Fresh log output.
11:13:57 ipsec,debug ===== received 444 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:13:57 ipsec,debug hash(sha1)
11:13:57 ipsec,debug ===
11:13:57 ipsec respond new phase 2 negotiation: 10.106.74.190[4500]<=>my.pubip.1[4500]
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=8(hash) len=24
11:13:57 ipsec,debug seen nptype=1(sa) len=280
11:13:57 ipsec,debug seen nptype=10(nonce) len=52
11:13:57 ipsec,debug seen nptype=5(id) len=12
11:13:57 ipsec,debug seen nptype=5(id) len=12
11:13:57 ipsec,debug seen nptype=21(nat-oa) len=12
11:13:57 ipsec,debug seen nptype=21(nat-oa) len=12
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug received IDci2:
11:13:57 ipsec,debug 011106a5 0a0101dc
11:13:57 ipsec,debug received IDcr2:
11:13:57 ipsec,debug 011106a5 891a6c9a
11:13:57 ipsec,debug HASH(1) validate:
11:13:57 ipsec,debug 63564630 91532b8d a5191fa3 3be6054a 50ab39d3
11:13:57 ipsec,debug total SA len=276
11:13:57 ipsec,debug 00000001 00000001 02000038 01030401 bd067f70 0000002c 010c0000 80040004
11:13:57 ipsec,debug 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:13:57 ipsec,debug 02000038 02030401 bd067f70 0000002c 010c0000 80040004 80060080 80050002
11:13:57 ipsec,debug 80010001 00020004 00000e10 80010002 00020004 0003d090 02000034 03030401
11:13:57 ipsec,debug bd067f70 00000028 01030000 80040004 80050002 80010001 00020004 00000e10
11:13:57 ipsec,debug 80010002 00020004 0003d090 02000034 04030401 bd067f70 00000028 01020000
11:13:57 ipsec,debug 80040004 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:13:57 ipsec,debug 00000034 05030401 bd067f70 00000028 010b0000 80040004 80050002 80010001
11:13:57 ipsec,debug 00020004 00000e10 80010002 00020004 0003d090
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=2(prop) len=56
11:13:57 ipsec,debug seen nptype=2(prop) len=56
11:13:57 ipsec,debug seen nptype=2(prop) len=52
11:13:57 ipsec,debug seen nptype=2(prop) len=52
11:13:57 ipsec,debug seen nptype=2(prop) len=52
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug proposal #1 len=56
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=3(trns) len=44
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug transform #1 len=44
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug UDP encapsulation requested
11:13:57 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug proposal #2 len=56
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=3(trns) len=44
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug transform #1 len=44
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug UDP encapsulation requested
11:13:57 ipsec,debug type=Key Length, flag=0x8000, lorv=128
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug proposal #3 len=52
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=3(trns) len=40
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug transform #1 len=40
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug UDP encapsulation requested
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug proposal #4 len=52
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=3(trns) len=40
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug transform #1 len=40
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug UDP encapsulation requested
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug proposal #5 len=52
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=3(trns) len=40
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug transform #1 len=40
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug UDP encapsulation requested
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug pair 1:
11:13:57 ipsec,debug 0x9d840: next=(nil) tnext=(nil)
11:13:57 ipsec,debug proposal #1: 1 transform
11:13:57 ipsec,debug pair 2:
11:13:57 ipsec,debug 0x9d858: next=(nil) tnext=(nil)
11:13:57 ipsec,debug proposal #2: 1 transform
11:13:57 ipsec,debug pair 3:
11:13:57 ipsec,debug 0x9d870: next=(nil) tnext=(nil)
11:13:57 ipsec,debug proposal #3: 1 transform
11:13:57 ipsec,debug pair 4:
11:13:57 ipsec,debug 0x9d888: next=(nil) tnext=(nil)
11:13:57 ipsec,debug proposal #4: 1 transform
11:13:57 ipsec,debug pair 5:
11:13:57 ipsec,debug 0x9d8a0: next=(nil) tnext=(nil)
11:13:57 ipsec,debug proposal #5: 1 transform
11:13:57 ipsec,debug got the local address from ID payload puiblic.ip.1[1701] prefixlen=32 ul_proto=17
11:13:57 ipsec,debug got the peer address from ID payload 10.1.1.220[1701] prefixlen=32 ul_proto=17
11:13:57 ipsec,debug updating policy address because of NAT in transport mode
11:13:57 ipsec,debug new local address 10.106.74.190[1701]
11:13:57 ipsec,debug new peer address my.pubip.1[1701]
11:13:57 ipsec searching for policy for selector: 10.106.74.190:1701 ip-proto:17 <=> my.pubip.1:1701 ip-proto:17
11:13:57 ipsec using strict match: 10.106.74.190:1701 <=> my.pubip.1:1701 ip-proto:17
11:13:57 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=2:2)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
11:13:57 ipsec,debug begin compare proposals.
11:13:57 ipsec,debug pair[1]: 0x9d840
11:13:57 ipsec,debug 0x9d840: next=(nil) tnext=(nil)
11:13:57 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CBC
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug peer's single bundle:
11:13:57 ipsec,debug (proto_id=ESP spisize=4 spi=bd067f70 spi_p=00000000 encmode=UDP-Transport reqid=0:0)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:13:57 ipsec,debug my single bundle:
11:13:57 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=2:2)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
11:13:57 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
11:13:57 ipsec Adjusting my encmode UDP-Transport->Transport
11:13:57 ipsec Adjusting peer's encmode UDP-Transport(4)->Transport(2)
11:13:57 ipsec,debug matched
11:13:57 ipsec,debug ===
11:13:57 ipsec,debug call pfkey_send_getspi d
11:13:57 ipsec,debug pfkey GETSPI sent: ESP/Transport my.pubip.1[4500]->10.106.74.190[4500]
11:13:57 ipsec,debug pfkey getspi sent.
11:13:57 ipsec,debug total SA len=64
11:13:57 ipsec,debug 00000001 00000001 00000038 01030401 00000000 0000002c 010c0000 80040004
11:13:57 ipsec,debug 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=2(prop) len=56
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug proposal #1 len=56
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=3(trns) len=44
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug transform #1 len=44
11:13:57 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:13:57 ipsec,debug UDP encapsulation requested
11:13:57 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:13:57 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:13:57 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:13:57 ipsec,debug pair 1:
11:13:57 ipsec,debug 0x9bcb0: next=(nil) tnext=(nil)
11:13:57 ipsec,debug proposal #1: 1 transform
11:13:57 ipsec,debug NAT-OAi:
11:13:57 ipsec,debug 01000000 2fcbd3c6
11:13:57 ipsec,debug NAT-OAr:
11:13:57 ipsec,debug 01000000 0a6a4abe
11:13:57 ipsec,debug add payload of len 64, next type 10
11:13:57 ipsec,debug add payload of len 24, next type 5
11:13:57 ipsec,debug add payload of len 8, next type 5
11:13:57 ipsec,debug add payload of len 8, next type 21
11:13:57 ipsec,debug add payload of len 8, next type 21
11:13:57 ipsec,debug add payload of len 8, next type 0
11:13:57 ipsec,debug add payload of len 20, next type 1
11:13:57 ipsec,debug 204 bytes from 10.106.74.190[4500] to my.pubip.1[4500]
11:13:57 ipsec,debug 1 times of 208 bytes message will be sent to my.pubip.1[4500]
11:13:57 ipsec sent phase2 packet 10.106.74.190[4500]<=>my.pubip.1[4500] c665fcbaa0443214:c73cd15ef6ef5f66:00000000
11:13:57 ipsec,debug ===== received 60 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=8(hash) len=24
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug HASH(3) validate:
11:13:57 ipsec,debug adcef992 4e213dd4 26328807 0354e3dc adba2619
11:13:57 ipsec,debug ===
11:13:57 ipsec,debug encryption(aes-cbc)
11:13:57 ipsec,debug hmac(sha1)
11:13:57 ipsec,debug encklen=256 authklen=160
11:13:57 ipsec,debug generating 640 bits of key (dupkeymat=4)
11:13:57 ipsec,debug generating K1...K4 for KEYMAT.
11:13:57 ipsec,debug 5602b92b b69152c7 b2f2eeee fe360dc7 c1004b14 e89daf81 7b7e35e6 14d0416f
11:13:57 ipsec,debug 758ee426 da6b1cc6 a79c53ae b3cbcf07 26048c1c d926233b 50200547 c317bc2d
11:13:57 ipsec,debug 66fed9fa b00d9b0b 88397c7b b16aae1f
11:13:57 ipsec,debug encryption(aes-cbc)
11:13:57 ipsec,debug hmac(sha1)
11:13:57 ipsec,debug encklen=256 authklen=160
11:13:57 ipsec,debug generating 640 bits of key (dupkeymat=4)
11:13:57 ipsec,debug generating K1...K4 for KEYMAT.
11:13:57 ipsec,debug b000cc2e 00540909 190f9eaa 7db29751 4cc19799 dc614c3a ed7870c5 153e0562
11:13:57 ipsec,debug ff63aadd e2519f01 b978ca87 f7dce4f5 9f857e55 b9029f02 ea55b0cd 223dc8c1
11:13:57 ipsec,debug 4c2654a4 72fca614 14d4dff0 c9b99e46
11:13:57 ipsec,debug KEYMAT computed.
11:13:57 ipsec,debug call pk_sendupdate
11:13:57 ipsec,debug encryption(aes-cbc)
11:13:57 ipsec,debug hmac(sha1)
11:13:57 ipsec,debug call pfkey_send_update_nat
11:13:57 ipsec IPsec-SA established: ESP/Transport my.pubip.1[4500]->10.106.74.190[4500] spi=0x412b050
11:13:57 ipsec,debug pfkey update sent.
11:13:57 ipsec,debug encryption(aes-cbc)
11:13:57 ipsec,debug hmac(sha1)
11:13:57 ipsec,debug call pfkey_send_add_nat
11:13:57 ipsec IPsec-SA established: ESP/Transport 10.106.74.190[4500]->my.pubip.1[4500] spi=0xbd067f70
11:13:57 ipsec,debug pfkey add sent.
11:13:57 ipsec,debug ===== received 76 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:13:57 ipsec,debug receive Information.
11:13:57 ipsec,debug hash(sha1)
11:13:57 ipsec,debug hash validated.
11:13:57 ipsec,debug begin.
11:13:57 ipsec,debug seen nptype=8(hash) len=24
11:13:57 ipsec,debug seen nptype=12(delete) len=16
11:13:57 ipsec,debug succeed.
11:13:57 ipsec,debug my.pubip.1 delete payload for protocol ESP
11:13:57 ipsec purged IPsec-SA proto_id=ESP spi=0x7bf9418c
11:13:57 ipsec purged IPsec-SA proto_id=ESP spi=0xd9205e0
11:13:57 ipsec,debug purged SAs.
11:13:58 ipsec,debug KA: 10.106.74.190[4500]->my.pubip.1[4500]
11:13:58 ipsec,debug 1 times of 1 bytes message will be sent to my.pubip.1[4500]
11:14:05 ipsec,debug ===== received 444 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:05 ipsec,debug hash(sha1)
11:14:05 ipsec,debug ===
11:14:05 ipsec respond new phase 2 negotiation: 10.106.74.190[4500]<=>my.pubip.1[4500]
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=8(hash) len=24
11:14:05 ipsec,debug seen nptype=1(sa) len=280
11:14:05 ipsec,debug seen nptype=10(nonce) len=52
11:14:05 ipsec,debug seen nptype=5(id) len=12
11:14:05 ipsec,debug seen nptype=5(id) len=12
11:14:05 ipsec,debug seen nptype=21(nat-oa) len=12
11:14:05 ipsec,debug seen nptype=21(nat-oa) len=12
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug received IDci2:
11:14:05 ipsec,debug 011106a5 0a0101dc
11:14:05 ipsec,debug received IDcr2:
11:14:05 ipsec,debug 011106a5 891a6c9a
11:14:05 ipsec,debug HASH(1) validate:
11:14:05 ipsec,debug 17452fef 2bf3b505 2892a701 22b66955 b6f3c8e0
11:14:05 ipsec,debug total SA len=276
11:14:05 ipsec,debug 00000001 00000001 02000038 01030401 8114ef96 0000002c 010c0000 80040004
11:14:05 ipsec,debug 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:14:05 ipsec,debug 02000038 02030401 8114ef96 0000002c 010c0000 80040004 80060080 80050002
11:14:05 ipsec,debug 80010001 00020004 00000e10 80010002 00020004 0003d090 02000034 03030401
11:14:05 ipsec,debug 8114ef96 00000028 01030000 80040004 80050002 80010001 00020004 00000e10
11:14:05 ipsec,debug 80010002 00020004 0003d090 02000034 04030401 8114ef96 00000028 01020000
11:14:05 ipsec,debug 80040004 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:14:05 ipsec,debug 00000034 05030401 8114ef96 00000028 010b0000 80040004 80050002 80010001
11:14:05 ipsec,debug 00020004 00000e10 80010002 00020004 0003d090
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=2(prop) len=56
11:14:05 ipsec,debug seen nptype=2(prop) len=56
11:14:05 ipsec,debug seen nptype=2(prop) len=52
11:14:05 ipsec,debug seen nptype=2(prop) len=52
11:14:05 ipsec,debug seen nptype=2(prop) len=52
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug proposal #1 len=56
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=3(trns) len=44
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug transform #1 len=44
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug UDP encapsulation requested
11:14:05 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug proposal #2 len=56
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=3(trns) len=44
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug transform #1 len=44
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug UDP encapsulation requested
11:14:05 ipsec,debug type=Key Length, flag=0x8000, lorv=128
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug proposal #3 len=52
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=3(trns) len=40
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug transform #1 len=40
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug UDP encapsulation requested
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug proposal #4 len=52
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=3(trns) len=40
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug transform #1 len=40
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug UDP encapsulation requested
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug proposal #5 len=52
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=3(trns) len=40
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug transform #1 len=40
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug UDP encapsulation requested
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug pair 1:
11:14:05 ipsec,debug 0x9bfd0: next=(nil) tnext=(nil)
11:14:05 ipsec,debug proposal #1: 1 transform
11:14:05 ipsec,debug pair 2:
11:14:05 ipsec,debug 0x9cfd8: next=(nil) tnext=(nil)
11:14:05 ipsec,debug proposal #2: 1 transform
11:14:05 ipsec,debug pair 3:
11:14:05 ipsec,debug 0x9aae0: next=(nil) tnext=(nil)
11:14:05 ipsec,debug proposal #3: 1 transform
11:14:05 ipsec,debug pair 4:
11:14:05 ipsec,debug 0x9c000: next=(nil) tnext=(nil)
11:14:05 ipsec,debug proposal #4: 1 transform
11:14:05 ipsec,debug pair 5:
11:14:05 ipsec,debug 0x95248: next=(nil) tnext=(nil)
11:14:05 ipsec,debug proposal #5: 1 transform
11:14:05 ipsec,debug got the local address from ID payload pub.ip.1[1701] prefixlen=32 ul_proto=17
11:14:05 ipsec,debug got the peer address from ID payload 10.1.1.220[1701] prefixlen=32 ul_proto=17
11:14:05 ipsec,debug updating policy address because of NAT in transport mode
11:14:05 ipsec,debug new local address 10.106.74.190[1701]
11:14:05 ipsec,debug new peer address my.pubip.1[1701]
11:14:05 ipsec searching for policy for selector: 10.106.74.190:1701 ip-proto:17 <=> my.pubip.1:1701 ip-proto:17
11:14:05 ipsec using strict match: 10.106.74.190:1701 <=> my.pubip.1:1701 ip-proto:17
11:14:05 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=2:2)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
11:14:05 ipsec,debug begin compare proposals.
11:14:05 ipsec,debug pair[1]: 0x9bfd0
11:14:05 ipsec,debug 0x9bfd0: next=(nil) tnext=(nil)
11:14:05 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CBC
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug peer's single bundle:
11:14:05 ipsec,debug (proto_id=ESP spisize=4 spi=8114ef96 spi_p=00000000 encmode=UDP-Transport reqid=0:0)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:14:05 ipsec,debug my single bundle:
11:14:05 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=2:2)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
11:14:05 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
11:14:05 ipsec Adjusting my encmode UDP-Transport->Transport
11:14:05 ipsec Adjusting peer's encmode UDP-Transport(4)->Transport(2)
11:14:05 ipsec,debug matched
11:14:05 ipsec,debug ===
11:14:05 ipsec,debug call pfkey_send_getspi e
11:14:05 ipsec,debug pfkey GETSPI sent: ESP/Transport my.pubip.1[4500]->10.106.74.190[4500]
11:14:05 ipsec,debug pfkey getspi sent.
11:14:05 ipsec,debug total SA len=64
11:14:05 ipsec,debug 00000001 00000001 00000038 01030401 00000000 0000002c 010c0000 80040004
11:14:05 ipsec,debug 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=2(prop) len=56
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug proposal #1 len=56
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=3(trns) len=44
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug transform #1 len=44
11:14:05 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:05 ipsec,debug UDP encapsulation requested
11:14:05 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:14:05 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:05 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:05 ipsec,debug pair 1:
11:14:05 ipsec,debug 0x9cfd8: next=(nil) tnext=(nil)
11:14:05 ipsec,debug proposal #1: 1 transform
11:14:05 ipsec,debug NAT-OAi:
11:14:05 ipsec,debug 01000000 2fcbd3c6
11:14:05 ipsec,debug NAT-OAr:
11:14:05 ipsec,debug 01000000 0a6a4abe
11:14:05 ipsec,debug add payload of len 64, next type 10
11:14:05 ipsec,debug add payload of len 24, next type 5
11:14:05 ipsec,debug add payload of len 8, next type 5
11:14:05 ipsec,debug add payload of len 8, next type 21
11:14:05 ipsec,debug add payload of len 8, next type 21
11:14:05 ipsec,debug add payload of len 8, next type 0
11:14:05 ipsec,debug add payload of len 20, next type 1
11:14:05 ipsec,debug 204 bytes from 10.106.74.190[4500] to my.pubip.1[4500]
11:14:05 ipsec,debug 1 times of 208 bytes message will be sent to my.pubip.1[4500]
11:14:05 ipsec sent phase2 packet 10.106.74.190[4500]<=>my.pubip.1[4500] c665fcbaa0443214:c73cd15ef6ef5f66:00000000
11:14:05 ipsec,debug ===== received 60 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=8(hash) len=24
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug HASH(3) validate:
11:14:05 ipsec,debug 82356c07 5da97c30 569e4c47 0c2e8698 27926c28
11:14:05 ipsec,debug ===
11:14:05 ipsec,debug encryption(aes-cbc)
11:14:05 ipsec,debug hmac(sha1)
11:14:05 ipsec,debug encklen=256 authklen=160
11:14:05 ipsec,debug generating 640 bits of key (dupkeymat=4)
11:14:05 ipsec,debug generating K1...K4 for KEYMAT.
11:14:05 ipsec,debug 60ce0751 beab8f1d 18251469 e928c28b af3c8508 79820dee 66eb5561 8e7b4637
11:14:05 ipsec,debug c311b03b de9b1ece c61cfb26 62e834e9 4860be56 7f20cfaa c78defe3 007506a8
11:14:05 ipsec,debug 4b1cd526 b0c310e9 f66713a3 35e5fa8a
11:14:05 ipsec,debug encryption(aes-cbc)
11:14:05 ipsec,debug hmac(sha1)
11:14:05 ipsec,debug encklen=256 authklen=160
11:14:05 ipsec,debug generating 640 bits of key (dupkeymat=4)
11:14:05 ipsec,debug generating K1...K4 for KEYMAT.
11:14:05 ipsec,debug 981b625c bf39653c 55bb7059 d3edf980 39f002b3 9293855a 49a0ce44 e75d4d89
11:14:05 ipsec,debug 5b3c08a2 b0ac0755 d386ad61 163e1d34 8661b8c3 f83ad355 ac2be5f3 38bae301
11:14:05 ipsec,debug a68b8e67 751d4c05 07925311 0d29b998
11:14:05 ipsec,debug KEYMAT computed.
11:14:05 ipsec,debug call pk_sendupdate
11:14:05 ipsec,debug encryption(aes-cbc)
11:14:05 ipsec,debug hmac(sha1)
11:14:05 ipsec,debug call pfkey_send_update_nat
11:14:05 ipsec IPsec-SA established: ESP/Transport my.pubip.1[4500]->10.106.74.190[4500] spi=0x979a457
11:14:05 ipsec,debug pfkey update sent.
11:14:05 ipsec,debug encryption(aes-cbc)
11:14:05 ipsec,debug hmac(sha1)
11:14:05 ipsec,debug call pfkey_send_add_nat
11:14:05 ipsec IPsec-SA established: ESP/Transport 10.106.74.190[4500]->my.pubip.1[4500] spi=0x8114ef96
11:14:05 ipsec,debug pfkey add sent.
11:14:05 ipsec,debug ===== received 76 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:05 ipsec,debug receive Information.
11:14:05 ipsec,debug hash(sha1)
11:14:05 ipsec,debug hash validated.
11:14:05 ipsec,debug begin.
11:14:05 ipsec,debug seen nptype=8(hash) len=24
11:14:05 ipsec,debug seen nptype=12(delete) len=16
11:14:05 ipsec,debug succeed.
11:14:05 ipsec,debug my.pubip.1 delete payload for protocol ESP
11:14:05 ipsec purged IPsec-SA proto_id=ESP spi=0xbd067f70
11:14:05 ipsec purged IPsec-SA proto_id=ESP spi=0x412b050
11:14:05 ipsec,debug purged SAs.
11:14:15 ipsec,debug ===== received 444 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:15 ipsec,debug hash(sha1)
11:14:15 ipsec,debug ===
11:14:15 ipsec respond new phase 2 negotiation: 10.106.74.190[4500]<=>my.pubip.1[4500]
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=8(hash) len=24
11:14:15 ipsec,debug seen nptype=1(sa) len=280
11:14:15 ipsec,debug seen nptype=10(nonce) len=52
11:14:15 ipsec,debug seen nptype=5(id) len=12
11:14:15 ipsec,debug seen nptype=5(id) len=12
11:14:15 ipsec,debug seen nptype=21(nat-oa) len=12
11:14:15 ipsec,debug seen nptype=21(nat-oa) len=12
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug received IDci2:
11:14:15 ipsec,debug 011106a5 0a0101dc
11:14:15 ipsec,debug received IDcr2:
11:14:15 ipsec,debug 011106a5 891a6c9a
11:14:15 ipsec,debug HASH(1) validate:
11:14:15 ipsec,debug a4e8f7d8 7ea37f14 297f56fe 84fce31e 9b3ee64c
11:14:15 ipsec,debug total SA len=276
11:14:15 ipsec,debug 00000001 00000001 02000038 01030401 bb532692 0000002c 010c0000 80040004
11:14:15 ipsec,debug 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:14:15 ipsec,debug 02000038 02030401 bb532692 0000002c 010c0000 80040004 80060080 80050002
11:14:15 ipsec,debug 80010001 00020004 00000e10 80010002 00020004 0003d090 02000034 03030401
11:14:15 ipsec,debug bb532692 00000028 01030000 80040004 80050002 80010001 00020004 00000e10
11:14:15 ipsec,debug 80010002 00020004 0003d090 02000034 04030401 bb532692 00000028 01020000
11:14:15 ipsec,debug 80040004 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:14:15 ipsec,debug 00000034 05030401 bb532692 00000028 010b0000 80040004 80050002 80010001
11:14:15 ipsec,debug 00020004 00000e10 80010002 00020004 0003d090
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=2(prop) len=56
11:14:15 ipsec,debug seen nptype=2(prop) len=56
11:14:15 ipsec,debug seen nptype=2(prop) len=52
11:14:15 ipsec,debug seen nptype=2(prop) len=52
11:14:15 ipsec,debug seen nptype=2(prop) len=52
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug proposal #1 len=56
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=3(trns) len=44
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug transform #1 len=44
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug UDP encapsulation requested
11:14:15 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug proposal #2 len=56
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=3(trns) len=44
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug transform #1 len=44
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug UDP encapsulation requested
11:14:15 ipsec,debug type=Key Length, flag=0x8000, lorv=128
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug proposal #3 len=52
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=3(trns) len=40
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug transform #1 len=40
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug UDP encapsulation requested
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug proposal #4 len=52
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=3(trns) len=40
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug transform #1 len=40
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug UDP encapsulation requested
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug proposal #5 len=52
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=3(trns) len=40
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug transform #1 len=40
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug UDP encapsulation requested
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug pair 1:
11:14:15 ipsec,debug 0x9d5c8: next=(nil) tnext=(nil)
11:14:15 ipsec,debug proposal #1: 1 transform
11:14:15 ipsec,debug pair 2:
11:14:15 ipsec,debug 0x9b028: next=(nil) tnext=(nil)
11:14:15 ipsec,debug proposal #2: 1 transform
11:14:15 ipsec,debug pair 3:
11:14:15 ipsec,debug 0x9a620: next=(nil) tnext=(nil)
11:14:15 ipsec,debug proposal #3: 1 transform
11:14:15 ipsec,debug pair 4:
11:14:15 ipsec,debug 0x9ab58: next=(nil) tnext=(nil)
11:14:15 ipsec,debug proposal #4: 1 transform
11:14:15 ipsec,debug pair 5:
11:14:15 ipsec,debug 0x9ca40: next=(nil) tnext=(nil)
11:14:15 ipsec,debug proposal #5: 1 transform
11:14:15 ipsec,debug got the local address from ID payload pub.ip.1[1701] prefixlen=32 ul_proto=17
11:14:15 ipsec,debug got the peer address from ID payload 10.1.1.220[1701] prefixlen=32 ul_proto=17
11:14:15 ipsec,debug updating policy address because of NAT in transport mode
11:14:15 ipsec,debug new local address 10.106.74.190[1701]
11:14:15 ipsec,debug new peer address my.pubip.1[1701]
11:14:15 ipsec searching for policy for selector: 10.106.74.190:1701 ip-proto:17 <=> my.pubip.1:1701 ip-proto:17
11:14:15 ipsec using strict match: 10.106.74.190:1701 <=> my.pubip.1:1701 ip-proto:17
11:14:15 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=2:2)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
11:14:15 ipsec,debug begin compare proposals.
11:14:15 ipsec,debug pair[1]: 0x9d5c8
11:14:15 ipsec,debug 0x9d5c8: next=(nil) tnext=(nil)
11:14:15 ipsec,debug prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES-CBC
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug peer's single bundle:
11:14:15 ipsec,debug (proto_id=ESP spisize=4 spi=bb532692 spi_p=00000000 encmode=UDP-Transport reqid=0:0)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:14:15 ipsec,debug my single bundle:
11:14:15 ipsec,debug (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=UDP-Transport reqid=2:2)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=256 authtype=hmac-sha1)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=192 authtype=hmac-sha1)
11:14:15 ipsec,debug (trns_id=AES-CBC encklen=128 authtype=hmac-sha1)
11:14:15 ipsec Adjusting my encmode UDP-Transport->Transport
11:14:15 ipsec Adjusting peer's encmode UDP-Transport(4)->Transport(2)
11:14:15 ipsec,debug matched
11:14:15 ipsec,debug ===
11:14:15 ipsec,debug call pfkey_send_getspi f
11:14:15 ipsec,debug pfkey GETSPI sent: ESP/Transport my.pubip.1[4500]->10.106.74.190[4500]
11:14:15 ipsec,debug pfkey getspi sent.
11:14:15 ipsec,debug total SA len=64
11:14:15 ipsec,debug 00000001 00000001 00000038 01030401 00000000 0000002c 010c0000 80040004
11:14:15 ipsec,debug 80060100 80050002 80010001 00020004 00000e10 80010002 00020004 0003d090
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=2(prop) len=56
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug proposal #1 len=56
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=3(trns) len=44
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug transform #1 len=44
11:14:15 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Transport
11:14:15 ipsec,debug UDP encapsulation requested
11:14:15 ipsec,debug type=Key Length, flag=0x8000, lorv=256
11:14:15 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug type=SA Life Type, flag=0x8000, lorv=kilobytes
11:14:15 ipsec,debug type=SA Life Duration, flag=0x0000, lorv=4
11:14:15 ipsec,debug pair 1:
11:14:15 ipsec,debug 0x9c918: next=(nil) tnext=(nil)
11:14:15 ipsec,debug proposal #1: 1 transform
11:14:15 ipsec,debug NAT-OAi:
11:14:15 ipsec,debug 01000000 2fcbd3c6
11:14:15 ipsec,debug NAT-OAr:
11:14:15 ipsec,debug 01000000 0a6a4abe
11:14:15 ipsec,debug add payload of len 64, next type 10
11:14:15 ipsec,debug add payload of len 24, next type 5
11:14:15 ipsec,debug add payload of len 8, next type 5
11:14:15 ipsec,debug add payload of len 8, next type 21
11:14:15 ipsec,debug add payload of len 8, next type 21
11:14:15 ipsec,debug add payload of len 8, next type 0
11:14:15 ipsec,debug add payload of len 20, next type 1
11:14:15 ipsec,debug 204 bytes from 10.106.74.190[4500] to my.pubip.1[4500]
11:14:15 ipsec,debug 1 times of 208 bytes message will be sent to my.pubip.1[4500]
11:14:15 ipsec sent phase2 packet 10.106.74.190[4500]<=>my.pubip.1[4500] c665fcbaa0443214:c73cd15ef6ef5f66:00000000
11:14:15 ipsec,debug ===== received 60 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=8(hash) len=24
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug HASH(3) validate:
11:14:15 ipsec,debug 2d4e583d dbf15aa9 bb306c68 e161b299 542931ce
11:14:15 ipsec,debug ===
11:14:15 ipsec,debug encryption(aes-cbc)
11:14:15 ipsec,debug hmac(sha1)
11:14:15 ipsec,debug encklen=256 authklen=160
11:14:15 ipsec,debug generating 640 bits of key (dupkeymat=4)
11:14:15 ipsec,debug generating K1...K4 for KEYMAT.
11:14:15 ipsec,debug fe8b72d2 0cc1d423 94cadb48 bdb5b591 c0ded494 84db0a91 aa5a1de6 fd8cd76a
11:14:15 ipsec,debug cce9148b ee14776d 504a965b 044d2f28 4a1784cb f5bd0693 79fa2861 7f3c6d83
11:14:15 ipsec,debug 690231be e72a4fc0 7211ff39 1c0921db
11:14:15 ipsec,debug encryption(aes-cbc)
11:14:15 ipsec,debug hmac(sha1)
11:14:15 ipsec,debug encklen=256 authklen=160
11:14:15 ipsec,debug generating 640 bits of key (dupkeymat=4)
11:14:15 ipsec,debug generating K1...K4 for KEYMAT.
11:14:15 ipsec,debug 8bd9a17b 5c1813cf 4f08799e cc1face4 21c36e20 7cfea2d5 5396dcc9 aa0b0ff2
11:14:15 ipsec,debug b7c8ff66 4a28e6db 12c74962 ee8201e8 f2303131 122915fb 571629e5 8f045b28
11:14:15 ipsec,debug b7d56c54 84bcd932 f73ce960 4e181b21
11:14:15 ipsec,debug KEYMAT computed.
11:14:15 ipsec,debug call pk_sendupdate
11:14:15 ipsec,debug encryption(aes-cbc)
11:14:15 ipsec,debug hmac(sha1)
11:14:15 ipsec,debug call pfkey_send_update_nat
11:14:15 ipsec IPsec-SA established: ESP/Transport my.pubip.1[4500]->10.106.74.190[4500] spi=0x26f0c47
11:14:15 ipsec,debug pfkey update sent.
11:14:15 ipsec,debug encryption(aes-cbc)
11:14:15 ipsec,debug hmac(sha1)
11:14:15 ipsec,debug call pfkey_send_add_nat
11:14:15 ipsec IPsec-SA established: ESP/Transport 10.106.74.190[4500]->my.pubip.1[4500] spi=0xbb532692
11:14:15 ipsec,debug pfkey add sent.
11:14:15 ipsec,debug ===== received 76 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:15 ipsec,debug receive Information.
11:14:15 ipsec,debug hash(sha1)
11:14:15 ipsec,debug hash validated.
11:14:15 ipsec,debug begin.
11:14:15 ipsec,debug seen nptype=8(hash) len=24
11:14:15 ipsec,debug seen nptype=12(delete) len=16
11:14:15 ipsec,debug succeed.
11:14:15 ipsec,debug my.pubip.1 delete payload for protocol ESP
11:14:15 ipsec purged IPsec-SA proto_id=ESP spi=0x8114ef96
11:14:15 ipsec purged IPsec-SA proto_id=ESP spi=0x979a457
11:14:15 ipsec,debug purged SAs.
11:14:18 ipsec,debug KA: 10.106.74.190[4500]->my.pubip.1[4500]
11:14:18 ipsec,debug 1 times of 1 bytes message will be sent to my.pubip.1[4500]
11:14:25 ipsec,debug ===== received 76 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:25 ipsec,debug receive Information.
11:14:25 ipsec,debug hash(sha1)
11:14:25 ipsec,debug hash validated.
11:14:25 ipsec,debug begin.
11:14:25 ipsec,debug seen nptype=8(hash) len=24
11:14:25 ipsec,debug seen nptype=12(delete) len=16
11:14:25 ipsec,debug succeed.
11:14:25 ipsec,debug my.pubip.1 delete payload for protocol ESP
11:14:25 ipsec purged IPsec-SA proto_id=ESP spi=0xbb532692
11:14:25 ipsec purged IPsec-SA proto_id=ESP spi=0x26f0c47
11:14:25 ipsec removing generated policy
11:14:25 ipsec,debug purged SAs.
11:14:25 ipsec,debug ===== received 92 bytes from my.pubip.1[4500] to 10.106.74.190[4500]
11:14:25 ipsec,debug receive Information.
11:14:25 ipsec,debug hash(sha1)
11:14:25 ipsec,debug hash validated.
11:14:25 ipsec,debug begin.
11:14:25 ipsec,debug seen nptype=8(hash) len=24
11:14:25 ipsec,debug seen nptype=12(delete) len=28
11:14:25 ipsec,debug succeed.
11:14:25 ipsec,debug my.pubip.1 delete payload for protocol ISAKMP
11:14:25 ipsec,info purging ISAKMP-SA 10.106.74.190[4500]<=>my.pubip.1[4500] spi=c665fcbaa0443214:c73cd15ef6ef5f66.
11:14:25 ipsec purged ISAKMP-SA 10.106.74.190[4500]<=>my.pubip.1[4500] spi=c665fcbaa0443214:c73cd15ef6ef5f66.
11:14:25 ipsec,debug purged SAs.
11:14:25 ipsec,info ISAKMP-SA deleted 10.106.74.190[4500]-my.pubip.1[4500] spi:c665fcbaa0443214:c73cd15ef6ef5f66 rekey:1
11:14:25 ipsec KA remove: 10.106.74.190[4500]->my.pubip.1[4500]
11:14:25 ipsec,debug KA tree dump: 10.106.74.190[4500]->my.pubip.1[4500] (in_use=1)
11:14:25 ipsec,debug KA removing this one...