:57:34 ipsec,debug ca447606 b8d67182 2500d569 44bbffb8 64e347e6 01e8053f b7053388 fc35a9b1
12:57:34 ipsec,debug c1fcbcaf d1a72c36 6070f5be 04e411e5 c32ac7ac a728cb80 bbcdff85 028a4135
12:57:34 ipsec,debug 78a1efba 8c42811b ebd8ef17 87e2a5b7 7eebce73 a47feead c13a3528 d3421114
12:57:34 ipsec,debug 001695e6 72c494ab 49e72c5f d7acb580 3555e1f1 a1315d05 a3a1f912 e49cb885
12:57:34 ipsec,debug b4b9751c 9b603079 b24d3d59 a41d03c9 00000001 00000001 0000002c 00010001
12:57:34 ipsec,debug 00000024 00010000 800b0001 800c7080 80010007 80020002 800e0080 80030001
12:57:34 ipsec,debug 80040005 011101f4 3e18471a
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug c23a2b48 7aee884a fc3d9320 77aa65b0 a8f0c035
12:57:34 ipsec,debug add payload of len 8, next type 8
12:57:34 ipsec,debug add payload of len 20, next type 0
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 12
12:57:34 ipsec,debug 0800000c 011101f4 3e18471a 00000018 c23a2b48 7aee884a fc3d9320 77aa65b0
12:57:34 ipsec,debug a8f0c035 e4cef3fd ec879af8 ebb29a0b
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug ceefd4d3 33e95f7d f9964280 bfad361b
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 76 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 76 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec,info ISAKMP-SA established 62.24.71.26[500]-88.79.252.164[500] spi:b24d3d59a41d03c9:b4b9751c9b603079
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba b476b60a
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 840e8c2e dc69e086 c1411285 99009951
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 095c1d53 f86ffa0d 7f76cced 45e68448
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 840e8c2e dc69e086 c1411285 99009951
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 14df5ab4 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 9b070e19 a57d0f40 d4ebf026 5b1f20c8
12:57:34 ipsec,debug 05000010 04000000 ac151000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 b476b60a 0000009c 01000018
12:57:34 ipsec,debug afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 14df5ab4 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 9b070e19 a57d0f40 d4ebf026 5b1f20c8 05000010
12:57:34 ipsec,debug 04000000 ac151000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac151000 fffff000
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug b476b60a 0a000034 00000001 00000001 00000028 00030401 14df5ab4 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 9b070e19
12:57:34 ipsec,debug a57d0f40 d4ebf026 5b1f20c8 05000010 04000000 ac151000 fffff000 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug afbdd62c 7b41c79c fe53ad03 afb34d78 5ee6357f
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 14df5ab4 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80ce978: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.21.16.0[0] prefixlen=20 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.16.0/20
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.16.0/20
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=6:6)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80ce978
12:57:34 ipsec,debug 0x80ce978: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=14df5ab4 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=6:6)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 316
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 4e2211db
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 89dc5538 1a1f1035 47361b86 b551d4f6
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 218f4bdb 4447b9cc 405ea828 e568bb40
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 89dc5538 1a1f1035 47361b86 b551d4f6
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 226fb164 e4432897 32475565 cff2e98d 5509e812 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 b1cf32db 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 9c131ebc c1fb8f29 99974f1f 70eadab6
12:57:34 ipsec,debug 05000010 04000000 ac154100 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 4e2211db 0000009c 01000018
12:57:34 ipsec,debug 226fb164 e4432897 32475565 cff2e98d 5509e812 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 b1cf32db 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 9c131ebc c1fb8f29 99974f1f 70eadab6 05000010
12:57:34 ipsec,debug 04000000 ac154100 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac154100 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 226fb164 e4432897 32475565 cff2e98d 5509e812
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 4e2211db 0a000034 00000001 00000001 00000028 00030401 b1cf32db 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 9c131ebc
12:57:34 ipsec,debug c1fb8f29 99974f1f 70eadab6 05000010 04000000 ac154100 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 226fb164 e4432897 32475565 cff2e98d 5509e812
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 b1cf32db 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c4ed0: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.21.65.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.65.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.65.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=14:14)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80c4ed0
12:57:34 ipsec,debug 0x80c4ed0: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=b1cf32db spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=14:14)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 317
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80ceb30: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug b476b60a 9b070e19 a57d0f40 d4ebf026 5b1f20c8 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 030e5f84 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c 8e112b34 d5c2cfac 6f917398 030e6832 f940c00f
12:57:34 ipsec,debug 1eae9ae1 05000010 04000000 ac151000 fffff000 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 9c17e020 732ffbf3 756e20a2 22f8dfac 781c73b6
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 9c17e020 732ffbf3 756e20a2 22f8dfac 781c73b6 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 030e5f84 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c 8e112b34 d5c2cfac 6f917398 030e6832
12:57:34 ipsec,debug f940c00f 1eae9ae1 05000010 04000000 ac151000 fffff000 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 c49ac0f5 b7e49e07
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug 095c1d53 f86ffa0d 7f76cced 45e68448
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 88538956 0d83dbbe fc2b780f 6563b6c9
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000b476
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 7d977968
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug b1b9ea9c 3df985a2 0d1eb5e5 019b29c9
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug e3116166 f8ba63bc 1aafc8a7 568beaee
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug b1b9ea9c 3df985a2 0d1eb5e5 019b29c9
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 77065c88 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 d103b0b1 0ddd7b19 dc90955a 858b9809
12:57:34 ipsec,debug 05000010 04000000 ac154500 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 7d977968 0000009c 01000018
12:57:34 ipsec,debug cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 77065c88 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 d103b0b1 0ddd7b19 dc90955a 858b9809 05000010
12:57:34 ipsec,debug 04000000 ac154500 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac154500 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 7d977968 0a000034 00000001 00000001 00000028 00030401 77065c88 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 d103b0b1
12:57:34 ipsec,debug 0ddd7b19 dc90955a 858b9809 05000010 04000000 ac154500 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug cfcbef33 6c1a3afb 73d76d7f 1fe30f04 d67ad003
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 77065c88 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cd6a8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.21.69.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.69.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.69.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80cd6a8
12:57:34 ipsec,debug 0x80cd6a8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=77065c88 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 318
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80ce850: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 4e2211db 9c131ebc c1fb8f29 99974f1f 70eadab6 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0e734bcc 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c e50349c6 139d783d 3b54ed13 dfe8ef51 9ea31115
12:57:34 ipsec,debug 86b6e80b 05000010 04000000 ac154100 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 0fe2a85d 3be4c63f fe71da04 e0120927 9535fca9
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 0fe2a85d 3be4c63f fe71da04 e0120927 9535fca9 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0e734bcc 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e50349c6 139d783d 3b54ed13 dfe8ef51
12:57:34 ipsec,debug 9ea31115 86b6e80b 05000010 04000000 ac154100 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 ebb19ab1 b0cafa07
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug 218f4bdb 4447b9cc 405ea828 e568bb40
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug f7269c69 9752e105 a73ae47f 3019611b
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00004e22
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 2101e83d
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 4bc6a89b fb4e9c1e d264a7f1 1a1c8098
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug b4480a1b f9d00dfb 3160dafe 19ffe656
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 4bc6a89b fb4e9c1e d264a7f1 1a1c8098
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 f510f072 23f84b50 7b27654d 0a64e412 53c8fd86 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 372170ec 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 5289fff4 2f508add a8dfdc75 4aef8a3a
12:57:34 ipsec,debug 05000010 04000000 ac155500 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 2101e83d 0000009c 01000018
12:57:34 ipsec,debug f510f072 23f84b50 7b27654d 0a64e412 53c8fd86 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 372170ec 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 5289fff4 2f508add a8dfdc75 4aef8a3a 05000010
12:57:34 ipsec,debug 04000000 ac155500 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac155500 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug f510f072 23f84b50 7b27654d 0a64e412 53c8fd86
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 2101e83d 0a000034 00000001 00000001 00000028 00030401 372170ec 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 5289fff4
12:57:34 ipsec,debug 2f508add a8dfdc75 4aef8a3a 05000010 04000000 ac155500 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug f510f072 23f84b50 7b27654d 0a64e412 53c8fd86
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 372170ec 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c23b8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.21.85.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.85.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.85.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=16:16)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80c23b8
12:57:34 ipsec,debug 0x80c23b8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=372170ec spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=16:16)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 319
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c2488: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 7d977968 d103b0b1 0ddd7b19 dc90955a 858b9809 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 06d4d8ee 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c fbfdc833 0d9e9214 2e4d916c 0df53cef eee7af9f
12:57:34 ipsec,debug d7b1e577 05000010 04000000 ac154500 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug c0ffd27b 41bf11db 0a26f2bb 9af12769 59864873
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 c0ffd27b 41bf11db 0a26f2bb 9af12769 59864873 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 06d4d8ee 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c fbfdc833 0d9e9214 2e4d916c 0df53cef
12:57:34 ipsec,debug eee7af9f d7b1e577 05000010 04000000 ac154500 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 b3a3a982 c785ec07
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug e3116166 f8ba63bc 1aafc8a7 568beaee
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 1c943449 cb3dc5b2 75ebef70 51a57a11
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00007d97
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba e71475bc
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug cb91da91 eccdf169 5ad52ba2 b27709bc
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 762031d7 5d921388 a74864e0 87abd6a1
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug cb91da91 eccdf169 5ad52ba2 b27709bc
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 9551b1ca 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 a0a2df23 586dc422 8b0321de 8490a3ae
12:57:34 ipsec,debug 05000010 04000000 c0a80d00 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 e71475bc 0000009c 01000018
12:57:34 ipsec,debug eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 9551b1ca 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 a0a2df23 586dc422 8b0321de 8490a3ae 05000010
12:57:34 ipsec,debug 04000000 c0a80d00 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 c0a80d00 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug e71475bc 0a000034 00000001 00000001 00000028 00030401 9551b1ca 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 a0a2df23
12:57:34 ipsec,debug 586dc422 8b0321de 8490a3ae 05000010 04000000 c0a80d00 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug eed35260 f678acf5 c83c5f1a d37e53b5 79fafcca
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 9551b1ca 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cd758: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 192.168.13.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.13.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.13.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=19:19)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80cd758
12:57:34 ipsec,debug 0x80cd758: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=9551b1ca spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=19:19)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 31a
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cd758: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 2101e83d 5289fff4 2f508add a8dfdc75 4aef8a3a 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0afedfef 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c e3493302 aebaae60 499cb76f e5891f7e 3dfd21d4
12:57:34 ipsec,debug 23108ee5 05000010 04000000 ac155500 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 8473f09a 807a3797 2d64a1cc 6567f56e 77eb2a53
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 8473f09a 807a3797 2d64a1cc 6567f56e 77eb2a53 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0afedfef 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e3493302 aebaae60 499cb76f e5891f7e
12:57:34 ipsec,debug 3dfd21d4 23108ee5 05000010 04000000 ac155500 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 a0efa7d2 9ddfc807
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug b4480a1b f9d00dfb 3160dafe 19ffe656
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 78581604 80e81e65 74f0fde3 f13ea672
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00002101
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 5f86beda
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 659376f9 08f78844 82983701 e01e93ab
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug e112fb55 c6e41408 b073623d 4bb37896
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 659376f9 08f78844 82983701 e01e93ab
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 0c228712 083c8189 a6261384 58198a80 66d4a7c1 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 d6c025b1 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 999e598c 4f49b2ca 0a1e9ae7 960f36cb
12:57:34 ipsec,debug 05000010 04000000 c0a84a00 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 5f86beda 0000009c 01000018
12:57:34 ipsec,debug 0c228712 083c8189 a6261384 58198a80 66d4a7c1 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 d6c025b1 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 999e598c 4f49b2ca 0a1e9ae7 960f36cb 05000010
12:57:34 ipsec,debug 04000000 c0a84a00 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 c0a84a00 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 0c228712 083c8189 a6261384 58198a80 66d4a7c1
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 5f86beda 0a000034 00000001 00000001 00000028 00030401 d6c025b1 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 999e598c
12:57:34 ipsec,debug 4f49b2ca 0a1e9ae7 960f36cb 05000010 04000000 c0a84a00 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 0c228712 083c8189 a6261384 58198a80 66d4a7c1
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 d6c025b1 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c9348: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 192.168.74.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.74.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.74.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80c9348
12:57:34 ipsec,debug 0x80c9348: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=d6c025b1 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 31b
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c9410: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug e71475bc a0a2df23 586dc422 8b0321de 8490a3ae 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0bfb15d2 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c ae86a0a2 863d910b fad18fc6 6e513667 18ffdf62
12:57:34 ipsec,debug caa15576 05000010 04000000 c0a80d00 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 49370450 698aadb3 ae57b581 5b65f49a 238a2cec
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 49370450 698aadb3 ae57b581 5b65f49a 238a2cec 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0bfb15d2 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c ae86a0a2 863d910b fad18fc6 6e513667
12:57:34 ipsec,debug 18ffdf62 caa15576 05000010 04000000 c0a80d00 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 9caf819a fddaf907
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug 762031d7 5d921388 a74864e0 87abd6a1
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 3589105c 02701d12 66837ca0 df2018b6
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000e714
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 9340aee7
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 902ca196 f6d4cbb6 d0d0433e dac653f9
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug ee3c84ba ff05d0af 6e01a04d c3502471
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 902ca196 f6d4cbb6 d0d0433e dac653f9
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 3e363cce 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 8f204fc1 e51ec9cc e0be6c7d 8b8aff89
12:57:34 ipsec,debug 05000010 04000000 ac152000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 9340aee7 0000009c 01000018
12:57:34 ipsec,debug f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 3e363cce 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 8f204fc1 e51ec9cc e0be6c7d 8b8aff89 05000010
12:57:34 ipsec,debug 04000000 ac152000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac152000 fffff000
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 9340aee7 0a000034 00000001 00000001 00000028 00030401 3e363cce 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 8f204fc1
12:57:34 ipsec,debug e51ec9cc e0be6c7d 8b8aff89 05000010 04000000 ac152000 fffff000 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug f95360af 7bfa787b 1476aa9b a81cb3d8 2d29b023
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 3e363cce 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cbcf8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.21.32.0[0] prefixlen=20 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.32.0/20
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.32.0/20
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=2:2)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80cbcf8
12:57:34 ipsec,debug 0x80cbcf8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=3e363cce spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=2:2)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 31c
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c70e8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 5f86beda 999e598c 4f49b2ca 0a1e9ae7 960f36cb 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0c7aee4c 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c e527a00d 3ce4d4d3 c629d469 6684506f ddb8b71c
12:57:34 ipsec,debug 47b2f2e7 05000010 04000000 c0a84a00 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug dedcc9f4 c86cda88 0805529f b4bb38ec 343dedcf
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 dedcc9f4 c86cda88 0805529f b4bb38ec 343dedcf 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0c7aee4c 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e527a00d 3ce4d4d3 c629d469 6684506f
12:57:34 ipsec,debug ddb8b71c 47b2f2e7 05000010 04000000 c0a84a00 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 dcccdcdf 8ef58607
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug e112fb55 c6e41408 b073623d 4bb37896
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 3def5b64 2748b9f1 a7c38180 2b92c862
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00005f86
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba eae461cc
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug e0bff7ce 30dcde07 b3c2018a fed9d5fa
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug ef8c8bd9 a2feb350 0f28770b 31072c0b
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug e0bff7ce 30dcde07 b3c2018a fed9d5fa
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 8a737d6c 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 2ada5d4b 1750cfc3 b86982e4 82524afa
12:57:34 ipsec,debug 05000010 04000000 ac170000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 eae461cc 0000009c 01000018
12:57:34 ipsec,debug ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 8a737d6c 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 2ada5d4b 1750cfc3 b86982e4 82524afa 05000010
12:57:34 ipsec,debug 04000000 ac170000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac170000 fffff000
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug eae461cc 0a000034 00000001 00000001 00000028 00030401 8a737d6c 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 2ada5d4b
12:57:34 ipsec,debug 1750cfc3 b86982e4 82524afa 05000010 04000000 ac170000 fffff000 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug ef726a86 3ec4097d a512ed49 52a975c2 d8fa991a
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 8a737d6c 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80ce830: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.23.0.0[0] prefixlen=20 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.23.0.0/20
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.23.0.0/20
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=10:10)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80ce830
12:57:34 ipsec,debug 0x80ce830: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=8a737d6c spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=10:10)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 31d
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c4890: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 9340aee7 8f204fc1 e51ec9cc e0be6c7d 8b8aff89 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 03a677f2 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c e2095eea e5e5dee3 3bc952a6 ea7bae2e 1b40bd9d
12:57:34 ipsec,debug 9fc01455 05000010 04000000 ac152000 fffff000 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug f99f1326 6b908ae9 677f8695 a4c65230 e8cf1a2c
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 f99f1326 6b908ae9 677f8695 a4c65230 e8cf1a2c 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 03a677f2 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c e2095eea e5e5dee3 3bc952a6 ea7bae2e
12:57:34 ipsec,debug 1b40bd9d 9fc01455 05000010 04000000 ac152000 fffff000 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 97d3949b badab807
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug ee3c84ba ff05d0af 6e01a04d c3502471
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 4a1998d3 161d372e 58422bcd 5f596fc3
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:00009340
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba cc51649b
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 56cce85f 7214a053 915c80f9 fe646004
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug b11dbc82 ec2ba732 ba3ae375 74506e8f
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 56cce85f 7214a053 915c80f9 fe646004
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 948c66a7 437c811d 587e9459 67a68522 6f7b175e 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 58b39bbd 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 e64a135c a0a9a283 4d4b8241 2f230d95
12:57:34 ipsec,debug 05000010 04000000 ac1d0000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 cc51649b 0000009c 01000018
12:57:34 ipsec,debug 948c66a7 437c811d 587e9459 67a68522 6f7b175e 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 58b39bbd 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 e64a135c a0a9a283 4d4b8241 2f230d95 05000010
12:57:34 ipsec,debug 04000000 ac1d0000 fffff000 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac1d0000 fffff000
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 948c66a7 437c811d 587e9459 67a68522 6f7b175e
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug cc51649b 0a000034 00000001 00000001 00000028 00030401 58b39bbd 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 e64a135c
12:57:34 ipsec,debug a0a9a283 4d4b8241 2f230d95 05000010 04000000 ac1d0000 fffff000 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 948c66a7 437c811d 587e9459 67a68522 6f7b175e
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 58b39bbd 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c9b28: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.29.0.0[0] prefixlen=20 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.29.0.0/20
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.29.0.0/20
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80c9b28
12:57:34 ipsec,debug 0x80c9b28: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=58b39bbd spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=7:7)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 31e
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c9c90: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug eae461cc 2ada5d4b 1750cfc3 b86982e4 82524afa 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 012e952e 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c ea8d72e1 ea1068f4 3af381f9 c69d767c 16bf7ba8
12:57:34 ipsec,debug 7452f817 05000010 04000000 ac170000 fffff000 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug b95acd48 da9754d0 83c28e30 99b74437 74c5f0d2
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 b95acd48 da9754d0 83c28e30 99b74437 74c5f0d2 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 012e952e 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c ea8d72e1 ea1068f4 3af381f9 c69d767c
12:57:34 ipsec,debug 16bf7ba8 7452f817 05000010 04000000 ac170000 fffff000 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 c1c8d1e5 f096e407
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug ef8c8bd9 a2feb350 0f28770b 31072c0b
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug d9d93ae3 7ac39b7c d16f3f4e c86e2d77
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000eae4
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 992b663e
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 76c23af8 08ab7b0c 38e93e3e 9e6384b5
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug ef68066f be5d02c3 11f635cc 5af8bed4
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 76c23af8 08ab7b0c 38e93e3e 9e6384b5
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 9c362832 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 fc3573c1 5042ffc5 92ab82a8 095ea584
12:57:34 ipsec,debug 05000010 04000000 c0a80000 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 992b663e 0000009c 01000018
12:57:34 ipsec,debug 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 9c362832 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 fc3573c1 5042ffc5 92ab82a8 095ea584 05000010
12:57:34 ipsec,debug 04000000 c0a80000 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 c0a80000 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 992b663e 0a000034 00000001 00000001 00000028 00030401 9c362832 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 fc3573c1
12:57:34 ipsec,debug 5042ffc5 92ab82a8 095ea584 05000010 04000000 c0a80000 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 40db5782 fb381bca 36d91ec9 d68a32aa 349b2873
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 9c362832 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80ca118: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 192.168.0.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.0.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.0.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=3:3)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80ca118
12:57:34 ipsec,debug 0x80ca118: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=9c362832 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=3:3)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 31f
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c4998: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug cc51649b e64a135c a0a9a283 4d4b8241 2f230d95 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0d1afda3 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c 90c1de1b 806863ae 9add6652 2a0dfb03 9a29d8a3
12:57:34 ipsec,debug 7536149f 05000010 04000000 ac1d0000 fffff000 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 1002e016 2a1d8e70 3beee47e aa964ef7 86df1f10
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 1002e016 2a1d8e70 3beee47e aa964ef7 86df1f10 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0d1afda3 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c 90c1de1b 806863ae 9add6652 2a0dfb03
12:57:34 ipsec,debug 9a29d8a3 7536149f 05000010 04000000 ac1d0000 fffff000 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 9db084b6 e0cb9c07
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug b11dbc82 ec2ba732 ba3ae375 74506e8f
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 817c0ca3 27ddee3e 1dbd4497 c71e5344
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000cc51
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba c6fb6612
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug faae2c2a 01de9bfb ec84bf10 3283a3eb
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 1c44c766 0ab7cbf1 8d97daab e985584a
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug faae2c2a 01de9bfb ec84bf10 3283a3eb
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 7575e5d3 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 79a17f3e d79b9546 f6dab836 2813ad06
12:57:34 ipsec,debug 05000010 04000000 c0a80c00 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 c6fb6612 0000009c 01000018
12:57:34 ipsec,debug 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 7575e5d3 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 79a17f3e d79b9546 f6dab836 2813ad06 05000010
12:57:34 ipsec,debug 04000000 c0a80c00 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 c0a80c00 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug c6fb6612 0a000034 00000001 00000001 00000028 00030401 7575e5d3 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 79a17f3e
12:57:34 ipsec,debug d79b9546 f6dab836 2813ad06 05000010 04000000 c0a80c00 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 12606e08 dca3ee20 ed5f9c42 09234778 1c38dd40
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 7575e5d3 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80ca2c0: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 192.168.12.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.12.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.12.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=4:4)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80ca2c0
12:57:34 ipsec,debug 0x80ca2c0: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=7575e5d3 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=4:4)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 320
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c6970: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 992b663e fc3573c1 5042ffc5 92ab82a8 095ea584 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0e7c7038 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c d4873b89 de746c12 46c22564 2545fa22 469e2765
12:57:34 ipsec,debug 45bba9db 05000010 04000000 c0a80000 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug b8e0dedf 13e4ae26 8358838b 1b147593 b7da7324
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 b8e0dedf 13e4ae26 8358838b 1b147593 b7da7324 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0e7c7038 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c d4873b89 de746c12 46c22564 2545fa22
12:57:34 ipsec,debug 469e2765 45bba9db 05000010 04000000 c0a80000 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 c9feaa92 cbcfa607
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug ef68066f be5d02c3 11f635cc 5af8bed4
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 1b98a1c0 d322ff8c 969e500e ec7f00e5
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000992b
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba d41e5c8b
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 9d739cac d6e8c413 7011f03b 6854a20b
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 71d6302b 708fb39b ca83f9e4 9ba08f41
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 9d739cac d6e8c413 7011f03b 6854a20b
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 30257509 f6465e8c ca359865 f520f805 0988f740 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 1625e0a2 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 d736cca2 57e52913 d801e9d6 501c16ab
12:57:34 ipsec,debug 05000010 04000000 c0a81600 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 d41e5c8b 0000009c 01000018
12:57:34 ipsec,debug 30257509 f6465e8c ca359865 f520f805 0988f740 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 1625e0a2 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 d736cca2 57e52913 d801e9d6 501c16ab 05000010
12:57:34 ipsec,debug 04000000 c0a81600 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 c0a81600 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 30257509 f6465e8c ca359865 f520f805 0988f740
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug d41e5c8b 0a000034 00000001 00000001 00000028 00030401 1625e0a2 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 d736cca2
12:57:34 ipsec,debug 57e52913 d801e9d6 501c16ab 05000010 04000000 c0a81600 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 30257509 f6465e8c ca359865 f520f805 0988f740
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 1625e0a2 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cf050: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 192.168.22.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.22.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.22.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80cf050
12:57:34 ipsec,debug 0x80cf050: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=1625e0a2 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=9:9)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 321
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cf130: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug c6fb6612 79a17f3e d79b9546 f6dab836 2813ad06 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 068bd720 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c fa179142 fbe64813 53f06f0b 7da85d64 f3615b54
12:57:34 ipsec,debug accf1363 05000010 04000000 c0a80c00 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 94c6dd8b 54d7164a 5f087be5 845bb559 54b619c8
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 94c6dd8b 54d7164a 5f087be5 845bb559 54b619c8 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 068bd720 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c fa179142 fbe64813 53f06f0b 7da85d64
12:57:34 ipsec,debug f3615b54 accf1363 05000010 04000000 c0a80c00 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 938dd297 9ccad507
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug 1c44c766 0ab7cbf1 8d97daab e985584a
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 4a9a9ebd 121bc522 bc81a47b 78a63522
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000c6fb
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 35e38bb4
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug 3ffbb4ad 95e6de40 fd1444c2 6d504ce8
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug fe9ef13d a2ba6462 ccf73854 a9fb7a48
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug 3ffbb4ad 95e6de40 fd1444c2 6d504ce8
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 b5210fa7 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 af4b7524 ccf228c4 4a350969 aec59f03
12:57:34 ipsec,debug 05000010 04000000 c0a80900 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 35e38bb4 0000009c 01000018
12:57:34 ipsec,debug 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 b5210fa7 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 af4b7524 ccf228c4 4a350969 aec59f03 05000010
12:57:34 ipsec,debug 04000000 c0a80900 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 c0a80900 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 35e38bb4 0a000034 00000001 00000001 00000028 00030401 b5210fa7 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 af4b7524
12:57:34 ipsec,debug ccf228c4 4a350969 aec59f03 05000010 04000000 c0a80900 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 51dcd3d5 28f482d6 624686f2 2f5d1128 6a8afa3e
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 b5210fa7 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c9e38: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 192.168.9.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 192.168.9.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 192.168.9.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=8:8)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80c9e38
12:57:34 ipsec,debug 0x80c9e38: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=b5210fa7 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=8:8)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 322
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c9e70: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug d41e5c8b d736cca2 57e52913 d801e9d6 501c16ab 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 082827cb 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c 980f9988 dac8be75 424aed32 5db94edc fc50ed56
12:57:34 ipsec,debug e96d392b 05000010 04000000 c0a81600 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug 603b4230 7d01193e 82f051a5 da201831 4fdf91ed
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 603b4230 7d01193e 82f051a5 da201831 4fdf91ed 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 082827cb 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c 980f9988 dac8be75 424aed32 5db94edc
12:57:34 ipsec,debug fc50ed56 e96d392b 05000010 04000000 c0a81600 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 9ea5b197 f799f907
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug 71d6302b 708fb39b ca83f9e4 9ba08f41
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 6741a3c2 0faff444 9fb9e181 59ed667e
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000d41e
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 177a918a
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug e3d9b72a 1736559d 62316169 72428a80
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 97af8907 91e2a4fc 389e8e1f 166d0ea5
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug e3d9b72a 1736559d 62316169 72428a80
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 a7e39a09 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 91cebb91 5c5a0746 9e550c10 7a62685f
12:57:34 ipsec,debug 05000010 04000000 ac154000 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 177a918a 0000009c 01000018
12:57:34 ipsec,debug b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 a7e39a09 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 91cebb91 5c5a0746 9e550c10 7a62685f 05000010
12:57:34 ipsec,debug 04000000 ac154000 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac154000 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 177a918a 0a000034 00000001 00000001 00000028 00030401 a7e39a09 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 91cebb91
12:57:34 ipsec,debug 5c5a0746 9e550c10 7a62685f 05000010 04000000 ac154000 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug b7a2e25b 6b6b04f4 904b7031 ac335427 12ad6644
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 a7e39a09 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c2cb8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.21.64.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.21.64.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.21.64.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=13:13)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80c2cb8
12:57:34 ipsec,debug 0x80c2cb8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=a7e39a09 spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=13:13)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 323
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cefa8: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 35e38bb4 af4b7524 ccf228c4 4a350969 aec59f03 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 0608b436 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c a8c05b1f 917d3c42 90c2fc3a a8850814 ebcd9d41
12:57:34 ipsec,debug f7bf1ddc 05000010 04000000 c0a80900 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug fba1010a bfea1e45 1ea344c9 798617c8 a76f5144
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 fba1010a bfea1e45 1ea344c9 798617c8 a76f5144 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 0608b436 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c a8c05b1f 917d3c42 90c2fc3a a8850814
12:57:34 ipsec,debug ebcd9d41 f7bf1ddc 05000010 04000000 c0a80900 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 ece088c3 cdeed607
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug encrypted payload by IV:
12:57:34 ipsec,debug fe9ef13d a2ba6462 ccf73854 a9fb7a48
12:57:34 ipsec,debug save IV for next:
12:57:34 ipsec,debug 0e290f96 d0893c0f ffea127c 4e01fc4f
12:57:34 ipsec,debug encrypted.
12:57:34 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:34 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:34 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:000035e3
12:57:34 ipsec,debug ===== received 156 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:34 ipsec,debug compute IV for phase2
12:57:34 ipsec,debug phase1 last IV:
12:57:34 ipsec,debug efe34bee 348b1841 c39cf6cb 74cec0ba 73bf2329
12:57:34 ipsec,debug hash(sha1)
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug phase2 IV computed:
12:57:34 ipsec,debug da3c4b6b 2f05710d e9f4e9f6 2fa7719c
12:57:34 ipsec,debug ===
12:57:34 ipsec respond new phase 2 negotiation: 62.24.71.26[500]<=>88.79.252.164[500]
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug IV was saved for next processing:
12:57:34 ipsec,debug 158edbca b04f2ccf 42689d5b 0fc85403
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:34 ipsec,debug decrypted payload by IV:
12:57:34 ipsec,debug da3c4b6b 2f05710d e9f4e9f6 2fa7719c
12:57:34 ipsec,debug decrypted payload, but not trimed.
12:57:34 ipsec,debug 01000018 da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 19302fac 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 05000014 b3baaea8 a7d15f02 cf874b30 60d274f3
12:57:34 ipsec,debug 05000010 04000000 ac1f0000 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug padding len=1
12:57:34 ipsec,debug skip to trim padding.
12:57:34 ipsec,debug decrypted.
12:57:34 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 73bf2329 0000009c 01000018
12:57:34 ipsec,debug da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 19302fac 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 05000014 b3baaea8 a7d15f02 cf874b30 60d274f3 05000010
12:57:34 ipsec,debug 04000000 ac1f0000 ffffff00 00000010 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=8(hash) len=24
12:57:34 ipsec,debug seen nptype=1(sa) len=52
12:57:34 ipsec,debug seen nptype=10(nonce) len=20
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug seen nptype=5(id) len=16
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug received IDci2:
12:57:34 ipsec,debug 04000000 ac1f0000 ffffff00
12:57:34 ipsec,debug received IDcr2:
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug HASH(1) validate:
12:57:34 ipsec,debug da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 73bf2329 0a000034 00000001 00000001 00000028 00030401 19302fac 0000001c
12:57:34 ipsec,debug 000c0000 80040001 80010001 80020e10 80050002 80060080 05000014 b3baaea8
12:57:34 ipsec,debug a7d15f02 cf874b30 60d274f3 05000010 04000000 ac1f0000 ffffff00 00000010
12:57:34 ipsec,debug 04000000 c0a8a300 ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug da64b1d7 3d11f640 7ed6ccb0 1030e262 b38f39d3
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 19302fac 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80cdf00: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug got the local address from ID payload 192.168.163.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec,debug got the peer address from ID payload 172.31.0.0[0] prefixlen=24 ul_proto=255
12:57:34 ipsec searching for policy for selector: 192.168.163.0/24 <=> 172.31.0.0/24
12:57:34 ipsec using strict match: 192.168.163.0/24 <=> 172.31.0.0/24
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=17:17)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug begin compare proposals.
12:57:34 ipsec,debug pair[0]: 0x80cdf00
12:57:34 ipsec,debug 0x80cdf00: next=(nil) tnext=(nil)
12:57:34 ipsec,debug prop#=0 prot-id=ESP spi-size=4 #trns=1 trns#=0 trns-id=AES-CBC
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug peer's single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=19302fac spi_p=00000000 encmode=Tunnel reqid=0:0)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug my single bundle:
12:57:34 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=17:17)
12:57:34 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
12:57:34 ipsec,debug matched
12:57:34 ipsec,debug ===
12:57:34 ipsec,debug call pfkey_send_getspi 324
12:57:34 ipsec,debug pfkey GETSPI sent: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500]
12:57:34 ipsec,debug pfkey getspi sent.
12:57:34 ipsec,debug total SA len=48
12:57:34 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:34 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=2(prop) len=40
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug proposal #0 len=40
12:57:34 ipsec,debug begin.
12:57:34 ipsec,debug seen nptype=3(trns) len=28
12:57:34 ipsec,debug succeed.
12:57:34 ipsec,debug transform #0 len=28
12:57:34 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:34 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:34 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:34 ipsec,debug life duration was in TLV.
12:57:34 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:34 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:34 ipsec,debug pair 0:
12:57:34 ipsec,debug 0x80c2a88: next=(nil) tnext=(nil)
12:57:34 ipsec,debug proposal #0: 1 transform
12:57:34 ipsec,debug add payload of len 48, next type 10
12:57:34 ipsec,debug add payload of len 24, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 5
12:57:34 ipsec,debug add payload of len 12, next type 0
12:57:34 ipsec,debug HASH with:
12:57:34 ipsec,debug 177a918a 91cebb91 5c5a0746 9e550c10 7a62685f 0a000034 00000001 00000001
12:57:34 ipsec,debug 00000028 00030401 05215517 0000001c 000c0000 80040001 80010001 80020e10
12:57:34 ipsec,debug 80050002 80060080 0500001c b4b7886f f1b5d3a5 37a4f3e7 4882a524 f6fd2986
12:57:34 ipsec,debug 322a13e3 05000010 04000000 ac154000 ffffff00 00000010 04000000 c0a8a300
12:57:34 ipsec,debug ffffff00
12:57:34 ipsec,debug hmac(hmac_sha1)
12:57:34 ipsec,debug HASH computed:
12:57:34 ipsec,debug f5466aed 00bcde00 7b56c58a 88f144f3 f61d83fd
12:57:34 ipsec,debug add payload of len 20, next type 1
12:57:34 ipsec,debug begin encryption.
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug pad length = 8
12:57:34 ipsec,debug 01000018 f5466aed 00bcde00 7b56c58a 88f144f3 f61d83fd 0a000034 00000001
12:57:34 ipsec,debug 00000001 00000028 00030401 05215517 0000001c 000c0000 80040001 80010001
12:57:34 ipsec,debug 80020e10 80050002 80060080 0500001c b4b7886f f1b5d3a5 37a4f3e7 4882a524
12:57:34 ipsec,debug f6fd2986 322a13e3 05000010 04000000 ac154000 ffffff00 00000010 04000000
12:57:34 ipsec,debug c0a8a300 ffffff00 b7d8ca80 e68ee507
12:57:34 ipsec,debug encryption(aes)
12:57:34 ipsec,debug with key:
12:57:34 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug encrypted payload by IV:
12:57:35 ipsec,debug 97af8907 91e2a4fc 389e8e1f 166d0ea5
12:57:35 ipsec,debug save IV for next:
12:57:35 ipsec,debug b270b90f e20a1481 111aa824 ab96d047
12:57:35 ipsec,debug encrypted.
12:57:35 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:35 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:35 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:0000177a
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 7d02b6ed 53874267 38e32132 ac96e5bb
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 88538956 0d83dbbe fc2b780f 6563b6c9
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 b476b60a 0000003c 00000018
12:57:35 ipsec,debug 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00b476b6 0a9b070e 19a57d0f 40d4ebf0 265b1f20 c88e112b 34d5c2cf ac6f9173
12:57:35 ipsec,debug 98030e68 32f940c0 0f1eae9a e1
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 0e1ae3a7 44fd7ef0 d9bdb8d5 a81c1ebd a29e6a12
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03030e5f 849b070e 19a57d0f 40d4ebf0 265b1f20 c88e112b 34d5c2cf ac6f9173
12:57:35 ipsec,debug 98030e68 32f940c0 0f1eae9a e1
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug eca135e3 9751911e ff1482b3 b331d5c5 02d1a8d1 c3310db6 e709fcd2 7af531a9
12:57:35 ipsec,debug 5aed4e31 1499749b a114174b fcb267dd 20a2687e 6d654ff1 a4f33d0b
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0314df5a b49b070e 19a57d0f 40d4ebf0 265b1f20 c88e112b 34d5c2cf ac6f9173
12:57:35 ipsec,debug 98030e68 32f940c0 0f1eae9a e1
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 685961c2 bbe99301 d417ffae 2a6a9319 ab116f52 66f27476 c7495fb3 85444ce2
12:57:35 ipsec,debug f9a41d5e 380e6a55 30a77079 dd9b3136 5a9c5118 23cd2bf7 157285a5
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x30e5f84
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x14df5ab4
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug total SA len=48
12:57:35 ipsec,debug 00000001 00000001 00000028 00030401 00000000 0000001c 000c0000 80040001
12:57:35 ipsec,debug 80010001 80020e10 80050002 80060080
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=2(prop) len=40
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug proposal #0 len=40
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=3(trns) len=28
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug transform #0 len=28
12:57:35 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=Tunnel
12:57:35 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
12:57:35 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=3600
12:57:35 ipsec,debug life duration was in TLV.
12:57:35 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
12:57:35 ipsec,debug type=Key Length, flag=0x8000, lorv=128
12:57:35 ipsec,debug pair 0:
12:57:35 ipsec,debug 0x80cdaa8: next=(nil) tnext=(nil)
12:57:35 ipsec,debug proposal #0: 1 transform
12:57:35 ipsec,debug add payload of len 48, next type 10
12:57:35 ipsec,debug add payload of len 24, next type 5
12:57:35 ipsec,debug add payload of len 12, next type 5
12:57:35 ipsec,debug add payload of len 12, next type 0
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 73bf2329 b3baaea8 a7d15f02 cf874b30 60d274f3 0a000034 00000001 00000001
12:57:35 ipsec,debug 00000028 00030401 05ed2e7c 0000001c 000c0000 80040001 80010001 80020e10
12:57:35 ipsec,debug 80050002 80060080 0500001c d15a5404 abb0dc4c 0cddddcb 27d4bdf5 9046db39
12:57:35 ipsec,debug 95020df0 05000010 04000000 ac1f0000 ffffff00 00000010 04000000 c0a8a300
12:57:35 ipsec,debug ffffff00
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 06510b83 28f998f1 035d12b5 155ddd1a 900c3145
12:57:35 ipsec,debug add payload of len 20, next type 1
12:57:35 ipsec,debug begin encryption.
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug pad length = 8
12:57:35 ipsec,debug 01000018 06510b83 28f998f1 035d12b5 155ddd1a 900c3145 0a000034 00000001
12:57:35 ipsec,debug 00000001 00000028 00030401 05ed2e7c 0000001c 000c0000 80040001 80010001
12:57:35 ipsec,debug 80020e10 80050002 80060080 0500001c d15a5404 abb0dc4c 0cddddcb 27d4bdf5
12:57:35 ipsec,debug 9046db39 95020df0 05000010 04000000 ac1f0000 ffffff00 00000010 04000000
12:57:35 ipsec,debug c0a8a300 ffffff00 ac99d885 c7e1d307
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug encrypted payload by IV:
12:57:35 ipsec,debug 158edbca b04f2ccf 42689d5b 0fc85403
12:57:35 ipsec,debug save IV for next:
12:57:35 ipsec,debug 3a9954ef 961706ff 8416cf35 ae1dc565
12:57:35 ipsec,debug encrypted.
12:57:35 ipsec,debug 172 bytes from 62.24.71.26[500] to 88.79.252.164[500]
12:57:35 ipsec,debug 1 times of 172 bytes message will be sent to 88.79.252.164[500]
12:57:35 ipsec sent phase2 packet 62.24.71.26[500]<=>88.79.252.164[500] b24d3d59a41d03c9:b4b9751c9b603079:000073bf
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 4a91ecb4 474e4d21 e4834aac 745e3dd0
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug f7269c69 9752e105 a73ae47f 3019611b
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 4e2211db 0000003c 00000018
12:57:35 ipsec,debug 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 004e2211 db9c131e bcc1fb8f 2999974f 1f70eada b6e50349 c6139d78 3d3b54ed
12:57:35 ipsec,debug 13dfe8ef 519ea311 1586b6e8 0b
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 6d58cbc2 bb9fa693 c8a6f703 2dd52e43 dfe3317e
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030e734b cc9c131e bcc1fb8f 2999974f 1f70eada b6e50349 c6139d78 3d3b54ed
12:57:35 ipsec,debug 13dfe8ef 519ea311 1586b6e8 0b
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug f86c60e0 98095879 e8f1a8c5 f6c0552b 267b90e2 6cf2ac0d 9a374ea1 4331d5b1
12:57:35 ipsec,debug 439b58c7 93cdde9b f3400203 cd2f1066 76f4196d 9acf2c65 fecb500d
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03b1cf32 db9c131e bcc1fb8f 2999974f 1f70eada b6e50349 c6139d78 3d3b54ed
12:57:35 ipsec,debug 13dfe8ef 519ea311 1586b6e8 0b
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug d5e14cb3 271aeec3 fdfdc317 7860846e cb1e895f bfad9bb7 44cc5240 941b1dbc
12:57:35 ipsec,debug b612c3bf 7da1552d 3d3cb123 c165e183 9d3fc687 d64fe30c dca9ead9
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xe734bcc
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xb1cf32db
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 26151ba2 89535c69 1fc7940e 21efcc91
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 1c943449 cb3dc5b2 75ebef70 51a57a11
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 7d977968 0000003c 00000018
12:57:35 ipsec,debug 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 007d9779 68d103b0 b10ddd7b 19dc9095 5a858b98 09fbfdc8 330d9e92 142e4d91
12:57:35 ipsec,debug 6c0df53c efeee7af 9fd7b1e5 77
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 8be84ba5 847749d7 f2583354 f5cf5f09 43b9418a
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0306d4d8 eed103b0 b10ddd7b 19dc9095 5a858b98 09fbfdc8 330d9e92 142e4d91
12:57:35 ipsec,debug 6c0df53c efeee7af 9fd7b1e5 77
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug ff4c27e4 3ff21a82 c23c4c44 fdbfe263 124a2b90 c86912ce 42f82291 9f343df7
12:57:35 ipsec,debug 1ed4408b 911d541e 50115e98 e306c301 d07f0076 d1b1b75f 1b7ef4bd
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0377065c 88d103b0 b10ddd7b 19dc9095 5a858b98 09fbfdc8 330d9e92 142e4d91
12:57:35 ipsec,debug 6c0df53c efeee7af 9fd7b1e5 77
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug ad265d46 16c37b01 0af709cb 740631e4 919be04a fa99675b 7aa6c5b6 b72b076c
12:57:35 ipsec,debug 19924311 dc525940 363e047f fa3d294d 80d34ac5 2ed15372 93bf26dc
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x6d4d8ee
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x77065c88
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug c9c13265 65f479fe 76254b90 ce91f1f3
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 78581604 80e81e65 74f0fde3 f13ea672
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 2101e83d 0000003c 00000018
12:57:35 ipsec,debug d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 002101e8 3d5289ff f42f508a dda8dfdc 754aef8a 3ae34933 02aebaae 60499cb7
12:57:35 ipsec,debug 6fe5891f 7e3dfd21 d423108e e5
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug d701c104 a4868483 c69d60d9 50d2c782 12bcfbcc
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030afedf ef5289ff f42f508a dda8dfdc 754aef8a 3ae34933 02aebaae 60499cb7
12:57:35 ipsec,debug 6fe5891f 7e3dfd21 d423108e e5
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 02962e5e 387092ed aadef720 3bc0bbf3 84df6a88 99e1ce5b 0748d7bc 59a86001
12:57:35 ipsec,debug 033fa805 81cc0bd8 9ab919d8 701419e1 a9a8580e c62c343d 09652b9c
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03372170 ec5289ff f42f508a dda8dfdc 754aef8a 3ae34933 02aebaae 60499cb7
12:57:35 ipsec,debug 6fe5891f 7e3dfd21 d423108e e5
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug b39803d5 055badcd 85f5c761 dea8c6be 238209d3 2aa0b141 d6b8c20a d388c9da
12:57:35 ipsec,debug fab165ed 85e9e81d dac846db ed8b2ae6 73ac91c3 2d03f3e2 d5ef32c6
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xafedfef
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x372170ec
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 0c35ab96 f912737b 3e69a980 1be271d6
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 3589105c 02701d12 66837ca0 df2018b6
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 7261620d b0631052 d290f26f 3b594986 3580ceb6 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 e71475bc 0000003c 00000018
12:57:35 ipsec,debug 7261620d b0631052 d290f26f 3b594986 3580ceb6 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 7261620d b0631052 d290f26f 3b594986 3580ceb6
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00e71475 bca0a2df 23586dc4 228b0321 de8490a3 aeae86a0 a2863d91 0bfad18f
12:57:35 ipsec,debug c66e5136 6718ffdf 62caa155 76
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 7261620d b0631052 d290f26f 3b594986 3580ceb6
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030bfb15 d2a0a2df 23586dc4 228b0321 de8490a3 aeae86a0 a2863d91 0bfad18f
12:57:35 ipsec,debug c66e5136 6718ffdf 62caa155 76
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 22c6f8b2 3b41b975 74bbd912 95f831e1 50fa4d01 4a8c3ec3 3068eaed e7bde99d
12:57:35 ipsec,debug 521bf20c cd3bb73e 8a9c0b9f 3c5c0ded 8d24349f 4acbf1ff 4ec92a2c
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 039551b1 caa0a2df 23586dc4 228b0321 de8490a3 aeae86a0 a2863d91 0bfad18f
12:57:35 ipsec,debug c66e5136 6718ffdf 62caa155 76
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 91c08258 c4848da0 0705a857 c9f13506 b9a28308 69e51a90 18ef29cd 4e2525db
12:57:35 ipsec,debug 9b1cf592 6bd80cc1 bc86f576 a561d1a0 cab11b28 3faff4ee 40cb8c50
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xbfb15d2
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x9551b1ca
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug d2027db4 56855a37 c164e509 d9f580ad
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 3def5b64 2748b9f1 a7c38180 2b92c862
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 5f86beda 0000003c 00000018
12:57:35 ipsec,debug 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 005f86be da999e59 8c4f49b2 ca0a1e9a e7960f36 cbe527a0 0d3ce4d4 d3c629d4
12:57:35 ipsec,debug 69668450 6fddb8b7 1c47b2f2 e7
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 6201f354 3e4ea84c 25f1f6be 929ce635 d6a8edab
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030c7aee 4c999e59 8c4f49b2 ca0a1e9a e7960f36 cbe527a0 0d3ce4d4 d3c629d4
12:57:35 ipsec,debug 69668450 6fddb8b7 1c47b2f2 e7
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug ed8991e3 cca862d7 6eb79065 19e1c97e 51cebaf5 c9d1156d 198e2e60 59ddd8c1
12:57:35 ipsec,debug bf7cb64d b8197497 f81c8995 e7407562 bbe9da7a 0bb9d2a2 93d0bb13
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03d6c025 b1999e59 8c4f49b2 ca0a1e9a e7960f36 cbe527a0 0d3ce4d4 d3c629d4
12:57:35 ipsec,debug 69668450 6fddb8b7 1c47b2f2 e7
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug fa0e0737 92a6c578 a496d70a 08977232 2343b1b2 596a31ca 549989ee 69cdc56d
12:57:35 ipsec,debug 44d764bb cf31c062 cc193664 81ff205c 32608c8d d36b9fb7 d93f024f
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xc7aee4c
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xd6c025b1
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 45d936be 2c93d93b aa424c29 dbf45c67
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 4a1998d3 161d372e 58422bcd 5f596fc3
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 90e787b5 686dd09e b8899d59 08d97f99 c366b75b 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 9340aee7 0000003c 00000018
12:57:35 ipsec,debug 90e787b5 686dd09e b8899d59 08d97f99 c366b75b 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 90e787b5 686dd09e b8899d59 08d97f99 c366b75b
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 009340ae e78f204f c1e51ec9 cce0be6c 7d8b8aff 89e2095e eae5e5de e33bc952
12:57:35 ipsec,debug a6ea7bae 2e1b40bd 9d9fc014 55
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 90e787b5 686dd09e b8899d59 08d97f99 c366b75b
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0303a677 f28f204f c1e51ec9 cce0be6c 7d8b8aff 89e2095e eae5e5de e33bc952
12:57:35 ipsec,debug a6ea7bae 2e1b40bd 9d9fc014 55
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 313d3041 6ba91121 f57e57e4 cb625859 9177773f f612736e bfb43f6a c47776ea
12:57:35 ipsec,debug 8f17165c c0020fca 690cf5e0 610df850 2bd6867f 5c05d5ba e4c02341
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 033e363c ce8f204f c1e51ec9 cce0be6c 7d8b8aff 89e2095e eae5e5de e33bc952
12:57:35 ipsec,debug a6ea7bae 2e1b40bd 9d9fc014 55
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 20da29f2 76dd8e15 7dc97902 0af4ac10 a825c6d6 41afd97a 8f316ea7 7bca75c0
12:57:35 ipsec,debug 51d21ab3 bbdfac92 39824597 2258c427 03509094 59bb8582 74d6b024
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x3a677f2
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x3e363cce
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 49d681ca 5bf2f6b1 8f405789 74b5aff2
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug d9d93ae3 7ac39b7c d16f3f4e c86e2d77
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 94b41de5 4521e466 d910485e 254b3d20 a26e2cef 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 eae461cc 0000003c 00000018
12:57:35 ipsec,debug 94b41de5 4521e466 d910485e 254b3d20 a26e2cef 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 94b41de5 4521e466 d910485e 254b3d20 a26e2cef
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00eae461 cc2ada5d 4b1750cf c3b86982 e482524a faea8d72 e1ea1068 f43af381
12:57:35 ipsec,debug f9c69d76 7c16bf7b a87452f8 17
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 94b41de5 4521e466 d910485e 254b3d20 a26e2cef
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03012e95 2e2ada5d 4b1750cf c3b86982 e482524a faea8d72 e1ea1068 f43af381
12:57:35 ipsec,debug f9c69d76 7c16bf7b a87452f8 17
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 857e9f6e 2a9b1efb 4bf6f155 a46dd7a5 f737b624 973c49f7 c573fb29 49fb5577
12:57:35 ipsec,debug fce248d2 3da6faf7 3e3904d5 a6a367a8 967b07fd eb8c8546 cf3a6cc3
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 038a737d 6c2ada5d 4b1750cf c3b86982 e482524a faea8d72 e1ea1068 f43af381
12:57:35 ipsec,debug f9c69d76 7c16bf7b a87452f8 17
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug efea46b4 6dd9c5ce fb1b9b18 0d0aa753 0f0f5aed 52c3425c f7db32bd f95ed81c
12:57:35 ipsec,debug 07ce0e6e b731efa6 89ee1534 6e1a0ba6 4c754edc 47cf6e5d 505dd42f
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x12e952e
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x8a737d6c
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 5d904575 c1fbf5bb 9788c97b 92a20daf
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 817c0ca3 27ddee3e 1dbd4497 c71e5344
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 469960ba a3567adf 4db3eaac d77d8627 57c6a418 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 cc51649b 0000003c 00000018
12:57:35 ipsec,debug 469960ba a3567adf 4db3eaac d77d8627 57c6a418 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 469960ba a3567adf 4db3eaac d77d8627 57c6a418
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00cc5164 9be64a13 5ca0a9a2 834d4b82 412f230d 9590c1de 1b806863 ae9add66
12:57:35 ipsec,debug 522a0dfb 039a29d8 a3753614 9f
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 469960ba a3567adf 4db3eaac d77d8627 57c6a418
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030d1afd a3e64a13 5ca0a9a2 834d4b82 412f230d 9590c1de 1b806863 ae9add66
12:57:35 ipsec,debug 522a0dfb 039a29d8 a3753614 9f
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 05d3b8d5 8752fe83 b7af7deb 80c182dd 162404dc 9831a57c 43dea212 d7742f20
12:57:35 ipsec,debug 2f54910e 4c575f96 3bf1cfd2 e919a8c2 5676dcc2 34bd779e d708e141
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0358b39b bde64a13 5ca0a9a2 834d4b82 412f230d 9590c1de 1b806863 ae9add66
12:57:35 ipsec,debug 522a0dfb 039a29d8 a3753614 9f
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 882171d6 66b9121d 6062bb14 42aee725 dd557f8f 34483a8b 8ee64492 a1fd589a
12:57:35 ipsec,debug f6333200 d1e05d53 c2a2029e cd78716b 7c083d16 296c17f7 b6755072
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xd1afda3
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x58b39bbd
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug cf5fd0f1 409c5344 4e39397c f38ab1d3
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 1b98a1c0 d322ff8c 969e500e ec7f00e5
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 992b663e 0000003c 00000018
12:57:35 ipsec,debug 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00992b66 3efc3573 c15042ff c592ab82 a8095ea5 84d4873b 89de746c 1246c225
12:57:35 ipsec,debug 642545fa 22469e27 6545bba9 db
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 78580f3d a8a4b80c e277dd43 01c4703e da7ecde6
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030e7c70 38fc3573 c15042ff c592ab82 a8095ea5 84d4873b 89de746c 1246c225
12:57:35 ipsec,debug 642545fa 22469e27 6545bba9 db
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 82079f11 d16e3e7a 2b20b894 091d605d e62622ef ec049ac0 2f5ca998 749fe853
12:57:35 ipsec,debug 44d673eb d62d134d 48d56e64 f00b3ed0 e5641ce9 5c3808c5 8484f08a
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 039c3628 32fc3573 c15042ff c592ab82 a8095ea5 84d4873b 89de746c 1246c225
12:57:35 ipsec,debug 642545fa 22469e27 6545bba9 db
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug c17b7bbd 4174d8a6 6d15b451 e52651d5 a85897bd 42e99a49 4a9e80fa 4460bf4c
12:57:35 ipsec,debug a7f130e6 681561c2 60d1d6d2 2e9d1794 74e7e5c3 1d1543b8 cea61fb7
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0xe7c7038
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x9c362832
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug ec702215 e85aacdb 444caf3d 48e6e141
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 4a9a9ebd 121bc522 bc81a47b 78a63522
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 c6fb6612 0000003c 00000018
12:57:35 ipsec,debug ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00c6fb66 1279a17f 3ed79b95 46f6dab8 362813ad 06fa1791 42fbe648 1353f06f
12:57:35 ipsec,debug 0b7da85d 64f3615b 54accf13 63
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug ebd7540d 87bd7614 c4cfe70f 3b2bb2d2 c836c62a
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03068bd7 2079a17f 3ed79b95 46f6dab8 362813ad 06fa1791 42fbe648 1353f06f
12:57:35 ipsec,debug 0b7da85d 64f3615b 54accf13 63
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug a2afec36 2060419e 70364455 b5df9dd6 f1cd73ef f8ae1f6c d97aa5f9 c7eae597
12:57:35 ipsec,debug 778ee8e4 440e4661 8e36da77 297c9f37 55fea4e9 ae185984 539eebeb
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 037575e5 d379a17f 3ed79b95 46f6dab8 362813ad 06fa1791 42fbe648 1353f06f
12:57:35 ipsec,debug 0b7da85d 64f3615b 54accf13 63
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 9f6de2e2 d92d7966 93882574 09661330 98905749 23a94e7a 64f15c52 bd5cfd67
12:57:35 ipsec,debug 4cfbbcaf 6ab64536 314df92b 9473879c 6ff0dacb 641d4152 af4d2fd2
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x68bd720
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x7575e5d3
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 8bee10a7 db436f7f 2536760e ca4da262
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 6741a3c2 0faff444 9fb9e181 59ed667e
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 d41e5c8b 0000003c 00000018
12:57:35 ipsec,debug 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00d41e5c 8bd736cc a257e529 13d801e9 d6501c16 ab980f99 88dac8be 75424aed
12:57:35 ipsec,debug 325db94e dcfc50ed 56e96d39 2b
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 4528c3fb c61045f1 a144dc50 fbc48cd7 5e2a37d9
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03082827 cbd736cc a257e529 13d801e9 d6501c16 ab980f99 88dac8be 75424aed
12:57:35 ipsec,debug 325db94e dcfc50ed 56e96d39 2b
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 2249a3fb 755c28b3 77c374ab b63923d3 115a5762 59313732 983b3dba ca9d801a
12:57:35 ipsec,debug fe588370 e0c7a397 60014129 25a91b09 cc4c77cd bdb90d60 aea9d9a7
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 031625e0 a2d736cc a257e529 13d801e9 d6501c16 ab980f99 88dac8be 75424aed
12:57:35 ipsec,debug 325db94e dcfc50ed 56e96d39 2b
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 9e03fb6b 1e58e6d7 740c0368 c363f74e 7a701027 2e9ad347 825303a6 e95deca8
12:57:35 ipsec,debug b3cec9fa bb5943f3 6d9fa541 82859867 fe18a663 5d1296de 89e025d1
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x82827cb
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x1625e0a2
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 39cd492c 902a694c a18cff46 59fb1f8e
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 0e290f96 d0893c0f ffea127c 4e01fc4f
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 35e38bb4 0000003c 00000018
12:57:35 ipsec,debug 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 0035e38b b4af4b75 24ccf228 c44a3509 69aec59f 03a8c05b 1f917d3c 4290c2fc
12:57:35 ipsec,debug 3aa88508 14ebcd9d 41f7bf1d dc
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 1c9761a0 2e671dca 68a55839 c631eba1 c98bc486
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 030608b4 36af4b75 24ccf228 c44a3509 69aec59f 03a8c05b 1f917d3c 4290c2fc
12:57:35 ipsec,debug 3aa88508 14ebcd9d 41f7bf1d dc
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 3948919f 58c54782 c24a2609 ce9eef35 052bafa7 43f82a44 45ed11b5 bed5cfbd
12:57:35 ipsec,debug d417bd19 07d1934b 942ce8d2 038251b4 be7504f5 cf45efd8 054a760e
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03b5210f a7af4b75 24ccf228 c44a3509 69aec59f 03a8c05b 1f917d3c 4290c2fc
12:57:35 ipsec,debug 3aa88508 14ebcd9d 41f7bf1d dc
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug c1c8cb1c 54d66115 00518d63 c5748442 9aca3b06 c0fbe20f c15ba410 65da3a53
12:57:35 ipsec,debug 1eda8de5 305c478c e317a985 a5756f1b a77002d7 5e8ada39 1f75bea0
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x608b436
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xb5210fa7
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug cbce495d 84de6974 c3891f4b 40e8d215
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug b270b90f e20a1481 111aa824 ab96d047
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 e269a904 f173b2b7 faf1b861 ad1417fe 35347f93 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 177a918a 0000003c 00000018
12:57:35 ipsec,debug e269a904 f173b2b7 faf1b861 ad1417fe 35347f93 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug e269a904 f173b2b7 faf1b861 ad1417fe 35347f93
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 00177a91 8a91cebb 915c5a07 469e550c 107a6268 5fb4b788 6ff1b5d3 a537a4f3
12:57:35 ipsec,debug e74882a5 24f6fd29 86322a13 e3
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug e269a904 f173b2b7 faf1b861 ad1417fe 35347f93
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03052155 1791cebb 915c5a07 469e550c 107a6268 5fb4b788 6ff1b5d3 a537a4f3
12:57:35 ipsec,debug e74882a5 24f6fd29 86322a13 e3
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 13e7c428 78198b3f fd80f008 852c07de 154ca599 7d4a64e5 ca707396 50b46eeb
12:57:35 ipsec,debug c3707a50 a633e3a9 967856ad 8a7c8c49 4b6b8af3 6b59dc28 5d0e46f0
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 03a7e39a 0991cebb 915c5a07 469e550c 107a6268 5fb4b788 6ff1b5d3 a537a4f3
12:57:35 ipsec,debug e74882a5 24f6fd29 86322a13 e3
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 3ffa74d0 8dc8eda1 c99a95a9 f82a87dd b9dacdf4 e947dda3 9807851e 75ae5b1d
12:57:35 ipsec,debug aca48365 d2df2948 3cdd4a41 d9be2d44 290d17cf 8b8dfedc 3ef18361
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x5215517
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0xa7e39a09
12:57:35 ipsec,debug pfkey add sent.
12:57:35 ipsec,debug ===== received 60 bytes from 88.79.252.164[500] to 62.24.71.26[500]
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug IV was saved for next processing:
12:57:35 ipsec,debug 5fae5638 4a9dc2f8 bd5f9004 38b391d7
12:57:35 ipsec,debug encryption(aes)
12:57:35 ipsec,debug with key:
12:57:35 ipsec,debug 8485ebd3 f7deb184 b436ba1d 4365cf1b
12:57:35 ipsec,debug decrypted payload by IV:
12:57:35 ipsec,debug 3a9954ef 961706ff 8416cf35 ae1dc565
12:57:35 ipsec,debug decrypted payload, but not trimed.
12:57:35 ipsec,debug 00000018 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc 00000000 00000000
12:57:35 ipsec,debug padding len=1
12:57:35 ipsec,debug skip to trim padding.
12:57:35 ipsec,debug decrypted.
12:57:35 ipsec,debug b24d3d59 a41d03c9 b4b9751c 9b603079 08102001 73bf2329 0000003c 00000018
12:57:35 ipsec,debug 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc 00000000 00000000
12:57:35 ipsec,debug begin.
12:57:35 ipsec,debug seen nptype=8(hash) len=24
12:57:35 ipsec,debug succeed.
12:57:35 ipsec,debug HASH(3) validate:
12:57:35 ipsec,debug 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc
12:57:35 ipsec,debug HASH with:
12:57:35 ipsec,debug 0073bf23 29b3baae a8a7d15f 02cf874b 3060d274 f3d15a54 04abb0dc 4c0cdddd
12:57:35 ipsec,debug cb27d4bd f59046db 3995020d f0
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug HASH computed:
12:57:35 ipsec,debug 54e8a6ec 38d347ed ebb52e03 2fce81e3 ce5f47cc
12:57:35 ipsec,debug ===
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0305ed2e 7cb3baae a8a7d15f 02cf874b 3060d274 f3d15a54 04abb0dc 4c0cdddd
12:57:35 ipsec,debug cb27d4bd f59046db 3995020d f0
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug 93bdb343 14551e5d 73352f6f 871d23da c048dbc1 bcedd0b3 cd09a6e3 2e0f5e10
12:57:35 ipsec,debug be3d84a9 950794e8 ad6329b7 86e2f188 2e65dd95 e6d7289a d6d1e7cf
12:57:35 ipsec,debug KEYMAT compute with
12:57:35 ipsec,debug 0319302f acb3baae a8a7d15f 02cf874b 3060d274 f3d15a54 04abb0dc 4c0cdddd
12:57:35 ipsec,debug cb27d4bd f59046db 3995020d f0
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug encklen=128 authklen=160
12:57:35 ipsec,debug generating 480 bits of key (dupkeymat=3)
12:57:35 ipsec,debug generating K1...K3 for KEYMAT.
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug hmac(hmac_sha1)
12:57:35 ipsec,debug d03c2fba bb196db2 479dec34 1f75ebad 122fa792 5e098175 2606a28d 471c0116
12:57:35 ipsec,debug 7f431331 aa1e6af8 c01aaea7 8eba01f1 36962b5c 9cd25e29 0448f21f
12:57:35 ipsec,debug KEYMAT computed.
12:57:35 ipsec,debug call pk_sendupdate
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_update_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 88.79.252.164[500]->62.24.71.26[500] spi=0x5ed2e7c
12:57:35 ipsec,debug pfkey update sent.
12:57:35 ipsec,debug encryption(aes-cbc)
12:57:35 ipsec,debug hmac(sha1)
12:57:35 ipsec,debug call pfkey_send_add_nat
12:57:35 ipsec IPsec-SA established: ESP/Tunnel 62.24.71.26[500]->88.79.252.164[500] spi=0x19302fac
12:57:35 ipsec,debug pfkey add sent.