Good Afternoon!
We have set up a VPN on our CCR 1009 (v6.34.4) and we have been seing some strange problem: when trying to connect via 3G using thetering it does not connect no matter what. It logs an error saying that the key lenght mismatched, mine: 128, peer: 256. The thing is the Windows client is configured to use both 256 and 128 keys. The client and the Mikrotik should negotiate the best option and connect.
When we connect from another ISP or using an pen 3G modem, everything works fine. It seems (I know it’s crazy) that the ISP is somehow interfering in this connection. We are trying to use it because the ISP blocks PPTP connections.
When I let just one option of key in both devices, it only logs the “received the first UDP packet from A.B.C.D”. I’m posting the IPSec and L2TP configuration. Hope someone finds any hint.
Thanks in advance!
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,aes-128-cbc,3des pfs-group=modp2048
/ip ipsec peer
add dh-group=modp2048,modp1024 enc-algorithm=aes-256,aes-128,3des exchange-mode=main-l2tp generate-policy=port-strict lifetime=8h secret=XXXXX
/ip ipsec policy
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
/interface l2tp-server server
set default-profile=vpn-encryption enabled=yes ipsec-secret=XXXXX use-ipsec=yes
/ppp profile
set *0 change-tcp-mss=no
add change-tcp-mss=no dns-server=10.25.0.139,10.25.0.140 local-address=172.50.0.1 name=vpn-encryption remote-address=pool-vpn
set *FFFFFFFE change-tcp-mss=no
Nov 27 10:39:05 ipsec,debug,packet 408 bytes message received from 177.79.67.122[29596] to Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet ==========
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f 00000000 00000000 01100200 00000000 00000198 0d0000d4
Nov 27 10:39:05 ipsec,debug,packet 00000001 00000001 000000c8 01010005 03000028 01010000 80010007 800e0100
Nov 27 10:39:05 ipsec,debug,packet 80020002 80040014 80030001 800b0001 000c0004 00007080 03000028 02010000
Nov 27 10:39:05 ipsec,debug,packet 80010007 800e0080 80020002 80040013 80030001 800b0001 000c0004 00007080
Nov 27 10:39:05 ipsec,debug,packet 03000028 03010000 80010007 800e0100 80020002 8004000e 80030001 800b0001
Nov 27 10:39:05 ipsec,debug,packet 000c0004 00007080 03000024 04010000 80010005 80020002 8004000e 80030001
Nov 27 10:39:05 ipsec,debug,packet 800b0001 000c0004 00007080 00000024 05010000 80010005 80020002 80040002
Nov 27 10:39:05 ipsec,debug,packet 80030001 800b0001 000c0004 00007080 0d000018 01528bbb c0069612 1849ab9a
Nov 27 10:39:05 ipsec,debug,packet 1c5b2a51 00000001 0d000018 1e2b5169 05991c7d 7c96fcbf b587e461 00000009
Nov 27 10:39:05 ipsec,debug,packet 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 90cb8091 3ebb696e
Nov 27 10:39:05 ipsec,debug,packet 086381b5 ec427b1f 0d000014 4048b7d5 6ebce885 25e7de7f 00d6c2d3 0d000014
Nov 27 10:39:05 ipsec,debug,packet fb1de3cd f341b7ea 16b7e5be 0855f120 0d000014 26244d38 eddb61b3 172a36e3
Nov 27 10:39:05 ipsec,debug,packet d0cfb819 00000014 e3a5966a 76379fe7 07228231 e5ce8652
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec respond new phase 1 negotiation: Y.Y.Y.Y[500]<=>177.79.67.122[29596]
Nov 27 10:39:05 ipsec begin Identity Protection mode.
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=1(sa)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=13(vid)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet received unknown Vendor ID
Nov 27 10:39:05 ipsec,debug,packet 01528bbb c0069612 1849ab9a 1c5b2a51 00000001
Nov 27 10:39:05 ipsec,debug received broken Microsoft ID: MS NT5 ISAKMPOAKLEY
Nov 27 10:39:05 ipsec,debug received Vendor ID: RFC 3947
Nov 27 10:39:05 ipsec,debug received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
Nov 27 10:39:05 ipsec,debug
Nov 27 10:39:05 ipsec,debug received Vendor ID: FRAGMENTATION
Nov 27 10:39:05 ipsec,debug,packet received unknown Vendor ID
Nov 27 10:39:05 ipsec,debug,packet fb1de3cd f341b7ea 16b7e5be 0855f120
Nov 27 10:39:05 ipsec,debug,packet received unknown Vendor ID
Nov 27 10:39:05 ipsec,debug,packet 26244d38 eddb61b3 172a36e3 d0cfb819
Nov 27 10:39:05 ipsec,debug,packet received unknown Vendor ID
Nov 27 10:39:05 ipsec,debug,packet e3a5966a 76379fe7 07228231 e5ce8652
Nov 27 10:39:05 ipsec,debug Selected NAT-T version: RFC 3947
Nov 27 10:39:05 ipsec,debug,packet total SA len=208
Nov 27 10:39:05 ipsec,debug,packet 00000001 00000001 000000c8 01010005 03000028 01010000 80010007 800e0100
Nov 27 10:39:05 ipsec,debug,packet 80020002 80040014 80030001 800b0001 000c0004 00007080 03000028 02010000
Nov 27 10:39:05 ipsec,debug,packet 80010007 800e0080 80020002 80040013 80030001 800b0001 000c0004 00007080
Nov 27 10:39:05 ipsec,debug,packet 03000028 03010000 80010007 800e0100 80020002 8004000e 80030001 800b0001
Nov 27 10:39:05 ipsec,debug,packet 000c0004 00007080 03000024 04010000 80010005 80020002 8004000e 80030001
Nov 27 10:39:05 ipsec,debug,packet 800b0001 000c0004 00007080 00000024 05010000 80010005 80020002 80040002
Nov 27 10:39:05 ipsec,debug,packet 80030001 800b0001 000c0004 00007080
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=2(prop)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet proposal #1 len=200
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet transform #1 len=40
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=20
Nov 27 10:39:05 ipsec,debug invalid DH group 20.
Nov 27 10:39:05 ipsec,debug,packet transform #2 len=40
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=128
Nov 27 10:39:05 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=19
Nov 27 10:39:05 ipsec,debug invalid DH group 19.
Nov 27 10:39:05 ipsec,debug,packet transform #3 len=40
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=2048-bit MODP group
Nov 27 10:39:05 ipsec,debug,packet dh(modp2048)
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
Nov 27 10:39:05 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet transform #4 len=36
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
Nov 27 10:39:05 ipsec,debug,packet encryption(3des)
Nov 27 10:39:05 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=2048-bit MODP group
Nov 27 10:39:05 ipsec,debug,packet dh(modp2048)
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
Nov 27 10:39:05 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet transform #5 len=36
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
Nov 27 10:39:05 ipsec,debug,packet encryption(3des)
Nov 27 10:39:05 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=1024-bit MODP group
Nov 27 10:39:05 ipsec,debug,packet dh(modp1024)
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
Nov 27 10:39:05 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet pair 1:
Nov 27 10:39:05 ipsec,debug,packet 0xc7748: next=(nil) tnext=0xc9fb0
Nov 27 10:39:05 ipsec,debug,packet 0xc9fb0: next=(nil) tnext=0xc82d0
Nov 27 10:39:05 ipsec,debug,packet 0xc82d0: next=(nil) tnext=(nil)
Nov 27 10:39:05 ipsec,debug,packet proposal #1: 3 transform
Nov 27 10:39:05 ipsec,debug,packet prop#=1, prot-id=ISAKMP, spi-size=0, #trns=5
Nov 27 10:39:05 ipsec,debug,packet trns#=3, trns-id=IKE
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Hash Algorithm, flag=0x8000, lorv=SHA
Nov 27 10:39:05 ipsec,debug,packet type=Group Description, flag=0x8000, lorv=2048-bit MODP group
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Method, flag=0x8000, lorv=pre-shared key
Nov 27 10:39:05 ipsec,debug,packet type=Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet Compared: Local:Peer
Nov 27 10:39:05 ipsec,debug,packet (lifetime = 28800:28800)
Nov 27 10:39:05 ipsec,debug,packet (lifebyte = 0:0)
Nov 27 10:39:05 ipsec,debug,packet enctype = AES-CBC:AES-CBC
Nov 27 10:39:05 ipsec,debug,packet (encklen = 256:256)
Nov 27 10:39:05 ipsec,debug,packet hashtype = SHA:SHA
Nov 27 10:39:05 ipsec,debug,packet authmethod = pre-shared key:pre-shared key
Nov 27 10:39:05 ipsec,debug,packet dh_group = 2048-bit MODP group:2048-bit MODP group
Nov 27 10:39:05 ipsec,debug,packet an acceptable proposal found.
Nov 27 10:39:05 ipsec,debug,packet dh(modp2048)
Nov 27 10:39:05 ipsec,debug,packet agreed on pre-shared key auth.
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug,packet new cookie:
Nov 27 10:39:05 ipsec,debug,packet e543a422b87360a3
Nov 27 10:39:05 ipsec,debug,packet add payload of len 56, next type 13
Nov 27 10:39:05 ipsec,debug,packet add payload of len 16, next type 13
Nov 27 10:39:05 ipsec,debug,packet add payload of len 16, next type 0
Nov 27 10:39:05 ipsec,debug,packet 128 bytes from Y.Y.Y.Y[500] to 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet sockname Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet send packet from Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet send packet to 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet src4 Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet dst4 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet 1 times of 128 bytes message will be sent to 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 01100200 00000000 00000080 0d00003c
Nov 27 10:39:05 ipsec,debug,packet 00000001 00000001 00000030 01010001 00000028 03010000 80010007 800e0100
Nov 27 10:39:05 ipsec,debug,packet 80020002 8004000e 80030001 800b0001 000c0004 00007080 0d000014 4a131c81
Nov 27 10:39:05 ipsec,debug,packet 07035845 5c5728f2 0e95452f 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov 27 10:39:05 ipsec,debug sent phase1 packet Y.Y.Y.Y[500]<=>177.79.67.122[29596] 3fba1756dd49d11f:e543a422b87360a3
Nov 27 10:39:05 ipsec,debug,packet ==========
Nov 27 10:39:05 ipsec,debug,packet 388 bytes message received from 177.79.67.122[29596] to Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 04100200 00000000 00000184 0a000104
Nov 27 10:39:05 ipsec,debug,packet 5986951c f68859bd c3ca588a 7f844887 bd5d2401 0acf13a1 7ff2495d 047e2cd1
Nov 27 10:39:05 ipsec,debug,packet 433d9863 bc3ff4e2 2573ee83 9732873f 54343a07 ed58bf84 3c89f283 bda7e96b
Nov 27 10:39:05 ipsec,debug,packet bf764c4d f845689e 845d91ec 881b7567 071fcdb5 4e97aa09 d33f4fdf 759b1d43
Nov 27 10:39:05 ipsec,debug,packet 5ea75cdf fa6fd404 cf106640 3a2ed147 02d0a521 74d492cd 895e9b8b 24944218
Nov 27 10:39:05 ipsec,debug,packet 89c4f797 ece40911 1464d52a 65193cb8 02944513 3f92dd18 771c239e d3d0dc44
Nov 27 10:39:05 ipsec,debug,packet 48398366 cacd528c 7cccdfe5 9271864a eb9cd32f 98cfaa07 d34bfc07 ec18cd5b
Nov 27 10:39:05 ipsec,debug,packet f26d5f74 e9f5ffd1 74ac35e1 a52e746b bcdcb6b6 f085949e e375c350 349c908b
Nov 27 10:39:05 ipsec,debug,packet 09d93679 e5539ce7 b0c98a19 14f201dd 312acf2c b8a12c17 fd88d51f 31a20f94
Nov 27 10:39:05 ipsec,debug,packet 14000034 71dde1fd 533872e6 a936b3ca 4f12e384 f9dd71da 86a3e1b1 e61b01be
Nov 27 10:39:05 ipsec,debug,packet f3eaa5ac 7b8709a1 43e0f362 2e3e527e 517207e4 14000018 c8bda54a 88c4aa90
Nov 27 10:39:05 ipsec,debug,packet 3242adce ba597eab 4463458b 00000018 dc895b53 9dbffc18 5cb7cfa0 19eff078
Nov 27 10:39:05 ipsec,debug,packet 1aed2b40
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=4(ke)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=10(nonce)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=20(nat-d)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=20(nat-d)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug Hashing Y.Y.Y.Y[500] with algo #2
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug NAT-D payload #0 verified
Nov 27 10:39:05 ipsec,debug Hashing 177.79.67.122[29596] with algo #2
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug NAT-D payload #1 doesn't match
Nov 27 10:39:05 ipsec,debug NAT detected: PEER
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug,packet dh(modp2048)
Nov 27 10:39:05 ipsec,debug,packet compute DH's private.
Nov 27 10:39:05 ipsec,debug,packet 51651d0a be692c41 2b5b967a cc7ceca3 ddb8defd b3c90f7d 1a864d02 a1c13ab9
Nov 27 10:39:05 ipsec,debug,packet 6bf6e4f6 2f373b22 1cd9cd58 1396cb24 b90185e4 1584b79a 8bb0303f 8d36c038
Nov 27 10:39:05 ipsec,debug,packet c7b53f30 52ce3c11 57a729ae a3c8774f 990e461e eae9e56a 961a37fb 43c6d845
Nov 27 10:39:05 ipsec,debug,packet 4897e50c c7dba71a fcd23251 4dc66b76 504fe20a 0b7198f5 7d959ac3 f36677cc
Nov 27 10:39:05 ipsec,debug,packet dbfe5786 b3872484 1e96b9b6 50a7b3ae f5323163 c43f74ed 2de85973 e5574403
Nov 27 10:39:05 ipsec,debug,packet 0da1fe77 518173e0 904f79f6 f2092f74 64a4049d 54bde9ad f8946e7b a5623a57
Nov 27 10:39:05 ipsec,debug,packet be6526a7 62d765cd 8d9766a3 ec6a13f4 747a39e5 d679b56e f8f17e92 019fee67
Nov 27 10:39:05 ipsec,debug,packet 219611a0 d59fb4e1 b21772b2 02f16ed9 8360506b 4fd7c96e 9e084381 354c624e
Nov 27 10:39:05 ipsec,debug,packet compute DH's public.
Nov 27 10:39:05 ipsec,debug,packet abed8a8e 4b43a6a5 4443ccce 757a16f3 5bc9d7d0 9f715b76 e0fffce3 956ce07e
Nov 27 10:39:05 ipsec,debug,packet 0b418360 3a7ec3ac dd857c23 499f2182 bed413e2 3fb05a2e 9c1b9180 055c1014
Nov 27 10:39:05 ipsec,debug,packet ec99ad0e 6820c00c ddb62cd9 1947215a 88579431 fe0bff3e ae4322fd 1843d77c
Nov 27 10:39:05 ipsec,debug,packet c6d7ea6e bd1cd2ac 613b7684 8f695a4f b2790324 a2566f8c 0bb4ef6a 7bea7b4f
Nov 27 10:39:05 ipsec,debug,packet b1b9c652 16e4dfab 8319a73a ff756100 01e52d1b f6d160ea 05dbbada 7d1b7212
Nov 27 10:39:05 ipsec,debug,packet 109c3090 56e700a9 e33b8b7d 1a88cb06 7db97027 ccc46160 34a936aa bc77c1ed
Nov 27 10:39:05 ipsec,debug,packet 00867db9 d1d2848c bd40f15b 208ecc5f 7527f754 8de15fdd f456f959 036fd418
Nov 27 10:39:05 ipsec,debug,packet 11184c59 c0539604 c29afba7 269cbcaa 9f67ef72 9019aad3 8e690fc0 622f4b90
Nov 27 10:39:05 ipsec,debug Hashing 177.79.67.122[29596] with algo #2
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug Hashing Y.Y.Y.Y[500] with algo #2
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug Adding remote and local NAT-D payloads.
Nov 27 10:39:05 ipsec,debug,packet add payload of len 256, next type 10
Nov 27 10:39:05 ipsec,debug,packet add payload of len 24, next type 20
Nov 27 10:39:05 ipsec,debug,packet add payload of len 20, next type 20
Nov 27 10:39:05 ipsec,debug,packet add payload of len 20, next type 0
Nov 27 10:39:05 ipsec,debug,packet 364 bytes from Y.Y.Y.Y[500] to 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet sockname Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet send packet from Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet send packet to 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet src4 Y.Y.Y.Y[500]
Nov 27 10:39:05 ipsec,debug,packet dst4 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet 1 times of 364 bytes message will be sent to 177.79.67.122[29596]
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 04100200 00000000 0000016c 0a000104
Nov 27 10:39:05 ipsec,debug,packet abed8a8e 4b43a6a5 4443ccce 757a16f3 5bc9d7d0 9f715b76 e0fffce3 956ce07e
Nov 27 10:39:05 ipsec,debug,packet 0b418360 3a7ec3ac dd857c23 499f2182 bed413e2 3fb05a2e 9c1b9180 055c1014
Nov 27 10:39:05 ipsec,debug,packet ec99ad0e 6820c00c ddb62cd9 1947215a 88579431 fe0bff3e ae4322fd 1843d77c
Nov 27 10:39:05 ipsec,debug,packet c6d7ea6e bd1cd2ac 613b7684 8f695a4f b2790324 a2566f8c 0bb4ef6a 7bea7b4f
Nov 27 10:39:05 ipsec,debug,packet b1b9c652 16e4dfab 8319a73a ff756100 01e52d1b f6d160ea 05dbbada 7d1b7212
Nov 27 10:39:05 ipsec,debug,packet 109c3090 56e700a9 e33b8b7d 1a88cb06 7db97027 ccc46160 34a936aa bc77c1ed
Nov 27 10:39:05 ipsec,debug,packet 00867db9 d1d2848c bd40f15b 208ecc5f 7527f754 8de15fdd f456f959 036fd418
Nov 27 10:39:05 ipsec,debug,packet 11184c59 c0539604 c29afba7 269cbcaa 9f67ef72 9019aad3 8e690fc0 622f4b90
Nov 27 10:39:05 ipsec,debug,packet 1400001c d8c9efcf df272de8 ec52f4bb 1b48ce12 a6303002 93d0d56f 14000018
Nov 27 10:39:05 ipsec,debug,packet 5325e92b 90c56925 b1580a1b 74a963e0 4f7e50a4 00000018 c8bda54a 88c4aa90
Nov 27 10:39:05 ipsec,debug,packet 3242adce ba597eab 4463458b
Nov 27 10:39:05 ipsec,debug sent phase1 packet Y.Y.Y.Y[500]<=>177.79.67.122[29596] 3fba1756dd49d11f:e543a422b87360a3
Nov 27 10:39:05 ipsec,debug,packet dh(modp2048)
Nov 27 10:39:05 ipsec,debug,packet compute DH's shared.
Nov 27 10:39:05 ipsec,debug,packet
Nov 27 10:39:05 ipsec,debug,packet 2359b3bb 7a58d7fc 0e74847b 192ca40f 262252c7 39b62318 a5ab53ab 6adf0d3e
Nov 27 10:39:05 ipsec,debug,packet b74208bd b8f904d1 0dbc7300 1a5f40fb cbb69c1b d18f73df 2dfb39c3 d89e8939
Nov 27 10:39:05 ipsec,debug,packet d80cbb16 ff0d2feb 3e239016 2243656a 9cb7a4de 07de151a df58ebcf ca41bce5
Nov 27 10:39:05 ipsec,debug,packet 96bc9a59 1ec131f1 714d07b9 46a5e5e1 ff56a865 9060e304 ab10eae8 6113b86c
Nov 27 10:39:05 ipsec,debug,packet 7826fadb 3146c6b4 766a7cc6 5be6f73b 8d7cfe6a df6de247 32d59bf6 5aecd500
Nov 27 10:39:05 ipsec,debug,packet 9bb0ba90 b6ac41f1 c841c8be 5069a66a c44fb240 2d21737d 1a0ed6b1 5627f792
Nov 27 10:39:05 ipsec,debug,packet 1d729360 c5007aa8 32ff60fd 871118f9 6697bfb5 9ba55904 9a193570 7f603ede
Nov 27 10:39:05 ipsec,debug,packet 1b2347f9 2626ee4e 7c6d9a87 337b47e3 ed05b6be f8822133 188897ab 6df4a309
Nov 27 10:39:05 ipsec,debug,packet the psk found.
Nov 27 10:39:05 ipsec,debug,packet nonce 1:
Nov 27 10:39:05 ipsec,debug,packet 71dde1fd 533872e6 a936b3ca 4f12e384 f9dd71da 86a3e1b1 e61b01be f3eaa5ac
Nov 27 10:39:05 ipsec,debug,packet 7b8709a1 43e0f362 2e3e527e 517207e4
Nov 27 10:39:05 ipsec,debug,packet nonce 2:
Nov 27 10:39:05 ipsec,debug,packet d8c9efcf df272de8 ec52f4bb 1b48ce12 a6303002 93d0d56f
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet SKEYID computed:
Nov 27 10:39:05 ipsec,debug,packet e3d3a31d b1ea3d9d fdacfc6a e6ca230e 5c08ce9d
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet SKEYID_d computed:
Nov 27 10:39:05 ipsec,debug,packet c347babf 4aa683c7 222c7064 aa20ba58 83bdfecc
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet SKEYID_a computed:
Nov 27 10:39:05 ipsec,debug,packet fd47d1a5 39ed3d6f 7a1df07b 836c0f4b 81f62353
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet SKEYID_e computed:
Nov 27 10:39:05 ipsec,debug,packet 2b362263 ae6a0504 8a4876a1 cd84a417 340f2b83
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...)
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet compute intermediate encryption key K1
Nov 27 10:39:05 ipsec,debug,packet 00
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet compute intermediate encryption key K2
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f
Nov 27 10:39:05 ipsec,debug,packet 9182ab2c 09801fa0 1cd7ef52 9539e58c d890448a
Nov 27 10:39:05 ipsec,debug,packet final encryption key computed:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet IV computed:
Nov 27 10:39:05 ipsec,debug,packet 642eee74 0b164b50 91ef5385 4b1dc52d
Nov 27 10:39:05 ipsec,debug,packet ==========
Nov 27 10:39:05 ipsec,debug,packet 76 bytes message received from X.X.X.X[43324] to Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 05100201 00000000 0000004c bdb091d7
Nov 27 10:39:05 ipsec,debug,packet 20bda316 f998a347 275152ec af10e1ac d2162a4a 8267403e 40fb1357 1d779463
Nov 27 10:39:05 ipsec,debug,packet d255797c dd21ec15 3c5fd757
Nov 27 10:39:05 ipsec,debug NAT-T: ports changed to: X.X.X.X[43324]<=>Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug KA list add: Y.Y.Y.Y[4500]->X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet IV was saved for next processing:
Nov 27 10:39:05 ipsec,debug,packet 1d779463 d255797c dd21ec15 3c5fd757
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet with key:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet decrypted payload by IV:
Nov 27 10:39:05 ipsec,debug,packet 642eee74 0b164b50 91ef5385 4b1dc52d
Nov 27 10:39:05 ipsec,debug,packet decrypted payload, but not trimed.
Nov 27 10:39:05 ipsec,debug,packet 0800000c 01000000 c0a82b2e 00000018 cc9672af ea75723c 0c790daa e61ed120
Nov 27 10:39:05 ipsec,debug,packet 0113dca6 00000000 00000000 00000000
Nov 27 10:39:05 ipsec,debug,packet padding len=1
Nov 27 10:39:05 ipsec,debug,packet skip to trim padding.
Nov 27 10:39:05 ipsec,debug,packet decrypted.
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 05100201 00000000 0000004c 0800000c
Nov 27 10:39:05 ipsec,debug,packet 01000000 c0a82b2e 00000018 cc9672af ea75723c 0c790daa e61ed120 0113dca6
Nov 27 10:39:05 ipsec,debug,packet 00000000 00000000 00000000
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=5(id)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=8(hash)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet HASH received:
Nov 27 10:39:05 ipsec,debug,packet cc9672af ea75723c 0c790daa e61ed120 0113dca6
Nov 27 10:39:05 ipsec,debug,packet HASH with:
Nov 27 10:39:05 ipsec,debug,packet 5986951c f68859bd c3ca588a 7f844887 bd5d2401 0acf13a1 7ff2495d 047e2cd1
Nov 27 10:39:05 ipsec,debug,packet 433d9863 bc3ff4e2 2573ee83 9732873f 54343a07 ed58bf84 3c89f283 bda7e96b
Nov 27 10:39:05 ipsec,debug,packet bf764c4d f845689e 845d91ec 881b7567 071fcdb5 4e97aa09 d33f4fdf 759b1d43
Nov 27 10:39:05 ipsec,debug,packet 5ea75cdf fa6fd404 cf106640 3a2ed147 02d0a521 74d492cd 895e9b8b 24944218
Nov 27 10:39:05 ipsec,debug,packet 89c4f797 ece40911 1464d52a 65193cb8 02944513 3f92dd18 771c239e d3d0dc44
Nov 27 10:39:05 ipsec,debug,packet 48398366 cacd528c 7cccdfe5 9271864a eb9cd32f 98cfaa07 d34bfc07 ec18cd5b
Nov 27 10:39:05 ipsec,debug,packet f26d5f74 e9f5ffd1 74ac35e1 a52e746b bcdcb6b6 f085949e e375c350 349c908b
Nov 27 10:39:05 ipsec,debug,packet 09d93679 e5539ce7 b0c98a19 14f201dd 312acf2c b8a12c17 fd88d51f 31a20f94
Nov 27 10:39:05 ipsec,debug,packet abed8a8e 4b43a6a5 4443ccce 757a16f3 5bc9d7d0 9f715b76 e0fffce3 956ce07e
Nov 27 10:39:05 ipsec,debug,packet 0b418360 3a7ec3ac dd857c23 499f2182 bed413e2 3fb05a2e 9c1b9180 055c1014
Nov 27 10:39:05 ipsec,debug,packet ec99ad0e 6820c00c ddb62cd9 1947215a 88579431 fe0bff3e ae4322fd 1843d77c
Nov 27 10:39:05 ipsec,debug,packet c6d7ea6e bd1cd2ac 613b7684 8f695a4f b2790324 a2566f8c 0bb4ef6a 7bea7b4f
Nov 27 10:39:05 ipsec,debug,packet b1b9c652 16e4dfab 8319a73a ff756100 01e52d1b f6d160ea 05dbbada 7d1b7212
Nov 27 10:39:05 ipsec,debug,packet 109c3090 56e700a9 e33b8b7d 1a88cb06 7db97027 ccc46160 34a936aa bc77c1ed
Nov 27 10:39:05 ipsec,debug,packet 00867db9 d1d2848c bd40f15b 208ecc5f 7527f754 8de15fdd f456f959 036fd418
Nov 27 10:39:05 ipsec,debug,packet 11184c59 c0539604 c29afba7 269cbcaa 9f67ef72 9019aad3 8e690fc0 622f4b90
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 00000001 00000001 000000c8 01010005
Nov 27 10:39:05 ipsec,debug,packet 03000028 01010000 80010007 800e0100 80020002 80040014 80030001 800b0001
Nov 27 10:39:05 ipsec,debug,packet 000c0004 00007080 03000028 02010000 80010007 800e0080 80020002 80040013
Nov 27 10:39:05 ipsec,debug,packet 80030001 800b0001 000c0004 00007080 03000028 03010000 80010007 800e0100
Nov 27 10:39:05 ipsec,debug,packet 80020002 8004000e 80030001 800b0001 000c0004 00007080 03000024 04010000
Nov 27 10:39:05 ipsec,debug,packet 80010005 80020002 8004000e 80030001 800b0001 000c0004 00007080 00000024
Nov 27 10:39:05 ipsec,debug,packet 05010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00007080
Nov 27 10:39:05 ipsec,debug,packet 01000000 c0a82b2e
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet HASH computed:
Nov 27 10:39:05 ipsec,debug,packet cc9672af ea75723c 0c790daa e61ed120 0113dca6
Nov 27 10:39:05 ipsec,debug,packet HASH for PSK validated.
Nov 27 10:39:05 ipsec,debug,packet peer's ID
Nov 27 10:39:05 ipsec,debug,packet 01000000 c0a82b2e
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug,packet use ID type of IPv4_address
Nov 27 10:39:05 ipsec,debug,packet generate HASH_R
Nov 27 10:39:05 ipsec,debug,packet HASH with:
Nov 27 10:39:05 ipsec,debug,packet abed8a8e 4b43a6a5 4443ccce 757a16f3 5bc9d7d0 9f715b76 e0fffce3 956ce07e
Nov 27 10:39:05 ipsec,debug,packet 0b418360 3a7ec3ac dd857c23 499f2182 bed413e2 3fb05a2e 9c1b9180 055c1014
Nov 27 10:39:05 ipsec,debug,packet ec99ad0e 6820c00c ddb62cd9 1947215a 88579431 fe0bff3e ae4322fd 1843d77c
Nov 27 10:39:05 ipsec,debug,packet c6d7ea6e bd1cd2ac 613b7684 8f695a4f b2790324 a2566f8c 0bb4ef6a 7bea7b4f
Nov 27 10:39:05 ipsec,debug,packet b1b9c652 16e4dfab 8319a73a ff756100 01e52d1b f6d160ea 05dbbada 7d1b7212
Nov 27 10:39:05 ipsec,debug,packet 109c3090 56e700a9 e33b8b7d 1a88cb06 7db97027 ccc46160 34a936aa bc77c1ed
Nov 27 10:39:05 ipsec,debug,packet 00867db9 d1d2848c bd40f15b 208ecc5f 7527f754 8de15fdd f456f959 036fd418
Nov 27 10:39:05 ipsec,debug,packet 11184c59 c0539604 c29afba7 269cbcaa 9f67ef72 9019aad3 8e690fc0 622f4b90
Nov 27 10:39:05 ipsec,debug,packet 5986951c f68859bd c3ca588a 7f844887 bd5d2401 0acf13a1 7ff2495d 047e2cd1
Nov 27 10:39:05 ipsec,debug,packet 433d9863 bc3ff4e2 2573ee83 9732873f 54343a07 ed58bf84 3c89f283 bda7e96b
Nov 27 10:39:05 ipsec,debug,packet bf764c4d f845689e 845d91ec 881b7567 071fcdb5 4e97aa09 d33f4fdf 759b1d43
Nov 27 10:39:05 ipsec,debug,packet 5ea75cdf fa6fd404 cf106640 3a2ed147 02d0a521 74d492cd 895e9b8b 24944218
Nov 27 10:39:05 ipsec,debug,packet 89c4f797 ece40911 1464d52a 65193cb8 02944513 3f92dd18 771c239e d3d0dc44
Nov 27 10:39:05 ipsec,debug,packet 48398366 cacd528c 7cccdfe5 9271864a eb9cd32f 98cfaa07 d34bfc07 ec18cd5b
Nov 27 10:39:05 ipsec,debug,packet f26d5f74 e9f5ffd1 74ac35e1 a52e746b bcdcb6b6 f085949e e375c350 349c908b
Nov 27 10:39:05 ipsec,debug,packet 09d93679 e5539ce7 b0c98a19 14f201dd 312acf2c b8a12c17 fd88d51f 31a20f94
Nov 27 10:39:05 ipsec,debug,packet e543a422 b87360a3 3fba1756 dd49d11f 00000001 00000001 000000c8 01010005
Nov 27 10:39:05 ipsec,debug,packet 03000028 01010000 80010007 800e0100 80020002 80040014 80030001 800b0001
Nov 27 10:39:05 ipsec,debug,packet 000c0004 00007080 03000028 02010000 80010007 800e0080 80020002 80040013
Nov 27 10:39:05 ipsec,debug,packet 80030001 800b0001 000c0004 00007080 03000028 03010000 80010007 800e0100
Nov 27 10:39:05 ipsec,debug,packet 80020002 8004000e 80030001 800b0001 000c0004 00007080 03000024 04010000
Nov 27 10:39:05 ipsec,debug,packet 80010005 80020002 8004000e 80030001 800b0001 000c0004 00007080 00000024
Nov 27 10:39:05 ipsec,debug,packet 05010000 80010005 80020002 80040002 80030001 800b0001 000c0004 00007080
Nov 27 10:39:05 ipsec,debug,packet 011101f4 b3b81bcc
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet HASH computed:
Nov 27 10:39:05 ipsec,debug,packet 15878c17 dce57dd2 40f80af8 523d582d 3d8ca773
Nov 27 10:39:05 ipsec,debug,packet add payload of len 8, next type 8
Nov 27 10:39:05 ipsec,debug,packet add payload of len 20, next type 0
Nov 27 10:39:05 ipsec,debug,packet begin encryption.
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet pad length = 12
Nov 27 10:39:05 ipsec,debug,packet 0800000c 011101f4 b3b81bcc 00000018 15878c17 dce57dd2 40f80af8 523d582d
Nov 27 10:39:05 ipsec,debug,packet 3d8ca773 93ddfac9 ece9acd9 e2ecf80b
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet with key:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet encrypted payload by IV:
Nov 27 10:39:05 ipsec,debug,packet 1d779463 d255797c dd21ec15 3c5fd757
Nov 27 10:39:05 ipsec,debug,packet save IV for next:
Nov 27 10:39:05 ipsec,debug,packet 92765c62 32a2dd0a f4770f9e cae26a98
Nov 27 10:39:05 ipsec,debug,packet encrypted.
Nov 27 10:39:05 ipsec,debug,packet Adding NON-ESP marker
Nov 27 10:39:05 ipsec,debug,packet 80 bytes from Y.Y.Y.Y[4500] to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet sockname Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet send packet from Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet send packet to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet src4 Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet dst4 X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet 1 times of 80 bytes message will be sent to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet 00000000 3fba1756 dd49d11f e543a422 b87360a3 05100201 00000000 0000004c
Nov 27 10:39:05 ipsec,debug,packet 6cba5e49 2795b5f5 4ddb9bfc 954aa8f1 6d741a25 b4fde643 ea5eb4e9 3e455a8a
Nov 27 10:39:05 ipsec,debug,packet 92765c62 32a2dd0a f4770f9e cae26a98
Nov 27 10:39:05 ipsec,debug,packet compute IV for phase2
Nov 27 10:39:05 ipsec,debug,packet phase1 last IV:
Nov 27 10:39:05 ipsec,debug,packet 92765c62 32a2dd0a f4770f9e cae26a98 e5480a19
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet phase2 IV computed:
Nov 27 10:39:05 ipsec,debug,packet 73217aa4 e5f2677f 633093b7 db370c47
Nov 27 10:39:05 ipsec,debug,packet HASH with:
Nov 27 10:39:05 ipsec,debug,packet e5480a19 0000001c 00000001 01106002 3fba1756 dd49d11f e543a422 b87360a3
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet HASH computed:
Nov 27 10:39:05 ipsec,debug,packet 9fd169e8 b1359529 e9d694ab 504efb15 5c8636b0
Nov 27 10:39:05 ipsec,debug,packet begin encryption.
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet pad length = 12
Nov 27 10:39:05 ipsec,debug,packet 0b000018 9fd169e8 b1359529 e9d694ab 504efb15 5c8636b0 0000001c 00000001
Nov 27 10:39:05 ipsec,debug,packet 01106002 3fba1756 dd49d11f e543a422 b87360a3 c58dcefd ca96ebe4 edc1cb0b
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet with key:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet encrypted payload by IV:
Nov 27 10:39:05 ipsec,debug,packet 73217aa4 e5f2677f 633093b7 db370c47
Nov 27 10:39:05 ipsec,debug,packet save IV for next:
Nov 27 10:39:05 ipsec,debug,packet 745689bb 9ab0448a 6c2c7063 3317a271
Nov 27 10:39:05 ipsec,debug,packet encrypted.
Nov 27 10:39:05 ipsec,debug,packet Adding NON-ESP marker
Nov 27 10:39:05 ipsec,debug,packet 96 bytes from Y.Y.Y.Y[4500] to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet sockname Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet send packet from Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet send packet to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet src4 Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet dst4 X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet 1 times of 96 bytes message will be sent to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet 00000000 3fba1756 dd49d11f e543a422 b87360a3 08100501 e5480a19 0000005c
Nov 27 10:39:05 ipsec,debug,packet 7efd6017 5d8f4b22 6077d771 711b20af e324513d 6ecfb57f be01514e 8d0265a9
Nov 27 10:39:05 ipsec,debug,packet 20e9a10a 4bdcdcd6 a54be578 94042b3e 745689bb 9ab0448a 6c2c7063 3317a271
Nov 27 10:39:05 ipsec,debug,packet sendto Information notify.
Nov 27 10:39:05 ipsec,debug ISAKMP-SA established Y.Y.Y.Y[4500]-X.X.X.X[43324] spi:3fba1756dd49d11f:e543a422b87360a3
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug,packet ==========
Nov 27 10:39:05 ipsec,debug,packet 284 bytes message received from X.X.X.X[43324] to Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08102001 00000001 0000011c a7485f79
Nov 27 10:39:05 ipsec,debug,packet 28d32cba ef29b288 23f8c730 e9ead310 1e9d7e06 b6742fd0 696f388e 67d669d2
Nov 27 10:39:05 ipsec,debug,packet 2258f764 365e0d51 21da7b87 ffcff9dd 8c849341 8965cee3 48dcebe3 85950b0b
Nov 27 10:39:05 ipsec,debug,packet d2ea5f29 3c1ec811 c01f0754 803d7ec5 3b6897cf 45dbb0c4 8220ceca 9e43bbcc
Nov 27 10:39:05 ipsec,debug,packet 87e74c71 83a1a89f 4f82c016 d62a2d87 c35fa325 e8da7d8f dbac5d08 533ad363
Nov 27 10:39:05 ipsec,debug,packet 912d3c44 1e47a70a cab791ed 208583b5 ae2ceb87 e347cff5 9de89bd3 4e44c63a
Nov 27 10:39:05 ipsec,debug,packet 6929fddf 73414f07 22665231 7a6f3a57 eeb37b3a b5ec886c 9cdd09f0 8bc5898d
Nov 27 10:39:05 ipsec,debug,packet 4e18c440 ef71e001 a23ac74e 3e4bd5ff 26dda58d a86ecfc0 1b461628 e66ffa0c
Nov 27 10:39:05 ipsec,debug,packet 90c003e4 ae8a08e0 53d7365f c3313321 9e2a4341 f8707493 a81b77fa
Nov 27 10:39:05 ipsec,debug,packet compute IV for phase2
Nov 27 10:39:05 ipsec,debug,packet phase1 last IV:
Nov 27 10:39:05 ipsec,debug,packet 92765c62 32a2dd0a f4770f9e cae26a98 00000001
Nov 27 10:39:05 ipsec,debug,packet hash(sha1)
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet phase2 IV computed:
Nov 27 10:39:05 ipsec,debug,packet 00f0e98d e33c9fa5 857fe5c6 58fad50c
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug respond new phase 2 negotiation: Y.Y.Y.Y[4500]<=>X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet IV was saved for next processing:
Nov 27 10:39:05 ipsec,debug,packet c3313321 9e2a4341 f8707493 a81b77fa
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet with key:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet decrypted payload by IV:
Nov 27 10:39:05 ipsec,debug,packet 00f0e98d e33c9fa5 857fe5c6 58fad50c
Nov 27 10:39:05 ipsec,debug,packet decrypted payload, but not trimed.
Nov 27 10:39:05 ipsec,debug,packet 01000018 7b88412e 6817e1b7 6a064942 5edeb013 40bef732 0a000078 00000001
Nov 27 10:39:05 ipsec,debug,packet 00000001 02000038 01030401 e620548c 0000002c 010c0000 80040004 80060100
Nov 27 10:39:05 ipsec,debug,packet 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090 00000034
Nov 27 10:39:05 ipsec,debug,packet 02030401 e620548c 00000028 01030000 80040004 80050002 80010001 00020004
Nov 27 10:39:05 ipsec,debug,packet 00000e10 80010002 00020004 0003d090 05000034 24a5b130 fbc8c4ae f2cad8c3
Nov 27 10:39:05 ipsec,debug,packet 78876a36 d4b491dc c53e4aa2 6c00a380 5fcdf069 1c04d6e8 306a59c5 0875d032
Nov 27 10:39:05 ipsec,debug,packet a90b628c 0500000c 011106a5 c0a82b2e 1500000c 011106a5 b3b81bcc 1500000c
Nov 27 10:39:05 ipsec,debug,packet 01000000 c0a82b2e 0000000c 01000000 b3b81bcc 00000000 00000000 00000000
Nov 27 10:39:05 ipsec,debug,packet padding len=1
Nov 27 10:39:05 ipsec,debug,packet skip to trim padding.
Nov 27 10:39:05 ipsec,debug,packet decrypted.
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08102001 00000001 0000011c 01000018
Nov 27 10:39:05 ipsec,debug,packet 7b88412e 6817e1b7 6a064942 5edeb013 40bef732 0a000078 00000001 00000001
Nov 27 10:39:05 ipsec,debug,packet 02000038 01030401 e620548c 0000002c 010c0000 80040004 80060100 80050002
Nov 27 10:39:05 ipsec,debug,packet 80010001 00020004 00000e10 80010002 00020004 0003d090 00000034 02030401
Nov 27 10:39:05 ipsec,debug,packet e620548c 00000028 01030000 80040004 80050002 80010001 00020004 00000e10
Nov 27 10:39:05 ipsec,debug,packet 80010002 00020004 0003d090 05000034 24a5b130 fbc8c4ae f2cad8c3 78876a36
Nov 27 10:39:05 ipsec,debug,packet d4b491dc c53e4aa2 6c00a380 5fcdf069 1c04d6e8 306a59c5 0875d032 a90b628c
Nov 27 10:39:05 ipsec,debug,packet 0500000c 011106a5 c0a82b2e 1500000c 011106a5 b3b81bcc 1500000c 01000000
Nov 27 10:39:05 ipsec,debug,packet c0a82b2e 0000000c 01000000 b3b81bcc 00000000 00000000 00000000
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=8(hash)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=1(sa)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=10(nonce)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=5(id)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=5(id)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=21(nat-oa)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=21(nat-oa)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet received IDci2:
Nov 27 10:39:05 ipsec,debug,packet 011106a5 c0a82b2e
Nov 27 10:39:05 ipsec,debug,packet received IDcr2:
Nov 27 10:39:05 ipsec,debug,packet 011106a5 b3b81bcc
Nov 27 10:39:05 ipsec,debug,packet HASH(1) validate:
Nov 27 10:39:05 ipsec,debug,packet 7b88412e 6817e1b7 6a064942 5edeb013 40bef732
Nov 27 10:39:05 ipsec,debug,packet HASH with:
Nov 27 10:39:05 ipsec,debug,packet 00000001 0a000078 00000001 00000001 02000038 01030401 e620548c 0000002c
Nov 27 10:39:05 ipsec,debug,packet 010c0000 80040004 80060100 80050002 80010001 00020004 00000e10 80010002
Nov 27 10:39:05 ipsec,debug,packet 00020004 0003d090 00000034 02030401 e620548c 00000028 01030000 80040004
Nov 27 10:39:05 ipsec,debug,packet 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090 05000034
Nov 27 10:39:05 ipsec,debug,packet 24a5b130 fbc8c4ae f2cad8c3 78876a36 d4b491dc c53e4aa2 6c00a380 5fcdf069
Nov 27 10:39:05 ipsec,debug,packet 1c04d6e8 306a59c5 0875d032 a90b628c 0500000c 011106a5 c0a82b2e 1500000c
Nov 27 10:39:05 ipsec,debug,packet 011106a5 b3b81bcc 1500000c 01000000 c0a82b2e 0000000c 01000000 b3b81bcc
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet HASH computed:
Nov 27 10:39:05 ipsec,debug,packet 7b88412e 6817e1b7 6a064942 5edeb013 40bef732
Nov 27 10:39:05 ipsec,debug,packet get a src address from ID payload 192.168.43.46[1701] prefixlen=32 ul_proto=17
Nov 27 10:39:05 ipsec,debug,packet get dst address from ID payload Y.Y.Y.Y[1701] prefixlen=32 ul_proto=17
Nov 27 10:39:05 ipsec,debug,packet 0x7fc8f46c masked with /32: 192.168.43.46[1701]
Nov 27 10:39:05 ipsec,debug,packet 0xc8e98 masked with /32: X.X.X.X[43320]
Nov 27 10:39:05 ipsec,debug no policy found, try to generate the policy : 192.168.43.46/32[1701] Y.Y.Y.Y/32[1701] proto=udp dir=in port_override=0
Nov 27 10:39:05 ipsec,debug,packet total SA len=116
Nov 27 10:39:05 ipsec,debug,packet 00000001 00000001 02000038 01030401 e620548c 0000002c 010c0000 80040004
Nov 27 10:39:05 ipsec,debug,packet 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
Nov 27 10:39:05 ipsec,debug,packet 00000034 02030401 e620548c 00000028 01030000 80040004 80050002 80010001
Nov 27 10:39:05 ipsec,debug,packet 00020004 00000e10 80010002 00020004 0003d090
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=2(prop)
Nov 27 10:39:05 ipsec,debug,packet seen nptype=2(prop)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet proposal #1 len=56
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet transform #1 len=44
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
Nov 27 10:39:05 ipsec,debug,packet UDP encapsulation requested
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=kilobytes
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet proposal #2 len=52
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet transform #1 len=40
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
Nov 27 10:39:05 ipsec,debug,packet UDP encapsulation requested
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=kilobytes
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet pair 1:
Nov 27 10:39:05 ipsec,debug,packet 0xc5d30: next=(nil) tnext=(nil)
Nov 27 10:39:05 ipsec,debug,packet proposal #1: 1 transform
Nov 27 10:39:05 ipsec,debug,packet pair 2:
Nov 27 10:39:05 ipsec,debug,packet 0xc8730: next=(nil) tnext=(nil)
Nov 27 10:39:05 ipsec,debug,packet proposal #2: 1 transform
Nov 27 10:39:05 ipsec,debug,packet get a source address of SP index from phase1 address because peer is behind NAT and we have to generate policy.
Nov 27 10:39:05 ipsec,debug,packet prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CBC
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=kilobytes
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet prop#=2 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=3DES
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=kilobytes
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet make a proposal from peer's:
Nov 27 10:39:05 ipsec,debug,packet (proto_id=ESP spisize=4 spi=00000000 spi_p=e620548c encmode=UDP-Transport reqid=0:0)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=3DES encklen=0 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug,packet begin compare proposals.
Nov 27 10:39:05 ipsec,debug,packet pair[1]: 0xc5d30
Nov 27 10:39:05 ipsec,debug,packet 0xc5d30: next=(nil) tnext=(nil)
Nov 27 10:39:05 ipsec,debug,packet prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CBC
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=kilobytes
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet peer's single bundle:
Nov 27 10:39:05 ipsec,debug,packet (proto_id=ESP spisize=4 spi=e620548c spi_p=00000000 encmode=UDP-Transport reqid=0:0)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug,packet my single bundle:
Nov 27 10:39:05 ipsec,debug,packet (proto_id=ESP spisize=4 spi=00000000 spi_p=e620548c encmode=UDP-Transport reqid=0:0)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug,packet (trns_id=3DES encklen=0 authtype=hmac-sha1)
Nov 27 10:39:05 ipsec,debug Adjusting my encmode UDP-Transport->Transport
Nov 27 10:39:05 ipsec,debug Adjusting peer's encmode UDP-Transport(4)->Transport(2)
Nov 27 10:39:05 ipsec,debug,packet matched
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug,packet call pfkey_send_getspi 1fff30e1
Nov 27 10:39:05 ipsec,debug,packet pfkey GETSPI sent: ESP/Transport X.X.X.X[43324]->Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet pfkey getspi sent.
Nov 27 10:39:05 ipsec,debug pfkey GETSPI succeeded: ESP/Transport X.X.X.X[43324]->Y.Y.Y.Y[4500] spi=109958217(0x68dd449)
Nov 27 10:39:05 ipsec,debug,packet total SA len=64
Nov 27 10:39:05 ipsec,debug,packet 00000001 00000001 00000038 01030401 00000000 0000002c 010c0000 80040004
Nov 27 10:39:05 ipsec,debug,packet 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=2(prop)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet proposal #1 len=56
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=3(trns)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet transform #1 len=44
Nov 27 10:39:05 ipsec,debug,packet type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
Nov 27 10:39:05 ipsec,debug,packet UDP encapsulation requested
Nov 27 10:39:05 ipsec,debug,packet type=Key Length, flag=0x8000, lorv=256
Nov 27 10:39:05 ipsec,debug,packet type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=seconds
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Type, flag=0x8000, lorv=kilobytes
Nov 27 10:39:05 ipsec,debug,packet type=SA Life Duration, flag=0x0000, lorv=4
Nov 27 10:39:05 ipsec,debug,packet pair 1:
Nov 27 10:39:05 ipsec,debug,packet 0xc8730: next=(nil) tnext=(nil)
Nov 27 10:39:05 ipsec,debug,packet proposal #1: 1 transform
Nov 27 10:39:05 ipsec,debug,packet NAT-OAi:
Nov 27 10:39:05 ipsec,debug,packet 0100a93c b14f4663
Nov 27 10:39:05 ipsec,debug,packet NAT-OAr:
Nov 27 10:39:05 ipsec,debug,packet 01001194 b3b81bcc
Nov 27 10:39:05 ipsec,debug,packet add payload of len 64, next type 10
Nov 27 10:39:05 ipsec,debug,packet add payload of len 24, next type 5
Nov 27 10:39:05 ipsec,debug,packet add payload of len 8, next type 5
Nov 27 10:39:05 ipsec,debug,packet add payload of len 8, next type 21
Nov 27 10:39:05 ipsec,debug,packet add payload of len 8, next type 21
Nov 27 10:39:05 ipsec,debug,packet add payload of len 8, next type 0
Nov 27 10:39:05 ipsec,debug,packet HASH with:
Nov 27 10:39:05 ipsec,debug,packet 00000001 24a5b130 fbc8c4ae f2cad8c3 78876a36 d4b491dc c53e4aa2 6c00a380
Nov 27 10:39:05 ipsec,debug,packet 5fcdf069 1c04d6e8 306a59c5 0875d032 a90b628c 0a000044 00000001 00000001
Nov 27 10:39:05 ipsec,debug,packet 00000038 01030401 068dd449 0000002c 010c0000 80040004 80060100 80050002
Nov 27 10:39:05 ipsec,debug,packet 80010001 00020004 00000e10 80010002 00020004 0003d090 0500001c d887f687
Nov 27 10:39:05 ipsec,debug,packet 340d39c6 080d2115 bb80e70e f7e1e49f e37deeee 0500000c 011106a5 c0a82b2e
Nov 27 10:39:05 ipsec,debug,packet 1500000c 011106a5 b3b81bcc 1500000c 0100a93c b14f4663 0000000c 01001194
Nov 27 10:39:05 ipsec,debug,packet b3b81bcc
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet HASH computed:
Nov 27 10:39:05 ipsec,debug,packet 36e581e6 68e83e68 c94a1a2c f2bbd18f 646a6f91
Nov 27 10:39:05 ipsec,debug,packet add payload of len 20, next type 1
Nov 27 10:39:05 ipsec,debug,packet begin encryption.
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet pad length = 8
Nov 27 10:39:05 ipsec,debug,packet 01000018 36e581e6 68e83e68 c94a1a2c f2bbd18f 646a6f91 0a000044 00000001
Nov 27 10:39:05 ipsec,debug,packet 00000001 00000038 01030401 068dd449 0000002c 010c0000 80040004 80060100
Nov 27 10:39:05 ipsec,debug,packet 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090 0500001c
Nov 27 10:39:05 ipsec,debug,packet d887f687 340d39c6 080d2115 bb80e70e f7e1e49f e37deeee 0500000c 011106a5
Nov 27 10:39:05 ipsec,debug,packet c0a82b2e 1500000c 011106a5 b3b81bcc 1500000c 0100a93c b14f4663 0000000c
Nov 27 10:39:05 ipsec,debug,packet 01001194 b3b81bcc d1b7c2a6 dee1cc07
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet with key:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet encrypted payload by IV:
Nov 27 10:39:05 ipsec,debug,packet c3313321 9e2a4341 f8707493 a81b77fa
Nov 27 10:39:05 ipsec,debug,packet save IV for next:
Nov 27 10:39:05 ipsec,debug,packet 1ed251ad 5b29a8f9 6ed86117 1e9cd528
Nov 27 10:39:05 ipsec,debug,packet encrypted.
Nov 27 10:39:05 ipsec,debug,packet Adding NON-ESP marker
Nov 27 10:39:05 ipsec,debug,packet 208 bytes from Y.Y.Y.Y[4500] to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet sockname Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet send packet from Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet send packet to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet src4 Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet dst4 X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet 1 times of 208 bytes message will be sent to X.X.X.X[43324]
Nov 27 10:39:05 ipsec,debug,packet 00000000 3fba1756 dd49d11f e543a422 b87360a3 08102001 00000001 000000cc
Nov 27 10:39:05 ipsec,debug,packet b412753e 4c0e1cbe 6e2cd56f ffedef99 3b482112 8db523ca f4342a1c 9a02db58
Nov 27 10:39:05 ipsec,debug,packet 8562831d 5505c569 c91a3b5a 350daa9e da02fdbf 087c713d a1c4c512 eb659af2
Nov 27 10:39:05 ipsec,debug,packet 272b5402 11134996 6ecdd464 1a1c0098 1d975f54 3a786944 091ab838 eb5b7ba1
Nov 27 10:39:05 ipsec,debug,packet ecc1953f b59c0d5f a9188e77 a9d8b353 d1e4321a bc845c8f 0417b309 488ff4e4
Nov 27 10:39:05 ipsec,debug,packet e3564351 443d93ed 8d1b6131 7c4ede65 ce8840fe 442ae66a c98257a8 9ae2b28a
Nov 27 10:39:05 ipsec,debug,packet 1ed251ad 5b29a8f9 6ed86117 1e9cd528
Nov 27 10:39:05 ipsec,debug sent phase2 packet Y.Y.Y.Y[4500]<=>X.X.X.X[43324] 3fba1756dd49d11f:e543a422b87360a3:00000000
Nov 27 10:39:05 ipsec,debug,packet ==========
Nov 27 10:39:05 ipsec,debug,packet 60 bytes message received from X.X.X.X[43324] to Y.Y.Y.Y[4500]
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08102001 00000001 0000003c 7b6d65cc
Nov 27 10:39:05 ipsec,debug,packet 01b43975 80e2e27a 242d6b7c 78bd2567 dafd258d ba49f04b 50178cc9
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet IV was saved for next processing:
Nov 27 10:39:05 ipsec,debug,packet 78bd2567 dafd258d ba49f04b 50178cc9
Nov 27 10:39:05 ipsec,debug,packet encryption(aes)
Nov 27 10:39:05 ipsec,debug,packet with key:
Nov 27 10:39:05 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:05 ipsec,debug,packet decrypted payload by IV:
Nov 27 10:39:05 ipsec,debug,packet 1ed251ad 5b29a8f9 6ed86117 1e9cd528
Nov 27 10:39:05 ipsec,debug,packet decrypted payload, but not trimed.
Nov 27 10:39:05 ipsec,debug,packet 00000018 cbecc7b7 a42920b1 30857f8d 2d6ae5fb 8b9ba423 00000000 00000000
Nov 27 10:39:05 ipsec,debug,packet padding len=1
Nov 27 10:39:05 ipsec,debug,packet skip to trim padding.
Nov 27 10:39:05 ipsec,debug,packet decrypted.
Nov 27 10:39:05 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08102001 00000001 0000003c 00000018
Nov 27 10:39:05 ipsec,debug,packet cbecc7b7 a42920b1 30857f8d 2d6ae5fb 8b9ba423 00000000 00000000
Nov 27 10:39:05 ipsec,debug,packet begin.
Nov 27 10:39:05 ipsec,debug,packet seen nptype=8(hash)
Nov 27 10:39:05 ipsec,debug,packet succeed.
Nov 27 10:39:05 ipsec,debug,packet HASH(3) validate:
Nov 27 10:39:05 ipsec,debug,packet cbecc7b7 a42920b1 30857f8d 2d6ae5fb 8b9ba423
Nov 27 10:39:05 ipsec,debug,packet HASH with:
Nov 27 10:39:05 ipsec,debug,packet 00000000 0124a5b1 30fbc8c4 aef2cad8 c378876a 36d4b491 dcc53e4a a26c00a3
Nov 27 10:39:05 ipsec,debug,packet 805fcdf0 691c04d6 e8306a59 c50875d0 32a90b62 8cd887f6 87340d39 c6080d21
Nov 27 10:39:05 ipsec,debug,packet 15bb80e7 0ef7e1e4 9fe37dee ee
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet HASH computed:
Nov 27 10:39:05 ipsec,debug,packet cbecc7b7 a42920b1 30857f8d 2d6ae5fb 8b9ba423
Nov 27 10:39:05 ipsec,debug,packet ===
Nov 27 10:39:05 ipsec,debug,packet KEYMAT compute with
Nov 27 10:39:05 ipsec,debug,packet 03068dd4 4924a5b1 30fbc8c4 aef2cad8 c378876a 36d4b491 dcc53e4a a26c00a3
Nov 27 10:39:05 ipsec,debug,packet 805fcdf0 691c04d6 e8306a59 c50875d0 32a90b62 8cd887f6 87340d39 c6080d21
Nov 27 10:39:05 ipsec,debug,packet 15bb80e7 0ef7e1e4 9fe37dee ee
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet encryption(aes-cbc)
Nov 27 10:39:05 ipsec,debug,packet hmac(sha1)
Nov 27 10:39:05 ipsec,debug,packet encklen=256 authklen=160
Nov 27 10:39:05 ipsec,debug,packet generating 640 bits of key (dupkeymat=4)
Nov 27 10:39:05 ipsec,debug,packet generating K1...K4 for KEYMAT.
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet 4759f125 10adb175 b71d9f74 4dbbb0b8 59376686 3a22f0a5 2d9998bf bc79547f
Nov 27 10:39:05 ipsec,debug,packet 4f37b5be 81f4200c 4395c434 bac13cb8 51913226 a44c2d2d ddf43757 8b23cfab
Nov 27 10:39:05 ipsec,debug,packet 9d757a02 86af43d9 a0a2d3f6 5272561f
Nov 27 10:39:05 ipsec,debug,packet KEYMAT compute with
Nov 27 10:39:05 ipsec,debug,packet 03e62054 8c24a5b1 30fbc8c4 aef2cad8 c378876a 36d4b491 dcc53e4a a26c00a3
Nov 27 10:39:05 ipsec,debug,packet 805fcdf0 691c04d6 e8306a59 c50875d0 32a90b62 8cd887f6 87340d39 c6080d21
Nov 27 10:39:05 ipsec,debug,packet 15bb80e7 0ef7e1e4 9fe37dee ee
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet encryption(aes-cbc)
Nov 27 10:39:05 ipsec,debug,packet hmac(sha1)
Nov 27 10:39:05 ipsec,debug,packet encklen=256 authklen=160
Nov 27 10:39:05 ipsec,debug,packet generating 640 bits of key (dupkeymat=4)
Nov 27 10:39:05 ipsec,debug,packet generating K1...K4 for KEYMAT.
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:05 ipsec,debug,packet aa29a472 116d198f 2d226630 58e1ca23 5c868a32 6d7dadcf 1fe186c8 62c36ed7
Nov 27 10:39:05 ipsec,debug,packet f65e8bdd 85c0c8ca e4b324f2 97de8433 9c01503e a273ceba e810215d 1023f930
Nov 27 10:39:05 ipsec,debug,packet 0f2f9cf4 206c0382 d9cd3e8e 89cba99a
Nov 27 10:39:05 ipsec,debug,packet KEYMAT computed.
Nov 27 10:39:05 ipsec,debug,packet call pk_sendupdate
Nov 27 10:39:05 ipsec,debug,packet encryption(aes-cbc)
Nov 27 10:39:05 ipsec,debug,packet hmac(sha1)
Nov 27 10:39:05 ipsec,debug,packet call pfkey_send_update_nat
Nov 27 10:39:05 ipsec IPsec-SA established: ESP/Transport X.X.X.X[43324]->Y.Y.Y.Y[4500] spi=109958217(0x68dd449)
Nov 27 10:39:05 ipsec,debug,packet pfkey update sent.
Nov 27 10:39:05 ipsec,debug,packet encryption(aes-cbc)
Nov 27 10:39:05 ipsec,debug,packet hmac(sha1)
Nov 27 10:39:05 ipsec,debug,packet call pfkey_send_add_nat
Nov 27 10:39:05 ipsec IPsec-SA established: ESP/Transport Y.Y.Y.Y[4500]->X.X.X.X[43324] spi=3860878476(0xe620548c)
Nov 27 10:39:05 ipsec,debug,packet pfkey add sent.
Nov 27 10:39:05 ipsec,debug,packet call pfkey_send_spdupdate2
Nov 27 10:39:05 ipsec,debug,packet pfkey spdupdate2(inbound) sent.
Nov 27 10:39:05 ipsec,debug,packet call pfkey_send_spdupdate2
Nov 27 10:39:05 ipsec,debug,packet pfkey spdupdate2(outbound) sent.
Nov 27 10:39:05 ipsec,debug,packet such policy does not already exist: X.X.X.X/32[43324] Y.Y.Y.Y/32[1701] proto=udp dir=in
Nov 27 10:39:05 ipsec,debug,packet such policy does not already exist: Y.Y.Y.Y/32[1701] X.X.X.X/32[43324] proto=udp dir=out
Nov 27 10:39:05 l2tp,debug,packet rcvd control message from X.X.X.X:1701 to Y.Y.Y.Y:1701
Nov 27 10:39:05 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
Nov 27 10:39:05 l2tp,debug,packet (M) Message-Type=SCCRQ
Nov 27 10:39:05 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:05 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:05 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:05 l2tp,debug,packet Firmware-Revision=0xa00
Nov 27 10:39:05 l2tp,debug,packet (M) Host-Name="BARNB00225.barigui.lan"
Nov 27 10:39:05 l2tp,debug,packet Vendor-Name="Microsoft"
Nov 27 10:39:05 l2tp,debug,packet (M) Assigned-Tunnel-ID=5
Nov 27 10:39:05 l2tp,debug,packet (M) Receive-Window-Size=8
Nov 27 10:39:05 l2tp,info first L2TP UDP packet received from X.X.X.X
Nov 27 10:39:05 l2tp,debug tunnel 10466 entering state: wait-ctl-conn
Nov 27 10:39:05 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:05 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:05 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:05 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:05 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:05 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:05 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:05 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:05 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:05 l2tp,debug,packet (M) Assigned-Tunnel-ID=10466
Nov 27 10:39:05 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:06 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:06 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:06 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:06 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:06 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:06 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:06 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:06 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:06 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:06 l2tp,debug,packet (M) Assigned-Tunnel-ID=10466
Nov 27 10:39:06 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:07 l2tp,debug,packet rcvd control message from X.X.X.X:1701 to Y.Y.Y.Y:1701
Nov 27 10:39:07 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
Nov 27 10:39:07 l2tp,debug,packet (M) Message-Type=SCCRQ
Nov 27 10:39:07 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:07 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:07 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:07 l2tp,debug,packet Firmware-Revision=0xa00
Nov 27 10:39:07 l2tp,debug,packet (M) Host-Name="BARNB00225.barigui.lan"
Nov 27 10:39:07 l2tp,debug,packet Vendor-Name="Microsoft"
Nov 27 10:39:07 l2tp,debug,packet (M) Assigned-Tunnel-ID=5
Nov 27 10:39:07 l2tp,debug,packet (M) Receive-Window-Size=8
Nov 27 10:39:07 l2tp,debug,packet sent control message (ack) to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:07 l2tp,debug,packet tunnel-id=5, session-id=0, ns=1, nr=1
Nov 27 10:39:07 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:07 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:07 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:07 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:07 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:07 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:07 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:07 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:07 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:07 l2tp,debug,packet (M) Assigned-Tunnel-ID=10466
Nov 27 10:39:07 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:09 l2tp,debug,packet rcvd control message from X.X.X.X:1701 to Y.Y.Y.Y:1701
Nov 27 10:39:09 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
Nov 27 10:39:09 l2tp,debug,packet (M) Message-Type=SCCRQ
Nov 27 10:39:09 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:09 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:09 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:09 l2tp,debug,packet Firmware-Revision=0xa00
Nov 27 10:39:09 l2tp,debug,packet (M) Host-Name="BARNB00225.barigui.lan"
Nov 27 10:39:09 l2tp,debug,packet Vendor-Name="Microsoft"
Nov 27 10:39:09 l2tp,debug,packet (M) Assigned-Tunnel-ID=5
Nov 27 10:39:09 l2tp,debug,packet (M) Receive-Window-Size=8
Nov 27 10:39:09 l2tp,debug,packet sent control message (ack) to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:09 l2tp,debug,packet tunnel-id=5, session-id=0, ns=1, nr=1
Nov 27 10:39:09 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:09 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:09 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:09 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:09 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:09 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:09 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:09 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:09 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:09 l2tp,debug,packet (M) Assigned-Tunnel-ID=10466
Nov 27 10:39:09 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:12 ipsec,debug,packet KA: Y.Y.Y.Y[4500]->X.X.X.X[43324]
Nov 27 10:39:12 ipsec,debug,packet sockname Y.Y.Y.Y[4500]
Nov 27 10:39:12 ipsec,debug,packet send packet from Y.Y.Y.Y[4500]
Nov 27 10:39:12 ipsec,debug,packet send packet to X.X.X.X[43324]
Nov 27 10:39:12 ipsec,debug,packet src4 Y.Y.Y.Y[4500]
Nov 27 10:39:12 ipsec,debug,packet dst4 X.X.X.X[43324]
Nov 27 10:39:12 ipsec,debug,packet 1 times of 1 bytes message will be sent to X.X.X.X[43324]
Nov 27 10:39:12 ipsec,debug,packet ff
Nov 27 10:39:13 l2tp,debug,packet rcvd control message from X.X.X.X:1701 to Y.Y.Y.Y:1701
Nov 27 10:39:13 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
Nov 27 10:39:13 l2tp,debug,packet (M) Message-Type=SCCRQ
Nov 27 10:39:13 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:13 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:13 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:13 l2tp,debug,packet Firmware-Revision=0xa00
Nov 27 10:39:13 l2tp,debug,packet (M) Host-Name="BARNB00225.barigui.lan"
Nov 27 10:39:13 l2tp,debug,packet Vendor-Name="Microsoft"
Nov 27 10:39:13 l2tp,debug,packet (M) Assigned-Tunnel-ID=5
Nov 27 10:39:13 l2tp,debug,packet (M) Receive-Window-Size=8
Nov 27 10:39:13 l2tp,debug,packet sent control message (ack) to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:13 l2tp,debug,packet tunnel-id=5, session-id=0, ns=1, nr=1
Nov 27 10:39:13 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:13 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:13 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:13 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:13 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:13 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:13 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:13 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:13 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:13 l2tp,debug,packet (M) Assigned-Tunnel-ID=10466
Nov 27 10:39:13 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:21 l2tp,debug,packet rcvd control message from X.X.X.X:1701 to Y.Y.Y.Y:1701
Nov 27 10:39:21 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
Nov 27 10:39:21 l2tp,debug,packet (M) Message-Type=SCCRQ
Nov 27 10:39:21 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:21 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:21 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:21 l2tp,debug,packet Firmware-Revision=0xa00
Nov 27 10:39:21 l2tp,debug,packet (M) Host-Name="BARNB00225.barigui.lan"
Nov 27 10:39:21 l2tp,debug,packet Vendor-Name="Microsoft"
Nov 27 10:39:21 l2tp,debug,packet (M) Assigned-Tunnel-ID=5
Nov 27 10:39:21 l2tp,debug,packet (M) Receive-Window-Size=8
Nov 27 10:39:21 l2tp,debug,packet sent control message (ack) to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:21 l2tp,debug,packet tunnel-id=5, session-id=0, ns=1, nr=1
Nov 27 10:39:21 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:21 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:21 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:21 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:21 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:21 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:21 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:21 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:21 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:21 l2tp,debug,packet (M) Assigned-Tunnel-ID=10466
Nov 27 10:39:21 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:29 l2tp,debug tunnel 10466 received no replies, disconnecting
Nov 27 10:39:29 l2tp,debug tunnel 10466 entering state: dead
Nov 27 10:39:31 l2tp,debug,packet rcvd control message from X.X.X.X:1701 to Y.Y.Y.Y:1701
Nov 27 10:39:31 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
Nov 27 10:39:31 l2tp,debug,packet (M) Message-Type=SCCRQ
Nov 27 10:39:31 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:31 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:31 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:31 l2tp,debug,packet Firmware-Revision=0xa00
Nov 27 10:39:31 l2tp,debug,packet (M) Host-Name="BARNB00225.barigui.lan"
Nov 27 10:39:31 l2tp,debug,packet Vendor-Name="Microsoft"
Nov 27 10:39:31 l2tp,debug,packet (M) Assigned-Tunnel-ID=5
Nov 27 10:39:31 l2tp,debug,packet (M) Receive-Window-Size=8
Nov 27 10:39:31 l2tp,info first L2TP UDP packet received from X.X.X.X
Nov 27 10:39:31 l2tp,debug tunnel 10467 entering state: wait-ctl-conn
Nov 27 10:39:31 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:31 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:31 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:31 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:31 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:31 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:31 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:31 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:31 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:31 l2tp,debug,packet (M) Assigned-Tunnel-ID=10467
Nov 27 10:39:31 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:32 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:32 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:32 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:32 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:32 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:32 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:32 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:32 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:32 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:32 l2tp,debug,packet (M) Assigned-Tunnel-ID=10467
Nov 27 10:39:32 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:32 ipsec,debug,packet KA: Y.Y.Y.Y[4500]->X.X.X.X[43324]
Nov 27 10:39:32 ipsec,debug,packet sockname Y.Y.Y.Y[4500]
Nov 27 10:39:32 ipsec,debug,packet send packet from Y.Y.Y.Y[4500]
Nov 27 10:39:32 ipsec,debug,packet send packet to X.X.X.X[43324]
Nov 27 10:39:32 ipsec,debug,packet src4 Y.Y.Y.Y[4500]
Nov 27 10:39:32 ipsec,debug,packet dst4 X.X.X.X[43324]
Nov 27 10:39:32 ipsec,debug,packet 1 times of 1 bytes message will be sent to X.X.X.X[43324]
Nov 27 10:39:32 ipsec,debug,packet ff
Nov 27 10:39:33 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:33 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:33 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:33 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:33 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:33 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:33 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:33 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:33 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:33 l2tp,debug,packet (M) Assigned-Tunnel-ID=10467
Nov 27 10:39:33 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:35 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:35 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:35 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:35 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:35 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:35 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:35 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:35 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:35 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:35 l2tp,debug,packet (M) Assigned-Tunnel-ID=10467
Nov 27 10:39:35 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:39 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:39 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:39 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:39 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:39 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:39 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:39 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:39 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:39 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:39 l2tp,debug,packet (M) Assigned-Tunnel-ID=10467
Nov 27 10:39:39 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:41 ipsec,debug,packet ==========
Nov 27 10:39:41 ipsec,debug,packet 76 bytes message received from X.X.X.X[43324] to Y.Y.Y.Y[4500]
Nov 27 10:39:41 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08100501 9c863f06 0000004c 97664481
Nov 27 10:39:41 ipsec,debug,packet cdad8ff6 7d4c356e ee5df5b4 827df45c dbcab180 654054eb b8c8679f e0175e8d
Nov 27 10:39:41 ipsec,debug,packet e61adba5 06618e0a 277d1463
Nov 27 10:39:41 ipsec,debug,packet receive Information.
Nov 27 10:39:41 ipsec,debug,packet compute IV for phase2
Nov 27 10:39:41 ipsec,debug,packet phase1 last IV:
Nov 27 10:39:41 ipsec,debug,packet 92765c62 32a2dd0a f4770f9e cae26a98 9c863f06
Nov 27 10:39:41 ipsec,debug,packet hash(sha1)
Nov 27 10:39:41 ipsec,debug,packet encryption(aes)
Nov 27 10:39:41 ipsec,debug,packet phase2 IV computed:
Nov 27 10:39:41 ipsec,debug,packet 3d545caa d644cbd6 0d2df362 8d0d7ce1
Nov 27 10:39:41 ipsec,debug,packet encryption(aes)
Nov 27 10:39:41 ipsec,debug,packet IV was saved for next processing:
Nov 27 10:39:41 ipsec,debug,packet e0175e8d e61adba5 06618e0a 277d1463
Nov 27 10:39:41 ipsec,debug,packet encryption(aes)
Nov 27 10:39:41 ipsec,debug,packet with key:
Nov 27 10:39:41 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:41 ipsec,debug,packet decrypted payload by IV:
Nov 27 10:39:41 ipsec,debug,packet 3d545caa d644cbd6 0d2df362 8d0d7ce1
Nov 27 10:39:41 ipsec,debug,packet decrypted payload, but not trimed.
Nov 27 10:39:41 ipsec,debug,packet 0c000018 ea8525cf d83a4196 500c5c4c 7362351d 941be262 00000010 00000001
Nov 27 10:39:41 ipsec,debug,packet 03040001 e620548c 00000000 00000000
Nov 27 10:39:41 ipsec,debug,packet padding len=1
Nov 27 10:39:41 ipsec,debug,packet skip to trim padding.
Nov 27 10:39:41 ipsec,debug,packet decrypted.
Nov 27 10:39:41 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08100501 9c863f06 0000004c 0c000018
Nov 27 10:39:41 ipsec,debug,packet ea8525cf d83a4196 500c5c4c 7362351d 941be262 00000010 00000001 03040001
Nov 27 10:39:41 ipsec,debug,packet e620548c 00000000 00000000
Nov 27 10:39:41 ipsec,debug,packet HASH with:
Nov 27 10:39:41 ipsec,debug,packet 9c863f06 00000010 00000001 03040001 e620548c
Nov 27 10:39:41 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:41 ipsec,debug,packet HASH computed:
Nov 27 10:39:41 ipsec,debug,packet ea8525cf d83a4196 500c5c4c 7362351d 941be262
Nov 27 10:39:41 ipsec,debug,packet hash validated.
Nov 27 10:39:41 ipsec,debug,packet begin.
Nov 27 10:39:41 ipsec,debug,packet seen nptype=8(hash)
Nov 27 10:39:41 ipsec,debug,packet seen nptype=12(delete)
Nov 27 10:39:41 ipsec,debug,packet succeed.
Nov 27 10:39:41 ipsec,debug,packet delete payload for protocol ESP
Nov 27 10:39:41 ipsec,debug,packet purge_ipsec_spi:
Nov 27 10:39:41 ipsec,debug,packet dst0: X.X.X.X[43324]
Nov 27 10:39:41 ipsec,debug,packet SPI: E620548C
Nov 27 10:39:41 ipsec,debug,packet check spi(packet)=3860878476 spi(db)=3860878476.
Nov 27 10:39:41 ipsec,debug generated policy, deleting it.
Nov 27 10:39:41 ipsec,debug get a src address from ID payload 192.168.43.46[1701] prefixlen=32 ul_proto=17
Nov 27 10:39:41 ipsec,debug get dst address from ID payload Y.Y.Y.Y[1701] prefixlen=32 ul_proto=17
Nov 27 10:39:41 ipsec,debug,packet call pfkey_send_spddelete
Nov 27 10:39:41 ipsec,debug pfkey spddelete(inbound) sent.
Nov 27 10:39:41 ipsec,debug,packet call pfkey_send_spddelete
Nov 27 10:39:41 ipsec,debug pfkey spddelete(outbound) sent.
Nov 27 10:39:41 ipsec,debug,packet an undead schedule has been deleted.
Nov 27 10:39:41 ipsec,debug purged IPsec-SA proto_id=ESP spi=3860878476.
Nov 27 10:39:41 ipsec,debug,packet purged SAs.
Nov 27 10:39:41 ipsec,debug,packet ==========
Nov 27 10:39:41 ipsec,debug,packet 92 bytes message received from X.X.X.X[43324] to Y.Y.Y.Y[4500]
Nov 27 10:39:41 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08100501 31b34656 0000005c ac152060
Nov 27 10:39:41 ipsec,debug,packet 4728ef12 5753753a 50055672 a71f2dab dbfb4b92 80b7754c 9df97137 dd72a5a1
Nov 27 10:39:41 ipsec,debug,packet c91b9315 b01c4b16 a313afbe f9426713 ab93d024 99b276df 33f213c5
Nov 27 10:39:41 ipsec,debug,packet receive Information.
Nov 27 10:39:41 ipsec,debug,packet compute IV for phase2
Nov 27 10:39:41 ipsec,debug,packet phase1 last IV:
Nov 27 10:39:41 ipsec,debug,packet 92765c62 32a2dd0a f4770f9e cae26a98 31b34656
Nov 27 10:39:41 ipsec,debug,packet hash(sha1)
Nov 27 10:39:41 ipsec,debug,packet encryption(aes)
Nov 27 10:39:41 ipsec,debug,packet phase2 IV computed:
Nov 27 10:39:41 ipsec,debug,packet fdd76ea9 33e19266 d8cfe155 a8a03c11
Nov 27 10:39:41 ipsec,debug,packet encryption(aes)
Nov 27 10:39:41 ipsec,debug,packet IV was saved for next processing:
Nov 27 10:39:41 ipsec,debug,packet f9426713 ab93d024 99b276df 33f213c5
Nov 27 10:39:41 ipsec,debug,packet encryption(aes)
Nov 27 10:39:41 ipsec,debug,packet with key:
Nov 27 10:39:41 ipsec,debug,packet e7a57679 b3f913c8 33e3c92b e80e735a 24f8723f 9182ab2c 09801fa0 1cd7ef52
Nov 27 10:39:41 ipsec,debug,packet decrypted payload by IV:
Nov 27 10:39:41 ipsec,debug,packet fdd76ea9 33e19266 d8cfe155 a8a03c11
Nov 27 10:39:41 ipsec,debug,packet decrypted payload, but not trimed.
Nov 27 10:39:41 ipsec,debug,packet 0c000018 3880ac53 7d81ffc6 46fd7ea1 4a7c0f8e 25785df0 0000001c 00000001
Nov 27 10:39:41 ipsec,debug,packet 01100001 3fba1756 dd49d11f e543a422 b87360a3 00000000 00000000 00000000
Nov 27 10:39:41 ipsec,debug,packet padding len=1
Nov 27 10:39:41 ipsec,debug,packet skip to trim padding.
Nov 27 10:39:41 ipsec,debug,packet decrypted.
Nov 27 10:39:41 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 08100501 31b34656 0000005c 0c000018
Nov 27 10:39:41 ipsec,debug,packet 3880ac53 7d81ffc6 46fd7ea1 4a7c0f8e 25785df0 0000001c 00000001 01100001
Nov 27 10:39:41 ipsec,debug,packet 3fba1756 dd49d11f e543a422 b87360a3 00000000 00000000 00000000
Nov 27 10:39:41 ipsec,debug,packet HASH with:
Nov 27 10:39:41 ipsec,debug,packet 31b34656 0000001c 00000001 01100001 3fba1756 dd49d11f e543a422 b87360a3
Nov 27 10:39:41 ipsec,debug,packet hmac(hmac_sha1)
Nov 27 10:39:41 ipsec,debug,packet HASH computed:
Nov 27 10:39:41 ipsec,debug,packet 3880ac53 7d81ffc6 46fd7ea1 4a7c0f8e 25785df0
Nov 27 10:39:41 ipsec,debug,packet hash validated.
Nov 27 10:39:41 ipsec,debug,packet begin.
Nov 27 10:39:41 ipsec,debug,packet seen nptype=8(hash)
Nov 27 10:39:41 ipsec,debug,packet seen nptype=12(delete)
Nov 27 10:39:41 ipsec,debug,packet succeed.
Nov 27 10:39:41 ipsec,debug,packet delete payload for protocol ISAKMP
Nov 27 10:39:41 ipsec,debug ISAKMP-SA expired Y.Y.Y.Y[4500]-X.X.X.X[43324] spi:3fba1756dd49d11f:e543a422b87360a3
Nov 27 10:39:41 ipsec,debug,packet purged SAs.
Nov 27 10:39:41 ipsec,debug pfkey DELETE received: ESP Y.Y.Y.Y[4500]->X.X.X.X[43324] spi=3860878476(0xe620548c)
Nov 27 10:39:42 ipsec,debug ISAKMP-SA deleted Y.Y.Y.Y[4500]-X.X.X.X[43324] spi:3fba1756dd49d11f:e543a422b87360a3
Nov 27 10:39:42 ipsec,debug KA remove: Y.Y.Y.Y[4500]->X.X.X.X[43324]
Nov 27 10:39:42 ipsec,debug,packet KA tree dump: Y.Y.Y.Y[4500]->X.X.X.X[43324] (in_use=1)
Nov 27 10:39:42 ipsec,debug,packet KA removing this one...
Nov 27 10:39:47 l2tp,debug,packet sent control message to X.X.X.X:1701 from Y.Y.Y.Y:1701
Nov 27 10:39:47 l2tp,debug,packet tunnel-id=5, session-id=0, ns=0, nr=1
Nov 27 10:39:47 l2tp,debug,packet (M) Message-Type=SCCRP
Nov 27 10:39:47 l2tp,debug,packet (M) Protocol-Version=0x01:00
Nov 27 10:39:47 l2tp,debug,packet (M) Framing-Capabilities=0x1
Nov 27 10:39:47 l2tp,debug,packet (M) Bearer-Capabilities=0x0
Nov 27 10:39:47 l2tp,debug,packet Firmware-Revision=0x1
Nov 27 10:39:47 l2tp,debug,packet (M) Host-Name="MTZ-BKP"
Nov 27 10:39:47 l2tp,debug,packet Vendor-Name="MikroTik"
Nov 27 10:39:47 l2tp,debug,packet (M) Assigned-Tunnel-ID=10467
Nov 27 10:39:47 l2tp,debug,packet (M) Receive-Window-Size=4
Nov 27 10:39:55 l2tp,debug tunnel 10467 received no replies, disconnecting
Nov 27 10:39:55 l2tp,debug tunnel 10467 entering state: dead