Alright ...
# nov/21/2019 8: 1:21 by RouterOS 6.44.5
# software id = 1SBQ-KUIK
#
08:01:24 ipsec,debug ===== received 724 bytes from PHONE-IP[47940] to ROUTER-IP[500]
08:01:24 ipsec,debug,packet eacda968 633ab46e 00000000 00000000 01100200 00000000 000002d4 0d00023c
08:01:24 ipsec,debug,packet 00000001 00000001 00000230 01010010 03000024 01010000 800b0001 800c7080
08:01:24 ipsec,debug,packet 80010007 800e0100 80030001 80020005 80040002 03000024 02010000 800b0001
08:01:24 ipsec,debug,packet 800c7080 80010007 800e0100 80030001 80020004 80040002 03000024 03010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010007 800e0100 80030001 80020006 80040002 03000024
08:01:24 ipsec,debug,packet 04010000 800b0001 800c7080 80010007 800e0100 80030001 80020002 80040002
08:01:24 ipsec,debug,packet 03000024 05010000 800b0001 800c7080 80010007 800e0100 80030001 80020001
08:01:24 ipsec,debug,packet 80040002 03000024 06010000 800b0001 800c7080 80010007 800e0080 80030001
08:01:24 ipsec,debug,packet 80020006 80040002 03000024 07010000 800b0001 800c7080 80010007 800e0080
08:01:24 ipsec,debug,packet 80030001 80020005 80040002 03000024 08010000 800b0001 800c7080 80010007
08:01:24 ipsec,debug,packet 800e0080 80030001 80020004 80040002 03000024 09010000 800b0001 800c7080
08:01:24 ipsec,debug,packet 80010007 800e0080 80030001 80020002 80040002 03000024 0a010000 800b0001
08:01:24 ipsec,debug,packet 800c7080 80010007 800e0080 80030001 80020001 80040002 03000020 0b010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010005 80030001 80020004 80040002 03000020 0c010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010005 80030001 80020002 80040002 03000020 0d010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010005 80030001 80020001 80040002 03000020 0e010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010001 80030001 80020004 80040002 03000020 0f010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010001 80030001 80020002 80040002 00000020 10010000
08:01:24 ipsec,debug,packet 800b0001 800c7080 80010001 80030001 80020001 80040002 0d000014 4a131c81
08:01:24 ipsec,debug,packet 07035845 5c5728f2 0e95452f 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448
08:01:24 ipsec,debug,packet 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014 4485152d 18b6bbcd
08:01:24 ipsec,debug,packet 0be8a846 9579ddcc 0d000018 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
08:01:24 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
08:01:24 ipsec,debug ===
08:01:24 ipsec,info respond new phase 1 (Identity Protection): ROUTER-IP[500]<=>PHONE-IP[47940]
08:01:24 ipsec,debug begin.
08:01:24 ipsec,debug seen nptype=1(sa) len=572
08:01:24 ipsec,debug seen nptype=13(vid) len=20
08:01:24 ipsec,debug seen nptype=13(vid) len=20
08:01:24 ipsec,debug seen nptype=13(vid) len=20
08:01:24 ipsec,debug seen nptype=13(vid) len=20
08:01:24 ipsec,debug seen nptype=13(vid) len=24
08:01:24 ipsec,debug seen nptype=13(vid) len=20
08:01:24 ipsec,debug succeed.
08:01:24 ipsec received Vendor ID: RFC 3947
08:01:24 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
08:01:24 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n
08:01:24 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
08:01:24 ipsec received long Microsoft ID: FRAGMENTATION
08:01:24 ipsec Fragmentation enabled
08:01:24 ipsec received Vendor ID: DPD
08:01:24 ipsec,debug remote supports DPD
08:01:24 ipsec PHONE-IP Selected NAT-T version: RFC 3947
08:01:24 ipsec,debug total SA len=568
08:01:24 ipsec,debug 00000001 00000001 00000230 01010010 03000024 01010000 800b0001 800c7080
08:01:24 ipsec,debug 80010007 800e0100 80030001 80020005 80040002 03000024 02010000 800b0001
08:01:24 ipsec,debug 800c7080 80010007 800e0100 80030001 80020004 80040002 03000024 03010000
08:01:24 ipsec,debug 800b0001 800c7080 80010007 800e0100 80030001 80020006 80040002 03000024
08:01:24 ipsec,debug 04010000 800b0001 800c7080 80010007 800e0100 80030001 80020002 80040002
08:01:24 ipsec,debug 03000024 05010000 800b0001 800c7080 80010007 800e0100 80030001 80020001
08:01:24 ipsec,debug 80040002 03000024 06010000 800b0001 800c7080 80010007 800e0080 80030001
08:01:24 ipsec,debug 80020006 80040002 03000024 07010000 800b0001 800c7080 80010007 800e0080
08:01:24 ipsec,debug 80030001 80020005 80040002 03000024 08010000 800b0001 800c7080 80010007
08:01:24 ipsec,debug 800e0080 80030001 80020004 80040002 03000024 09010000 800b0001 800c7080
08:01:24 ipsec,debug 80010007 800e0080 80030001 80020002 80040002 03000024 0a010000 800b0001
08:01:24 ipsec,debug 800c7080 80010007 800e0080 80030001 80020001 80040002 03000020 0b010000
08:01:24 ipsec,debug 800b0001 800c7080 80010005 80030001 80020004 80040002 03000020 0c010000
08:01:24 ipsec,debug 800b0001 800c7080 80010005 80030001 80020002 80040002 03000020 0d010000
08:01:24 ipsec,debug 800b0001 800c7080 80010005 80030001 80020001 80040002 03000020 0e010000
08:01:24 ipsec,debug 800b0001 800c7080 80010001 80030001 80020004 80040002 03000020 0f010000
08:01:24 ipsec,debug 800b0001 800c7080 80010001 80030001 80020002 80040002 00000020 10010000
08:01:24 ipsec,debug 800b0001 800c7080 80010001 80030001 80020001 80040002
08:01:24 ipsec,debug begin.
08:01:24 ipsec,debug seen nptype=2(prop) len=560
08:01:24 ipsec,debug succeed.
08:01:24 ipsec,debug proposal #1 len=560
08:01:24 ipsec,debug begin.
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=36
08:01:24 ipsec,debug seen nptype=3(trns) len=32
08:01:24 ipsec,debug seen nptype=3(trns) len=32
08:01:24 ipsec,debug seen nptype=3(trns) len=32
08:01:24 ipsec,debug seen nptype=3(trns) len=32
08:01:24 ipsec,debug seen nptype=3(trns) len=32
08:01:24 ipsec,debug seen nptype=3(trns) len=32
08:01:24 ipsec,debug succeed.
08:01:24 ipsec,debug transform #1 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=5
08:01:24 ipsec invalied hash algorithm=5.
08:01:24 ipsec,debug transform #2 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
08:01:24 ipsec,debug hash(sha2_256)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #3 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=6
08:01:24 ipsec,debug hash(sha2_512)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #4 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #5 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
08:01:24 ipsec,debug hash(md5)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #6 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=6
08:01:24 ipsec,debug hash(sha2_512)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #7 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=5
08:01:24 ipsec invalied hash algorithm=5.
08:01:24 ipsec,debug transform #8 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
08:01:24 ipsec,debug hash(sha2_256)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #9 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #10 len=36
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
08:01:24 ipsec,debug hash(md5)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #11 len=32
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
08:01:24 ipsec,debug encryption(3des)
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
08:01:24 ipsec,debug hash(sha2_256)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #12 len=32
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
08:01:24 ipsec,debug encryption(3des)
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #13 len=32
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC
08:01:24 ipsec,debug encryption(3des)
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
08:01:24 ipsec,debug hash(md5)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #14 len=32
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
08:01:24 ipsec,debug encryption(des)
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
08:01:24 ipsec,debug hash(sha2_256)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #15 len=32
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
08:01:24 ipsec,debug encryption(des)
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug transform #16 len=32
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=DES-CBC
08:01:24 ipsec,debug encryption(des)
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=MD5
08:01:24 ipsec,debug hash(md5)
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug pair 1:
08:01:24 ipsec,debug 0x209528: next=(nil) tnext=0x88408
08:01:24 ipsec,debug 0x88408: next=(nil) tnext=0x1eb160
08:01:24 ipsec,debug 0x1eb160: next=(nil) tnext=0x1eb178
08:01:24 ipsec,debug 0x1eb178: next=(nil) tnext=0x1eb0c0
08:01:24 ipsec,debug 0x1eb0c0: next=(nil) tnext=0x1eb0d8
08:01:24 ipsec,debug 0x1eb0d8: next=(nil) tnext=0x212f48
08:01:24 ipsec,debug 0x212f48: next=(nil) tnext=0x212f60
08:01:24 ipsec,debug 0x212f60: next=(nil) tnext=0x212f78
08:01:24 ipsec,debug 0x212f78: next=(nil) tnext=0x212f90
08:01:24 ipsec,debug 0x212f90: next=(nil) tnext=0x2046a0
08:01:24 ipsec,debug 0x2046a0: next=(nil) tnext=0x2046b8
08:01:24 ipsec,debug 0x2046b8: next=(nil) tnext=0x2046d0
08:01:24 ipsec,debug 0x2046d0: next=(nil) tnext=0x2046e8
08:01:24 ipsec,debug 0x2046e8: next=(nil) tnext=(nil)
08:01:24 ipsec,debug proposal #1: 14 transform
08:01:24 ipsec,debug -checking with pre-shared key auth-
08:01:24 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=16
08:01:24 ipsec,debug trns#=2, trns-id=IKE
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #1: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = AES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 256:256)
08:01:24 ipsec,debug hashtype = SHA:4
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #2: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = AES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 256:256)
08:01:24 ipsec,debug hashtype = SHA:4
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #3: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = 3DES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 0:256)
08:01:24 ipsec,debug hashtype = SHA:4
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #4: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = 3DES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 0:256)
08:01:24 ipsec,debug hashtype = SHA:4
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=16
08:01:24 ipsec,debug trns#=3, trns-id=IKE
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=6
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #1: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = AES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 256:256)
08:01:24 ipsec,debug hashtype = SHA:6
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #2: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = AES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 256:256)
08:01:24 ipsec,debug hashtype = SHA:6
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #3: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = 3DES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 0:256)
08:01:24 ipsec,debug hashtype = SHA:6
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #4: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = 3DES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 0:256)
08:01:24 ipsec,debug hashtype = SHA:6
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=16
08:01:24 ipsec,debug trns#=4, trns-id=IKE
08:01:24 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
08:01:24 ipsec,debug type=Life Duration, flag=0x8000, lorv=28800
08:01:24 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
08:01:24 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:24 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
08:01:24 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA
08:01:24 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #1: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = AES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 256:256)
08:01:24 ipsec,debug hashtype = SHA:SHA
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -compare proposal #2: Local:Peer
08:01:24 ipsec,debug (lifetime = 86400:28800)
08:01:24 ipsec,debug (lifebyte = 0:0)
08:01:24 ipsec,debug enctype = AES-CBC:AES-CBC
08:01:24 ipsec,debug (encklen = 256:256)
08:01:24 ipsec,debug hashtype = SHA:SHA
08:01:24 ipsec,debug authmethod = pre-shared key:pre-shared key
08:01:24 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group
08:01:24 ipsec,debug -an acceptable proposal found-
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug -agreed on pre-shared key auth-
08:01:24 ipsec,debug ===
08:01:24 ipsec,debug new cookie:
08:01:24 ipsec,debug 8916a29a2614ded1\01
08:01:24 ipsec,debug add payload of len 52, next type 13
08:01:24 ipsec,debug add payload of len 16, next type 13
08:01:24 ipsec,debug add payload of len 16, next type 13
08:01:24 ipsec,debug add payload of len 20, next type 0
08:01:24 ipsec,debug 148 bytes from ROUTER-IP[500] to PHONE-IP[47940]
08:01:24 ipsec,debug 1 times of 148 bytes message will be sent to PHONE-IP[47940]
08:01:24 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 01100200 00000000 00000094 0d000038
08:01:24 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 800c7080
08:01:24 ipsec,debug,packet 80010007 800e0100 80030001 80020002 80040002 0d000014 4a131c81 07035845
08:01:24 ipsec,debug,packet 5c5728f2 0e95452f 0d000014 afcad713 68a1f1c9 6b8696fc 77570100 00000018
08:01:24 ipsec,debug,packet 4048b7d5 6ebce885 25e7de7f 00d6c2d3 80000000
08:01:24 ipsec sent phase1 packet ROUTER-IP[500]<=>PHONE-IP[47940] eacda968633ab46e:8916a29a2614ded1
08:01:24 ipsec,debug ===== received 228 bytes from PHONE-IP[47940] to ROUTER-IP[500]
08:01:24 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 04100200 00000000 000000e4 0a000084
08:01:24 ipsec,debug,packet c934dd22 65544f64 01e71804 9dff7463 3f0ebdbd 52061a1d 5f7c7f22 42cf40ad
08:01:24 ipsec,debug,packet 14548b4b 5694a6c5 515e2f05 be065501 76e5b05b ab6570e4 2dac866b 92f341c4
08:01:24 ipsec,debug,packet 201c2833 a572c82f a9603be1 c416fa54 8762a5d6 00f23689 c4678963 26893ec3
08:01:24 ipsec,debug,packet 3233b1b1 93a83a96 d2f89e8b fd3e050e 89ebcea0 d6f37dca 89ce6c5f b518aaf9
08:01:24 ipsec,debug,packet 14000014 f3740f6f 657e6542 d47cc4f9 60993258 14000018 41aad3a9 e2c3dd79
08:01:24 ipsec,debug,packet 8966b7dc 00cb5a82 f83d3172 00000018 dd5bdf59 6ae8e999 390d2593 c076ed60
08:01:24 ipsec,debug,packet 65def750
08:01:24 ipsec,debug begin.
08:01:24 ipsec,debug seen nptype=4(ke) len=132
08:01:24 ipsec,debug seen nptype=10(nonce) len=20
08:01:24 ipsec,debug seen nptype=20(nat-d) len=24
08:01:24 ipsec,debug seen nptype=20(nat-d) len=24
08:01:24 ipsec,debug succeed.
08:01:24 ipsec ROUTER-IP Hashing ROUTER-IP[500] with algo #2
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec NAT-D payload #0 verified
08:01:24 ipsec PHONE-IP Hashing PHONE-IP[47940] with algo #2
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec NAT-D payload #1 doesn't match
08:01:24 ipsec NAT detected: PEER
08:01:24 ipsec,debug ===
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug compute DH's private.
08:01:24 ipsec,debug 5646f4dd 2ba2f293 210dad12 4adfa212 29052a8c 01f14828 441225b1 a2ff3681
08:01:24 ipsec,debug ee0f64a8 b59b6972 98df889b 323c994f a6966563 4e90b42d 21d4ffd4 c647e5ea
08:01:24 ipsec,debug 361227ac e2de81b5 68bdcf1b d155388f 5efb7de2 e830d204 134b6e7c 92890ac5
08:01:24 ipsec,debug babaf3f3 f34473d5 43343db6 2779b500 331cd2e6 b0315cea c9f9002e 3f0579ab
08:01:24 ipsec,debug compute DH's public.
08:01:24 ipsec,debug 98e98c9f 13cc7456 82d86bb8 ca4a3481 e584225e b7d00673 d269ba6a 6ccb5adc
08:01:24 ipsec,debug 92bb5de6 5dea2c9b 234e0c11 0ae137f2 064470b3 f4cb2955 d7a79e6f dc517276
08:01:24 ipsec,debug 66a5e20d 795c1d4e 2de0abab cafb5827 b9f37b66 31aba6ae 7fb0008d 0a28b151
08:01:24 ipsec,debug 3f57ce93 208f8d6e ed07b128 fae10d50 6a41da85 55ec0cef 9fbc8270 6e603e57
08:01:24 ipsec PHONE-IP Hashing PHONE-IP[47940] with algo #2
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec ROUTER-IP Hashing ROUTER-IP[500] with algo #2
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec Adding remote and local NAT-D payloads.
08:01:24 ipsec,debug add payload of len 128, next type 10
08:01:24 ipsec,debug add payload of len 24, next type 20
08:01:24 ipsec,debug add payload of len 20, next type 20
08:01:24 ipsec,debug add payload of len 20, next type 0
08:01:24 ipsec,debug 236 bytes from ROUTER-IP[500] to PHONE-IP[47940]
08:01:24 ipsec,debug 1 times of 236 bytes message will be sent to PHONE-IP[47940]
08:01:24 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 04100200 00000000 000000ec 0a000084
08:01:24 ipsec,debug,packet 98e98c9f 13cc7456 82d86bb8 ca4a3481 e584225e b7d00673 d269ba6a 6ccb5adc
08:01:24 ipsec,debug,packet 92bb5de6 5dea2c9b 234e0c11 0ae137f2 064470b3 f4cb2955 d7a79e6f dc517276
08:01:24 ipsec,debug,packet 66a5e20d 795c1d4e 2de0abab cafb5827 b9f37b66 31aba6ae 7fb0008d 0a28b151
08:01:24 ipsec,debug,packet 3f57ce93 208f8d6e ed07b128 fae10d50 6a41da85 55ec0cef 9fbc8270 6e603e57
08:01:24 ipsec,debug,packet 1400001c bcd3376d c257018d 40d3417e 3b1ecc9e 72fea42c 08bcff48 14000018
08:01:24 ipsec,debug,packet fb45b6c1 2bd38a1b 62c86191 dc0120df d56678e3 00000018 41aad3a9 e2c3dd79
08:01:24 ipsec,debug,packet 8966b7dc 00cb5a82 f83d3172
08:01:24 ipsec sent phase1 packet ROUTER-IP[500]<=>PHONE-IP[47940] eacda968633ab46e:8916a29a2614ded1
08:01:24 ipsec,debug dh(modp1024)
08:01:24 ipsec,debug compute DH's shared.
08:01:24 ipsec,debug
08:01:24 ipsec,debug 0ed91e55 3d64b050 c502f154 d5ce0a62 b8368130 b22584af 7628cf1d 3c831c06
08:01:24 ipsec,debug 67161d89 2fb86399 49d75793 61ea1ab6 c86ba803 5ee75edd 6865c6e3 6266c0b6
08:01:24 ipsec,debug f3fea375 20211443 99e8f86e 16dabb46 24aa5008 b4b8d382 44cbfe2f c501b4db
08:01:24 ipsec,debug bc58c03b e635b9af b2ac56cd 6e4e64ce c67f22e1 fd6e56fb aca474f4 8bc91175
08:01:24 ipsec,debug nonce 1:
08:01:24 ipsec,debug f3740f6f 657e6542 d47cc4f9 60993258
08:01:24 ipsec,debug nonce 2:
08:01:24 ipsec,debug bcd3376d c257018d 40d3417e 3b1ecc9e 72fea42c 08bcff48
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug SKEYID computed:
08:01:24 ipsec,debug 77af2edc aeac96a9 91160a14 db498284 5cf75f68
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug SKEYID_d computed:
08:01:24 ipsec,debug b6f9dc2c 209d19db 828ba0b5 55e7a25b 46f041a9
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug SKEYID_a computed:
08:01:24 ipsec,debug fd57ea0f 4d00c87f 52e15eda 6e636295 edf85eb8
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug SKEYID_e computed:
08:01:24 ipsec,debug 4b97d43d 03c8c13f d0364735 5f17eb8c a26ae61a
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...)
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug compute intermediate encryption key K1
08:01:24 ipsec,debug 00
08:01:24 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug compute intermediate encryption key K2
08:01:24 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb
08:01:24 ipsec,debug d30f6ffa c4594fbb 4fba873e deedc982 af45535f
08:01:24 ipsec,debug final encryption key computed:
08:01:24 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug IV computed:
08:01:24 ipsec,debug 2ab5fc6c 82a1fd85 ea82b81e c1d75e80
08:01:24 ipsec,debug ===== received 92 bytes from PHONE-IP[13642] to ROUTER-IP[4500]
08:01:24 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 05100201 00000000 0000005c 4c0aeaf0
08:01:24 ipsec,debug,packet c73847d5 0a7134b8 4d993d6f 6a652b79 f94fc3da 4d01c9b8 8baa102d 1d3380a5
08:01:24 ipsec,debug,packet 4de05fef 5bc57978 863318ec 5fd7d3ae 6c9d5c27 e69f8635 bf9a4bff
08:01:24 ipsec NAT-T: ports changed to: PHONE-IP[13642]<=>ROUTER-IP[4500]
08:01:24 ipsec KA list add: ROUTER-IP[4500]->PHONE-IP[13642]
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug IV was saved for next processing:
08:01:24 ipsec,debug 5fd7d3ae 6c9d5c27 e69f8635 bf9a4bff
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug with key:
08:01:24 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:24 ipsec,debug decrypted payload by IV:
08:01:24 ipsec,debug 2ab5fc6c 82a1fd85 ea82b81e c1d75e80
08:01:24 ipsec,debug decrypted payload, but not trimed.
08:01:24 ipsec,debug 0800000c 011101f4 0a19980c 00000018 79a48182 95b85517 df9a47b9 8b36b83d
08:01:24 ipsec,debug a615835a 95f6bcb7 e9a7f6af fa9480a5 9bd29cdf b8d59fae dec5e1c6 83cf811b
08:01:24 ipsec,debug padding len=28
08:01:24 ipsec,debug skip to trim padding.
08:01:24 ipsec,debug decrypted.
08:01:24 ipsec,debug eacda968 633ab46e 8916a29a 2614ded1 05100201 00000000 0000005c 0800000c
08:01:24 ipsec,debug 011101f4 0a19980c 00000018 79a48182 95b85517 df9a47b9 8b36b83d a615835a
08:01:24 ipsec,debug 95f6bcb7 e9a7f6af fa9480a5 9bd29cdf b8d59fae dec5e1c6 83cf811b
08:01:24 ipsec,debug begin.
08:01:24 ipsec,debug seen nptype=5(id) len=12
08:01:24 ipsec,debug seen nptype=8(hash) len=24
08:01:24 ipsec,debug succeed.
08:01:24 ipsec,debug HASH received:
08:01:24 ipsec,debug 79a48182 95b85517 df9a47b9 8b36b83d a615835a
08:01:24 ipsec,debug HASH with:
08:01:24 ipsec,debug c934dd22 65544f64 01e71804 9dff7463 3f0ebdbd 52061a1d 5f7c7f22 42cf40ad
08:01:24 ipsec,debug 14548b4b 5694a6c5 515e2f05 be065501 76e5b05b ab6570e4 2dac866b 92f341c4
08:01:24 ipsec,debug 201c2833 a572c82f a9603be1 c416fa54 8762a5d6 00f23689 c4678963 26893ec3
08:01:24 ipsec,debug 3233b1b1 93a83a96 d2f89e8b fd3e050e 89ebcea0 d6f37dca 89ce6c5f b518aaf9
08:01:24 ipsec,debug 98e98c9f 13cc7456 82d86bb8 ca4a3481 e584225e b7d00673 d269ba6a 6ccb5adc
08:01:24 ipsec,debug 92bb5de6 5dea2c9b 234e0c11 0ae137f2 064470b3 f4cb2955 d7a79e6f dc517276
08:01:24 ipsec,debug 66a5e20d 795c1d4e 2de0abab cafb5827 b9f37b66 31aba6ae 7fb0008d 0a28b151
08:01:24 ipsec,debug 3f57ce93 208f8d6e ed07b128 fae10d50 6a41da85 55ec0cef 9fbc8270 6e603e57
08:01:24 ipsec,debug eacda968 633ab46e 8916a29a 2614ded1 00000001 00000001 00000230 01010010
08:01:24 ipsec,debug 03000024 01010000 800b0001 800c7080 80010007 800e0100 80030001 80020005
08:01:24 ipsec,debug 80040002 03000024 02010000 800b0001 800c7080 80010007 800e0100 80030001
08:01:24 ipsec,debug 80020004 80040002 03000024 03010000 800b0001 800c7080 80010007 800e0100
08:01:24 ipsec,debug 80030001 80020006 80040002 03000024 04010000 800b0001 800c7080 80010007
08:01:24 ipsec,debug 800e0100 80030001 80020002 80040002 03000024 05010000 800b0001 800c7080
08:01:24 ipsec,debug 80010007 800e0100 80030001 80020001 80040002 03000024 06010000 800b0001
08:01:24 ipsec,debug 800c7080 80010007 800e0080 80030001 80020006 80040002 03000024 07010000
08:01:24 ipsec,debug 800b0001 800c7080 80010007 800e0080 80030001 80020005 80040002 03000024
08:01:24 ipsec,debug 08010000 800b0001 800c7080 80010007 800e0080 80030001 80020004 80040002
08:01:24 ipsec,debug 03000024 09010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
08:01:24 ipsec,debug 80040002 03000024 0a010000 800b0001 800c7080 80010007 800e0080 80030001
08:01:24 ipsec,debug 80020001 80040002 03000020 0b010000 800b0001 800c7080 80010005 80030001
08:01:24 ipsec,debug 80020004 80040002 03000020 0c010000 800b0001 800c7080 80010005 80030001
08:01:24 ipsec,debug 80020002 80040002 03000020 0d010000 800b0001 800c7080 80010005 80030001
08:01:24 ipsec,debug 80020001 80040002 03000020 0e010000 800b0001 800c7080 80010001 80030001
08:01:24 ipsec,debug 80020004 80040002 03000020 0f010000 800b0001 800c7080 80010001 80030001
08:01:24 ipsec,debug 80020002 80040002 00000020 10010000 800b0001 800c7080 80010001 80030001
08:01:24 ipsec,debug 80020001 80040002 011101f4 0a19980c
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug HASH computed:
08:01:24 ipsec,debug 79a48182 95b85517 df9a47b9 8b36b83d a615835a
08:01:24 ipsec,debug HASH for PSK validated.
08:01:24 ipsec,debug PHONE-IP peer's ID
08:01:24 ipsec,debug 011101f4 0a19980c
08:01:24 ipsec,debug ===
08:01:24 ipsec,debug use ID type of IPv4_address
08:01:24 ipsec,debug generate HASH_R
08:01:24 ipsec,debug HASH with:
08:01:24 ipsec,debug 98e98c9f 13cc7456 82d86bb8 ca4a3481 e584225e b7d00673 d269ba6a 6ccb5adc
08:01:24 ipsec,debug 92bb5de6 5dea2c9b 234e0c11 0ae137f2 064470b3 f4cb2955 d7a79e6f dc517276
08:01:24 ipsec,debug 66a5e20d 795c1d4e 2de0abab cafb5827 b9f37b66 31aba6ae 7fb0008d 0a28b151
08:01:24 ipsec,debug 3f57ce93 208f8d6e ed07b128 fae10d50 6a41da85 55ec0cef 9fbc8270 6e603e57
08:01:24 ipsec,debug c934dd22 65544f64 01e71804 9dff7463 3f0ebdbd 52061a1d 5f7c7f22 42cf40ad
08:01:24 ipsec,debug 14548b4b 5694a6c5 515e2f05 be065501 76e5b05b ab6570e4 2dac866b 92f341c4
08:01:24 ipsec,debug 201c2833 a572c82f a9603be1 c416fa54 8762a5d6 00f23689 c4678963 26893ec3
08:01:24 ipsec,debug 3233b1b1 93a83a96 d2f89e8b fd3e050e 89ebcea0 d6f37dca 89ce6c5f b518aaf9
08:01:24 ipsec,debug 8916a29a 2614ded1 eacda968 633ab46e 00000001 00000001 00000230 01010010
08:01:24 ipsec,debug 03000024 01010000 800b0001 800c7080 80010007 800e0100 80030001 80020005
08:01:24 ipsec,debug 80040002 03000024 02010000 800b0001 800c7080 80010007 800e0100 80030001
08:01:24 ipsec,debug 80020004 80040002 03000024 03010000 800b0001 800c7080 80010007 800e0100
08:01:24 ipsec,debug 80030001 80020006 80040002 03000024 04010000 800b0001 800c7080 80010007
08:01:24 ipsec,debug 800e0100 80030001 80020002 80040002 03000024 05010000 800b0001 800c7080
08:01:24 ipsec,debug 80010007 800e0100 80030001 80020001 80040002 03000024 06010000 800b0001
08:01:24 ipsec,debug 800c7080 80010007 800e0080 80030001 80020006 80040002 03000024 07010000
08:01:24 ipsec,debug 800b0001 800c7080 80010007 800e0080 80030001 80020005 80040002 03000024
08:01:24 ipsec,debug 08010000 800b0001 800c7080 80010007 800e0080 80030001 80020004 80040002
08:01:24 ipsec,debug 03000024 09010000 800b0001 800c7080 80010007 800e0080 80030001 80020002
08:01:24 ipsec,debug 80040002 03000024 0a010000 800b0001 800c7080 80010007 800e0080 80030001
08:01:24 ipsec,debug 80020001 80040002 03000020 0b010000 800b0001 800c7080 80010005 80030001
08:01:24 ipsec,debug 80020004 80040002 03000020 0c010000 800b0001 800c7080 80010005 80030001
08:01:24 ipsec,debug 80020002 80040002 03000020 0d010000 800b0001 800c7080 80010005 80030001
08:01:24 ipsec,debug 80020001 80040002 03000020 0e010000 800b0001 800c7080 80010001 80030001
08:01:24 ipsec,debug 80020004 80040002 03000020 0f010000 800b0001 800c7080 80010001 80030001
08:01:24 ipsec,debug 80020002 80040002 00000020 10010000 800b0001 800c7080 80010001 80030001
08:01:24 ipsec,debug 80020001 80040002 011101f4 c60f07db
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug HASH computed:
08:01:24 ipsec,debug 0f012cd3 7500a23a 40c30389 c8004b7c eb369fbd
08:01:24 ipsec,debug add payload of len 8, next type 8
08:01:24 ipsec,debug add payload of len 20, next type 0
08:01:24 ipsec,debug begin encryption.
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug pad length = 12
08:01:24 ipsec,debug 0800000c 011101f4 c60f07db 00000018 0f012cd3 7500a23a 40c30389 c8004b7c
08:01:24 ipsec,debug eb369fbd fcdfecd7 bcfcd4f8 e9dcae0b
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug with key:
08:01:24 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:24 ipsec,debug encrypted payload by IV:
08:01:24 ipsec,debug 5fd7d3ae 6c9d5c27 e69f8635 bf9a4bff
08:01:24 ipsec,debug save IV for next:
08:01:24 ipsec,debug 85c0b38c 29284d1b 4f3e132d 92560411
08:01:24 ipsec,debug encrypted.
08:01:24 ipsec,debug 76 bytes from ROUTER-IP[4500] to PHONE-IP[13642]
08:01:24 ipsec,debug 1 times of 80 bytes message will be sent to PHONE-IP[13642]
08:01:24 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 05100201 00000000 0000004c d158ef25
08:01:24 ipsec,debug,packet 4f20847f 532a3e8c 30fe3190 6159c239 5ba02959 25c4388d 6884474e 85c0b38c
08:01:24 ipsec,debug,packet 29284d1b 4f3e132d 92560411
08:01:24 ipsec,info ISAKMP-SA established ROUTER-IP[4500]-PHONE-IP[13642] spi:eacda968633ab46e:8916a29a2614ded1
08:01:24 ipsec,debug ===
08:01:24 ipsec,debug ===== received 108 bytes from PHONE-IP[13642] to ROUTER-IP[4500]
08:01:24 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 08100501 eb2d3ae5 0000006c 424eac8e
08:01:24 ipsec,debug,packet e4bc501b 4afdeacd ccd039d4 a66e6290 81de28fe 753e5159 4186596d 437840bd
08:01:24 ipsec,debug,packet bea05aac 606427bb 27207ff8 54979e4c eba1264d bde3412a 4d4ce544 bac8b2d0
08:01:24 ipsec,debug,packet 609d724b 99d8a321 0e7ef96c
08:01:24 ipsec,debug receive Information.
08:01:24 ipsec,debug compute IV for phase2
08:01:24 ipsec,debug phase1 last IV:
08:01:24 ipsec,debug 85c0b38c 29284d1b 4f3e132d 92560411 eb2d3ae5
08:01:24 ipsec,debug hash(sha1)
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug phase2 IV computed:
08:01:24 ipsec,debug 9ed7fbea 96026c97 3a5297d5 03d6642b
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug IV was saved for next processing:
08:01:24 ipsec,debug bac8b2d0 609d724b 99d8a321 0e7ef96c
08:01:24 ipsec,debug encryption(aes)
08:01:24 ipsec,debug with key:
08:01:24 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:24 ipsec,debug decrypted payload by IV:
08:01:24 ipsec,debug 9ed7fbea 96026c97 3a5297d5 03d6642b
08:01:24 ipsec,debug decrypted payload, but not trimed.
08:01:24 ipsec,debug 0b000018 3b16fc87 89f14440 64fea29a 7902030d bcd327c6 0000001c 00000001
08:01:24 ipsec,debug 01106002 eacda968 633ab46e 8916a29a 2614ded1 cca0bac3 b6a8ede0 9e83b7f0
08:01:24 ipsec,debug d0f992dc eec2d489 889ea0eb a5e3ff1b
08:01:24 ipsec,debug padding len=28
08:01:24 ipsec,debug skip to trim padding.
08:01:24 ipsec,debug decrypted.
08:01:24 ipsec,debug eacda968 633ab46e 8916a29a 2614ded1 08100501 eb2d3ae5 0000006c 0b000018
08:01:24 ipsec,debug 3b16fc87 89f14440 64fea29a 7902030d bcd327c6 0000001c 00000001 01106002
08:01:24 ipsec,debug eacda968 633ab46e 8916a29a 2614ded1 cca0bac3 b6a8ede0 9e83b7f0 d0f992dc
08:01:24 ipsec,debug eec2d489 889ea0eb a5e3ff1b
08:01:24 ipsec,debug HASH with:
08:01:24 ipsec,debug eb2d3ae5 0000001c 00000001 01106002 eacda968 633ab46e 8916a29a 2614ded1
08:01:24 ipsec,debug hmac(hmac_sha1)
08:01:24 ipsec,debug HASH computed:
08:01:24 ipsec,debug 3b16fc87 89f14440 64fea29a 7902030d bcd327c6
08:01:24 ipsec,debug hash validated.
08:01:24 ipsec,debug begin.
08:01:24 ipsec,debug seen nptype=8(hash) len=24
08:01:24 ipsec,debug seen nptype=11(notify) len=28
08:01:24 ipsec,debug succeed.
08:01:24 ipsec,debug PHONE-IP notify: INITIAL-CONTACT
08:01:25 ipsec,debug ===== received 668 bytes from PHONE-IP[13642] to ROUTER-IP[4500]
08:01:25 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 08102001 c096b477 0000029c 7e2c2f87
08:01:25 ipsec,debug,packet 7bbaa137 1869ee1c aa98d7eb b2e20daa 9005d883 bcca5d0e 70742733 f3b178af
08:01:25 ipsec,debug,packet f4c5eaa2 27bcfa8c b4ea8bea d7af6a2b ff5e0e36 6157a851 f92a68e3 6f67ba63
08:01:25 ipsec,debug,packet 7c78d703 3ed2f34f 8df7b531 01ecd595 87ace6fa ca383427 f0980fe4 ee719fab
08:01:25 ipsec,debug,packet c18d1aed a50b4a09 97f0abba 62087682 87589e63 490fd4db 11a5e96a 7ad65279
08:01:25 ipsec,debug,packet 15caf1e1 c75b9361 07813489 895dad79 d09f080c aab76a6e 88e6236a 1a21fa8b
08:01:25 ipsec,debug,packet 1a2ac71b f004c51f 05e32ead 763772bb c19e6c23 3c69f971 af387384 8fcaae7f
08:01:25 ipsec,debug,packet f49b0560 9b5c1ab4 c39657be 3c019bca 5ed7602a 360085d1 9c211d4a f8a8424f
08:01:25 ipsec,debug,packet 13ea462c 2ee9c8da ae5b4e54 e7165d9c 569190bf 79bb7a92 fa2e3561 2f934b28
08:01:25 ipsec,debug,packet af550155 e2a970ac a40c4b61 f1b843f7 641c35c7 4f3a906e 00deded9 fe79ff20
08:01:25 ipsec,debug,packet 200ba64c 8ea03e43 f00a0529 fa45181a f18380ae 5a18561a 93a9814a b8a176e6
08:01:25 ipsec,debug,packet 29baa8a9 1386e524 d8d2c36b a97a0e2a 9528ac5c cb17aac7 9610c92f e818e355
08:01:25 ipsec,debug,packet 6fa07099 784be3d3 16989c19 6f9c870a ca520a4e b849a870 2b1f72b1 348f0d1b
08:01:25 ipsec,debug,packet e2b6e722 3780b1e5 a8043788 3a2dfc15 5ec7b46b c9a7b515 9384b806 b6f84e33
08:01:25 ipsec,debug,packet 64a2ccf7 fc16e0c0 5e74a7fe 60c60de7 e17dbde2 ccc04a14 f12fcd2e ff220da3
08:01:25 ipsec,debug,packet 6a980d07 3041808f e5242dc1 781f7657 02252090 8927bd81 2230d7e6 8dda18d5
08:01:25 ipsec,debug,packet 0fc26902 6f831e1c 1303985f d6e2c973 aa2aa16a 1c4d3fd4 5be77e27 e99d2549
08:01:25 ipsec,debug,packet c0164edc 9fd6307c ec9b2813 a21591c0 09ef6d2a 38d874c8 0b48c068 e79c82b8
08:01:25 ipsec,debug,packet 7d0eda07 da8d0d8b 0870f268 f91a4591 91d67b6b 285a7bdd 7f635ae1 cc4f2f7d
08:01:25 ipsec,debug,packet f2d8af95 8d72dc84 fcdfb86c 0a912c95 9c115980 1b43e1eb 0de7f310 dfc3857b
08:01:25 ipsec,debug,packet 81784b53 9fa8b181 9ba90723 c8ae00cb 76e0dcc5 5bcf2922 b257893b
08:01:25 ipsec,debug compute IV for phase2
08:01:25 ipsec,debug phase1 last IV:
08:01:25 ipsec,debug 85c0b38c 29284d1b 4f3e132d 92560411 c096b477
08:01:25 ipsec,debug hash(sha1)
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug phase2 IV computed:
08:01:25 ipsec,debug 7481036f 5a4f31ca 6b8a683c 811c1873
08:01:25 ipsec,debug ===
08:01:25 ipsec respond new phase 2 negotiation: ROUTER-IP[4500]<=>PHONE-IP[13642]
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug IV was saved for next processing:
08:01:25 ipsec,debug c8ae00cb 76e0dcc5 5bcf2922 b257893b
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug with key:
08:01:25 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:25 ipsec,debug decrypted payload by IV:
08:01:25 ipsec,debug 7481036f 5a4f31ca 6b8a683c 811c1873
08:01:25 ipsec,debug decrypted payload, but not trimed.
08:01:25 ipsec,debug 01000018 b6b64892 62029244 04d0f735 0b561cf9 7cf4d195 0a000220 00000001
08:01:25 ipsec,debug 00000001 00000214 01030414 0f0e7207 0300001c 010c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060100 80050007 0300001c 020c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060100 80050006 0300001c 030c0000 80010001 80027080 80040004 80060100
08:01:25 ipsec,debug 80050002 0300001c 040c0000 80010001 80027080 80040004 80060100 80050005
08:01:25 ipsec,debug 0300001c 050c0000 80010001 80027080 80040004 80060100 80050001 0300001c
08:01:25 ipsec,debug 060c0000 80010001 80027080 80040004 80060080 80050007 0300001c 070c0000
08:01:25 ipsec,debug 80010001 80027080 80040004 80060080 80050006 0300001c 080c0000 80010001
08:01:25 ipsec,debug 80027080 80040004 80060080 80050002 0300001c 090c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060080 80050005 0300001c 0a0c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060080 80050001 03000018 0b030000 80010001 80027080 80040004 80050007
08:01:25 ipsec,debug 03000018 0c030000 80010001 80027080 80040004 80050006 03000018 0d030000
08:01:25 ipsec,debug 80010001 80027080 80040004 80050002 03000018 0e030000 80010001 80027080
08:01:25 ipsec,debug 80040004 80050005 03000018 0f030000 80010001 80027080 80040004 80050001
08:01:25 ipsec,debug 03000018 10020000 80010001 80027080 80040004 80050007 03000018 11020000
08:01:25 ipsec,debug 80010001 80027080 80040004 80050006 03000018 12020000 80010001 80027080
08:01:25 ipsec,debug 80040004 80050002 03000018 13020000 80010001 80027080 80040004 80050005
08:01:25 ipsec,debug 00000018 14020000 80010001 80027080 80040004 80050001 05000014 9513cba2
08:01:25 ipsec,debug 659bbf33 49387246 5d679ee3 0500000c 01110000 0a19980c 0000000c 011106a5
08:01:25 ipsec,debug c60f07db 90bbb8e0 b1f09fe7 fd8cfdfc adacdba6 dced8eb3 d8ec8ba6 9183931b
08:01:25 ipsec,debug padding len=28
08:01:25 ipsec,debug skip to trim padding.
08:01:25 ipsec,debug decrypted.
08:01:25 ipsec,debug eacda968 633ab46e 8916a29a 2614ded1 08102001 c096b477 0000029c 01000018
08:01:25 ipsec,debug b6b64892 62029244 04d0f735 0b561cf9 7cf4d195 0a000220 00000001 00000001
08:01:25 ipsec,debug 00000214 01030414 0f0e7207 0300001c 010c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060100 80050007 0300001c 020c0000 80010001 80027080 80040004 80060100
08:01:25 ipsec,debug 80050006 0300001c 030c0000 80010001 80027080 80040004 80060100 80050002
08:01:25 ipsec,debug 0300001c 040c0000 80010001 80027080 80040004 80060100 80050005 0300001c
08:01:25 ipsec,debug 050c0000 80010001 80027080 80040004 80060100 80050001 0300001c 060c0000
08:01:25 ipsec,debug 80010001 80027080 80040004 80060080 80050007 0300001c 070c0000 80010001
08:01:25 ipsec,debug 80027080 80040004 80060080 80050006 0300001c 080c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060080 80050002 0300001c 090c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060080 80050005 0300001c 0a0c0000 80010001 80027080 80040004 80060080
08:01:25 ipsec,debug 80050001 03000018 0b030000 80010001 80027080 80040004 80050007 03000018
08:01:25 ipsec,debug 0c030000 80010001 80027080 80040004 80050006 03000018 0d030000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050002 03000018 0e030000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050005 03000018 0f030000 80010001 80027080 80040004 80050001 03000018
08:01:25 ipsec,debug 10020000 80010001 80027080 80040004 80050007 03000018 11020000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050006 03000018 12020000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050002 03000018 13020000 80010001 80027080 80040004 80050005 00000018
08:01:25 ipsec,debug 14020000 80010001 80027080 80040004 80050001 05000014 9513cba2 659bbf33
08:01:25 ipsec,debug 49387246 5d679ee3 0500000c 01110000 0a19980c 0000000c 011106a5 c60f07db
08:01:25 ipsec,debug 90bbb8e0 b1f09fe7 fd8cfdfc adacdba6 dced8eb3 d8ec8ba6 9183931b
08:01:25 ipsec,debug begin.
08:01:25 ipsec,debug seen nptype=8(hash) len=24
08:01:25 ipsec,debug seen nptype=1(sa) len=544
08:01:25 ipsec,debug seen nptype=10(nonce) len=20
08:01:25 ipsec,debug seen nptype=5(id) len=12
08:01:25 ipsec,debug seen nptype=5(id) len=12
08:01:25 ipsec,debug succeed.
08:01:25 ipsec,debug received IDci2:
08:01:25 ipsec,debug 01110000 0a19980c
08:01:25 ipsec,debug received IDcr2:
08:01:25 ipsec,debug 011106a5 c60f07db
08:01:25 ipsec,debug HASH(1) validate:
08:01:25 ipsec,debug b6b64892 62029244 04d0f735 0b561cf9 7cf4d195
08:01:25 ipsec,debug HASH with:
08:01:25 ipsec,debug c096b477 0a000220 00000001 00000001 00000214 01030414 0f0e7207 0300001c
08:01:25 ipsec,debug 010c0000 80010001 80027080 80040004 80060100 80050007 0300001c 020c0000
08:01:25 ipsec,debug 80010001 80027080 80040004 80060100 80050006 0300001c 030c0000 80010001
08:01:25 ipsec,debug 80027080 80040004 80060100 80050002 0300001c 040c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060100 80050005 0300001c 050c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060100 80050001 0300001c 060c0000 80010001 80027080 80040004 80060080
08:01:25 ipsec,debug 80050007 0300001c 070c0000 80010001 80027080 80040004 80060080 80050006
08:01:25 ipsec,debug 0300001c 080c0000 80010001 80027080 80040004 80060080 80050002 0300001c
08:01:25 ipsec,debug 090c0000 80010001 80027080 80040004 80060080 80050005 0300001c 0a0c0000
08:01:25 ipsec,debug 80010001 80027080 80040004 80060080 80050001 03000018 0b030000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050007 03000018 0c030000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050006 03000018 0d030000 80010001 80027080 80040004 80050002 03000018
08:01:25 ipsec,debug 0e030000 80010001 80027080 80040004 80050005 03000018 0f030000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050001 03000018 10020000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050007 03000018 11020000 80010001 80027080 80040004 80050006 03000018
08:01:25 ipsec,debug 12020000 80010001 80027080 80040004 80050002 03000018 13020000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050005 00000018 14020000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050001 05000014 9513cba2 659bbf33 49387246 5d679ee3 0500000c 01110000
08:01:25 ipsec,debug 0a19980c 0000000c 011106a5 c60f07db
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug HASH computed:
08:01:25 ipsec,debug b6b64892 62029244 04d0f735 0b561cf9 7cf4d195
08:01:25 ipsec,debug total SA len=540
08:01:25 ipsec,debug 00000001 00000001 00000214 01030414 0f0e7207 0300001c 010c0000 80010001
08:01:25 ipsec,debug 80027080 80040004 80060100 80050007 0300001c 020c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060100 80050006 0300001c 030c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060100 80050002 0300001c 040c0000 80010001 80027080 80040004 80060100
08:01:25 ipsec,debug 80050005 0300001c 050c0000 80010001 80027080 80040004 80060100 80050001
08:01:25 ipsec,debug 0300001c 060c0000 80010001 80027080 80040004 80060080 80050007 0300001c
08:01:25 ipsec,debug 070c0000 80010001 80027080 80040004 80060080 80050006 0300001c 080c0000
08:01:25 ipsec,debug 80010001 80027080 80040004 80060080 80050002 0300001c 090c0000 80010001
08:01:25 ipsec,debug 80027080 80040004 80060080 80050005 0300001c 0a0c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060080 80050001 03000018 0b030000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050007 03000018 0c030000 80010001 80027080 80040004 80050006 03000018
08:01:25 ipsec,debug 0d030000 80010001 80027080 80040004 80050002 03000018 0e030000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050005 03000018 0f030000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050001 03000018 10020000 80010001 80027080 80040004 80050007 03000018
08:01:25 ipsec,debug 11020000 80010001 80027080 80040004 80050006 03000018 12020000 80010001
08:01:25 ipsec,debug 80027080 80040004 80050002 03000018 13020000 80010001 80027080 80040004
08:01:25 ipsec,debug 80050005 00000018 14020000 80010001 80027080 80040004 80050001
08:01:25 ipsec,debug begin.
08:01:25 ipsec,debug seen nptype=2(prop) len=532
08:01:25 ipsec,debug succeed.
08:01:25 ipsec,debug proposal #1 len=532
08:01:25 ipsec,debug begin.
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug seen nptype=3(trns) len=24
08:01:25 ipsec,debug succeed.
08:01:25 ipsec,debug transform #1 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug transform #2 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=6
08:01:25 ipsec invalid auth algorithm=6.
08:01:25 ipsec,debug transform #3 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug transform #4 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug transform #5 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug transform #6 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug transform #7 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=6
08:01:25 ipsec invalid auth algorithm=6.
08:01:25 ipsec,debug transform #8 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug transform #9 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug transform #10 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug transform #11 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug transform #12 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=6
08:01:25 ipsec invalid auth algorithm=6.
08:01:25 ipsec,debug transform #13 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug transform #14 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug transform #15 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug transform #16 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug transform #17 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=6
08:01:25 ipsec invalid auth algorithm=6.
08:01:25 ipsec,debug transform #18 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug transform #19 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug transform #20 len=24
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug pair 1:
08:01:25 ipsec,debug 0x209718: next=(nil) tnext=0x205318
08:01:25 ipsec,debug 0x205318: next=(nil) tnext=0x205330
08:01:25 ipsec,debug 0x205330: next=(nil) tnext=0x214a08
08:01:25 ipsec,debug 0x214a08: next=(nil) tnext=0x214a20
08:01:25 ipsec,debug 0x214a20: next=(nil) tnext=0x214a38
08:01:25 ipsec,debug 0x214a38: next=(nil) tnext=0x214a50
08:01:25 ipsec,debug 0x214a50: next=(nil) tnext=0x214a68
08:01:25 ipsec,debug 0x214a68: next=(nil) tnext=0x214a80
08:01:25 ipsec,debug 0x214a80: next=(nil) tnext=0x214a98
08:01:25 ipsec,debug 0x214a98: next=(nil) tnext=0x214ab0
08:01:25 ipsec,debug 0x214ab0: next=(nil) tnext=0x214ac8
08:01:25 ipsec,debug 0x214ac8: next=(nil) tnext=0x214ae0
08:01:25 ipsec,debug 0x214ae0: next=(nil) tnext=0x205088
08:01:25 ipsec,debug 0x205088: next=(nil) tnext=0x2050a0
08:01:25 ipsec,debug 0x2050a0: next=(nil) tnext=0x2050b8
08:01:25 ipsec,debug 0x2050b8: next=(nil) tnext=(nil)
08:01:25 ipsec,debug proposal #1: 16 transform
08:01:25 ipsec,debug got the local address from ID payload ROUTER-IP[1701] prefixlen=32 ul_proto=17
08:01:25 ipsec,debug got the peer address from ID payload 10.25.152.12[0] prefixlen=32 ul_proto=17
08:01:25 ipsec,debug updating policy address because of NAT in transport mode
08:01:25 ipsec,debug new peer address PHONE-IP[0]
08:01:25 ipsec searching for policy for selector: ROUTER-IP:1701 ip-proto:17 <=> PHONE-IP ip-proto:17
08:01:25 ipsec generating policy
08:01:25 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=149:149)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
08:01:25 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
08:01:25 ipsec,debug begin compare proposals.
08:01:25 ipsec,debug pair[1]: 0x209718
08:01:25 ipsec,debug 0x209718: next=(nil) tnext=0x205318
08:01:25 ipsec,debug 0x205318: next=(nil) tnext=0x205330
08:01:25 ipsec,debug 0x205330: next=(nil) tnext=0x214a08
08:01:25 ipsec,debug 0x214a08: next=(nil) tnext=0x214a20
08:01:25 ipsec,debug 0x214a20: next=(nil) tnext=0x214a38
08:01:25 ipsec,debug 0x214a38: next=(nil) tnext=0x214a50
08:01:25 ipsec,debug 0x214a50: next=(nil) tnext=0x214a68
08:01:25 ipsec,debug 0x214a68: next=(nil) tnext=0x214a80
08:01:25 ipsec,debug 0x214a80: next=(nil) tnext=0x214a98
08:01:25 ipsec,debug 0x214a98: next=(nil) tnext=0x214ab0
08:01:25 ipsec,debug 0x214ab0: next=(nil) tnext=0x214ac8
08:01:25 ipsec,debug 0x214ac8: next=(nil) tnext=0x214ae0
08:01:25 ipsec,debug 0x214ae0: next=(nil) tnext=0x205088
08:01:25 ipsec,debug 0x205088: next=(nil) tnext=0x2050a0
08:01:25 ipsec,debug 0x2050a0: next=(nil) tnext=0x2050b8
08:01:25 ipsec,debug 0x2050b8: next=(nil) tnext=(nil)
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=1 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=3 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=4 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=5 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=6 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=8 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=9 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=10 trns-id=AES-CBC
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=128
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=11 trns-id=3DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=13 trns-id=3DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=14 trns-id=3DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=15 trns-id=3DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=16 trns-id=DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha512
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=18 trns-id=DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=19 trns-id=DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha256
08:01:25 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=20 trns#=20 trns-id=DES
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
08:01:25 ipsec,debug peer's single bundle:
08:01:25 ipsec,debug (proto_id=ESP spisize=4 spi=0f0e7207 spi_p=00000000 encmode=UDP-Transport reqid=0:0)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha512)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha256)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-md5)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha512)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha256)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-md5)
08:01:25 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha512)
08:01:25 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
08:01:25 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha256)
08:01:25 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-md5)
08:01:25 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-sha512)
08:01:25 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-sha1)
08:01:25 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-sha256)
08:01:25 ipsec,debug (trns_id=DES encklen=0 authtype=hmac-md5)
08:01:25 ipsec,debug my single bundle:
08:01:25 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=149:149)
08:01:25 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
08:01:25 ipsec,debug (trns_id=3DES encklen=0 authtype=hmac-sha1)
08:01:25 ipsec Adjusting my encmode UDP-Transport->Transport
08:01:25 ipsec Adjusting peer's encmode UDP-Transport(4)->Transport(2)
08:01:25 ipsec authtype mismatched: my:hmac-sha1 peer:hmac-sha512
08:01:25 ipsec trns_id mismatched: my:3DES peer:AES-CBC
08:01:25 ipsec,debug matched
08:01:25 ipsec,debug ===
08:01:25 ipsec,debug call pfkey_send_getspi 10cb
08:01:25 ipsec,debug pfkey GETSPI sent: ESP/Transport PHONE-IP[13642]->ROUTER-IP[4500]
08:01:25 ipsec,debug pfkey getspi sent.
08:01:25 ipsec,debug total SA len=48
08:01:25 ipsec,debug 00000001 00000001 00000028 01030401 00000000 0000001c 030c0000 80010001
08:01:25 ipsec,debug 80027080 80040004 80060100 80050002
08:01:25 ipsec,debug begin.
08:01:25 ipsec,debug seen nptype=2(prop) len=40
08:01:25 ipsec,debug succeed.
08:01:25 ipsec,debug proposal #1 len=40
08:01:25 ipsec,debug begin.
08:01:25 ipsec,debug seen nptype=3(trns) len=28
08:01:25 ipsec,debug succeed.
08:01:25 ipsec,debug transform #3 len=28
08:01:25 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
08:01:25 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=28800
08:01:25 ipsec,debug life duration was in TLV.
08:01:25 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
08:01:25 ipsec,debug UDP encapsulation requested
08:01:25 ipsec,debug type=Key Length, flag=0x8000, lorv=256
08:01:25 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
08:01:25 ipsec,debug pair 1:
08:01:25 ipsec,debug 0x1ffb88: next=(nil) tnext=(nil)
08:01:25 ipsec,debug proposal #1: 1 transform
08:01:25 ipsec,debug NAT-OAi:
08:01:25 ipsec,debug 01000000 9f79ce2f
08:01:25 ipsec,debug NAT-OAr:
08:01:25 ipsec,debug 01000000 c60f07db
08:01:25 ipsec,debug add payload of len 48, next type 10
08:01:25 ipsec,debug add payload of len 24, next type 5
08:01:25 ipsec,debug add payload of len 8, next type 5
08:01:25 ipsec,debug add payload of len 8, next type 21
08:01:25 ipsec,debug add payload of len 8, next type 21
08:01:25 ipsec,debug add payload of len 8, next type 0
08:01:25 ipsec,debug HASH with:
08:01:25 ipsec,debug c096b477 9513cba2 659bbf33 49387246 5d679ee3 0a000034 00000001 00000001
08:01:25 ipsec,debug 00000028 01030401 0514fc88 0000001c 030c0000 80010001 80027080 80040004
08:01:25 ipsec,debug 80060100 80050002 0500001c bd3420dd e445b18c 467f9e30 a17fa564 fbbc7d58
08:01:25 ipsec,debug 22d61826 0500000c 01110000 0a19980c 1500000c 011106a5 c60f07db 1500000c
08:01:25 ipsec,debug 01000000 9f79ce2f 0000000c 01000000 c60f07db
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug HASH computed:
08:01:25 ipsec,debug 7b771474 6a54c483 2d3d515f 8f1994cc cc5efd2e
08:01:25 ipsec,debug add payload of len 20, next type 1
08:01:25 ipsec,debug begin encryption.
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug pad length = 8
08:01:25 ipsec,debug 01000018 7b771474 6a54c483 2d3d515f 8f1994cc cc5efd2e 0a000034 00000001
08:01:25 ipsec,debug 00000001 00000028 01030401 0514fc88 0000001c 030c0000 80010001 80027080
08:01:25 ipsec,debug 80040004 80060100 80050002 0500001c bd3420dd e445b18c 467f9e30 a17fa564
08:01:25 ipsec,debug fbbc7d58 22d61826 0500000c 01110000 0a19980c 1500000c 011106a5 c60f07db
08:01:25 ipsec,debug 1500000c 01000000 9f79ce2f 0000000c 01000000 c60f07db b8dd8180 cbf69d07
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug with key:
08:01:25 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:25 ipsec,debug encrypted payload by IV:
08:01:25 ipsec,debug c8ae00cb 76e0dcc5 5bcf2922 b257893b
08:01:25 ipsec,debug save IV for next:
08:01:25 ipsec,debug a90b2627 f39552a8 83774f40 d59b4f0a
08:01:25 ipsec,debug encrypted.
08:01:25 ipsec,debug 188 bytes from ROUTER-IP[4500] to PHONE-IP[13642]
08:01:25 ipsec,debug 1 times of 192 bytes message will be sent to PHONE-IP[13642]
08:01:25 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 08102001 c096b477 000000bc b74fab29
08:01:25 ipsec,debug,packet 3f70e23f dd173e15 77339d1a a4f69999 f8eb433a cea3d6b9 e01bfbb5 3e37b0b2
08:01:25 ipsec,debug,packet e30acdbd c084f671 b2697e0a 26a0ae01 a40022af 072784dd 9117ba67 45c7a3bb
08:01:25 ipsec,debug,packet c94b2b07 47428544 7d6f2f61 bd409138 60ed3a2e d60e9045 eec2d4c7 db551980
08:01:25 ipsec,debug,packet cc95c350 b28c75c7 6cda3797 b0ac57f1 5fd89832 fe31c6d9 11c43bb1 a534c276
08:01:25 ipsec,debug,packet 20bc56a8 7be8f2f6 03ca44b8 a90b2627 f39552a8 83774f40 d59b4f0a
08:01:25 ipsec sent phase2 packet ROUTER-IP[4500]<=>PHONE-IP[13642] eacda968633ab46e:8916a29a2614ded1:0000c096
08:01:25 ipsec,debug ===== received 76 bytes from PHONE-IP[13642] to ROUTER-IP[4500]
08:01:25 ipsec,debug,packet eacda968 633ab46e 8916a29a 2614ded1 08102001 c096b477 0000004c 00c3c881
08:01:25 ipsec,debug,packet 8d1ed7fd 5df36303 74578792 4980ccf3 64dc602d 581fc485 30a5f2a7 330fa1f7
08:01:25 ipsec,debug,packet 4648c20c 0ac7c595 21137a62
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug IV was saved for next processing:
08:01:25 ipsec,debug 330fa1f7 4648c20c 0ac7c595 21137a62
08:01:25 ipsec,debug encryption(aes)
08:01:25 ipsec,debug with key:
08:01:25 ipsec,debug 296567b0 7a68be27 bc878fee 779b2f8c 05a2e1eb d30f6ffa c4594fbb 4fba873e
08:01:25 ipsec,debug decrypted payload by IV:
08:01:25 ipsec,debug a90b2627 f39552a8 83774f40 d59b4f0a
08:01:25 ipsec,debug decrypted payload, but not trimed.
08:01:25 ipsec,debug 00000018 54a03727 e1121e18 2e92dd5f b1c093a9 0f17f17e 8fae9dee fdefffe2
08:01:25 ipsec,debug d4d5f7ad fdeac4b4 d48292fd b6a39417
08:01:25 ipsec,debug padding len=24
08:01:25 ipsec,debug skip to trim padding.
08:01:25 ipsec,debug decrypted.
08:01:25 ipsec,debug eacda968 633ab46e 8916a29a 2614ded1 08102001 c096b477 0000004c 00000018
08:01:25 ipsec,debug 54a03727 e1121e18 2e92dd5f b1c093a9 0f17f17e 8fae9dee fdefffe2 d4d5f7ad
08:01:25 ipsec,debug fdeac4b4 d48292fd b6a39417
08:01:25 ipsec,debug begin.
08:01:25 ipsec,debug seen nptype=8(hash) len=24
08:01:25 ipsec,debug succeed.
08:01:25 ipsec,debug HASH(3) validate:
08:01:25 ipsec,debug 54a03727 e1121e18 2e92dd5f b1c093a9 0f17f17e
08:01:25 ipsec,debug HASH with:
08:01:25 ipsec,debug 00c096b4 779513cb a2659bbf 33493872 465d679e e3bd3420 dde445b1 8c467f9e
08:01:25 ipsec,debug 30a17fa5 64fbbc7d 5822d618 26
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug HASH computed:
08:01:25 ipsec,debug 54a03727 e1121e18 2e92dd5f b1c093a9 0f17f17e
08:01:25 ipsec,debug ===
08:01:25 ipsec,debug KEYMAT compute with
08:01:25 ipsec,debug 030514fc 889513cb a2659bbf 33493872 465d679e e3bd3420 dde445b1 8c467f9e
08:01:25 ipsec,debug 30a17fa5 64fbbc7d 5822d618 26
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug encryption(aes-cbc)
08:01:25 ipsec,debug hmac(sha1)
08:01:25 ipsec,debug encklen=256 authklen=160
08:01:25 ipsec,debug generating 640 bits of key (dupkeymat=4)
08:01:25 ipsec,debug generating K1...K4 for KEYMAT.
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug d07cc6ef 25d35f78 5b9d9496 28cf4141 a80c3034 96ac6cf2 6bf883bd 53aa482c
08:01:25 ipsec,debug e85735fe 77ff5822 a05340b1 10e1f4c8 1b8159fd 5aeb9f5b c5592075 09407f84
08:01:25 ipsec,debug 9895edad b5d5dd59 32376826 7f8008e5
08:01:25 ipsec,debug KEYMAT compute with
08:01:25 ipsec,debug 030f0e72 079513cb a2659bbf 33493872 465d679e e3bd3420 dde445b1 8c467f9e
08:01:25 ipsec,debug 30a17fa5 64fbbc7d 5822d618 26
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug encryption(aes-cbc)
08:01:25 ipsec,debug hmac(sha1)
08:01:25 ipsec,debug encklen=256 authklen=160
08:01:25 ipsec,debug generating 640 bits of key (dupkeymat=4)
08:01:25 ipsec,debug generating K1...K4 for KEYMAT.
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug hmac(hmac_sha1)
08:01:25 ipsec,debug cfc9eb32 89be5f3b b11e5d14 a3c7a829 bc200e39 fc6de220 b83badaa 936cfb26
08:01:25 ipsec,debug f87a0cf4 6fafe635 4e773796 782e5fce 7fbd6b31 120e8b33 199d1279 cfc8f04f
08:01:25 ipsec,debug 3fe21546 449fc85a ab5cc00c 6dc15627
08:01:25 ipsec,debug KEYMAT computed.
08:01:25 ipsec,debug call pk_sendupdate
08:01:25 ipsec,debug encryption(aes-cbc)
08:01:25 ipsec,debug hmac(sha1)
08:01:25 ipsec,debug call pfkey_send_update_nat
08:01:25 ipsec IPsec-SA established: ESP/Transport PHONE-IP[13642]->ROUTER-IP[4500] spi=0x514fc88
08:01:25 ipsec,debug pfkey update sent.
08:01:25 ipsec,debug encryption(aes-cbc)
08:01:25 ipsec,debug hmac(sha1)
08:01:25 ipsec,debug call pfkey_send_add_nat
08:01:25 ipsec IPsec-SA established: ESP/Transport ROUTER-IP[4500]->PHONE-IP[13642] spi=0xf0e7207
08:01:25 ipsec,debug pfkey add sent.
08:01:26 l2tp,debug,packet rcvd control message from PHONE-IP:49447 to ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
08:01:26 l2tp,debug,packet (M) Message-Type=SCCRQ
08:01:26 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:01:26 l2tp,debug,packet (M) Host-Name="anonymous"
08:01:26 l2tp,debug,packet (M) Framing-Capabilities=0x3
08:01:26 l2tp,debug,packet (M) Assigned-Tunnel-ID=60740
08:01:26 l2tp,debug,packet (M) Receive-Window-Size=1
08:01:26 l2tp,info first L2TP UDP packet received from PHONE-IP
08:01:26 l2tp,debug tunnel 176 entering state: wait-ctl-conn
08:01:26 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=0, nr=1
08:01:26 l2tp,debug,packet (M) Message-Type=SCCRP
08:01:26 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:01:26 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:01:26 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:01:26 l2tp,debug,packet Firmware-Revision=0x1
08:01:26 l2tp,debug,packet (M) Host-Name="ReichHub"
08:01:26 l2tp,debug,packet Vendor-Name="MikroTik"
08:01:26 l2tp,debug,packet (M) Assigned-Tunnel-ID=176
08:01:26 l2tp,debug,packet (M) Receive-Window-Size=4
08:01:26 l2tp,debug,packet rcvd control message from PHONE-IP:49447 to ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=176, session-id=0, ns=1, nr=1
08:01:26 l2tp,debug,packet (M) Message-Type=SCCCN
08:01:26 l2tp,debug tunnel 176 entering state: estabilished
08:01:26 l2tp,debug,packet sent control message (ack) to PHONE-IP:49447 from ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=1, nr=2
08:01:26 l2tp,debug,packet rcvd control message from PHONE-IP:49447 to ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=176, session-id=0, ns=2, nr=1
08:01:26 l2tp,debug,packet (M) Message-Type=ICRQ
08:01:26 l2tp,debug,packet (M) Assigned-Session-ID=55180
08:01:26 l2tp,debug,packet (M) Call-Serial-Number=1332303888
08:01:26 l2tp,debug session 1 entering state: wait-connect
08:01:26 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=60740, session-id=55180, ns=1, nr=3
08:01:26 l2tp,debug,packet (M) Message-Type=ICRP
08:01:26 l2tp,debug,packet (M) Assigned-Session-ID=1
08:01:26 l2tp,debug,packet rcvd control message from PHONE-IP:49447 to ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=176, session-id=1, ns=3, nr=2
08:01:26 l2tp,debug,packet (M) Message-Type=ICCN
08:01:26 l2tp,debug,packet (M) Tx-Connect-Speed-BPS=100000000
08:01:26 l2tp,debug,packet (M) Framing-Type=0x3
08:01:26 l2tp,debug session 1 entering state: established
08:01:26 l2tp,debug,packet sent control message (ack) to PHONE-IP:49447 from ROUTER-IP:1701
08:01:26 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:01:26 l2tp,ppp,debug <PHONE-IP>: LCP lowerup
08:01:26 l2tp,ppp,debug <PHONE-IP>: LCP open
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd LCP ConfReq id=0x1
08:01:26 l2tp,ppp,debug,packet <mru 1400>
08:01:26 l2tp,ppp,debug,packet <asyncmap 0x0>
08:01:26 l2tp,ppp,debug,packet <magic 0x2d1ec4bc>
08:01:26 l2tp,ppp,debug,packet <pcomp>
08:01:26 l2tp,ppp,debug,packet <accomp>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent LCP ConfReq id=0x1
08:01:26 l2tp,ppp,debug,packet <mru 1450>
08:01:26 l2tp,ppp,debug,packet <magic 0x1352bb83>
08:01:26 l2tp,ppp,debug,packet <auth mschap2>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent LCP ConfRej id=0x1
08:01:26 l2tp,ppp,debug,packet <asyncmap 0x0>
08:01:26 l2tp,ppp,debug,packet <pcomp>
08:01:26 l2tp,ppp,debug,packet <accomp>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd LCP ConfAck id=0x1
08:01:26 l2tp,ppp,debug,packet <mru 1450>
08:01:26 l2tp,ppp,debug,packet <magic 0x1352bb83>
08:01:26 l2tp,ppp,debug,packet <auth mschap2>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd LCP ConfReq id=0x2
08:01:26 l2tp,ppp,debug,packet <mru 1400>
08:01:26 l2tp,ppp,debug,packet <magic 0x2d1ec4bc>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent LCP ConfAck id=0x2
08:01:26 l2tp,ppp,debug,packet <mru 1400>
08:01:26 l2tp,ppp,debug,packet <magic 0x2d1ec4bc>
08:01:26 l2tp,ppp,debug <PHONE-IP>: LCP opened
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent CHAP Challenge id=0x1
08:01:26 l2tp,ppp,debug,packet <challenge len=16>
08:01:26 l2tp,ppp,debug,packet <name ReichHub>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd CHAP Response id=0x1
08:01:26 l2tp,ppp,debug,packet <response len=49>
08:01:26 l2tp,ppp,debug,packet <name reichnetwork\admin_bypass>
08:01:26 l2tp,ppp,info,account admin_bypass logged in, 172.32.0.100
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent CHAP Success id=0x1
08:01:26 l2tp,ppp,debug,packet S=CF3D0D67B833994CC85408D69E29D6CB0C915772
08:01:26 l2tp,ppp,info <l2tp-admin_bypass>: authenticated
08:01:26 l2tp,ppp,debug <PHONE-IP>: IPCP lowerup
08:01:26 l2tp,ppp,debug <PHONE-IP>: IPCP open
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent IPCP ConfReq id=0x1
08:01:26 l2tp,ppp,debug,packet <addr 172.32.0.1>
08:01:26 l2tp,ppp,debug <PHONE-IP>: IPV6CP open
08:01:26 l2tp,ppp,debug <PHONE-IP>: MPLSCP lowerup
08:01:26 l2tp,ppp,debug <PHONE-IP>: MPLSCP open
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent MPLSCP ConfReq id=0x1
08:01:26 l2tp,ppp,debug <PHONE-IP>: BCP open
08:01:26 l2tp,ppp,debug <PHONE-IP>: CCP lowerup
08:01:26 l2tp,ppp,debug <PHONE-IP>: CCP open
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd CCP ConfReq id=0x1
08:01:26 l2tp,ppp,debug,packet <deflate 15>
08:01:26 l2tp,ppp,debug,packet <deflate (old) 15>
08:01:26 l2tp,ppp,debug,packet <0x15 03 2f>
08:01:26 l2tp,ppp,debug <PHONE-IP>: received unsupported protocol 0x80fd
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent LCP ProtRej id=0x2
08:01:26 l2tp,ppp,debug,packet 80 fd 01 01 00 0f 1a 04 78 00 18 04 78 00 15 03...
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd IPCP ConfReq id=0x1
08:01:26 l2tp,ppp,debug,packet <addr 0.0.0.0>
08:01:26 l2tp,ppp,debug,packet <comp VJ f 1>
08:01:26 l2tp,ppp,debug,packet <ms-dns 0.0.0.0>
08:01:26 l2tp,ppp,debug,packet <ms-dns 0.0.0.0>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent IPCP ConfRej id=0x1
08:01:26 l2tp,ppp,debug,packet <comp VJ f 1>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd LCP ProtRej id=0x3
08:01:26 l2tp,ppp,debug,packet 82 81 01 01 00 04
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd IPCP ConfAck id=0x1
08:01:26 l2tp,ppp,debug,packet <addr 172.32.0.1>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd IPCP ConfReq id=0x2
08:01:26 l2tp,ppp,debug,packet <addr 0.0.0.0>
08:01:26 l2tp,ppp,debug,packet <ms-dns 0.0.0.0>
08:01:26 l2tp,ppp,debug,packet <ms-dns 0.0.0.0>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent IPCP ConfNak id=0x2
08:01:26 l2tp,ppp,debug,packet <addr 172.32.0.100>
08:01:26 l2tp,ppp,debug,packet <ms-dns 172.32.0.1>
08:01:26 l2tp,ppp,debug,packet <ms-dns 10.0.0.3>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: rcvd IPCP ConfReq id=0x3
08:01:26 l2tp,ppp,debug,packet <addr 172.32.0.100>
08:01:26 l2tp,ppp,debug,packet <ms-dns 172.32.0.1>
08:01:26 l2tp,ppp,debug,packet <ms-dns 10.0.0.3>
08:01:26 l2tp,ppp,debug,packet <PHONE-IP>: sent IPCP ConfAck id=0x3
08:01:26 l2tp,ppp,debug,packet <addr 172.32.0.100>
08:01:26 l2tp,ppp,debug,packet <ms-dns 172.32.0.1>
08:01:26 l2tp,ppp,debug,packet <ms-dns 10.0.0.3>
08:01:26 l2tp,ppp,debug <PHONE-IP>: IPCP opened
08:01:26 l2tp,ppp,info <l2tp-admin_bypass>: connected
08:01:27 l2tp,debug,packet sent control message to 159.121.202.141:1701 from ROUTER-IP:1701
08:01:27 l2tp,debug,packet tunnel-id=19, session-id=0, ns=2, nr=4
08:01:27 l2tp,debug,packet (M) Message-Type=HELLO
08:01:27 l2tp,debug,packet rcvd control message (ack) from 159.121.202.141:1701 to ROUTER-IP:1701
08:01:27 l2tp,debug,packet tunnel-id=175, session-id=0, ns=4, nr=3
08:01:35 ipsec,debug KA: ROUTER-IP[4500]->159.121.202.141[59096]
08:01:35 ipsec,debug 1 times of 1 bytes message will be sent to 159.121.202.141[59096]
08:01:35 ipsec,debug,packet ff
08:01:35 ipsec,debug KA: ROUTER-IP[4500]->PHONE-IP[13642]
08:01:35 ipsec,debug 1 times of 1 bytes message will be sent to PHONE-IP[13642]
08:01:35 ipsec,debug,packet ff
08:01:41 ipsec,debug ===== received 92 bytes from 71.59.152.62[500] to ROUTER-IP[500]
08:01:41 ipsec,debug,packet fa15d9d5 aab98a8f ddbd5468 175cd664 08100501 eaaa04d6 0000005c 47bc52da
08:01:41 ipsec,debug,packet b1451f3c 24003d3f a459becc 11cb9397 0924179b 56c0cfff 3f03b1f3 88badb96
08:01:41 ipsec,debug,packet 38ea4448 dfcac53b 0c9e352c c8fffe64 bdb4b6c3 1731e567 5b246bd7
08:01:41 ipsec,debug receive Information.
08:01:41 ipsec,debug compute IV for phase2
08:01:41 ipsec,debug phase1 last IV:
08:01:41 ipsec,debug e17e326b a57d05eb eaaa04d6
08:01:41 ipsec,debug hash(sha1)
08:01:41 ipsec,debug encryption(3des)
08:01:41 ipsec,debug phase2 IV computed:
08:01:41 ipsec,debug 053ec483 d99725e0
08:01:41 ipsec,debug encryption(3des)
08:01:41 ipsec,debug IV was saved for next processing:
08:01:41 ipsec,debug 1731e567 5b246bd7
08:01:41 ipsec,debug encryption(3des)
08:01:41 ipsec,debug with key:
08:01:41 ipsec,debug ecf57f84 35edc707 e5062848 3227df94 fd846a40 99fdd8ba
08:01:41 ipsec,debug decrypted payload by IV:
08:01:41 ipsec,debug 053ec483 d99725e0
08:01:41 ipsec,debug decrypted payload, but not trimed.
08:01:41 ipsec,debug 0b000018 e54be462 20edf66f ab13103a 39025c55 817dcafe 00000020 00000001
08:01:41 ipsec,debug 01108d28 fa15d9d5 aab98a8f ddbd5468 175cd664 000003be d8a4d0d0 c4f5b107
08:01:41 ipsec,debug padding len=8
08:01:41 ipsec,debug skip to trim padding.
08:01:41 ipsec,debug decrypted.
08:01:41 ipsec,debug fa15d9d5 aab98a8f ddbd5468 175cd664 08100501 eaaa04d6 0000005c 0b000018
08:01:41 ipsec,debug e54be462 20edf66f ab13103a 39025c55 817dcafe 00000020 00000001 01108d28
08:01:41 ipsec,debug fa15d9d5 aab98a8f ddbd5468 175cd664 000003be d8a4d0d0 c4f5b107
08:01:41 ipsec,debug HASH with:
08:01:41 ipsec,debug eaaa04d6 00000020 00000001 01108d28 fa15d9d5 aab98a8f ddbd5468 175cd664
08:01:41 ipsec,debug 000003be
08:01:41 ipsec,debug hmac(hmac_sha1)
08:01:41 ipsec,debug HASH computed:
08:01:41 ipsec,debug e54be462 20edf66f ab13103a 39025c55 817dcafe
08:01:41 ipsec,debug hash validated.
08:01:41 ipsec,debug begin.
08:01:41 ipsec,debug seen nptype=8(hash) len=24
08:01:41 ipsec,debug seen nptype=11(notify) len=32
08:01:41 ipsec,debug succeed.
08:01:41 ipsec,debug 71.59.152.62 notify: R_U_THERE
08:01:41 ipsec,debug 71.59.152.62 DPD R-U-There received
08:01:41 ipsec,debug compute IV for phase2
08:01:41 ipsec,debug phase1 last IV:
08:01:41 ipsec,debug e17e326b a57d05eb fd9cbd55
08:01:41 ipsec,debug hash(sha1)
08:01:41 ipsec,debug encryption(3des)
08:01:41 ipsec,debug phase2 IV computed:
08:01:41 ipsec,debug 7758c9a3 39d6263b
08:01:41 ipsec,debug HASH with:
08:01:41 ipsec,debug fd9cbd55 00000020 00000001 01108d29 fa15d9d5 aab98a8f ddbd5468 175cd664
08:01:41 ipsec,debug 000003be
08:01:41 ipsec,debug hmac(hmac_sha1)
08:01:41 ipsec,debug HASH computed:
08:01:41 ipsec,debug ce042bb6 a79a65bf 1bb9800b 05dedf91 c1da7eca
08:01:41 ipsec,debug begin encryption.
08:01:41 ipsec,debug encryption(3des)
08:01:41 ipsec,debug pad length = 8
08:01:41 ipsec,debug 0b000018 ce042bb6 a79a65bf 1bb9800b 05dedf91 c1da7eca 00000020 00000001
08:01:41 ipsec,debug 01108d29 fa15d9d5 aab98a8f ddbd5468 175cd664 000003be c9e3faf0 f7f5c707
08:01:41 ipsec,debug encryption(3des)
08:01:41 ipsec,debug with key:
08:01:41 ipsec,debug ecf57f84 35edc707 e5062848 3227df94 fd846a40 99fdd8ba
08:01:41 ipsec,debug encrypted payload by IV:
08:01:41 ipsec,debug 7758c9a3 39d6263b
08:01:41 ipsec,debug save IV for next:
08:01:41 ipsec,debug b2fc3eee 1c58ee69
08:01:41 ipsec,debug encrypted.
08:01:41 ipsec,debug 92 bytes from ROUTER-IP[500] to 71.59.152.62[500]
08:01:41 ipsec,debug 1 times of 92 bytes message will be sent to 71.59.152.62[500]
08:01:41 ipsec,debug,packet fa15d9d5 aab98a8f ddbd5468 175cd664 08100501 fd9cbd55 0000005c 23a1475d
08:01:41 ipsec,debug,packet 006b113b 2b098591 c9ecb924 747d544a 589e6065 f1a9981b b02fd86b 7cfe714c
08:01:41 ipsec,debug,packet e7357eba c479b078 8e6b1ae6 7e52353d 0e2ce2dd b2fc3eee 1c58ee69
08:01:41 ipsec,debug sendto Information notify.
08:01:41 ipsec,debug received a valid R-U-THERE, ACK sent
08:01:55 ipsec,debug KA: ROUTER-IP[4500]->159.121.202.141[59096]
08:01:55 ipsec,debug 1 times of 1 bytes message will be sent to 159.121.202.141[59096]
08:01:55 ipsec,debug,packet ff
08:01:55 ipsec,debug KA: ROUTER-IP[4500]->PHONE-IP[13642]
08:01:55 ipsec,debug 1 times of 1 bytes message will be sent to PHONE-IP[13642]
08:01:55 ipsec,debug,packet ff
08:02:06 ipsec,debug ===== received 92 bytes from 71.59.152.62[500] to ROUTER-IP[500]
08:02:06 ipsec,debug,packet 1be0021f 5161e822 72fb31f7 96fb8b12 08100501 b07bb06f 0000005c 7b6aab43
08:02:06 ipsec,debug,packet 32f19d83 b4447904 1168a249 b5fe3108 5c1bd53c 148bad81 8f44a97f 9e80bc55
08:02:06 ipsec,debug,packet 0e1c911e e571ea8c 54df16a0 c9db9872 18c3742c 5e13f1a2 a851ea84
08:02:06 ipsec,debug receive Information.
08:02:06 ipsec,debug compute IV for phase2
08:02:06 ipsec,debug phase1 last IV:
08:02:06 ipsec,debug 828aa727 e3b36deb b07bb06f
08:02:06 ipsec,debug hash(sha1)
08:02:06 ipsec,debug encryption(3des)
08:02:06 ipsec,debug phase2 IV computed:
08:02:06 ipsec,debug 7845ea6c 48b64784
08:02:06 ipsec,debug encryption(3des)
08:02:06 ipsec,debug IV was saved for next processing:
08:02:06 ipsec,debug 5e13f1a2 a851ea84
08:02:06 ipsec,debug encryption(3des)
08:02:06 ipsec,debug with key:
08:02:06 ipsec,debug ff6e0cf6 0ff589db 726ff018 f389f2db 012da640 4e54ae9a
08:02:06 ipsec,debug decrypted payload by IV:
08:02:06 ipsec,debug 7845ea6c 48b64784
08:02:06 ipsec,debug decrypted payload, but not trimed.
08:02:06 ipsec,debug 0b000018 29aad142 16619fe1 d692fae4 cc0d196d 40405bb4 00000020 00000001
08:02:06 ipsec,debug 01108d28 1be0021f 5161e822 72fb31f7 96fb8b12 00001222 b699d9fe a694c907
08:02:06 ipsec,debug padding len=8
08:02:06 ipsec,debug skip to trim padding.
08:02:06 ipsec,debug decrypted.
08:02:06 ipsec,debug 1be0021f 5161e822 72fb31f7 96fb8b12 08100501 b07bb06f 0000005c 0b000018
08:02:06 ipsec,debug 29aad142 16619fe1 d692fae4 cc0d196d 40405bb4 00000020 00000001 01108d28
08:02:06 ipsec,debug 1be0021f 5161e822 72fb31f7 96fb8b12 00001222 b699d9fe a694c907
08:02:06 ipsec,debug HASH with:
08:02:06 ipsec,debug b07bb06f 00000020 00000001 01108d28 1be0021f 5161e822 72fb31f7 96fb8b12
08:02:06 ipsec,debug 00001222
08:02:06 ipsec,debug hmac(hmac_sha1)
08:02:06 ipsec,debug HASH computed:
08:02:06 ipsec,debug 29aad142 16619fe1 d692fae4 cc0d196d 40405bb4
08:02:06 ipsec,debug hash validated.
08:02:06 ipsec,debug begin.
08:02:06 ipsec,debug seen nptype=8(hash) len=24
08:02:06 ipsec,debug seen nptype=11(notify) len=32
08:02:06 ipsec,debug succeed.
08:02:06 ipsec,debug 71.59.152.62 notify: R_U_THERE
08:02:06 ipsec,debug 71.59.152.62 DPD R-U-There received
08:02:06 ipsec,debug compute IV for phase2
08:02:06 ipsec,debug phase1 last IV:
08:02:06 ipsec,debug 828aa727 e3b36deb c776c92b
08:02:06 ipsec,debug hash(sha1)
08:02:06 ipsec,debug encryption(3des)
08:02:06 ipsec,debug phase2 IV computed:
08:02:06 ipsec,debug 2e228742 b0d316fc
08:02:06 ipsec,debug HASH with:
08:02:06 ipsec,debug c776c92b 00000020 00000001 01108d29 1be0021f 5161e822 72fb31f7 96fb8b12
08:02:06 ipsec,debug 00001222
08:02:06 ipsec,debug hmac(hmac_sha1)
08:02:06 ipsec,debug HASH computed:
08:02:06 ipsec,debug b69e80fd 6df93c83 adf7077d 26b37e28 772e71aa
08:02:06 ipsec,debug begin encryption.
08:02:06 ipsec,debug encryption(3des)
08:02:06 ipsec,debug pad length = 8
08:02:06 ipsec,debug 0b000018 b69e80fd 6df93c83 adf7077d 26b37e28 772e71aa 00000020 00000001
08:02:06 ipsec,debug 01108d29 1be0021f 5161e822 72fb31f7 96fb8b12 00001222 dac8b5e1 fddf8107
08:02:06 ipsec,debug encryption(3des)
08:02:06 ipsec,debug with key:
08:02:06 ipsec,debug ff6e0cf6 0ff589db 726ff018 f389f2db 012da640 4e54ae9a
08:02:06 ipsec,debug encrypted payload by IV:
08:02:06 ipsec,debug 2e228742 b0d316fc
08:02:06 ipsec,debug save IV for next:
08:02:06 ipsec,debug 7c6192f6 a7af531c
08:02:06 ipsec,debug encrypted.
08:02:06 ipsec,debug 92 bytes from ROUTER-IP[500] to 71.59.152.62[500]
08:02:06 ipsec,debug 1 times of 92 bytes message will be sent to 71.59.152.62[500]
08:02:06 ipsec,debug,packet 1be0021f 5161e822 72fb31f7 96fb8b12 08100501 c776c92b 0000005c 5bd218f9
08:02:06 ipsec,debug,packet 765cd374 cf92d75f bd5ec583 7cdf3b35 f155d910 fde00901 2285b6b9 ec8c7322
08:02:06 ipsec,debug,packet 560f39bf bee626e3 699c1721 e0c8d764 b6cacb72 7c6192f6 a7af531c
08:02:06 ipsec,debug sendto Information notify.
08:02:06 ipsec,debug received a valid R-U-THERE, ACK sent
08:02:07 l2tp,debug,packet rcvd control message from 146.88.240.4:1701 to ROUTER-IP:1701
08:02:07 l2tp,debug,packet tunnel-id=0, session-id=0, ns=0, nr=0
08:02:07 l2tp,debug,packet (M) Message-Type=SCCRQ
08:02:07 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:07 l2tp,debug,packet (M) Host-Name="2.am"
08:02:07 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:07 l2tp,debug,packet (M) Assigned-Tunnel-ID=35
08:02:07 l2tp,info first L2TP UDP packet received from 146.88.240.4
08:02:07 l2tp,debug tunnel 177 entering state: wait-ctl-conn
08:02:07 l2tp,debug,packet sent control message to 146.88.240.4:1701 from ROUTER-IP:1701
08:02:07 l2tp,debug,packet tunnel-id=35, session-id=0, ns=0, nr=1
08:02:07 l2tp,debug,packet (M) Message-Type=SCCRP
08:02:07 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:07 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:07 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:02:07 l2tp,debug,packet Firmware-Revision=0x1
08:02:07 l2tp,debug,packet (M) Host-Name="ReichHub"
08:02:07 l2tp,debug,packet Vendor-Name="MikroTik"
08:02:07 l2tp,debug,packet (M) Assigned-Tunnel-ID=177
08:02:07 l2tp,debug,packet (M) Receive-Window-Size=4
08:02:08 l2tp,debug,packet rcvd control message from 75.107.121.2:1701 to ROUTER-IP:1701
08:02:08 l2tp,debug,packet tunnel-id=143, session-id=0, ns=3273, nr=3271
08:02:08 l2tp,debug,packet (M) Message-Type=HELLO
08:02:08 l2tp,debug,packet sent control message (ack) to 75.107.121.2:1701 from ROUTER-IP:1701
08:02:08 l2tp,debug,packet tunnel-id=12, session-id=0, ns=3271, nr=3274
08:02:08 l2tp,debug,packet sent control message to 75.107.121.2:1701 from ROUTER-IP:1701
08:02:08 l2tp,debug,packet tunnel-id=12, session-id=0, ns=3271, nr=3274
08:02:08 l2tp,debug,packet (M) Message-Type=HELLO
08:02:08 l2tp,debug,packet sent control message to 146.88.240.4:1701 from ROUTER-IP:1701
08:02:08 l2tp,debug,packet tunnel-id=35, session-id=0, ns=0, nr=1
08:02:08 l2tp,debug,packet (M) Message-Type=SCCRP
08:02:08 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:08 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:08 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:02:08 l2tp,debug,packet Firmware-Revision=0x1
08:02:08 l2tp,debug,packet (M) Host-Name="ReichHub"
08:02:08 l2tp,debug,packet Vendor-Name="MikroTik"
08:02:08 l2tp,debug,packet (M) Assigned-Tunnel-ID=177
08:02:08 l2tp,debug,packet (M) Receive-Window-Size=4
08:02:08 l2tp,debug,packet rcvd control message (ack) from 75.107.121.2:1701 to ROUTER-IP:1701
08:02:08 l2tp,debug,packet tunnel-id=143, session-id=0, ns=3274, nr=3272
08:02:09 l2tp,debug,packet sent control message to 146.88.240.4:1701 from ROUTER-IP:1701
08:02:09 l2tp,debug,packet tunnel-id=35, session-id=0, ns=0, nr=1
08:02:09 l2tp,debug,packet (M) Message-Type=SCCRP
08:02:09 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:09 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:09 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:02:09 l2tp,debug,packet Firmware-Revision=0x1
08:02:09 l2tp,debug,packet (M) Host-Name="ReichHub"
08:02:09 l2tp,debug,packet Vendor-Name="MikroTik"
08:02:09 l2tp,debug,packet (M) Assigned-Tunnel-ID=177
08:02:09 l2tp,debug,packet (M) Receive-Window-Size=4
08:02:11 l2tp,debug,packet sent control message to 146.88.240.4:1701 from ROUTER-IP:1701
08:02:11 l2tp,debug,packet tunnel-id=35, session-id=0, ns=0, nr=1
08:02:11 l2tp,debug,packet (M) Message-Type=SCCRP
08:02:11 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:11 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:11 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:02:11 l2tp,debug,packet Firmware-Revision=0x1
08:02:11 l2tp,debug,packet (M) Host-Name="ReichHub"
08:02:11 l2tp,debug,packet Vendor-Name="MikroTik"
08:02:11 l2tp,debug,packet (M) Assigned-Tunnel-ID=177
08:02:11 l2tp,debug,packet (M) Receive-Window-Size=4
08:02:13 l2tp,debug,packet rcvd control message from 71.59.152.62:1701 to ROUTER-IP:1701
08:02:13 l2tp,debug,packet tunnel-id=170, session-id=0, ns=929, nr=927
08:02:13 l2tp,debug,packet (M) Message-Type=HELLO
08:02:13 l2tp,debug,packet sent control message (ack) to 71.59.152.62:1701 from ROUTER-IP:1701
08:02:13 l2tp,debug,packet tunnel-id=53, session-id=0, ns=927, nr=930
08:02:13 l2tp,debug,packet sent control message to 71.59.152.62:1701 from ROUTER-IP:1701
08:02:13 l2tp,debug,packet tunnel-id=53, session-id=0, ns=927, nr=930
08:02:13 l2tp,debug,packet (M) Message-Type=HELLO
08:02:13 l2tp,debug,packet rcvd control message (ack) from 71.59.152.62:1701 to ROUTER-IP:1701
08:02:13 l2tp,debug,packet tunnel-id=170, session-id=0, ns=930, nr=928
08:02:15 ipsec,debug KA: ROUTER-IP[4500]->159.121.202.141[59096]
08:02:15 ipsec,debug 1 times of 1 bytes message will be sent to 159.121.202.141[59096]
08:02:15 ipsec,debug,packet ff
08:02:15 ipsec,debug KA: ROUTER-IP[4500]->PHONE-IP[13642]
08:02:15 ipsec,debug 1 times of 1 bytes message will be sent to PHONE-IP[13642]
08:02:15 ipsec,debug,packet ff
08:02:15 l2tp,debug,packet sent control message to 146.88.240.4:1701 from ROUTER-IP:1701
08:02:15 l2tp,debug,packet tunnel-id=35, session-id=0, ns=0, nr=1
08:02:15 l2tp,debug,packet (M) Message-Type=SCCRP
08:02:15 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:15 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:15 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:02:15 l2tp,debug,packet Firmware-Revision=0x1
08:02:15 l2tp,debug,packet (M) Host-Name="ReichHub"
08:02:15 l2tp,debug,packet Vendor-Name="MikroTik"
08:02:15 l2tp,debug,packet (M) Assigned-Tunnel-ID=177
08:02:15 l2tp,debug,packet (M) Receive-Window-Size=4
08:02:23 l2tp,debug,packet sent control message to 146.88.240.4:1701 from ROUTER-IP:1701
08:02:23 l2tp,debug,packet tunnel-id=35, session-id=0, ns=0, nr=1
08:02:23 l2tp,debug,packet (M) Message-Type=SCCRP
08:02:23 l2tp,debug,packet (M) Protocol-Version=0x01:00
08:02:23 l2tp,debug,packet (M) Framing-Capabilities=0x1
08:02:23 l2tp,debug,packet (M) Bearer-Capabilities=0x0
08:02:23 l2tp,debug,packet Firmware-Revision=0x1
08:02:23 l2tp,debug,packet (M) Host-Name="ReichHub"
08:02:23 l2tp,debug,packet Vendor-Name="MikroTik"
08:02:23 l2tp,debug,packet (M) Assigned-Tunnel-ID=177
08:02:23 l2tp,debug,packet (M) Receive-Window-Size=4
08:02:26 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:02:26 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:02:26 l2tp,debug,packet (M) Message-Type=HELLO
08:02:27 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:02:27 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:02:27 l2tp,debug,packet (M) Message-Type=HELLO
08:02:27 l2tp,debug,packet sent control message to 159.121.202.141:1701 from ROUTER-IP:1701
08:02:27 l2tp,debug,packet tunnel-id=19, session-id=0, ns=3, nr=4
08:02:27 l2tp,debug,packet (M) Message-Type=HELLO
08:02:27 l2tp,debug,packet rcvd control message (ack) from 159.121.202.141:1701 to ROUTER-IP:1701
08:02:27 l2tp,debug,packet tunnel-id=175, session-id=0, ns=4, nr=4
08:02:28 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:02:28 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:02:28 l2tp,debug,packet (M) Message-Type=HELLO
08:02:30 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:02:30 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:02:30 l2tp,debug,packet (M) Message-Type=HELLO
08:02:31 l2tp,debug tunnel 177 received no replies, disconnecting
08:02:31 l2tp,debug tunnel 177 entering state: dead
08:02:34 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:02:34 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:02:34 l2tp,debug,packet (M) Message-Type=HELLO
08:02:35 ipsec,debug KA: ROUTER-IP[4500]->159.121.202.141[59096]
08:02:35 ipsec,debug 1 times of 1 bytes message will be sent to 159.121.202.141[59096]
08:02:35 ipsec,debug,packet ff
08:02:35 ipsec,debug KA: ROUTER-IP[4500]->PHONE-IP[13642]
08:02:35 ipsec,debug 1 times of 1 bytes message will be sent to PHONE-IP[13642]
08:02:35 ipsec,debug,packet ff
08:02:42 l2tp,debug,packet sent control message to PHONE-IP:49447 from ROUTER-IP:1701
08:02:42 l2tp,debug,packet tunnel-id=60740, session-id=0, ns=2, nr=4
08:02:42 l2tp,debug,packet (M) Message-Type=HELLO
08:02:50 l2tp,debug tunnel 176 received no replies, disconnecting
08:02:50 l2tp,debug tunnel 176 entering state: dead
08:02:50 l2tp,debug session 1 entering state: dead
08:02:50 l2tp,ppp,debug <PHONE-IP>: LCP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: LCP closed
08:02:50 l2tp,ppp,debug <PHONE-IP>: CCP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: BCP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: BCP down event in starting state
08:02:50 l2tp,ppp,debug <PHONE-IP>: IPCP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: IPCP closed
08:02:50 l2tp,ppp,debug <PHONE-IP>: IPV6CP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: IPV6CP down event in starting state
08:02:50 l2tp,ppp,debug <PHONE-IP>: MPLSCP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: CCP close
08:02:50 l2tp,ppp,debug <PHONE-IP>: BCP close
08:02:50 l2tp,ppp,debug <PHONE-IP>: IPCP close
08:02:50 l2tp,ppp,debug <PHONE-IP>: IPV6CP close
08:02:50 l2tp,ppp,debug <PHONE-IP>: MPLSCP close
08:02:50 l2tp,ppp,info <l2tp-admin_bypass>: terminating... - hungup
08:02:50 l2tp,ppp,debug <PHONE-IP>: LCP lowerdown
08:02:50 l2tp,ppp,debug <PHONE-IP>: LCP down event in starting state
08:02:50 l2tp,ppp,info,account admin_bypass logged out, 84 4276790 250538466 94819 180264
08:02:50 l2tp,ppp,info <l2tp-admin_bypass>: disconnected
08:02:55 ipsec,debug KA: ROUTER-IP[4500]->159.121.202.141[59096]
08:02:55 ipsec,debug 1 times of 1 bytes message will be sent to 159.121.202.141[59096]
08:02:55 ipsec,debug,packet ff
08:02:55 ipsec,debug KA: ROUTER-IP[4500]->PHONE-IP[13642]
08:02:55 ipsec,debug 1 times of 1 bytes message will be sent to PHONE-IP[13642]
08:02:55 ipsec,debug,packet ff
08:03:08 l2tp,debug,packet rcvd control message from 75.107.121.2:1701 to ROUTER-IP:1701
08:03:08 l2tp,debug,packet tunnel-id=143, session-id=0, ns=3274, nr=3272
08:03:08 l2tp,debug,packet (M) Message-Type=HELLO
08:03:08 l2tp,debug,packet sent control message (ack) to 75.107.121.2:1701 from ROUTER-IP:1701
08:03:08 l2tp,debug,packet tunnel-id=12, session-id=0, ns=3272, nr=3275
08:03:08 l2tp,debug,packet sent control message to 75.107.121.2:1701 from ROUTER-IP:1701
08:03:08 l2tp,debug,packet tunnel-id=12, session-id=0, ns=3272, nr=3275
08:03:08 l2tp,debug,packet (M) Message-Type=HELLO
08:03:09 l2tp,debug,packet rcvd control message (ack) from 75.107.121.2:1701 to ROUTER-IP:1701
08:03:09 l2tp,debug,packet tunnel-id=143, session-id=0, ns=3275, nr=3273
08:03:13 l2tp,debug,packet rcvd control message from 71.59.152.62:1701 to ROUTER-IP:1701
08:03:13 l2tp,debug,packet tunnel-id=170, session-id=0, ns=930, nr=928
08:03:13 l2tp,debug,packet (M) Message-Type=HELLO
08:03:13 l2tp,debug,packet sent control message (ack) to 71.59.152.62:1701 from ROUTER-IP:1701
08:03:13 l2tp,debug,packet tunnel-id=53, session-id=0, ns=928, nr=931
08:03:13 l2tp,debug,packet sent control message to 71.59.152.62:1701 from ROUTER-IP:1701
08:03:13 l2tp,debug,packet tunnel-id=53, session-id=0, ns=928, nr=931
08:03:13 l2tp,debug,packet (M) Message-Type=HELLO
08:03:13 l2tp,debug,packet rcvd control message (ack) from 71.59.152.62:1701 to ROUTER-IP:1701
08:03:13 l2tp,debug,packet tunnel-id=170, session-id=0, ns=931, nr=929
08:03:15 ipsec,debug KA: ROUTER-IP[4500]->159.121.202.141[59096]
08:03:15 ipsec,debug 1 times of 1 bytes message will be sent to 159.121.202.141[59096]
08:03:15 ipsec,debug,packet ff
08:03:15 ipsec,debug KA: ROUTER-IP[4500]->PHONE-IP[13642]
08:03:15 ipsec,debug 1 times of 1 bytes message will be sent to PHONE-IP[13642]
08:03:15 ipsec,debug,packet ff
08:03:16 ipsec,debug ===== received 92 bytes from 75.107.121.2[500] to ROUTER-IP[500]
08:03:16 ipsec,debug,packet e9b2f4eb 7775cd8c d54e5807 8d292f9b 08100501 de0f3776 0000005c 19fb18fb
08:03:16 ipsec,debug,packet b223ef02 aff9b0dc 44b37d96 17edade6 42349dea e48f071e 75f17e2c 817b9c97
08:03:16 ipsec,debug,packet df61c19f 1c40e5a8 b4eba5be da8ce1db 38336af8 6ad5ebfd 8ddd5f20
08:03:16 ipsec,debug receive Information.
08:03:16 ipsec,debug compute IV for phase2
08:03:16 ipsec,debug phase1 last IV:
08:03:16 ipsec,debug d84f5c4e a52b5298 de0f3776
08:03:16 ipsec,debug hash(sha1)
08:03:16 ipsec,debug encryption(3des)
08:03:16 ipsec,debug phase2 IV computed:
08:03:16 ipsec,debug 20e6cc84 f381cd1a
08:03:16 ipsec,debug encryption(3des)
08:03:16 ipsec,debug IV was saved for next processing:
08:03:16 ipsec,debug 6ad5ebfd 8ddd5f20
08:03:16 ipsec,debug encryption(3des)
08:03:16 ipsec,debug with key:
08:03:16 ipsec,debug 34e76bf3 bdb02b64 47a87b8e e6f5d824 bc49f3e4 3c92dcc9
08:03:16 ipsec,debug decrypted payload by IV:
08:03:16 ipsec,debug 20e6cc84 f381cd1a
08:03:16 ipsec,debug decrypted payload, but not trimed.
08:03:16 ipsec,debug 0b000018 29c71c42 62bad230 9d634b77 72eaf72e e01d5b25 00000020 00000001
08:03:16 ipsec,debug 01108d28 e9b2f4eb 7775cd8c d54e5807 8d292f9b 0000109a a3fe82bc cbf18907
08:03:16 ipsec,debug padding len=8
08:03:16 ipsec,debug skip to trim padding.
08:03:16 ipsec,debug decrypted.
08:03:16 ipsec,debug e9b2f4eb 7775cd8c d54e5807 8d292f9b 08100501 de0f3776 0000005c 0b000018
08:03:16 ipsec,debug 29c71c42 62bad230 9d634b77 72eaf72e e01d5b25 00000020 00000001 01108d28
08:03:16 ipsec,debug e9b2f4eb 7775cd8c d54e5807 8d292f9b 0000109a a3fe82bc cbf18907
08:03:16 ipsec,debug HASH with:
08:03:16 ipsec,debug de0f3776 00000020 00000001 01108d28 e9b2f4eb 7775cd8c d54e5807 8d292f9b
08:03:16 ipsec,debug 0000109a
08:03:16 ipsec,debug hmac(hmac_sha1)
08:03:16 ipsec,debug HASH computed:
08:03:16 ipsec,debug 29c71c42 62bad230 9d634b77 72eaf72e e01d5b25
08:03:16 ipsec,debug hash validated.
08:03:16 ipsec,debug begin.
08:03:16 ipsec,debug seen nptype=8(hash) len=24
08:03:16 ipsec,debug seen nptype=11(notify) len=32
08:03:16 ipsec,debug succeed.
08:03:16 ipsec,debug 75.107.121.2 notify: R_U_THERE
08:03:16 ipsec,debug 75.107.121.2 DPD R-U-There received
08:03:16 ipsec,debug compute IV for phase2
08:03:16 ipsec,debug phase1 last IV:
08:03:16 ipsec,debug d84f5c4e a52b5298 9a12d2e1
08:03:16 ipsec,debug hash(sha1)
08:03:16 ipsec,debug encryption(3des)
08:03:16 ipsec,debug phase2 IV computed:
08:03:16 ipsec,debug 53447662 5db8e01f
08:03:16 ipsec,debug HASH with:
08:03:16 ipsec,debug 9a12d2e1 00000020 00000001 01108d29 e9b2f4eb 7775cd8c d54e5807 8d292f9b
08:03:16 ipsec,debug 0000109a
08:03:16 ipsec,debug hmac(hmac_sha1)
08:03:16 ipsec,debug HASH computed:
08:03:16 ipsec,debug ae09f660 7f8824e8 31580541 4c181edb 03da9e47
08:03:16 ipsec,debug begin encryption.
08:03:16 ipsec,debug encryption(3des)
08:03:16 ipsec,debug pad length = 8
08:03:16 ipsec,debug 0b000018 ae09f660 7f8824e8 31580541 4c181edb 03da9e47 00000020 00000001
08:03:16 ipsec,debug 01108d29 e9b2f4eb 7775cd8c d54e5807 8d292f9b 0000109a d79ad4de 89a18d07
08:03:16 ipsec,debug encryption(3des)
08:03:16 ipsec,debug with key:
08:03:16 ipsec,debug 34e76bf3 bdb02b64 47a87b8e e6f5d824 bc49f3e4 3c92dcc9
08:03:16 ipsec,debug encrypted payload by IV:
08:03:16 ipsec,debug 53447662 5db8e01f
08:03:16 ipsec,debug save IV for next:
08:03:16 ipsec,debug 67a739e8 d6f32bff
08:03:16 ipsec,debug encrypted.
08:03:16 ipsec,debug 92 bytes from ROUTER-IP[500] to 75.107.121.2[500]
08:03:16 ipsec,debug 1 times of 92 bytes message will be sent to 75.107.121.2[500]
08:03:16 ipsec,debug,packet e9b2f4eb 7775cd8c d54e5807 8d292f9b 08100501 9a12d2e1 0000005c 67c7ae6e
08:03:16 ipsec,debug,packet a6455b17 9a432ac5 825c2778 ee24535b 5f18701a b7119ee7 74febf2d a578e334
08:03:16 ipsec,debug,packet 75876d43 18227678 d18a5efe 4c4a875b 075ccf54 67a739e8 d6f32bff
08:03:16 ipsec,debug sendto Information notify.
08:03:16 ipsec,debug received a valid R-U-THERE, ACK sent
08:03:27 l2tp,debug,packet sent control message to 159.121.202.141:1701 from ROUTER-IP:1701
08:03:27 l2tp,debug,packet tunnel-id=19, session-id=0, ns=4, nr=4
08:03:27 l2tp,debug,packet (M) Message-Type=HELLO
08:03:27 l2tp,debug,packet rcvd control message (ack) from 159.121.202.141:1701 to ROUTER-IP:1701
08:03:27 l2tp,debug,packet tunnel-id=175, session-id=0, ns=4, nr=5